id
stringlengths
3
8
url
stringlengths
32
207
title
stringlengths
1
114
text
stringlengths
93
492k
13532851
https://en.wikipedia.org/wiki/J.%20H.%20Wilkinson%20Prize%20for%20Numerical%20Software
J. H. Wilkinson Prize for Numerical Software
The J. H. Wilkinson Prize for Numerical Software is awarded every four years to honor outstanding contributions in the field of numerical software. The award is named to commemorate the outstanding contributions of James H. Wilkinson in the same field. The prize was established by Argonne National Laboratory (ANL), the National Physical Laboratory (NPL), and the Numerical Algorithms Group (NAG). They sponsored the award every four years at the International Congress on Industrial and Applied Mathematics (ICIAM) beginning with the 1991 award. By agreement in 2015 among ANL, NPL, NAG, and SIAM, the prize will be administered by the Society for Industrial and Applied Mathematics (SIAM) starting with the 2019 award. Eligibility and selection criteria Candidates must have worked in the field for at most 12 years after receiving their PhD as of January 1 of the award year. Breaks in continuity are allowed, and the prize committee may make exceptions. The award is given on the basis of: Clarity of the software implementation and documentation. Clarity of the paper accompanying the entry. Portability, reliability, efficiency and usability of the software implementation. Depth of analysis of the algorithm and the software. Importance of application addressed by the software. Quality of the test software Winners 1991 The first prize in 1991 was awarded to Linda Petzold for DASSL, a differential algebraic equation solver. This code is available in the public domain. 1995 The 1995 prize was awarded to Chris Bischof and Alan Carle for ADIFOR 2.0, an automatic differentiation tool for Fortran 77 programs. The code is available for educational and non-profit research. 1999 The 1999 prize was awarded to Matteo Frigo and Steven G. Johnson for FFTW, a C library for computing the discrete Fourier transform. 2003 The 2003 prize was awarded to Jonathan Shewchuk for Triangle, a two-dimensional mesh generator and Delaunay Triangulator. It is freely available. 2007 The 2007 prize was awarded to Wolfgang Bangerth, Guido Kanschat, and Ralf Hartmann for deal.II, a software library for computational solution of partial differential equations using adaptive finite elements. It is freely available. 2011 Andreas Waechter (IBM T. J. Watson Research Center) and Carl Laird (Texas A&M University) were awarded the 2011 prize for IPOPT, an object-oriented library for solving large-scale continuous optimization problems. It is freely available. 2015 The 2015 prize was awarded to Patrick Farrell (University of Oxford), Simon Funke (Simula Research Laboratory), David Ham (Imperial College London), and Marie Rognes (Simula Research Laboratory) for the development of dolfin-adjoint, a package which automatically derives and solves adjoint and tangent linear equations from high-level mathematical specifications of finite element discretisations of partial differential equations. 2019 The 2019 prize was awarded to Jeff Bezanson, Stefan Karpinski, and Viral B. Shah for their development of the Julia programming language. See also List of computer science awards List of mathematics awards References External links Official Website Computer science awards Awards established in 1991 Awards of the Society for Industrial and Applied Mathematics
2538794
https://en.wikipedia.org/wiki/List%20of%20video%20game%20genres
List of video game genres
A video game genre is a specific category of games related by similar gameplay characteristics. Video game genres are not usually defined by the setting or story of the game or its medium of play, but by the way the player interacts with the game. For example; a first-person shooter is still a first-person shooter regardless of whether it takes place in a science fiction, western, fantasy, or military setting; so long as it features a camera mimicking the perspective of the protagonist (first-person) and gameplay centered around the use of ranged weaponry. Genres may encompass a wide variety of games, leading to even more specific classifications called subgenres. For example, an action game can be classified into many subgenres such as platform games and fighting games. Some games, most notably browser and mobile games, are commonly classified into multiple genres. The following is a list of all commonly defined video game genres, with short descriptions for individual genres and major subgenres. Action Action games emphasize physical challenges that require hand-eye coordination and motor skill to overcome. They center around the player, who is in control of most of the action. Most of the earliest video games were considered action games; today, it is still a vast genre covering all games that involve physical challenges. Action games are classified by many subgenres. Platform games and fighting games are among the best-known subgenres, while shooter games became and continue to be one of the dominant genres in video gaming since the 1990s. Action games usually involve elements of twitch gameplay. Platform games Platform games (or platformers) have gameplay primarily centered around jumping and climbing to navigate the player's environment. They may have enemies or obstacles to avoid and fight or may just be pure jumping puzzles. Generally the playable characters in a platform game are able to jump many times their own height and the player is offered some control over their movement in midair as well as the height and distance of their jumps. Settings tend to be vertically exaggerated with much uneven terrain that the player can leap up to or fall off of. Donkey Kong (1981) was one of the earliest and best-known platformers; the American gaming press classified it using the term climbing game at the time. Super Mario Bros. (1985) was one of the best-selling games of all time, with more than 40 million copies sold. Shooter games In shooter games (or simply shooters), players use ranged weapons to participate in the action, which takes place at a distance. Most shooters involve violent gameplay; lethal weaponry is used to damage opponents. However, some shooters, such as Splatoon, have non-violent objectives. Shooters, aside from subgenre classifications, can be further classified by their perspective of play. First-person shooters are played within the protagonist's perspective; they often include a heads-up display showing key information such as the current health of the protagonist. In third-person shooters, the protagonist's body can be seen fully; the environment is rendered from a distance. Some shooters incorporate both perspectives. Hero shooters are either first- or third-person multiplayer shooters that emphasize pre-designed "hero" characters, with each possessing distinctive abilities and/or weapons that are specific to them. Hero shooters strongly encourage teamwork between players on a team, guiding players to select effective combinations of hero characters and coordinate the use of hero abilities during a match. Outside of a match, players have the ability to customize the appearance of the heroes but with no other in-game effects. Hero shooters are inspired by the multiplayer online battle arena genre, and popular team-based shooters like Team Fortress 2. Examples of hero shooters include Overwatch, Paladins, Apex Legends, and Valorant. Light gun shooters are controlled with a gun-shaped controller; light guns function via a light sensor, hence the name "light gun". The technology has been used as early as the 1920s for shooter games, although electronic video gaming did not exist at that time. Shoot 'em ups pit players, who are usually piloting some form of flying vehicle, or flying by some other means, against large waves of opponents; the player is continuously moving and must attack and avoid opponent's attacks as well as obstacles. Since the 1990s, shooters, most notably first-person shooters, have become widely successful in video gaming, accounting for a large percentage of video game sales. Wolfenstein 3D, created by Id Software and released in 1992, was credited for pioneering gameplay and graphics elements incorporated by many other shooters. Also developed by Id and published one year after Wolfenstein 3D's release, Doom is broadly considered to be one of the most influential games in video gaming history. Other successful shooter series include Half-Life, a widely acclaimed and commercially successful series noted for its influence on contemporary shooters; and the Call of Duty franchise, with more than 250 million sales across all its titles. Fighting games Fighting games center around close-ranged combat, typically one-on-one fights or against a small number of equally powerful opponents, often involving violent and exaggerated unarmed attacks. Most fighting games feature a large number of playable characters and a competitive multiplayer mode. While most fighting games emphasize hand-to-hand combat, some fighting games such as Soulcalibur and Samurai Shodown center around combat with melee weapons. Many fighting games incorporate heavily emphasized attacks based on various martial arts systems. Fighting games were one of the dominant genres in video gaming until the late-1990s, where the genre saw a slight decline. This decline was short-lived however, for titles such as Mortal Kombat, Street Fighter, and Super Smash Bros. dominate the fighter demographic of the modern era. Different sub-genre games are starting to become more popular though. Super Smash Bros., and its deviation from the traditional fighting game rule set is one of these games that has gained a large following because of its "fun over form" party game development mentality. Beat 'em up games Beat 'em ups (or brawlers) are a related, but distinct genre to fighting games. While they both involve close-range combat, beat 'em ups put players against large waves of opponents as opposed to a few. Beat 'em ups often incorporate mechanics from other action genres, and multiplayer in beat 'em up games tends to be co-operative rather than competitive. Beat 'em ups saw a sudden decline in popularity in the early 1990s with the release of fighting games, but 3D beat 'em ups have kept the genre alive. Hack and Slash is a sub-genre often used to refer to weapons based beat 'em ups. Stealth game These games tend to emphasize sneaking around and avoiding enemy notice over direct conflict, for example, the Metal Gear series, and the Sly Cooper series. In a Stealth game, players are usually still able to engage in loud, conspicuous combat, but are often punished for it. Other games, such as Dishonored, the player can obtain their goal with or without stealth, but stealth is encouraged as the player is at a disadvantage over many of their enemies. The inclusion of stealth as a mechanic in a game does not necessarily make it a Stealth Game. For example, Skyrim has an entire perk tree dedicated to "Sneaking" despite that most of the dungeons in the game can be completed using a hack-and-slash strategy. The first stealth game was Manbiki Shounen (Shoplifting Boy), published in November 1979. The PET 2001 personal computer game was developed by Hiroshi Suzuki. Hideo Kojima's Metal Gear was the first mainstream stealth game, with the player starting the game unarmed, and sold over a million copies in the United States. Metal Gear 2: Solid Snake evolved the stealth gameplay of its predecessor. Metal Gear and Metal Gear 2 are credited with pioneering stealth mechanics. Metal Gear Solid, which debuted at the 1996 Tokyo Game Show, was the first 3D stealth game, and is credited with popularizing the stealth game genre, as well as the hiding-behind-cover mechanic. Survival games Survival games start the player off with minimal resources, in a hostile, open-world environment, and require them to collect resources, craft tools, weapons, and shelter, in order to survive as long as possible. Many are set in procedurally-generated environments, and are open-ended with no set goals. They may overlap with the survival horror genre, in which the player must survive within a supernatural setting, such as a zombie apocalypse. Rhythm games Rhythm game or rhythm action is a genre of music-themed action video game that challenges a player's sense of rhythm. The genre includes dance games such as Dance Dance Revolution and music-based games such as Donkey Konga and Guitar Hero. Games in the genre challenge the player to press buttons at precise times: the screen shows which button the player is required to press, and the game awards points both for accuracy and for synchronization with the beat. PaRappa the Rapper has been deemed the first influential rhythm game; whose basic template formed the core of subsequent games in the genre. Other popular rhythm games include Dance Dance Revolution, Maimai, Project Diva, Cytus, Love Live: School Idol Festival, The Idolmaster, osu!, Taiko no Tatsujin, Crypt of the Necrodancer, Rhythm Heaven, etc. Battle Royale games A battle royale game is a genre that blends the survival, exploration and scavenging elements of a survival game with last man standing gameplay. Battle royale games challenge a large number of players, starting with minimal equipment, to search for weapons and armor and eliminate other opponents, while trying to stay in safe playable area which shrinks as the time passes, with the winner being the last competitor in the game. Notable battle royale games include PlayerUnknown's Battlegrounds, Fortnite Battle Royale, Garena Free Fire, Apex Legends, and Call of Duty: Warzone, each having received tens of millions of players within months of their releases. Action-adventure Although Action-adventure games can divide into action or adventure games, they combine elements of their two component genres, typically featuring long-term obstacles that must be overcome using a tool or item as leverage (which is collected earlier), as well as many smaller obstacles almost constantly in the way, that require elements of action games to overcome. Action-adventure games tend to focus on exploration and usually involve item gathering, simple puzzle solving, and combat. "Action-adventure" has become a label which is sometimes attached to games which do not fit neatly into another well known genre. Because of their prevalence on video game consoles and the absence of typical adventure games, action-adventure games are often called "adventure games" by modern gamers. One of the first action-adventure games was the Atari 2600 game Adventure (1980). It was directly inspired by the original text adventure, Colossal Cave Adventure. In the process of adapting a text game to a console with only a joystick for control, designer Warren Robinett created an action-adventure game by incorporating action arcade game elements. The action-adventure later became an established genre with Shigeru Miyamoto's The Legend of Zelda (1986), which became a success due to how it combined elements from different genres to create a compelling hybrid, including exploration, transport puzzles, adventure-style inventory puzzles, an action component, a monetary system, and simplified RPG-style level building without the experience points. The game was also an early example of open world, non-linear gameplay, and introduced innovations like saving on battery backup. It became one of the most influential games of the 8-bit era, inspiring action-adventures like Metroid and RPGs like Final Fantasy. Zelda has since remained the most prolific action-adventure game series through to the present day. Survival horror Survival horror games focus on fear and attempt to scare the player via traditional horror fiction elements such as atmospherics, death, the undead, blood and gore. One crucial gameplay element in many of these games is the low quantity of ammunition, or number of breakable melee weapons. Notable examples include Silent Hill and Resident Evil. The first survival horror game was AX-2: Uchuu Yusousen Nostromo (AX-2 宇宙輸送船ノストロモ), developed by Akira Takiguchi, a Tokyo University student and Taito contractor, for the PET 2001. It was ported to the PC-6001 by Masakuni Mitsuhashi (also known as Hiromi Ohba, later joined Game Arts), and published by ASCII in 1981, exclusively for Japan. Metroidvania Metroidvania games are a subgenre of platformer, named after its two first well-known franchises, Metroid and Castlevania. They feature large interconnected world maps the player can explore, but access to parts of the world is limited by doors or other obstacles that can only be opened after the player has acquired special tools, weapons or abilities within the game. Acquiring such improvements also aids the player in defeating more difficult enemies and locating shortcuts and secret areas, and often includes retracing one's steps across the map. Metroidvanias usually do not consist of any linear gameplay and often involve much backtracking – especially after new powerups or tools have been obtained. Adventure Adventure games were some of the earliest games created, beginning with the text adventure Colossal Cave Adventure in the 1970s. That game was originally titled simply "Adventure," and is the namesake of the genre. Over time, graphics have been introduced to the genre and the interface has evolved. Unlike adventure films, adventure games are not defined by story or content. Rather, adventure describes a manner of gameplay without reflex challenges or action. They normally require the player to solve various puzzles by interacting with people or the environment, most often in a non-confrontational way. It is considered a "purist" genre and tends to exclude anything which includes action elements beyond a mini game. Because they put little pressure on the player in the form of action-based challenges or time constraints, adventure games have had the unique ability to appeal to people who do not normally play video games. The genre peaked in popularity with the 1993 release of Myst, the best-selling PC game of all time up to that point. The simple point and click interface, detailed worlds and casual pace made it accessible, and its sense of artistic surrealism caused news outlets such as Wired Magazine, The New York Times, and the San Francisco Chronicle to declare that the gaming industry had matured. It had four proper sequels, but none managed to experience the same level of success. The success of Myst also inspired many others to create similar games with first person perspectives, surreal environments and minimal or no dialogue, but these neither recaptured the success of Myst nor of earlier personality-driven adventures. In the late 1990s the genre suffered a large drop in popularity, mass-market releases became rare, and many proclaimed the adventure game to be dead. More accurately, it has become a niche genre. Adventure games are not entirely uncommon, but they tend to be very low budget in anticipation of modest sales. The genre was somewhat rejuvenated with the release of The Longest Journey in 1999, which emphasized stronger story elements and more interaction with different characters. A recent resurgence of adventure games on Nintendo consoles might signify a new interest in the genre. A successful Kickstarter campaign in 2012, run by Doublefine Studios, also spoke to the continued interest in Adventure games. The game produced as a result was mired in controversy and production delays, and to some, signalled the true end of the genre outside of niche markets. Text adventures The earliest adventure games were text adventures, also known as interactive fiction. Games such as the popular Zork series of the late 1970s and early 1980s allowed the player to use a keyboard to enter commands such as "get rope" or "go west" while the computer describes what is happening. A great deal of programming went into parsing the player's text input. Graphic adventures Adventure games emerged as graphics became more common. Adventure games began to supplement and later on replace textual descriptions with visuals (for example, a picture of the current location). Early graphic adventure games used text-parsers to input commands. The growing use of mice led to the "point-and-click" genre of adventure games, where the player would no longer have to type commands. The player could, for example, click on a hand icon and then on a rope to pick up the rope. Visual novels A is a game featuring mostly static graphics, usually with anime-style art. As the name might suggest, they resemble mixed-media novels or tableau vivant stage plays. Many visual novels track statistics that the player must build in order to advance the plot, and permit a variety of endings, allowing more dynamic reactions to the player's actions than a typical linear adventure plot. Many visual novels are dating sims, including bishōjo games. Visual novels are especially prevalent in Japan, where they make up nearly 70% of PC games released. They are rarely produced for video game consoles, but the more popular games are sometimes ported to systems such as the Dreamcast or the PlayStation 2. The market for visual novels outside Japan, however, was nearly non-existent prior to the success of the Nintendo DS, for which several Japanese visual novels were released in the West, such as the Ace Attorney series. Interactive movie The interactive movie genre came about with the invention of laserdiscs. An interactive movie contains pre-filmed full-motion cartoons or live-action sequences, where the player controls some of the moves of the main character. For example, when in danger, the player decides which move, action, or combination to choose. In these games, the only activity the player has is to choose or guess the move the designers intend him to make. Interactive movies usually differ from games that simply use full motion video, FMV, extensively between scenes in that they try to integrate it into the gameplay itself. This has been used in everything from racing games to fighting games. A few adventure game have tried to use the term to liken the storytelling of their games to those in movies, most notably the later Tex Murphy games and the more recent Fahrenheit (Indigo Prophecy), although they are more aptly classified as genre hybrids. Elements of interactive movies have been adapted for game cut scenes, in the form of Quick Time Events, to keep the player alert. Games like Resident Evil 4 present obvious in-game prompts for the player to react to. Not doing so usually results in the player character either getting hurt or outright killed. Real-time 3D adventures Around this time, real-time 3D adventure games appeared. These included Nightfall in 1998, Shenmue in 1999, realMyst in 2000, Shadow of Memories in 2001, and Uru: Ages Beyond Myst in 2003. They augmented traditional adventure gameplay with some of the attributes more commonly associated with action games, for example, freedom of motion and physics-based behavior. Puzzle Puzzle games are for those who like to put their brain to use and find the thrill in solving puzzles. Whether simple adaptations of real-world puzzles like Sudoku or full-blown puzzle games meant to be explored in a video game environment, there’s a lot of variety on offer. They test the player’s problem-solving skills including logic, pattern recognition, sequence solving, and word completion. Puzzle games continue to find millions of fans, especially on mobile phones where games like Candy Crush Saga are extremely popular. Puzzle games focus on logical and conceptual challenges. While many action games and adventure games include puzzle elements in level design, a true puzzle game focuses on puzzle solving as its primary gameplay activity. Rather than presenting a random collection of puzzles to solve, puzzle games typically offer a series of related puzzles that are a variation on a single theme. This theme could involve pattern recognition, logic, or understanding a process. These games usually have a set of rules, where players manipulate game pieces on a grid, network or other interaction space. Players must unravel clues in order to achieve some victory condition, which will then allow them to advance to the next level. Completing each puzzle will usually lead to a more difficult challenge. Breakout clone game Breakout clone (also known as block-breaking or ball-and-paddle) is an sub-class of the puzzle genre. The genre is named for the dynamics of the player-controlled block (called an "bat" or "paddle") upon which the game is based on that hits a ball towards different objects such as colored tiles, special tiles and indestructible tiles (called an "brick"). The term "brick buster" was coined in the early 2000s, mostly refers to more modern games and early example is Arkanoid developed by Taito in 1986. Logical game Logical puzzle games exhibit logic and mechanisms that are consistent throughout the entire game. Solving them typically requires deductive reasoning skills. Physics game A physics game is a type of logical puzzle video game where the player must use the game's physics and environment to complete each puzzle. Physics games use consistent physics to make games more challenging. The genre is especially popular in online flash games and mobile games. Educators have used these games to demonstrate principles of physics. Popular physics-based logic puzzle games include Portal, The Talos Principle, The Witness, Braid, Fez, World of Goo, and Cut the Rope. These also include projectile collision games such as Angry Birds, Peggle, Monster Strike, and Crush the Castle. Coding game These are logical puzzle games that require programming elements. Examples include The Incredible Machine, SpaceChem, and Infinifactory. Trial-and-error / exploration This sub-genre includes point-and-click games that often exhibit similarities with adventure games and walking simulators. Unlike logical puzzle games, these games generally require inductive reasoning to solve. The defining trait is that the player must experiment with mechanisms in each level before they can solve them. Puzzle elements often do not have consistency throughout the game, and thus require guessing and checking, and exploration to reveal more of the puzzle. These include Myst, Limbo, The Dig, Monument Valley, and escape room games such as The Room. Hidden object game A hidden object game (sometimes called hidden picture or hidden object puzzle adventure (HOPA)) is a genre of puzzle video game in which the player must find items from a list that are hidden within a scene. Hidden object games are a popular trend in casual gaming, and are comparatively inexpensive to buy. Mystery Case Files: Huntsville, released by Big Fish Games in 2005, is considered the first modern hidden objects game, coming at the rise of casual gaming in the mid-2000s. Reveal the picture game A reveal the picture game is a type of puzzle game that features piece-by-piece revealing of a photo or picture. Tile-matching game In tile-matching video games, the player manipulates tiles in order to make them disappear according to a matching criterion. The genre began with 1985's Chain Shot! and has similarities to "falling block" games such as Tetris. This genre includes games that require pieces to be swapped such as Bejeweled or Candy Crush Saga, games that adapt the classic tile-based game Mahjong such as Mahjong Trails, and games in which pieces are shot on the board such as Zuma. Puzzle games based on Tetris include In many recent tile-matching games, the matching criterion is to place a given number of tiles of the same type so that they adjoin each other. That number is often three, and the corresponding subset of tile-matching games is referred to as "match-three games." Other examples include Threes and Lumines. Traditional puzzle game There have also been many digital adaptations of traditional puzzle games, including solitaire and mahjong solitaire. Even familiar word puzzles, number puzzles, and association puzzles have been adapted as games such as Dr. Kawashima's Brain Training. Role-playing Role-playing video games draw their gameplay from traditional tabletop role-playing games like Dungeons & Dragons. Most of these games cast the player in the role of a character that grows in strength and experience over the course of the game. By overcoming difficult challenges and/or defeating monsters, the player gains experience points which represent the character's progress in a chosen profession or class (such as melee combat or ranged magic spells) and allow the player to gain new abilities once a set amount are obtained. Many RPGs contain an open world known as an overworld, which is usually populated with monsters, that allows access to more important game locations, such as towns, dungeons, and castles. Since the emergence of affordable home computers coincided with the popularity of paper and pencil role-playing games, this genre was one of the first in video games and continues to be popular today. Gameplay elements strongly associated with RPG, such as statistical character development through the acquisition of experience points, have been widely adapted to other genres such as action-adventure games. Though nearly all of the early entries in the genre were turn-based games, many modern role-playing games progress in real-time. Thus, the genre has followed the strategy game's trend of moving from turn-based to real-time combat. The move to real-time combat began with the release of Square's (now Square Enix's) Final Fantasy IV, the first game to use the Active Time Battle system; this was quickly followed by truly real-time action role-playing games such as the Mana series, Soul Blazer and Ultima VII. Although older turn-based system still exist, such as the Golden Sun series for Game Boy Advance as well as Pokémon. Action RPG The action role-playing game or action RPG is a type of role-playing video game which incorporates real-time combat as opposed to turn-based or menu-based, often borrowing elements from action games or action-adventure games. Some of the first action role-playing games were produced by Nihon Falcom in the 1980s, such as the Dragon Slayer series and Ys series. Later so-called "Diablo clones" are also part of this genre. Although the precise definition of the genre varies, the typical action RPG features a heavy emphasis on combat, often simplifying or removing non-combat attributes and statistics and the effect they have on the character's development. Additionally, combat always takes place using a real-time system (hence the "action") that relies on the player's ability to perform particular actions with speed and accuracy to determine success, rather than mainly using the player character's attributes to determine this. MMORPG Massively multiplayer online role-playing games, or MMORPG, emerged in the mid to late 1990s as a commercial, graphical variant of text-based MUDs, which had existed since 1978. By and large, MMORPG feature the usual RPG objectives of completing quests and strengthening one's player character, but involve up to hundreds of players interacting with each other on the same persistent world in real-time. The massively multiplayer concept was quickly combined with other genres. Fantasy MMORPG, like Final Fantasy XI, The Lord of the Rings Online: Shadows of Angmar, and The Elder Scrolls Online, remain the most popular type of MMOG, with the most popular "pay-to-play" game being World of Warcraft, and the most popular "free-to-play" games including RuneScape and TERA, yet other types of MMORPG are appearing. Sci-fi MMORPG like Phantasy Star Online hold a smaller part of the market, with the popular space sci-fi game EVE Online being the most notable. Other massively multiplayer online games which do not have a conventional RPG setting include Second Life and Ingress. Roguelikes The roguelike video game subgenre borrows its name and gameplay elements from the 1980 computer game Rogue. Superficially, a roguelike is a two-dimensional dungeon crawl with a high degree of randomness via procedural generation, an emphasis on statistical character development, and the use of permadeath. Though traditionally featuring a text user interface, many such games utilize graphic tiles to overcome character set limitations. Newer games that move away from traditional hack-and-slash elements but otherwise keeping procedural generation and permadeath features are sometimes called "rogue-lites". Tactical RPG The tactical role-playing game subgenre principally refers to games which incorporate gameplay from strategy games as an alternative to traditional RPG systems. Like standard RPG, the player controls a finite party and battles a similar number of enemies, but this genre incorporates strategic gameplay such as tactical movement on an isometric grid. The genre has its origins in tabletop role-playing games, where each player has time to decide his or her characters' actions. Sandbox RPG Sandbox RPG or Open World RPG allow the player a large amount of freedom and usually contain a somewhat more open free-roaming (meaning the player is not confined to a single path restricted by rocks or fences etc.) world. Sandbox RPGs contain similarities to other sandbox games such as the Grand Theft Auto series, with a large number of interactable non-player characters, large amount of content and typically some of the largest worlds to explore and longest playtimes of all RPG due to an impressive amount of secondary content not critical to the game's main storyline. Sandbox RPG often attempt to emulate an entire region of their setting. Popular examples of this subgenre include the Dragon Slayer series by Nihon Falcom, the early Dragon Quest games by Chunsoft, Zelda II by Nintendo, Wasteland by Interplay Entertainment, the SaGa and Mana series by Squaresoft, System Shock 2 by Irrational Games and Looking Glass Studios, Deus Ex by Ion Storm, The Elder Scrolls and Fallout series by Bethesda Softworks and Interplay Entertainment, Fable by Lionhead Studios, the Gothic series by Piranha Bytes, and the Xenoblade Chronicles series by Monolith Soft. First-person party-based RPG Also known as DRPG (Dungeon RPG), this subgenre consists of RPGs where the player leads a party of adventurers in first-person perspective through a dungeon or labyrinth, typically in a grid-based environment. Examples include the aforementioned Wizardry, Might and Magic and Bard's Tale series; as well as the Etrian Odyssey and Elminage series. Games of this type are also known as "blobbers", since the player moves the entire party around the playing field as a single unit, or "blob". Most "blobbers" are turn-based, but some titles such as the Dungeon Master, Legend of Grimrock, and Eye of the Beholder series are played in real-time. Early games in this genre lack an automap feature, forcing players to draw their own maps in order to keep track of their progress. Environmental and spatial puzzles are common, meaning players may have to, for instance, move a stone in one part of the level in order to open a gate in another part of the level. JRPG Japanese role-playing games tend to have a more linear story and a set cast of characters. They generally have a large number of enemy encounters and may require grinding in order to progress further into the game. Examples of this genre include Chrono Trigger and Final Fantasy VII. Monster Tamer A variant of the RPG formula where the player recruits monsters to fight for or alongside them. Collected creatures can often be raised or bred to create stronger monsters or to increase their abilities in battle. An example of a monster tamer games is Pokémon. Simulation Simulation video games is a diverse super-category of games, generally designed to closely simulate aspects of a real or fictional reality. Construction and management simulation Construction and management simulations (or CMS) are a type of simulation game which task players to build, expand or manage fictional communities or projects with limited resources. In city-building games the player acts as overall planner or leader to meet the needs and wants of game characters by initiating structures for food, shelter, health, spiritual care, economic growth, etc. Success is achieved when the city budget makes a growing profit and citizens experience an upgraded lifestyle in housing, health, and goods. While military development is often included, the emphasis is on economic strength. Perhaps the most known game of this type is SimCity, which is still popular and has had great influence on later city-building games. SimCity, however, also belongs to the God Games genre since it gives the player god-like abilities in manipulating the world. Caesar was a long-running series in this genre, with the original game spawning three sequels. Business simulation games generally attempt to simulate an economy or business, with the player controlling the economy of the game. A government simulation game (or "political game") involves the simulation of the policies, government or politics of a country, but typically excludes warfare. Recently, these types of games have gained the moniker "serious game". Life simulation Life simulation games (or artificial life games) involve living or controlling one or more artificial lives. A life simulation game can revolve around individuals and relationships, or it could be a simulation of an ecosystem. Biological simulations may allow the player to experiment with genetics, survival or ecosystems, often in the form of an educational package. An early example is SimLife, while relatively recent ones are Jurassic Park: Operation Genesis and Spore. In other educational simulations such as Wolf, the player "lives the life" of an individual animal in a relatively realistic way. Hailed as one of the greatest life simulation games, however, is Creatures, Creatures 2, Creatures 3, where the player breeds generations of a species in a hugely detailed ecosystem. Unlike other genres of games, god games often do not have a set goal that allows a player to win the game. The focus of a god game tends to be control over the lives of people, anywhere from micromanaging a family to overseeing the rise of a civilization. Pet-raising simulations (or digital pets) focus more on the relationship between the player and one or few life forms. They are often more limited in scope than other biological simulations. This includes popular examples of virtual pets such as Tamagotchi, the Petz series, and Nintendogs. Social simulation games base their gameplay on the social interaction between multiple artificial lives. The most famous example from this genre is Will Wright's The Sims. Dating sims and Romance simulation games fall under this category. Vehicle simulation Vehicle simulation games are a genre of video games which attempt to provide the player with a realistic interpretation of operating various kinds of vehicles. Flight simulation tasks the player with flying an aircraft, usually an airplane, as realistically as possible. Combat flight simulators are the most popular subgenre of simulation. The player controls the plane, not only simulating the act of flying, but also combat situations. There are also civilian flight simulators that do not have the combat aspect. Racing games typically place the player in the driver's seat of a high-performance vehicle and require the player to race against other drivers or sometimes just time. This genre of games is one of the staples of the computer gaming world and many of the earliest computer games created were part of this genre. Emerging in the late 1970s, this genre is still very popular today and continues to push the envelope in terms of graphics and performance. These games "tend to fall into organized racing and imaginary racing categories". Organized racing simulators attempt to "reproduce the experience of driving a racing car or motorcycle in an existing racing class: Indycar, NASCAR, Formula 1, and so on." On the other hand, imaginary racing games involve "imaginary situations, driving madly through cities or the countryside or even fantasy environments". These "imaginary" racing games are sometimes called arcade racing games, in contrast to their more realistic "racing simulation" counterparts. These include Need For Speed, Mario Kart and Gran Turismo. Rollings and Adams note that "racing games are often sold in the sports category," but "from a design standpoint, they really belong in ... vehicle simulations". Space flight simulator games are a subgenre that involve piloting a spacecraft. Space simulators are different from other subgenres, and are not generally considered to be simulators, as their simulated objects do not always exist and often disregard the laws of physics. Train simulators simulate the vehicles, environments and often economics associated with railway transport. These are frequently historical in nature, reminiscing on the evolution and emergence of the railroad in various countries and the economic booms that often accompanied them. Vehicular combat or car combat games focus on fast-paced action, as the player operates a car or other vehicle and attempts to disable or destroy CPU or human opponents. Vehicular combat games often allow a player to choose from a variety of potential vehicles, each with their own strengths and weaknesses. Vehicular combat was born out of racing/shooter combinations like Spy Hunter, RoadBlasters, and Rock 'N' Roll Racing, but differs in that the players can, if desired, take their vehicles off predefined routes and do battle wherever they please. A subgenre of vehicular combat is Mecha combat, where vehicles generally include giant robot-like tanks. Strategy Strategy video games focus on gameplay requiring careful and skillful thinking and planning in order to achieve victory and the action scales from world domination to squad-based tactics. “In most strategy video games,” says Andrew Rollings, "the player is given a godlike view of the game world, indirectly controlling the units under his command." Rollings also notes that "The origin of strategy games is rooted in their close cousins, board games." Strategy video games generally take one of four archetypal forms, depending on whether the game is turn-based or real-time and whether the game's focus is upon strategy or tactics. Real time strategy games are often a multiple unit selection game (multiple game characters can be selected at once to perform different tasks, as opposed to only selecting one character at a time) with a sky view (view looking down from above) but some recent games such as Tom Clancy's EndWar, are single unit selection and third person view. Like many RPG games, many strategy games are gradually moving away from turn-based systems to more real-time systems. 4X game 4X refers to a genre of strategy video game with four primary goals: eXplore, eXpand, eXploit, and eXterminate. A 4X game can be turn-based or real-time. Perhaps the best known example of this genre is Sid Meier's Civilization series. 4X games often cover a very large period of time, giving the player the control of an entire civilization or species. Typically these games have a historical setting, encompassing a large amount of human history (Empire Earth, Civilization, Golden Age of Civilizations) or a science fiction setting where the player controls a species set to dominate the galaxy (Master of Orion, Galactic Civilizations). Artillery game Artillery is the generic name for early two or three-player (usually turn-based) computer games involving tanks fighting each other in combat or similar derivative games. Artillery games were among the earliest computer games developed and can be considered an extension of the original use of computers, which were once used for military-based calculations such as plotting the trajectories of rockets. Artillery games are considered a type of turn-based tactics game, though they have also been described as a type of "shooting game." Examples of this genre are Pocket Tanks, Hogs of War, Scorched 3D and the Worms series. Auto battler (Auto chess) Auto battler, also known as "auto chess", is a type of strategy game that features chess-like elements where players place characters on a grid-shaped battlefield during a preparation phase, who then fight the opposing team's characters without any further direct input from the player. It was created and popularized by Dota Auto Chess in early 2019, and saw more games in the genre by other studios, such as Teamfight Tactics, Dota Underlords, and Hearthstone Battlegrounds releasing soon after. Multiplayer online battle arena (MOBA) Multiplayer online battle arena (MOBA) is a genre of strategy video games in which each player controls a single character with a set of unique abilities that improve over the course of a game and which contribute to the team's overall strategy. Players work together as a team to achieve a victory condition which is to destroy the opposing team's main structure whilst protecting their own. Player characters, typically called "heroes" or "champions", are assisted by computer-controlled units that periodically spawn in groups and march forward along set paths (called "lanes") toward their enemy's base. Defensive structures, which are usually automatic "towers", are in place to prevent this. The first team to destroy the opponents' main structure wins the match. The genre is seen as a fusion of real-time strategy games, role-playing games, and action games, however, players usually do not construct either buildings or units. This type of multiplayer online video games gained popularity in early 2010s, with Defense of the Ancients mod for Warcraft III, League of Legends, Dota 2, Heroes of the Storm, Mobile Legends: Bang Bang, and Smite being popular. MOBA games are well-represented in esports as well. In 2018, prize pools reached over US$60 million, 40% of the year's total esports prize pools. Real-time strategy (RTS) The moniker "real-time strategy" (RTS), usually applied only to certain computer strategy games, (however, this genre is probably the most well known of strategy games and is what most websites mean when they say "strategy games") indicates that the action in the game is continuous, and players will have to make their decisions and actions within the backdrop of a constantly changing game state. Real-time strategy gameplay is characterised by obtaining resources, building bases, researching technologies and producing units. Blizzard Entertainment's Starcraft is a popular RTS played competitively in South Korea and televised to large audiences. Other notable games include the Warcraft series, Age of Empires series, Dawn of War, Company of Heroes, Command and Conquer, and Dune II (essentially the first RTS game). Outside of PCs, very few strategy games are real-time; a few examples are Battle for Middle-earth II, Pikmin and Halo Wars. Even fewer ones use physical pieces, such as Icehouse. Real-time tactics (RTT) Real-time tactics (abbreviated RTT and less commonly referred to as "fixed-unit real-time strategy") is a subgenre of tactical wargames played in real-time simulating the considerations and circumstances of operational warfare and military tactics. It is also sometimes considered a subgenre of real-time strategy, and thus may in this context exist as an element of gameplay or as a basis for the whole game. It is differentiated from real-time strategy gameplay by the lack of resource micromanagement and base or unit building, as well as the greater importance of individual units and a focus on complex battlefield tactics. Example titles include Warhammer: Dark Omen, World In Conflict, the Close Combat series, and early tactical role-playing games such as Bokosuka Wars, Silver Ghost, and First Queen. Tower defense Tower defense games have a very simple layout. Usually, computer-controlled monsters move along a set path, and the player must place, or "build" towers along this path to kill the enemies. In some games, towers are placed along a set path for the enemies, while in others towers can interrupt enemy movement and change their path. In most tower defense games different towers have different abilities such as poisoning enemies or slowing them down. The player is awarded money for killing enemies, and this money can be used to buy more towers, or buy upgrades for a tower such as increased power or range. Turn-based strategy (TBS) The term turn-based strategy (TBS) is usually reserved for certain computer strategy games, to distinguish them from real-time strategy games. A player of a turn-based game is allowed a period of analysis before committing to a game action, and some games allow a certain number of moves or actions to take place in a turn. Like real-time strategy games, this genre can include many strategy games which are not solely turn-based games, and games which may contain other features not related to whether the game is turn-based or not. Examples of this genre are the Civilization, Heroes of Might and Magic, Making History, and Master of Orion. Some recent turn-based strategy games feature a different gameplay mechanic, with a simultaneous resolution of the turns, every player preparing their future actions in the planning phase, then letting the game follow the orders given at the same time, causing orders to be interrupted by the opponents actions, changing the gameplay from reacting to the opponent's action into guessing them. Turn-based tactics (TBT) The gameplay of turn-based tactics games (TBT) is characterized by the expectation of players to complete their tasks using the combat forces provided to them, and usually by the provision of a realistic (or at least believable) representation of military tactics and operations. Examples of this genre include the Wars, Jagged Alliance and X-COM series, as well as tactical role-playing games such as the Fire Emblem and Final Fantasy Tactics. Wargame Wargames are a subgenre of strategy video games that emphasize strategic or tactical warfare on a map. Wargames generally take one of four archetypal forms, depending on whether the game is turn-based or real-time and whether the game's focus is upon military strategy or tactics. Grand strategy wargame A grand strategy wargame is a wargame that places focus on grand strategy: military strategy at the level of movement and use of an entire nation state or empire's resources. Sports Sports are video games that simulate sports. The opposing team(s) can be controlled by other real life people or artificial intelligence. Racing There are different types of racing games that the player competes against time or opponents using some means of transportation. Sub-genres include racing simulators (Gran Turismo) and kart racing (Mario Kart). Other racing simulator series like Forza are one of the most popular game in this category, but arcade classics like Pole Position are included here too. Sports game Sports games emulate the playing of traditional physical sports. Some emphasize actually playing the sport, while others emphasize the strategy behind the sport (such as Championship Manager). Others satirize the sport for comic effect (such as Arch Rivals). One of the best selling series in this genre is the FIFA series. This genre emerged early in the history of video games (e.g., Pong) and remains popular today. Other games, like NBA Jam, satirize the genre, while others like the Madden NFL (series) and NBA 2K (series) are looking forward to recreate the realism and capture the feeling of playing a live sport. Competitive Competitive games are those that have a high competitive factor but do not represent traditional sports, such as games in which the concept is fictional and designed by the developer (e.g. Ball Jacks and Rocket League). Sports-based fighting Sports-based fighting games are titles that fall firmly within the definitions of both the Fighting game and Sports game genre, such as boxing and wrestling video games. As such, they are usually put in their own separate subgenres. Often the fighting is far more realistic than in traditional fighting games (though the amount of realism can greatly vary), and many feature real-world franchises or fighters. Examples of this include the Fight Night, UFC and WWE 2K series. MMO A massively multiplayer online game (also called MMO and MMOG) is a multiplayer online video game which is capable of supporting large numbers of players simultaneously. By necessity, they are played on the Internet. Many games have at least one persistent world, however others just have large numbers of players competing at once in one form or another without any lasting effect to the world at all. These games can be found for most network-capable platforms, including the personal computer, video game console, or smartphones and other mobile devices. An example is the widely played game Minecraft which can be played both as an MMO or a single player game. MMO games can enable players to cooperate and compete with each other on a large scale, and sometimes to interact meaningfully with people around the world. They include a variety of gameplay types, representing many video game genres, such as MMORPG, MMOFPS, MMORTS, MMOTBS and MMO simulation games. Other notable genres Board game or card game Many popular board games and card games have computer versions. AI opponents can help improver one's skill at traditional games. Chess, Checkers, Othello (also known as Reversi), and Backgammon have world class computer programs. Mahjong and related games are immensely popular in China and Japan. Go is popular in East Asia, though it is notoriously difficult to program a computer to play Go well. Casino game There are three general categories of casino games: gaming machines, table games, and random number games. Gaming machines, such as the slot machine and pachinko, are usually played by one player at a time and do not require the involvement of players to play. Tables games, such as blackjack or craps, involve one or more players who are competing against the house (the casino itself) rather than each other. Random number games may be played at a table or through the purchase of paper tickets or cards, such as keno or bingo. Casual games Casual games are designed to be easily picked up and put down again, allowing for potentially short bursts of play, such as Call of Duty and most games on a mobile platform. This genre of gaming is meant to be a short and relaxing pastime, a rest in between other occupations and so is most popular with demographics who have less free time. For this reason the games often have auto-saving and syncing as standard so the games can be minimised, put into sleep or otherwise put down with no loss to the player. Market leaders in this genre are often boldly coloured, designed for intuitive interaction and have a high balance of reward to time to keep people coming back. Designers of these games should add a lot of "juice" (sound and motion elements that excite the senses) to make them stand out in a sea of highly similar games. Due to the aforementioned requirements, many of these games are quite simple to pick up and play without lengthy tutorials. Retaining players involves a lot of careful design of levels, challenges and events. Digital collectible card game A digital collectible card game (DCCG) is a computer or video game usually played online that emulates collectible card games (CCG), or in many cases, doesn't use card-like images at all, but instead icons, avatars or other symbols to represent game pieces. Originally, DCCGs started out as replications of a CCG's physical counterpart such as Magic: The Gathering, but many DCCGs have foregone a physical version and exclusively release as a video game, such as with Hearthstone. Gacha game Gacha games are video games that implement the gacha (toy vending machine) mechanic. Similar to loot boxes, gacha games induce players to spend in-game currency to receive a random virtual item. Most of these games are free-to-play mobile games, where the gacha serves as an incentive to spend real-world money. Horror game Horror games are games that incorporate elements of horror fiction into their narrative, generally irrespective of the type of gameplay. It is the only major video game genre that is recognized by narrative elements rather than by gameplay, gameplay mode, or platform. Survival horror is a subgenre of horror games focused on action-adventure style of gameplay. Idle game In an IGN article, Cookie Clicker is credited as one of the few games to have played a major role in the establishment of the genre of idle gaming. This genre involves games that orient the player with a trivial task, such as clicking a cookie; and as the game progresses, the player is gradually rewarded certain upgrades for completing said task. In all, these games require very little involvement from the player, and in most cases they play themselves; hence the use of the word "idle". In early 2014, Orteil released an early version of Idle Game Maker, a tool allowing customized idle games to be made without coding knowledge. Logic game Logic games require the player to solve logic puzzles or navigate complex locations such as mazes. They are well suited to casual play, and tile-matching puzzle games are among the most popular casual games. This genre frequently crosses over with adventure and educational games. Tetris, labeled a puzzle game, is credited for revolutionizing gaming and popularizing the puzzle genre. Party game Party games are video games developed specifically for multiplayer games between many players. Normally, party games have a variety of mini-games that range between collecting more of a certain item than other players or having the fastest time at something. Such games include the Mario Party series, Crash Bash, and Rayman Raving Rabbids. Versus multiplayer games are not generally considered to be party games. Photography game A photography game tasks players with taking photos using the in-game camera system, typically awarding more points for better composed images. Photography mechanics are often implemented as sidequests in games in other genres, but there are also games where photography is the main gameplay mode. These include Pokémon Snap, Afrika and the Fatal Frame series. Programming game A programming game is a computer game where the player has no direct influence on the course of the game. Instead, a computer program or script is written in some domain-specific programming language in order to control the actions of the characters (usually robots, tanks or bacteria, which seek to destroy each other). In SpaceChem, for example, players design circuits used for creating molecules from raw materials. Final Fantasy XII also includes some elements of a programming game, as the player creates the AI of his characters, although the player can also choose to directly control the action. Social deduction game A social deduction game is a game in which players attempt to uncover each other's hidden role or team allegiance. During gameplay, players can use logic and deductive reasoning to try to deduce one another's roles, while other players can bluff to keep players from suspecting them. A notable example of the social deduction video game is Among Us, which received a massive influx of popularity in 2020 due to many well-known Twitch streamers and YouTubers playing it. Trivia game Trivia games are growing in popularity, especially on mobile phones where people may only have a few minutes to play the game. In trivia games, the object is to answer questions with the goal of obtaining points. They may be based on real-life trivia game shows such as Are You Smarter than a 5th Grader? or Family Feud. Typing game A typing game is any game that uses typing as the main method of interaction. While they initially started as a type of educational game, they later became more entertainment focused as indie developers explored possibilities within the genre. Video game genres by purpose While most video games are designed as entertainment, many video games are designed with additional purposes. These purposes are as varied as the nature of information itself—to inform, persuade, or stimulate. These games can have any kind of gameplay, from puzzles to action to adventure. Advergame Advergames, in the context of video game genres, refers to promotional software specifically made to advertise a product, organization or viewpoint. The first advergames were distributed on floppy disk by the Chef Boyardee, Coca-Cola, and Samsung brands, while the first cereal box advergame was Chex Quest in 1996. The majority of advergames are found online and mostly include simple and cheaply made Flash games. Some advergames were released to consoles, like Pepsiman for Sony PlayStation. Art game Art games are designed so as to emphasize art or whose structures are intended to produce some kind of non-ludological reaction in its audience. Art games typically go out of their way to have a unique, unconventional look, often standing out for aesthetic beauty or complexity in design. This concept extends to the realm of modified ("modded") gaming when modifications have been made to existing non-art-games to produce graphic results intended to be viewed as an artistic display, as opposed to modifications intended to change game play scenarios or for storytelling. Modified games created for artistic purposes are sometimes referred to as "videogame art." Casual game Casual games have very simple rules or play techniques and a very low degree of strategy. They also require no long-term time commitment or special skills to play, making them easy to learn and play as a pastime. There are comparatively low production and distribution costs for the producer. Casual games typically are played on a personal computer online in web browsers, although they now are starting to become popular on game consoles. The purpose of the casual game is to entertain, but with a much lower commitment than other video games. Christian game Christian games attempt to provide the dual purposes of spreading the Christian religion to non-believers through the medium of video games, and providing gamers who identify as Christian with a common pool of games. Christian video games were first developed by Wisdom Tree for the NES, without license. While largely regarded as derivative titles by the mainstream gaming culture, Christian games have nevertheless expanded in distribution since their inception. Educational game Educational games, as the name implies, attempt to teach the user using the game as a vehicle. Most of these types of games target young users from the ages of about three years to mid-teens; past the mid-teens, subjects become so complex (e.g. Calculus) that teaching via a game is impractical. Numerous subgenres exist, in fields such as math or typing. Esports Esports games are multiplayer games that are usually played competitively at the professional level. These games are often targeted at the "hardcore" gaming audience, and are usually first-person shooter games, requiring twitch-based reaction speed and coordination, or real-time strategy games, requiring high levels of strategic macro- and micromanagement, or MOBAs, requiring both. Exergame An exergame (portmanteau of "exercise" and "game") is a video game that provides exercise. "Exergames" sub-divide into two main implementations, those with a game specifically designed to use an exercise input device (for example, the game Wii Fit using the Wii Balance Board) and those implementations using a genre of a game. Games fit into the category of entertainment, and similarly "exergames" are a category of "exertainment" (formed from "exercise" and "entertainment"). "Exertainment" refers to one aspect of adding entertainment to an exercise workout. Personalized game Personalized games are created for one specific player or a group of players usually as a gift. They are hand-made to feature real names, places and events from the recipient's life. Usual occasions for such games are birthdays, anniversaries, and engagement proposals. Serious game Serious games are intended to educate or train the player. These games tend to promote "education, science, social change, health care or even the military." Some of these games have no specific ending or goal in the game. Rather, the player learns a real life lesson from the game. For example, games from websites such as Newsgaming.com and gamesforchange.org raise political issues using the distinct properties of games. Sandbox / open world games Sandbox and open-world games are not specifically video game genres, as they generally describe gameplay features, but often games will be described as a sandbox or an open-world game as if it were a defining genre. They are included here for such distinguishing purposes. Sandbox A sandbox game is a video game with a gameplay element that gives the player a great degree of creativity to complete tasks towards a goal within the game, if such a goal exists. Some games exist as pure sandbox games with no objectives; these are also known as non-games or software toys. More commonly, sandbox games results from these creative elements being incorporated into other genres and allowing for emergent gameplay. Sandbox games are often associated with open world concepts which gives the player freedom of movement and progression in the game's world. The "sandbox" term derives from the nature of a sandbox that lets children create nearly anything they want within it. Early sandbox games came out of space trading and combat games like Elite (1984) and city-building simulations and tycoon games like SimCity (1989). The releases of The Sims and Grand Theft Auto III in 2000 and 2001, respectively, demonstrated that games with highly detailed interacting systems that encouraged player experimentation could also be seen as sandbox games. Sandbox games also found ground with the ability to interact socially and share user-generated content across the Internet like Second Life (2003). Minecraft (2011) is one of the most successful examples of a sandbox game, with players able to enjoy in both creative modes and through more goal-driven survival modes. Creative Creative games are games that are often grounded into other genres but have certain modes of gameplay that allow for a Sandbox and/or Openworld Gameplay, It is extremely common for a "Creative" Game mode to use the same aspects, assets, mechanics, etc. of the Parent Game. However, this isn't always the case as some games have used assets unavailable in the normal Game. Story/Narrative is often removed or non-existent in these modes. However, while generally rare, creative modes have been seen to have an independent story from the main game or even be an entirely independent game. Open world In video games, an open world is a game mechanic of using a virtual world that the player can explore and approach objectives freely, as opposed to a world with more linear and structured gameplay. While games have used open-world designs since the 1980s, the implementation in Grand Theft Auto III (2001) set a standard that has been used since. Games with open or free-roaming worlds typically lack level structures like walls and locked doors, or the invisible walls in more open areas that prevent the player from venturing beyond them; only at the bounds of an open-world game will players be limited by geographic features like vast oceans or impassible mountains. Players typically do not encounter loading screens common in linear level designs when moving about the game world, with the open-world game using strategic storage and memory techniques to load the game world in a dynamic and seamless manner. Open-world games still enforce many restrictions in the game environment, either because of absolute technical limitations or in-game limitations imposed by a game's linearity. While the openness of the game world is an important facet to games featuring open worlds, the main draw of open-world games is about providing the player with autonomy – not so much the freedom to do anything they want in the game (which is nearly impossible with current computing technology), but the ability to choose how to approach the game and its challenges in the order and manner as the player desires while still constrained by gameplay rules. Examples of high level of autonomy in computer games can be found in massively multiplayer online role-playing games (MMORPG) or in single-player games adhering to the open-world concept such as the Fallout series. The main appeal of open-world gameplay is that they provide a simulated reality and allow players to develop their character and its behaviour in the direction and the pace of their own choosing. In these cases, there is often no concrete goal or end to the game, although there may be the main storyline, such as with games like The Elder Scrolls V: Skyrim. Scientific studies As video games are increasingly the subject of scientific studies, game genres are themselves becoming a subject of study. An early attempt at analysis of the action and adventure genres appeared in a Game Developers Conference 2000 paper 'Mostly Armless: Grabbing the 3D World'. This critiqued a variety of adventure and action games to categorize gameplay and interaction for adventure, action, and hybrid genres. It provided a graph of the genres along the axes of 'immediacy' vs 'complexity', with an 'ideal-zone' for gameplay that covered and linked adventure and action games. It detailed various interaction styles present in these genres and extrapolated to future user interface and gameplay possibilities for these and other genres. Some of these have since been adopted by persistent worlds. For example, Second Life uses some of the gameplay investment and interface elements described in section 4 of the paper. In a University of Queensland study, game enjoyment was correlated with attributes such as immersion, social interaction, and the nature of the goals. These may be underlying factors in differentiating game genres. Statistical scaling techniques were used in a study presented at the 2007 Siggraph Video Game Symposium to convert subject ratings of game similarity into visual maps of game genres. The maps reproduced some of the commonly identified genres such as first-person shooters and god games. A Michigan State University study found that men have a higher preference for genres that require competition and three-dimensional navigation and manipulation than women do. See also Game interfaces Audio game Browser game Text-based game Tile-based video games Side-scrolling video game Game platforms Arcade game Console game Handheld video game Massively multiplayer online game Mobile game Online game Personal computer game Other related topics Game classification List of types of games List of gaming topics Nonviolent video game Non-game Video game Asymmetry Notes References Bibliography Genres Articles containing video clips
18935238
https://en.wikipedia.org/wiki/Content%20Scramble%20System
Content Scramble System
The Content Scramble System (CSS) is a digital rights management (DRM) and encryption system employed on many commercially produced DVD-Video discs. CSS utilizes a proprietary 40-bit stream cipher algorithm. The system was introduced around 1996 and was first compromised in 1999. CSS is one of several complementary systems designed to restrict DVD-Video access. It has been superseded by newer DRM schemes such as Content Protection for Recordable Media (CPRM), or by Advanced Encryption Standard (AES) in the Advanced Access Content System (AACS) DRM scheme used by HD DVD and Blu-ray Disc, which have 56-bit and 128-bit key sizes, respectively, providing a much higher level of security than the less secure 40-bit key size of CSS. Preliminary note The content scramble system (CSS) is a collection of proprietary protection mechanisms for DVD-Video discs. CSS attempts to restrict access to the content only for licensed applications. According to the DVD Copy Control Association (CCA), which is the consortium that grants licenses, CSS is supposed to protect the intellectual property rights of the content owner. The details of CSS are only given to licensees for a fee. The license, which binds the licensee to a non-disclosure agreement, would not permit the development of open-source software for DVD-Video playback. Instead, there is libdvdcss, a reverse engineered implementation of CSS. Libdvdcss is a source for documentation, along with the publicly available DVD-ROM and MMC specifications. There has also been some effort to collect CSS details from various sources. A DVD-Video can be produced with or without CSS. The publisher may for instance decide to go without CSS protection to save license and production costs. Introduction The content scramble system deals with three participants: the disc, the drive and the player. The disc holds the purported copyright information and the encrypted feature. The drive provides the means to read the disc. The player decrypts and presents the audio and visual content of the feature. All participants must conform to the CCA's license agreement. There are three protection methods: Playback protection is based on encryption: the player requires a secret key to decrypt the feature. Read protection is based on the drive: access to significant disc data is only granted if the player authenticates successfully. Regional restriction is based on the disc and the drive: the drive can deny access if the disc does not belong to the drive's region. The first two protection methods have been broken. Circumvention of regional protection is not possible with every drive—even if the drive grants access to the feature, prediction of title keys may fail. However, DVD players exist which do not enforce regional restrictions (the user has to disable the protection though), which makes regional restrictions less effective as a component of CSS. The disc The DVD-ROM's main-data (§16), which are consecutive logical blocks of 2048 bytes, are structured according to the DVD-Video format. The DVD-Video contains (besides others) an MPEG program stream which consists of so-called Packs. If CSS is applied to the disc then a subset of all Packs is encrypted with a title-key. A DVD-ROM contains, besides the main-data, additional data areas. CSS stores there: a flag that indicates whether CSS is applied or not (§6.23.3.2.2), the 8-bit region-management-information (region code), a disc-key-block that holds 409 encrypted variants of the disc-key (§6.23.3.2.3). CSS also uses six bytes in the frame header for each logical block of user data (§16.3,§6.29.3.1.5): one byte with copyright management information, five bytes holding an encrypted title-key. The drive The drive treats a DVD-Video disc as any DVD-ROM disc. The player reads the disc's user-data and processes them according to the DVD-Video format. However, if the drive detects a disc that has been compiled with CSS, it denies access to logical blocks that are marked as copyrighted (§6.15.3). The player has to execute an authentication handshake first (§4.10.2.2). The authentication handshake is also used to retrieve the disc-key-block and the title-keys. The drive may also support Regional Playback Control (RPC) to limit the playback of DVD-Video content to specific regions of the world (§3.3.26). RPC Phase II drives hold an 8-bit region-code and adhere to all requirements of the CSS license agreement (§6.29.3.1.7). It appears that RPC Phase II drives reject title-key requests on region mismatch. However, reading of user-data may still work. The cipher CSS employs a stream cipher and mangles the keystream with the plain-text data to produce the cipher text. The stream cipher is based on two linear-feedback shift register (LFSR) and set up with a 40-bit seed. Mangling depends on the type of operation. There are three types: the decryption of a disc- or title-key, the decryption of a Pack and the encryption of keys for the authentication handshake. In order to decrypt a DVD-Video, the player reads the disc-key-block and uses its player-key to decrypt the disc-key. Thereafter, the player reads the title-keys and decrypts them with the disc-key. A different title-key can be assigned for the Video Manager and for each Video Title Set. The title-keys are used to decrypt the encrypted Packs. Cryptanalysis CSS employs cryptographic keys with a size of only 40 bits. This makes CSS vulnerable to a brute-force attack. At the time CSS was introduced, it was forbidden in the United States for manufacturers to export cryptographic systems employing keys in excess of 40 bits, a key length that had already been shown to be wholly inadequate in the face of increasing computer processing power (see Data Encryption Standard). Based on the leaked DeCSS source-code, Frank A. Stevenson published in November 1999 three exploits that rendered the CSS cipher practically ineffective: A correlation attack enables the recovery of a keystream's seed at complexity of 216. The mangling of disc- and title-keys can be reversed at a complexity of 28. A disc-key can be recovered from its hash-value at a complexity of 225. The latter exploit recovers a disk-key from its hash-value in less than 18 seconds on a 450 MHz Intel Pentium III. The CSS design was prepared for the leak of a few player-keys. New discs would not contain an encrypted variant for these player-keys in the disc-key-block. However, Stevenson's exploits made it possible to generate all player-keys. Libdvdcss uses such a list of generated player-keys. There are cases when no title-keys are available. A drive may deny access on region mismatch but still permit reading of the encrypted DVD-Video. Ethan Hawke presented a plain-text prediction for data repetitions in the MPEG program stream that enables the recovery of title-keys in real-time directly from the encrypted DVD-Video. In Geeks Bearing Gifts, author Ted Nelson states "DVD encryption was intentionally made light by the DVD encryption committee, based on arguments in a libertarian book Computer Lib.", a claim cited as originating from personal communication with an anonymous source; Nelson is the author of Computer Lib. See also DVD Copy Control Association libdvdcss, a popular free software for enabling playback of discs on opensource players. References External links History of cryptography Compact Disc and DVD copy protection Broken stream ciphers Television technology Digital rights management standards DVD Copy Control Association
53306
https://en.wikipedia.org/wiki/Natural%20satellite
Natural satellite
A natural satellite is, in the most common usage, an astronomical body that orbits a planet, dwarf planet, or small Solar System body (or sometimes another natural satellite). Natural satellites are often colloquially referred to as moons, a derivation from the Moon of Earth. In the Solar System, there are six planetary satellite systems containing 207 known natural satellites altogether. Seven objects commonly considered dwarf planets by astronomers are also known to have natural satellites: , Pluto, Haumea, , Makemake, , and Eris. , there are 442 other minor planets known to have natural satellites. A planet usually has at least around 10,000 times the mass of any natural satellites that orbit it, with a correspondingly much larger diameter. The Earth–Moon system is a unique exception in the Solar System; at 3,474 km (2,158 miles) across, the Moon is 0.273 times the diameter of Earth and about 1/80th of its mass. The next largest ratios are the Neptune–Triton system at 0.055 (with a mass ratio of about 1 to 5000), the Saturn–Titan system at 0.044 (with the second mass ratio next to the Earth-Moon system, 1 to 4250), the Jupiter–Ganymede system at 0.038, and the Uranus–Titania system at 0.031. For the category of dwarf planets, Charon has the largest ratio, being 0.52 the diameter of Pluto. Terminology The first known natural satellite was the Moon, but it was considered a "planet" until Copernicus' introduction of De revolutionibus orbium coelestium in 1543. Until the discovery of the Galilean satellites in 1610 there was no opportunity for referring to such objects as a class. Galileo chose to refer to his discoveries as Planetæ ("planets"), but later discoverers chose other terms to distinguish them from the objects they orbited. The first to use the term satellite to describe orbiting bodies was the German astronomer Johannes Kepler in his pamphlet Narratio de Observatis a se quatuor Iouis satellitibus erronibus ("Narration About Four Satellites of Jupiter Observed") in 1610. He derived the term from the Latin word satelles, meaning "guard", "attendant", or "companion", because the satellites accompanied their primary planet in their journey through the heavens. The term satellite thus became the normal one for referring to an object orbiting a planet, as it avoided the ambiguity of "moon". In 1957, however, the launching of the artificial object Sputnik created a need for new terminology. The terms man-made satellite and artificial moon were very quickly abandoned in favor of the simpler satellite, and as a consequence, the term has become linked primarily with artificial objects flown in space – Because of this shift in meaning, the term moon, which had continued to be used in a generic sense in works of popular science and in fiction, has regained respectability and is now used interchangeably with natural satellite, even in scientific articles. When it is necessary to avoid both the ambiguity of confusion with Earth's natural satellite the Moon and the natural satellites of the other planets on the one hand, and artificial satellites on the other, the term natural satellite (using "natural" in a sense opposed to "artificial") is used. To further avoid ambiguity, the convention is to capitalize the word Moon when referring to Earth's natural satellite (a proper noun), but not when referring to other natural satellites (common nouns). Many authors define "satellite" or "natural satellite" as orbiting some planet or minor planet, synonymous with "moon" – by such a definition all natural satellites are moons, but Earth and other planets are not satellites. A few recent authors define "moon" as "a satellite of a planet or minor planet", and "planet" as "a satellite of a star" – such authors consider Earth as a "natural satellite of the Sun". Definition of a moon There is no established lower limit on what is considered a "moon". Every natural celestial body with an identified orbit around a planet of the Solar System, some as small as a kilometer across, has been considered a moon, though objects a tenth that size within Saturn's rings, which have not been directly observed, have been called moonlets. Small asteroid moons (natural satellites of asteroids), such as Dactyl, have also been called moonlets. The upper limit is also vague. Two orbiting bodies are sometimes described as a double planet rather than primary and satellite. Asteroids such as 90 Antiope are considered double asteroids, but they have not forced a clear definition of what constitutes a moon. Some authors consider the Pluto–Charon system to be a double (dwarf) planet. The most common dividing line on what is considered a moon rests upon whether the barycentre is below the surface of the larger body, though this is somewhat arbitrary, because it depends on distance as well as relative mass. Origin and orbital characteristics The natural satellites orbiting relatively close to the planet on prograde, uninclined circular orbits (regular satellites) are generally thought to have been formed out of the same collapsing region of the protoplanetary disk that created its primary. In contrast, irregular satellites (generally orbiting on distant, inclined, eccentric and/or retrograde orbits) are thought to be captured asteroids possibly further fragmented by collisions. Most of the major natural satellites of the Solar System have regular orbits, while most of the small natural satellites have irregular orbits. The Moon and possibly Charon are exceptions among large bodies in that they are thought to have originated by the collision of two large proto-planetary objects (see the giant impact hypothesis). The material that would have been placed in orbit around the central body is predicted to have reaccreted to form one or more orbiting natural satellites. As opposed to planetary-sized bodies, asteroid moons are thought to commonly form by this process. Triton is another exception; although large and in a close, circular orbit, its motion is retrograde and it is thought to be a captured dwarf planet. Temporary satellites The capture of an asteroid from a heliocentric orbit is not always permanent. According to simulations, temporary satellites should be a common phenomenon. The only observed examples are , , . was a temporary satellite of Earth for nine months in 2006 and 2007. Tidal locking Most regular moons (natural satellites following relatively close and prograde orbits with small orbital inclination and eccentricity) in the Solar System are tidally locked to their respective primaries, meaning that the same side of the natural satellite always faces its planet. This phenomenon comes about through a loss of energy due to tidal forces raised by the planet, slowing the rotation of the satellite until it is negligible. The only known exception is Saturn's natural satellite Hyperion, which rotates chaotically because of the gravitational influence of Titan. In contrast, the outer natural satellites of the giant planets (irregular satellites) are too far away to have become locked. For example, Jupiter's Himalia, Saturn's Phoebe, and Neptune's Nereid have rotation periods in the range of ten hours, whereas their orbital periods are hundreds of days. Satellites of satellites No "moons of moons" or subsatellites (natural satellites that orbit a natural satellite of a planet) are currently known. In most cases, the tidal effects of the planet would make such a system unstable. However, calculations performed after the 2008 detection of a possible ring system around Saturn's moon Rhea indicate that satellites orbiting Rhea could have stable orbits. Furthermore, the suspected rings are thought to be narrow, a phenomenon normally associated with shepherd moons. However, targeted images taken by the Cassini spacecraft failed to detect rings around Rhea. It has also been proposed that Saturn's moon Iapetus had a satellite in the past; this is one of several hypotheses that have been put forward to account for its equatorial ridge. Trojan satellites Two natural satellites are known to have small companions at both their and Lagrangian points, sixty degrees ahead and behind the body in its orbit. These companions are called trojan moons, as their orbits are analogous to the trojan asteroids of Jupiter. The trojan moons are Telesto and Calypso, which are the leading and following companions, respectively, of the Saturnian moon Tethys; and Helene and Polydeuces, the leading and following companions of the Saturnian moon Dione. Asteroid satellites The discovery of 243 Ida's natural satellite Dactyl in the early 1990s confirmed that some asteroids have natural satellites; indeed, 87 Sylvia has two. Some, such as 90 Antiope, are double asteroids with two comparably sized components. Shape Neptune's moon Proteus is the largest irregularly shaped natural satellite; the shapes of Eris' moon Dysnomia and Orcus' moon Vanth are unknown. All other known natural satellites that are at least the size of Uranus's Miranda have lapsed into rounded ellipsoids under hydrostatic equilibrium, i.e. are "round/rounded satellites". The larger natural satellites, being tidally locked, tend toward ovoid (egg-like) shapes: squat at their poles and with longer equatorial axes in the direction of their primaries (their planets) than in the direction of their motion. Saturn's moon Mimas, for example, has a major axis 9% greater than its polar axis and 5% greater than its other equatorial axis. Methone, another of Saturn's moons, is only around 3 km in diameter and visibly egg-shaped. The effect is smaller on the largest natural satellites, where their own gravity is greater relative to the effects of tidal distortion, especially those that orbit less massive planets or, as in the case of the Moon, at greater distances. Geological activity Of the nineteen known natural satellites in the Solar System that are large enough to have lapsed into hydrostatic equilibrium, several remain geologically active today. Io is the most volcanically active body in the Solar System, while Europa, Enceladus, Titan and Triton display evidence of ongoing tectonic activity and cryovolcanism. In the first three cases, the geological activity is powered by the tidal heating resulting from having eccentric orbits close to their giant-planet primaries. (This mechanism would have also operated on Triton in the past, before its orbit was circularized.) Many other natural satellites, such as Earth's Moon, Ganymede, Tethys and Miranda, show evidence of past geological activity, resulting from energy sources such as the decay of their primordial radioisotopes, greater past orbital eccentricities (due in some cases to past orbital resonances), or the differentiation or freezing of their interiors. Enceladus and Triton both have active features resembling geysers, although in the case of Triton solar heating appears to provide the energy. Titan and Triton have significant atmospheres; Titan also has hydrocarbon lakes. Also Io and Callisto have atmospheres, even if they are extremely thin. Four of the largest natural satellites, Europa, Ganymede, Callisto, and Titan, are thought to have subsurface oceans of liquid water, while smaller Enceladus may have localized subsurface liquid water. Natural satellites of the Solar System Of the objects within our Solar System known to have natural satellites, there are 76 in the asteroid belt (five with two each), four Jupiter trojans, 39 near-Earth objects (two with two satellites each), and 14 Mars-crossers. There are also 84 known natural satellites of trans-Neptunian objects. Some 150 additional small bodies have been observed within the rings of Saturn, but only a few were tracked long enough to establish orbits. Planets around other stars are likely to have satellites as well, and although numerous candidates have been detected to date, none have yet been confirmed. Of the inner planets, Mercury and Venus have no natural satellites; Earth has one large natural satellite, known as the Moon; and Mars has two tiny natural satellites, Phobos and Deimos. The giant planets have extensive systems of natural satellites, including half a dozen comparable in size to Earth's Moon: the four Galilean moons, Saturn's Titan, and Neptune's Triton. Saturn has an additional six mid-sized natural satellites massive enough to have achieved hydrostatic equilibrium, and Uranus has five. It has been suggested that some satellites may potentially harbour life. Among the objects generally agreed by astronomers to be dwarf planets, Ceres and have no known natural satellites. Pluto has the relatively large natural satellite Charon and four smaller natural satellites; Styx, Nix, Kerberos, and Hydra. Haumea has two natural satellites; , , Makemake, , and have one each. The Pluto–Charon system is unusual in that the center of mass lies in open space between the two, a characteristic sometimes associated with a double-planet system. The seven largest natural satellites in the Solar System (those bigger than 2,500 km across) are Jupiter's Galilean moons (Ganymede, Callisto, Io, and Europa), Saturn's moon Titan, Earth's moon, and Neptune's captured natural satellite Triton. Triton, the smallest of these, has more mass than all smaller natural satellites together. Similarly in the next size group of nine mid-sized natural satellites, between 1,000 km and 1,600 km across, Titania, Oberon, Rhea, Iapetus, Charon, Ariel, Umbriel, Dione, and Tethys, the smallest, Tethys, has more mass than all smaller natural satellites together. As well as the natural satellites of the various planets, there are also over 80 known natural satellites of the dwarf planets, minor planets and other small Solar System bodies. Some studies estimate that up to 15% of all trans-Neptunian objects could have satellites. The following is a comparative table classifying the natural satellites in the Solar System by diameter. The column on the right includes some notable planets, dwarf planets, asteroids, and trans-Neptunian objects for comparison. The natural satellites of the planets are named after mythological figures. These are predominantly Greek, except for the Uranian natural satellites, which are named after Shakespearean characters. The nineteen bodies massive enough to have achieved hydrostatic equilibrium are in bold in the table below. Minor planets and satellites suspected but not proven to have achieved a hydrostatic equilibrium are italicized in the table below. Visual summary History See also Moons of planets Moons of dwarf planets and small Solar System bodies References External links All moons Natural Satellite Physical Parameters (JPL-NASA, with refs – last updated July 2006) Moons of the Solar System (The Planetary Society, as of March 2009) The JPL's Solar System Dynamics page Planetary Names: Planet and Satellite Names and Discoverers "Upper size limit for moons explained" Kelly Young. Nature (vol 441, p. 834) 14 June 2006 Images of planets and major moons (not to scale) The Planetary Society – Moon Montage(s) Album of moon images by Kevin M. Gill The Atlas of Moons by the National Geographic Society Jupiter's moons Outer Satellites Discovered Around Jupiter in 2002 Scott S. Sheppard New Satellites of Jupiter Discovered in 2003 Scott S. Sheppard Saturn's moons Satellite-hunters find four new moons of the planet Saturn David Brand | 26 October 2000 Saturn's New Satellite S/2003 S1 Scott S. Sheppard
35033769
https://en.wikipedia.org/wiki/Melli%20Dara
Melli Dara
Melli Dara is a village in the South Sikkim district of the Indian State of Sikkim about from the state capital Gangtok and about north of Melli. The total area of the village is and it has a total population of 6,333 . The village comes under 12-Melli constituency of the Sikkim Legislative Assembly and under 22-Melli Dara Paiyong Gram Panchayat Unit. Cyber village Melli Dara is known for various innovative initiatives undertaken in the field of e-Governance at grassroots level. Computerization of the village administration centre, implementation of a single windows system at village level, solid waste management system, Panchayat Sandesh (Monthly news paper published by GPU), Free SMS updates for GPU activities etc. are various initiatives taken by the GPU. The GPU received 'Rashtriya Gaurav Gram Sabha Purashkar - 2011' from Government of India. Apart from this, the panchayat unit have received several state level awards. Recently 'The Information Technology person of the year' title was awarded to the President of GPU, Mr. Ganesh Kumar Rai, in Sikitex 2011. India's first cyber village has been set up at Melli Dara Paiyong in South Sikkim. Governor Shriniwas Patil on 2 October 2013 launched the cyber village project implemented by Information Technology Department, Government of Sikkim. The cyber village software at Melli Dara Paiyong Gram Panchayat Unit is web-based and allows gathering of information from grassroots level using handheld devices and integrating it with the departmental database on a real time basis. Each of the six ward panchayat is provided with the handheld devices to collect and update data of the villagers. Each resident will have his or her exclusive digital profile in the handheld device. Data generated are used for multiple purposes including police verification and monitoring of benefits provided by the government to the villagers. The data are generated and verified by the concerned ward panchayat. SMS based services have been adopted in the project wherein a registered villager can benefit without being present in the offices physically. The software has been developed with active participation of member of Melli Dara Paiyong GPU. As per the project, the Information Technology Department will be providing computer literacy to the villagers of Melli Dara Paiyong. School going children will also be educated on cyber security. "The State government has embarked on the process of taking our villages to the next stage, i.e. cyber village. This will uproot the very notion of ‘digital divide’ from Sikkim forever," says Melli Dara Paiyong GPU president D.B. Pradhan. References External links Sikkimgov.in Villages in South Sikkim district
14908208
https://en.wikipedia.org/wiki/CADES
CADES
CADES (Computer Aided Design and Evaluation System) was a software engineering system produced to support the design and development of the VME/B Operating System for the ICL New Range - subsequently 2900 - computers. From its earliest days, VME/B was developed with the aid of CADES, which was built for the purpose using an underlying IDMS database (latterly upgraded to IDMS(X)). CADES was not merely a version control system for code modules: it was intended to manage all aspects of the software lifecycle from requirements capture through to field maintenance. It was the design of CADES that paved the way for the Alvey Project in IPSE (Integrated Project Support Environments) and Process Control Engines. Because CADES was used for more than 20 years throughout the development of a large software engineering project, the data collected has been used as input to a number of studies of software evolution. Early history CADES was conceived in 1970 by David Pearson and Brian Warboys when working for ICL's New Range Operating System Technology Centre, OSTECH, in Kidsgrove. Pearson, a theoretical physicist by training, had become a computer simulation specialist and joined ICL in 1968 after working in finite-element modelling at Cambridge and simulation research at Imperial College. Warboys had been chief architect for the ICL System 4 multi-access operating system, Multijob. ICL's commitment to large scale software development for the 2900 Series of computers provided the basis for the Pearson and Warboys early work on a new software development environment which would address the issues of designer/programmer productivity, design integrity, evaluation and testing, version control and systems regression. In designing the initial architecture of the CADES environment, Pearson in particular looked to parallels with the leading hardware computer-aided design systems of the time, even attempting the use of graphics in the design process. The CADES design approach, called Structural Modelling, was rigidly data-driven and hierarchical, and expressed in a formal design language, SDL. Design specifications written in SDL were processed by the Design Analyser, before being input to the CADES Product Database, a design and implementation database supporting its own query language and forming the kernel of the Product Information System. The intention was that these designs could be evaluated/simulated using the Animator, and S3 implementation code automatically generated from them using the Environment Processor. Build generation and version control was also based on the Product Database, resulting in a highly disciplined approach to new system builds. System Regression was therefore controlled from a very early stage in the software life-cycle. Fundamentals In order to control the development of VME/B, each development was sub-divided for easier management. The structure was hierarchic, with each significant components of VME (kernel, file store, etc.)divided into sub-systems. Development activity on each sub-system created a sequence of versions. These divisions and sub-divisions of VME/B were reflected in the hierarchical structure of the CADES database. This enabled the reuse of code within VME/B (one of the goals of software engineering). This, coupled with a suite of tools, and the use of SDL (Software Design Language) as the development language, version history and the concept of source code (that is code that has passed QA and subsequently resides within CADES filestore) improved development time whilst providing satisfactory audit trails and QA processes. CADES adopted the term "holon" to refer to modules of code (such as procedures and macros). The word came from the Greek holo meaning whole, and was lifted from Arthur Koestler's book The Ghost in the Machine. Pearson always claimed that he formulated the architecture of CADES while studying Koestler's book on a beach in Tunisia. Arranged in a hierarchy, holons provide a 'family tree' (for each sub-system), utilising parent/child relationships. Holons also maintained attributes of interaction, enabling one Holon to interact with other Holons, thus enabling more modular development and facilitating reuse. In a similar fashion CADES also retained information with regard to constant values (aka literals), user-defined types and user-defined structures. Development using CADES Development under CADES was achieved using a suite of tools known as MODPRO (Module Processing) which acted as an interface (or broker) between developer and CADES. These tools enabled the developer to focus more on development that administrative, QA or SCM tasks. It was not necessary to know to manipulate data within CADES, the application generated the required DNL (Data Navigation Language) to achieve the required results. Development using MODPRO did not require specific knowledge of either S3 nor SCL (target language for subsequent compilation), but SDL, the Software Design Language: an abstraction above the former two. Which when coupled with the enhance-editor EDSDL (Edit SDL) interacted with CADES to manage development, or re-work. Then, again with information from CADES, when used with MODPRO tool EPETC (aka Environmental Processor or EP etc.) enabled the resultant file to be correctly targeted for S3 or SCL compilation. Subsequent tools within the suite facilitated various steps within development, such as: Detailed Holon information using CHED (CADES Holon Environment Details), Interaction with CADES using DIL (Database Interface Language, used to produce DNL), Report production, using CRP (CADES Report Producer), Transfer valid files/code in to or extract out of the secure repository, namely CADES, using XFER. The following illustrates the typical MODPRO development route. References Further reading Version control systems International Computers Limited Kidsgrove Science and technology in Staffordshire
1002526
https://en.wikipedia.org/wiki/Gabor%20Herman
Gabor Herman
Gabor Tamas Herman is a Hungarian-American professor of computer science. He is Emiritas Professor of Computer Science at The Graduate Center, City University of New York (CUNY) where he was Distinguished Professor until 2017. He is known for his work on computerized tomography. He is a fellow of the Institute of Electrical and Electronics Engineers (IEEE). Early life and education Herman studied mathematics at the University of London, receiving his B.Sc. in 1963 and M.Sc. in 1964. In 1966 he received his M.S. in electrical engineering from the University of California, Berkeley, and in 1968 his Ph.D. in mathematics from the University of London. Career In 1969 Herman joined the department of computer science at Buffalo State College as an assistant professor. He became an associate professor in 1970 and a full professor in 1974. In 1976 he formed the Medical Image Processing Group. In 1980 he published the first edition of Reconstruction from Projections, his textbook on computerized tomography. Herman moved the Medical Image Processing Group to the University of Pennsylvania in 1981. He was a professor in the radiology department from 1981 to 2000. In 1991 he was elected fellow of the IEEE. The citation reads: "For contributions to medical imagine, particularly in the theory and development of techniques for the reconstruction and display of computed tomographic images". In 1997 he was elected fellow of the American Institute for Medical and Biological Engineering. The citation reads: "For development implementation and evaluation of methods of reconstruction and 3D display of human organs based on transmitted or emitted radiation." In 2001 Herman joined the faculty of CUNY as Distinguished Professor in the department of computer science, holding that position until his retirement in 2017. The second edition of his computerized tomography textbook, now titled Fundamentals of Computerized Tomography, was published in 2009. Scientific Work Together with Frank Natterer, he initiated in 1980 the series of conferences on "Mathematical Methods in Tomography“ at the Mathematical Research Institute of Oberwolfach, Germany. During 1992-4 he was the Editor-in-Chief of the IEEE Transactions on Medical Imaging. In recent years he has been involved with research on the superiorization methodology. Awards and honors 1989 Honorary member – American Society of Neuroimaging 1991 Fellow - Institute of Electrical and Electronics Engineers 1996 Fellow – American Institute for Medical and Biological Engineering 2001 Hewlett Packard Visiting Research Professor, Mathematical Sciences Research Institute, Berkeley, California Bibliography His books include 3D Imaging in Medicine (CRC, 1991 and 2000), Geometry of Digital Spaces (Birkhauser, 1998), Discrete Tomography: Foundations, Algorithms and Applications (Birkhauser, 1999), Advances in Discrete Tomography and Its Applications (Birkhauser, 2007), Fundamentals of Computerized Tomography: Image Reconstruction from Projections (Springer, 2009) and Computational Methods for Three-Dimensional Microscopy Reconstruction (Birkhäuser Basel, 2014). Personal life Herman is married to artist Marilyn Kirsch. References External links Faculty website Computer programmers University at Buffalo alumni Living people Alumni of Queen Mary University of London Information visualization experts Computer graphics researchers Year of birth missing (living people)
40103751
https://en.wikipedia.org/wiki/Ontraport
Ontraport
Ontraport is a business automation software that includes CRM. Forbes named Ontraport No. 71 on its list of "America's Most Promising Companies." The company also placed No. 10 on Inc.'s "Top 100 Software Companies" and No. 26 on its "Top 100 California Companies". Ontraport has clients worldwide. History Landon Ray, Pin Chen and Steven Schneider founded Ontraport in 2006 in Santa Barbara, California. Ray, a former flower vendor who became a Wall Street trader, said he was “running another business and ran into the problems that all entrepreneurs do, and couldn’t believe there wasn’t a slick solution to solve them.” The three started the small business automation platform from a backyard yurt and released Office AutoPilot (predecessor of Ontraport) in 2008. Software and Services Ontraport is an all-in-one software for businesses. Features include CRM, automation, payments, sales pipeline, tracking, email and membership sites. Training and Education Ontraport also offers business strategy education through educational guides, conferences and certification. Ontraport Education, launched in October 2016, provides training courses, video tutorials and strategy classes, geared to small business owners and entrepreneurs. Ontraport hosts events such as ONTRApalooza (OPLZA), an annual conference for users and small business owners. References Software companies based in California Software companies of the United States
9876741
https://en.wikipedia.org/wiki/OpenSAF
OpenSAF
OpenSAF (commonly styled SAF, the Service Availability Framework) is an open-source service-orchestration system for automating computer application deployment, scaling, and management. OpenSAF is consistent with, and expands upon, Service Availability Forum (SAF) and SCOPE Alliance standards. It was originally designed by Motorola ECC, and is maintained by the OpenSAF Project. OpenSAF is the most complete implementation of the SAF AIS specifications, providing a platform for automating deployment, scaling, and operations of application services across clusters of hosts. It works across a range of virtualization tools and runs services in a cluster, often integrating with JVM, Vagrant, and/or Docker runtimes. OpenSAF originally interfaced with standard C Application Programming interfaces (APIs), but has added Java and Python bindings. OpenSAF is focused on Service Availability beyond High Availability (HA) requirements. While little formal research is published to improve high availability and fault tolerance techniques for containers and cloud, research groups are actively exploring these challenges with OpenSAF. History OpenSAF was founded by an Industry consortium, including Ericsson, HP, and Nokia Siemens Networks, and first announced by Motorola ECC, acquired by Emerson Network Power, on February 28, 2007. The OpenSAF Foundation was officially launched on January 22, 2008. Membership evolved to include Emerson Network Power, SUN Microsystems, ENEA, Wind River, Huawei, IP Infusion, Tail-f, Aricent, GoAhead Software, and Rancore Technologies. GoAhead Software joined OpenSAF in 2010 before being acquired by Oracle. OpenSAF's development and design are heavily influenced by Mission critical system requirements, including Carrier Grade Linux, SAF, ATCA and Hardware Platform Interface. OpenSAF was a milestone in accelerating adoption of Linux in Telecommunications and embedded systems. The goal of the Foundation was to accelerate the adoption of OpenSAF in commercial products. The OpenSAF community held conferences between 2008-2010; the first conference hosted by Nokia Siemens Networks in Munich (Germany), second hosted by Huawei in Shenzhen (China), and third hosted by HP in Palo Alto (USA). In February 2010, the first commercial deployment of OpenSAF in carrier networks was announced. Academic and industry groups have independently published books describing OpenSAF-based solutions. A growing body of research in service availability is accelerating the development of OpenSAF features supporting mission-critical cloud and microservices deployments, and service orchestration. OpenSAF 1.0 was released January 22, 2008. It comprised the NetPlane Core Service (NCS) codebase contributed by Motorola ECC. Along with the OpenSAF 1.0 release, the OpenSAF foundation was incepted. OpenSAF 2.0 released on August 12, 2008, was the first release developed by the OpenSAF community. This release included Log service and 64-bit support. OpenSAF 3.0 released on June 17, 2009, included platform management, usability improvements, and Java API support. OpenSAF 4.0 was a milestone release in July 2010. Nicknamed the "Architecture release", it introduced significant changes including closing functional gaps, settling internal architecture, enabling in-service upgrade, clarify APIs, and improve modularity. Receiving significant interest from industry and academics, OpenSAF held two community conferences in 2011, one hosted by MIT University in Boston MA, and a second hosted by Ericsson in Stockholm. Concepts OpenSAF defines a set of building blocks, collectively providing a mechanism to manage Service Availability (SA) of applications based on resource-capability models. SA and High Availability (HA) is the probability of a service being available at a random point in time; mission-critical systems require at least 99.999% (five nines) availability. HA and SA are essentially the same, but SA goes further (i.e. in-service upgrades of hardware and software). OpenSAF is designed for loosely coupled systems with fast interconnections between nodes (i.e. using TIPC/TCP), and extensible to meet different workloads; components communicate between themselves using any protocol. This extensibility is provided in large part by the IMM API, used by internal components and core services. The platform can exert control over compute and storage resources by defining as Objects, to be managed as (component service) instances and/or node constraints. OpenSAF software is distributed in nature, following the primary/replica architecture. In an `OpenSAF' cluster, there are two types of nodes which can be divided into those that manage an individual node and control plane. One system controller runs in "active" mode, another in "standby" mode, and remaining system controllers (if any) are spares ready to take over as Active or Standby role in case of a fault. Nodes can run headless, without control plane, adding cloud resilience. System Model The OpenSAF System Model is the key enabler API, allowing OpenSAF to process and validate requests, and update the state of objects in the AMF model, allowing directors to schedule workloads and service groups across worker/payload nodes. AMF behavior is changed via a configuration object. Services can use ‘No Redundancy’, 2N, N+M, N-way, and N-way Active redundancy models. OpenSAF lacks obvious modeling toolchains to simplify design and generation of AMF configuration Models. Ongoing research to address this gap, needs to deliver ecosystem tools, to better support modeling and automation of carrier-grade and Cloud Native Computing Foundation use cases. Control Plane The OpenSAF System Controller (SC) is the main controlling unit of the cluster, managing its workload and directing communication across the system. The OpenSAF control plane consists of various components, each its own process, that can run both on a single SC node or on multiple SC nodes, supporting high-availability clusters and service availability. The various components of the OpenSAF control plane are as follows: Information Model Manager (IMM) is a persistent data store that reliably stores the configuration data of the cluster, representing the overall state of the cluster at any given time. Provides a means to define and manage middleware and application configuration and state information in the form of managed objects and their corresponding attributes. IMM is implemented as an in-memory database that replicates its data on all nodes. IMM can use SQLite as a persistent backend. Like Apache ZooKeeper, IMM guarantees transaction-level consistency of configuration data over availability/performance (see CAP theorem). The IMM service follows the three-tier OpenSAF "Service Director" framework, comprising IMM Director (IMMD), IMM Node Director (IMMND), and IMM Agent library (IMMA). IMMD is implemented as a daemon on controllers using a 2N redundancy model, the active controller instance is "primary replica", the standby controller instance kept up-to-date by a message based checkpointing service. IMMD tracks cluster membership (using MDS), provides data store access control, and administrative interface for all OpenSAF services . Availability Management Framework (AMF) serves high availability and workload management framework with robust support (in conjunction with other AIS services) for the full fault management lifecycle (detection, isolation, recovery, repair, and notification). AMF follows the three-tier OpenSAF "Service Director", comprising director (AmfD), node director (AmfND), and agents (AmfA), and an internal watchdog for AmfND protection. The active AmfD service is responsible for realizing service configuration, persisted in IMM, across system/cluster scope. Node directors perform the same function for any component within its scope. It ensures state models are in agreement by acting as the main information and API bridge across all components. AMF monitors the IMM state, applying configuration changes or simply restore any divergences back to "wanted configuration" using fault management escalation policies to schedule the creation of the wanted deployment. AMF Directors (AmfD) are schedulers that decides which nodes an unscheduled Service Group (a redundant service instance) runs on. This decision is based on current v.s. "desired" availability and capability models, service redundancy models, and constraints such as quality-of-service, affinity/anti-affinity, etc. AMF directors match resource "supply" to workload "demand", and its behavior can be manipulated through an IMM system object. Component The Component is a logical entity of the AMF system model and represents a normalized view of a computing resource such as processes, drivers, or storage. Components are grouped into logical Service Units (SU), according to fault inter-dependencies, and associated with a Node. The SU is an instantiable unit of workload controlled by an AMF redundancy model, either active, standby, or failed state. SU of the same type is grouped into Service Groups (SG) which exhibit particular redundancy modeling characteristics. SU within an SG gets assigned to Service Instances (SI) and given an Availability state of active or standby. SI's are scalable redundant logical services protected by AMF. Node A Node is a compute instance (a blade, hypervisor, or VM) where service instances (workload) are deployed. The set of nodes belonging to the same communication subnet (no routing) comprise the logical Cluster. Every node in the cluster must run an execution environment for services, as well as OpenSAF services listed below: Node director (AmfND): The AmfND is responsible for the running state of each node, ensuring all active SU on that node are healthy. It takes care of starting, stopping, and maintaining CSI, and/or SUs organized into SG as directed by the control plane. The AmfND service enforces the desired AMF configuration, persisted in IMM, on the node. When a node failure is detected, the director (AmfD) observes this state change and launches a service unit on another eligible healthy node. Non-SA-Aware component: OpenSAF can provide HA (but not SA) for instantiable components originating from cloud computing, Containerization, Virtualization, and JVM domains, by modeling the component and service lifecycle commands (start/stop/health check) in the AMF Model. Container-contained: An AMF container-contained can reside inside a SU. The container-contained is the lowest level of runtime which can be instantiated. The SA-Aware container-contained component currently targets a Java Virtual Machine (JVM) per JSR139. Service Unit The basic scheduling unit in OpenSAF is a Service Unit (SU). A SU is a grouping of components. A SU consists of one or more components that are guaranteed to be co-located on the same node. SUs are not assigned IP addresses by default but may contain some component that does. A SU can be administratively managed using an object address. AmfND monitors the state of SUs, and if not in the desired state, re-deploys to the same node if possible. AmfD can start the SU on another Node if required by the redundancy model. A SU can define a volume, such as a local disk directory or a network disk, and expose it to the Components in the SU.[39] SU can be administratively managed through the AMF CLI, or management can be delegated to AMF. Such volumes are also the basis for Persistent Storage. Service Group The purpose of a Service Group is to maintain a stable set of replica SU's running at any given time. It can be used to guarantee the availability of a specified number of identical SU's based on selected configured redundancy model: N-Way, N-way-Active, 2N, N+M, or 'No-redundancy'. The SG is a grouping mechanism that lets OpenSAF maintain the number of instances declared for a given SG. The definition of an SG identifies all associated SU and their state (active, standby, failed). Service Instance An OpenSAF Service Instance (SI) is a set of SU that work together, such as one tier of a multi-tier application. The set of SU that protects a service is defined by the SG. Multi-instance SG (N-way-active, N-way, N+M) requires a stable IP address, DNS name, and load balancer to distribute the traffic of that IP address among active SU in that SG (even if failures cause the SU's to move from machine to machine). By default, a service is exposed inside a cluster (e.g. SU[TypeA] is grouped into one SG, with requests from the SU[typeB] load-balanced among them), but service can also be exposed outside a cluster (e.g., for clients to reach front-end SUs). Volumes Filesystems available to OpenSAF SU's are potentially ephemeral storage, by default. If the node is destroyed/recreated the data is lost on that Node. One solution is a Network File System (NFS) shared storage, accessible to all payload nodes. Other technical solutions are possible - what is important is that Volumes (File Share, mount point) can be modeled in AMF. Highly available Volumes provide persistent storage that exists for the lifetime of the SU itself. This storage can also be used as a shared disk space for SU within the SG. Volumes mounted at specific mount points on the Node are owned by a specific SG, so that instance cannot be shared with other SG using the same file system mount point. Architecture The OpenSAF architecture is distributed and runs in a cluster of logical nodes. All of the OpenSAF services either have 3-Tier or 2-Tier architecture. In the 3-Tiered architecture, OpenSAF services are partitioned into a service Director, a service Node-Director and an Agent. The Director is part of an OpenSAF service with central service intelligence. Typically it is a process on the controller node. The Node Directors co-ordinate node scoped service activities such as messaging with its central Director and its local Agents. The Agent provides service capabilities available to clients by way of a (shared) linkable library that exposes well-defined service APIs to application processes. Agents typically talk to their service Node Directors or Servers. The OpenSAF services are modularly classified as below Core services – AMF, CLM, IMM, LOG, NTF Optional services – EVT, CKPT, LCK, MSG, PLM, SMF The optional services can be enabled or disabled during the build/packaging of OpenSAF. OpenSAF can be configured to use TCP or TIPC as the underlying transport. Nodes can be dynamically added/deleted to/from the OpenSAF cluster at run time. OpenSAF cluster scales well up several hundred nodes. OpenSAF supports the following language bindings for the AIS interface APIs: C/C++ Java bindings (for AMF and CLM services) Python bindings OpenSAF provides command-line tools and utilities for the management of the OpenSAF cluster and applications. The modular architecture enables the addition of new services as well as the adaptation of the existing services. All OpenSAF services are designed to support in-service upgrades. Services The following SA Forum's AIS services are implemented by OpenSAF 5.0. Availability Management Framework (AMF) - described above. Cluster Membership Service (CLM) – Determines whether a node is healthy enough to be a part of the cluster. Provides a mechanism to track the cluster nodes by interacting with PLM for tracking the status of underlying OS/hardware. Checkpoint Service (CKPT) – For saving application states and incremental updates that can be used to restore service during failover or switchover. Event Service (EVT) – Provides a publish-subscribe messaging model that can be used for keeping applications and management entities in sync about events happening in the cluster. Information Model Management Service (IMM) - described above. Lock Service (LCK) – Supports a distributed lock service model with support for shared locks and exclusive locks. Log Service (LOG) – Means for recording (in log files) the functional changes happening in the cluster, with support for logging in diverse log record formats. Not for debugging or error tracking. Supports logging of alarms and notifications occurring in the cluster. Messaging Service (MSG) – Supports cluster-wide messaging mechanism with multiple senders – single receiver as well as message-group mechanisms. Notification Service (NTF) – Provides a producer/subscriber model for system management notifications to enable fault handling. Used for alarm and fault notifications with support for recording history for fault analysis. Supports notification formats of ITU-T X.730, X.731, X.733, X.736 recommendations. Platform Management Service (PLM) – provides a mechanism to configure a logical view of the underlying hardware (FRU) and the OS. Provides a mechanism to track the status of the OS, the hardware (FRU) and to perform administrative operations in coordination with the OpenSAF services and applications. Software Management Framework (SMF) – Support for an automated in-service upgrade of application, middleware, and OS across the cluster. Supporters Network Equipment Providers will be the primary users of products based on the OpenSAF code base, integrating them into their products for network service providers, carriers, and operators. Many network equipment providers have demonstrated their support for OpenSAF by joining the Foundation and/or contributing to the Open Source project. Current Foundation Members include: Ericsson, HP, and Oracle. Several providers of computing and communications technology also have indicated support for the OpenSAF initiative including, OpenClovis SAFplus, Emerson Network Power Embedded Computing, Continuous Computing, Wind River, IP Infusion, Tail-f, Aricent, Rancore Technologies, GoAhead Software, and MontaVista Software. Uses OpenSAF is commonly used as a way to achieve carrier-grade (five-nines) service availability. OpenSAF is functionally complete but lacks the ecosystem of modeling tools available to other open-source solutions like Kubernetes and Docker Swarm. See also SAForum SCOPE Alliance OpenHPI List of cluster management software Cloud Native Computing Foundation References External links Free software 2008 software Cloud infrastructure Containerization software Free software for cloud computing Free software programmed in C++ Linux containerization Linux Foundation projects Software using the Apache license Virtualization-related software for Linux Orchestration software
80590
https://en.wikipedia.org/wiki/Tyndareus
Tyndareus
In Greek mythology, Tyndareus (; Ancient Greek: Τυνδάρεος, Tundáreos; Attic: Τυνδάρεως, Tundáreōs; ) was a Spartan king. Family Tyndareus was the son of Oebalus (or Perieres) and Gorgophone (or Bateia). He married the Aetolian princess, Leda, by whom he became the father of Castor, Clytemnestra, Timandra, Phoebe and Philonoe, and the stepfather of Helen of Troy and Pollux. Mythology Early years Tyndareus had a brother named Hippocoon, who seized power and exiled Tyndareus. He was reinstated by Heracles, who killed Hippocoon and his sons. Tyndareus’ other brother was Icarius, the father of Penelope. Tyndareus’ wife Leda was seduced by Zeus, who disguised himself as a swan. She laid two eggs, each producing two children. When Thyestes seized control in Mycenae, two exiled princes, Agamemnon and Menelaus came to Sparta, where they were received as guests and lived for a number of years. The princes eventually married Tyndareus' daughters, Clytemnestra and Helen respectively. Curse of the goddess According to Stesichorus, while sacrificing to the gods Tyndareus forgot to honor Aphrodite and thus the goddess was angered and made his daughters twice and thrice wed and deserters of their husbands. As what Hesiod also says: Helen and the Trojan War Helen was the most beautiful woman in the world, and when it was time for her to marry, many Greek kings and princes came to seek her hand or sent emissaries to do so on their behalf. Among the contenders were Odysseus, Ajax the Great, Diomedes, Idomeneus, and both Menelaus and Agamemnon. All but Odysseus brought many and rich gifts with them. Helen's favourite was Menelaus who, according to some sources, did not come in person but was represented by his brother Agamemnon, who chose to support his brother's case, and himself married Helen's half-sister Clytemnestra instead. Tyndareus would accept none of the gifts, nor would he send any of the suitors away for fear of offending them and giving grounds for a quarrel. Odysseus promised to solve the problem in a satisfactory manner if Tyndareus would support him in his courting of Penelope, the daughter of Icarius. Tyndareus readily agreed and Odysseus proposed that, before the decision was made, all the suitors should swear a most solemn oath to defend the chosen husband against whoever should quarrel with the chosen one. This stratagem succeeded and Helen and Menelaus were married. Eventually, Tyndareus resigned in favour of his son-in-law and Menelaus became king. Some years later, Paris, a Trojan prince came to Sparta to marry Helen, whom he had been promised by Aphrodite. Helen left with him – either willingly because she had fallen in love with him, or because he kidnapped her, depending on the source – leaving behind Menelaus and Hermione, their nine-year-old daughter. Menelaus attempted to retrieve Helen by calling on all her former suitors to fulfil their oaths, leading to the Trojan War. Afterwards According to Euripides's Orestes, Tyndareus was still alive at the time of Menelaus’ return, and was trying to secure the death penalty for his grandson Orestes due to the latter's murder of his own mother who was also Tyndareus’ daughter, Clytemnestra, but according to other accounts he had died prior to the Trojan War. In some versions of the myth, Tyndareus was one of the dead men resurrected by Asclepius to live again. Notes References Apollodorus, The Library with an English Translation by Sir James George Frazer, F.B.A., F.R.S. in 2 Volumes, Cambridge, MA, Harvard University Press; London, William Heinemann Ltd. 1921. ISBN 0-674-99135-4. Online version at the Perseus Digital Library. Greek text available from the same website. Euripides, The Complete Greek Drama, edited by Whitney J. Oates and Eugene O'Neill, Jr. in two volumes. 2. Helen, translated by Robert Potter. New York. Random House. 1938. Online version at the Perseus Digital Library. Euripides, Euripidis Fabulae. vol. 3. Gilbert Murray. Oxford. Clarendon Press, Oxford. 1913. Greek text available at the Perseus Digital Library. Herodotus, The Histories with an English translation by A. D. Godley. Cambridge. Harvard University Press. 1920. . Online version at the Topos Text Project. Greek text available at Perseus Digital Library. Hesiod, Catalogue of Women from Homeric Hymns, Epic Cycle, Homerica translated by Evelyn-White, H G. Loeb Classical Library Volume 57. London: William Heinemann, 1914. Online version at theio.com Pausanias, Description of Greece with an English Translation by W.H.S. Jones, Litt.D., and H.A. Ormerod, M.A., in 4 Volumes. Cambridge, MA, Harvard University Press; London, William Heinemann Ltd. 1918. . Online version at the Perseus Digital Library Pausanias, Graeciae Descriptio. 3 vols. Leipzig, Teubner. 1903. Greek text available at the Perseus Digital Library. Publius Vergilius Maro, Aeneid. Theodore C. Williams. trans. Boston. Houghton Mifflin Co. 1910. Online version at the Perseus Digital Library. Publius Vergilius Maro, Bucolics, Aeneid, and Georgics. J. B. Greenough. Boston. Ginn & Co. 1900. Latin text available at the Perseus Digital Library. Tzetzes, John, Book of Histories, Book IX-X translated by Jonathan Alexander from the original Greek of T. Kiessling's edition of 1826. Online version at theio.com Mythological kings of Sparta Kings in Greek mythology Laconian characters in Greek mythology Characters in Greek mythology Mythology of Heracles
4393366
https://en.wikipedia.org/wiki/Dell%20n%20Series
Dell n Series
The n Series is a Dell product line that does not ship with a pre-installed version of Microsoft Windows. Apparently prohibited from shipping computers without an operating system by an existing licensing agreement with Microsoft, Dell instead ships these systems with either the open-source FreeDOS operating system or the Ubuntu Linux distribution not preinstalled, but on install disks. The company has come under fire for making the FreeDOS-powered machines no cheaper and more difficult to purchase than identical systems running Windows. Despite its technological advances, it is often criticized more than the average computing device. References External links Dell n Series Service in Delhi, india Dell and Linux Interview with Michael Dell on Desktop Linux n Series
35278686
https://en.wikipedia.org/wiki/Information%20Technology%20%28constituency%29
Information Technology (constituency)
The Information Technology functional constituency () was a functional constituency in the elections for the Legislative Council of Hong Kong until it was replaced by Technology and Innovation functional constituency with a much narrower electorate in the 2021 electoral overhaul. Since its creation in 1998, it has been normally held by the pro-democracy camp, with the interruption from 2008 to 2012, where the seat was held by pro-Beijing Samson Tam who defeated pro-democracy candidate Charles Mok by 35 votes with the help of the Internet Professional Association (iProA), a pro-Beijing IT association. In 2012, Mok retook the seat for the pro-democrats from the pro-Beijing camp by defeating Tam. Mok resigned effective 1 December 2020 as part of the 2020 LegCo mass resignations in protest of the disqualification of four pro-democracy legislators. Composition The Information Technology constituency was composed of individuals who are members of relevant associations such as the Hong Kong Computer Society, and Institute of Electrical and Electronics Engineers and corporate members of organisations such as the Hong Kong Information Technology Federation, Hong Kong Wireless Technology Industry and Society of Hong Kong External Telecommunications Services Providers who are entitled to vote at general meetings, as well as some other corporations with certain licences granted by the Telecommunication Authority. Since 1998, there have been a number of additional associations included in the electorate. In 2006, there were four organisations where individual members were qualified as electorates although they were not allowed to vote in the general meetings, such as the Professional Information Security Association and the Hong Kong and Mainland Software Industry Corporation Association. Since 2003, members of the pro-Beijing Internet Professional Association (iProA) are also eligible to vote in the constituency, which helped its pro-Beijing member Samson Tam to take the seat from pro-democrats' hand in the 2008 Legislative Council election. In 2006, there were 4,743 individuals (94.9% of the electorate) and 261 registered corporations (4.1% of the electorate). In 2016, it saw an 80% surge in the number of registered voters, from 6,716 in 2012 to 12,046 in 2016, according to provisional voter statistics released by the Registration and Electoral Office. Incumbent legislator Charles Mok questioned whether pro-Beijing forces were getting people to sign up. In April 2017, the Independent Commission Against Corruption arrested 72 people over alleged vote-rigging, 68 of them were newly registered electors and four were middlemen, three of whom were registered voters. A source identified them as the members of the Internet Professional Association (iProA) and the Institute of Electrical and Electronic Engineers (IEEE), Hong Kong section, computer chapter. Returned members Electoral results 2010s 2000s 1990s References Constituencies of Hong Kong Constituencies of Hong Kong Legislative Council Functional constituencies (Hong Kong) 1998 establishments in Hong Kong Constituencies established in 1998 2021 disestablishments in Hong Kong Constituencies disestablished in 2021
32804579
https://en.wikipedia.org/wiki/Microsoft%20Office%20shared%20tools
Microsoft Office shared tools
Microsoft Office shared tools are software components that are (or were) included in all Microsoft Office products. Delve Office Delve allows Office 365 users to search and manage their emails, meetings, contacts, social networks and documents stored on OneDrive or Sites in Office 365. Delve uses machine learning and artificial intelligence In April 2015 Microsoft launched a mobile version of Office Delve in the App Store and Google Play for users with an Office 365 subscription. Graph Microsoft Graph (originally known as Microsoft Chart) is an OLE application deployed by Microsoft Office programs such as Excel and Access to create charts and graphs. The program is available as an OLE application object in Visual Basic. Microsoft Graph supports many different types of charts, but its output is dated. Office 2003 was the last version to use Microsoft Graph for hosting charts inside Office applications as OLE objects. Office 2007, specifically, Excel 2007 includes a new integrated charting engine and the charts are native to the applications. The new engine supports advanced formatting, including 3D rendering, transparencies, and shadows. Chart layouts can also be customized to highlight various trends in the data. Microsoft Graph still exists for compatibility reasons, but the entry points are removed. This product can be used within other products, and is available in the Object menu in the Insert tab in Office Programs. Sold separately in Mac releases. The first software sold under the name Microsoft Chart was an attempt from Microsoft to compete with the successful Lotus 1-2-3 by adding a companion to Microsoft Multiplan, the company's spreadsheet in the early 1980s. Microsoft Chart shared its box design and two-line menu with Multiplan, and could import Multiplan data. The simple graphs (pies, bars, lines) were drawn on the screen in graphics mode (which was not available on entry level computer models), and could not be printed on some dot matrix devices. The main drawback of Microsoft's solution at the time was the need to exit Multiplan and then load Chart to compose and draw a graph, because MS-DOS was not a multitasking operating system. In the early 1990s, Microsoft Chart was renamed Microsoft Graph. Query Visual Basic for Applications WordArt WordArt is a text-styling utility. It allows users to create stylized text with various "special effects" such as textures, outlines, and many other manipulations that are not available through the standard font formatting. For example, one can create shadows, rotate, "bend", and "stretch" the shape of the text. WordArt is available in 30 different preset styles in Microsoft Word, however, it is customizable using the tools available on the WordArt toolbar and Drawing toolbar up to Office 2003, or on the WordArt tools tab since Office 2007. It is also available in Excel, Microsoft PowerPoint, and Microsoft Publisher. In Office 2010 and beyond, users can apply formatting effects such as shadow, bevel, glow, gradient glow, and reflection to their text. In Office 2007, WordArt was given a complete overhaul in Excel and PowerPoint, with new styles, new effects, and the ability to apply WordArt to regular text boxes, and in Word, to body text. The new styles were included in Word 2010, but the presets revamped in Word 2013. SmartArt SmartArt, found under the Insert tab in the ribbon in PowerPoint, Word, Excel, and Outlook, is a new group of editable and formatted diagrams. There are 115 preset SmartArt graphics layout templates in categories such as list, process, cycle, and hierarchy. When an instance of a SmartArt is inserted, a Text Pane appears next to it to guide the user through entering text in the hierarchical levels. Each SmartArt graphic, based on its design, maps the text outline, automatically resized for best fit, onto the graphic. There are a number of "quick styles" for each graphic that apply largely different 3D effects to the graphic, and the graphic's shapes and text can be formatted through shape styles and WordArt styles. In addition, SmartArt graphics change their colors, fonts, and effects to match the document's theme. It was included in Office since 2006 to now. Discontinued Binder Microsoft Binder was an application originally included with Microsoft Office 95, 97, and 2000 that allowed users to include different types of OLE 2.0 objects (e.g., documents, spreadsheets, presentations and projects) in one file. Originally a test host for OLE 2.0, it was not widely used, and was discontinued after Office 2000. The filename extension for Microsoft Binder files was .OBD; the Office Binder template format was .OBT. A Microsoft Office Binder Wizard used the extension .OBZ. Binder files could be opened in Office versions until 2003, with the Unbind add-in installable through the Add or Remove Programs menu. Office 97 Unbind is unavailable for download. Small Business Tools Small Business Customer Manager (SBCM) was an Access-based tool which combined accounting data from most popular accounting software and Outlook contacts and allowed user to track customer profiles and maximize revenue. It integrated seamlessly with Word and Publisher. Small Business Financial Manager (SBFM) was an Excel-based tool which allowed users to analyze data and create reports and charts based on a created from user's accounting data from popular accounting packages (i.e. QuickBooks). It was first released in 1996 and bundled with Small Business editions of Office 97 or with every Office 2000 suite except Standard. Originally it was created for Microsoft by Timeline Inc. and originally was called Accounting Analysis Pack. It was available in United States, Canada, United Kingdom and Australia. List of SBFM versions: Small Business Financial Manager for Excel for Windows 95 (1.0) (1996) Small Business Financial Manager 97 (2.0) (Office 97 Small Business Edition 1.0) (1997) Small Business Financial Manager 98 (3.0) (Office 97 Small Business Edition 2.0) (1998); added business comparison, projection reports, charts Small Business Financial Manager 2000 (4.0) (Office 2000 Small Business, Professional, Premium, Developer) (1999); added buy vs lease tool separate from What-If analysis) Direct Mail Manager (DMM) was an-Internet-based tool which allowed businesses to conduct direct mail campaigns by importing address lists from Outlook, Excel, Access etc., verifying address lists by connecting to an Internet Site (ZIP-Station), printing envelopes, postcards and letters and using a mailing service. Originally it was released with Office 97 Small Business Edition 2.0 and subsequently bundled with every Office 2000 suite except Standard. This program was developed in association with Envelope Manager Software. An enhanced version called DAZzle Express was available from Envelope Manager Software. Additionally, Direct Mail Manager was available for United States, United Kingdom, Germany, France and Italy. Business Planner (MSBP) contained business-planning resources, templates, articles, advice from experts. It allowed user to create a business plan and a marketing plan (US only). It was available for United States, Canada, United Kingdom, Australia, Germany and France. Data Analyzer Microsoft Data Analyzer 2002 was part of Microsoft Office XP. Microsoft originally purchased the software as part of the intellectual property of Maximal Innovative Intelligence - Maximal's "Max" product was rebranded as Microsoft Data Analyzer. Even though it was a stand-alone application and was not available in any Office XP bundle, it was a part of the Office XP suite. It was not updated beyond version 3.5. Microsoft Data Analyzer allows analyzing and visualizing data and data trends, and is integrated with SQL Server Analysis Services. Reports and graphs generated could be saved as HTML, Microsoft Excel, or Microsoft PowerPoint files. Document Scanning and Document Imaging Microsoft Office Document Scanning (MODS) is a scanning and optical character recognition (OCR) application introduced first in Office XP. The OCR engine is based upon Nuance's OmniPage. MODS is suited for creating archival copies of documents. It can embed OCR data into both MDI and TIFF files. This enables text search on the files, which is integrated into the Windows Search. Microsoft Office Document Imaging (MODI) enables editing and annotating documents scanned by Microsoft Office Document Scanning. It was first introduced in Office XP, and was included in Office 2003 and Office 2007. Although it is not available in Office 2010, it is possible to install it from a previous version of Microsoft Office and use it with Office 2010. (The Internet Fax feature in Office 2010 uses the Windows Fax printer driver to generate a TIFF file instead.) Microsoft offers MDI to TIFF File Converter, a command line tool, which allows users to convert one or more MDI files to TIFF. MODI supports Tagged Image File Format (TIFF) as well as its own proprietary format called MDI. It can save text generated from the OCR process into the original TIFF file. However, MODI produces TIFF files that violate the TIFF standard specifications and are only usable by itself. In its default mode, the OCR engine will de-skew and re-orient the page where required. Since Office 2003 Service Pack 3, MODI no longer takes over the file association with Tagged Image File Format (TIFF) files as part of the Service Pack's security changes. Also, it no longer supports JPEG compression in TIFF files. MODS and MODI are no longer available since Office 2010, although Microsoft recommends a workaround by installing the MODI component from SharePoint Designer 2007 or old Office media. Programmability MODI exposes a document and an image object through Component Object Model (COM). It can convert scanned images to text under program control, using its built-in OCR engine. The MODI object model is accessible from development tools that support the Component Object Model (COM) by using a reference to the Microsoft Office Document Imaging 11.0 Type Library. The MODI Viewer control is accessible from any development tool that supports ActiveX controls by adding Microsoft Office Document Imaging Viewer Control 11.0 or 12.0 (MDIVWCTL.DLL) to the application project. These folders are usually located in C:\Program Files\Common Files\Microsoft Shared\MODI. The MODI control became accessible in the Office 2003 release; while the associated programs were included in earlier Office XP, the object model was not exposed to programmatic control. A simple example in Visual Basic .NET follows: Dim inputFile As String = "C:\test\multipage.tiff" Dim strRecText As String = "" Dim Doc1 As MODI.Document Doc1 = New MODI.Document Doc1.Create(inputFile) Doc1.OCR() ' this will OCR all pages of a multi-page TIFF file Doc1.Save() ' this will save the deskewed reoriented images, and the OCR text, back to the inputFile For imageCounter As Integer = 0 To (Doc1.Images.Count - 1) ' work your way through each page of results strRecText &= Doc1.Images(imageCounter).Layout.Text ' this puts the OCR results into a string Next File.AppendAllText("C:\test\testmodi.txt", strRecText) ' write the OCR file out to disk Doc1.Close() ' clean up Doc1 = Nothing MDI file format MODI uses a proprietary format with .mdi Filename extension for storing scanned documents together with optional annotations or metadata which can include the text generated by OCR process. It is known that MDI is a variant of TIFF. Key differences from TIFF include: Magic number is 0x5045, instead of TIFF's 0x4D4D (ASCII MM) or 0x4949 (ASCII II). Three proprietary image compression formats are used. Numerous proprietary tag values are used. Office Assistant PhotoDraw Photo Editor Office Web Components Office Web Components (OWC) are a group of Object Linking and Embedding (OLE) components available in Office 2000, XP, and 2003. These ActiveX Controls can be plugged into web pages, Visual Basic, Visual Basic for Applications (VBA) forms, and Windows Forms, or programmed in-memory. The OWC can be used by any COM-compliant Component Object Model programming language. Applications such as Excel, Microsoft Access, Microsoft Project and Microsoft FrontPage allowed creating interactive web pages using Office Web Components. The following components are included: Spreadsheet Chartspace Pivot table Data source component The Office Web Components were discontinued in Office 2007 except as a part of Office Project Server 2007. However, they were available for download from Microsoft's website. Microsoft has not yet offered a complete OWC replacement. However, programmers can use a combination of third-party products, Excel Services, or Visual Studio Tools for Office to provide similar functionality. The Pivot Table web component may have problems on Windows 7. In many cases the problems are related to the new security settings in IE and can be solved by relaxing the restrictions in the relevant Internet Zone, allowing ActiveX controls and possibly cross-domain access. If the page is hosted locally in the computer, the settings for the zone are not accessible through the IE interface, and can be changed by editing the registry (under key [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0]). Four books in print cover OWC programming: The O.W.C Black Book 2nd Edition - Alvin Bruney 2007 The Microsoft Office Web Components Black Book with .NET - Alvin Bruney 2005 Professional ASP Programming Guide for Office Web Components: With Office 2000 and Office XP - Qimao Zhang 2001 Programming Microsoft Office 2000 Web Components - Dave Stearns 2000 Clip Organizer Microsoft Clip Organizer is Microsoft's clip art organizing software allowing users to find drawings, photographs, sounds, videos, and other media clips to include in presentations, publications, and other Office documents. It comes with a variety of stock media clips and offers more selection on the Microsoft Office Online website. Picture Manager Script Editor Equation Editor Equation Editor was a formula editor developed by Design Science that allowed users to construct math and science equations in a WYSIWYG environment, and was included in Microsoft Office and several other commercial applications. It was a simplified version of Design Science's MathType, evidenced with a dialog box enticing the user to upgrade to the full, paid version of the software. It could be used as a standalone program or as an embedded object from within applications that support OLE. Its feature set had not changed significantly since its introduction in Word for Windows version 2.0. Beginning with Office 2007, Equation Editor is no longer the default method of creating equations, and is kept for compatibility with old documents only. Instead, a reengineered equation editor is included, which is built into the document-editing part of the Fluent User Interface on core Office 2007 programs and all Office 2010 and 2013 programs, rather than accessed through a separate dialog and being treated as an OLE object in the document. In January 2018, Microsoft published a security update that completely removed the old Equation Editor for Office 2007, Office 2010, Office 2013 and Office 2016 when the update was installed, due to a vulnerability that was being actively exploited. References Further reading Microsoft Office
31106850
https://en.wikipedia.org/wiki/Tazti
Tazti
Tazti is a speech recognition software package developed and sold by Voice Tech Group, Inc. for Windows personal computers. The most recent package is version 3.2, which supports Windows 10, Windows 8.1, Windows 8 and Windows 7 64-bit editions. Earlier versions of Tazti supported Windows Vista and Windows XP. PC video game play by voice, controlling PC applications and programs by voice and creating speech commands to trigger a browser to open web pages, or trigger the Windows operating system to open files, folders or programs are Tazti's primary features. Earlier versions of Tazti included a lite Dictation feature that is eliminated from the latest version. Features Tazti Speech Recognition software has four primary areas of functionality: Play PC games by voice, Control PC based applications and programs by voice, Open files, folders and webpages by creating custom speech commands and associating them to file, folder or web URL. Run programs that include command line parameters which may include batch flies to mash up Tazti to robots, robotics, web apps, or desktop or other programs not a part of Tazti. Tazti utilizes a minimal user interface. As an example, user spoken speech commands appear in a balloon on the user interface dashboard as they are spoken allowing the user to confirm by sight the speech recognition quality. History Voice Tech Group, Inc. was founded in 2005 as an Ohio corporation primarily concerned with the research of semantic search and voice search. Voice Tech Group, Inc. released Tazti Speech Recognition 1.0 as their first multi-feature speech recognition product in 2005. Early features include mashing up bookmarks and favorites to speech commands, website navigation by voice including of social media sites such as Facebook and Myspace, and voice control of iTunes. Voice Tech Group, Inc partnered with SR Tech Group LLC to develop speech and voice recognition technologies in 2013. Version 2.0.2 released in September 2010 added dictation, keyboard shortcuts that also allow custom setups for PC game play, an advanced speech API, and the ability to turn off/on groupings of speech commands. Version 2.4 released in November 2011 improved dictation and fixed bugs. Version 3.0 released in July 2013 eliminated some features including dictation and added features to game play by voice and control of application and programs by voice. Version 3.2 released in July 2016 introduced support for Microsoft Windows 10 operating system. Versions See also List of speech recognition software References External links Windows multimedia software Assistive technology Proprietary software Speech recognition software Computer accessibility Game accessibility Educational software
32517
https://en.wikipedia.org/wiki/VAX
VAX
VAX is a series of computers featuring a 32-bit instruction set architecture (ISA) and virtual memory that was developed and sold by Digital Equipment Corporation (DEC) in the late 20th century. The VAX-11/780, introduced October 25, 1977, was the first of a range of popular and influential computers implementing the VAX ISA. The VAX family was a huge success for DEC - over 100 models were introduced over the lifetime of the design, with the last members arriving in the early 1990s. The VAX was succeeded by the DEC Alpha, which included several features from VAX machines to make porting from the VAX easier. VAX was designed as a successor to the 16-bit PDP-11, one of the most successful minicomputers in history with approximately 600,000 examples sold. The system was designed to offer backward compatibility with the PDP-11 while extending the memory to a full 32-bit implementation and adding demand paged virtual memory. The name VAX refers to its Virtual Address eXtension concept that allowed programs to make use of this newly available memory while still being compatible with unmodified user mode PDP-11 code. The name "VAX-11", used on early models, was chosen to highlight this capability. The VAX ISA is considered a complex instruction set computer (CISC) design. Later models in the series dropped the -11 branding as PDP-11 compatibility was no longer a major concern. The line expanded to both high-end machines like the VAX 9000 as well as to the workstation-scale systems like the VAXstation series. The VAX family ultimately contained ten distinct designs and over 100 individual models in total. All of these were compatible with each other and normally ran the VAX/VMS operating system. VAX has been perceived as the quintessential CISC ISA, with its very large number of assembly language programmer-friendly addressing modes and machine instructions, highly orthogonal instruction set architecture, and instructions for complex operations such as queue insertion or deletion, number formatting, and polynomial evaluation. Name The name "VAX" originated as an acronym for Virtual Address eXtension, both because the VAX was seen as a 32-bit extension of the older 16-bit PDP-11 and because it was (after Prime Computer) an early adopter of virtual memory to manage this larger address space. Early versions of the VAX processor implement a "compatibility mode" that emulates many of the PDP-11's instructions, giving it the 11 in VAX-11 to highlight this compatibility. Later versions offloaded the compatibility mode and some of the less used CISC instructions to emulation in the operating system software. Instruction set The VAX instruction set was designed to be powerful and orthogonal. When it was introduced, many programs were written in assembly language, so having a "programmer-friendly" instruction set was important. In time, as more programs were written in high-level programming languages, the instruction set became less visible, and the only ones much concerned about it were compiler writers. One unusual aspect of the VAX instruction set is the presence of register masks at the start of each subprogram. These are arbitrary bit patterns that specify, when control is passed to the subprogram, which registers are to be preserved. Since register masks are a form of data embedded within the executable code, they can make linear parsing of the machine code difficult. This can complicate optimization techniques that are applied on machine code. Operating systems The native VAX operating system is Digital's VAX/VMS (renamed to OpenVMS in 1991 or early 1992 when it was ported to Alpha, modified to comply with POSIX standards, and branded as compliant with XPG4 by the X/Open consortium). The VAX architecture and OpenVMS operating system were "engineered concurrently" to take maximum advantage of each other, as was the initial implementation of the VAXcluster facility. Other VAX operating systems have included various releases of Berkeley Software Distribution (BSD) UNIX up to 4.3BSD, Ultrix-32, VAXELN, and Xinu. More recently, NetBSD and OpenBSD have supported various VAX models and some work has been done on porting Linux to the VAX architecture. OpenBSD discontinued support for the architecture in September 2016. History The first VAX model sold was the VAX-11/780, which was introduced on October 25, 1977, at the Digital Equipment Corporation's Annual Meeting of Shareholders. Bill Strecker, C. Gordon Bell's doctoral student at Carnegie Mellon University, was responsible for the architecture. Many different models with different prices, performance levels, and capacities were subsequently created. VAX superminicomputers were very popular in the early 1980s. For a while the VAX-11/780 was used as a standard in CPU benchmarks. It was initially described as a one-MIPS machine, because its performance was equivalent to an IBM System/360 that ran at one MIPS, and the System/360 implementations had previously been de facto performance standards. The actual number of instructions executed in 1 second was about 500,000, which led to complaints of marketing exaggeration. The result was the definition of a "VAX MIPS," the speed of a VAX-11/780; a computer performing at 27 VAX MIPS would run the same program roughly 27 times faster than the VAX-11/780. Within the Digital community the term VUP (VAX Unit of Performance) was the more common term, because MIPS do not compare well across different architectures. The related term cluster VUPs was informally used to describe the aggregate performance of a VAXcluster. (The performance of the VAX-11/780 still serves as the baseline metric in the BRL-CAD Benchmark, a performance analysis suite included in the BRL-CAD solid modeling software distribution.) The VAX-11/780 included a subordinate stand-alone LSI-11 computer that performed microcode load, booting, and diagnostic functions for the parent computer. This was dropped from subsequent VAX models. Enterprising VAX-11/780 users could therefore run three different Digital Equipment Corporation operating systems: VMS on the VAX processor (from the hard drives), and either RSX-11S or RT-11 on the LSI-11 (from the single density single drive floppy disk). The VAX went through many different implementations. The original VAX 11/780 was implemented in TTL and filled a four-by-five-foot cabinet with a single CPU. Through the 1980s, the high-end of the family was continually improved using ever-faster discrete components, an evolution that ended with the introduction of the VAX 9000 in October 1989. This design proved too complex and expensive and was ultimately abandoned not long after introduction. CPU implementations that consisted of multiple emitter-coupled logic (ECL) gate array or macrocell array chips included the VAX 8600 and 8800 superminis and finally the VAX 9000 mainframe class machines. CPU implementations that consisted of multiple MOSFET custom chips included the 8100 and 8200 class machines. The VAX 11-730 and 725 low-end machines were built using AMD Am2901 bit-slice components for the ALU. The MicroVAX I represented a major transition within the VAX family. At the time of its design, it was not yet possible to implement the full VAX architecture as a single VLSI chip (or even a few VLSI chips as was later done with the V-11 CPU of the VAX 8200/8300). Instead, the MicroVAX I was the first VAX implementation to move some of the more complex VAX instructions (such as the packed decimal and related opcodes) into emulation software. This partitioning substantially reduced the amount of microcode required and was referred to as the "MicroVAX" architecture. In the MicroVAX I, the ALU and registers were implemented as a single gate-array chip while the rest of the machine control was conventional logic. A full VLSI (microprocessor) implementation of the MicroVAX architecture arrived with the MicroVAX II's 78032 (or DC333) CPU and 78132 (DC335) FPU. The 78032 was the first microprocessor with an on-board memory management unit The MicroVAX II was based on a single, quad-sized processor board which carried the processor chips and ran the MicroVMS or Ultrix-32 operating systems. The machine featured 1 MB of on-board memory and a Q22-bus interface with DMA transfers. The MicroVAX II was succeeded by many further MicroVAX models with much improved performance and memory. Further VLSI VAX processors followed in the form of the V-11, CVAX, CVAX SOC ("System On Chip", a single-chip CVAX), Rigel, Mariah and NVAX implementations. The VAX microprocessors extended the architecture to inexpensive workstations and later also supplanted the high-end VAX models. This wide range of platforms (mainframe to workstation) using one architecture was unique in the computer industry at that time. Sundry graphics were etched onto the CVAX microprocessor die. The phrase CVAX... when you care enough to steal the very best was etched in broken Russian as a play on a Hallmark Cards slogan, intended as a message to Soviet engineers who were known to be both purloining DEC computers for military applications and reverse engineering their chip design.<ref>The Computer History Simulation Project: CVAX (1987), retrieved January 30, 2008</ref> By the late 1980s, the VAX microprocessors had grown in power to be competitive with discrete designs. This led to the abandonment of the 9000 and its replacement by NVAX-powered models, with the ultimate versions as the VAX 7000/10000 of 1992. In DEC's product offerings, the VAX architecture was eventually superseded by RISC technology. In 1989 DEC introduced a range of workstations and servers that ran Ultrix, the DECstation and DECsystem respectively, based on processors that implemented the MIPS architecture. In 1992 DEC introduced their own RISC instruction set architecture, the Alpha AXP (later renamed Alpha), and their own Alpha-based microprocessor, the DECchip 21064, a high performance 64-bit design capable of running OpenVMS. In August 2000, Compaq announced that the remaining VAX models would be discontinued by the end of the year, but old systems remain in widespread use. The Stromasys CHARON-VAX and SIMH software-based VAX emulators remain available. VMS is now managed by VMS Software Incorporated, albeit only for the Alpha, HPE Integrity, and x86-64 platforms. Processor architecture Virtual memory map The VAX virtual memory is divided into four sections. Each is one gigabyte (in the context of addressing, 230 bytes) in size: For VMS, P0 was used for user process space, P1 for process stack, S0 for the operating system, and S1 was reserved. Privilege modes The VAX has four hardware implemented privilege modes: Processor status register The Process Status Register has 32 bits: VAX-based systems The first VAX-based system was the VAX-11/780, a member of the VAX-11 family. The high-end VAX 8600 replaced the VAX-11/780 in October 1984 and was joined by the entry-level MicroVAX minicomputers and the VAXstation workstations in the mid-1980s. The MicroVAX was superseded by the VAX 4000, the VAX 8000 was superseded by the VAX 6000 in the late 1980s and the mainframe-class VAX 9000 was introduced. In the early 1990s, the fault-tolerant VAXft was introduced, as were the Alpha compatible VAX 7000/10000. A variant of various VAX-based systems were sold as the VAXserver. SImultaneous Machine ACceSs (SIMACS)System Industries developed an ability to give more than one DEC CPU, but not at the same time, write access to a shared disk. They implemented an enhancement named SImultaneous Machine ACceSs (SIMACS), which allowed their special disk controller to set a semaphore flag for disk access, allowing multiple WRITES to the same files; the disk is shared by multiple DEC systems. SIMACS also existed on PDP-11 RSTS systems. Canceled systems Canceled systems include the BVAX, a high-end emitter-coupled logic (ECL) based VAX, and two other ECL-based VAX models: Argonaut and Raven. Raven was canceled in 1990. A VAX named Gemini was also canceled, which was a fall-back in case the LSI-based Scorpio failed. It never shipped. Clones A number of VAX clones, both authorized and unauthorized, were produced. Examples include: Systime Computers Ltd of the United Kingdom produced clones of early VAX models such as the Systime 8750 (equivalent to the VAX 11/750). Norden Systems produced the ruggedized, Military-specification MIL VAX series. The Hungarian Central Research Institute for Physics (KFKI) produced a series of clones of early VAX models, the TPA-11/540, 560 and 580. The SM 52/12 from Czechoslovakia, developed at VUVT Žilina (today Slovakia) and produced from 1986 at ZVT Banská Bystrica (today Slovakia). The East German VEB Robotron K 1840 (SM 1710) is a clone of the VAX-11/780 and Robotron K 1820 (SM 1720) is a copy of the MicroVAX II. The SM-1700 is a Soviet clone of the VAX-11/730, SM-1702 was a clone of MicroVAX II and SM-1705'' was a clone of VAX-11/785. These systems ran a variety of clone operating systems - DEMOS (based on BSD Unix), MOS VP (based on VAX/VMS) or MOS VP RV (based on VAXELN). The NCI-2780 Super-mini, also sold as Taiji-2780, is a clone of the VAX-11/780 developed by North China Institute of Computing Technology in Beijing. Further reading References External links HP: VAX Systems DEC Microprocessors SimH VAX Open source emulator that supports VAX architecture The complete Digital Technical Journals Computer-related introductions in 1977 DEC mainframe computers DEC microprocessors Instruction set architectures Minicomputers 32-bit computers
31944088
https://en.wikipedia.org/wiki/BatteryMAX
BatteryMAX
BatteryMAX is an idle detection system used for computer power management under operating system control developed at Digital Research, Inc.'s European Development Centre (EDC) in Hungerford, UK. It was created to address the new genre of portable personal computers (laptops) which ran from battery power. As such, it was also an integral part of Novell's PalmDOS 1.0 operating system tailored for early palmtops in 1992. Description Power saving in laptop computers traditionally relied on hardware inactivity timers to determine whether a computer was idle. It would typically take several minutes before the computer could identify idle behavior and switch to a lower power consumption state. By monitoring software applications from within the operating system, BatteryMAX is able to reduce the time taken to detect idle behavior from minutes to microseconds. Moreover, it can switch power states around 18 times a second between a user's keystrokes. The technique was named Dynamic Idle Detection and includes halting, or stopping the CPU for periods of just a few microseconds until a hardware event occurs to restart it. DR DOS 5.0 in 1990 was the first personal computer operating system to incorporate an idle detection system for power management. It was invented by British engineers Roger Alan Gross and John P. Constant in August 1989. A US patent describing the idle detection system was filed on 9 March 1990 and granted on 11 October 1994. Despite taking an early lead and having the protection of a patent, BatteryMAX did not enjoy significant commercial success having been sidelined after the disarray that followed the integration of Digital Research into Novell, Inc. in 1991. It was not until 1992, some three years after the invention, that software power management under operating system control became ubiquitous following the launch of Advanced Power Management (APM) by Microsoft and Intel. Functional overview BatteryMAX uses the technique of dynamic idle detection to provide power savings by detecting what the application is doing (whether it is idle), and switching power states (entering low power mode) therefore extending the battery life of the product. BatteryMAX employs a layered model of detection software encapsulated into an DOS character device driver called $IDLE$ that contains all the hardware-dependent code to support dynamic idle detection. It can either be linked into the DR-DOS operating system BIOS or loaded dynamically using the CONFIG.SYS DEVICE directive, overloading the built-in default driver. All versions of DR-DOS since version 5.0 have contained dynamic idle detection support inside the operating system kernel. When the operating system believes an application is idle, it calls the $IDLE$ BIOS/driver layer, which executes custom code written by the computer manufacturer or third parties to verify the request and switch power states. Using the device driver concept, BatteryMAX can be integrated with hardware-related power management facilities, which might be provided by the underlying hardware, including interfacing with APM or ACPI system BIOSes. Power states are computer dependent and will vary from manufacturer to manufacturer. Power savings can be made in a number of ways including slowing/stopping the processor clock speed or shutting off power to complete sub-systems. Before switching power states, the $IDLE$ driver uses any available hardware assistance to detect if the application has been accessing other components in the system. For example, the application may be polling a serial port, or updating a graphics screen. If this is the case, the device driver determines that the application is not in fact idle and overrides the kernel's call to switch power states by passing information back up the layers and allowing application execution to resume. COMMAND.COM in DR DOS 5.0 and higher implements an internal command IDLE taking ON|OFF parameters to enable or disable the dynamic idle detection. Detecting when an application is idle An application is idle if it is waiting for some external event to occur, for example for a keystroke or a mouse movement, or for a fixed amount of time to pass. The DR-DOS kernel monitors all DOS API calls building up a profile of the applications behavior. Certain combinations of API calls suggest that the application is idle. The $IDLE$ driver is able to make the subtle distinction between a program that is genuinely idle, for instance one that is polling the keyboard in a tight loop, and one that is active but also polling the keyboard, to test for an abort key to be pressed. The driver makes this distinction by monitoring the time taken to go idle. If the time is within a specified period, the driver assumes that the program is idle, e.g. polling in a tight loop for a key to be pressed. If the time is outside the specified limit, the driver assumes that some processing has occurred in between polling the keyboard, and allows application execution to resume without switching power states. A local variable, IDLE_CNTDN, specifies the time against which the actual time taken to go idle is compared. The value for this variable is dynamically calculated at initialization and recalculated periodically. Origins of BatteryMAX The idle detection technique was first used to improve multi-tasking of single-tasking DOS applications in Digital Research's multi-tasking/multi-user Concurrent DOS 386 (CDOS386) operating system. Programs written for single-tasking operating systems such as MS-DOS/PC DOS can go into endless loops until interrupted; for example when waiting for a user to press a key. Whilst this is not a problem where there is no other process waiting to run, it wastes valuable processor time that could be used by other programs in a multi-tasking/multi-user environment like CDOS386. Applications designed for a multi-tasking environment use API calls to "sleep" when they are idle for a period of time but normal DOS applications do not do this so idle detection must be used. The Concurrent DOS 386 release included an Idle Detection function in the operating system kernel which monitored DOS API calls to determine whether the application was doing useful work or in fact idle. If it was idle, the process was suspended allowing the dispatcher to schedule another process for execution. Patent litigation BatteryMAX and the "idle detection" patent played an important role in an alleged patent infringement relating to software power management under operating system control. On 15 May 2009, St. Clair Intellectual Property Consultants. filed civil action No. 09-354 in the United States District Court D. Delaware, against defendants Acer, Dell, Gateway and Lenovo and on 18 September 2009 filed civil action No. 09-704 against Apple, and Toshiba The actions alleged infringement of several U.S. patents that they owned relating to software power management under operating system control. St. Clair asserted that Henry Fung had invented software power management under operating system control and alleged that these companies had infringed St. Clair's patents and therefore owed St. Clair royalty payments. Microsoft intervened on behalf of the defendants and filed a declaratory judgment against St. Clair on 7 April 2010, seeking judgments of non-infringement and invalidity of the Fung patents. (D.I. 1, C.A. No. 10-282). Intel filed an intervention on behalf of the defendants and this was granted on 4 June 2010 (D.I. 178, C.A. No. 09-354). Seattle law firm Perkins Coie, acting for the defendants, discovered BatteryMAX and Gross's idle detection patent during a prior art search. Gross's patent had an earlier priority date than Fung's patents which if proven would undermine St. Clair's case. On 28 February 2011, Gross was hired by Intel as a subject matter expert to provide expert witness testimony for the defendants in the case. Gross provided evidence in his expert report that he, not Fung, had invented software power management under operating system control and sited the Idle Detection patent and the existence of BatteryMAX as proof of this. St. Clair filed a motion to exclude opinions concerning BatteryMAX, in an attempt to have Gross's expert report dismissed, but on 29 March 2013, the district court denied St. Clair's motion declaring Gross's testimony for the defendants as admissible, stating that "The Court agrees with Defendants that there is sufficient corroborating evidence that BatteryMAX was available to the public prior to the Fung patents' priority date. Further, the Court concludes that even if BatteryMAX did not predate the Fung patents, Mr. Gross's testimony […] would be relevant and helpful to the fact finder in an obviousness inquiry”. See also Advanced Power Management (APM) Advanced Configuration and Power Interface (ACPI) References External links DOS technology Digital Research Battery (electricity)
22531284
https://en.wikipedia.org/wiki/List%20of%20aircraft%20accidents%20at%20Eglin%20Air%20Force%20Base
List of aircraft accidents at Eglin Air Force Base
This is a partial list of aviation accidents at Eglin Field/Eglin Air Force Base, Florida or involving Eglin-based aircraft. 1930s August 5, 1935 – Boeing P-12C, 31-186, of the Army Air Corps Tactical School, Maxwell Field, Montgomery, Alabama, piloted by Edward E. Hildreth, suffers a landing accident that results in a ground loop causing moderate damage. Repaired. March 29, 1936 – Curtiss A-3B Falcon, 30-233, of the Air Corps Tactical School, Maxwell Field, Alabama, crashes near Crestview, Florida after engine failure, this date. Pilot Capt. Benjamin W. Chidlaw and mechanic Pvt. John L. Hammack bail out, becoming Caterpillar Club members 779 and 780. "In the various reports submitted by Caterpillar Club members, reciting their experience while undergoing initiation, most of them stated that their feelings and reactions were normal throughout the incident. Captain Chidlaw asserted that, after he felt sure that his mechanic, whom he had ordered to jump, had gone about that business in approved style, his feelings were more of an annoyance that such an event had to happen rather than any feelings of fear or apprehension either because of the fire or because of the necessity for jumping." July 25, 1936 – Keystone B-4A, 30-346, (built as Y1B-4 and upgraded) of the 54th Bomb Squadron, Maxwell Field, Alabama, wrecked in takeoff accident at the Valparaiso Bombing Range. Pilot was 2d Lt. Herman A. Schmid, Air Reserve. February 5, 1937 – Boeing P-12C, 31-185, of the 91st School Squadron, Maxwell Field, Montgomery, Alabama, piloted by Capt. William C. Goldsborough, suffers a landing accident at the Valparaiso Bombing and Gunnery Base that results in a ground loop causing moderate damage. 2d Lt. Goldsborough had been badly injured on 9 October 1919, and pilot 1st Lt. Edwin V. Vales killed, in the crash of a DH-4B that hit the side of a mountain W of Cheyenne, Wyoming during the first (and only) transcontinental reliability and endurance test. August 22, 1937 – Douglas O-25A, 30-174, c/n 681, of the 105th Observation Squadron, Tennessee National Guard, out of Sky Harbor Airport, Murfreesboro, Tennessee, suffers non-fatal landing accident-ground contact at Valparaiso Bombing and Gunnery Range, and is destroyed. Pilot was John Oman, III. August 22, 1937 – Douglas O-25A, 30-372 (serial is in doubt – O-25A serial block ended at -370; 30–372 ties up to Fleet YPT-6), of the 105th Observation Squadron, Tennessee National Guard, out of Sky Harbor Airport, Murfreesboro, Tennessee, suffers landing accident-ground contact at Valparaiso Bombing and Gunnery Range, and is destroyed. Pilot was George W. Noland. August 26, 1937 – Boeing P-12C, 31-184, of the 91st School Squadron, Maxwell Field, Montgomery, Alabama, piloted by Paul T. Cullen, is moderately damaged in a landing accident at Eglin Field. On Friday March 23, 1951, Brig. Gen. Cullen, is lost in the crash of C-124 Globemaster II, 49–244, c/n 43173, of the 2d Strategic Support Squadron, Strategic Air Command, en route from Gander, Newfoundland to RAF Mildenhall, missing over the Atlantic Ocean; wreckage found near Ireland. 53 went MIA, including Gen. Paul T. Cullen and his command staff, en route to his headquarters of the newly activated 7th Air Division, SAC, at South Ruislip, London, England. Cullen had been deputy commander of Barksdale Air Force Base, Louisiana. July 27, 1938 – Douglas O-38E, 33-11, of the Missouri National Guard, Lambert Field, Anglum, Missouri, is damaged in a landing accident resulting in a nose-over at the Bombing Range, Eglin Field, Florida. Pilot was Paul A. Zartman. January 18, 1939 – Seversky P-35, 36-376, of the 27th Pursuit Squadron, 1st Pursuit Group, Selfridge Field, Mt. Clemens, Michigan, receives moderate damage when it suffers a landing accident at Eglin Field, resulting in a ground loop. Pilot was Murray C. Woodbury. May 13, 1939 – North American O-47A, 37-309, of the 3d Observation Squadron, Langley Field, Hampton, Virginia, piloted by John R. Marshall, suffers moderate damage in a landing accident at Eglin Field. July 15, 1939 – Consolidated PB-2A, 35-18, of the 91st School Squadron, Maxwell Field, Alabama, flown by Milo N. Clark, suffers moderate damage in a landing mishap at Eglin Field. December 6, 1939 – A Curtiss P-36C Hawk, 38–190, of the 1st Pursuit Squadron (Single Engine), Maxwell Field, Alabama, piloted by Eugene L. Strickland, ground loops upon landing, suffering moderate damage. 1940s March 7, 1940 – Martin B-10B, 34–52, c/n 583 B-10M, of the 12th Observation Squadron, Godman Field, Fort Knox, Kentucky, piloted by William A. Daniel, receives moderate damage in a takeoff accident at Eglin Field, this date. Repaired, according to Joe Baugher, it suffers another landing accident on January 2, 1942, and is damaged again at Godman Field in a further incident on February 15, 1942. December 7, 1940 - Wyatt P. Exum suffers taxi accident due to mechanical failure at Eglin Field in Curtiss P-36C, 38-188, of the 1st Pursuit Squadron, Orlando Army Air Base, Florida. Moderate damage, repaired. Airframe will be written off in landing accident June 16, 1942 at Luke Field, Arizona. January 5, 1941 – Consolidated PB-2A, 35–48, of the 54th Support Squadron, 61st Air Base Group, suffers landing accident at Eglin Field, suffering minor damage. Pilot was George L. King. February 2, 1941 – Douglas B-23 Dragon, 39-27, c/n 2713, based at Wright Field, Ohio, squadron given as MD111 (?), damaged on landing at Eglin Field. Pilot was Douglas M. Kilpatrick. Struck off charge on April 9, 1942. June 5, 1941 – A Waco YPT-14, 40-14, c/n 5300, the first of 13 service test craft, of the 54th Support Squadron, Air Proving Ground, suffers a takeoff accident at Eglin Field, suffering moderate damage. Pilot was George L. King. July 9, 1941 – A Douglas SBD-1 Dauntless, BuNo 1748, flown by Lt. John L. Zoeckler, suffers moderate damage in a taxiing accident at Eglin Field. This was the Marine Corps version without self-sealing fuel tanks, only 57 of which were built. Zoeckler will retire with the rank of general in 1969. October 9, 1941 – "Flying Cadet W. H. Snyder, stationed at Gunters Field [sic], Alabama was killed here (Crestview, Florida) when his plane (BT-13 Valiant, 40-1064, of the 85th Support Squadron,) crashed in a black-jack thicket near the new CAA airport Thursday morning. He was brought to Enzor Brothers Hospital following the crash and died at about 4:00 Thursday afternoon from his injuries. Snyder was one of two groups of 30 planes each from Gunters [sic] Field here on a routine training flight, Mr. B. M. Dove, in charge of the CAA airport said. 'His plane apparently developed motor trouble as he was preparing to land and the plane crashed before he could reach the field', Mr. Dove said. Henry Spencer and his brother, Jason, who live within 300 yards of the scene of the accident were watching the plane when it went into its fatal dive. 'I was looking right at him", Henry Spencer said, 'He was flying along pretty low and suddenly made a dive for the ground. His plane tore out the top of a large oak tree before he hit the ground; He was going mighty fast and his motor seemed to be going at full speed', he declared. The Spencer brothers were the first to reach the scene and found the pilot badly injured and bleeding about the head. They did not atempt [sic] to remove him from the tangled wreckage until Army ground units arrived a few minutes later." It was reported that Snyder was "an English student flyer but this statement could not be verified by Army officers who referred all questions to the public relations department at Gunters [sic] Field. The plane was so badly damaged that it could not be repaired and a wrecking crew from Eglin Field were dismanteling [sic] it late Thursday for salvage." December 2, 1941 – North American AT-6A-NA Texan, 41-321, c/n 77-4280, of the 5th Air Base Squadron, Barksdale Field, Louisiana, piloted by Thomas T. Wyete, is struck off charge after the engine fails on take off from Eglin Field, this date. Pilot survives. December 2, 1941 – North American AT-6A-NA Texan, 41-608, of the 83d School Squadron, Maxwell Field, Alabama, suffers moderate damage when it ground loops upon landing at Eglin Field. Pilot was Stanley Holden. January 2, 1942 – 2nd Lt. Garland O. Peel Jr., is killed in the 1024 CWT take-off crash of Martin B-12AM, 33-262, c/n 550, of the 387th School Squadron, when he suffers starboard engine failure, coming down in a heavily wooded area N of the field and exploding. He was a gunnery school instructor at Eglin. Peel Field, Auxiliary Field 4, is named for him and is later utilized for the filming of scenes for the 1944 film Thirty Seconds Over Tokyo. January 19, 1942 – B-25C-1 Mitchell, 41-13118, crashes into the Gulf of Mexico 2 miles S of Destin, Florida killing pilot George E. Pierce. Joe Baugher cites date of October 19, 1942 for loss. Eglin Auxiliary Field 2 is named Pierce Field in his honour. February 2, 1942 - Curtiss P-40E, 40-605, of the 1st Pursuit Section, Air Proving Ground Command, crashes offshore in the Gulf of Mexico 2 miles E of Pensacola Beach, Florida, after pilot Wyatt P. Exum, of Galax, Virginia, suffers engine failure, bails out. Joe Baugher states that the pilot ditched. On September 1, 1944, Exum, flying P-51s with the 4th Fighter Squadron, will make "what was probably the first successful pickup of a downed P-51 pilot by his buddy" when he lands in Rumania to rescue Lt. Charles Wilson, downed by an exploding locomotive, both flying home with the canopy open. Exum receives the Silver Star. March 4, 1942 – "Two Eglin Field Army flyers, Lt. John W. Smith and 2nd Lt. Richard Edward Baldsiefen, 23, were killed in a plane crash near Eglin Field Wednesday. Details of the accident were not learned today. The bodies were taken to a Pensacola funeral home." Baldsiefen was a gunnery instructor at Eglin. Eglin Auxiliary Field 8 is later named Baldsiefen Field. Their AT-6A Texan, 41-528, came down at Auxiliary Field 4. March 10, 1942 - North American B-25B Mitchell, 40-2254, assigned to the B-25 Project Detachment, Air Proving Ground Command, Eglin Field, is written off in a landing accident at Ellington Field, Texas. Pilot was 1st Lt. Richard Outcault Joyce (0-401770). This was part of the Doolittle Raid preparation and Lt. Joyce piloted plane number 10, B-25B, 40-2250, on that mission. This aircraft was the only one to take hits from anti-aircraft fire during the attack. Joyce retired as a lieutenant colonel on May 13, 1955. March 21, 1942 – P-40E Warhawk, 40-603, wrecked in taxi accident at Eglin Field. March 23, 1942 – B-25B Mitchell, 40-2291, piloted by 1st Lt. James P. Bates, crashes on take-off from Auxiliary Field No. 3 during training for the planned Doolittle Raid on Japan. This aircraft did not participate in the mission. Some sources state that Bates deployed with the Raiders aboard the but did not fly the mission, but Gen. Doolittle said in his autobiography that the pilot did not deploy with the unit on the carrier Hornet. October 6, 1942 – Capt. Anthony D. Piccolo, commanding officer of the 386th Single Engine Gunnery Training Squadron at Eglin Field, is KWF this date when AT-6A-NT Texan, 41-16372, stalls and spins in at Auxiliary Field 5. This satellite field is subsequently named in his honour as Piccolo Field. October 14, 1942 - Morris Shacther in North American AT-6A Texan, 41-467, of the 910th School Squadron, Craig Field, Alabama, collides at Eglin Field with parked AT-6A, 41-317, of the same unit. November 16, 1942 – Douglas A-24-DE Banshee, 41-15748, of the Air Proving Ground, piloted by Raymond L. Hodges, is damaged in a landing accident at Eglin Field. Repaired, the aircraft will be reclassified to CL-26 status on January 12, 1944. November 26, 1942 – Eglin Field headquarters announced on Monday November 30, 1942 that an Army plane [type not given] on a cross country flight crashed this date between Crestview, Florida and Pensacola, Florida, killing all three men on board. KWF were pilot 1st Lt. Duncan C. Murphy, son of Hugh Murphy, 1700 Twenty-first Avenue, St. Petersburg, Florida; co-pilot 2nd Lt. Albert J. Wieland, son of A. D. Wieland, Norton, Kansas; and Sgt. Herbert C. Wade, son of Mrs. Nancy Adeline Wade, Route 1, Big Stone Gap, Virginia. The cause of the crash was not known and an investigation is underway, a public relations officer said. The B-26B Marauder, 41-17704, probably of the 54th Bomb Squadron, came down 25 miles N of Pensacola, Florida. November 29, 1942 – Lt. Col. Boyd David "Buzz" Wagner, 26, from Emeigh, Pennsylvania (October 31, 1916 – November 29, 1942), the first USAAF ace of World War II (8 confirmed victories), is killed in the crash of a factory-fresh P-40K-15-CU Warhawk, 42-10271, 25 miles E of Eglin Field on a flight to Maxwell Field, Alabama. He departed Eglin and then was not heard from again. The search for the missing plane took at least four days. He was the recipient of the Distinguished Service Cross, the Distinguished Flying Cross, and the Purple Heart. The wreckage was discovered 5 miles N of Freeport, Florida in January 1943. December 14, 1942 – North American A-36A Apache, 42-83666, c/n 97-15884, of the Air Proving Ground Command, crashes this date on Range 52 due to structural failure, killing pilot Herman E. Watters. May 2, 1943 – P-38G-13-LO Lightning, 43–2227, piloted by Clyde M. Adams, is flown into the water of the Gulf of Mexico, three miles S of Tower Beach, Santa Rosa Island, Florida, killing pilot. May 5, 1943 - North American AT-6C-NT Texan, 42-3962, c/n 88-11567, of the 92d Single Engine Flying Training Squadron, Craig Field, Alabama, flown by Anthony Karahalios, collides with a tow-target over Eglin Field Range 1A; heavily damaged. May 17, 1943 - Two North American AT-6C-NT Texans, of the 691st Single Engine Flying Training Squadron, Marianna Army Airfield, Florida, collide over Eglin Range 30, with both crashing. John H. Fogarty bailed out of 41-32701, c/n 88-10976, after it and 41-32704, c/n 88-10979, flown by Albert Powers, struck each other in flight. The disposition of Powers is unclear. May 17, 1943 - Curtiss P-40M-5-CU Warhawk, 43-5486, c/n 27174, of the 445th Fighter Squadron, 50th Fighter Group, Orlando Army Air Base, Florida, is heavily damaged in a landing accident at Eglin Field, Florida. Pilot was William A. Sheppard. 23 July 1943 - North American AT-6C-15-NT Texan, 42-48883, c/n 88-12793, of the 890th Single Engine Flying Training Squadron, Tuskegee Army Airfield, Tuskegee, Alabama, piloted by Claybourne A, Lockett, receives moderate damage when it ground loops on landing at Eglin Field. Joe Baugher lists the demise of this aircraft as happening 17 August 1944, six miles N of Roswell, Georgia. August 19, 1943 – North American A-36A Apache, 42-83669, c/n 97-15887, piloted by Frank M. Fazio, suffers moderate damage in a taxi accident at Eglin Field, this date. Repaired, it will be disposed of to the RFC at Albuquerque, New Mexico, on July 18, 1945. October 1, 1943 – After flying combat missions from Great Britain and receiving the Distinguished Flying Cross (DFC), Lieutenant Donald Wilson Hurlburt was assigned in mid-1943 to the First Proving Ground Electronics Test Unit at Eglin Field. He died this date when his Lockheed AT-18-LO Hudson gunnery trainer, 42-55591, c/n 414-7313, crashed during take-off at Eglin. Eglin Auxiliary Field 9 was named Hurlburt Field in his honor by Eglin base commander General Grandison Gardner. Hurlburt's nephew was Captain Craig D. Button (noted for his mysterious flight and crash of an A-10 Thunderbolt on April 2, 1997). An official history of Eglin AFB's early years cites October 2, 1943 as the date of this accident, and also notes that Capt. Barclay H. Dillon, test pilot of the Fighter Section of the 1st Proving Ground Group, died in another accident the same date. His P-38J-5-LO Lightning, 42-67103, crashed 8 miles W of Milton, Florida. Auxiliary Field No. 10 was later named Eglin Dillon Airdrome, now more commonly known as Naval Outlying Landing Field Choctaw. October 10, 1943 – Maj. Walter J. Wagner, former commanding officer for the 1st Proving Ground, Eglin Field, is killed in crash of AT-6C-NT Texan, 41-32187, c/n 88-9677, at Auxiliary Field 2, this date. Auxiliary Field No. 1 is named Wagner Field in his honour. October 19, 1943 – Former American Volunteer Group ground crewman who became a pilot, Donald L. Rodewald, crashes a North American P-51B-1-NA Mustang, 43-12099, c/n 102-24547, of the 1st Proving Ground, at Eglin Field this date in a forced landing after he runs out of fuel. He served as an aircraft armorer for the first Pursuit Group at Selfridge Field, Michigan after which he was sent to China to serve with the Flying Tigers, the American Volunteer Group (AVG). He served there also as an enlisted armorer, but in July 1942 he received a field commission and became the armament officer for his group. Rodewald returned to the United States in December 1942 to enter pilot training, receiving his wings in September 1943. He was assigned to Eglin Field as a flight test pilot in armament, and will work with P-5ls that are to be used as fighter escorts for B-29 flights to Japan. October 21, 1943 - Maj. Walter John Wagner and Corp. Harold J. Dietz were both killed when their plane crashed while on a regular routine flight. January 8, 1944 – 1st Lt. Andrew Biancur, a test pilot of the Medium Bombardment Section of the 1st Proving Ground Group, is killed in crash of YP-61-NO Black Widow, 41-18883, c/n 711, at Eglin Field this date. Auxiliary Field 6 is later named Biancur Field in his honour. January 18, 1944 - North American AT-6A-NT Texan, 41-16330, of the 809th SEGTS, 1st SEGTG, flown by Harry W. Christman, suffers structural failure at Eglin Field. January 19, 1944 – YB-29-BW Superfortress, 41-36956, assigned to the 40th Bombardment Group, Wright Field, Ohio, is heavily damaged in ground accident at Eglin Field. Pilot was Jack H. Summers. January 28, 1944 – Col. Robin E. Epler, deputy commander (Technical) of the Air Proving Ground, Eglin Field, is killed this date in crash of A-20G-10-DO Havoc, 42-54016, one mile NE of Crestview, Florida. Auxiliary Field No. 7 is named Epler Field in his honour. March 9, 1944 – Captured Focke-Wulf Fw 190A-3, EB-101, piloted by Lt. Col. Tarleton H. Watkins, crashes at Eglin Field this date when it strikes parked P-47D-10-RE Thunderbolt, 42-75130 while taxiing. Brakes failed. This was pilot's first time in the Fw 190, but other pilots had flown it for 46 hours. April 8, 1944 – Aeronca L-3C Grasshopper, 43-1742, of the 610 Air Base Unit, piloted by Arthur G. Phillips, is damaged in a landing accident. Repaired. October 10, 1944 – First Fisher P-75A-1-GC Eagle, 44-44549, crashes on flight test out of Eglin Field, Florida, when propellers apparently run out of oil, pilot Maj. Harry R. Bolster attempts dead-stick landing but crashes short on approach, dies. Bolster was a former fighter pilot with the American Volunteer Group with one confirmed Flying Tigers aerial victory. October 22, 1944 – Second of only two Bell XP-77-BE lightweight fighters completed out of a contract for six, 43-34916, crashes when pilot Barney E. Turner attempts an Immelmann turn resulting in an inverted spin during testing at the Air Proving Ground, Eglin Field, Florida. November 10, 1944 – Republic P-47D-22-RE Thunderbolt, 42-26172, to TP-47D, of the 2116th Base Unit (?) -, Eglin Field, suffers moderate damage in a taxi accident at Auxiliary Field 4, this date. Pilot was William E. Keller. Repaired, this airframe will be written off in a crash S of Crestview on June 6, 1945. 5 December 1944 -North American AT-6C-15-NT Texan, 42-48871, c/n 88-12781, of the 2133d Base Unit, Napier Field, Dothan, Alabama, piloted by Bernard R. Staples, is written off in a crash landing at Eglin Field, this date. March 31, 1945 – Donald L. Rodewald crash belly lands a P-51D-25-NA Mustang, 44-72717, c/n 122-39176, of the 610th Base Unit, Eglin Field, 2.5 miles S of Green Bay, Wisconsin, after mechanical failure. April 26, 1945 – Consolidated B-32-5-CF Dominator, 42-108484, of the 611th Base Unit, Wright Field, piloted by Ernest B. Wilson, suffers damage in a fire at Eglin. Another source lists the pilot as APGC crew Ken Eidnes, who stated that at the end of a one-hour-55-minute flight, "we landed with one engine on fire. I jumped out of the plane as it was rolling to a stop to get as far away as possible." The ground crews had been alerted that there was a fire on board and were standing by. They rushed up to the aircraft and were able to extinguish the fire before major structural damage took place. All crew escaped without injury, except for the pilot who suffered a skinned finger on evacuating. April 28, 1945 – A-26C-25-DT Invader, 43-22644, assigned to the 611 Base Unit at Wright Field, Ohio, crashes into the Choctawhatchee Bay, 3 Miles NE of Fort Walton, Florida after being struck by a spherical Speedee bouncing bomb, a 35-in [89 cm] casing with [an overall weight] of 950 lb [431 kg]. This was the American nomenclature for the British Highball bomb, twenty-five inert casings of which were sent to the U.S. after initial testing with a modified A-26 which was adapted at the Vickers experimental facility at Foxwarren, near Esher, Surrey. Dropped at low altitude (~10 feet), the weapon skipped back into the aircraft completely knocking off the tail unit causing the bomber to nose over instantly and crash into the bay. It had taken off from Eglin Field, Florida, on a low level bombing exercise at AAF water range Number 60. Footage: https://www.youtube.com/watch?v=TcoBw1Gb_Ik May 29, 1945 – A Mitsubishi Ki-46 Type II "Dinah", c/n 2846 (?), 'TAIC 10', from Naval Air Station Anacostia, D.C., piloted by Glenn W. Knight, suffers damage in a taxi accident at Eglin Field. June 19, 1945 - Five men were killed when their army plane crashed near Crestview, Florida, Tuesday (this date), the Associated Press reported on June 21. The plane, en route from Eglin Field to Myrtle Beach Army Airfield, South Carolina, came down in a storm, stated officials at Marianna Army Airfield, Florida. "First Lt. Joseph A. McGinnis, 24, the pilot, was from the Marianna base. He was the son of Joseph A. McGinnis of Philadelphia. The others, all stationed at Myrtle Beach were:" First Lt. Lawrence F. Schirmer, 25, Sacramento, California; T-Sgt. William J. Koger, 25, husband of Mary G. Koger of Louisville, Georgia; T-Sgt. William H. Epperson, 25, Evanston, Illinois; and S-Sgt. George L. Simmons, 26, Lakeland, Florida. "McGinnis was an instructor pilot with more than 1,200 hours of flying time and combat experience with the Canadian air force before U. S. entrance in the war, and with the American air corps in North Africa, Sicily and Italy." The Aviation Archaeological Investigation and Research site lists Douglas A-26C Invader, 44-35024, of the 137th Base Unit, as crashing on this date, but that serial ties up to an A-26B Invader. Further, the site lists the pilot as Joseph A. McGlens, Jr., and the crash location as Myrtle Beach, in direct contradiction to the Associated Press account. July 9, 1945 – Douglas A-26B-35-DL Invader, 41-39484, c/n 7197, of the 611th AAF Base Unit, Air Proving Ground Command, Eglin Field, piloted by Harold J. Bowen, is involved in a taxiing accident with a static North American B-25J-27-NC Mitchell, 44-30498, of the same unit. May 17, 1946 – A Beech C-45F-BE Expeditor, 44-87191, c/n 8450, of the 610 AAF Base Unit, Eglin Field, en route from Nashville, Tennessee, to Cleveland Army Air Base, Ohio, suffers fuel exhaustion while awaiting clearance to land and crashes into Lake Erie, ~one mile N of Bay Village, Ohio, NW of Cleveland. The pilot, 1st Lt. Robert S. Hersch, also reported as Robert S. Hirsch, ordered the five others on board to bail out before the twin-engined aircraft came down in the lake, four of six total parachuting safely. Pilot Hersch, Capt. Robert D. Price, passenger, Pfc. Anthony J. Pinto, passenger, and engineer M/Sgt. William B. Robinson all survive. Two on board remained missing, although dragging the lake had successfully recovered the airframe. Not recovered were Capt. William K. Ramser, co-pilot, of 1821 Delabine Street, Santa Barbara, California, and passenger 1st Lt. Lawrence H. Brannon, of 3031 Drexel Drive, Toledo, Ohio. July 5, 1946 – Douglas A-26C-25-DT Invader, 43-22693, of the 611th AAF Base Unit, Air Proving Ground Command, Eglin Field, piloted by Leslie L. Mondelli, suffers major damage in a landing accident at Eglin this date. July 22, 1946 – Lockheed P-80A-1-LO Shooting Star, 44-85149, of the 611th AAF Base Unit, Air Proving Ground Command, flown by Barney E. Turner, suffers heavy damage in a forced landing at Eglin due to engine failure. Written off. July 26, 1946 – The crash of an L-5E Sentinel, 44-17844, during a routine flight out of Eglin Field, Florida, kills Capt. Russell H. Rothman, originally of Chicago, Illinois, when the liaison aircraft crashes 17 miles NW of Valparaiso, Florida. Rothman, who entered the service September 16, 1941 and had flown 800 hours in C-46 Commando and C-47 Skytrain transports in the European Theatre of Operations, had only recently been appointed to a regular commission in the Regular Army. He held the Unit Citation, the Air Medal with three clusters, the European and Middle East Theatre of Operations Ribbon, the American Defense Ribbon and the World War II Victory Medal. He is survived by his widow, Mrs. Eleanor E. Rothman, of 26 Shalimar Court, Shalimar, Florida, and his parents, Mr. and Mrs. Alfred H. Rothman of Chicago. August 11, 1946 – TB-25J-25-NC Mitchell, 44-29971, c/n 108-33246, of the 611th Base Unit, Air Proving Ground Command, Eglin Field, sustains heavy damage in a crash landing at Eglin this date. Pilot was Howard H. Kaiser. Reclamation completed at Eglin Field November 20, 1946. January 10, 1947 – An Army Douglas A-26C-25-DT Invader, 43-22697, of the 308th AAF Base Unit, Air University, Tyndall Field, Florida, crashed 16 miles NW of Eglin. The pilot Capt. Robert W. McCulla of East Orange, New Jersey, and one passenger, Pfc. Oliver Banks of Nashville, Tennessee, were killed. Major J. S. Wallace, also a passenger, parachuted to safety. Army officials said the plane left Barksdale Field, Louisiana, at 4:55 a.m. and was due at Tyndall Field, Florida, at 7:10 a.m. when it crashed 45 minutes later in the woods between Eglin Auxiliary Fields 4 and 7. It was flying at an altitude of 2,000 feet and had radio contact with Brookley Field, Alabama, tower, when both motors stopped at once. McCulla and Wallace were stationed at Tyndall; Banks, on a five-day pass before getting discharged, was stationed at MacDill Field, Florida. Banks had obtained a ride at Barksdale.Fort Walton, Florida, "Bomber Crash Fatal for Two", Playground News, Saturday January 16, 1947, page 5. January 20, 1947 – Lockheed FP-80A-5-LO Shooting Star, 44-85481, c/n 080-1504, of the 12th Reconnaissance Squadron, 363d Reconnaissance Group, assigned at March Field, California, piloted by Jack T. Bradley, is damaged in a landing accident at Eglin Field, this date. Repaired, it will be written off in California on January 26, 1949. March 21, 1947 – A P-80A-1-LO Shooting Star, 44-85286, of the 610 AAF Base Unit, Eglin Field, Proving Ground Command, piloted by David L. Henderson, suffers moderate damage after suffering structural failure in the Eglin Field area. Written off. April 28, 1947 – North American P-82C-1-NA Twin Mustang, 44-65169, c/n 123-43755, of the 611th AAF Base Unit, Proving Ground Command, Eglin Field, suffers major damage in a landing accident (undercarriage failure?) at the base this date. Pilot was Leonard F. Koehler. This airframe was a conversion of 10th P-82B to a P-82C night fighter with an SCR-720 radar in a pod mounted under the centre wing section. Redesignated ZF-82C-1-NA in 1948. April 29, 1947 – Three Eglin Field men were listed as missing following the crash of an Army B-17 Flying Fortress while on a routine training flight about five miles south of Destin, Florida, the Playground News reports on 5 May. Four members of the seven-man crew bailed out and three were picked up by Eglin rescue craft. The fourth man was rescued by a local fishing boat. The three crew members listed as missing were: 1st. Lt. High R. Burns, Scranton, Pennsylvania; 1st. Lt. Raymond W. Duffy, Louisville, Kentucky, and Staff Sgt. Joseph W. Willcoxen, San Diego, California. The Aviation Archaeological Investigation & Research (AAIR) website lists the loss of TB-17G, 44-6388, c/n 22611, built as a B-17G-50-DL, of the 1st Experimental Guided Missiles Squadron, Air Proving Ground Command, piloted by Hugh R. Burns, as crashing 2 miles S of Destin on May 8, 1947, a date repeated by Joe Baugher. If, however, the reported date of the account of the accident by the Playground News is correctly 5 May, then the May accident date is suspect and April 29 seems more likely. Furthermore, the bail-out incident over the Gulf of Mexico reported to have occurred May 27, 1947 by Lt. Lawrence Taylor Biehunko and his crew from the aircraft they are testing (type not specified) when it suffers an engine fire, sounds exactly like the details of the TB-17G loss. After treading water without a Mae West for over thirty minutes, he is picked up by a fishing boat. In that account, four of his crew are lost to drowning. On June 8, 1947, Biehunko is made a member of the Caterpillar Club because of an emergency parachute jump from the burning aircraft. Lt. Col. Biehunko, USAF (Ret.), rated a Senior Pilot with 8500 hours flying time in 31 different military aircraft, died August 19, 2010, and is interred in Moulton City Cemetery, Moulton, Texas. He had been an aircraft commander on a B-17 which gathered data for scientists who were assigned to the Marshall Islands during Operation Crossroads in 1946. After completing that assignment, the Radio Control B-17 unit returned to Field 9 at Eglin to undergo further training. The unit later returned to Eglin, and in January 1947 he participated and tested aircraft equipment under the cold weather conditions at Ladd Air Force Base, Alaska. May 6, 1947 – A TP-51H-5-NA Mustang, 44-64344, flown by Major Wayne Patton of the Eglin Field fighter section crashed into the base library at Eglin Field during a belly-landing due to engine failure. Medical authorities reported his condition as satisfactory. After leaving military service, Patton will become a local real estate developer, creating a residential neighborhood in a previously forested area of the Ocean City area of the Fort Walton Beach community. The Patton Agency remains in business in 2013. May 8, 1947 – Beechcraft C-45F Expeditor, 44-87265, of the 611th AAF Base Unit, Proving Ground Command, Eglin Field, piloted by Carl T. Goldenberg, suffers moderate damage in a belly landing at Eglin Field, this date. May 9, 1947 - A Tyndall Field A-26 twin-engine attack bomber crashed on a flight from Barksdale Field, La., back to Tyndall Field. The crash occurred at 7:55 p.m., 16 miles northwest of Eglin Field. Capt. Robert W. McCulla, pilot, and passenger Pfc. Oliver Banks died in the crash. Major J.S. Wallace parachuted to safety. May 9, 1947 – North American TB-25J, 44-30060, built as B-25J-25/27-NC, of the 611th AAF Base Unit, Proving Ground Command, Eglin Field, receives moderate damage in a taxi accident at Eglin, this date. Pilot was Robert P. Zoppi, Jr. Reclamation of this airframe will be completed at the base on July 19, 1949. July 25, 1947 – First (of two) North American XP-82 Twin Mustangs, 44-83886, c/n 120-43742, of the 611 AAF Base Unit, piloted by Jesse G. Oliver, crash lands at Eglin Field, Florida. Repaired, it will be transferred to NACA on June 6, 1948, and operated until October 5, 1955, after which it is salvaged at Langley AFB, Virginia. July 29, 1947 – Nine crew are killed and two injured in a failed take-off attempt by a B-29-45-MO Superfortress, 44-86307, from Eglin Field, Florida at 0813 hrs., the bomber coming down ~300 yards N of the main base near Valparaiso, Florida and burning. Killed were instructor pilot Capt. Gordon W. Barrett, of Pittsfield, Massachusetts, a West Point graduate who was awarded the DFC while flying B-29s in World War II; pilot 1st Lt. Huddie C. Bagley of Braufield, Texas; co-pilot Capt. Robert M. Seldomridge of Lancaster, Pennsylvania; navigator 1st Lt. Joseph A. Anderson, Shalimar, Florida; navigator 1st Lt. Milton Rose, Fort Walton, Florida; engineer Master Sgt. Michele Aulicino, Mary Esther, Florida; scanner Staff Sgt. Hugh T. Mulholland of Philadelphia, Pennsylvania; scanner Cpl. Ashley W. Odom, McBee, South Carolina; and scanner Pfc. Donald D. Crawford from Fort Worth, Texas. Injured were scanner S/Sgt. Jeremiah W. Conlon of Worthington, Kentucky, admitted to the Eglin hospital with abrasions of the face and head, and ankle injuries; and radio operator S/Sgt. Lloyd D. Farris of Pensacola, Florida, with minor injuries but admitted for observation. The Superfortress apparently failed to gain much altitude before coming down, said Capt. Robert Gaughan, base public relations officer. August 19, 1947 – North American P-82B Twin Mustang, 44-65173, c/n 123-43759, of the 522d Fighter Squadron, Two Engine, 27th Fighter Group, Strategic Air Command, Kearney Army Air Field, Nebraska, (activated July 28, 1947), suffers moderate damage in a taxi accident at Eglin Field, this date. Pilot was Charles C. Heckel. September 16, 1947 – A pilot assigned to Eglin Field, Florida, is killed while flying (KWF) during an attempted emergency landing in a Lockheed P-80A-1-LO Shooting Star, 44-85305, of the 611th Base Unit, at that base on Tuesday afternoon. Capt. Lawson L. Lipscomb, of Houston, Texas, radioed that he was having difficulty with the jet and was returning to the Eglin main base where emergency preparations had been made on the runways, but the fighter came down just west of the airfield. September 22, 1947 – Douglas C-47B-10-DK Skytrain, 43-49096, c/n 26357, of the 1st Experimental Guided Missiles Group, Duke Field, is damaged in a taxi accident at Brookley Field, Mobile, Alabama, this date. Pilot was Donald J. Young. Repaired, this airframe will eventually go to the Fuerza Aérea Salvadoreña as 103, and written off in April 1963. October 24, 1947 – Lockheed P-80B-5-LO Shooting Star, 45-8590, c/n 080-1804, of the 71st Fighter Squadron, Jet Propelled, 1st Fighter Group, March Field, California, piloted by Lewis F. Webster, suffers damage from a bird strike 1.5 miles S of Valparaiso, Florida, but lands safely at Eglin Field. Repaired, this airframe will be written off September 22, 1955 in California. November 3, 1947 – Lockheed P-80B-1-LO Shooting Star, 45-8495, c/n 080-1709, of the 71st Fighter Squadron, Jet Propelled, 1st Fighter Group, March Field, California, piloted by Lawrence J. Fleming, crash lands at Eglin Field following engine failure, coming down near Valparaiso, Florida. November 14, 1947 – Lockheed P-80A-1-LO Shooting Star, 44-85148, of the 611th AAF Base Unit, Eglin Field, crashes 6 miles SW of Florosa, Florida, after engine failure, killing pilot George H. Parker. November 21, 1947 – Lockheed P-80A-1-LO Shooting Star, 44-85273, of the 62d Fighter Squadron, Jet Propelled, 56th Fighter Group, 56th Fighter Wing, Selfridge Field, Michigan, piloted by Donald J. Wellings, suffers damage from mechanical failure 5 miles SE of Eglin Main Base, but recovers safely. It will be lost in a crash near Jean, Nevada, on July 17, 1951. April 9, 1948 – A six-month fatality-free period at Eglin AFB, Florida, (the longest since the base opened) ends when Capt. William Robbins, 26, is killed in the crash of a P-51D-30-NA Mustang, 44-74913, in a wooded area N of Crestview, Florida. The pilot in the Friday morning accident was father of three and was well known for his involvement with the Boy Scouts of America. A resident of Cinco Bayou, Florida, Robbins is buried in his hometown of Tampa, Florida on April 11. April 10, 1948 – Eglin AFB, Florida, suffers second accident in two days when TA-26C Invader, 44-35446, of the 1st Target Towing Squadron, Biggs AFB, El Paso, Texas, goes down in the Gulf of Mexico 2 miles S of Destin, Florida. Two of three crew survive by parachuting from stricken bomber, TDY here for firing exercises over the Gulf. First Lieutenant John Kubo and T/Sgt. Joseph A. Riley (ages, hometowns not given) are rescued by Eglin crash boats. KWF is T/Sgt. John E. Brizendine, officially listed as missing. May 11, 1948 – Maj. Simon H. Johnson, Jr., deputy commanding officer of the Eglin AFB, Florida, fighter section, is killed when his Republic P-84B-36-RE Thunderjet, 46-661, disintegrates during an air demonstration at Range 52 on the Eglin reservation, in front of some 600 witnesses. The public information officer at Eglin stated that the pilot was "engaged in operational tests on the plane" when the accident occurred. Maj. Johnson, a resident of Shalimar, Florida, was originally from Houston, Texas. He had served a year in Italy flying 50 missions in P-51s with the 31st Fighter Group, earning the Distinguished Flying Cross and the Air Medal with five clusters. He had attended the University of Texas and graduated from the U.S. Army flying school in 1940. Johnson was also serving as the acting commanding officer, operations officer, and test pilot for the Eglin fighter section at the time of his death. Johnson Hall, home of Headquarters Air Proving Ground Center, is named for him on December 15, 1949. June 12, 1948 - Pilot Capt. Bill E. Myers fails to lift off from Godman Field, Fort Knox, Kentucky, on takeoff in Lockheed P-80A-1-LO Shooting Star, 44-85116, crashes through a fence and plows into a passing car. All four in the automobile die. Pilot uninjured. The Godman Field public information office said that the P-80 was bound for Eglin AFB, Florida, after a stopover at Godman. The victims, all from nearby Elizabethtown, were Vernon C. Ferren, 63; his wife, Mrs. Annie C. Ferren, 50; Miss Lela Ferren, 61, a sister of Vernon Ferren; and Spencer Blackburn, 43. This airframe had been tested with wingtip rocket racks. October 11, 1948 – The body of Maj. John Earl Shedaker, Jr., U.S. Marine Corps aviator (May 7, 1918 – October 11, 1948), was found late Tuesday, October 12, in about 100 feet of water (depth given is suspect – average depth of bay is 35 feet) in Choctawhatchee Bay near Destin, Florida, according to the public information office of Naval Air Station Barin Field, Foley, Alabama. Navy divers recovered the body located a short distance from the wreckage of the plane, after it was spotted from the air. Indications were that the plane, Vought F4U-4 Corsair, BuNo 81135, of VMF-212, MAG-14, assigned at NAS Barin Field, had caught fire in the air and spun down. Major Shedaker was flying one of two Corsairs which were on a routine training flight over Eglin when the lead plane developed a fuel line failure and the pilot made an emergency landing with a dead engine. He reported that he lost sight of the other plane which failed to return to Barin Field. Major Shedaker was survived by a wife and three children who were living in Pensacola, Florida, temporarily during the assignment of the air group to Operation Combine III. He was serving as operations officer of VMF-212 of Marine Air Group 14 during the operation centered at Eglin Air Force Base. Maj. Shedaker had been awarded his aviator wings on May 27, 1948, at NAS Jacksonville, Florida. Maj. Shedaker is interred at Fort Rosecrans National Cemetery, San Diego County, California, on October 13, 1948. November 5, 1948 – A DB-17G Flying Fortress, 44-83678, returning to Eglin Air Force Base, Florida from Fort Wayne, Indiana, crashes in woods SE of Auxiliary Field 2, Pierce Field due to pilot error, crashing and burning NE of the runway at Eglin main base early Friday. All five on board are KWF, including Lt. Col. Frederick W. Eley, 43, of Shalimar, Florida, staff judge advocate at Eglin for nearly three years – he was returning from his grandmother's funeral in Portland, Indiana; Maj. Bydie J. Nettles, 29, who lived in Shalimar, Florida but was originally from Pensacola, Florida, group adjutant for the 3203rd Maintenance and Supply section; Capt. Robert LeMar, 31, Ben's Lake, Eglin Air Force Base, test pilot with the 3203rd; crew chief M/Sgt. Carl LeMieux, 31, of Milton, Florida; and Sgt. William E. Bazer, 36, assistant engineer, Destin, Florida. Bazer's wife was the Eglin base librarian. November 7, 1948 – Second prototype Republic XR-12A-RE Rainbow, 44-91003, crashes at 1300 hrs. while returning to Eglin Air Force Base, Florida. The number 2 (port inner) engine exploded as the aircraft was returning from a photographic suitability test flight. The pilot was unable to maintain control due to violent buffeting, and he ordered the crew to bail out. Five of the seven crew escaped safely, including pilot Lynn Hendrix, rescued by Eglin crash boats and helicopters. Airframe impacts two miles S of the base, in the Choctawhatchee Bay. Sgt. Vernon B. Palmer, 20, and M/Sgt. Victor C. Riberdy, 30, who lived at Auxiliary Field 5, but was from Hartford, Connecticut, are KWF. March 9, 1949 – First Lieutenant Arnold E. Adams of Newton, Iowa, was killed when the F-80 Shooting Star jet fighter that he piloted crashed in Choctawhatchee Bay. Lieutenant Adams, a resident of Eglin Air Force Base, was 26. He was on a routine service testing flight. He was survived by his wife. May 4, 1949 – A U.S. Navy aircraft, type unidentified, crashes in Destin, Florida near the home of Reddin Brunson. The pilot bails out and parachutes into a small lake near the Destin post office, landing unhurt. Assisted by near-by residents, he is rowed out to three responding Eglin base crash boats by Lt. Cdr. Ross Marler, USNR, and conveyed across the Choctawhatchee Bay to Eglin Air Force Base. July 21, 1949 – Lockheed F-80C-1-LO Shooting Star, 48-386, c/n 080-2109, crashes near Niceville. this date. 1950s January 5, 1950 – A B-50A-10-BO Superfortress, 46-021, c/n 15741, of the 3200th Proof Test Group, crashlands in the Choctawhatchee Bay, two miles NNE of Destin, Florida, killing two of the 11 crew. Nine escape from the downed aircraft following the forced landing. The airframe settles in eight to ten feed of mud at a depth of 38 feet. Divers recover the body of flight engineer M/Sgt. Claude Dorman, 27, of Kingston, New Hampshire, from the nose of the bomber on Monday, January 8. He is survived by his wife, Gladys, and two sons, Theodore Earl and Michael, his father, Walter Lewis, and a brother, Theodore Richard. The body of S/Sgt. William Thomas Bell, 21, aerial photographer, who lived in Mayo, Florida, is recovered on Tuesday, January 9, outside the plane from beneath the tail. He is survived by his parents, Mr. and Mrs. Thomas Bell, a brother, Robert, and a sister, Martha. The Eglin base public informations officer identified the surviving crew as 1st Lt. Park R. Bidwell, instructor pilot; 1st Lt. Vere Short, pilot; 1st Lt. James S. Wigg, co-pilot; Maj. William C. McLaughlin, bombardier; and S/Sgt. Clifford J. Gallipo, M/Sgt. Alton Howard, M/Sgt. William J. Almand, T/Sgt. Samuel G. Broke, and Cpl. William F. Fitzpatrick, crewmen. One source gives crash date as January 6. January 14, 1950 – F-84E-1-RE Thunderjet, 49-2106, of the 307th Fighter Squadron, 31st Fighter Group, out of Turner Air Force Base, Georgia, piloted by William C. McClure, crashes in the Gulf of Mexico, 10 miles SW of Fort Walton, Florida. March 10, 1950 – A Lockheed F-80C-11-LO Shooting Star, 44-85014, c/n 080-1037, upgraded from P-80A-1-LO, is written off at Eglin Aux. Field 2, this date. March 24, 1950 – Lockheed RF-80A-5-LO Shooting Star, 44-85479, c/n 080-1502, of the 3200th Fighter Test Squadron, 3200th Fighter Test Group, Eglin AFB, flown by Fred W. Belue, suffers damage in landing accident due to mechanical failure. August 19, 1950 – Republic F-84E Thunderjet, 49-2130, of the 3200th Fighter Test Squadron, crashes due to structural failure 8 miles NE of Niceville, Florida. October 16, 1950 – A QB-17G Flying Fortress, 44-83565, of the 3200th Drone Squadron, piloted by Emerson N. Hixson, is involved in a ground accident at Eglin AFB due to weather, receiving moderate damage. January 25, 1951 – A B-26C-55-DT Invader, 44-35938, c/n 29217, of the Headquarters Squadron, 3201st Air Base Group, Eglin AFB, piloted by Carl A. Ousley, is moderately damaged in a landing accident at Bolling AFB, Washington, D.C. Repaired. January 31, 1951 – A Royal Air Force exchange officer is killed in the crash of his F-86A-5-NA Sabre, 49-1136, when it goes down in a wooded area near Auxiliary Field No. 2 shortly before 1000 hrs. while on a rocket-firing test mission. Flt. Lt. Ralph C. Williams, 28, was assigned to the air proving ground's 3200th Fighter Test Squadron for ~ a year, and was from Bournemouth, Hampshire, England. He is survived by his wife. March 19, 1951 - Boeing B-47A Stratojet, 49-1904, c/n 450005, assigned at Eglin AFB, piloted by Richard C. Neeley, crashes near Wichita, Kansas. April 5, 1951 – Two F-51D Mustangs, of the 165th Fighter-Bomber Squadron, 123d Fighter-Bomber Wing, Godman AFB, Kentucky, collide in a taxiing accident at Auxiliary Field 2, killing one pilot. F-51D-25-NA, 44-73548, piloted by Maj. Woodford W. (Jock) Sutherland, 34, and F-51D-25-NA, 44-73669, piloted by James L. Mehne, strike one another, killing Sutherland. Tragically, on April 8, a C-47 Skytrain carrying 22 Godman AFB personnel to Charleston, West Virginia, for Sutherland's funeral, clips a hilltop ~8 miles NE of Kanawha Airport in poor weather, killing 19. May 4, 1951 - Boeing B-47A Stratojet, 49-1906, c/n 450007, assigned at Eglin AFB, is damaged in a landing accident at Wichita, Kansas. Pilot was Julian R. Abernathy. June 27, 1951 - An Eglin Air Force pilot was killed June 28, 1951, and three crew members were injured in the crash of a Chase XC assault transport on the base bombing range. Killed was Capt. William A. Fairfield, Jr. Injured were Capt. Paul Riley, S.Sgt. Jean G. Kinsell, S/Sgt. Allen P. Hile. July 7, 1951 – RB-45C Tornado, 48-018, of the 3200 AMS/3200 ANG, damaged in ground fire at Eglin AFB this date. July 26, 1951 - A P-80 crashed on takeoff from Eglin Air Base, killing the pilot, Capt. Henry J. Patmour, 29, West Allis, Wis. He was temporarily assigned to Eglin to work out details for members of his 126th Fighter Squadron at Truax Field in Wisconsin who were scheduled to begin training at Eglin. August 18, 1951 – B-47A Stratojet, 49-1906, c/n 450007, from Boeing-Wichita, Wichita AFB, Kansas, suffers moderate damage at the Air Proving Ground, Eglin AFB, due to a landing accident resulting in a groundloop. Pilot was John G. Foster. September 20, 1951 – B-47B-1-BW Stratojet, 49-2645, c/n 450014, of the Air Proving Ground Command burned at Eielson AFB, Alaska, during refuelling and destroyed. November 6, 1951 – Lockheed F-94B-1-LO, 50-0810, c/n 780-7116, of the 3200th Fighter Test Squadron, 3200th Proof Test Group, Air Proving Ground Command, piloted by Glen E. Jackson, is forced down 12 miles SE of Milton, Florida when it suffers fuel exhaustion. 16 November 1951 - B-47B-10-BW Stratojet, 50-0019, c/n 450034, piloted by John C. Foster, suffers damage in landing mishap. Note conflict with incident involving same airframe on 3 December 1951. December 3, 1951 – B-47B-10-BW Stratojet, 50-0019, c/n 450034, of the Air Proving Ground Command, piloted by David A. Himes, suffers moderate damage in structural failure at Boeing-Wichita, Wichita AFB, Kansas. Repaired. December 7, 1951 – B-26C-55-DT Invader, 44-35938, c/n 29217, of Headquarters Squadron, 3201st Air Base Group, Air Proving Ground Command, piloted by Warney L. Crosby, suffers moderate damage in a landing accident caused by mechanical failure, its second mishap of the year. Repaired. February 16, 1952 - Maj. James F. Duffy, 29, pilot, and Capt. William Molinari Jr., 30, radar observer, were killed when their twin-engine Northrop F-89 Scorpion crashed in a wooded area about a mile east of the main gate of Eglin Air Force Base. August 13, 1952 - An F-47 Mustang crashed seven miles north of Niceville, Florida, killing the pilot. The name of the victim was not announced pending notification of relatives. The pilot was a member of a Air National Guard squadron from Godman Air Force Base, near Fort Knox, Kentucky, which was stationed temporarily at Field 2 on Eglin Air Force Base. The Mustang pilot was on an aerial gunnery practice mission when the plane crashed at 6:40 a.m. The cause of the crash had not been determined. August 25, 1952 – Building 100 on the flightline is named the Audette Airborne Systems Building. A dedication plaque at the front entrance reads: "In memory of Lieutenant Colonel Leo R. Audette, United States Air Force – in recognition of his contribution in the development of airborne electronics systems – who on 25 August 1952, while a member of this command, gave his life while participating in operations which advanced the development of these systems." His aircraft, DB-17G Flying Fortress drone control ship, 44-83680, built as a B-17G-90-DL, is accidentally shot down by F-86D-1-NA Sabre, 50-469, of the 3200th Proof Test Group, flown by Colonel Arthur R. DeBolt, 39, of Columbus, Ohio. Colonel Mac McWhorter was piloting the mother ship with a QB-17 drone in trail over the Gulf of Mexico for a radar-controlled approach by the jet fighter, "which by mistake fired a rocket that sent a B-17 bomber spinning into flames into the Gulf of Mexico. Six of eight crewmen on the bomber may have been killed. The Air Force said the pilot, DeBolt, apparently mistook the B-17 mother" [sic] plane for a radio-controlled drone during a test operation. Col. DeBolt was overcome with grief by the tragic error." January 13, 1953 – "An Eglin (AFB) F-86 Saber [sic] jet crash landed on Range 51 here today left pilot Capt. Robert G. Loomis alive but injured. The airman is in the Eglin hospital with a back injury and undetermined internal injuries." Airframe was F-86F-30-NA Sabre, 52-4306, c/n 191-2. June 21, 1953 – Two crew of the 3200th Fighter Test Squadron, Air Proving Ground Command, Eglin AFB, Florida, are KWF in a Lockheed F-94C-1-LO Starfire, 50-969 when it crashes at Fairfax Field, Kansas City, Kansas. Fighter had departed the airfield on a routine training mission for a flight to Scott AFB, Illinois, when the pilot Capt. William C. Sharp, 34, from Cleveland, Ohio, attempted to return shortly after the 1330 hrs. CST take-off. Fighter struck a dike short of the runway, hitting ~10 feet below the top, and caromed onto the runway. Radar operator 1st Lt. Ray P. Tucker, 32, of Tipton, Indiana, was killed on impact and the pilot died later of injuries. Tucker had seen combat in the Asiatic-Pacific Theatre in World War II, and Sharp had 25 combat missions in P-40 and P-51 fighters in the China-Burma-India Theatre. October 1, 1953 – A USAF North American TB-25J, 44-86779A, built as a B-25J-30/32-NC, (Joe Baugher states that it was modified and redesignated to TB-25N status, but the official accident report refers to it as a TB-25J) attached to Andrews AFB, Maryland, crashes in fog and heavy overcast into the forested pinnacle of historic Pine Mountain, striking Dowdell's Knob at ~2130 hrs., near Warm Springs in western Georgia, killing five of six on board, said spokesmen at Lawson AFB. The bomber struck the 1,395-foot peak at the 1,340 foot level. It had departed from Eglin AFB at 1930 hrs. for Andrews AFB. Two Eglin airmen were among those KWF. The sole survivor, Richard Kendall Schmidt, 19, of Rumson, New Jersey, a Navy fireman assigned to the crash crew at NAS Whiting Field, Florida, who had hitch-hiked a ride on the aircraft, was found by two farmers who heard the crash and hiked to the spot from their mountainside homes "and found the sailor shouting for help as he lay in the midst of scattered wreckage and mutilated bodies. They said [that] they found a second man alive but base officials said [that] he died before he could be given medical attention." First on the scene was Lee Wadsworth, of Manchester, Georgia, who, while visiting his father-in-law, Homer G. Swan, in Pine Mountain Valley, had heard and seen the Mitchell in level flight at very low altitude AGL on an easterly course moments before impact at ~2130 hrs. Immediately following the crash, Wadsworth, Swan, and Wadsworth's brother-in-law, Billy Colquitt, drove a truck to the knob, arriving there at 2145 hrs. After a short search, they smelled gasoline and heard the cries for help from Schmidt. They proceeded to render aid for two and a half hours until the first medical help arrived, in the person of Dr. Bates from Pine Mountain Valley. Schmidt was loaded into Dr. Bates' automobile and was driven east towards Columbus to meet the military ambulance dispatched from Lawson AFB. The semi-conscious man had died of his injuries some 35 minutes after the first responders got to him. The Air Police, and Sheriff and Coroner for Harris County arrived at ~0030 hrs., October 2. Tom Baxley, one of the farmers, said that the bodies of the dead, most of them torn by the collision, were flung about among the pine trees, and bits of the plane were hurled over a wide area. Schmidt was hospitalized with a possible hip fracture and cuts. Among the fatalities were two airmen assigned to Eglin AFB who had also hitch-hiked a ride and were on their way home on leave. The impact location is on the site of the proposed $40,000,000 Hall of History to mark a scenic point frequented by the late President Franklin D. Roosevelt. Killed were Capt. Stephen A. Clisham, pilot; Capt. Virgil G. Harris, co-pilot; T/Sgt. Othelier B. Hoke, flight engineer; and passengers A3C Robert W. Davidson, and A2C Benny J. Shepard. Shepard survived the initial impact and was thrown from the wreckage, but died of his severe injuries before assistance arrived. This accident was added to the Wikipedia article on June 12, 2012. Exactly one month later, it was discovered by board members of the Pine Mountain Trail Association at the F. D. Roosevelt State Park, who had been seeking details of the 1953 accident. Based on information in this article, they were able to locate survivor Richard Schmidt within a day, and on the Veterans' Day weekend, November 10, 2012, he and Monica Clisham Coffey, the daughter of the B-25's pilot, unveiled a plaque and a memorial rock at Dowdell Knob to those who died in the crash, and in Schmidt's honor. Schmidt was also reunited with 84-year-old Robert Lee Wadsworth of nearby Manchester, and 88-year-old Billy Colquitt, "the minister who accompanied Wadsworth up the mountain and prayed with Airman 2nd Class Benny J. Shepard as he drew his dying breaths." October 17, 1953 – Capt. Richard R. Galt, 29, is killed in the crash of an F-84F-1-RE Thunderstreak, 51-1354, at Eglin Air Force Base, Florida in a Saturday accident just north of the main base this date. "The aircraft was on a testing mission when it crashed in the woods on the outskirts of Valparaiso just off the cutoff road around the base. Apparently the plane clipped a power line before crashing. Power was off in the Playground Area from 8:25 a.m. when electric clocks stopped, to around 1 p.m. Several witnesses reported seeing a 'bright orange flame' flaring up at the time of the crash and a column of smoke. The plane was on a testing mission when it crashed, according to the PIO. Galt was a co-project officer for the F-84F, the Air Force's latest fighter-bomber, on which accelerated testing began last Monday." Memorial services are held for the pilot at an Eglin AFB Chapel on October 21. He is survived by his wife, Mrs. Marjorie Galt; two daughters, Susan, 5, and Margaret, 3; and his parents, Dr. and Mrs. Russell Galt of Susquehanna University, Selinsgrove, Pennsylvania. November 4, 1953 – An Air Force fighter pilot from Turner Air Force Base, Georgia, was critically injured at ~3:30 p.m. when his F-84G-30-RE Thunderjet, 52-3257, crashed in a landing attempt at Eglin Field No. 2. The pilot, Maj. A. D. Simmons, suffered a fractured spine, fractures of both legs and facial cuts. Simmons had just taken off from the Main Base at Eglin on a return flight to his own base. He later "requested permission to land at Field 2 to obtain an instrument clearance, and in attempting to land crashed into a gulley near the end of the runway. Rushed to Eglin Base Hospital immediately following the accident, Maj. Simmons was found suffering from a fracture of the spine, fractures of both legs, and lacerations of the face. His condition was described as critical." November 17, 1953 – The crash of a Piasecki YH-21-PH Workhorse helicopter, 50-1240, deployed to Thule AFB, Greenland, from the Air Proving Ground Center, Eglin AFB, kills two crew. Dead are Capt. Raymond C. Gottfried, 30, of 3922 Avenue J, Brooklyn, New York, pilot, and T/Sgt. Clay H. Danner, 36, of Valle Crucis, North Carolina, crew chief.Fort Walton Beach, Florida, "Playground News Makes Correction", Playground News, Thursday December 3, 1953, Volume 8, Number 45, page 1. "The helicopter and a sister craft left Eglin on the first leg of the 4,000 mile flight to Thule AFB on 17 August and arrived there on 14 September. The purpose of the flight was to continue the Air Proving Ground operational suitability testing of the YH-21 which began last May and included tests in Eglin's climatic hanger [sic] as well as temperate or warm weather testing. Arctic testing at Thule Air Force Base was scheduled to be completed by December 1." December 22, 1953 – The Eglin Air Force Base public information office reported Tuesday that Lt. Frank T. Robinson crash-landed an F-84 Thunderjet at Lee, Florida, around 1500 hrs. The pilot, attached to the Air Force Operational Test Center at Eglin, was reported safe by officials at Maxwell Air Force Base, Alabama. The news release stated that the pilot was on a routine training mission. July 16, 1954 – Republic F-84G-25-RE Thunderjet, 51-1325, of the 466th Strategic Fighter Squadron, 508th Strategic Fighter Wing, Turner AFB, Georgia, flames out at minimum altitude and crashes into tall pine trees near Eglin AFB. August 24, 1954 – The pilot of an F-84G-25-RE Thunderjet, 52-3236, dies at the Eglin AFB, Florida base hospital at ~1130 hrs. of injuries sustained earlier in the day when he was ejected from the cockpit of the fighter-bomber as it rolled to a stop after landing at Eglin Auxiliary Field 6, Biancur Field. The pilot, identified as Maj. Robert A. Krug, 32, of the 307th Strategic Fighter Squadron, 31st Strategic Fighter Wing, Turner Air Force Base at Albany, Georgia, resided in Albany but was originally from Reading, Pennsylvania. He is survived by his wife, Delores, and two sons, Lee, 1, and Robin, 3. The Thunderjet was on a routine training mission. A board of qualified Air Force officers have been appointed to determine the cause of the accident. September 22, 1954 – A USAF North American EF-86D-5-NA Sabre, 50-516, crashes and burns on take-off from Eglin Air Force Base, Florida in a 1038 hrs. accident that kills Maj. Lyle R. King, 32, assistant chief of weapons and missiles branch directorate of test operations of the Air Force Armament Center at Eglin. After briefly becoming airborne, the aircraft suffers loss of power, the all-weather fighter settles back onto the runway's end, continues off the overrun area and comes to rest in a marshy stream bed ~1,000 feet to the north. King, who was on a routine flying mission, has been stationed at the base since June 1951, a senior pilot with 3,044 total flying hours, 1,483 of them in jets, 225 in various Sabre models. He is survived by his wife, Mrs. Virginia King; a daughter, Mikel Mae, and an infant son, of 25 N. Okaloosa Road, Fort Walton Beach, Florida; and his mother, Mrs. Ollie Emiley King, of 360 W. 68th Street, Los Angeles, California. A board of qualified Air Force officers have been appointed to determine the cause of the crash. A new large hangar built in 1955 and dedicated on 5 May was named King Hangar in his honor. October 12, 1954 – A U.S. Navy P2V Neptune undergoing test cycles by the Air Force Operational Test Center at Eglin AFB suffers a structural failure on landing at Auxiliary Field Number 8, Baldsiefen Field, which causes the starboard engine to break loose and burn in a Tuesday morning accident. The crew of two escapes injury. The Eglin Public Information Office said that the two pilots, Stanley A. Beltz, Lockheed Aircraft Corporation test pilot, and Maj. John J. New, of the Air Proving Ground Test Requirement Division, brought the patrol bomber to a halt and left it through an escape hatch without suffering harm. Beltz would die in the crash of a F-94B at Lancaster, California on August 31, 1955. November 8, 1954 – Royal Air Force Air Commodore Geoffrey D. Stephenson, former commandant of the Royal Air Force Central Fighter Establishment, is killed in the crash of a USAF F-100A-10-NA Super Sabre, 53-1534, near Auxiliary Field 2 of Eglin Air Force Base, Florida. Commodore Stephenson, on a tour of the U.S., is flying at 13,000 feet as he joins formation with another F-100, flown by Capt. Lonnie R. Moore, jet ace of the Korean campaign, when his fighter drops into a steep spiral, impacting at ~1414 hrs. in a pine forest on the Eglin Reservation, one mile NE of the runway of Pierce Field, Auxiliary Fld. 2. The 44-year-old pilot had flown several thousand hours in fighter aircraft, both conventional and jet, during his 20-year RAF career. He had piloted virtually every type of British jet fighter including Meteors, Venoms, Hunters and Swifts, as well as USAF F-86s. He was considered one of the most experienced and capable fighter pilots in the RAF. Commodore Stephenson was married and father of three children. Air Commodore Stephenson headed a six-man team from the central fighter establishment, RAF, whose headquarters are at West Raynham-Near-Fakenham. Memorial services are held at 0900 hrs. at the Eglin Base chapel on November 10, conducted by the Rev. Johnson H. Pace of St. Simons on the Sound church, Fort Walton Beach, Florida, and attended by Air Vice Marshall R. L. R. Atcherley, chief of the Chief Joint British Services Mission to the United States, who arrived from Washington on the night of November 9; Major General Patrick W Timberlake, commander of the Air Proving Ground Command; Brig. Gen. Daniel S. Campbell, deputy commander of the APGC; six Royal Air Force officers who were touring the U.S. with the commodore; and key staff officers of the APGC. At 1200 hrs., the party of Air Commodore Stephenson, accompanied by 30 RAF and USAF officers, fly to Maxwell Air Force Base, Montgomery, Alabama, for interment at the Royal Air Force plot there. British armed forces traditionally bury their dead where they fall. There has been an RAF squad at Maxwell since World War II. 15 April 1955 - B-47E Stratojet, 53-2277, of the 3200th Test Group, Eglin AFB, crashes into Castle Harbor after takeoff from Kindley AFB, Bermuda, three crew killed. June 1, 1955 – "An Eglin AFB helicopter was damaged about 8 a.m. Wednesday when it made a forced landing on Johnson's pasture about four miles northeast of Crestview. There were four occupants of the 'copter but all escaped without injury. Engine trouble caused the landing and the machine tourned [sic] on its side when it struck the ground. First reports of the accident were received by Cpl. Joe Livingston of the State Highway Patrol when an unidetified [sic] person called and said the helicopter was seen to go down near Garden City and that 'it was smoking badly.' Patrolman Register Windham investigated the accident [sic] along with Air Police from Eglin AFB." The aircraft involved was Sikorsky H-19B Chickasaw, 52-7519; repaired. June 29, 1955 – A newly installed steel and nylon crash barrier at Eglin Main Base successfully prevented a Republic F-84F Thunderstreak from receiving damage when the fighter of the 467th Strategic Fighter Squadron (Strategic Air Command), operating from Auxiliary Field 6 on a gunnery mission suffered failure of its hydraulic system. Pilot Capt. Robert D. Williams, TDY from Turner Air Force Base, Albany, Georgia, was able to lower his undercarriage using an emergency system, but had no flaps and only limited braking capacity. He estimated that the aircraft was still rolling at 15 knots when the nose gear strut engaged the 40-inch high nylon barrier. The plane came to a stop within 30 feet. "So effective was the drag of the fence that the cable that engages the main gear was not needed. The net effect to the $338,713 jet was negligible. The $11,000 barrier had paid for itself in a few seconds of use." July 18, 1955 – A Douglas B-26C-30-DT Invader, 44-35219, of the 34th Bomb Squadron, 17th Bomb Wing, based at Hurlburt Field, crashes in the afternoon while on approach to Ethan Allen Air Force Base at Burlington, Vermont, seriously injuring three crew. Both engines failed just prior to landing, and pilot 2d Lt. Frank C. Button, 22, Watkins Glen, New York; 1st Lt. Clarence C. Mauer, 25, of Scranton, Pennsylvania; and S/Sgt. G. M. Button, brother of the pilot, of the 1703d Construction Group, Elmira, New York, were listed as "satisfactory" at Mary Fletcher Hospital, Burlington. A board of qualified officers was appointed to determine the cause of the accident.Crestview, Florida, "Hurlburt Plane Crashes In North", The Okaloosa News-Journal, Thursday July 21, 1955, Volume 41, Number 29, page 1. August 16, 1955 – An F-86K Sabre jet fighter, 54-1235, crashed in an open field northwest of Holt, Florida, at 1445 hrs. According to Capt. John J. Knight, an Air Force Armament Center test pilot who successfully bailed out of the disabled aircraft, the fighter developed engine trouble indicated by an explosion at 30,000 feet. He attempted to return to Eglin AFB, but when smoke was seen coming from the tail section, he bailed out. The altitude was then about 12,000 feet. The plane plunged into a cornfield ~1.5 miles NE of Holt, digging a crater ~10 feet deep and 125 feet across and scattering wreckage over a large area. The pilot was picked up by a 48th Air Rescue Squadron helicopter and returned to Eglin Air Force Base where the flight had originated. This aircraft was one of six which began five months of testing by a project team from the Air Defense Division of the Air Force Operational Test Center on July 15, 1955. August 17, 1955 – "A cool hand and a convenient field of scrub pine added up to a successful emergency crash landing for Captain William A. Cobb, 31, of the Air Proving Ground Command, when the engine of his F-86H quit in an attempted go-around at 1:49 last Wednesday afternoon. Cobb was checking an unsafe indication of his nose-wheel position indicator by flying a 200 feet past the control tower to determine whether the wheels looked to be properly lowered. When he applied power, the engine failed to respond and the only choice was to set the plane down straight ahead. Veering a few hundred yards to the east to avoid the woods, the pilot eased the plane across the boundary road [now Eglin Boulevard] and was brought rapidly to a stop by the small trees dotting the field. Captain Cobb was uninjured and the damage to the plane was not extensive. He was on a training flight from Eglin Air Force Base, Fla., where he is a fighter evaluation officer in the Directorate of Test Requirements of the Deputy Chief of Staff for Operations. His 2,890 hours of flying experience includes about 1,400 hours in single engine jet fighters." The aircraft involved was YF-86H-5-NA Sabre, 52-2096, c/n 187-122. January 10, 1956 – Double jet ace Maj. Lonnie R. Moore, 35, is killed in the 0914 hrs. take-off crash of an F-101A-15-MC Voodoo, 53-2443, of the 3243d Test Group, from Eglin AFB. Moore was making his first flight in the new fighter design but the jet crashes in the center of the airfield just after becoming airborne, appearing to explode on impact. The aircraft experienced an extreme nose pitch-up, a problem that would plague the Voodoo design. Although the crash site is only 200 yards from the fire station, and the blaze extinguished within three minutes, the pilot has no chance to escape and is killed. Moore was the Air Force Operational Test Center's chief project officer for operational suitability tests of the Air Force's first supersonic jet fighter, the F-100 Super Sabre and had more than 1,500 hours in single-engine jet aircraft and 3,570 total flight hours. At the time of his death, he was being checked out in the latest fighter that the AFOTC had received for testing. As a project officer for the Air Proving Ground Command during the Korean War, the then-Captain Moore deployed TDY to Korea to perform a test under combat conditions in the modified F-86F-2 Sabre, upgunned with the M39 cannon. During the test mission he downed two MiG-15s with the new weapon. Remaining in Korea after the test was completed, he flew 100 combat missions, destroying ten MiGs, plus one probable. He is survived by his widow, the former Billie Geneeva Hall, of Dallas, Texas, and four children, Robert Lester, 16; Barbara W., 13; Lonnie Jr., 8; and Tina Gale, 4.Crestview, Florida, "Double Jet Ace Dies In Crash: Maj. Moore Is Victim At Eglin Field [sic]", The Okaloosa News-Journal, Volume 42, Number 2, pages 1, 6. The family resided at 535 Okaloosa Road, Elliott's Point, Fort Walton Beach, Florida. January 27, 1956 – Royal Air Force Squadron Leader Peter G. P. Henson, an exchange pilot assigned to the Eglin Air Force Armament Center, is KWF when his F-84F Thunderstreak crashes into the Gulf of Mexico three miles off Destin, Florida at 1055 hrs. this date. Charles K. Windes, a Santa Rosa carpenter working in the vicinity, reported that he saw the pilot parachute into the water. Search crews are unable to locate the lost pilot, however. Three crash boats from the 3201st Boat Squadron, search aircraft of the 48th Air Rescue Squadron and the Base Flight Squadron, as well as volunteers from the community participate in the search. An oil slick is sighted and the pilot's crash helmet, flight suit and aircraft parts are found, but the search is suspended on Tuesday, January 31. He is survived by his widow, Mrs. Winifred Henson, and two children, Christine, 7, and Pamela, 6, of 2504A Ben's Lake, Eglin AFB, and his mother, Mrs. K. M. Henson, of 30 Hatton Park Road, Wellingborough North Hants., England. February 15, 1956 – A USAF F-84F Thunderstreak crashes in a wooded area NE of Niceville, Florida at 1745 hrs. killing pilot 2nd Lt. Gary R. Brown, 21, of Seleh, Washington. The fighter was one of two from the 405th Fighter-Bomber Wing, based at Langley Air Force Base, Virginia, that was making an instrument approach to land at Eglin AFB, the Office of Information Services reported. Florida State Troopers discovered the downed aircraft ~10 minutes after the crash occurred on Swift Creek near the Ruckel airstrip. A ground search party of paramedics from the 48th Air Rescue Squadron at Eglin and base crash crewmen arrived at the scene a short time later. Lt. Brown is survived by his wife of Hampton, Virginia and was the son of Mr. and Mrs. R. A. Brown, Route 1, Seleh, Washington. March 8, 1956 – Capt. Roy W. Konvolinka, of the 3243d Test Group (Fighters), ejects from his disabled F-100A Super Sabre and parachutes into the Choctawhatchee Bay, coming down ~1/2 mile from shore. He abandons the disabled jet shortly after takeoff when he discovers that he can not make an emergency landing. The fighter impacts in a wooded area of the Eglin reservation. He is rescued by a helicopter (type unspecified, but probably a Sikorsky H-19), piloted by Lt. Col. Walter A. Rosenfield, Jr., director of maintenance for the 3243rd Fighter Test Group at Eglin, and Capt. Carl J. Swanson, who acts as an impromptu rescue jumper. Konvolinka suffers only a broken finger on his left hand from grabbing for the winch hook. The pilot is taken to the Eglin base hospital for treatment of the broken finger, shock, exposure and observation. Konvolinka had experienced a training accident on April 4, 1944, in PT-17, 41-25408, at Paradise Valley Airport, Arizona. March 25, 1956 – First prototype Martin XB-51, 46-0685, crashes on take-off from Biggs AFB, El Paso, Texas, killing both crew. Aircraft became briefly airborne, then settles back onto the runway, running off the end into sand dunes and set alight. Pilot was Maj. James O. Rudolph, 36, who was dragged from the crash site with severe burns and conveyed to Brook Army Hospital at San Antonio where he succumbed to his injuries April 16, 1956. The flight engineer was S/Sgt. Wilbur R. Savage, 28, of Rte. 3, Dawsonville, Georgia. The aircraft was staging to Eglin AFB, Florida at the time of its crash for filming of scenes for the motion picture Toward the Unknown. After stopping for refuelling, the bomber began its take-off run at 1030 hrs., but smashed through the fence at the end of the southwest runway and then began to disintegrate, spreading wreckage along a 250-yard trail. There was some initial confusion about the aircraft type as rescuers found the "Gilbert XF-120" name applied to the airframe for the film on the wreckage. June 15, 1956 – "A $50 reward has been authorized by Capt. Carol Presley, commander of the Okaloosa Civil Air Patrol squadron, for any information leading to the identity of the unknown pilot or persons who took a PA-18 type CAP plane from the ramp at Field 4 sometime between 10 and 11 Friday morning. This unauthorized flight resulted in a crackup at the end of the runway with the unknown pilot immediately leaving the scene of the accident. Damage to the plane was major but can be repaired. Both CAP and Eglin AFB authorities are investigating the accident." June 22, 1956 – Two pilots escape injuries in two separate accidents at Eglin AFB this date. Maj. John R. Phillips of the Air Force Operational Test Center was forced to abandon his Northrop F-89H Scorpion when the engines caught fire on takeoff with the pilot parachuting safely ~1.5 miles offshore over the Choctawhatchee Bay with the aircraft impacting in the bay. He was rescued immediately by a helicopter piloted by Capt. Earl A. Thone, and 1st Lt. Thomas A. Wright, and carrying Capt. Richard A. Salina, flight surgeon, and Paramedic S/Sgt. Henry H. Kirksey. Maj. Phillips resides at 516 Gardner Drive, Fort Walton Beach, Florida, with his wife Bernice, and three children, Joan Louise, 8; Joy Frances, 4; and John R. Jr., 2. In the second incident, 2d Lt. Richard C. Hale was applying power to his Republic F-84F Thunderstreak prior to takeoff when an internal explosion occurred in the engine. His wingman, 1st Lt. Wayne N. Whatley, observed fire coming from the tailpipe of the damaged jet and radioed Lt. Hale to abandon the craft, "which the latter proceeded to do with alacrity." The fire was brought quickly under control by crews from the Eglin crash rescue division. Lt. Hale is assigned to England Air Force Base, Louisiana, where he resides with his wife and month-old daughter. July 9, 1956 – Two pilots of the Air Proving Ground Command are rescued in two separate accidents at Eglin AFB this date. In the first incident Capt. Calvin K. Ellis receives minor injuries when, according to a witness, his F-86H Sabre blew its starboard main tire upon landing and skidded off the right side of the runway where the nose wheel dug into the soft turf and turned the aircraft over. "Crash rescue equipment arrived at the scene shortly after the alarm was sounded and lifted the aircraft with a crane, freeing the trapped pilot. The aircraft received major damage but did not catch fire." Capt. Ellis, 32, is the son of Mr. and Mrs. J. Cal Ellis of 1106 Peachtree Terrace, Albany, Georgia. He and his wife, Janet A. Ellis, live at Eglin. They have two children: a stepdaughter, Perri Glynn Stowitte, 8; and a son, Craig Andrew, 4. In the second accident, which occurred in late afternoon, an F-102A Delta Dagger piloted by Lt. Col. Michael C. Horgan, of the 3241st Test Group (Interceptor) crashed shortly after takeoff. "According to witnesses, the aircraft was airborne approximately 35 feet when the left wing dipped toward the ground. The aircraft climbed steeply to the left then plummeted to the ground. After skidding nearly 1,500 feet, the aircraft burst into flames. Crash rescue equipment arrived immediately. Although the aircraft was severely damaged and on fire, it was immediately discovered that the pilot was alive. The canopy was jammed, however, making access to the stricken pilot difficult. Crash rescuemen then broke through the canopy and with the aid of other crew members freed the pilot from the burning aircraft." Lt. Col. Horgan received a fractured leg but was reported in fair condition by the Eglin Air Force Base Flight Surgeon. Col. Horgan is the brother of Mrs. A. J. Harber of Interlocken, Fairmont, Minnesota. He and his wife, Joan, and their four children live at 5 Plew Avenue, Shalimar, Florida. The children are Michael James, 5; Candace Lee, 6; Timothy Niel,3; and Patrick Kevin, 1. Col. Horgan was hospitalized for at least eight weeks with back and leg injuries from the crash. July 15, 1956 – Deft work by air traffic controllers at Eglin AFB saved a North American F-86D Sabre from loss when an instructor pilot, 1st Lt. F. J. Pagel, en route from Perrin AFB, Texas, to Tyndall AFB, Florida, ran low on fuel and suffered damage to his radar equipment in a heavy thunderstorm while over the Eglin water ranges of the Gulf of Mexico. Despite trouble with the Eglin tower's emergency radio frequency due to a blown fuse caused by the same storm system, the pilot was given a vector heading of 360 degrees (north) by Lts. Alfred R. Martin and Leonard L. Dawson of the 3216th Test Support Squadron, bringing the Sabre 40 miles to a safe visual landing at the Main Base. After minor repairs, the pilot and the jet were able to depart for the original destination. July 26, 1956 – A QF-80 Shooting Star unmanned drone of the 3205th Drone Squadron at Auxiliary Field 3, exploded in flight over the Eglin reservation SE of Range 21, this date. The drone, on a mission for the Air Proving Ground Command, made a normal takeoff and climbed to 8,000 feet before it suddenly exploded. Wreckage was scattered over a one-mile-square area within the reservation. An investigation is being conducted to determine the cause of the explosion. "According to Lt. Col. Walter G. Cannon, Deputy Commander of the 3205th Drone Group, 'The incident was the first where a U.S. Air Force pilotless aircraft exploded while being airborne.'" Drone QF-80 jet aircraft and QB-17 World War II Flying Fortresses are used in the support of the "employment and suitability testing" of aircraft and armament. August 27, 1956 – The mid-air collision of two Lockheed T-33A Shooting Stars on approach to Moody AFB, Valdosta, Georgia, results in the deaths of all four crew. The two jet trainers were ~1,000 feet from the runway threshold at an altitude of ~200 feet when they collided. KWF were Capt. Paul W. Horan, 40, assigned to the 3243d Test Group (Fighter) and S/Sgt. Alwyn E. Padgett, 24, of the 3206th Test Wing (Technical support), both out of Eglin AFB. The victims in the second T-33 were Maj. Robert T. Maltby of Antigo, Wisconsin, and Capt. Ray J. Shipley of Mapleton, Iowa. Capt. Horan is survived by his wife, three children, and his parents, Mr. and Mrs. William Horan, of Sarasota, Florida. Sgt. Padgett is survived by his wife, two children, and his parents, Mr. and Mrs. James Padgett, of Crestview, Florida. October 6, 1956 – A B-66B-DL Destroyer, 54-497, of the 34th Bomb Squadron, 17th Bomb Wing, Hurlburt Field, crashes after engine flameout near Blackstone, Virginia. Three crew successfully bail out of the bomber, which was en route from Harmon AFB, in Newfoundland to Eglin AFB. The crew were listed as Capt. Z. W. Ryall, pilot; Lt. D. E. Selby, navigator; and Airman 1st Class C. J. Perusse. "The plane continued for about 18 miles after the crew bailed out, finally crashing in a cow pasture, boring a hole 12 foot deep in the ground." December 13, 1956 – "Recovery of a QB-17 drone aircraft which had been compelled to make an emergency landing on Range 52, was announced this week by Lt. Col. Walter G. Cannon, deputy commander, 3205th Drone Group of the Air Proving Ground Command. After recovery, the drone flew a regular mission before returning to Duke Field, he said. About 10 days ago the drone was returning from a mission over the Gulf when a malfunction of the guidance system caused the plane to lose full azimuth control. This made it impossible for the Drone to land at Field 3, consequently it was set down on an old landnig [sic] strip on Range 52. The drone veered off the runway, nosed over and sustained considerable damage. This damage was repaired at Range 52 and on December 13, the drone was flown off the range and, after making a regular mission, landed at Duke Field." April 1, 1957 – A B-66B-DL Destroyer, 54-493, of the 95th Bomb Squadron, 17th Bomb Wing, Hurlburt Field, crashes on take-off for a routine training mission, coming down at 0029 hrs. two miles N of the airfield, with three crew killed. Pilot was 1st Lt. Richard J. "Dick" Dinger, 29; navigator/observer Capt. John A. Runion, 33; gunner T/Sgt. Stanley P. Klatz, 31, in charge of all 95th BS gunners. Lt. Dinger is survived by his wife Dorothy and one child, and his parents, Mr. and Mrs. Charles R. Dinger, 120 W. Susquehanna, Allentown, Pennsylvania. Capt. Runion is survived by his wife, Irene, and one child. His parents are deceased. Sgt. Klatz is survived by his wife, Lorraine, and two children. His parents are Mr. and Mrs. Henry Klatz, 1359 F Street, Philadelphia, Pennsylvania. All of the deceased resided in Fort Walton Beach, Florida. "The cause of the crash is undetermined. A board of officers has been appointed to conduct an investigation." April 11, 1957 – An RB-66B-DL Destroyer twin jet reconnaissance bomber, 53–410, from Shaw Air Force Base, Sumter, South Carolina, crashed off the north end of the main runway at Eglin Air Force Base. The plane, from the 43d Tactical Reconnaissance Squadron, Night Photo-Jet of the 432nd Tactical Reconnaissance Group, was on a routine training mission to Eglin. The RB-66 landed at Eglin in heavy rain on a wet runway. The pilot deployed the drag chute, used to aid in braking, but the connection pin sheared and the chute fell away. The plane then ran off the runway, across the overrun and plunged over the edge of a 50 foot bluff. The plane landed flat in the valley below, although the impact demolished it and broke it in half. The two crew members, Capt. John T. McLaine, pilot, and Capt. F. Duncan, observer-navigator, escaped serious injury. This was the first accident that the 432nd had had in ten months of flying the RB-66. April 18, 1957 – First Lieutenant Richard L. Corbetta, 25, was killed when his T-33 jet trainer crashed in a wooded area about 4 miles northeast of the base just off State Road 85. The Eglin office of information services said the crash occurred as the plane was preparing to land. The pilot had been on a routine test flight. Corbetta graduated from the University of Colorado with a bachelor of science degree in 1954. He entered active service in the Air Force in March 1955 and completed his pilot's training in April 1956. He was survived by his parents, Mr. and Mrs. Michael J. Corbetta, of Denver, Colorado. May 3, 1957 - An SA-16 Albatross, 48th Air Rescue Squadron, made a forced landing on a livestock farm northeast of Crestview, Florida. Major William E. McDonald, Commander of the 48th Air Rescue Squadron, said the pilot brought the aircraft in with virtually no damage other than some scratched paint. Major McDonald decided, following a survey of the terrain, the cheapest method of retrieval would be to build a runway and fly it out. This was accomplished on May 15. June 6, 1957 - A high pressure oxygen bottle exploded aboard an F-86H Sabre jet fighter. A/3c C. Prentice Malone Jr., was killed and A/3c Alvin C. Storvick was critically injured. A third airman, A/2c William O. Nelson was released from the hospital after observation. All three airmen were members of the 3242nd Test Group (Electronics and Missiles) Air Force Operational Test Center. Airman Nelson had just left the cockpit of the plane when the oxygen bottle ruptured. The other two men were thrown to the ground. The impact of the explosion hurled a portion of the plane's metal paneling about 30 feet. A board of qualified officers was named to ascertain the cause of the accident. August 22, 1957 - Lockheed F-104A Starfighter, 56-753, of AFOTC, is written off after an accident on takeoff from Eglin Main. It crashes 2 miles N of Eglin after engine failure on takeoff. Pilot Maj. Peter Van Matre is killed. October 2, 1957 – First Lieutenant Richard A. Inglehart, 28, 3241st Test Group, Air Force Operational Test Center, was killed in a crash of a North American F-100 Super Sabre at Range 52. The airplane crashed into the ground after the pilot performed a toss bombing manoeuver. He was survived by his parents, Mr. and Mrs. Lewis D. Inglehart of Brunswick, Missouri. October 3, 1957 – Test pilots Maj. John W. Farrow, 32, of Hq. Tactical Air Command, Langley Air Force Base, Virginia, and Capt. Gerald King, 29, of the 3241st Test Group, Eglin Air Force Base, died in the crash of an F-100F Super Sabre. Major Farrow was a liaison officer assigned to the Air Proving Ground Command from the Tactical Air Command. Major Farrow of Strong, Maine, was survived by his wife Beverly and three children of Fort Walton Beach, Florida, and his mother, Mrs. Mary W. Farrow, of Augusta, Maine. Capt. King of Silverton, Oregon, was survived by his wife Elizabeth and two children of Eglin Air Force Base and his parents, Mr. and Mrs. Delbert King of Silverton. December 4, 1957 - A MacDill Air Force Base B-47 Stratojet exploded in mid-air over Choctawhatchee Bay. Parts of the plane were scattered over a wide area and were under water that varied in depth from 20 to 30 feet. With an assist by U.S. Navy divers from the Mine Detection Laboratory, Panama City, Florida, the Underwater Demolition Team No. 21 from Little Creek, Va., the 3201st Boat Squadron, APGC, had recovered most of the plane. Lt. Col. Willie Preston Gregory, pilot, was killed along with Ronald R. Farnsley, co-pilot, and Lt. Col. Odie F Rogers, Navigator. February 10, 1958 - The Okaloosa Squadron of Civil Air Patrol was credited with locating a crashed Navy T-28 trainer from Whiting Field. Wreckage of the plane, in which the body of Lt. Jerry Waldohoff, 24, was found was spotted by Lt. Martha Ellis, who was an observer in a plane piloted by Lt. Earl Savage. Ellis spotted the plane southwest of Crestview, Florida, in a wooded area near Eglin Range Five. March 17, 1958 – A North American F-100F Super Sabre crashed about nine miles north of Mossy Head, Florida, shortly after taking off from Eglin Air Force Base. Both pilots parachuted to safety and were reported to be uninjured. Lieutenant Colonel Frank D. Henderson and Lieutenant Colonel Walter A. Rosefield, both assigned to the Air Proving Ground Center, took off from Eglin Main Base en route to Wright-Patterson Air Force Base, Ohio, when they encountered a flame-out of their engine shortly after takeoff. They headed back to Eglin and bailed out at 10,000 feet when several attempts to accomplish a restart were unsuccessful. The aircraft crashed and burned in a field southwest of Liberty. April 7, 1958 – F-102 Delta Dagger, crashed near Rocky Creek, just east of Niceville, Florida, on the Eglin Air Force Base Reservation. The pilot, Capt. Robert J. Welch, ejected safely. The aircraft was found in a section of densely wooded swamp. The engine was later recovered by a Sikorsky H-37 "Mojave," a large twin-engine helicopter from the Transportation Aircraft Test and Support Activity, Fort Rucker, Alabama. May 2, 1958 – F-105B-1-RE Thunderchief, 54-0101, the second B-model, of the Air Proving Ground Command, suffers an explosion and fire during training mission. During an aerial demonstration the pilot, Capt. Howard Westley Leaf, heard a muffled explosion, and then experienced limited flight controls. He ejected at 300 feet at 500 KIAS. He was beat up flailing in the chute, but survived. This was the first F-105 ejection. Pilot eventually retired as a lieutenant general. Subsequently, it had been reported that persons in the area had taken as souvenirs parts of the plane that crashed near Wright, Florida. The missing parts were urgently needed to help investigators pinpoint the cause of the accident. In particular, a drag parachute had not been located. August 29, 1959 – F-105B-15-RE Thunderchief, 57-5799, of the 335th Tactical Fighter Squadron, explodes on start up on the parking ramp during a cartridge start, pilot Maj. James Ellis Bean survives. 1960s January 4, 1960 – "An Eglin pilot, Capt. James E. Myers of Grand Chain, Ill. ejected from his aircraft when it caught fire at 8:15 a.m. Monday and parachuted to safety about 10 miles north of the Main Base. The aircraft, an F-100 Super Sabre, crashed about 200 feet off Highway 85, ten miles south of Crestview. The plane exploded when it hit the ground and flaming debris was scattered over a radius of several hundred yards. Fire trucks from Eglin Auxiliary Field No. 3 put the fire out within minutes after the accident occurred. A few telephone lines were knocked down but other than that, no property damage was reported. A board of qualified officers is further investigating the accident." March 18, 1960 – Republic F-105B-15-RE Thunderchief, 57-5794, of the 335th Tactical Fighter Squadron crashes in the Gulf of Mexico after the port undercarriage leg would not extend. Pilot Capt. Bingham J. Lawrence ejects safely at 10,000 feet after being advised that his gear will not extend. Rescued. Week prior to March 31, 1960 – A T-33 Shooting Star, in flight at 15,000 feet, piloted by Lt. Col. Edward L. Rathbun, Director of Operations, 4751st Air Defense Wing, experiences engine difficulties, flames out at 8,000 feet, fails to relight. Upon making a dead-stick approach to Hurlburt Field, Eglin Auxiliary Field 9, the trainer's undercarriage refuses to deploy. Control tower operator T/Sgt. Clyde Martin, of the 1920-1 AACS Detachment, seeing the aircraft on approach, deploys the runway barrier control as the T-bird bellies in on the south end of the Hurlburt runway, snagging the jet by its tail and bringing it to a halt with only minor damage, pilot uninjured. June 21, 1960 – Two U.S. Army crew escape injury when their helicopter (type not given) crashes in a wooded area ~10 miles W of Eglin AFB Main Base shortly after a ~noon take-off, this date. Warrant Officer Jesse Taylor, pilot, of Summerdale, Alabama, and T. A. Symes, crew chief, of Dorchester, Massachusetts, members of the 84th Helicopter Company, Lawson Army Airfield, Georgia, were on temporary duty with the Army Ranger Camp at Eglin Auxiliary Field 7. "Following the crash, Taylor was forced to walk about five miles through a wooded area before reaching a telephone to report the crash. Symes remained with the downed craft." August 23, 1960 – Republic F-105B-20-RE Thunderchief, 57-5804, damaged during landing at Eglin AFB, due to drag chute failure. September 6, 1960 – A GAM-77 Hound Dog missile launched from a B-52 Stratofortress over the Eglin Air Force Base, Florida test range at ~1400 hrs. this date goes astray, coming down on a farm near Samson, Alabama. Lt. Col. Gerry Garner, Eglin Air Force Base public information director, stated that an investigation is underway into the errant missile's failure. September 26, 1960 – Republic F-105D-1-RE Thunderchief, 58-1146, the first D-model, experiences fire warning light on takeoff – aborted – on main runway at Eglin Main. Settles back onto the runway, undercarriage collapses. Test pilot Mr. Henry Crescibene of Republic Aviation survives. 1st Lt. Henry A. Crescibene had flown F-86E Sabres with the 335th Fighter-Interceptor Squadron, 4th Fighter-Interceptor Wing, in Korea, killing one MiG-15, on August 4, 1952. Airframe scrapped. December 2, 1960 – Republic F-105B-10-RE Thunderchief, 57-5781, used by Republic Aviation for tests at Eglin AFB, suffers engine fire during training mission, pilot Capt. Ray Kingston ejects and is rescued, and taken to the dispensary at Suffolk County Air Force Base, Westhampton. Airframe impacts in Bellport Bay, Long Island, New York. January 11, 1961 – Republic F-105D-5-RE Thunderchief, 59-1730, crashes near Eglin during a training mission due to undetermined causes, pilot Jack B. Mayo KWF. Wreckage presumably comes down in the Gulf of Mexico as neither the pilot nor airframe are recovered. January 18, 1961 – Wreckage from a T-33 found floating in Choctawhatchee Bay, was positively identified as part of an overdue plane that was en route to Eglin from McCoy Air Force Base, Florida. The plane was practicing instrument approaches when approach control lost contact shortly before 2300 hrs. The pilot was identified as Maj. John M. Simmons, a test pilot with the Air Proving Ground Center. Two days of searching yielded only a few pieces of aircraft wreckage, but that along with the plane's flight log positively identified them as belonging to the missing plane. June 17, 1961 – Republic F-105B-20-RE Thunderchief, 57-5832, of the 334th Tactical Fighter Squadron, Seymour-Johnson AFB, North Carolina, suffers flameout during training mission, makes hard landing at Eglin Auxiliary Field 2, main gear strut comes up through the wing. Pilot Capt. Samuel Henderson Martin III survives. February 4, 1962 - Seven are killed when Douglas C-47A-25-DK Skytrain transport, 42-108992, MSN 13768, crashes and explodes immediately after takeoff at Greensboro-High Point Airport, North Carolina. The plane apparently lost power about 150 feet off the ground, and plunged into a grassy area at the edge of the airport. The left wing struck first and its fuel tanks ignited. Two bodies were thrown clear of the flaming wreckage. Plane was en route from McGuire AFB in New Jersey to its home field at Eglin AFB. Landed in Greensboro about 1600 hrs. to pick up an officer. Prior stop was in Philadelphia, Pennsylvania. A UPI wire service story stated that five of the dead were identified as 4 crew members and a passenger. Authorities still were attempting to identify the other 2. The dead included: Capt. Richard J Rice, Fort Walton Beach, Fla., 27, aircraft commander. Capt. David L Murphy, Bloomfield, Neb., pilot. Capt. Thomas D Carter, Helena, Ark., Navigator. T-Sgt. Bernard P Terrien, Gillett, Wis., 32, crew chief. Capt. Robert H Sanford, Greensboro, N.C. 34, the passenger. March 17, 1962 – Republic F-105D-1-RE Thunderchief, 58-1148, written off in an accident at Eglin Air Force Base this date. This was the third D-model built. During a training mission, aircraft suffers an explosion and fire at 3999 ft. altitude in a climbing right turn. Pilot Capt. John V. Cobislero ejects at 350 knots IAS, aircraft crashes 8 miles N of Fort Walton Beach, Florida on the Eglin Range. Pilot survives. March 29, 1962 - As a Strategic Air Command Boeing B-52 Stratofortress was being placed in a hangar, the tail hit a high voltage wire. Airman Curtis John Shoedel, who was aboard the tow truck pushing the aircraft, was killed. Three other airmen who were working with the operation were severely burned. April 16, 1962 – Republic F-105D-5-RE Thunderchief, 58-1166, of the 335th Tactical Fighter Squadron, Seymour-Johnson AFB, North Carolina, on a training mission over an Eglin Range, begins a low level toss bomb run. Pilot Charles Glenn Lamb, Jr. is at Mach 1.1 at 700 KIAS as he begins his pull-up when the aircraft is observed exploding into 3 major pieces in a huge fireball. The pilot is killed. January 8, 1963 – F-104B-1-LO Starfighter, 56‑3720, c/n 283-5001, the second B-model, crashes on an Eglin range – several air starts were initiated which resulted in power loss, sound of tailing air‑conditioning turbine was mistaken for engine failure. Pilot ejects. February 7, 1963 – Republic F-105D-25-RE Thunderchief, 61-0216, c/n D-411, of the 4525th Combat Crew Training Wing, Nellis AFB, Nevada, and F-100F Super Sabre flying in close formation, are hit by shrapnel from a defective BLU-14 bomb, one of four dropped from the F-105 while on a run over a rail spur on an Eglin Range. F-105 pilot Maj. Frederick C. Kyler, and pilot and photographer in F-100 all successfully eject. Footage of the accident was released by British Pathé newsreel. March 27, 1963 – North American T-28A-NI Trojan, 52-1242, c/n 189-57, converted to first prototype RA-28 (a proposed turboprop combat version for use in SE Asia), later redesignated YAT-28E. To Air Force Special Evaluation Center at Eglin AFB, Florida for tests. Deficiency in tailfin area (tail unit separated in flight) led to its entering a flat spin and crashing this date whilst on its 14th test flight, killing North American Aviation pilot George Hoskins when he is unable to bail out due to a jammed canopy.FLIGHT International, April 18, 1963, page 567. The cause is traced to the failure in flight of the rear stabilizer spar which is unable to cope with the increased thrust generated by the turboprop. July 11, 1963 -An F-100 Super Sabre used for low-flying ground support was strafing an isolated area on Eglin Air Force Base with 50-caliber machine guns when the pilot saw a target and fired all four of the plane's dummy rockets. One of the rockets crashed through a narrow slit in the concrete-lined bunker used for umpiring the war games. An explosion followed. Two offices were killed and four civilians along with ten Air Force personnel were injured. The two officers killed were Lt. Col. Sherman R. Smith, Ground Operations School, Hurlburt Field; and Capt. Mercer R. Ferguson, Cannon Air Force Base, New Mexico."Fatal Accident Probe Continues," Playground Daily News, Fort Walton Beach, Florida, July 15, 1963, p. 3. August 19, 1963 – A USAF QB-47E Stratojet, of the 3205th Drone Director Group, veers off course on touchdown at Eglin Air Force Base, Florida, crashing onto Eglin Parkway parallel to the runway. Two cars were crushed by the Stratojet, killing two occupants, Robert W. Glass and Dr. Robert Bundy, and injuring a third, Dorothy Phillips. Mr. Glass and Dr. Bundy both worked for the Minnesota Honeywell Corporation at the time, a firm which had just completed flight tests on an inertia guidance sub-system for the X-20 Dyna-Soar project at the base utilizing an NF-101B Voodoo. Mrs. Phillips was the wife of Master Sergeant James Phillips, a crew chief at the base. Mrs. Phillips was treated for moderate injuries and released later that day. Both vehicles were destroyed by fire. Four firefighters were treated for smoke inhalation while fighting the blaze which reignited several times. Fire crews had to lay over a mile of hose to reach the crash from the nearest hydrant, as well. The QB-47 was used for Bomarc Missile Program tests, which normally operated from Auxiliary Field Three (Duke Field), approximately 15 miles from the main base, but was diverted to Eglin Main after thunderstorms built up over Duke. A report released by the Office of the Deputy Inspector General, Headquarters USAF, Norton AFB, California, said that the drones air speed on approach was 140 knots and the glide angle one and a half degrees. Upon flaring, the engine sounds indicated that the throttles were advanced. The drone struck the runway on the front vehicle bounced into the air and started to porpoise. It veered to the right 5,400 feet from the end of the runway. It hit a culvert and slid to a stop on Eglin Blvd. and burned. The final cause factors would be released after review by Air Force technical authorities. October 28, 1963 - An F-104 Starfighter, was starting its taxi run for its second test mission of the day. As the pilot began to lower the aircraft's wing flaps, a minor electrical malfunction separated the left tip tank from the aircraft. The tank ignited when it struck the ground. The ground crew, SSgt. Robert G. King; A1C Charles E. Dudley; and A2C Billy W. Law, used fire extinguishers to put out the blaze. Dudley received minor burns. All three were members of the 3214th Organizational Maintenance Squadron. October 30, 1963 – An F-105D-6-RE Thunderchief, 60-419, of the 3214th OMS, Eglin AFB, piloted by Capt. Robert L. Jondahl, crashes two miles E of Niceville, Florida. While making supersonic passes on Eglin Ranges. pilot felt the engine fail. Pilot received red lights and lost flight controls. Ejected safely. Joe Baugher cites crash date of October 23. January 22, 1964 – A USAF F-104B-10-LO Starfighter, 57‑1306, c/n 283-5019, of the 319th Fighter-Interceptor Squadron, Air Defense Command, Homestead Air Force Base, Florida, crashes at ~1330 hrs. on Santa Rosa Island, ~one mile E of Fort Walton Beach, Florida, shortly after departure from Eglin Air Force Base, Florida, to return to Homestead. The pilot, Capt. Lucius O. Evans, ejects safely just before the fighter impacts in sand dunes just short of the Coronado Motor Hotel, parachuting into the Choctawhatchee Bay. He is then transported to the Eglin base hospital by Assistant Police Chief Jack McSwain, where he is reported to have sustained no injuries. Over sixty occupants at the hotel are not injured although flaming wreckage sprays an area close to the business. Eyewitness Andrew Christiansen, of Chester, Connecticut, reported that the aircraft was on fire as it descended and observed Capt. Evans' ejection from the Starfighter. A secondary explosion after the impact further scatters the burning wreckage. February 11, 1964 – During an evening airpower demonstration, B-26B Invader, 44-35665, built as a B-26C-45-DT, on a strafing pass over Range 52 at Eglin AFB, Florida, loses its port wing as it pulls up at ~1945 hrs., with the loss of two crew, both assigned to the 1st Air Commando Wing, Hurlburt Field. KWF are pilot Capt. Herman S. Moore, 34, of 28 Palmetto Drive, Mary Esther, Florida, and navigator Capt. Lawrence L. Lively, 31, of 19 Azalea Drive, Mary Esther, Florida. Moore, originally of Livingston, Montana is survived by his widow, Nancy Lee Moore, and a stepson, John H. Duckworth, 9, and his parents, Mr. and Mrs. William N. Moore, 117 South 10th Street, Livingston. Mrs. Moore is a teacher in the Okaloosa County School system. Lively is survived by his widow, Joan R. Lively. The Invader was participating in a demonstration of the Special Air Warfare Center's counter insurgency capabilities, an activity that had been presented on average of twice each month for the past 21 months. This was the first such accident for SAWC during that period. The audience included 19 journalists. The USAF subsequently grounds all combat B-26s as the stress of operations now exceed the airframes' abilities. On Mark Engineering Company remanufactures 4 old airframes as one YB-26K and 39 B-26Ks with new spars, larger engines and rudders, and new 1964 fiscal year serial numbers which see use in Southeast Asia, and which will be redesignated A-26As for political reasons. The YB-26K was later brought up to B-26K standard. November 9, 1964 - A Douglas A-1 Skyraider crashed during a practice gunnery mission near DeFuniak Springs, Florida. Pilot William J. Walsh, 4410 Combat Crew Training Squadron, and Second Lt. William A. Shagner, III, 317 Air Commando Squadron, First Air Commando Wing, Hurlburt Field, Fla., died in the crash which occurred shortly before 8 p.m. near Range 52. December 16, 1964 – On Mark B-26K Counter-Invader, 64-17656, remanufactured in 1964 from A-26C-50-DT, 44-35847, is written off on an Eglin range during a low-level applied tactics mission. Pilot killed, navigator bails out but loses leg while exiting the airframe. June 15, 1965 – Due to an unfortunate oversight in inspecting F-105 Thunderchiefs following the fatal crash of a Thunderbirds air demonstration team F-105B at Hamilton Air Force Base, California on May 9, 1964, one was missed and it subsequently crashed this date at Eglin Air Force Base. Early-production JF-105D-5-RE, 58-1149, the fourth D-model built, and first Block 5 airframe, flown by Republic Aviation test pilot Carlton B. Ardery, Jr., broke apart during a 7.33 G pull-up during a test mission when the same weak backbone plate failed that caused the Thunderbirds fatal accident, stated a Fairchild Hiller Accident Report. The pilot was killed. Aircraft crashes 39 miles SE of Eglin AFB. June 24, 1965 – The mid-air collision of two Douglas A-1 Skyraiders, of the 4407th Combat Crew Training Squadron, 4410th Combat Crew Training Wing, over the small community of Children's Home in north Okaloosa County, Florida, resulted in the deaths of four Hurlburt Field pilots: Maj. Robert W. Robinson, Capt. James J. Jines, Jr., Capt. Edward P. Doyle and Maj. Donald L. Lumadue. The collision occurred while the planes were flying formation during a routine training mission. Eyewitnesses saw one man bail out and apparently maneuver his parachute. However, his body was found some hours later in a wooded area some distance from the wreckage of the two planes. Testimony from investigators stated that the planes were "dogfighting" with two F-100 jets, both of which pulled out before the A-1E, 52-132644, piloted by Doyle (the wingman) crashed into the cockpit of the A-1G, 52-132535, piloted by Jines.<ref>Fort Walton Beach, Florida, Playground Daily News, "Collison Kills Four in Okaloosa", Friday, June 25, 1965, page 1.</ref> June 24, 1965 – While flying mock air combat with his wingman in an F-5A Freedom Fighter under the "Sparrow Hawk" program, Capt. Jerry A. Shockley flies into the ground. USAF Accident/Incident Report 65-6-24-2, dated July 19, 1965, attributes crash to "operator error". "Sparrow Hawk" was the preliminary evaluation of the F-5A prior to its deployment to South Vietnam under the combat evaluation known as "Skoshi Tiger". Capt. Shockley had flown Slot with the 1964 Thunderbirds air demonstration team. June 28, 1965 - Capt. Michael Joseph Lesicko died from injuries sustained when he was ejected from an F-4C "Phantom" as he was taxiing to take-off position. The cause of the ejection was under investigation. Capt. Lesicko was assigned to the 33rd Tactical Fighter Wing, Eglin Air Force Base. November 20, 1965 – A Nike missile went out of control and landed in a wooded area off U.S. 98. This rocket was launched at 0730 hrs. from the aerospace launch facility at Santa Rosa Island. It was one of a series and programmed to fly over the gulf to measure changes in the atmosphere. But a malfunction forced it to go out of control and to land one mile east of Hurlburt Field. A 17-foot section of this rocket plunged to the ground about 100 yards from the home of retired Vice Adm. L.A. Moebus. January 17, 1966 – Two crew of an F-105F-1-RE Thunderchief, 62-4412, c/n F1, the first F-105F, of a test squadron based at Eglin Air Force Base, Florida, escape injury when the engine of the fighter-bomber in which they are engaged in a photo-chase mission catches fire while on high final, forcing them to eject. The airframe impacts in East Bay, 5 miles N of Tyndall AFB, Florida at 1008 hrs. Pilot Capt. James D. Clendenen and photographer S/Sgt. Jack G. Cain are recovered from the water by a Tyndall base helicopter. January 17, 1966 – A Lockheed T-33 Shooting Star on a night mission crashes and burns in a wooded area 11 miles NW of Eglin AFB, killing both crew. According to the base information officer, the wreckage was located in a densely wooded area which made the approach of rescue vehicles difficult. KWF were Capt. Robert D. Freeman, 30, of Lindsey, Oklahoma, and 2nd Lt. Roger A. Carr, 26, of Ames, Iowa. Both were residents of Fort Walton Beach, Florida and were assigned to the Air Proving Ground Center. Capt. Freeman is survived by his widow, Faith, and three children, Donna, 7, Robert L., 5, and Alison C., 18 months; and his parents Mr. and Mrs. Robert L. Freeman, of Lindsey. Lt. Carr is survived by his widow, Karen, and a five-month-old son, Craig; and by his parents, Mr. and Mrs. Herbert W. Carr, of Ames. February 25, 1966 – Two crew are KWF in F-4C-23-MC Phantom II, 64-0808, of the 4th Tactical Fighter Squadron, 33d Tactical Fighter Wing, Eglin AFB, when the fighter goes down in the Gulf of Mexico 58 miles SSE of the base at 0759 hrs. The body of 1st Lt. Robert M. Gibbs, 27, of York, Pennsylvania, is recovered several hours after the crash. He is survived by his wife Aleda, of Eldridge Road, Fort Walton Beach, Florida. Funeral services are held for Gibbs on March 1, 1966, at York, Pennsylvania, with interment at Gettysburg National Cemetery. The U.S. Coast Guard officially abandons the search for the body of Capt. Stanley R. Pyne, 35, of Bromigs, Oregon, on Saturday night, February 26, officially listed as killed. He leaves his widow, Valerie, a native of Great Britain, a daughter, Colleen, 4, and a son, David, three weeks old, of 29B Boatner Drive, Eglin AFB. Memorial services are held for Capt. Pyne at Chapel 3, Eglin AFB, on Monday, February 28. April 5, 1966 – A Hurlburt Field-based T-28 Trojan makes a forced landing, but suffers little damage and the two crew are unhurt. April 6, 1966 – Two Hurlburt Field pilots are killed shortly before 1200 hrs. when their T-28 Trojan fails to pull out of a dive during a routine dive-bombing and gunnery-training mission on Range 77, about eight miles from the field. The wreckage is located in such a remotely wooded area that it takes more than an hour before news of the accident can be released that it had taken place. KWF are pilot Capt. Dennis L. Anderson, 30, of Guernsey, Wyoming from the 3646th Pilot Training Wing, and co-pilot Capt. Hubert L. "Buddy" Blake, 28, of Garland, Texas from 3651st Pilot Training Squadron. Both were TDY to the 4410th Combat Crew Training Wing. Cause of the crash is investigated, and in the meantime, all Tactical Air Warfare Center T-28s are grounded as a precautionary measure. The official cause of the crash was metal fatigue. Capt. Blake was a member of the Air Force ROTC 845th Group Staff at Texas Christian University and earned the B.A. in history in 1960. April 29, 1966 – Republic F-105D-10-RE Thunderchief, 60-0457, of the 3214th OMS, Eglin AFB, piloted by Capt. John S. Hardy, suffers flameout during training mission, touches down 287 feet short of the runway at an auxiliary field (which one?), hard on the tail and main gear. The aircraft bounced, nose gear sheared, and the plane stopped 4000 feet down Runway 36. Pilot evacuated unhurt. August 11, 1966 - A Hurlburt Field UH-1 Iroquois helicopter crashed in a wooded area three miles northwest of Niceville, Florida. October 3, 1966 - McDonnell F-4D-26-MC Phantom II, 65-0606, c/n 1539, of the 33d Tactical Fighter Wing, crashes on take-off from Eglin AFB, Florida. October 14, 1966 – Republic F-105F-1-RE Thunderchief, 62-4421, c/n F10, of the 3214th OMS, Eglin AFB, piloted by Maj. Kenneth H. Coffee, enters uncontrollable roll, pilot ejects successfully at 2000 feet and is rescued, aircraft crashes 17 miles S of Tyndall AFB, Florida, in the Gulf of Mexico. Rear seat of fighter-bomber was unoccupied. Major Coffee was flying a safety chase mission at the time of the accident. November 25, 1966 – A Hurlburt Field pilot, First Lieutenant James O. Barbre, 24, of Carol City, Florida, died when his Cessna O-1E Bird Dog forward air controller liaison aircraft of the 4410th Combat Crew Training Squadron out of Holley Field collided with a Douglas A-1E Skyraider fighter-bomber of the 4409th Combat Crew Training Squadron out of Hurlburt Field and crashed on Eglin's Range 77. The two aircraft were engaged in a routine Southeast Asia ordnance training mission. The A-1E was only slightly damaged and landed safely at Hurlburt 14 minutes after the collision. January 5, 1967 – Martin TGM-13 Mace, launched from Site A-15, Santa Rosa Island, Hurlburt Field, Florida, by the 4751st Air Defense Missile Squadron at ~1021 hrs., fails to circle over Gulf of Mexico for test mission with two Eglin AFB F-4s, but heads south for Cuba. Third F-4 overtakes it, fires two test AAMs with limited success, then damages unarmed drone with cannon fire. Mace overflies western tip of Cuba before crashing in Caribbean 100 miles south of the island. International incident narrowly avoided. To forestall the possibility, the United States State Department asks the Swiss Ambassador in Havana to explain the circumstances of the wayward drone to the Cuban government. The Mace had been equipped with an "improved guidance system known as 'ASTRAN' which is considered unjammable." (This was apparently a typo for ATRAN – Automatic Terrain Recognition And Navigation terrain-matching radar navigation.) January 19, 1967 - A 23:22 GMT launch of a Nike Iroquois missile on aeronomy test AF07.656, conducted by the Air Force Cambridge Research Laboratories, fails when the vehicle only achieves an apogee of 12 miles (20 km). A second Nike Iroquois, launched at the same time on aeronomy release mission AF07.655, succeeds, achieving an apogee of 66 miles (107 km). April 21, 1967 - McDonnell F-4D-27-MC Phantom II, 65-0664, (c/n 1682), of the 4th TFS, 33d TFW, crashes near Crestview on the Eglin AFB reservation, supposedly after collision with F-4D-29-MC Phantom II, reported as 65-0777, c/n 1849; however, 65-0777 is also listed as preserved at American Legion Post 521, Pasadena, Texas. Pilot Capt. L. A. Showalter ejected from 0566 and his GIB, 1st Lt. Stephen D. Gulbrandson, experienced his first ejection while the aircraft was at 500 feet altitude and almost inverted. The Project Get Out and Walk ejection website makes no mention of 65-0777 or any other second aircraft involved in this accident, so the fact that 0777 still exists strongly suggests that this was a one-airframe event and not a mid-air. September 26, 1967 - Douglas A-1E Skyraider, 52-133923, of Tactical Air Command, crashes during a training flight, Lt. Col. Albert C. Hamby and Maj. William N. Kuykendall KWF. Kuykendall was an instructor with the 4410 Combat Crew Training Squadron at Hurlburt Field and Hamby was his student. The plane crashed in a remote scrub oak and pine woods near Blue Mountain Beach, 20 miles east of Destin. Debris from the crash covered a quarter mile area from where the plane first hit the top of a pine tree until it came to rest near the edge of a swamp. November 14, 1967 – A Hurlburt Field-based C-123 Provider crashes at Crestview, Florida, killing one crew, all others injured. January 23, 1968 – QF‑104A-5-LO Starfighter, 56‑0744, c/n 183-1032, on a manned drone flight crashes on the Eglin range after DT-33A director aircraft loses control, pilot on F‑104 takes over, but engine catches fire and control is lost, pilot ejecting safely. The pilot, Capt. Jack L. Hudson of the Drone Division, was immediately picked up unhurt by a rescue helicopter from Eglin AFB. January 25, 1968 – A Hurlburt Field-based C-123K Provider, 55-4518, c/n 20179, of the 4408th Combat Crew Training Squadron, 4410th Combat Crew Training Wing, crashes on approach to Duke Field, the airframe coming down on the Eglin reservation ~1/2 mile from the runway threshold. All four on board are killed. The men killed in the crash were identified as Maj. Donald R. Tomlinson, Fort Walton Beach, Fla.; SSgt. James H. Jefferies, Destin, Fla.; Lt. Francis G. Guidry, Ville Platte, La.; and Lt. Stanley R. Armstrong, Mesa, Arizona. The wreckage is abandoned in situ. The battered wings, tail section, and other small debris still there in 2016. According to an Air Force spokesman, four witnesses in the control tower reported that the plane was circling the field making practice landings. The plane was in a landing pattern when it suddenly turned off as it approached the runway and never came out of the turn. February 2, 1968 – F‑4E-32-MC Phantom II, 66‑0311, of the 40th Tactical Fighter Squadron, 33rd Tactical Fighter Wing, crashes into the Gulf of Mexico 20 miles offshore near Eglin AFB, both crew safely ejecting. March 19, 1968 – Two Eglin men were killed when their F-4 Phantom II fighter bomber crashed and burned over Test Area 52. The men were identified as Maj. Charles M. Dray, 36, the aircraft commander from Tampa, and First Lieutenant Charles V. Townsend, Jr., 27, of Guthrie, Oklahoma, the pilot. The plane was on a routine training mission at the time of the accident about 25 miles northeast of Eglin. The cause of the crash was unknown and was under investigation. Both officers lived on Eglin Air Force Base. Maj. Dray was survived by his wife, Helen H. and Lt. Townsend was survived by his parents. April 16, 1968 – A Hurlburt Field-based Fairchild C-123K Provider, 54-602, c/n 20051, call sign MOOSE 09, of the 4408th Combat Crew Training Squadron, 4410th Combat Crew Training Wing, crashes near Panama City, Florida, while on a training mission. The aircraft departed Hurlburt at 0800 hrs. CST as lead of three C-123s for a practice SEA spray mission at a point 25 nm NW of Panama City, arriving there at 0835 hrs. After several simulated defoliation runs, the aircraft took up the number three position in a right echelon formation at 0850 hrs. for another pass. After the run a right 270 degree turn was ordered and while making it the number three aircraft struck the ground left wing-low, and cartwheeled, caught fire and was destroyed. Maj. Joseph M. Chalk, Jr., 34, student pilots Lt. Col. Thad M. Neal, 44, and Maj. George M. Greglein, 33, and flight engineer Sgt. Richard Best, 20 The instructor pilot, Maj. Joseph M. Chalk, Jr., 34, two student pilots, Lt. Col. Thaddeus "Thad" M. Neal, 44, and Maj. George M. Greglein, 33, and the flight engineer Sgt. Richard Best, 20, all KWF. May 31, 1968 – JQF-104A Starfighter drone, 56-0733, 'QFG-733', (so modified and designated on November 29, 1961), of the 3205th Drone Squadron, suffers a severe class A landing accident at Eglin AFB, Florida. Repaired. This airframe preserved at the Historic Aviation Memorial Museum (HAMM) in Tyler near Arlington, Texas by April 2005. January 24, 1969 – An EC-121R Batcat, 67-21476, call sign Homey 92, of the 553d Reconnaissance Wing, Otis AFB, Massachusetts, departs Duke Field, Florida, at 0730 hrs EST. on a local range mission, lands at Eglin AFB for equipment offload, then proceeds to Otis AFB for termination of flight. Makes three approaches due to poor weather conditions, and on third attempt at 1814 hrs. EST, contacts the ground 4,060 feet from Precision Approach Radar touchdown point. Airframe enters area covered with small pine trees, left main gear and nose gear collapse during roll-out over unimproved terrain, coming to a stop after travelling 2,560 feet, 1,810 feet from NW approach end of runway 14. Crew of 12 makes orderly evacuation from plane, which does not burn, remaining largely intact. One crewman breaks a leg while evacuating the rear of the fuselage. Aircraft commander was Maj. David F. Collett. May 19, 1969 - An Air Force O-2A aircraft crashed at approximately 5:30 p.m. six miles west of Navarre, Florida, off U.S. Highway 98. Anyone having information about the accident was asked to call the Command Post at Hurlburt Field. September 2, 1969 - Five airmen are killed when their Bell UH-1P Huey crashes in a marshy ravine two miles west of Highway 87 near the Yellow River, near Milton, Florida. The helicopter was on a routine training mission from Eglin when it apparently struck a 110,000-volt transmission line 65 feet above ground. "The victims, all members of the 4409th Combat Crew Training Squadron at Eglin Air Force Base, were Maj. Leonard F. Ciemniecki, 35, instructor-pilot, of Fort Walton Beach; Sgt. Eddie Hagerman, 40, Fort Walton Beach; Sgt. Gene Lally, 22, Hurlburt Field; Capt. Richard M. Ryan, 26, Portland, Ore., assigned to Eglin on temporary duty from McGuire Air Force Base, N.J.; and Carl E. Troyer, airman, 20, of Plain City, OH." October 8, 1969 - Sikorsky HH-53C, 67-14996, of the 55th ARRSq at Eglin AFB goes out of control and crashes 36 miles SW of Eglin AFB during aerial refueling and crashes into the Gulf of Mexico, killing all on board. November 13, 1969 – T-39A-1-NA Sabreliner, 59-2871, c/n 265-4, crashed into waters of the Choctawhatchee Bay, 2.5 miles (4 km) while on approach to Eglin in foggy weather, no fatalities of two on board. The aircraft was fitted with radiological test equipment for Project HAVE DOUGHNUT. 1970s May 1, 1970 – The crash of a Cessna O-2 Skymaster of the 547th Special Operations Training Squadron, 1st Special Operations Wing, out of Holley Field, an auxiliary field W of Hurlburt Field, Florida, kills two Air Force pilots when their aircraft on a forward air control mission crashes on Friday morning 20 miles NW of Hurlburt. "The pilots were identified as Maj. Billy R. Thompson, 37, assigned on temporary duty from the 64th Bomb Squadron at Little Rock AFB, Ark., and Capt. Noah A. Kennedy II, 26, assigned to the 547th Special Operations Training Squadron at Holly [sic] Field." Kennedy, the instructor pilot, is survived by his wife Katherine of 209 Lorraine Drive, Fort Walton Beach, Florida. Survivors of student pilot Thompson are his wife, Sarah, and three children. An investigation by a board of Air Force officials is being conducted to determine the cause of the crash. June 17, 1970 – A late Wednesday night crash of a Hurlburt Field-based Douglas A-1E Skyraider, 52-132641, of the 4407th Combat Crew Training Squadron, 1st Special Operations Wing, takes the lives of two Air Force officers TDY to Eglin while on a local training flight near Hurlburt. "According to Eglin officials, Lt. Col. James J. Mihalick, 39, of Luke AFB, Ariz., was killed in the accident, and Maj. Odell L. Riley, (O'Dell L. Riley, in one source) 34, of Tyndall AFB, Panama City, died Thursday morning in the Eglin Hospital after being listed in very serious condition." Mihalick, of Dunlow, Pennsylvania, is survived by his wife Dorothy and four daughters, Frances, 15; Susan, 13; Loretta, 11; and Dorothy, 9, all of Wickliffe, Ohio. Riley is survived by his wife Beverly, and three children: Mark, Laura, 8, and Jamie, 4; and his parents Mr. and Mrs. Odell Riley, Sr., of Augusta, Georgia. December 17, 1970 - Douglas A-1H Skyraider, 52-134535, of the 4407th Combat Crew Training Squadron, 4410th Combat Crew Training Wing, crashes on take off from Hurlburt Field. Capt. Randy Jayne ejects and survives. Airframe repaired and eventually transferred to the Vietnamese Air Force. May 10, 1972 – A Fairchild AU-23A Peacemaker, 72-1309, being tested under Credible Chase by the 4400th Special Operations Squadron (Provisional), crashed after an in-flight engine failure. The pilot was not hurt, but all AU-23As were grounded until 22 May, during the accident investigation. June 18, 1972 – General Dynamics F-111A, 67-0082, c/n A1-127, crashes near Eglin AFB shortly after takeoff. Lost control after an external fuel fire and explosion. Unsuccessful ejection, crew killed. March 4, 1974 – A USAF CIM-10 Bomarc missile of the 4751st ADMS, Hurlburt Field, Florida, explodes on Santa Rosa Island due to a malfunction shortly after launch from Site A-15, impacting on government property adjacent to the launch site. Eglin AFB authorities confirmed that there were no personnel injuries, and local law enforcement agencies had received no damage reports. April 29, 1974 – A USAF Martin MGM-13 Mace of the 4751st ADMS, crashed in a wooded area of Eglin AFB, Florida, approximately ~1.5 miles north of Auxiliary Field 4 after launch from Eglin Site A-10 on Santa Rosa Island about 1200 hrs. for a routine Air National Guard training mission. There were no injuries or property damage although a small brushfire was ignited, quickly extinguished. The okay to launch the nine remaining Maces during June for air-to-air missile tests was given on May 29, 1974. "Officials noted that 154 mace [sic] target missiles had been fired prior to this failure, with none failing due to a similar problem." January 27, 1975 – An F-4 Phantom II of the 3246th Test Wing, Air Development and Test Center, makes a wheels-up landing at ~0600 hrs. at Eglin AFB. "Air Force officers are conducting an investigation into the incident, but have not determined as yet the extent of damages or the cause of the unconventional landing." The aircraft reportedly slid the length of the north-south runway on its underside and came to rest at the south end of the runway near King Hangar. The only damage reported was to the external tanks and flaps of the aircraft. The unidentified pilot was uninjured. August 26, 1975 – A-7D-12-CV Corsair II, 72-0172, of the 76th Tactical Fighter Squadron, 23rd Tactical Fighter Wing, England AFB, Louisiana, crashes on a test range on the eastern area of the Eglin reservation at ~2240 hrs. during a night training mission. The aircraft, part of a three-ship flight, had departed England AFB at ~2015 hrs. for a ground attack simulation at Eglin. The A-7D went down while orbiting the range with the other two aircraft of the flight. Pilot Capt. William N. Clark, 33, of Little Rock, Arkansas is KWF. "The cause of the crash is unknown at this time but is being investigated by a board of qualified officers," Maj. Les Smith, Eglin Information officer, said. The three jets were slated to return to England AFB directly after completing the mission, Smith said. Capt. Clark is survived by his wife and three children who reside at England AFB. December 23, 1975 – Ling-Temco-Vought A-7D Corsair II, 67-14586, c/n D.005, while assigned to Eglin AFB, Florida's 3246th Test Wing, Air Development and Test Center for mission support, suffers engine failure on take-off from Tallahassee Municipal Airport, Florida and makes forced landing, coming down largely intact. Pilot ejects. Airframe is hauled back to Eglin AFB on a truck, where it is either scrapped or becomes a target hulk. October 27, 1976 – General Dynamics F-111E-CF, 67-0116, c/n A1-161 / E-2, of the 3246th Test Wing, Armament Development and Test Center, one of two assigned to the base, crashes at Eglin AFB, Florida, upon return from a test mission and burns. Crew, pilot Capt. Douglas A. Joyce, and Capt. Richard Mullane, deploy crew escape module safely and are uninjured. April 25, 1977 – An F-4 Phantom II crashes on an Eglin AFB Range. A 20th Special Operations Squadron UH-1N crew is diverted from a training mission over the Eglin Range to perform search and rescue duty for an F-4 crew. The Huey crew successfully located the downed crew and went in for the recovery as ordnance exploded from burning wreckage of the F-4 nearby. Staff Sergeant James T. Carter won the Cheney Award for his part in the rescue. September 2, 1977 – McDonnell Douglas F-4E-41-MC Phantom II, 68-0518, c/n 3711, UKE 21, of the 33d TFW, operating out of Nellis AFB, Nevada, crashes in The Seeps, 11.5 miles NE of Rachel, Nevada, during Exercise "Red Flag 77-9". The aircraft was flying as lead of a flight of two for the Blue Forces. The aircraft impacted the ground in a 25 degree nose down angle at 310 KIAS as the aircrew attempted to negate a stern gun attack by Hawk 42, an F-15 aggressor. The pilot, Captain David W. Sanden, and weapons systems officer, 1st Lieutenant James I. Lewis III, were killed. August 13, 1979 – A Sikorsky CH-3E of the 20th Special Operations Squadron, Hurlburt Field, is forced to make an emergency landing in the Choctawhatchee Bay near Eglin AFB after an engine failure and fire. The aircraft is recovered safely and towed back to Eglin for repairs. The tow operation takes six hours. 1980s October 29, 1980 – A USAF YMC-130H, 74-1683, c/n 4658, outfitted with experimental JATO rockets for Operation Credible Sport, a planned second attempt to rescue American hostages held by Iran, is destroyed when the rockets misfire during a test landing at Wagner Field, Eglin Air Force Base, Florida, USA. All crew members survive, but the rescue operation is deemed excessively risky and is cancelled. The remains on the plane, which was left mostly intact, were buried on site. April 5, 1981 - Two F-51 Mustangs collided head on at Eglin Air Force Base Auxiliary Field No. 2. Both pilots were members of the 167th Fighter Bomber squadron of the 123rd Fighter Bomber Wing of the Kentucky National Guard. The group, normally stationed at Godman Air Force Base, Fort Knox, Kentucky, was at Eglin for temporary duty following its return to active status. April 15, 1981 – An Air Force pilot mistakenly shoots down an F-4E-54-MC Phantom II, 72-1486, c/n 4445, of the 526th Tactical Fighter Squadron, 86th Tactical Fighter Wing, TDY from Ramstein Air Base, West Germany on WSEP training, during a training mission over the Gulf of Mexico with an AIM-9 Sidewinder missile. The two-man crew, Capt. M. R. "Ruddy" Dixon and Captain Charles G. Sallee, ejected from the burning F-4 and was rescued quickly. The jets were about 40 minutes into their flight. The Air Force blamed the mishap on inadequate briefing, a failure on behalf of the crews to follow procedures and the fact that the F-4 and the target plane looked similar. July 22, 1981 - Maj. Shelby Boothe was accidentally ejected from an F-4 Phantom jet's rear ejector seat as the plane rolled down an Eglin Air Force Base taxiway. Boothe and the jet's pilot had returned from a practice mission. After they opened the jet's canopies, Boothe was catapulted out of the plane. He landed on a strip of grass next to the taxiway. He was hospitalized in good condition. March 11, 1982 – A-10A Thunderbolt II, 73-1668, c/n A10-0005, of the 3246th Test Wing, Armament Development and Test Center, crashes on an Eglin range this date. March 23, 1982 – An Eglin Air Force Base F-16B Block 5 Fighting Falcon, 78-0112, of the 3246th Test Wing, crashed into a green at Rocky Bayou Country Club, near Niceville, Florida. The pilot had just finished a test bombing run over Eglin's Range 52 and lost power in the engine. The pilot was able to get the aircraft to an altitude of about 3,000 feet and a speed of between 285 mph and 345 mph before the engine gave out. The pilot, and a weapons officer decided to eject, expecting the F-16 to continue north and crash into a wooded area of the Eglin reservation. According to officer in charge of Eglin's safety office, the dual ejection caused the plane to roll to the right and slam into the golf course's sixth green, narrowly missing several homes. The two airmen landed on the 18th green and didn't suffer any major injuries. Air Force investigators were able to later watch the entire crash because a chase plane that had been photographing the test mission caught the crash on film. When F-16 experts recreated the accident they discovered a sequence of control switch moves that would restart an F-16 engine. The procedures were added to F-16 instruction manuals. February 4, 1983 – F-15A-16-MC Eagle. 76-0081, c/n 0271/A233, of the 59th TFS, 33d TFW, based at Eglin AFB, goes into an unrecoverable roll ("autoroll"); crashes into the Gulf of Mexico near Tyndall AFB, Florida, pilot ejects safely. February 12, 1986 – A USAF F-16A Block 5 Fighting Falcon, 78-0055, c/n 61-51, flown by a pilot of the 3247th Test Squadron, 3246th Test Wing, disappears from Eglin Air Force Base's radar tracking screens at 1230 hrs., crashing in the Gulf of Mexico ~30 miles S of Okaloosa Island. The body of the pilot, Capt. Lawrence E. Lee, 31, of Kokomo, Indiana, is retrieved from the water by two rescue jumpers from a UH-60 Blackhawk at 1350 hrs., said Eglin public affairs officer Lt. Col. Bill Campbell. A parachute is found floating nearby. The pilot is thought to have drowned after ejecting from the fighter. "There were no radio transmissions ... nothing to indicate there were any problems," said Campbell. "We found no wreckage, so we can't be sure at this time what caused the crash. I don't know if we'll ever know for sure." Hypothermia may have been a factor in the pilot's death. The Gulf's water temperature averaged between 55 and 58 degrees Fahrenheit on Wednesday. Lee was performing what was to have been the aircraft's last test flight before it was returned to the Tactical Air Command. The F-16 had been modified for use in weapons tests by Eglin's Armament Division, then restored to its original condition. Campbell stated that he expects the Air Force will try to recover the wreckage to examine it for clues into the accident, although he acknowledged that such a crash "doesn't always leave much evidence." Lee is survived by his wife, Maj. Terri Lee, assigned to Eglin's 33rd Tactical Fighter Wing. July 14, 1987 – An F-4E Phantom II assigned to Eglin Air Force Base's Tactical Air Warfare Center (TAWC) crashed into the Gulf of Mexico ~five miles S of Destin, Florida, about 1900 hrs. during a routine training mission. An exhaustive search of the area failed to turn up anything but bits of debris. The jet, accompanied by a second F-4 from Eglin, had been on its way home from Moody Air Force Base near Valdosta, Georgia. The second aircraft landed safely. A spokesperson for Eglin's Tactical Air Warfare Center announced that the Coast Guard had actively suspended the search pending further developments on July 16. Crewmembers were Maj. Thomas A. Perrot, 37, a pilot from Evergreen Park, Illinois, and Capt. Steven J. Puls, 30, a weapons systems operator from Willow Brook, Illinois. 1990s July 6, 1990 – A Convair QF-106A Delta Dart drone aircraft, modified from a former ADC interceptor under the Pacer Six programme, crashed into the Gulf of Mexico. A civilian pilot was in control of the aircraft when it went down at 0940 hrs., about 12 miles west of Tyndall Air Force Base. The drone was still "man-rated," it had not been stripped of its on-board controls, ejection seat or life-support system. The drone, flown out of Tyndall, was being tested by Weststar Corp. of Albuquerque, New Mexico, as part of a development contract let by the Munitions Systems Division at Eglin Air Force Base. An Eglin spokesman said that the pilot was in control of the aircraft and had deliberately flown back over the Gulf after he ran into trouble making a planned landing at Tyndall. The pilot was rescued by the crew of a local fishing boat. A report released by the Air Force Inspection and Safety Center at Norton Air Force Base, California, found no fault with the pilot, a retired Air Force major. Salvage crews recovered pieces of the plane's landing gear from 90 feet of water. Investigators and metallurgists determined that a cylinder had failed, causing a critical strut to break and bottom out. The pilot was helping train ground controllers to pilot drones by remote control. The controllers, in a van on the ground, were maneuvering the drone into touch-and-go landings on a Tyndall runway. After one such landing, which appeared normal, the report said that the drone's main landing gear crumpled. May 28, 1991 – An MH-60G Pave Hawk based at Eglin AFB, Florida, crashes on a reef in about three feet of water off Antigua in the Caribbean, injuring six of eight aboard, but no fatalities. (Another account states that all eight sustained injuries.) Although initially reported to have been on a training mission, an accident report obtained by the Northwest Florida Daily News, Fort Walton Beach, Florida, in August, revealed that the crew was sightseeing, taking pictures over beachside hotels and harbors, when the accident occurred. June 27, 1991 – Air Force officials reported in January 1992 that the maintenance interval for Bell UH-1N Huey drive shaft couplings has been reduced to 100 hours from the customary 600-hour period between overhauls. After a Huey made an emergency landing at Eglin Air Force Base on June 27, 1991, the interval dropped to every 20 hours, but officials eased that requirement to 100 hours in August, claiming that the problems were under control. August 31, 1991 – A Tomahawk missile launched from a warship in the Gulf of Mexico to recover on a target on the test ranges at Eglin AFB, Florida, misses by ~100 miles, coming down eight miles E of Jackson, Alabama, ~60 miles N of Mobile. "Within minutes of the missile's falling near Jackson, a recovery team arrived by helicopter. Such teams are stationed along the missile's flight path during a test so they can get to a crash scene within 20 minutes no matter where the Tomahawk goes down." Cause was found to be two incorrect screws used to assemble a tailfin, said Denny Kline, a Pentagon spokesman for the Navy Cruise Missile Project, on December 13, 1991. A screw, rubbing against an actuator coil disabled one of the missile's two fins. "Somebody during assembly put two screws in, which were moderately too long. Well, in fact, in this case extremely too long because it physically made contact with a coil. It was fine for the first one hour and 21 minutes, but over time it wore away the protective coating and got down to the wound part of the coil and shorted it out," said Kline. As a result, one fin worked properly but the other did not when the missile was to make a pre-planned turn causing it to crash in Alabama. The wrong screws were put in by General Dynamics Corp., said Susan Boyd, Pentagon spokeswoman for the missile program. Four Tomahawks have landed in civilian areas since the Navy began the gulf tests in 1985. There have been no injuries. July 13, 1992 – F-15C-40-MC Eagle. 85-0116, c/n 0972/C358, of the 60th Fighter Squadron, 33d Fighter Wing, based at Eglin AFB, crashes at 0900 hrs. in the Gulf of Mexico, 90 miles S of Eglin, after entering a flat spin. Capt. Darren S. Ruhnau, 27, of Niceville, Florida, assigned to the 60th Fighter Squadron, ejects safely. He and another F-15, piloted by Capt. Patrick O. Moylan, 29, of Fort Walton Beach, had departed Eglin at 0835 hrs. for a 2 ship basic fighter maneuvers (BFM) training mission. "I'm just glad the ACES II ejection system worked as advertised," Ruhnau said in a statement, "and that the search-and-rescue guys were there to do the job." "He was picked up by an oil freighter," said Capt. Susan Brown, a spokeswoman for the 33rd, but the helicopter crew "couldn't get him off there. So they transferred him to a Coast Guard cutter, but they couldn't get him off there either. He was in such good shape, they dropped him back in the water, and picked him up from there." A U.S. Navy helicopter of HC-16 from the USS Forrestal, which is based in Pensacola, plucked him from the Gulf at ~1000 hrs. and transported him to Eglin Regional Hospital where he was checked out and released at ~1330 hrs. Ruhnau has been flying F-15s since May 1989 and assigned at Eglin since September of that year. In an unrelated incident, another 33d Fighter Wing F-15 makes a rough landing, overshoots the runway at Eglin and comes to a stop in the grass. The pilot, assigned to the 59th Fighter Squadron, does not eject and is uninjured, the fighter sustains less than $10,000 damage, said Brown. The USS Edenton, a Navy salvage ship, arrived at the crash site on July 30 and began working 12-hour days searching for the wreckage of the F-15. A remote-control submarine was used because the wreckage was located at a depth of 1,400 feet. Yards of electronic wiring, battered electronic devices, pieces of carbon fiber from the fuselage and the ejection seat were located. July 13, 1992 – At 0950 hrs. as an unidentified pilot from Eglin Air Force Base's 33d Fighter Wing brought his F-15 in for a landing at Eglin, the jet went off the runway into the grass, causing less than $10,000 worth of damage. The incident was described as "very minor" and the pilot did not have to eject from the cockpit. July 20, 1992 – An MV-22 Osprey prototype, BuNo 163914, c/n D0004, arriving from Eglin AFB, Florida, catches fire and falls into the Potomac River at MCAS Quantico, Virginia, USA, killing 5 crew members in front of an audience of high-ranking US government officials; this is the first of a series of fatal accidents involving the controversial tiltrotor aircraft. This airframe had just completed four months of tests in the McKinley Climatic Laboratory. A U.S. Navy Court of Inquiry (COI) concluded that the aircraft "experienced multiple emergencies upon entering the downwind" and that "the primary cause of the mishap was a flammable [sic] fluid leak which was ingested by the right engine." The report also said "There was tremendous pressure on [the pilot] to get the aircraft to Quantico at the proper time on Monday 20 July. The pressure was evident on Sunday afternoon in his mannerisms [to a coworker]. The scheduling of personnel also lent credence to the perceived pressure, since most Boeing personnel were scheduled to depart on the weekend with wives and families. In addition, there were banners at Marine Corps Headquarters announcing the arrival of the Osprey at Quantico at 1430 local time on 20 July." The aircraft left Eglin at 0955 and crashed at 1242. Minutes prior to launch from Eglin, one of the flight test mechanics said that the V-22 seemed "to be pushing a lot of hydraulic fluid out of the Number Two side." Auxiliary Power Unit problems were also encountered on launch. A planned fuel stop at Charlotte, North Carolina, was also dropped by the pilot in his attempt to achieve Quantico on schedule. October 29, 1992 – An MH-60G Pave Hawk helicopter assigned to Eglin's 55th Special Operations Squadron, carrying a crew of three and 10 passengers, crashed in the Great Salt Lake in Utah, killing 12 of the 13 people on board. The helicopter, a participant in a joint Army-Air Force training exercise, was flying to a test range in the desert near Hill Air Force Base, Utah, when the accident occurred. It went down at 9:15 p.m. MST, slamming into the lake about 100 yards east of Antelope Island. Sources said the helicopter broke into pieces and submerged on impact. Rescuers were hampered by the weather and the remoteness. There was one survivor. June 18, 1996 – General Dynamics F-111A, 66-0047, converted to EF-111A Raven (EF-15). Used as testbed for System Improvement Program at Eglin AFB. Involved in some sort of accident this date with the 85th Test and Evaluation Squadron, written off and used as maintenance trainer and for aircraft battle damage repair training. Sat derelict at Cannon AFB, New Mexico in bad shape. Was sitting in a lot near the Mojave, California airport. In 2011 was at Silver Springs, Nevada airport, according to Joe Baugher. January 10, 1997 – F-15C-39-MC Eagle. 85-0099, c/n 0952/C341, of the 58th Fighter Squadron, 33d Fighter Wing, based at Eglin AFB, catches fire on take-off roll from Eglin. The pilot egressed safely on the ground. Aircraft completely destroyed by fire. This aircraft credited with MiG-25 kill by AIM-7M on January 19, 1991, during Operation Desert Storm while flown by Capt. Lawrence E. Pitts. August 22, 1997 – The crew of an Eglin Air Force Base F-16B Block 15L Fighting Falcon, 82-1037, ejected over the Gulf of Mexico after their jet apparently failed about seven miles south of Destin, Florida. The airmen were rescued by the crew and passengers of Top Gun, a charter fishing boat out of Destin, who saw the crash. The airmen were members of the Eglin's Development Test Center's 39th Flight Test Squadron. The plane was returning to Eglin after flying as a chase plane in a mission with an Air Force F-15. Divers located the jet in 70 feet of water a week following the accident. A barge carried the wreckage to a hangar at Eglin where investigators hoped to find clues as to what caused the crash. Cause was failure of engine fourth stage at speeds past Mach. January 28, 1999 – F-15C-30-MC Eagle. 82-0020, c/n 834/C251, of the 85th Test and Evaluation Squadron, 53d Wing, piloted by Joe "Corn" Hruska, has mid-air collision at 35,000 feet over the Gulf of Mexico with F-15C-37-MC Eagle. 84-0011, c/n 0920/C314, of the 85th Test and Evaluation Squadron, 53rd Wing, 80 miles S of Eglin over Eglin water range during a 2 versus 3 Dissimilar Air Combat Training (DACT). Both pilots eject, pilot of 82–0020 slightly injured. Pilots rescued after 45 minutes in the water by MH-53, call sign Cowboy 22, on instrument check-flight out of Hurlburt Field. November 5, 1999 – An Eglin AFB security policeman, Airman Raymone Sydnor, of the 96th Security Forces Squadron, patrolling the flight line, drops his personal cell phone and while reaching down to retrieve it, drives his vehicle into an F-15C-28-MC Eagle, 80-0024, of the 58th Fighter Squadron, 33d Fighter Wing, striking it from the rear and causing more than $62,000 in damage to the F-15's landing gear, according to an Air Force report released Wednesday. The report did not say how fast the car was going. The Chevrolet Lumina's roof and door had to be cut off to extract Sydnor, who suffered a concussion. He received an undisclosed punishment. As a result of the accident, the Air Force said, security personnel have been ordered to get out of their cars every half-hour for a 10-minute break "to combat boredom and oxygenate blood flow." Aircraft was repaired and returned to service with the 65th Aggressor Squadron. 2000s March 3, 2001 – An Army National Guard Short C-23B+ Sherpa (Shorts 360), 93-1336, of the Florida Army National Guard's Det. 1 H/171st AVN, based at Lakeland Linder International Airport, crashes during heavy rainstorm around 1100 hrs. in Unadilla, Georgia in the United States. All 21 on board are killed. Aircraft was en route from Hurlburt Field, Florida to NAS Oceana, Virginia with Virginia Beach-based Virginia Air National Guard RED HORSE detachment on board who had been training at Hurlburt Field. April 30, 2002 – An F-15C-27-MC Eagle, 80-0022, c/n 0665/C171, of the 40th Flight Test Squadron, 46th Test Wing, based at Eglin Air Force Base, Florida, crashes in the Gulf of Mexico ~60 miles S of Panama City, Florida, while on a captive flight development test of a new air-to-air missile, killing test pilot Maj. James A. Duricy, assigned to the 40th Test Squadron, 46th Test Wing. His body is never recovered. An Accident Investigation Board determines that the crash was caused by the structural failure of the honeycomb material supporting the leading edge of the port vertical stabilizer during a high-speed test dive. A section of the leading edge, approximately 6 × 3 feet, broke away. "The doomed F-15C was flying at 24,000 feet when part of its tail broke off. Maj. James A. Duricy punched out at 900 mph and was killed. Investigators said the tail had corroded over the years. The fighter had gotten old." A static display F-15 formerly assigned to the 46th Test Wing, was dedicated to Major Duricy at Arnold Air Force Base, Tennessee, on August 9, 2007. March 8, 2003 – A T-38A-75-NO Talon, 68-8141, of the 7th Combat Training Squadron, 49th Fighter Wing, out of Holloman AFB, New Mexico, crashed on final approach to runway 19 at Eglin AFB in Valparaiso, Florida. According to the Air Combat Command accident investigation report, the cause of the mishap was the pilot's failure to adequately monitor his airspeed during the final approach to landing. On final approach to Eglin AFB, the flight leader directed the wingman, the mishap pilot, to slow to final approach airspeed while he flew at a higher airspeed to obtain the required spacing between aircraft for landing. The mishap pilot then permitted his airspeed to decrease to the point that the aircraft stalled and struck several trees. Both engines failed from ingesting tree debris and the pilot chose to eject from the aircraft, sustaining minor injuries to a foot. The aircraft was destroyed in the crash. Two houses were also substantially damaged. There were no injuries to anyone on the ground. May 1, 2003 – A Boeing C-32B or Boeing 757-23A, wearing what may or may not have been a U.S. Air Force serial number, 00-9001, c/n 25494/611, and assigned to the 486th Flight Test Squadron, which is known to be an Eglin Air Force Base, Florida, unit, suffers a landing accident at North Auxiliary Airfield, South Carolina, at ~0300 hrs. when the nose gear collapses in a heavy landing. Thought to be operated by the United States State Department (a standard deflection for the Central Intelligence Agency and their Special Operations Group (SOG) / Special Activities Division (SAD) in support of Foreign Emergency Support Team (FEST) activities), Air Force spokeswoman Major Linda Pepin said that there were no serious injuries, "There was a crew of 10 on board. Two sustained minor injuries and were treated and released." The nose gear on the plane collapsed and the plane's position on the ground is not parallel to the runway. Major Pepin stated that the incident will be investigated in days to come by an Air Force safety board, "In any case where there's an incident that involves aircraft safety to ensure that whatever happened in this incident we can avoid next time." Pepin said that they don't know how long the aircraft will stay on the runway, "It's really too early to know when it will get it up and moving." North Auxiliary Airfield is used for C-17 Globemaster III training. May 22, 2003 – The Executive Summary of the Aircraft Investigation Board gives this account of an incident involving Sikorsky MH-53M, 73-1648: "On 22 May 2003, at 1635 local time [1335 Greenwich Mean Time (GMT)], an MH-53M helicopter, serial number (S/N) 73-1648, sustained damage to its main rotor system and associated dynamic components just prior to landing at an overseas operating location. The MH-53 helicopter was assigned to the 20th Special Operations Squadron, 16th Special Operations Wing, Hurlburt Field, Florida. The mishap aircraft (MA) was returning to its staging base after completing a classified mission. No personnel injuries or damage to private property resulted from the accident. The MA departed the deployed location at 0955 local time (0655 GMT) to conduct an operational mission. According to witness interviews, all phases of the mission were uneventful until final approach to the staging base. The MA was the second aircraft in a four-ship formation of U.S. Air Force and Marine Corps helicopters. At approximately 20 to 30 feet above ground level, with the aircraft commander at the controls, a loud bang was heard. Almost immediately, the crew felt a moderate lateral vibration in the aircraft and noticed that a cockpit Blade Pressure warning light was illuminated; telling the crew there was a problem with one or more main rotor blades. The crew landed the aircraft and reduced the power setting. The lower power setting eliminated much of the lateral vibration, and the crew determined it was safe to taxi the helicopter to their designated parking spot and the engines and rotors. Once the aircraft was , aircrew and maintenance personnel inspected the aircraft and found two damaged main rotor blades. After a more in-depth inspection of the aircraft, maintenance crews discovered that one set of main rotor head balance weights and the associated mounting bracket and bolts was missing. Maintenance personnel went to the landing area and found the missing weights, bracket and bolts. By clear and convincing evidence, the cause of this mishap was the failure of the mounting bracket bolts, which allowed the bracket and weights to break away from the aircraft and strike the main rotor system, resulting in damage to the aircraft." September 7, 2007 – A Sikorsky MH-53M Pave Low IV, 69-05794, callsign Cowboy 21, of the 20th Special Operations Squadron, 1st Special Operations Wing, Hurlburt Field, crashes in the southeast portion of LZ X-ray, approximately 5 miles south of the town of Crestview, Florida, and approximately 4 miles west of Duke Field, Eglin Auxiliary Field 3, at 2349 hrs. when it suffers tail rotor gear box failure while in a hover. The helicopter was practicing a rescue extraction near a landing zone, an oval shaped clearing roughly 180 feet X 212 feet, surrounded by trees more than 90 feet tall, and had just been brought into a hover at 150 feet and was beginning to lower the rescue apparatus when the aircrew felt a shudder. Aircraft commander Lt. Col. Eugene Becker realizes that the tail rotor gears are failing, takes control of the aircraft and prepares to land. Once out of hover, it takes about 45 seconds to return to the LZ, and due to the confined space, Becker drops the chopper vertically but the shuddering worsens. "We knew something was very, very wrong," stated Becker. "all of the gear boxes were surging up and down and making quite a bit of racket." When the MH-53 is 20 feet above the ground Becker pushes what is left of the rotor's power to the maximum in order to cushion the landing. As soon as the Pave Low hits the ground, the tail rotor fails and the chopper starts spinning and rolls to port, but the sponson fuel tanks keep it from rolling over. Of the seven crew, only two are injured: Col. William Nelson, a flight surgeon from the Air Force Special Operations Command Surgeon General's Office, receives a head injury but walks away from the accident; MH-53 aerial gunner A1C Bradley Jordan suffers a leg fracture. Both men are released from hospital the following day. Lt. Col. Becker is awarded the Koren Kolligian Jr. trophy, one of the Air Force's top safety awards, in July 2008. According to the award nomination, a landing any more forceful could have been fatal to the crew. An accident investigation board determined the failure of the mounting nuts and studs that secured the intermediate gearbox to the tail pylon of the helicopter as the cause of the crash. The report, released July 10, 2008, said that the material failure of the nuts and studs allowed the intermediate gear box to become loose. The gears became loosely meshed, perhaps unengaged, as they pushed apart, and may have begun to slip in flight. This caused an abnormal oscillation in the speed of one or both engines, forcing the crew to make an emergency landing. The aircraft received approximately $8.6 million in damage. The accident investigation board was led by Col. Scott Greene, vice commander of the 623rd Air Operations Center at Hurlburt. The AIB is composed of helicopter systems experts, medial, legal and aircrew advisors. February 20, 2008 – Two F-15C Eagles of the 58th Fighter Squadron, 33d Fighter Wing, Eglin AFB, Florida, collide over the Gulf of Mexico ~50 miles S of Tyndall AFB, Florida, killing 1st Lt. Ali Jivanjee. Capt. Tucker Hamilton ejected from the other fighter and survived. Airframes involved were F-15C-26-MC, 79-0075, c/n 0624/C144, and F-15C-32-MC, 81-0043, c/n 0793/C226. Both pilots ejected and one was rescued from the Gulf by the fishing boat Niña, owned by Bart Niquet of Lynn Haven, Florida, which was guided to the pilot by an HC-144A Ocean Sentry aircraft from Coast Guard Aviation Training Center Mobile flown by instructor pilot Lt. Cdr. Travis Burns and Lt. Cdr. Coley. "Myself and Lieutenant Commander Coley were doing some training in the Gulf of Mexico when we heard on guard frequency that an F-15 had gone done. We were about 100 miles away so we headed towards the scene and made contact with another F-15 on the way. He joined on us and led us to the oil slick, that being the most expedient method to get to the crash site at the time. One of our observers was able to get a quick visual on a pilot below in the ocean and directed a fishing boat vessel nearby to pick up the survivor. We communicated with numerous assets during the event and it was a rewarding experience, being able to help save the Eagle pilot," stated Burns. A 1st SOW AC-130H and a CV-22 Osprey were also diverted to the scene to help search as were five Coast Guard aircraft and two vessels. An HH-60J Jayhawk from Coast Guard Aviation Training Center Mobile lifted the pilot from the fishing boat and evacuated him to the Eglin Hospital. The second pilot was rescued from the Gulf by an HH-60J Jayhawk from CGAS Clearwater and also taken to the Eglin Hospital. An accident investigation released August 25, 2008 found that the accident was the result of pilot error and not mechanical failure. Both pilots failed to clear their flight paths and anticipate their impending high-aspect, midair impact, according to Brig. Gen. Joseph Reynes, Jr., Air Combat Command's inspector general who led the investigation. This was the first crash involving an Eglin F-15 since a fatal crash on April 30, 2002. The USNS Grasp, out of Naval Amphibious Base Little Creek, Virginia, recovers one aircraft on March 12 from a depth of 177 feet, and the second on March 22 from a depth of 185 feet. More than half of each aircraft was salvaged including their engines, data collecting devices (flight recorders) and main computers. These items are vital to the Air Force's investigation to determine the cause of the crash. This turns out to be the last fatal accident involving 33d FW Eagles before the unit converts to the F-35 Lightning II training mission. July 8, 2008 – Three Airmen of the 319th Special Operations Squadron, 1st Special Operations Wing, avoid serious injury when the leased Pilatus PC-12, 04-0602, N901TR, they are training in crashes at the end of the runway at Hurlburt Field, Florida, Eglin Auxiliary Field 9, at ~2330 hrs. as they attempt a landing. The initial investigation finds that the turboprop encountered wake turbulence from another aircraft that had landed shortly before the accident. As a precaution, the three crew were taken to the Eglin hospital and released the same afternoon. Hurlburt leases the PC-12 to train Airmen for the UC-28A, the Air Force's version of the single-engine utility aircraft, used in combat for intra-theatre support for the special operations forces. Damage to the plane was set at $3.8 million, making it a Class-A mishap. On board were civilian instructor pilot Robert M. Howard III, Capt. Peter McWilliam and Capt. Michael Ellis. As the plane approached Hurlburt's runway at 2335 hrs. and about 100 feet high from the south, the aircraft suddenly rolled to the left. The single-engine, propeller-drive plane was beginning to turn upside down, when Howard stopped the roll. But before he could get the plane upright, the PC-12's left wing struck the ground, sending the plane skidding 669 feet across a field before stopping on a paved overrun. The board concluded that Howard didn't wait for the turbulence from the gunship to subside. As he tried to the land the PC-12, the 47-foot-long plane was caught by the AC-130U's wake. Air Force rules require at least a two-minute separation between slow-moving heavy planes, like the AC-130U, and small, light planes, the investigation noted. The PC-12 trailed the gunship by about 40 seconds. The board also found that air traffic controllers had not issued any wake turbulence advisories even though Air Force rules required to them do so. The controllers told investigators they assumed that since both aircraft and crews were from Hurlburt, the crews were aware of potential turbulence dangers. The PC-12 that crashed had been used as a trainer and leased by the Sierra Nevada Corp., for the Air Force's use. Versions of the PC-12 flown on operational missions are owned by the Air Force and designated as UC-28s. February 9, 2009 – A leased Pilatus UC-28A, 06–0692, with three personnel of the 319th Special Operations Squadron, 1st Special Operations Wing on board, based at Hurlburt Field, Florida, makes a gear-up landing at Craig Field (Alabama) at Selma, Alabama (formerly Craig Air Force Base), whilst performing simulated engine failure approach, breaking off nosewheel and causing severe damage to nosewheel strut assembly, propeller and main undercarriage doors. A board of officers will investigate the 1415 hrs. incident in which there were no injuries. This accident has been classified as a Class A accident, indicating that fairly substantial damage was incurred. Aircraft repaired and reported flying again by April 29, 2009. 2010s June 23, 2011 – Two civilians are killed in the 0430 hrs. crash of a Beechcraft C24R Sierra, N38029, c/n MC-746, belonging to the Eglin Aero Club, on a grassy area next to the 46th Test Wing's side of the runway at Eglin Air Force Base. The four-seat cabin aircraft had been airborne for about 30 minutes prior to the accident, said Col. Michael T. Brewer, commander of the 46th Test Wing, during a press conference Thursday at the Aero Club. Passengers on the earliest flights at Northwest Florida Regional Airport experienced about a 15-minute delay Thursday morning because of the crash, said Bill Potter, the operations manager for the airport. The victims were identified as David A. Miles, of Shalimar and Thomas E. Lewis, of Apalachicola, according to a press release from Eglin Air Force Base. Exactly who was in control of the plane at the time of the crash remains under investigation, but Miles was acting as a pilot instructor for Lewis during the training exercises this morning, said Andy Bourland, the director of Eglin's public affairs division. Miles was a retired colonel in the Air Force. February 18, 2012 – A U-28A of the 1st Special Operations Wing, Hurlburt Field, returning to Camp Lemonnier after a surveillance and reconnaissance mission in support of Operation Enduring Freedom, crashes in Djibouti, Horn of Africa, six miles from Djibouti-Ambouli International Airport, at ~2000 hrs local time, killing all four crew. They were identified as Capt. Ryan P. Hall, 30, of Colorado Springs, Colorado; Capt. Nicholas S. Whitlock, 29, of Newnan, Georgia; 1st Lt. Justin J. Wilkens, 26, of Bend, Oregon; and Senior Airman Julian S. Scholten, 26, of Upper Marlboro, Maryland. Hall was with the 319th Special Operations Squadron. Whitlock and Wilkens were with the 34th Special Operations Squadron, and Scholten was a member of the 25th Intelligence Squadron. Funeral arrangements were not immediately available and a memorial service at Hurlburt, slated for late this week or early next week, was still in the planning stages, according to Staff Sgt. Ryan Whitney. No official cause for the accident had been released as of Tuesday, February 21, 2012, although Whitney and other sources at Hurlburt said it was not believed the plane had been brought down by enemy fire. March 15, 2012 – A civilian-owned Piel Emeraude homebuilt low-wing monoplane crashes on the eastern slope of a wooded ridge on the Eglin AFB reservation, N of Niceville, Florida, killing both occupants. Impact was about 100 yards W of where a section of the Mid-Bay Bridge Connector road is being built near the intersection of Forest Road and College Boulevard. The aircraft was attempting to land at the Ruckel Airport and came down ~one mile NE of the strip. The victims were tentatively identified as Donald Marco Jr., 59, of Sandlewood Circle in Niceville and Stanley Bloyer, 66, of Fort Walton Beach, according to the Okaloosa County Sheriff's Office. There was no information on who was piloting the plane which was owned by Marco. June 13, 2012 – A Bell-Boeing CV-22B Osprey, 06-0032, c/n D1013, of the 8th Special Operations Squadron, 1st Special Operations Wing crashes on the Eglin AFB reservation N of Navarre, Florida, during a routine training mission, injuring all five crew, stated M/Sgt. Kristina Newton, a spokeswoman for Hurlburt Field. Three of the airmen were flown to local hospitals and two were taken by ambulance. The extent of their injuries had not been released by 2200 hrs. A board of Air Force officials will investigate the accident, according to the public affairs office for the 1st SOW. The cause off the crash has not been determined, although Air Force officials have said that there is no evidence yet to suggest that it was a mechanical failure. The commander of the 8th SOS was dismissed on June 21, 2012, with the Air Force leadership stating that they had lost confidence in the officer who had commanded the unit since May 2011. On August 30, 2012, the results of the investigation board, convened by the AFSOC Commander, are released. "The Accident Investigation Board President found by clear and convincing evidence that the cause of the mishap was the crew's failure to keep the aircraft clear of the lead aircraft's wake. This resulted in an 'uncommanded' roll to the left, rapid loss of altitude and impact with the terrain. The aircraft was destroyed upon impact with the loss valued at approximately $78 million." June 23, 2014 - A fire breaks out in the rear of USAF Lockheed Martin F-35A Lightning II, 10-5015, c/n AF-27, of the 58th Fighter Squadron, 'EG' tailcode, while on the runway during take off at 0915 hrs. from Eglin AFB, Florida. The pilot is able to shut down the engine and exit the airframe without injury. A grounding order of the 26 Air Force F-35s based at Eglin until June 25 is extended indefinitely after an initial safety investigation turns up "additional evidence and information", stated Lt. Hope Cronin, spokeswoman for the 33d Fighter Wing. The order does not affect Marines and Navy versions of the F-35, and so far is limited to Eglin. The Air Force has not released the extent of the damage, but Cronin said that the fire was significant. The fighter suffered a major engine failure that reportedly caused a 12 to 15 ft (3.7 to 4.6m) section to detach, starting the fire. Fire was caused by excessive rubbing of fan blades inside the engine. Category 5 damage so it is a write-off. March 10, 2015 - Seven Marines and four soldiers were missing early Wednesday, March 11, after a Louisiana Army National Guard Sikorsky UH-60 Black Hawk helicopter crashed during a night training exercise at Eglin Air Force Base. Base officials said the Marines are part of a Camp Lejeune-based special operations group and the soldiers were from a Hammond, Louisiana-based National Guard unit. The helicopter was reported missing around 2030 hrs, and went down near Range A-17, east of the Navarre Bridge Tuesday and search and rescue crews found debris from the crash around 0200 Wednesday, Eglin spokesman Andy Bourland said. "At this time all are missing," Bourland said. Names of those involved were being withheld pending notification of next of kin, he said. Bourland said the Army helicopter took off from a nearby airport in Destin and joined other aircraft in the training exercise. Bourland said that the second UH-60 on the training mission was not involved in the crash and all of its crew were accounted for. The aircraft are assigned to the 1-244th Assault Helicopter Battalion in Hammond, Louisiana. The aircraft apparently struck the surface of Santa Rosa Sound as wreckage and human remains have been recovered from both shores of the waterway. Heavy fog is impeding recovery operations. April 21, 2015 - A brand new Lockheed AC-130J Ghostrider, 09-5710, is overstressed in an accidental inverted flight condition and recovery during a medium risk flying qualities test sortie over the Gulf of Mexico by the 413th Flight Test Squadron out of Eglin Main Base, rendering the airframe a right-off. An Accident Investigation Board report, released at Wright-Patterson AFB, Ohio, November 6, 2015, states that the accident, which took place ~40 miles S of Eglin Main, resulted in no injuries. "The incident occurred while the crew from the 413 Flight Test Squadron at Eglin was performing steady heading sideslips at an altitude of approximately 15,000 feet. The aircraft exceeded the targeted angle of sideslip until it departed controlled flight and momentarily inverted before being recovered after losing approximately 5,000 feet of altitude. The aircraft returned to base and landed safely without further incident. As a result of the mishap, the aircraft was "over G'd," and exceeded its design limit load, thereby nullifying the airworthiness of the aircraft and rendering it a total loss. The damages are estimated at more than $115 million. The board president found the cause of the accident to be the AC-130J pilot's 'excessive rudder input during the test point followed by inadequate rudder input to initiate a timely recovery from high angle of sideslip due to overcontrolled/undercontrolled aircraft and wrong choice of action during an operation.' The board president also found four substantially contributing factors: instrumentation and warning system issues, spatial disorientation, confusion, and inadequate provision of procedural guidance or publications to the team." The airframe had experienced a similar incident in February 2015. December 8, 2016 - A General Dynamics F-16 Fighting Falcon of the 96th Test Wing experiences landing gear trouble while on a routine training flight which subsequently collapses upon landing Thursday afternoon, said Sharon Branick with the 96th Test Wing Public Affairs Office. "No one was hurt in the plane or on the ground." Details regarding the extent of damage to the aircraft were not immediately available. January 9, 2017 - "The 96th Test Wing Public Affairs Office reported that a C-130 experienced an engine failure while on the ground Monday afternoon. According to a Sharon Branick, a spokeswoman for the Test Wing, the aircraft was on the flightline when the third of its four engines failed. 'There was never an in-flight emergency,' Branick said. There were no reports of injuries during the incident, and Branick could not confirm if the aircraft belonged to a squadron at Eglin." 22 August 2018 - A Lockheed Martin F-35A Lightning II of the 33d Fighter Wing suffers collapse of its nose gear at Eglin Main Base at ~1250 hrs. after landing. 30 August 2018 - A civilian Beechcraft B-60 Duke, en route from Toledo Express Airport, Toledo, Ohio, to Destin Executive Airport, experiences in flight emergency over the Eglin ranges, crashes near the skeet range on Ranger Camp Road, killing all four aboard. The aircraft was registered to the Henry Leasing Company, Ottawa Lake, Michigan. References Eglin Air Force Base Aircraft accidents at Eglin Air Force Base Aviation accidents and incidents in Florida Aircraft accidents at Eglin Air Force Base
23850167
https://en.wikipedia.org/wiki/Science%20On%20a%20Sphere
Science On a Sphere
Science On a Sphere (SOS) is a spherical projection system created by the United States National Oceanic and Atmospheric Administration (NOAA). It presents high-resolution video on a suspended globe rather than a flat screen, with the aim of better representing global phenomena. Animated images of atmospheric storms, climate change, and ocean temperature can be shown on the sphere to explain these complex environmental processes. SOS systems are most frequently installed in science museums, universities, zoos, and research institutions, although new and novel uses for these systems in a variety of presentation spaces and contexts are starting to emerge. The system has been installed in more than 130 locations worldwide. History SOS was invented by Alexander E. MacDonald, the former director of the Earth System Research Laboratory. MacDonald devised the original idea for SOS in 1995. A team of NOAA staff wrote the SOS software and developed the SOS hardware and system architecture. This work enabled MacDonald's invention to move out from the laboratory. A patent was awarded to NOAA for Science On a Sphere in August 2005. Configuration SOS uses many off-the-shelf hardware and software components. A spherical screen covered in ordinary latex paint hangs suspended in the center of a projection space. The screen is inert; it neither moves nor has any electronic parts. Surrounding the screen are four video projectors, positioned around the screen. Each projector is responsible for one quadrant of screen space. One CPU is used to control the system. The SOS software runs on Linux. The sphere The carbon fiber sphere is in diameter. Other sphere sizes are possible. The 68" sphere with a single seam at the equator weighs under . The sphere is attached to the ceiling or suspension structure with a three-point suspension system to hold the sphere in place and reduce lateral movement and blurring. Projectors The system requires high quality, bright, long duty cycle projectors generally permanently installed in board rooms and high end home theaters rather than smaller portable and consumer models to endure the requirements of 8–10 hours per day, 7 days per week of most public displays. Computer hardware The computer hardware used for SOS is constantly evolving based on what is available on the market. The newest configuration uses one Ubuntu Linux computer with NVIDIA Quadro graphics cards, and an iPad app to control the Science On a Sphere. Previous versions used five Red Hat Linux computers. SOS data details The majority of SOS assets are so-called "datasets". Originally conceived as a video system for showing space based collections of Earth data, SOS has grown in its utility. The majority of data that traditionally appears on the SOS screens concerns the Earth, either from near-real-time data acquisition systems, or from processed remote sensing platforms. But recent interest and growth in different kinds of media have started to broaden that library. There are currently over 500 datasets that can be shown on the sphere, including real-time infrared satellite images, Mars, real-time Earthquakes, an ocean acidification model, and others, including a number of movies. The data format for SOS datasets is the equirectangular projection, as shown by the map to the right. SOS User's Collaborative Network NOAA supports the use of spherical display systems, such as SOS, in public exhibits as part of a focused effort to increase environmental literacy. The institutions that currently have NOAA's Science On a Sphere, as well as other partners who are creating content and educational programming for these systems, have formed a collaborative network. The SOS Users Collaborative Network is supported by NOAA's Office of Education (OEd) and the NOAA Earth System Research Laboratory (ESRL) to provide a mechanism for these institutions to work together to maximize the effectiveness of the SOS system as an Earth system science education platform. Locations Science On a Sphere is installed in science museums, zoos and aquariums, and visitors centers around the world. New sites are continually being added. See also Virtual globe References External links BWC Visual Technology A distributor and installer of Science on a Sphere SOS Explorer, the desktop version of SOS for Windows and Mac computers, was released in September 2015 and is free for classroom or personal use. Display technology Office of Oceanic and Atmospheric Research Science and technology in the United States Spheres
16577205
https://en.wikipedia.org/wiki/Online%20Armor%20Personal%20Firewall
Online Armor Personal Firewall
Online Armor Personal Firewall was a firewall originally developed by Australian company ((Tall Emu)), until the program was sold to Emsi Software GmbH (now Emsisoft). The program provides protection on a Microsoft Windows operating system from both inbound and outbound attacks. There are three editions of this product: Online Armor Free is freeware but is licensed for personal use only and has a limited featureset. Online Armor Premium is a more comprehensive commercial firewall that includes anti-phishing and anti-spam capabilities. Overview In an independent proactive security challenge test performed by matousec.com, Online Armor Premium received a score of 99%, surpassing more well-known firewalls, such as ZoneAlarm and Kaspersky Internet Security. A well known vulnerability profiling site and company, Secunia, had not found any vulnerabilities as of March, 2008 in the software, though Matousec reported a weakness 25 March 2008 that has been repaired in the latest version. Online Armor has gained both negative and positive feedback with some users reporting serious compatibility problems with certain programs, such as F-Secure and Ad Muncher, as noted in the product website, but also receiving praise for its free online support and for its swift response to problems. End of Support On 31 March 2015 Emsisoft announced that they had discontinued selling new licenses for Online Armor, that it would only be possible to activate new license keys until the end of May 2015, and that support for Online Armor would officially end after 31 March 2016. See also Internet Security Comparison of antivirus software Comparison of firewalls References External links Official Product Website Official Company website Firewall software Antivirus software Spyware removal
3198564
https://en.wikipedia.org/wiki/RPath
RPath
rPath, Inc. was a technology company based in Raleigh, North Carolina that developed technology to automate the process of constructing (or packaging), deploying and updating software. rPath modeled and managed components and dependencies under version control. It acted as a model-driven and version-controlled repository and software distribution hub. In November, 2012, rPath was acquired by SAS Institute. Shortly after this, rPath Linux was discontinued. History rPath was founded in April 2005 and was originally known for packaging applications as virtual appliances for its independent software vendors (ISVs) and end-user customers. It was co-founded by Erik Troan, co-author of Red Hat Package Manager (RPM), a popular Linux package management system. Troan had left Red Hat in 2004 to found a company called Specifix. The first CEO was Bill Marshall. Original investors were North Bridge Venture Partners and General Catalyst Partners, with $6.4 million in funding disclosed in September 2005. A $9.1 million investment in February 2007 including new investor Wakefield Group was disclosed. A $10 million investment was disclosed on June 24, 2008. A $7 million investment was disclosed in October, 2010. The company headquarters were in Raleigh, North Carolina. rPath was one of the first to market a software appliance. In 2009, rPath made a transition to selling to enterprise IT organizations. IT automation was seen as the codification of runbooks by some, but rPath industrialized the operational aspects of the data center by modeling software configurations. rPath provided a commercial version control platform for deployed software systems. rPath was not a source code management system. Rather, it was an operational management system that applies the principles and disciplines of source code control to the management of deployable software systems—specifically, system manifests, packages, binaries, policies and system configurations. Version control aids systems to be quickly reproduced, patched and updated, rollback-ed and reported on. rPath provided a deeply modeled system inventory. This inventory granularly describes the desired state of every file, binary, application component, and software stack on every production system—with complete information about applied policies and dependencies—as version-controlled system manifests. These manifests are actionable models for managing the complete lifecycle of deployed systems, providing the basis for understanding change impact and controlling change. Also, rather than applying universal updates, patches and updates can be targeted to only the systems that require change. rPath allows definition of systems as layered variants of common base platforms. For example, the standard corporate web server stack may start with a standard build of Red Hat Enterprise Linux (RHEL), but add a specific custom version of the Apache HTTP Server and remove all availability of FTP. With this feature, rPath enabled IT groups to define and automatically enforce build-time policies that govern how systems are constructed. When rPath imports new or existing software artifacts into system version control, it automatically analyzes each software artifact to discover its entire software supply chain, including operating system (OS) components, middleware and libraries. This information enables build-time system construction and validation and reduces the number of maintenance failures and outages that result from missing dependencies and conflicting components. "Ovum considers the automated dependency-checking capability to be an extremely useful and often overlooked feature that all such tools should employ." rPath ensured a consistent system definition, eliminating the risk of system "drift" between lifecycle stages and enabling a clean software build environment. rPath developed Conary, an open source software package management and configuration software that formed the core of rBuilder. It allows rollbacks, incremental ("changeset") updates, and distributed downloading which removes the need for programs such as apt or yum. rPath supported Microsoft Windows Server 2008 and 2003 as well as Red Hat Enterprise Linux 4 and 5, SUSE Linux Enterprise Server 10, and CentOS. It was also marketed as software as a service. The NRE Alliance was a coalition of newScale, rPath and Eucalyptus Systems to promote private and hybrid cloud computing. The coalition was announced on August 24, 2010. It had a web site through August 2012. On November 30, 2012 the business analytics company SAS Institute announced that it acquired key rPath assets, including technology and staff. References External links rPath, Inc. Cloud computing providers Companies based in Raleigh, North Carolina Companies established in 2005 Software appliances Unix software
41555934
https://en.wikipedia.org/wiki/Knowledge%20Based%20Software%20Assistant
Knowledge Based Software Assistant
The Knowledge Based Software Assistant (KBSA) was a research program funded by the United States Air Force. The goal of the program was to apply concepts from artificial intelligence to the problem of designing and implementing computer software. Software would be described by models in very high level languages (essentially equivalent to first order logic) and then transformation rules would transform the specification into efficient code. The air force hoped to be able to generate the software to control weapons systems and other command and control systems using this method. As software was becoming ever more critical to USAF weapons systems it was realized that improving the quality and productivity of the software development process could have significant benefits for the military, as well as for information technology in other major US industries. History In the early 1980s the United States Air Force realized that they had received significant benefits from applying artificial intelligence technologies to solving expert problems such as the diagnosis of faults in aircraft. The air force commissioned a group of researchers from the artificial intelligence and formal methods communities to develop a report on how such technologies might be used to aid in the more general problem of software development. The report described a vision for a new approach to software development. Rather than define specifications with diagrams and manually transform them to code as was the current process, the Knowledge Based Software Assistant (KBSA) vision was to define specifications in very high level languages and then to use transformation rules to gradually refine the specification into efficient code on heterogeneous platforms. Each step in the design and refinement of the system would be recorded as part of an integrated repository. In addition to the artifacts of software development the processes, the various definitions and transformations, would also be recorded in a way that they could be analyzed and also replayed later as needed. The idea was that each step would be a transformation that took into account various non-functional requirements for the implemented system. For example, requirements to use specific programming languages such as Ada or to harden code for real time mission critical fault tolerance. The air force decided to fund further research on this vision through their Rome Air Development Center laboratory at Griffiss air force base in New York. The majority of the early research was conducted at the Kestrel Institute in Northern California (with Stanford University) and the Information Sciences Institute (ISI) in Southern California (with USC and UCLA). The Kestrel Institute focused primarily on the provably correct transformation of logical models to efficient code. ISI focused primarily on the front end of the process on defining specifications that could map to logical formalisms but were in formats that were intuitive and familiar to systems analysts. In addition, Raytheon did a project to investigate informal requirements gathering and Honeywell and Harvard University did work on underlying frameworks, integration, and activity coordination. Although not primarily funded by the KBSA program the MIT Programmer's Apprentice project also had many of the same goals and used the same techniques as KBSA. In the later stages of the KBSA program (starting in 1991) researchers developed prototypes that were used on medium to large scale software development problems. Also, in these later stages the emphasis shifted from a pure KBSA approach to more general questions of how to use knowledge-based technology to supplement and augment existing and future computer-aided software engineering (CASE) tools. In these later stages there was significant interaction between the KBSA community and the object-oriented and software engineering communities. For example, KBSA concepts and researchers played an important role in the mega-programming and user centered software engineering programs sponsored by the Defense Advanced Research Projects Agency (DARPA). In these later stages the program changed its name to Knowledge-Based Software Engineering (KBSE). The name change reflected the different research goal, no longer to create a totally new all encompassing tool that would cover the complete software life cycle but to gradually work knowledge-based technology into existing tools. Companies such as Andersen Consulting (one of the largest system integrators and at the time vendor of their own CASE tool) played a major role in the program in these later stages. Key concepts Transformation rules The transformation rules that KBSA used were different than traditional rules for expert systems. Transformation rules matched against specification and implementation languages rather than against facts in the world. It was possible to specify transformations using patterns, wildcards, and recursion on both the right and left hand sides of a rule. The left hand expression would specify patterns in the existing knowledge base to search for. The right hand expression could specify a new pattern to transform the left hand side into. For example, transform a set theoretic data type into code using an Ada set library. The initial purpose for transformation rules was to refine a high level logical specification into well designed code for a specific hardware and software platform. This was inspired by early work on theorem proving and automatic programming. However, researchers at the Information Sciences Institute (ISI) developed the concept of evolution transformations. Rather than transforming a specification into code an evolution transformation was meant to automate various stereotypical changes at the specification level, for example developing a new superclass by extracting various capabilities from an existing class that can be shared more generally. Evolution transformations were developed at approximately the same time as the emergence of the software patterns community and the two groups shared concepts and technology. Evolution transformations were essentially what is known as refactoring in the object-oriented software patterns community. Knowledge-based repository A key concept of KBSA was that all artifacts: requirements, specifications, transformations, designs, code, process models, etc. were represented as objects in a knowledge-based repository. The original KBSA report describes what was called a Wide Spectrum Language. The requirement was for a knowledge representation framework that could support the entire life cycle: requirements, specification, and code as well as the software process itself. The core representation for the knowledge base was meant to utilize the same framework although various layers could be added to support specific presentations and implementations. These early knowledge-base frameworks were developed primarily by ISI and Kestrel building on top of Lisp and Lisp machine environments. The Kestrel environment was eventually turned into a commercial product called Refine which was developed and supported by a spin-off company from Kestrel called Reasoning Systems Incorporated. The Refine language and environment also proved to be applicable to the problem of software reverse engineering: taking legacy code that is critical to the business but that lacks proper documentation and using tools to analyze it and transform it to a more maintainable form. With the growing concern of the Y2K problem reverse engineering was a major business concern for many large US corporations and it was a focus area for KBSA research in the 1990s. There was significant interaction between the KBSA communities and the Frame language and object-oriented communities. The early KBSA knowledge-bases were implemented in object-based languages rather than object-oriented. Objects were represented as classes and sub-classes but it was not possible to define methods on the objects. In later versions of KBSA such as the Andersen Consulting Concept Demo the specification language was expanded to support message passing as well. Intelligent Assistant KBSA took a different approach than traditional expert systems when it came to how to solve problems and work with users. In the traditional expert system approach the user answers a series of interactive questions and the system provides a solution. The KBSA approach left the user in control. Where as an expert system tried to, to some extent replace and remove the need for the expert the intelligent assistant approach in KBSA sought to re-invent the process with technology. This led to a number of innovations at the user interface level. An example of the collaboration between the object-oriented community and KBSA was the architecture used for KBSA user interfaces. KBSA systems utilized a model-view-controller (MVC) user interface. This was an idea incorporated from Smalltalk environments. The MVC architecture was especially well suited to the KBSA user interface. KBSA environments featured multiple heterogeneous views of the knowledge-base. It might be useful to look at an emerging model from the standpoint of entities and relations, object interactions, class hierarchies, dataflow, and many other possible views. The MVC architecture facilitated this. With the MVC architecture the underlying model was always the knowledge base which was a meta-model description of the specification and implementation languages. When an analyst made some change via a particular diagram (e.g. added a class to the class hierarchy) that change was made at the underlying model level and the various views of the model were all automatically updated. One of the benefits of using a transformation was that many aspects of the specification and implementation could be modified at once. For small scale prototypes the resulting diagrams were simple enough that basic layout algorithms combined with reliance on users to clean up diagrams was sufficient. However, when a transformation can radically redraw models with tens or even hundreds of nodes and links the constant updating of the various views becomes a task in itself. Researchers at Andersen Consulting incorporated work from the University of Illinois on graph theory to automatically update the various views associated with the knowledge base and to generate graphs that have minimal intersection of links and also take into account domain and user specific layout constraints. Another concept used to provide intelligent assistance was automatic text generation. Early research at ISI investigated the feasibility of extracting formal specifications from informal natural language text documents. They determined that the approach was not viable. Natural language is by nature simply too ambiguous to serve as a good format for defining a system. However, natural language generation was seen to be feasible as a way to generate textual descriptions that could be read by managers and non-technical personnel. This was especially appealing to the air force since by law they required all contractors to generate various reports that describe the system from different points of view. Researchers at ISI and later Cogentext and Andersen Consulting demonstrated the viability of the approach by using their own technology to generate the documentation required by their air force contracts. References Artificial intelligence Expert systems Formal methods Specification languages United States Air Force Theoretical computer science
20607333
https://en.wikipedia.org/wiki/API%20writer
API writer
An API writer is a technical writer who writes documents that describe an application programming interface (API). The primary audience includes programmers, developers, system architects, and system designers. Overview An API is a library consisting of interfaces, functions, classes, structures, enumerations, etc. for building a software application. It is used by developers to interact with and extend the software. An API for a given programming language or system may consist of system-defined and user-defined constructs. As the number and complexity of these constructs increases, it becomes very tedious for developers to remember all of the functions and the parameters defined. Hence, the API writers play a key role in building software applications. Due to the technical subject matter, API writers must understand application source code enough to extract the information that API documents require. API writers often use tooling that extracts software documentation placed by programmers in the source code in a structured manner, preserving the relationships between the comments and the programming constructs they document. API writers must also understand the software product and document the new features or changes as part of the new software release. The schedule of software releases varies from organization to organization. API writers need to understand the software life cycle well and integrate themselves into the systems development life cycle (SDLC). API writers in the United States generally follow The Chicago Manual of Style for grammar and punctuation. Qualifications API writers typically possess a mix of programming and language skills; many API writers have backgrounds in programming or technical writing. Computer programming background (Knowledge of C, C++, Java, PHP, or other programming languages) Knowledge of formatting standards like Doxygen, Javadoc, OpenAPI, or DITA Knowledge of editors and tools, like FrameMaker Excellent communication and writing skills to interact with developers Expert API/software development kit (SDK) writers can easily become programming writers. API writing process The API writing process is typically split between analyzing and understanding the source code, planning, writing, and reviewing. It is often the case that the analytical, planning, and writing stages do not occur in a strictly linear fashion. The writing and evaluation criteria vary between organizations. Some of the most effective API documents are written by those who are adequately capable of understanding the workings of a particular application, so that they can relate the software to the users or the various component constructs to the overall purpose of the program. API writers may also be responsible for authoring end-user product documentation. While reference documentation may be auto-generated to ensure completeness, documentation that helps developers get started should be written by a professional API writer and reviewed by subject matter experts. This helps ensure that developers understand key concepts and can get started quickly. Product API writers produce documents that include: API reference guides Programmers' guides Developer manuals Administration manuals Installation guides Implementation and integration guides See also Technical communication Technical communication tools Comparison of documentation generators References External links Documenting APIs: Writing Developer Documentation for Java APIs and SDKs Free Wikiversity Technical Writing Courses EServer Technical Communication (and Technical Writing) Library The Death of the Technical Author? Application programming interfaces Software documentation
41444827
https://en.wikipedia.org/wiki/Samir%20Khuller
Samir Khuller
Samir Khuller (born 1965) is a Professor of Computer Science and the Peter and Adrienne Barris Chair of Computer Science at Northwestern University. He was previously Professor and Elizabeth Stevinson Iribe Chair of Computer Science in the University of Maryland's Department of Computer Science. Biography Khuller obtained his undergraduate degree from the Indian Institute of Technology Kanpur and was awarded a PhD in 1990 from Cornell University as a student of Vijay Vazirani. From 1990 to 1992, he was a research associate at UMIACS (the Institute for Advanced Computer Studies), a division of the University of Maryland. In 1992 he joined the faculty of the University of Maryland Department of Computer Science. He became the Elizabeth Stevinson Iribe Chair of Computer Science at the Department of Computer Science in 2012, a position he held until 2017. He was named a Distinguished Scholar Teacher and received a Google Research Award in 2007. Khuller joined Northwestern University's McCormick School of Engineering in March 2019 as the first Peter and Adrienne Barris Chair of Computer Science at the Department of Computer Science. References External links Samir Khuller Google Scholar profile Living people 1965 births Indian computer scientists University of Maryland, College Park faculty Northwestern University faculty
25528212
https://en.wikipedia.org/wiki/Nick%20Perry%20%28linebacker%29
Nick Perry (linebacker)
Nicholas Joel Perry (born April 12, 1990) is a former American football outside linebacker. He played college football at USC. Perry was drafted by the Green Bay Packers in the first round of the 2012 NFL Draft. Early years Detroit native, Nick Perry attended Mackenzie High School for most of his prep career; when Mackenzie was shuttered in 2007, Perry transferred to Martin Luther King High School for his senior season. During his Junior year in 2006, Perry was named to the All-metro and All-city teams while getting 75 tackles and 11 sacks. His senior year also brought great success as he played at defensive end, and Tight End. He recorded 147 tackles and a Michigan Record 36 Sacks. He also caught 14 passes for 310 yards and eight touchdowns. He received numerous honors including being named to the USA today All-USA First Team, Scout.com All-American second team, Super Prep All-Midwest, Prep-Star All Midwest, All-State and Detroit News All-Detroit and the Dream Team "MVP." He Also participated in the 2008 U.S. Army All-American Bowl. College career Perry was measured to be 6'4" and weighing in at 235 pounds coming out of King High School. He ran a 4.51 forty-yard dash, bench pressed 315 pounds, and squatted 400 pounds. He finished with a 3.3 Grade point average and received scholarship offers from Miami, Michigan, Michigan State, and USC. He ultimately decided to play at USC. During his freshman year in 2008, Perry was redshirted as a defensive end. Perry came on to the scene in 2009 mainly as a backup defensive end playing mostly in passing situations. He appeared in 13 games and made his first start against Stanford Cardinal in a 55–21 defeat. He had 24 tackles, nine for a loss, with a team best nine sacks. His performance had him named to the 2009 Football Writers Freshman All-American first team. Perry started nine games in his sophomore season in 2010, and saw action as a backup in others. He appeared in a total of 12 games, but missed the opener against The Hawaii Warriors with a sprained ankle. During this season he had 25 tackles with 7.5 of them for a loss. He also recorded four sacks, forced two fumbles, and recovered one. During his final season as a Trojan in 2011, Perry recorded 54 tackles over 12 games, with 13 for a loss along with 8.5 sacks. Professional career On December 16, 2011, Perry announced his decision to forgo his remaining eligibility and enter the 2012 NFL Draft. Due to Perry's size, many scouts viewed him be a bit small to be a defensive end and projected him to be better suited to play outside linebacker in a 3-4 defense. Perry stated he'd prefer to stay at defensive end. He attended pre-draft visits with multiple teams, including the New England Patriots, Pittsburgh Steelers, Jacksonville Jaguars, and Cleveland Browns. Perry also attended a private workout with the Baltimore Ravens. At the conclusion of the pre-draft process, Perry was projected to be a first or second round pick by NFL draft experts and scouts. He was ranked as the fourth best defensive end prospect in the draft by DraftScout.com, was ranked as the fourth best edge rusher by NFL analyst Gil Brandt, and was ranked as the sixth best defensive end by NFL analyst Mike Mayock. 2012 The Green Bay Packers selected Perry in the first round (28th overall) of the 2012 NFL Draft. Perry was the fourth linebacker drafted in 2012. On May 12, 2012 the Green Bay Packers signed Perry to a four-year, $7.5 million contract that includes a signing bonus of $4 million. Throughout training camp, Perry competed against Erik Walden to be the starting right outside linebacker. Head coach Mike McCarthy named Perry and Clay Matthews III the starting outside linebackers to begin the regular season. They started alongside inside linebackers A. J. Hawk and D. J. Smith. He made his professional regular season debut in the Green Bay Packers’ season-opener against the San Francisco 49ers and collected a season-high eight combined tackles during their 30–22 loss. Perry injured his wrist during the game, but elected to play through the injury. On September 24, 2012, Perry recorded four combined tackles and made his first career sack as the Packers lost 14–12 at the Seattle Seahawks in Week 3. Perry sacked Seahawks’ quarterback Russell Wilson for a 19-yard loss during the third quarter. In Week 6, Perry injured his knee during a 42–24 win at the Houston Texans and was inactive for the next three games (Weeks 7–9). On November 6, 2012, Perry underwent surgery on his wrist after injuring it in Week 1. The Green Bay Packers placed Perry in injured reserve the following day. He finished his rookie season in 2012 with 18 combined tackles (13 solo), two sacks, and one pass deflection in six games and five starts. 2013 Perry entered training camp slated as the starting weakside linebacker. Head coach Mike McCarthy retained Perry and Clay Matthews as the starting outside linebackers to start the season. On October 6, 2013, Perry recorded a season-high five solo tackles and sacked Lions’ quarterback Matthew Stafford twice during a 22–9 win against the Detroit Lions in Week 5. The following week, he made four combined tackles and one sack as the Packers defeated the Baltimore Ravens 19–17 in Week 6. Unfortunately, Perry fractured his foot during the game and was sidelined for the next three games (Week 7–9). Perry returned in Week 10, but subsequently missed the next two games after aggravating his foot injury (Weeks 11–12). Perry had slightly more success in 2013, playing in 11 games, starting in 6 of them, and recording four sacks and forcing three fumbles. The Green Bay Packers finished first in the NFC North with an 8–7–1 record and earned a playoff berth. On January 5, 2014, Perry appeared in his first career playoff game and recorded five combined tackles and one sack during a 23–20 loss to the San Francisco 49ers during the NFC Wildcard Game. 2014 Throughout training camp, Perry competed against Julius Peppers and Mike Neal to be a starting outside linebacker. Head coach Mike McCarthy named Perry a backup outside linebacker to start the regular season, behind Clay Matthews III and Julius Peppers. In Week 5, Perry recorded three combined tackles and made a season-high two sacks on Vikings’ quarterback Christian Ponder during a 42–10 victory against the Minnesota Vikings. Perry was inactive for the Packers’ a Week 12 victory at the Minnesota Vikings due to a shoulder injury. He finished the 2014 NFL season with 22 combined tackles (16 solo), three sacks, one pass deflection, and one forced fumble in 15 games and four starts. The Green Bay Packers finished atop the NFC North with a 12–4 record and earned a first round bye. On January 11, 2015, Perry recorded four combined tackles and made 1.5 sacks during a 26–21 victory against the Dallas Cowboys during the NFC Divisional Round. The following week, Perry started his first career playoff game and made four combined tackles as the Packers lost 28–22 at the Seattle Seahawks during the NFC Championship Game. 2015 On May 4, 2015, the Green Bay Packers officially declined to exercise the fifth-year option on Perry's rookie contract. As a result, Perry would become an unrestricted free agent after the 2015 NFL season. Throughout training camp, Perry competed against Mike Neal to be a starting outside linebacker. The role became available after defensive coordinator Dom Capers elected to move Clay Matthews to inside linebacker. Head coach Mike McCarthy named Perry a backup outside linebacker to begin the regular season, behind Julius Peppers and Mike Neal. In Week 4, he made two solo tackles and a season-high two sacks during a 17–3 victory at the San Francisco 49ers. Perry was inactive for the Packers’ Week 6 victory against the San Diego Chargers. In Week 9, he collected a season-high seven combined tackles during a 37–29 loss at the Carolina Panthers. He was sidelined for the Packers’ Week 14 victory against the Dallas Cowboys after aggravating his shoulder injury. Perry finished the 2015 NFL season with 31 combined tackles (16 solo), 3.5 sacks, one pass deflection, and one forced fumble in 14 games and one start. The Green Bay Packers finished second in the NFC North with a 10–6 record and earned a wildcard berth. On January 10, 2016, Perry recorded four combined tackles and made 2.5 sacks during a 35–18 win at the Washington Redskins during the NFC Wildcard Game. The following game, the Packers were eliminated from the playoffs after losing 26–20 at the Arizona Cardinals during the NFC Divisional Round. Perry recorded four combined tackles and one sack during the game. His 3.5 sacks that postseason tied the franchise record held by Clay Matthews. 2016 On March 11, 2016, the Green Bay Packers signed Perry to a one-year, $5.05 million contract that includes a signing bonus of $1.50 million. Perry entered training camp slated as a backup outside linebacker, but began competing against Julius Peppers for a starting role. Head coach Mike McCarthy named Perry and Clay Matthews III the starting outside linebackers to start the season. They started alongside inside linebackers Jake Ryan and Blake Martinez. In Week 3, Perry collected a season-high seven combined tackles, made a pass deflection, and made a season-high two sacks on Lions’ quarterback Matthew Stafford during a 34–27 win against the Detroit Lions. On October 20, 2016, Perry made four combined tackles, a pass deflection, a sack, and his first career interception during the Packers’ 26–10 victory against the Chicago Bears in Week 7. Perry intercepted a pass by Bears’ quarterback Matt Barkley, that was originally intended for running back Jordan Howard, to seal the Packers’ victory at the end of the fourth quarter. Perry was inactive for two games (Weeks 14–15) due to a significant hand injury. Upon returning from injury, he was demoted to backup outside linebacker behind Julius Peppers. He finished the 2016 NFL season with 52 combined tackles (35 solo), a career-high 11 sacks, four pass deflections, and one interception in 14 games and 12 starts. The Green Bay Packers finished first in the NFC North with a 10–6 record and earned a playoff berth. Perry remained a backup outside linebacker throughout the playoffs. The Green Bay Packers defeated the New York Giants 38–13 to win the NFC Wildcard Game. On January 15, 2017, Perry recorded four solo tackles, deflected a pass, and made a sack during a 34–31 win at the Dallas Cowboys in the NFC Divisional Round. The Packers were eliminated from the playoffs the following game after a 44–21 loss at the Atlanta Falcons during the NFC Championship Game. 2017 On March 9, 2017, the Green Bay Packers signed Perry to a five-year, $60 million contract that included a signing bonus of $18.50 million. Perry entered training camp slated as a starting outside linebacker after Julius Peppers departed in free agency. Perry was inactive for the Packers’ Week 3 victory against the Cincinnati Bengals due to a hand injury. On September 21, 2017, Green Bay Packers’ head coach Mike McCarthy announced that Perry would undergo surgery to repair his injured hand. On November 12, 2017, Perry collected a season-high six solo tackles and sacked Bears’ quarterback Mitch Trubisky three times during a 23–16 victory at the Chicago Bears in Week 10. Perry was sidelined for a Week 14 win at the Cleveland Browns and a Week 16 loss to the Minnesota Vikings due to injuries to his foot and shoulder. On December 30, 2017, the Green Bay Packers places Perry on injured reserve due to injuries to his ankle and shoulder. He finished the season with 38 combined tackles (23 solo), seven sacks, and one forced fumble in 12 games and 11 starts. 2018 On January 1, 2018, the Green Bay Packers announced their decision to fire defensive coordinator Dom Capers. On January 10, 2018, the Green Bay Packers announced their decision to hire former Cleveland Browns’ head coach Mike Pettine as their new defensive coordinator. Pettine retained Perry and Clay Matthews III as the starting outside linebackers. In Week 3, he collected a season-high seven combined tackles during the Packers’ 31–17 loss at the Washington Redskins. On November 24, 2018, the Green Bay Packers placed Perry on injured reserve due to a knee injury. He played in nine games in 2018, recording 24 tackles and 1.5 sacks. On December 3, 2018, the Green Bay Packers announced their decision to fire head coach Mike McCarthy after they fell to a 4–7–1 record. On March 12, 2019, Perry was released by the Packers. NFL career statistics Regular season Postseason References External links Green Bay Packers bio USC Trojans bio 1990 births Living people Players of American football from Detroit American football defensive ends American football linebackers USC Trojans football players Green Bay Packers players Mackenzie High School (Michigan) alumni
63296035
https://en.wikipedia.org/wiki/2020%20Troy%20Trojans%20football%20team
2020 Troy Trojans football team
The 2020 Troy Trojans football team represented Troy University in the 2020 NCAA Division I FBS football season. The Trojans played their home games at Veterans Memorial Stadium in Troy, Alabama, and competed in the East Division of the Sun Belt Conference. They were led by second-year head coach Chip Lindsey. Schedule Troy had games scheduled against Arkansas–Pine Bluff, NC State, Tennessee, and UMass, but were canceled due to the COVID-19 pandemic. Schedule Source: Game summaries at Middle Tennessee at BYU Texas State Eastern Kentucky Georgia State at Arkansas State at Georgia Southern Middle Tennessee at Appalachian State at South Alabama Coastal Carolina References Troy Troy Trojans football seasons Troy Trojans football
14827171
https://en.wikipedia.org/wiki/C-Net
C-Net
C-Net, C-net, CNET, CNet, or Cnet may refer to: CNET or "c|net" — a computer news website since 1994 C-Net DS2 or CNet DS2 — bulletin board software for Commodore 64 computer system since 1986 C-Net or C=Net — an ancestor edition of the C-Net DS2 bulletin board software for the Commodore computer system C-Net 128, C-Net Amiga, and CNet Amiga Pro — other editions of the C-Net bulletin board software for the Commodore computer system Centre national d'études des télécommunications — the national telecommunications research institute in France from 1944 to 2000 c-net — a type of polyhedral graph
1497388
https://en.wikipedia.org/wiki/Email%20authentication
Email authentication
Email authentication, or validation, is a collection of techniques aimed at providing verifiable information about the origin of email messages by validating the domain ownership of any message transfer agents (MTA) who participated in transferring and possibly modifying a message. The original base of Internet email, Simple Mail Transfer Protocol (SMTP), has no such feature, so forged sender addresses in emails (a practice known as email spoofing) have been widely used in phishing, email spam, and various types of fraud. To combat this, many competing email authentication proposals have been developed, but only fairly recently have three been widely adopted – SPF, DKIM and DMARC. The results of such validation can be used in automated email filtering, or can assist recipients when selecting an appropriate action. This article does not cover user authentication of email submission and retrieval. Rationale In the early 1980s, when Simple Mail Transfer Protocol (SMTP) was designed, it provided for no real verification of sending user or system. This was not a problem while email systems were run by trusted corporations and universities, but since the commercialization of the Internet in the early 1990s, spam, phishing, and other crimes increasingly involve email. Email authentication is a necessary first step towards identifying the origin of messages, and thereby making policies and laws more enforceable. Hinging on domain ownership is a stance emerged in the early 2000. It implies a coarse-grained authentication, given that domains appear on the right part of email addresses, after the at sign. Fine-grain authentication, at user level, can be achieved by other means, such as Pretty Good Privacy and S/MIME. At present, digital identity needs to be managed by each individual. An outstanding rationale for email authentication is the ability to automate email filtering at receiving servers. That way, spoofed messages can be rejected before they arrive to a user's Inbox. While protocols strive to devise ways to reliably block distrusted mail, security indicators can tag unauthenticated messages that still reach the Inbox. A 2018 study shows that security indicators can lower the click-through ratio by more than ten points, 48.9% to 37.2% of the users who open spoofed messages. Nature of the problem SMTP defines message transport, not the message content. Thus, it defines the mail envelope and its parameters, such as the envelope sender, but not the header (except trace information) nor the body of the message itself. STD 10 and define SMTP (the envelope), while STD 11 and define the message (header and body), formally referred to as the Internet Message Format. SMTP defines the trace information of a message, which is saved in the header using the following two fields: Received: when an SMTP server accepts a message it inserts this trace record at the top of the header (last to first). Return-Path: when the delivery SMTP server makes the final delivery of a message, it inserts this field at the top of the header. A mail user agent (MUA) knows the outgoing mail SMTP server from its configuration. A MTA (or a relay server) typically determines which server to connect to by looking up the MX (Mail eXchange) DNS resource record for each recipient's domain name The path depicted below can be reconstructed on the ground of the trace header fields that each host adds to the top of the header when it receives the message: Return-Path: <[email protected]> Received: from D.example.org by E.example.org with SMTP; Tue, 05 Feb 2013 11:45:02 -0500 Received: from C.example.net by D.example.org with SMTP; Tue, 05 Feb 2013 11:45:02 -0500 Received: from B.example.com (b.example.com [192.0.2.1]) by C.example.net (which is me) with ESMTP id 936ADB8838C for <[email protected]>; Tue, 05 Feb 2013 08:44:50 -0800 (PST) Received: from A.example.com by B.example.com with SMTP; Tue, 05 Feb 2013 17:44:47 +0100 Received: from [192.0.2.27] by A.example.com with SMTP; Tue, 05 Feb 2013 17:44:42 +0100 It is important to realize that the first few lines at the top of the header are usually trusted by the recipient. In fact, those lines are written by machines in the recipient's Administrative Management Domain (ADMD), which act upon her or his explicit mandate. By contrast, the lines that prove the involvement of A and B, as well as of the purported author's MUA could be a counterfeit created by C. The Received: field shown above is an epoch-making piece of the header. The Return-Path: is written by E, the mail delivery agent (MDA), based on the message envelope. Additional trace fields, designed for email authentication, can populate the top of the header. Normally, messages sent out by an author's ADMD go directly to the destination's MX (that is B → D in the figures). The sender's ADMD can add authentication tokens only if the message goes through its boxes. The most common cases can be schematized as follows: Sending from within ADMD's network (MUA 1) The ADMD's MSA authenticates the user, either based on its IP address or some other SMTP Authentication means. Depending on the recipient address, the message can follow the normal path or pass through a mailing list or a forwarding service. B can be an outbound SMTP proxy or a smarthost. If the local network does not block outbound port 25 connections, the user can deploy some "direct-to-mx" software. Typically, zombies and other malicious hosts behave that way. If the MUA is badly configured, it can also use a different relay, such as an outmoded open relay, that often doesn't authenticate the user. Roaming user (MUA 2) Most of the times it is still possible to use one's own ADMD MSA. Outbound connections to port 25 can be intercepted and tunneled to a transparent proxy. A MUA can be configured to use an SMTP relay that the local network provider offers as a bonus. Disconnected user An e-card can send mail on behalf of a customer who typed email addresses on the local keyboard; some web forms can be considered to work similarly. Section notes Authentication methods in widespread use SPF SPF allows the receiver to check that an email claimed to have come from a specific domain comes from an IP address authorized by that domain's administrators. Usually, a domain administrator will authorize the IP addresses used by their own outbound MTAs, including any proxy or smarthost. The IP address of the sending MTA is guaranteed to be valid by the Transmission Control Protocol, as it establishes the connection by checking that the remote host is reachable. The receiving mail server receives the HELO SMTP command soon after the connection is set up, and a Mail from: at the beginning of each message. Both of them can contain a domain name. The SPF verifier queries the Domain Name System (DNS) for a matching SPF record, which if it exists will specify the IP addresses authorized by that domain's administrator. The result can be "pass", "fail", or some intermediate result - and systems will generally take this into account in their anti-spam filtering. DKIM DKIM checks the message content, deploying digital signatures. Rather than using digital certificates, the keys for signature-verification are distributed via the DNS. That way, a message gets associated to a domain name. A DKIM-compliant domain administrator generates one or more pairs of asymmetric keys, then hands private keys to the signing MTA, and publishes public keys on the DNS. The DNS labels are structured as selector._domainkey.example.com, where selector identifies the key pair, and _domainkey is a fixed keyword, followed by the signing domain's name so that publication occurs under the authority of that domain's ADMD. Just before injecting a message into the SMTP transport system, the signing MTA creates a digital signature that covers selected fields of the header and the body (or just its beginning). The signature should cover substantive header fields such as From:, To:, Date:, and Subject:, and then is added to the message header itself, as a trace field. Any number of relays can receive and forward the message and at every hop, the signature can be verified by retrieving the public key from the DNS. As long as intermediate relays don't modify signed parts of a message, its DKIM-signatures remain valid. DMARC DMARC allows the specification of a policy for authenticated messages. It is built on top of two existing mechanisms, Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM). It allows the administrative owner of a domain to publish a policy in their DNS records to specify which mechanism (DKIM, SPF or both) is employed when sending email from that domain; how to check the From: field presented to end users; how the receiver should deal with failures - and a reporting mechanism for actions performed under those policies. Other methods A range of other methods have been proposed, but are now either deprecated or have not yet gained widespread support. These have included Sender ID, Certified Server Validation, DomainKeys and those below: ADSP ADSP allowed the specification of a policy for messages signed by the author's domain. A message had to go through DKIM authentication first, then ADSP could demand a punishing treatment if the message was not signed by the author domain(s) —as per the From: header field. ADSP was demoted to historic in November 2013. VBR VBR adds a vouch to an already authenticated identity. This method requires some globally recognized authorities that certify the reputation of domains. A sender can apply for a reference at a vouching authority. The reference, if accepted, is published on the DNS branch managed by that authority. A vouched sender should add a VBR-Info: header field to the messages it sends. It should also add a DKIM signature, or use some other authentication method, such as SPF. A receiver, after validating the sender's identity, can verify the vouch claimed in VBR-Info: by looking up the reference. iprev Applications should avoid using this method as a means of authentication. Nevertheless, it is often carried out and its results, if any, written in the Received: header field besides the TCP information required by the SMTP specification. The IP reverse, confirmed by looking up the IP address of the name just found, is just an indication that the IP was set up properly in the DNS. The reverse resolution of a range of IP addresses can be delegated to the ADMD that uses them, or can remain managed by the network provider. In the latter case, no useful identity related to the message can be obtained. DNSWL Looking up a DNSWL (DNS-based whitelist) may provide an assessment of the sender, possibly including its identification. Authentication-Results RFC 8601 defines a trace header field Authentication-Results: where a receiver can record the results of email authentication checks that it carried out. Multiple results for multiple methods can be reported in the same field, separated by semicolons and wrapped as appropriate. For example, the following field is purportedly written by receiver.example.org and reports SPF and DKIM results: Authentication-Results: receiver.example.org; spf=pass smtp.mailfrom=example.com; dkim=pass [email protected] The first token after the field name, receiver.example.org, is the ID of the authentication server, a token known as an authserv-id. A receiver supporting RFC 8601 is responsible to remove (or rename) any false header claiming to belong to its domain so that downstream filters cannot get confused. However, those filters still need to be configured, as they have to know which identities the domain may use. For a Mail User Agent (MUA), it is slightly harder to learn what identities it can trust. Since users can receive email from multiple domains—e.g., if they have multiple email addresses -— any of those domains could let Authentication-Results: fields pass through because they looked neutral. That way, a malicious sender can forge an authserv-id that the user would trust if the message arrived from a different domain. A legitimate Authentication-Results: typically appears just above a Received: field by the same domain from which the message was relayed. Additional Received: fields may appear between that and the top of the header, as the message got transferred internally between servers belonging to that same, trusted ADMD. The Internet Assigned Numbers Authority maintains a registry of Email Authentication Parameters. Not all parameters need to be registered, though. For example, there can be local "policy" values designed for a site's internal use only, which correspond to local configuration and need no registration. See also References Internet fraud Spamming
8492
https://en.wikipedia.org/wiki/Discrete%20mathematics
Discrete mathematics
Discrete mathematics is the study of mathematical structures that can be considered "discrete" (in a way analogous to discrete variables, having a one-to-one correspondence with the set of natural numbers) rather than "continuous" (analogously to continuous functions). Objects studied in discrete mathematics include integers, graphs, and statements in logic. By contrast, discrete mathematics excludes topics in "continuous mathematics" such as real numbers, calculus or Euclidean geometry. Discrete objects can often be enumerated by integers; more formally, discrete mathematics has been characterized as the branch of mathematics dealing with countable sets (finite sets or sets with the same cardinality as the natural numbers). However, there is no exact definition of the term "discrete mathematics". The set of objects studied in discrete mathematics can be finite or infinite. The term finite mathematics is sometimes applied to parts of the field of discrete mathematics that deals with finite sets, particularly those areas relevant to business. Research in discrete mathematics increased in the latter half of the twentieth century partly due to the development of digital computers which operate in "discrete" steps and store data in "discrete" bits. Concepts and notations from discrete mathematics are useful in studying and describing objects and problems in branches of computer science, such as computer algorithms, programming languages, cryptography, automated theorem proving, and software development. Conversely, computer implementations are significant in applying ideas from discrete mathematics to real-world problems, such as in operations research. Although the main objects of study in discrete mathematics are discrete objects, analytic methods from "continuous" mathematics are often employed as well. In university curricula, "Discrete Mathematics" appeared in the 1980s, initially as a computer science support course; its contents were somewhat haphazard at the time. The curriculum has thereafter developed in conjunction with efforts by ACM and MAA into a course that is basically intended to develop mathematical maturity in first-year students; therefore, it is nowadays a prerequisite for mathematics majors in some universities as well. Some high-school-level discrete mathematics textbooks have appeared as well. At this level, discrete mathematics is sometimes seen as a preparatory course, not unlike precalculus in this respect. The Fulkerson Prize is awarded for outstanding papers in discrete mathematics. Grand challenges, past and present The history of discrete mathematics has involved a number of challenging problems which have focused attention within areas of the field. In graph theory, much research was motivated by attempts to prove the four color theorem, first stated in 1852, but not proved until 1976 (by Kenneth Appel and Wolfgang Haken, using substantial computer assistance). In logic, the second problem on David Hilbert's list of open problems presented in 1900 was to prove that the axioms of arithmetic are consistent. Gödel's second incompleteness theorem, proved in 1931, showed that this was not possible – at least not within arithmetic itself. Hilbert's tenth problem was to determine whether a given polynomial Diophantine equation with integer coefficients has an integer solution. In 1970, Yuri Matiyasevich proved that this could not be done. The need to break German codes in World War II led to advances in cryptography and theoretical computer science, with the first programmable digital electronic computer being developed at England's Bletchley Park with the guidance of Alan Turing and his seminal work, On Computable Numbers. At the same time, military requirements motivated advances in operations research. The Cold War meant that cryptography remained important, with fundamental advances such as public-key cryptography being developed in the following decades. Operations research remained important as a tool in business and project management, with the critical path method being developed in the 1950s. The telecommunication industry has also motivated advances in discrete mathematics, particularly in graph theory and information theory. Formal verification of statements in logic has been necessary for software development of safety-critical systems, and advances in automated theorem proving have been driven by this need. Computational geometry has been an important part of the computer graphics incorporated into modern video games and computer-aided design tools. Several fields of discrete mathematics, particularly theoretical computer science, graph theory, and combinatorics, are important in addressing the challenging bioinformatics problems associated with understanding the tree of life. Currently, one of the most famous open problems in theoretical computer science is the P = NP problem, which involves the relationship between the complexity classes P and NP. The Clay Mathematics Institute has offered a $1 million USD prize for the first correct proof, along with prizes for six other mathematical problems. Topics in discrete mathematics Theoretical computer science Theoretical computer science includes areas of discrete mathematics relevant to computing. It draws heavily on graph theory and mathematical logic. Included within theoretical computer science is the study of algorithms and data structures. Computability studies what can be computed in principle, and has close ties to logic, while complexity studies the time, space, and other resources taken by computations. Automata theory and formal language theory are closely related to computability. Petri nets and process algebras are used to model computer systems, and methods from discrete mathematics are used in analyzing VLSI electronic circuits. Computational geometry applies algorithms to geometrical problems, while computer image analysis applies them to representations of images. Theoretical computer science also includes the study of various continuous computational topics. Information theory Information theory involves the quantification of information. Closely related is coding theory which is used to design efficient and reliable data transmission and storage methods. Information theory also includes continuous topics such as: analog signals, analog coding, analog encryption. Logic Logic is the study of the principles of valid reasoning and inference, as well as of consistency, soundness, and completeness. For example, in most systems of logic (but not in intuitionistic logic) Peirce's law (((P→Q)→P)→P) is a theorem. For classical logic, it can be easily verified with a truth table. The study of mathematical proof is particularly important in logic, and has applications to automated theorem proving and formal verification of software. Logical formulas are discrete structures, as are proofs, which form finite trees or, more generally, directed acyclic graph structures (with each inference step combining one or more premise branches to give a single conclusion). The truth values of logical formulas usually form a finite set, generally restricted to two values: true and false, but logic can also be continuous-valued, e.g., fuzzy logic. Concepts such as infinite proof trees or infinite derivation trees have also been studied, e.g. infinitary logic. Set theory Set theory is the branch of mathematics that studies sets, which are collections of objects, such as {blue, white, red} or the (infinite) set of all prime numbers. Partially ordered sets and sets with other relations have applications in several areas. In discrete mathematics, countable sets (including finite sets) are the main focus. The beginning of set theory as a branch of mathematics is usually marked by Georg Cantor's work distinguishing between different kinds of infinite set, motivated by the study of trigonometric series, and further development of the theory of infinite sets is outside the scope of discrete mathematics. Indeed, contemporary work in descriptive set theory makes extensive use of traditional continuous mathematics. Combinatorics Combinatorics studies the way in which discrete structures can be combined or arranged. Enumerative combinatorics concentrates on counting the number of certain combinatorial objects - e.g. the twelvefold way provides a unified framework for counting permutations, combinations and partitions. Analytic combinatorics concerns the enumeration (i.e., determining the number) of combinatorial structures using tools from complex analysis and probability theory. In contrast with enumerative combinatorics which uses explicit combinatorial formulae and generating functions to describe the results, analytic combinatorics aims at obtaining asymptotic formulae. Design theory is a study of combinatorial designs, which are collections of subsets with certain intersection properties. Partition theory studies various enumeration and asymptotic problems related to integer partitions, and is closely related to q-series, special functions and orthogonal polynomials. Originally a part of number theory and analysis, partition theory is now considered a part of combinatorics or an independent field. Order theory is the study of partially ordered sets, both finite and infinite. Graph theory Graph theory, the study of graphs and networks, is often considered part of combinatorics, but has grown large enough and distinct enough, with its own kind of problems, to be regarded as a subject in its own right. Graphs are one of the prime objects of study in discrete mathematics. They are among the most ubiquitous models of both natural and human-made structures. They can model many types of relations and process dynamics in physical, biological and social systems. In computer science, they can represent networks of communication, data organization, computational devices, the flow of computation, etc. In mathematics, they are useful in geometry and certain parts of topology, e.g. knot theory. Algebraic graph theory has close links with group theory. There are also continuous graphs; however, for the most part, research in graph theory falls within the domain of discrete mathematics. Probability Discrete probability theory deals with events that occur in countable sample spaces. For example, count observations such as the numbers of birds in flocks comprise only natural number values {0, 1, 2, ...}. On the other hand, continuous observations such as the weights of birds comprise real number values and would typically be modeled by a continuous probability distribution such as the normal. Discrete probability distributions can be used to approximate continuous ones and vice versa. For highly constrained situations such as throwing dice or experiments with decks of cards, calculating the probability of events is basically enumerative combinatorics. Number theory Number theory is concerned with the properties of numbers in general, particularly integers. It has applications to cryptography and cryptanalysis, particularly with regard to modular arithmetic, diophantine equations, linear and quadratic congruences, prime numbers and primality testing. Other discrete aspects of number theory include geometry of numbers. In analytic number theory, techniques from continuous mathematics are also used. Topics that go beyond discrete objects include transcendental numbers, diophantine approximation, p-adic analysis and function fields. Algebraic structures Algebraic structures occur as both discrete examples and continuous examples. Discrete algebras include: boolean algebra used in logic gates and programming; relational algebra used in databases; discrete and finite versions of groups, rings and fields are important in algebraic coding theory; discrete semigroups and monoids appear in the theory of formal languages. Calculus of finite differences, discrete calculus or discrete analysis A function defined on an interval of the integers is usually called a sequence. A sequence could be a finite sequence from a data source or an infinite sequence from a discrete dynamical system. Such a discrete function could be defined explicitly by a list (if its domain is finite), or by a formula for its general term, or it could be given implicitly by a recurrence relation or difference equation. Difference equations are similar to differential equations, but replace differentiation by taking the difference between adjacent terms; they can be used to approximate differential equations or (more often) studied in their own right. Many questions and methods concerning differential equations have counterparts for difference equations. For instance, where there are integral transforms in harmonic analysis for studying continuous functions or analogue signals, there are discrete transforms for discrete functions or digital signals. As well as the discrete metric there are more general discrete or finite metric spaces and finite topological spaces. Geometry Discrete geometry and combinatorial geometry are about combinatorial properties of discrete collections of geometrical objects. A long-standing topic in discrete geometry is tiling of the plane. Computational geometry applies algorithms to geometrical problems. Topology Although topology is the field of mathematics that formalizes and generalizes the intuitive notion of "continuous deformation" of objects, it gives rise to many discrete topics; this can be attributed in part to the focus on topological invariants, which themselves usually take discrete values. See combinatorial topology, topological graph theory, topological combinatorics, computational topology, discrete topological space, finite topological space, topology (chemistry). Operations research Operations research provides techniques for solving practical problems in engineering, business, and other fields — problems such as allocating resources to maximize profit, and scheduling project activities to minimize risk. Operations research techniques include linear programming and other areas of optimization, queuing theory, scheduling theory, and network theory. Operations research also includes continuous topics such as continuous-time Markov process, continuous-time martingales, process optimization, and continuous and hybrid control theory. Game theory, decision theory, utility theory, social choice theory Decision theory is concerned with identifying the values, uncertainties and other issues relevant in a given decision, its rationality, and the resulting optimal decision. Utility theory is about measures of the relative economic satisfaction from, or desirability of, consumption of various goods and services. Social choice theory is about voting. A more puzzle-based approach to voting is ballot theory. Game theory deals with situations where success depends on the choices of others, which makes choosing the best course of action more complex. There are even continuous games, see differential game. Topics include auction theory and fair division. Discretization Discretization concerns the process of transferring continuous models and equations into discrete counterparts, often for the purposes of making calculations easier by using approximations. Numerical analysis provides an important example. Discrete analogues of continuous mathematics There are many concepts in continuous mathematics which have discrete versions, such as discrete calculus, discrete probability distributions, discrete Fourier transforms, discrete geometry, discrete logarithms, discrete differential geometry, discrete exterior calculus, discrete Morse theory, difference equations, discrete dynamical systems, and discrete vector measures. In applied mathematics, discrete modelling is the discrete analogue of continuous modelling. In discrete modelling, discrete formulae are fit to data. A common method in this form of modelling is to use recurrence relation. In algebraic geometry, the concept of a curve can be extended to discrete geometries by taking the spectra of polynomial rings over finite fields to be models of the affine spaces over that field, and letting subvarieties or spectra of other rings provide the curves that lie in that space. Although the space in which the curves appear has a finite number of points, the curves are not so much sets of points as analogues of curves in continuous settings. For example, every point of the form for a field can be studied either as , a point, or as the spectrum of the local ring at (x-c), a point together with a neighborhood around it. Algebraic varieties also have a well-defined notion of tangent space called the Zariski tangent space, making many features of calculus applicable even in finite settings. Hybrid discrete and continuous mathematics The time scale calculus is a unification of the theory of difference equations with that of differential equations, which has applications to fields requiring simultaneous modelling of discrete and continuous data. Another way of modeling such a situation is the notion of hybrid dynamical systems. See also Outline of discrete mathematics Cyberchase, a show that teaches Discrete Mathematics to children References Further reading Ronald Graham, Donald E. Knuth, Oren Patashnik, Concrete Mathematics. External links Discrete mathematics at the utk.edu Mathematics Archives, providing links to syllabi, tutorials, programs, etc. Iowa Central: Electrical Technologies Program Discrete mathematics for Electrical engineering.
308046
https://en.wikipedia.org/wiki/Claris
Claris
Claris International Inc., formerly FileMaker Inc., is a computer software development company formed as a subsidiary company of Apple Computer (now Apple Inc.) in 1987. It was given the source code and copyrights to several programs that were owned by Apple, notably MacWrite and MacPaint, in order to separate Apple's application software activities from its hardware and operating systems activities. In 1998, the company divested itself of all but its flagship product, and reformed as FileMaker Inc. In 2019, FileMaker Inc. announced at DevCon that it was restoring the Claris brand name. Also in 2019, Claris acquired Italian startup, Stamplay, a cloud-based integration platform which connects web services like Dropbox and Slack without writing code, and announced they would rename their product offering as Claris Connect. The company develops, supports and markets the relational database program FileMaker. The FileMaker Platform is available for the macOS, Microsoft Windows and iOS operating systems and is aimed towards business users and power users. History Creation During the early days of the Macintosh computer, Apple shipped the machines with two basic programs, MacWrite and MacPaint, so that users would have a working machine "out of the box". However, this resulted in complaints from third-party developers, who felt that these programs were good enough for so many users that there was little reason to buy something better. Apple decided to allow the programs to "wither" so that the third-party developers would have time to write suitable replacements. The developers did not seem to hold up their end of the bargain, and it was some time before truly capable replacements like WriteNow came along. In the meantime users complained about the lack of upgrades, while the third-party developers continued to complain about the possibility of upgrades. Eventually Apple decided the only solution was to spin off the products to a third party of its own creation, forming Claris in 1987. Claris was also given the rights to several lesser-known Apple products such as MacProject, MacDraw, and the hit Apple II product AppleWorks. Claris' second corporate headquarters (nicknamed "The Wedge") was in Santa Clara, about six miles from the main Apple campus. At first Claris provided only trivial upgrades, limited to making the products continue to run on newer versions of the Macintosh operating system. In 1988, Claris purchased FileMaker from Nashoba Systems and quickly released a rebranded version called FileMaker II, to conform to its naming scheme for other products, such as MacWrite II. The product, however, changed little from the last Nashoba version. Several minor versions followed; it was succeeded by FileMaker Pro 1.0 in 1990. In the meantime, development began on major overhauls of their entire product line, including FileMaker. Each of these would be eventually released as part of the Pro series of products. In 1990, Apple decided that Claris should remain a wholly owned subsidiary, as opposed to being completely spun off in an initial public offering. The company president soon left, and over the next year most of the other executives followed. That same year Claris also purchased an integrated application written by two former Claris employees. After rebranding in a style similar to FileMaker, MacDraw, and MacWrite, it was released in 1991 as ClarisWorks, and became another huge success for the company. After a lengthy series of ups and downs, this product was eventually taken back by Apple in 1998 and rebranded as AppleWorks (for Macintosh). In September 1992, Claris released a cross-platform version of FileMaker for both the Mac and Windows; except for a few platform-specific functions, the program's features and user interface were the same. Up to this point FileMaker had no real relational capabilities; it was limited to automatically looking up and importing values from other files. It only had the ability to save a state—a filter and a sort, and a layout for the data. Version 3.0, released around 1995, introduced new relational and scripting features. Transition to FileMaker Inc. By the mid-1990s it appeared to most observers that Apple was in serious danger of disappearing. The main ClarisWorks development team left Claris, disillusioned with the product and the market, and founded Gobe Software, which produced a Claris-like office suite for BeOS. Facing declining sales, Claris management decided that FileMaker was the only product worth keeping, and put all of the rest of the products on indefinite hold. By 1998 the transition was complete and the company renamed itself as FileMaker Inc. Claris's only other major product, ClarisWorks, was taken back by Apple to become AppleWorks. The company kept FileMaker and Claris HomePage 3.0. The latter was discontinued in 2001 leaving FileMaker as its lone offering until January 8, 2008, when the company released Bento, a template-based database application with a leaning toward information from other applications. Bento was discontinued on September 30, 2013. Return to Claris During DevCon 2019, the developers' conference, FileMaker announced it was resurrecting the Claris name and re-branding commenced. FileMaker Inc. changed its name to Claris International. The FileMaker product name remains as Claris FileMaker. Products FileMaker FileMaker is a cross-platform relational database application. It integrates a database engine with a graphical user interface (GUI) and security features, allowing users to modify the database by dragging new elements into layouts, screens, or forms. It started as an MS-DOS app called Nutshell, developed by Nashoba Systems. Pro series In the late 1980s, Claris began a major upgrade effort, rewriting all of its products to use a more modern and common user interface. The result was the "Pro" series: MacDraw Pro, MacWrite Pro, and FileMaker Pro. In order to provide a complete office suite they later purchased the rights to the Informix WingZ spreadsheet on the Mac, rebranding it as Claris Resolve, and added the new presentation program Claris Impact. The series was released piecemeal over a period of about two years, during which period Microsoft was able to dominate the market with Microsoft Word and Microsoft Excel. While the Claris packages were arguably much more "approachable" than the Microsoft applications, the Claris software applications lacked some features of the now-mature Microsoft suite, leaving them lacking in "checkbox features." Their value was further eroded by aggressive bundling deals from Microsoft that could allow Word, Excel, and PowerPoint to be purchased for a cost not much higher than MacWrite alone—a bundle that Claris did not match. Claris did offer ClarisWorks, an all-in-one package; and, while the price was right, ClarisWorks was very limited and could not compete in the business market. Microsoft also released a Works package. Microsoft's domination of the Macintosh office suite software marketplace would be replicated five years later when (following the release of Windows 95), Microsoft Office crushed its two main rivals in Windows software: the WordPerfect/Quattro Pro suite and the Lotus SmartSuite. Other applications By the late 1980s, HyperCard needed updating as well but Apple management did not see any value in the product and let it wither. Complaints eventually became loud enough that they decided something had to be done. Studying the problem, they decided that all software should be released through Claris, and sent HyperCard and the Mac OS to them. Many of the developers refused to move to Claris, leading to a serious split in development that delayed future releases of both products. The Mac OS was soon returned to Apple; HyperCard was ignored for a time, before also returning briefly as a part of the QuickTime group. In 1988, Claris published Claris CAD, a 2-D CAD package, and Claris Graphics Translator, a translation package for Claris CAD. In early 1989, Claris published SmartForm Designer, software to design forms, and a companion product, SmartForm Assistant, software to fill forms created by SmartForm Designer. In 1994, Claris published Amazing Animation, software aimed at children and young teenagers, allowing them to produce their own short animated films. In 1995 Claris purchased and released Claris Home Page, which enjoyed popularity as one of the few truly GUI-based WYSIWYG HTML editors of the time. Other products added to the line included Claris Emailer; Claris OfficeMail, which facilitated setup by non-specialists and Claris Organizer. These products were part of a new effort to diversify Claris and no longer chase the "office" market which, by this point, was considered a lost cause. The Bento database product aimed at home users or small businesses was released in 2008 and discontinued in 2013. See also List of Macintosh software Clarus The Dogcow, a prolific icon in Macintosh / Claris software, such as seen in Page Setup configuration dialogs References Further reading MacTech, Claris Solutions Alliance Expansion, December 4, 1996 TidBITS, Michael Jardeen, To Home Page and Back Again, #422/March 30, 1998 Wired News, Joe Ashbrook Nickell, What is Apple Up to With Claris Shake-up?, January 27, 1998 Alan Zisman, Apple Windows?-- Software for the rest of us?, March 18, 1994 A Brief History of ClarisWorks (broken link) The Life and Times of AppleWorks GS (broken link) External links The Apple Museum - Claris software codenames Using Claris Homepage 3.0 (tutorial) Apple Inc. subsidiaries Software companies established in 1987 Software companies disestablished in 1998 Software companies based in the San Francisco Bay Area Companies based in Cupertino, California 1987 establishments in California Corporate spin-offs Software companies of the United States
20172841
https://en.wikipedia.org/wiki/Sesame%20Street%20video%20games
Sesame Street video games
There have been a variety of Sesame Street video games released for video game platforms. Most of the Sesame Street video games were published and developed by NewKidCo. Video games The Adventures of Elmo in Grouchland Alpha Beam with Ernie Big Bird's Egg CatchBig Bird's Egg Catch (originally Grover's Egg Catch) is a 1983 video game for the Atari 2600 developed by Atari and Children's Computer Workshop. In Big Bird's Egg Catch, the player controls Big Bird as he saves eggs produced by chickens at the top of the screen. These eggs travel down variously contorted chutes to land safely in the basket perched on Big Bird's head. Most eggs count for a single point, but a golden egg will periodically appear that is worth five points. When an egg is dropped, a number of points are lost. At higher levels, the eggs move faster, the chutes become more convoluted, there are more egg-laying hens, and the chutes may even flash invisible. "Turkey in the Straw", the song that plays during the egg-catching, also increases in tempo. Periodically, Big Bird will exit the screen to count his eggs. During this stage, Big Bird is seen with his basket and numbers flash on the screen progressively faster as he counts. When the total is reached, a song is played and Big Bird dances. The game ends when too many eggs are dropped or a set number of counting sessions is performed. Cookie Monster Munch Cookie Monster Munch is a video game developed by Atari and Children's Computer Workshop for the Atari 2600 and released in 1983. The game was programmed by Gary Stark. The objective of Cookie Monster Munch is to guide Cookie Monster through a simple maze, collecting cookies and placing them in a cookie jar at the bottom of the screen. Cookie Monster Munch used an Atari Kid's Controller (sold separately), although the regular keyboard controller would also work. Count's Castle Count's Castle is a video game developed by Atari for the Atari 2600. The game was never finished and was about 80% complete before development was stopped and no prototype has been found. It was going to be a math based game. Countdown Sesame Street: Countdown is a platform game released for the Nintendo Entertainment System in 1991. Players control Count von Count as they search for a number. The number is chosen in a spinning wheel. Each time players collect the right number, which may be in the form of a number or a collection of items that add up to the number. When players begin, they may choose to move by jumping repeatedly or running. Elmo's Art Workshop Elmo's Art Workshop is a CD-ROM game produced by Creative Wonders and the Children's Television Workshop. First released as Sesame Street Art Workshop in 1995, it was reissued by Creative Wonders in 1998, and Encore Software in 2002 and 2005. The game's activities allow users to draw, paint and create artwork. Elmo, who is only heard in voice-over, gives instructions throughout. Voices Kevin Clash as Elmo Elmo's Deep Sea Adventure Elmo's Deep Sea Adventure is a CD-ROM game. The game was developed by Mattel Media in 2000 and re-released by Sesame Workshop in 2005, and by Encore Software in 2006. Elmo invites users to join him on his deep sea submarine to explore shipwrecks, sunken cities and lost treasure. Oscar, Grover, Zoe, Rosita and Telly also appear. Skills such as critical thinking, problem-solving, and decision making are taught in three play modes, five activities, and two levels. Elmo's Letter Adventure Elmo's Letter Adventure is an educational game for the Nintendo 64 and PlayStation featuring Sesame Streets Elmo. It was released in 1999. Elmo's Number JourneyElmo's Number Journey is an educational game for the Nintendo 64 and PlayStation featuring Sesame Streets Elmo. It was released in 1999. Players must guide Elmo through three areas, split into two halves each, collecting the numbers needed to answer the mathematical problems posed by each area's host. Play begins on Sesame Street, where the player must choose one of three difficulty levels and then proceed to Elmo's playroom to access a tutorial or talk to one of the hosts in order to access their area. The difficulty level determines how many problems the player must solve to proceed to the next area, and how many mistakes a player can make before game over. Unlike many video games, there are no enemies to defeat and no races against the clock, play revolves around choosing the correct answer to problems and navigating areas with different vehicles. The Nintendo 64 version of Elmo's Number Journey has been somewhat popular amongst speedrunners in recent years due to the game's short duration. Elmo's PreschoolElmo's Preschool is a CD-ROM game developed by Creative Wonders and Children's Television Workshop in 1996. Elmo guides the user, who chooses to play in one of the five unique playrooms available. Voices Kevin Clash as Elmo Raven Wearne as Biggy Big Birdy Bird (Also the son of Ryan Reynolds) Elmo Through the Looking-Glass Elmo Through the Looking-Glass is a CD-ROM game. The game was developed by Creative Wonders and Children's Television Workshop in 1998 and later re-released by Encore Software and Sesame Workshop in 2004. It was first released as Reading Adventure. When it was re-released the name changed. In this game, Elmo goes through the looking-glass in his room to find the little red monster he sees there. Skills emphasized include object identification, visual discrimination, vocabulary, matching, and reading. In 1998, this game was included in the two-disc Elmo's Reading: Preschool and Kindergarten CD-ROM set, along with Elmo's Reading Basics. The name is inspired by Alice Through the Looking Glass. Elmo's ABCs Elmo's ABCs is a video game developed by Bonsai Entertainment Corp. and published by NewKidCo. It was released on the Game Boy Color in 1999. Elmo's 123s Elmo's 123s is a video game published by NewKidCo. It was released on the Game Boy Color in 1999. Get Set to Learn! Get Set to Learn! is a CD-ROM game. The game was developed by Creative Wonders and Children's Television Workshop in 1996. This game promotes the thinking and problem-solving skills necessary for learning. Voices Don Pearson as Guy Smiley Caroll Spinney as Big Bird and Oscar the Grouch Frank Oz as Grover and Cookie Monster Jerry Nelson as Count von Count Fran Brill as Zoe Martin P. Robinson as Telly Jerry Nelson and Martin P. Robinson as the Martians Grover's Music Maker Grover's Music Maker (originally called Monkey Music) is a video game for the Atari 2600 developed by Atari in 1983 but never released. The game was programmed by Stephen Keith and Preston Stuart and uses the Atari Kid's Controller. The game has several songs pre-programmed into it that children can listen to as Grover dances across the stage. Players can also make their own songs by pressing different buttons on the keypad. Grover's Travels Grover's Travels is a 1998 CD-ROM game developed by Encore Software and Children's Television Workshop. In this parody of Gulliver's Travels, users join Grover as he meets Big Bird, Elmo, Mr. Snuffleupagus and more. There are six activities designed to teach numbers, shapes, sound recognition, story comprehension and emotions. Let's Make a Word! Let's Make a Word! is a 1995 CD-ROM game developed by Electronic Arts and Children's Television Workshop. Guy Smiley welcomes users to his latest game show. Big Bird, Elmo, Oscar the Grouch, Rosita, Zoe and the Two-Headed Monster also appear. There are 6 different "word experts", and four locations filled with words, and over 300 words in this game to choose from. The game was reissued by Creative Wonders, including as part of the two-disc Kindergarten Deluxe CD-ROM set, and later by Encore Software with different packaging. Voices Don Pearson as Guy Smiley Caroll Spinney as Big Bird and Oscar the Grouch Kevin Clash as Elmo Fran Brill as Zoe Carmen Osbahr as Rosita Jerry Nelson and Adam Hunt as the Two-Headed Monster Music Maker Music Maker is a Sesame Street CD-ROM released in 1999 by Sesame Workshop and Mattel Interactive. Elmo, Bert and Ernie, Grover and Cookie Monster lead kids into a music activity center of eight games and activities. The game also includes newly recorded and mixed versions of Sesame Street's greatest hits including "Rubber Duckie", "C is for Cookie" and "Elmo's Song" among others. Voices Kevin Clash as Elmo Steve Whitemire as Ernie Frank Oz as Bert, Grover and Cookie Monster Pals Around Town Pals Around Town is a computer game published by Hi-Tech Expressions in 1987 and programmed by Children's Television Workshop. It was released for the Atari, Commodore 64, and the IBM PCjr in cartridge form. The basis for the game was strictly educational. The player could pick a character (Sesame Street characters available included Bert and Ernie, among others) and could interact with various objects in a variety of settings. Two such settings were a school classroom and an outdoor playground. Some items that could be interacted with included a fishbowl and a globe. Oscar's Trash Race Oscar's Trash Race is a video game for the Atari 2600 developed by Atari and was released in 1984. The game was programmed by Christopher Omarzu and uses the Atari Kid's Controller. The goal is to help Oscar the Grouch and the little Grouches collect trash in a race. It was meant to give practice in numerical skills and directional concepts. Search and Learn Adventures Search & Learn Adventures is a 1997 CD-ROM game. The game was developed by Creative Wonders and Children's Television Workshop in 1997, and re-released in 1998, 2000 (by Mattel Media), and 2004 (by Encore Software). Sherlock Hemlock guides users as they find the clues to solve puzzles and mysteries. Concepts emphasized are safety, healthy eating and recycling; skills developed include critical thinking and problem-solving. There are more than 20 activity combinations and multiple skill levels. Voices Jerry Nelson as Sherlock Hemlock, The Amazing Mumford, Count von Count and Mr. Johnson (The Food Lover) Caroll Spinney as Big Bird and Oscar the Grouch Kevin Clash as Elmo and Watson the Dog Fran Brill as Zoe Frank Oz as Bert, Grover and Cookie Monster Steve Whitemire as Ernie makes a cameo in the beach ending but doesn't have any lines Sesame Street: Once Upon a Monster In January 2010, Warner Bros. Interactive Entertainment announced plans to make Sesame Street games for the Xbox 360, which will use the Kinect accessory. The title was announced on February 15, 2011 as Sesame Street: Once Upon a Monster, and was released on October 11 of that year. Voices Kevin Clash as Elmo David Rudman as Cookie Monster Eric Jacobson as Grover Caroll Spinney as Oscar the Grouch Martin P. Robinson as Telly Monster and Slimey the Worm Dee Bradley Baker as Doo-rays Kinect Sesame Street TV Cast Bob McGrath as himself Dr. Loretta Long as Susan Roscoe Orman as Gordon Sonia Manzano as Maria Emillio Delgado as Luis Allison Barlett as Gina Desiree Casado as Gabi Alan Murraka as himself Chris Knowings as himself Nitya Vidyasagar as Leela Voices Caroll Spinney as Big Bird and Oscar the Grouch Kevin Clash as Elmo Fran Brill as Zoe and Prairie Dawn Steve Whitemire as Ernie and Kermit the Frog Eric Jacobson as Bert, Grover and Guy Smiley David Rudman as Cookie MOnster and Baby Bear Jerry Nelson and Matt Vogel as Count von Count, Mr. Johnson, The Amazing Mumford and Sherlock Hemlock Martin P. Robinson as Telly Monster Martin P. Robinson and Bryant Young as Mr. Snuffleupagus Carmen Osbahr as Rosita Leslie Carrara-Rudolph as Abby Cadabby Joey Mazzarino as Murray Monster Martin P. Robinson and Matt Vogel as the Martians Sesame Street A-B-C and 1-2-3 Sesame Street A-B-C and 1-2-3 are two educational video games for the NES. They were re-released as a compilation cartridge titled Sesame Street A-B-C and 1-2-3. Sesame Street A-B-C Sesame Street A-B-C is an educational Nintendo game featuring two educational video games. The goal of Ernie's Big Splash is to create a series of connections, which include pipes, waterways, sea animals, and some of Ernie's friends including Oscar the Grouch, Bert, Grover, and Cookie Monster that will help Rubber Duckie to make his way to Ernie's bathtub. The game teaches basic logic, directions (North, South, East and West) and sequencing. In Letter-Go-Round, the goal is to find the correct letter, spell words, and finding the missing letter of a word. There is also a mode where the player has to make a 'secret' word, by finding the correct letters. This game teaches letter recognition, word recognition, capital and lowercase, and spelling. The video game was published by Hi Tech Expressions, for ages 3 to 6. Ernie's Big Splash, one of the mini games present, was originally a stand alone title released for IBM PC DOS in 1986, but later ported to the Nintendo Entertainment System with other new mini games in 1990. On NES, it was released on the cartridge Sesame Street ABC, supplementing Letter-Go-Round. At some point in time, the game was released for the Unisys ICON operating system, a platform commissioned by the Ontario education system. No copies of this format exist, as the last ICON computers and software were destroyed in the early-2000s. Sesame Street 1-2-3 Sesame Street 1-2-3 featured two different games: "Astro-Grover," and "Ernie's Magic Shapes", and was released for the NES in 1989. In Ernie's Magic Shapes, you had to match the right symbol to a base symbol. This game teaches shape and color recognition, and is the only game in the NES line-up of Sesame Street games, that has a tutorial mode, so players can learn how to play. In Astro-Grover, Grover and his little aliens buddies called 'Zips' teach basic math like counting, adding, and subtracting. Some games include finding the correct number to answer a question, or trying to find a group of the correct number of Zips. It was developed by Rare and published by Hi-Tech Expressions. Sesame Street: Big Bird's Hide and Speak Sesame Street: Big Bird's Hide and Speak is a game for the Nintendo Entertainment System in 1990. It was the first NES game to feature a digitized voice, in the form of Big Bird. This game stars Big Bird and co-stars Little Bird, and features Bert, Ernie, The Count, Grover, and Elmo. The game was developed by RSP Inc. and published by Hi Tech Expressions. All four sides of the D-pad move Little Bird to the next window clockwise; A and B Buttons both choose a window. The center buttons (Start and Select) exit to the game select screen. The game's objective is to choose the correct character or letter, with six different levels. The first two levels are based on simply choosing the window instructed by Big Bird, while the next two needed memorizing since the windows close. In the fifth level, the player has to spell the three-letter word instructed by choosing the right letters. In the last level the player must attempt to spell the most number of different words before a time limit, the letters in the windows change after a new word is created. Sesame Street: Cookie's Counting Carnival Sesame Street: Cookie's Counting Carnival is the first of four Sesame Street games targeting the Wii and Nintendo DS to be published by Warner Bros. Interactive Entertainment, with a PC version also available. It was developed by Black Lantern Studios and released in 2010 alongside Elmo's A-to-Zoo Adventure. The Nintendo versions utilize motion controls and are packaged with special Wii Remote and Nintendo DS stylus jackets that are intended to make them comfortable to use for young children. This game teaches basic math. Voices David Rudman as Cookie Monster Caroll Spinney as Big Bird Chris Knowings as himself Sesame Street Counting Cafe Sesame Street: Counting Cafe is a Sega Genesis game. Players learn how to count numbers with Grover as he tries to count, climb, and jump while collecting food items for counting. Bert has a tendency to throw an egg in the mass and alter the order. North America was the only region in which the game was released; it uses the American English language. Sesame Street: Elmo's A-to-Zoo Adventure Sesame Street: Elmo's A-to-Zoo is the second of four Sesame Street games targeting the Wii and Nintendo DS to be published by Warner Bros. Interactive Entertainment, with a PC version also available. It was developed by Black Lantern Studios and released in 2010 alongside Cookie's Counting Carnival. The Nintendo versions utilize motion controls and are packaged with special Wii Remote and Nintendo DS stylus jackets that are intended to make them comfortable to use for young children. This game pairs knowledge of the alphabet with an overview of animals. Voices Kevin Clash as Elmo Fran Brill as Zoe Chris Knowings as himself Sesame Street: Elmo's Musical Monsterpiece Sesame Street: Elmo's Musical Monsterpiece is the last of four Sesame Street games targeting the Wii and Nintendo DS to be published by Warner Bros. Interactive Entertainment. It was developed by Griptonite Games and released in 2012. As with Ready, Set, Grover! and the Nintendo versions of Elmo's A-to-Zoo and Cookie's Counting Carnival, this game utilizes motion controls and is packaged with special Wii Remote and Nintendo DS stylus jackets that are intended to make them comfortable to use for young children. This game intends to teach about musical instruments and using them to play songs. This was one of the final videogame appearances of Jerry Nelson's voice of Count von Count before Nelson passed away in August 2012 of the year this game was released. Voices Kevin Clash as Elmo Leslie Carrara-Rudolph as Abby Cadabby Jerry Nelson as Count von Count Sesame Street: Letters Sesame Street: Letters is an interactive Sesame Street computer game that was originally developed by the Children's Television Workshop in 1991. it was reissued by Creative Wonders in 1994, and The Learning Company or Knowledge Adventure in 2001. Voices Martin P. Robinson as Snuffy, Telly Monster Caroll Spinney as Big Bird, Oscar Frank Oz as Bert, Cookie Monster, Grover, Harvey Kneeslapper Jim Henson as Ernie, Kermit the Frog Jerry Nelson as Sherlock Hemlock, Harry Monster Kevin Clash as Elmo Fran Brill as Prairie Dawn Sesame Street: Numbers Sesame Street: Numbers is an interactive Sesame Street computer game that was originally developed by the Children's Television Workshop in 1991. it was reissued by Creative Wonders in 1994, and The Learning Company or Knowledge Adventure in 2001. Voices Kevin Clash as Elmo, Hoots the Owl Caroll Spinney as Big Bird, Oscar Frank Oz as Bert, Cookie Monster, Grover Jim Henson as Ernie, Kermit the Frog, Guy Smiley Martin P. Robinson as Snuffy, Telly Monster Jerry Nelson as Count von Count, Biff, Sherlock Hemlock Sesame Street: Ready, Set, Grover! Sesame Street: Ready, Set, Grover! is the third of four Sesame Street games targeting the Wii and Nintendo DS to be published by Warner Bros. Interactive Entertainment. It was developed by Griptonite Games and released in 2011. As with the Nintendo versions of Elmo's A-to-Zoo and Cookie's Counting Carnival, this game utilizes motion controls and is packaged with special Wii Remote and Nintendo DS stylus jackets that are intended to make them comfortable to use for young children. This game teaches the basics of personal health, exercise, playtime and relaxation. Voices Eric Jacobson as Grover Kevin Clash as Elmo Leslie Carrara-Rudolph as Abby Cadabby Sesame Street: Sports Sesame Street: Sports was published by NewKidCo and was released on PlayStation and Game Boy Color in 2001. Voices Caroll Spinney as Big Bird Kevin Clash as Elmo Frank Oz as Cookie Monster, Grover Steve Whitmire as Ernie Martin P. Robinson as Telly Monster Fran Brill as Zoe The Three Grouchketeers The Three Grouchketeers is a 1998 CD-ROM game released in 2005 by Encore Software and Creative Wonders. This game is a parody of Alexandre Dumas's 1844 novel The Three Musketeers. Telly, Zoe and Grover are on a quest to find King Oscar's missing Royal Pig. Each has a unique talent: Telly knows about shapes, Zoe is good with animals, and Grover reads very well. They must cooperate to complete their tasks. Voices Frank Oz as Allistair Cookie Monster and Grover Fran Brill as Zoe Martin P. Robinson as Telly Caroll Spinney as Oscar the Grouch References Children's educational video games Creative Wonders games Lists of video games based on works Mattel video games
908799
https://en.wikipedia.org/wiki/Terms%20of%20service
Terms of service
Terms of service (also known as terms of use and terms and conditions, commonly abbreviated as TOS or ToS, ToU or T&C) are the legal agreements between a service provider and a person who wants to use that service. The person must agree to abide by the terms of service in order to use the offered service. Terms of service can also be merely a disclaimer, especially regarding the use of websites. Vague language and lengthy sentences used in the terms of use have brought concerns on customer privacy and raised public awareness in many ways. Usage The Terms of Service Agreement is mainly used for legal purposes by companies which provide software or services, such as web browsers, e-commerce, web search engines, social media, and transport services. A legitimate terms-of-service agreement is legally binding and may be subject to change. Companies can enforce the terms by refusing service. Customers can enforce by filing a lawsuit or arbitration case if they can show they were actually harmed by a breach of the terms. There is a heightened risk of data going astray during corporate changes, including mergers, divestitures, buyouts, downsizing, etc., when data can be transferred improperly. Content A terms of service agreement typically contains sections pertaining to one or more of the following topic: Disambiguation/definition of key words and phrases User rights and responsibilities Proper or expected usage; definition of misuse Accountability for online actions, behavior, and conduct Privacy policy outlining the use of personal data Payment details such as membership or subscription fees, etc. Opt-out policy describing procedure for account termination, if available Sometimes contains a Arbitration clause detailing the dispute resolution process and limited rights to take a claim to court Disclaimer/Limitation of Liability clarifying the site's legal liability for damages incurred by users User notification upon modification of terms, if offered Among 102 companies marketing genetic testing to consumers in 2014 for health purposes, 71 had publicly available terms and conditions: 57 of the 71 had disclaimer clauses (including 10 disclaiming liability for injury caused by their own negligence) 51 let the company change terms (including 17 without notice) 34 allow data disclosure in certain circumstances 31 require consumers to indemnify the company 20 promise not to sell data Among 260 mass market consumer software license agreements in 2010: 91% disclaimed warranties of merchantability or fitness for purpose or said it was "As is" 92% disclaimed consequential, incidental, special or foreseeable damages 69% did not warrant the software was free of defects or would work as described in the manual 55% capped damages at the purchase price or less 36% said they were not warranting whether it infringed others' intellectual property rights 32% required arbitration or a specific court 17% required the customer to pay legal bills of the maker (indemnify), but not vice versa Among the terms and conditions of 31 cloud-computing services in January-July 2010, operating in England: 27 specified the law to be used (a US state or other country) most specify that consumers can claim against the company only in a particular city in that jurisdiction, though often the company can claim against the consumer anywhere some require claims to be brought within half a year to 2 years 7 impose arbitration, all forbid illegal and objectionable conduct by the consumer 13 can amend terms just by posting changes on their own website a majority disclaim responsibility for confidentiality or backups most promise to preserve data only briefly after terminating service few promise to delete data thoroughly when the customer leaves some monitor the customers' data to enforce their policies on use all disclaim warranties and almost all disclaim liability 24 require the customer to indemnify them, a few indemnify the customer a few give credits for poor service, 15 promise "best efforts" and can suspend or stop any time The researchers note that rules on location and time limits may be unenforceable for consumers in many jurisdictions with consumer protections, that acceptable use policies are rarely enforced, that quick deletion is dangerous if a court later rules the termination wrongful, that local laws often require warranties (and UK forced Apple to say so). Readability Among the 500 most-visited websites which use sign-in-wrap agreements in September 2018: 70% of agreements had average sentence lengths over 25 words, (where 25 or less is needed for consumer readability) median FRE (Flesch Reading Ease) score was 34 (where over 60 is considered readable by consumers) median F-K (Flesch-Kincaid) score was 15 years of school (498 of 500 had scores higher than the recommended 8th grade) Among 260 mass market consumer software license agreements which existed in both 2003 and 2010: median and mean Flesch scores were 33 in both years, with a range from 14 to 64 in 2003, and from 15 to 55 in 2010 (where over 60 is considered readable by consumers) median number of words rose from 1,152 to 1,354, with range of 33 to 8,406 in 2003, and from 106 to 13,416 in 2010 Public awareness A 2013 documentary called Terms and Conditions May Apply publicized issues in terms of service. It was reviewed by 54 professional critics and won for Best Feature Documentary at the Newport Beach Film Festival 2013 and for Best Documentary at the Sonoma Valley Film Festival 2013. Clickwrapped.com rates 15 companies on their policies and practices with respect to using users' data, disclosing users' data, amending the terms, closing users' accounts, requiring arbitration, fining users, and clarity. Terms of Service; Didn't Read is a group effort that rates 67 companies' terms of service and privacy policies, though its site says the ratings are "outdated." It also has browser add-ons that deliver the ratings while at the website of a rated company. Members of the group score each clause in each terms of service document, but "the same clause can have different scores depending on the context of the services it applies to." The Services tab lists companies in no apparent order, with brief notes about significant clauses from each company. In particular, competitors are not listed together so that users can compare them. A link gives longer notes. It does not typically link to the exact wording from the company. The Topics tab lists topics (like "Personal Data" or "Guarantee"), with brief notes from some companies about aspects of the topic. TOSBack.org, supported by the Electronic Frontier Foundation, lists changes in terms and policies sequentially, 10 per page, for 160 pages, or nearly 1,600 changes, for "many online services." There does not seem to be a way to find all changes for a particular company, or even which companies were tracked in any time period. It links to Terms of Service; Didn't Read, though that typically does not have any evaluation of the most recent changes listed at TOSBack.org. Terms of service are subject to change and vary from service to service, so several initiatives exist to increase public awareness by clarifying such differences in terms, including: Availability of previous terms Cancellation or termination of the account and/or service by user Copyright licensing on user content Data tracking policy and opt-out availability Indemnification or compensation for claims against account or content Notification and feedback prior to changes in Terms Notification of government or third-party requests for personal data Notification prior to information transfer in event of merger or acquisition Pseudonym allowance Readability Saved or temporary first and third-party cookies Transparency of security practices Transparency on government or law enforcement requests for content removal Criticism and lawsuits AOL In 1994, the Washington Times reported that America Online (AOL) was selling detailed personal information about its subscribers to direct marketers, without notifying or asking its subscribers; this article led to the revision of AOL's terms of service three years later. On July 1, 1997, AOL posted revised terms service to take effect July 31, 1997, without formally notifying its users of the changes made, most notably a new policy which would grant third-party business partners, including a marketing firm, access to its members' telephone numbers. Several days before the changes were to take effect, an AOL member informed the media of the changes and the following news coverage incited a large influx of internet traffic on the AOL page which enabled users to opt out of having their names and numbers on marketing lists. Sony In 2011 George Hotz and other members of failOverflow were sued by Sony Corporation. Sony claimed that by violating the terms of service of the PlayStation Network and the Digital Millennium Copyright Act, Hotz and others were committing breach of contract. Instagram On December 17, 2012, Instagram announced a change to its terms of use that caused a widespread outcry from its user base. The controversial clause stated: "you agree that a business or other entity may pay us to display your username, likeness, photos (along with any associated metadata), and/or actions you take, in connection with paid or sponsored content or promotions, without any compensation to you". There was no apparent option to opt out of the changed terms of use. The move garnered severe criticism from privacy advocates as well as consumers. After one day, Instagram apologized saying that it would remove the controversial language from its terms of use. Kevin Systrom, a co-founder of Instagram, responded to the controversy, stating: Zappos Some terms of service are worded to allow unilateral amendment, where one party can change the agreement at any time without the other party's consent. A 2012 court case In re Zappos.com, Inc., Customer Data Security Breach Litigation held that Zappos.com's terms of use, with one such clause, was unenforceable. See also Abandonware Acceptable use policy Clickwrap license Browse wrap End-user license agreement Free software license Glossary of legal terms in technology Good faith (law) Index of articles related to terms of service and privacy policies Internet privacy License manager List of software licenses Shrink wrap contract Software asset management Standard form contract References External links List of changes in terms and policies at "many online services" since June 2013 Terms on Service; Didn’t Read User rights initiative to rate and label website terms & privacy policies Clickwrapped Ratings of the policies and practices of major consumer internet companies
56473350
https://en.wikipedia.org/wiki/Trojan%20%281795%20ship%29
Trojan (1795 ship)
Trojan was launched at Newcastle in 1795. She made one voyage, to the Cape of Good Hope, under charter to the British East India Company (EIC). She then became a West Indiaman and is last listed in 1807. Career Trojan enters Lloyd's Register in 1796 under the name Trajan, with E. Redman, master, S. Temple, owner, and trade London-Cape of Good Hope. EIC voyage (1796-1797): Edward Redman sailed from Portsmouth 12 April 1796, bound for the Cape. Trojan reached the Cape on 12 August and left on 1 October. She reached Saint Helena on 14 October and arrived at The Downs on 15 February 1797. On her return she became a West Indiaman. On 24 December 1802, Lloyd's List reported that Trojan, Mann, master, from Newcastle to Jamaica, was on shore at Deal beach. It was feared that she would be lost. She apparently was not lost because she appears in subsequent volumes of Lloyd's Register with changed information. Citations and references Citations References 1795 ships Ships built on the River Tyne Ships of the British East India Company Age of Sail merchant ships Maritime incidents in 1802 Shipwrecks in the North Sea Shipwrecks of England
13111239
https://en.wikipedia.org/wiki/IPod%20Touch
IPod Touch
The iPod Touch is a line of iOS-based mobile devices designed and marketed by Apple Inc. with a touchscreen-controlled user interface. As with other iPod models, it can be used as a music player and a handheld gaming device, but it can also be used as a digital camera, a web browser and for messaging. It is similar in design to the iPhone, but it connects to the Internet only through Wi-Fi and does not use cellular network data, and so is not a smartphone. The iPod Touch was introduced in 2007; some 100 million iPod Touch units were sold by May 2013. The current iPod Touch, released on May 28, 2019, is the seventh-generation model. iPod Touch models are sold by storage space and color; all models of the same generation typically offer identical features, performance, and operating system upgrades. An exception was the fifth generation, in which the low-end (16 GB) model was initially sold without a rear-facing camera and in a single color. The iPod Touch has been the only product in Apple's iPod product line since the discontinuation of the iPod Nano and iPod Shuffle on July 27, 2017, after which Apple revised the storage and pricing for the iPod Touch with 32 and 128 GB of storage. Features Software The iPod Touch runs Apple's Unix-based iOS operating system used on the iPhone, and includes bundled software to browse the Internet, view maps, send and receive email, view media. Users type on a virtual keyboard displayed on the screen. Apple operates online stores, allowing users to buy and directly download music, videos and third-party software. From launch, the iPod Touch was described by journalists as an "iPhone without the phone", and each iPod Touch model to date has been introduced with the same release of iOS as the contemporary iPhone model. In June 2011, iOS 5, the fifth major release of iOS software, was announced at Apple's WWDC 2011, which added notification, messaging and reminder features. Apple limited some features, most notably the voice control system Siri, to the iPhone. iOS 6, which was released on September 19, 2012 for the fourth and fifth generation iPod Touch models, contains 200 new features including Passbook, Facebook integration and Apple Maps. The fifth generation iPod Touch gained the ability to take panoramic photos, a feature shared with the iPhone 4S and iPhone 5. On June 8, 2015, it was announced at the WWDC that the iPod Touch fifth generation would support iOS 9, along with other A5 Chip devices. This makes the iPod Touch fifth generation the first iPod Touch to support four major versions of iOS. Early iOS updates prior to iOS 4 have been paid for owners of supported iPod Touch models. Apple received criticism for this decision and for excluding certain features from the iPod Touch software that the iPhone included. Apple's position was that they could add features for free to the iPhone because the revenue from it is accounted for on a subscription basis under accounting rules, rather than as a one time payment (as iPhones were often sold with a carrier contract). At WWDC in June 2010, as of iOS 4, Steve Jobs announced that Apple had "found a way" to make subsequent OS upgrades available free to iPod Touch owners. Setup and synchronization iPod Touch units running iOS 4 or earlier require a Mac or PC to be set up for the first time. Downloading apps or media from the iTunes Store and App Store does not require a computer, though media not purchased through the iTunes Store still has to be added through a computer. New iPods bought after October 12, 2011 have iOS 5.0 or later preloaded, and can be set up wirelessly, without the need of a PC or Mac. Purchasing content To purchase content on the iPod Touch, the user must create an Apple ID or have an existing account. With this account one may download music and videos from the iTunes Store, apps from the App Store, or books from the Apple Books Store. An Apple ID account created without a credit card can be used to get free content, and gift cards can be used to pay for apps instead of using a credit card. Third-party applications The only official way to obtain third-party applications for the iPod Touch is through Apple's App Store, which is a branch of iTunes Store. The App Store application, available in all versions of iOS from 2.0 onwards, allows users to browse and download applications from a single online repository (hosted by Apple) with the iTunes Store. Sideloading apps outside the App Store is done through the Xcode application, and is intended for developers and enterprises, though tools for sideloading outside of Xcode exist, and are mainly used for applications not allowed in the App Store. Design and hardware The iPod Touch is generally similar to the iPhone models prior to the iPhone X (excluding the second generation iPhone SE). Compared to a same-generation iPhone, an iPod Touch is thinner, lighter and less expensive, while lacking some hardware and software features. Steve Jobs once referred to the iPod Touch as "training wheels for the iPhone". All iPod Touch models lack biometric authentication, 3D Touch, NFC, GPS, an earpiece speaker and a noise-cancelling microphone. Depending on the generation, the iPod Touch may have a smaller or otherwise inferior display and camera(s). Newer models (5th, 6th, and 7th generation) lack the ambient light sensor that makes automatic brightness available. The first generation iPod Touch lacks a built-in speaker, and the first, second, and third generation iPod Touch lack a microphone, a camera, and a flash. Starting with the 4th generation iPod Touch, a camera and microphone were added, and starting with the 5th generation iPod Touch, an LED flash was added. The iPod Touch has no cellular modem, and therefore cannot directly make phone calls on the public switched telephone network. However, it can make VoIP calls such as FaceTime, and send iMessages to other iPhones, Macs, iPads, and iPod Touch models with an Apple ID. The 5th generation iPod Touch and later can forward and receive standard phone calls through a separate iPhone (a feature introduced in iOS 8), with the Wi-Fi Calling feature. The two devices must be linked to the same Apple ID, and the iPhone's carrier must support this feature. Connectivity The iPod Touch can communicate with a computer through Wi-Fi or USB using a cable and a dock connector. iPod models released before 2012 feature a 30-pin dock connector (known colloquially as the iPod dock connector), which carried analog signals. The fifth, sixth, and seventh generations of the iPod Touch feature a new digital dock connector, called Lightning, which was introduced alongside the iPhone 5, fourth generation iPad and first generation iPad Mini, and the seventh generation iPod Nano models. This new connector is smaller than the previous one allowing for a slimmer form factor, and is reversible. Various accessories are available to connect the Apple Lightning connector to the older 30-pin dock connector or USB, although not all old accessories will work, because the Lightning connector cannot handle analog signals. User-made modifications Like all of Apple's iOS devices, the iPod Touch is a tightly controlled or closed platform. Communication between apps is limited and controlled, and Apple is the only authorized software vendor for firmware and applications. Hackers have attempted to "jailbreak" all iOS devices to enable forbidden or unsupported features, such as multitasking in iOS versions before 4.0, themes for the home screen, and enabling the battery-percentage indicator (limited to the iPhone prior to the seventh generation iPod Touch). Jailbreaks for the iPod Touch first surfaced a month after the original model was released in September 2007, when hackers released JailbreakMe 1.0 (also called "AppSnapp") to jailbreak iPhone OS 1.1.1. This allowed users to install third-party programs on their devices before Apple permitted this with iPhone OS 2. Apple's warranty statement implies that an iPod Touch after jailbreaking or other modification made by unofficial means is not covered by Apple's warranty. Jailbreaking is a violation of the terms and conditions for using iOS. While the jailbreaking process can normally be undone by performing a restore through iTunes, there is a risk of rendering the device unusable. Models , there have been seven models of iPod Touch devices produced. 1st generation (2007–2008) Supported until June 2010 (iPhone OS 3.1.3) 2nd generation (2008–2010) Supported until March 2011 (iOS 4.2.1) 3rd generation (2009–2010) Supported until September 2012 (iOS 5.1.1) 4th generation (2010–2013) Supported until February 2014 (iOS 6.1.6) 5th generation (2012–2015) Supported until September 2016 (iOS 9.3.5) 6th generation (2015–2019) Partial support only (iOS 12.5.5) 7th generation (2019–present) Fully supported Reception Upon launch in 2007 the first generation iPod Touch received mostly good reviews for its display, its full Web browser, and YouTube support. However it was also criticized for being a "stripped down" iPhone, for lacking external volume buttons, and for having a lower-quality display. Notable competing products as of 2009 included Creative's ZEN X-Fi2, Sony's Walkman X Series, and Microsoft's Zune HD; and as of 2011, the Samsung Galaxy Player and Sony Walkman Z Series. Later models received a more lukewarm reception, with reviewers questioning whether an iPod Touch made sense as a product in a time where smartphones had become more affordable. See also Comparison of iPod file managers Comparison of portable media players List of iOS devices Notes References External links – official site Technical Specifications (all models) on Apple Inc. Touch IOS Touchscreen portable media players ITunes Computer-related introductions in 2007 Products introduced in 2007 Digital audio players
290786
https://en.wikipedia.org/wiki/Educational%20software
Educational software
Educational software is a term used for any computer software which is made for an educational purpose. It encompasses different ranges from language learning software to classroom management software to reference software. The purpose of all this software is to make some part of education more effective and efficient. History 1946s–1970s The use of computer hardware and software in education and training dates to the early 1940s, when American researchers developed flight simulators which used analog computers to generate simulated onboard instrument data. One such system was the type19 synthetic radar trainer, built in 1943. From these early attempts in the WWII era through the mid-1970s, educational software was directly tied to the hardware, on which it ran. Pioneering educational computer systems in this era included the PLATO system (1960), developed at the University of Illinois, and TICCIT (1969). In 1963, IBM had established a partnership with Stanford University's Institute for Mathematical Studies in the Social Sciences (IMSSS), directed by Patrick Suppes, to develop the first comprehensive CAI elementary school curriculum which was implemented on a large scale in schools in both California and Mississippi. In 1967 Computer Curriculum Corporation (CCC, now Pearson Education Technologies) was formed to market to schools the materials developed through the IBM partnership. Early terminals that ran educational systems cost over $10,000, putting them out of reach of most institutions. Some programming languages from this period, p3), and LOGO (1967) can also be considered educational, as they were specifically targeted to students and novice computer users. The PLATO IV system, released in 1972, supported many features which later became standard in educational software running on home computers. Its features included bitmap graphics, primitive sound generation, and support for non-keyboard input devices, including the touchscreen. 1970s–1980s The arrival of the personal computer, with the Altair 8800 in 1975, changed the field of software in general, with specific implications for educational software. Whereas users prior to 1975 were dependent upon university or government owned mainframe computers with timesharing, users after this shift could create and use software for computers in homes and schools, computers available for less than $2000. By the early 1980s, the availability of personal computers including the Apple II (1977), Commodore PET (1977), Commodore VIC-20 (1980), and Commodore 64 (1982) allowed for the creation of companies and nonprofits which specialized in educational software. Brøderbund and The Learning Company are key companies from this period, and MECC, the Minnesota Educational Computing Consortium, a key non-profit software developer. These and other companies designed a range of titles for personal computers, with the bulk of the software initially developed for the Apple II. Categories of educational software Courseware "Courseware" is a term that combines the words 'course' with 'software'. It was originally used to describe additional educational material intended as kits for teachers or trainers or as tutorials for students, usually packaged for use with a computer. The term's meaning and usage has expanded and can refer to the entire course and any additional material when used in reference an online or 'computer formatted' classroom. Many companies are using the term to describe the entire "package" consisting of one 'class' or 'course' bundled together with the various lessons, tests, and other material needed. The courseware itself can be in different formats: some are only available online, such as Web pages, while others can be downloaded as PDF files or other types of document. Many forms of educational technology are now covered by the term courseware. Most leading educational companies solicit or include courseware with their training packages. Classroom aids Some educational software is designed for use in school classrooms. Typically such software may be projected onto a large whiteboard at the front of the class and/or run simultaneously on a network of desktop computers in a classroom. The most notable are SMART Boards that use SMART Notebook to interact with the board which allows the use of pens to digitally draw on the board. This type of software is often called classroom management software. While teachers often choose to use educational software from other categories in their IT suites (e.g. reference works, children's software), a whole category of educational software has grown up specifically intended to assist classroom teaching. Branding has been less strong in this category than in those oriented towards home users. Software titles are often very specialized and produced by various manufacturers, including many established educational book publishers. Assessment software With the impact of environmental damage and the need for institutions to become "paperless", more educational institutions are seeking alternative ways of assessment and testing, which has always traditionally been known to use up vasts amount of paper. Assessment software refers to software with a primary purpose of assessing and testing students in a virtual environment. Assessment software allows students to complete tests and examinations using a computer, usually networked. The software then scores each test transcript and outputs results for each student. Assessment software is available in various delivery methods, the most popular being self-hosted software, online software and hand-held voting systems. Proprietary software and open-source software systems are available. While technically falling into the Courseware category (see above), Skill evaluation lab is an example for Computer-based assessment software with PPA-2 (Plan, Prove, Assess) methodology to create and conduct computer based online examination. Moodle is an example of open-source software with an assessment component that is gaining popularity. Other popular international assessment systems include Google Classroom, Blackboard Learn, and EvaluNet XT. Reference software Many publishers of print dictionaries and encyclopedias have been involved in the production of educational reference software since the mid-1990s. They were joined in the reference software market by both startup companies and established software publishers, most notably Microsoft. The first commercial reference software products were reformulations of existing content into CD-ROM editions, often supplemented with new multimedia content, including compressed video and sound. More recent products made use of internet technologies, to supplement CD-ROM products, then, more recently, to replace them entirely. Wikipedia and its offspins (such as Wiktionary) marked a new departure in educational reference software. Previously, encyclopedias and dictionaries had compiled their contents on the basis of invited and closed teams of specialists. The Wiki concept has allowed for the development of collaborative reference works through open cooperation incorporating experts and non-experts. Custom platforms Some manufacturers regarded normal personal computers as an inappropriate platform for learning software for younger children and produced custom child-friendly pieces of hardware instead. The hardware and software is generally combined into a single product, such as a child laptop-lookalike. The laptop keyboard for younger children follows an alphabetic order and the qwerty order for the older ones. The most well-known example are Leapfrog products. These include imaginatively designed hand-held consoles with a variety of pluggable educational game cartridges and book-like electronic devices into which a variety of electronic books can be loaded. These products are more portable than laptop computers, but have a much more limited range of purposes, concentrating on literacy. While mainstream operating systems are designed for general usages, and are more or less customized for education only by the application sets added to them, a variety of software manufacturers, especially Linux distributions, have sought to provide integrated platforms for specifically education. Corporate training and tertiary education Earlier educational software for the important corporate and tertiary education markets was designed to run on a single desktop computer (or an equivalent user device). In the years immediately following 2000, planners decided to switch to server-based applications with a high degree of standardization. This means that educational software runs primarily on servers which may be hundreds or thousands of miles from the actual user. The user only receives tiny pieces of a learning module or test, fed over the internet one by one. The server software decides on what learning material to distribute, collects results and displays progress to teaching staff. Another way of expressing this change is to say that educational software morphed into an online educational service. US Governmental endorsements and approval systems ensured the rapid switch to the new way of managing and distributing learning material. McDonald's also experimented with this via the Nintendo DS software eCrew Development Program. See also: Educational technology SCORM Virtual learning environment, LMS (learning management system) Training Management System Web-based training Specific educational purposes There are highly specific niche markets for educational software, including: teacher tools and classroom management software (remote control and monitoring software, filetransfer software, document camera and presenter, free tools,...) Driving test software Interactive geometry software Language learning software Mind Mapping Software which provides a focal point for discussion, helps make classes more interactive, and assists students with studying, essays and projects. Designing and printing of card models for use in education - eg. Designer Castles for BBC Micro and Acorn Archimedes platforms Notetaking (Comparison of notetaking software) Software for enabling simulated dissection of human and animal bodies (used in medical and veterinary college courses) Spelling tutor software Typing tutors Reading Instruction Medical and healthcare educational software Video games and gamification Video games can be used to teach a user technology literacy or more about a subject. Some operating systems and mobile phones have these features. A notable example is Microsoft Solitaire, which was developed to familiarize users with the use of graphical user interfaces, especially the mouse and the drag-and-drop technique. Mavis Beacon Teaches Typing is a largely know program with built in mini-games to keep the user entertained while improving their typing skills. Gamification is the use of game design elements in nongame contexts and has been shown to be effective in motivating behavior change. By seeing game elements as "motivational affordances," and formalizing the relationship between these elements and motivational affordances. Classcraft is a software tool used by teachers that has games elements alongside an educational goal. Tovertafel is a games console designed for remedial education and counter-acting the effects of dementia. Effects and use of educational software Tutor-based software Tutor-based education software is defined as software that mimics the teacher student one on one dynamic of tutoring with software in place of a teacher. Research was conducted to see if this type of software would be effective in improving students understanding of material. It concluded that there was a positive impact which decreased the amount of time students need to study for and relative gain of understanding. Helping those with disabilities A study was conducted to see the effects of education software on children with mild disabilities. The results were that the software was a positive impact assisting teaching these children social skills though team based learning and discussion, videos and games. Education software evaluation There is a large market of educational software in use today. A team decided that they were to develop a system in which educational software should be evaluated as there is no current standard. It is called the Construction of the Comprehensive Evaluation of Electronic Learning Tools and Educational Software (CEELTES). The software to be evaluated is graded on a point scale in four categories: the area of technical, technological and user attributes; area of criteria evaluating the information, content and operation of the software; the area of criteria evaluating the information in terms of educational use, learning and recognition; the area of criteria evaluating the psychological and pedagogical use of the software. Use in higher education In university level computer science course, learning logic is an essential part of the curriculum. There is a proposal on using two logistical education tool FOLST and LogicChess to understand First Order Logic for university students to better understand the course material and the essentials of logistical design. Selected reports and academic articles Virvou, M., Katsionis, G., & Manos, K. (2005). "Combining Software Games with Education: Evaluation of its Educational Effectiveness." Educational Technology & Society, 8 (2), 54-65. Seels, B. (1989). The instructional design movement in educational technology. Educational Technology, May, 11-15. https://web.archive.org/web/20080515073002/http://www.coe.uh.edu/courses/cuin6373/idhistory/1960.html Niemiec, R.P. & Walberg, H.T. (1989). From teaching machines to microcomputers: Some milestones in the history of computer-based instruction. Journal of Research on Computing in Education, 21(3), 263-276. Annetta, L., Minogue, J., Holmes, S., & Cheng, M. (2009). Investigation the impact of video games on high school students’ engagement and learning genetics. Computers and Education, 53, 74-85. Bainbridge, W. (2007). The scientific research potential of virtual worlds. Science, 317, 27, 471-476. Barab, S., Scott, B., Siyahhan, S., Goldstone, R., Ingram-Goble, A., Zuiker, S., & Warren, S. (2009).Transformational play as a curricular scaffold: Using videogames to support science education. Journal of Science Education Technology, 18, 305-320. Bourgonjon, J., Valcke, M., Soetaert, R., & Schellens, T., (2010). Student's perceptions about the use of video games in the classroom. Computers and Education, 54, 1145-1156. Zhao,Y., Zhang, G., Lai, C. Curriculum, Digital Resources and Delivery. International Encyclopedia of Education (Third Edition), Elsevier, 2010, 390-396, ISBN 9780080448947, https://doi.org/10.1016/B978-0-08-044894-7.00063-4. See also Edutainment References Software
18022295
https://en.wikipedia.org/wiki/For%20Official%20Use%20Only
For Official Use Only
For Official Use Only (FOUO) is an information security designation used by some governments. United States Among U.S. government information, FOUO was primarily used by the U.S. Department of Defense as a handling instruction for Controlled Unclassified Information (CUI) which may be exempt from release under exemptions two to nine of the Freedom of Information Act (FOIA). It is one of the various sub-categorizations for strictly unclassified information which, on 24 February 2012, was officially consolidated as CUI. Other departments continuing the use of this designation include the Department of Homeland Security. U.S. Department of Defense On 24 February 2012, the Under Secretary of Defense for Intelligence published the publicly available DoDM 5200.01 DoD Information Security Program, a four-volume manual consolidating all marking of information on used by the U.S. Department of Defense. Most of the information regarding FOUO was in the now-superseded fourth volume, but the second volume also contains guidelines on FOUO information. On 6 March 2020, the DoD replaced DoDM 5200.01 Volume 4 with Controlled Unclassified Information (CUI). The term "FOUO" had been defined in DoDM 5200.01 Vol 4. It is no longer in the replacement document except as a reference to not requiring a "U" marking in the banner or footer signifying unclassified information as was required with the "old FOUO marking" (para 3.4.b.(1)). Australia For Official Use Only (FOUO) is one of five categories of the Dissemination Limiting Marker (DLM) defined by the Australian Government Information Security Management Guidelines. The guidelines state that FOUO should only be used on unclassified information, when its compromise may cause limited damage to national security, Australian Government agencies, commercial entities or members of the public. However unlike the United States usage, the presence or absence of an FOUO marker expressly does not provide any information about the document's status under the Freedom of Information Act. See also Classified information Classified information in the United States Freedom of information laws by country Sensitive but unclassified References Classified information Freedom of information legislation United States government secrecy
67238726
https://en.wikipedia.org/wiki/Ken%20Robinson%20%28computer%20scientist%29
Ken Robinson (computer scientist)
Kenneth ("Ken") Arthur Robinson (30 July 1938 – 5 September 2020) was an Australian computer scientist. He has been called "The Father of Formal Methods in Australia". Ken Robinson was born in 1938. He received his BE degree in electrical engineering in 1959 and a BSc degree in physics and mathematics in 1961, both from the University of Sydney. Robinson worked at the University of New South Wales (UNSW) from 1965 to 2012, initially in the Department of Electronic Computation under Professor Murray Allen. During 1987–1989 he was Head of the Department of Computer Science and during 1996–2000 he was Head of the Department of Software Engineering. He held visiting positions in the United Kingdom at the University of Southampton (1978–79), the Programming Research Group at Oxford University as a Visiting Fellow at Wolfson College (1985–86), the Oxford University Computing Laboratory and B-Core (1999), and Royal Holloway College (University of London) and the University of Surrey (2003). In 1971, Robinson's courses in computer science included ALGOL W (from Stanford University), WATFOR (a student version of FORTRAN from the University of Waterloo), Plago (PL/I for students, from Brooklyn), SNOBOL (from Bell Labs), and IBM System/360 assembly language. The latter used an assembler program written by Robinson since the IBM assembler was too slow for student use. In 1974, the Department of Computer Science at UNSW had a PDP-11/40 minicomputer from Digital Equipment Corporation, used for teaching and administration. Ken Robinson wrote to Dennis Ritchie at Bell Labs requesting a copy of the Unix operating system. This arrived in 1975, making UNSW the first university outside the United States to run Unix regularly. Robinson's later research and teaching was especially centred around formal methods, particularly the B-Method, Event-B, and the Rodin tool. Robinson designed the initial BE Software Engineering program at UNSW and with the program coordinator subsequently. He also initiated the BE Computer Engineering program. In 1990, he received the University of NSW Vice-Chancellor's Award for Teaching Excellence. Ken Robinson died on 5 September 2020. He was married with a family. Selected publications See also UNSW School of Computer Science and Engineering References 1938 births 2020 deaths University of Sydney alumni Australian computer scientists Formal methods people Software engineering researchers University of New South Wales faculty
163710
https://en.wikipedia.org/wiki/Wasteland%20%28video%20game%29
Wasteland (video game)
Wasteland is a science fiction open world role-playing video game developed by Interplay and published by Electronic Arts at the beginning of 1988. The game is set in a futuristic, post-apocalyptic America destroyed by a nuclear holocaust generations before. Developers originally made the game for the Apple II and it was ported to the Commodore 64 and MS-DOS. It was re-released for Microsoft Windows, OS X, and Linux in 2013 via Steam and GOG.com, and in 2014 via Desura. Critically acclaimed and commercially successful, Wasteland was intended to be followed by two separate sequels, but Electronic Arts dropped claims of Fountain of Dreams being a sequel and Interplay's Meantime was cancelled. The game's general setting and concept became the basis for Interplay's 1997 role-playing video game Fallout, which would extend into the Fallout series. Game developer inXile Entertainment released a sequel, Wasteland 2, in 2014, and Wasteland 3 was released on August 28, 2020. Wasteland Remastered was released on February 25, 2020, in honor of the original game's 30th anniversary. Gameplay Wastelands game mechanics are based on those used in the tabletop role-playing games, such as Tunnels and Trolls and Mercenaries, Spies and Private Eyes created by Wasteland designers Ken St. Andre and Michael Stackpole. Characters in Wasteland have various statistics (strength, intelligence, luck, speed, agility, dexterity, and charisma) that allow the characters to use different skills and weapons. Experience is gained through battle and skill usage. The game generally lets players advance using a variety of tactics: to get through a locked gate, the characters could use their picklock skill, their climb skill, or their strength attribute; or they could force the gate with a crowbar or a LAW rocket. The player's party begins with four characters. Through the course of the game the party can hold as many as seven characters by recruiting certain citizens and wasteland creatures. Unlike those of other computer RPGs of the time, these non-player characters (NPCs) might at times refuse to follow the player's commands, such as when the player orders the character to give up an item or perform an action. The game is noted for its high and unforgiving difficulty level. The prose appearing in the game's combat screens, such as phrases saying an enemy is "reduced to a thin red paste" and "explodes like a blood sausage", prompted an unofficial PG-13 sticker on the game packaging in the U.S. Wasteland was one of the first games featuring a persistent world, where changes to the game world were stored and kept. Returning to an area later in the game, the player would find it in the state the player left it, rather than being reset, as was common for games of the time. Since hard drives were still rare in home computers in 1988, this meant the original game disk had to be copied first, as the manual instructed one to do. Another feature of the game was the inclusion of a printed collection of paragraphs that the player would read at the appropriate times. These paragraphs described encounters and conversations, contained clues, and added to the overall texture of the game. Because disk space was at a premium, it saved on resources to have most of the game's story printed out in a separate manual rather than stored within the game's code itself. The paragraph books also served as a rudimentary form of copy protection; someone playing a copied version of the game would miss out on much of the story and clues necessary to progress. The paragraphs included an unrelated story line about a mission to Mars intended to mislead those who read the paragraphs when not instructed to, and a false set of passwords that would trip up cheaters. Plot In 2087 (one hundred years after the game's development), generations after the devastation of a global nuclear war in 1998, a distant remnant force of the U.S. Army called the Desert Rangers is based in the Southwestern United States, acting as peacekeepers to protect fellow survivors and their descendants. A team of Desert Rangers is assigned to investigate a series of disturbances in nearby areas. Throughout the game, the rangers explore the remaining enclaves of human civilization, including a post-apocalyptic Las Vegas. As the group's investigation deepens, the Rangers discover evidence of a larger menace threatening to exterminate what is left of humankind. A pre-war artificial intelligence operating from a surviving military facility, Base Cochise, is constructing armies of killer machines and cybernetically modified humans to attack human settlements with the help of Irwin Finster, the deranged former commander of the base. Finster has gone so far as to transform himself into a cyborg under the AI's control. The AI's ultimate goal is to complete "Project Darwin" (which Finster was in charge of) and replace the world's "flawed" population with genetically pure specimens. With help from a pre-war android named Max, the player recovers the necessary technology and weapons in order to confront the AI at Base Cochise and destroy it by making the base's nuclear reactor melt down. Development Brian Fargo in an interview with Hartley and Patricia Lesse for MicroTimes in 1987, said that Interplay started work on the game about a year ago. Fargo further stated that the game was created on Apple II, as it was equally important to him as the Commodore 64. He described the game as a hybrid of Ultima games and The Bard's Tale, while being post-apocalyptic and in a similar vein as the Mad Max films. He described the combat as being similar to The Bard's Tale though also containing strategy; while players would be able to disband parties, or split up party members for exploration, or select the point-of-view of different members. Fargo in an interview with Patrick Hickey Jr. had stated that the genesis of Wasteland came after The Bard's Tale was a hit, as Interplay wanted to make another role-playing video game for Electronic Arts, asides from a sequel to The Bard's Tale. He added that due to his love for Mad Max 2 and post-apocalyptic fiction, he chose a post-apocalyptic setting for this new RPG. While searching for a gameplay system for their new game, they came across the system of Mercenaries, Spies and Private Eyes. It was stated in January 1987 that Michael Stackpole, who authored it and Batman's sourcebook for DC Heroes, would be involved as the game's writer. Alan Pavlish had been chosen to be the lead developer of the video game, writing the game in Apple II machine language and programming the game to react to player choices. Per Ken St. Andre, Fargo's pitch to him was of a post-nuclear holocaust game that took advantage of Pavlish's coding, which allowed for weapons capable of inflicting area effect damage to be used and the map be modified "on the fly". Writing Ken St. Andre described to Hickey that they wanted to make a game-changing computer role-playing game that will be better than any other at the time, hating the limitations other CRPGs put on gamers. According to him, the process of creating the story of the game took over a year, though it was mostly due to them feeding various possible scenarios into how the game should react at a given time. Wasteland's different story was mostly because of St. Andre and Stackpole, who wanted something new. The original plot was supposed to be similar to Red Dawn, with Russians occupying the United States and fighting against Americans engaged in liberating their nation. St. Andre eventually decided to change this and pitched a new story involving killer robots wanting to wipe out as well as replace humanity, calling it a sort of cross between The Terminator and Daffy Duck, with Brian accepting this new storyline. The location of the game was chosen due to St. Andre living in the region and his familiarity with the area, while making sure the locations of real-world places were accurate in the game. Release The game was copyrighted in 1986. Close to release, Interplay insisted that it be labeled PG-13. Said to be in development for five years by Fargo, Wasteland was originally released for the Apple II, Commodore 64, and IBM compatibles. The IBM version added an additional skill called "Combat Shooting" which could be bought only when a character was first created. Wasteland was re-released as part of Interplay's 10 Year Anthology: Classic Collection in 1995, and also included in the 1998 Ultimate RPG Archives through Interplay's DragonPlay label. These later bundled releases were missing the original setup program, which allowed the game's maps to be reset, while retaining the player's original team of Rangers. Jeremy Reaban wrote an unofficial (and unsupported) program that emulated this functionality. Reception Computer Gaming World cited Wastelands "ease of play, richness of plot, problem solving requirements, skill and task system, and graphic display" as elements of its excellence. The magazine's Scorpia favorably reviewed the game in 1991 and 1993, calling it "really the only decently-designed post-nuke game on the market". In 1992 the magazine stated that the game's "classic mix of combat and problem-solving" was the favorite of its readers in 1988, and that "the way in which Wastelands NPCs related to the player characters, the questions of dealing with moral dilemmas, and the treatment of skills set this game apart." In 1994 the magazine mentioned Wasteland as an example of how "older, less sophisticated engines can still play host to a great game". Orson Scott Card gave Wasteland a mixed review in Compute!, commending the science fiction elements and setting, but stating that "mutant bunnies can get boring, too ... This is still a kill-the-monster-and-get-the-treasure game, without the overarching story that makes each Ultima installment meaningful." Another writer for Compute! praised the game, however, citing its non-linear design and multiple puzzle solutions, the vague nature of the goal, and customizable player stats. Julia Martin's review for Challenge favorably recommended the game for those into RPGs and adventure games, comparing it to Twilight: 2000, praising its combat system, choices and for differing from the usual sword-and-fantasy genre. She called the game well done and stated it offered hours of fun. She also criticized having to insert the primary "A" disk in order to play the game after copying it from four disks, the game's save system and characters starting out with useless items. The game was a hit and at its time of release, it sold around 250,000 units. Computer Gaming World awarded Wasteland the Adventure Game of the Year award in 1988. The game received the fourth-highest number of votes in a 1990 survey of the magazine's readers' "All-Time Favorites". In 1993 Computer Gaming World added Wasteland to its Hall of Fame, and in 1996, rated it as the ninth best PC video game of all time for introducing the concept of the player's party "acting like the 'real' people." In 2000, Wasteland was ranked as the 24th top PC game of all time by the staff of IGN, who called it "one of the best RPGs to ever grace the PC" and "a truly innovative RPG for its time." According to a retrospective review by Richard Cobbett of Eurogamer in 2012, "even now, it offers a unique RPG world and experience ... a whole fallen civilisation full of puzzles and characters and things to twiddle with, all magically crammed into less than a megabyte of space." In another retrospective article that same year, IGN's Kristan Reed wrote that "time has not been kind to Wasteland, but its core concepts stand firm." Legacy Sequels and spiritual successor Wasteland was followed in 1990 by a less-successful intended sequel, Fountain of Dreams, set in post-war Florida. The game neither contained any of the code from Wasteland, nor involved any of the staff that worked on it. Electronic Arts however eventually decided to downplay its connection to Wasteland, and in 2003 stated that it was not a sequel. Interplay themselves worked on Meantime, which was advertised as a spiritual sequel to Wasteland and did not take place in the same universe. Coding of Meantime was nearly finished and a beta version was produced, but the game was canceled as the Apple II market declined. Interplay has described its 1997 game Fallout as the spiritual successor to Wasteland. According to IGN, "Interplay's inability to prise the Wasteland brand name from EA's gnarled fingers actually led to it creating Fallout in the first place." There are Wasteland homage elements in Fallout and Fallout 2 as well. Fargo's inXile Entertainment acquired the rights to the franchise from Electronic Arts in 2003. The studio developed and published Wasteland 2 on September 19, 2014. The game's production team included the original Wasteland designers Alan Pavlish, Michael A. Stackpole, Ken St. Andre and Liz Danforth, and was crowdfunded through a highly successful Kickstarter campaign. InXile Entertainment announced on September 28, 2016, that it was crowdfunding on Fig to develop another sequel, Wasteland 3. It was released on August 28, 2020. Re-release In a Kickstarter update for Wasteland 2 on August 9, 2013, project lead Chris Keenan announced that they had reached an agreement with Electronic Arts to release the game for modern operating systems. He added that it will be given for free to backers of Wasteland 2 on Kickstarter, in addition to being made available for purchase on GOG and Steam. The re-release was designed to run on higher resolutions and added in a song by Mark Morgan, higher resolution portraits, the ability to use the original game's manual in-game and the paragraph book's text, as well as expanding the save-game functionality. On November 7, Keenan announced that the re-release titled Wasteland 1 - The Original Classic had gone gold, and had been submitted to GOG and Steam for approval. In response to the player feedback, inXile included the ability to turn off smoothing, including the manual in tooltips, swapping and tweaking portraits while making it work on Mac OS X and Linux. Those who backed Planescape: Torment and received Wasteland 2, also received the re-release for free. The Original Classic edition was released on November 8, 2013 and was downloaded over 33,000 times before its general availability. On November 12, the game was released on GOG. The next day, the game was also released on Steam for Windows, Mac and Linux. On March 11, 2014, it was released for Desura. Remaster inXile Entertainment announced a remastered version in honor of the original's 30th anniversary, adding it was being produced by Krome Studios. During E3 2019, Brian Fargo announced it was coming to both Windows and Xbox One. He also released screenshots of the game. On January 23, 2020, the release date was revealed as February 25. It was released on GOG, Steam and Microsoft Store. The graphics and sounds were completely overhauled and the game uses 3D models. In addition, it features voiced lines and new portraits for characters. The "remastered" edition also includes cross-save support and Xbox Play Anywhere support. References External links 1988 video games Alternate history video games Anti-war video games Apple II games Cancelled Amstrad CPC games Cancelled ZX Spectrum games Commodore 64 games DOS games Electronic Arts games Interplay Entertainment games Linux games MacOS games Open-world video games Post-apocalyptic video games Role-playing video games Science fiction video games Video games developed in the United States Video games featuring protagonists of selectable gender Video games set in the 2080s Video games set in Arizona Video games set in California Video games set in the Las Vegas Valley Video games set in Nevada Wasteland (series) Windows games Xbox Cloud Gaming games
367354
https://en.wikipedia.org/wiki/Dictys%20Cretensis
Dictys Cretensis
Dictys Cretensis, i.e. Dictys of Crete (, ; ) of Knossos was a legendary companion of Idomeneus during the Trojan War, and the purported author of a diary of its events, that deployed some of the same materials worked up by Homer for the Iliad. The story of his journal, an amusing fiction addressed to a knowledgeable Alexandrian audience, came to be taken literally during Late Antiquity. Literary history In the 4th century AD a certain Q. Septimius brought out Dictys Cretensis Ephemeris belli Trojani ("Dictys of Crete, chronicle of the Trojan War") in six books, a work that professed to be a Latin translation of the Greek version. Its chief interest lies in the fact that, as knowledge of Greek waned and disappeared in Western Europe, this and the De excidio Trojae of Dares Phrygius were the sources from which the Homeric legends were transmitted to the Romance literature of the Middle Ages. An elaborate frame story presented in the prologue to the Latin text details how the manuscript of this work, written in Phoenician characters on tablets of limewood or tree bark, survived: it was said to have been enclosed in a leaden box and buried with its author, according to his wishes. "There it remained undisturbed for ages, when in the thirteenth year of Nero's reign, the sepulchre was burst open by a terrible earthquake, the coffer was exposed to view, and observed by some shepherds, who, having ascertained that it did not, as they had at first hoped, contain a treasure, conveyed it to their master Eupraxis (or Eupraxides), who in his turn presented it to Rutilius Rufus, the Roman governor of the province, by whom both Eupraxis and the casket were despatched to the emperor. Nero, upon learning that the letters were Phoenician, summoned to his presence men skilled in that language, by whom the contents were explained. The whole having been translated into Greek, was deposited in one of the public libraries, and Eupraxis was dismissed loaded with rewards." (Smith, Dictionary) The Greek "name" Eupraxis simply means "right actions", a familiar goal in discussions of ethics, and an amusingly apt name for the finder. The prologue that characterizes one manuscript tradition is substituted in the other main group of manuscripts with a letter as if written by a Q. Septimius Romanus, to a Q. Arcadius Rufus, in which the writer, giving a condensed version of the discovery tale, informs his friend that, the volume having fallen into his hands, he had been induced, for his own amusement and the instruction of others, to convert it into Latin. The modern editor, Werner Eisenhut, surmises that the two groups, neither of which is to be consistently preferred to the other, represent two published editions in Late Antiquity. There are retranslations into Greek of Byzantine date, embodied in universal histories, of which Smith adds, "We may add to this account, that the writers of the Byzantine period, such as Joannes Malelas, Constantinus Porphyrogenitus, Georgius Cedrenus, Constantinus Manasses, Joannes and Isaacus Tzetzes, with others, quote largely from this Dictys as an author of the highest and most unquestionable authority, and he certainly was known as early as the age of Aelian." Petrarch's own copy of Ephemeris belli Troiani, his key to Homer, is now the Codex Parisinus Lat. 5690, in the Bibliothèque nationale. The first printed edition was early, not after 1471. Modern scholars were in disagreement as to whether any Greek original really existed; but all doubt on the point was removed by the discovery of a fragment in Greek amongst the Tebtunis papyri found by Bernard Grenfell and Arthur Hunt in 1899–1900. It revealed that the Latin was a close translation. The other surprise was the discovery, in the library of conte Aurelio Guglielmo Balleani at Jesi, of a manuscript of Dictys, in the latter part of the ninth century, that was described and collated by C. Annibaldi in 1907. For a medieval source on the Trojan War that is uniquely independent of Dictys and Dares, see the "Rawlinson Excidium Troie". Notes References The modern edition of the Latin text, edited by Werner Eisenhut (Leipzig, 1958), has been used in the first modern English translation: R. M. Frazer, Jr. The Trojan War: The Chronicles of Dictys of Crete and Dares the Phrygian (Bloomington: Indiana University Press, 1966). Smith, William, (1870), Dictionary of Greek and Roman Biography and Mythology vol.1, pp 1002f External links Dictys cretensis ephemeridos belli troiani, Ferdinand Meister (ed.), Lipsiae in aedibus B. G. Teubner, 1872. R. M. Frazer, The Trojan War. The Chronicles of Dictys of Crete and Dares the Phrygian, Indiana University Press, 1966. Papyrus Oxyrhyncus, XXXI, 2539 (an extant fragment in Greek language). Papyrus Tebtunis, II, 68 (an extant fragment in Greek language). Trojan War literature Cretan characters in Greek mythology Characters in Greek mythology Knossos
10927610
https://en.wikipedia.org/wiki/Linksys%20WRTP54G%20router
Linksys WRTP54G router
Linksys WRTP54G is a Wi-Fi capable router with VoIP capability from Linksys. Launched in 2005, it is similar in function to the popular WRT54G, the device is capable of sharing Internet connections amongst several computers via 802.3 Ethernet and 802.11b/g wireless data links, but it also has two POTS ports for VoIP telephony. VoIP service providers The router was being sold pre-configured for providers Vonage and EarthLink, but was also available without any pre-configured service. In the latter case one needed to configure the VoIP settings oneself. It sold for about $130 on launch, with a Vonage monthly plan of 500 VoIP hours priced at $15, after a $45 service charge. A PC World staff blog post in 2005 warned the reader not to be mislead to think that the initial, and the only advertised price, was the total cost of ownership. Phreaking potential An Associated Press story from August 2006 reported that "Arias Hung, a security professional with Media Access Guard in Seattle", showed how to change the MAC address of a device registered for Vonage service that "could intercept calls made to a legitimate Vonage user and make calls that would appear to come from the user's phone number," recommending that "The general consumer should stay away from this router." Internals In a departure from most of the WRT54G series (which featured mostly Broadcom chipsets) this router features a Texas Instruments chipset. Texas Instruments chips are common to almost all current Linksys VOIP products. The screws to open the unit are under the rubber pads. These units are often locked with a particular VoIP vendor's information. A Freeware program "cyt46.exe" can help. References Hardware routers Linksys
22399444
https://en.wikipedia.org/wiki/VistA
VistA
The Veterans Health Information Systems and Technology Architecture (VISTA) is a health information system deployed across all veteran care sites in the United States. VISTA provides clinical, administrative, and financial functions for all of the 1700+ hospitals and clinics of the Veterans Health Administration VISTA consists of 180 clinical, financial, and administrative applications integrated within a single transactional database (see figure 1). The Veterans Health Administration (VHA) is the largest integrated national healthcare delivery system in the United States, providing care for nearly 9 million veterans by 180,000 medical professionals. VISTA received the Computerworld Smithsonian Award for best use of Information Technology in Medicine, and continues to the present day to receive the highest physician satisfaction scores in national Electronic Health Record (EHR) surveys. In 2014 and again in 2016 national surveys of over 15,000 physician users of EHRs rated VISTA with the highest overall satisfaction rating in the U.S. Over 65% of all physicians trained in the U.S. rotate through the VHA and use VISTA, making VISTA the most familiar EHR in the U.S. In May, 2018, the VA awarded a contract to Cerner Corp to replace VistA with the commercial off-the-shelf EHR, Cerner Millenium. Pilot implementations took place in the fall of 2020, and by November, 24 million veteran health records had been migrated to the new platform. The projected completion for migration of all VA sites is 2028. Clinical Functions Financial-Administrative Functions Infrastructure Functions Patient Web Portal Functions Achievements For its development of VistA, the United States Department of Veterans Affairs (VA) / Veterans Health Administration (VHA) was named the recipient of the Innovations in American Government Award presented by the Ash Institute of the John F. Kennedy School of Government at Harvard University in July, 2006. The adoption of VistA has allowed the VA to achieve a pharmacy prescription accuracy rate of 99.997%, and the VA outperforms most public sector hospitals on many other quality metrics, all attributable to VistA. Hospitals using VistA are one of only a few healthcare systems in the U.S. that have achieved the highest level of electronic health record integration HIMSS Stage 7, while a non-VA hospital using VistA is one of only 42 US hospitals that has achieved HIMSS stage 6. Licensing and dissemination The VistA system is public domain software, available through the Freedom Of Information Act directly from the VA website or through a growing network of distributors, such as the OSEHRA VistA-M.git tree. VistA modules and projects Database backend VistA was developed using the M or MUMPS integrated application database. The VA currently runs its VistA systems on a proprietary version of MUMPS called Caché, but an open source MUMPS database engine, called GT.M, for Linux and Unix systems has also been developed. Patient Web Portal MyHealtheVet is a web portal that allows veterans to access and update their personal health record, refill prescriptions, and schedule appointments. This also allows veterans to port their health records to institutions outside the VA health system or keep a personal copy of their health records, a Personal Health Record (PHR). VistA Imaging The Veterans Administration developed VistA Imaging, which is a PACS (radiology imaging) systems and for integrating image-based information, such as X-Rays, CAT-scans, EKGs, pathology slides, and scanned documents into the VistA electronic medical records system. Integration of images into a medical record is critical to efficient high-quality patient care. Deployments and uses Role in development of a national healthcare network The VistA electronic healthcare record has been widely credited for reforming the VA healthcare system, improving safety and efficiency substantially. The results have spurred a national impetus to adopt electronic medical records similar to VistA nationwide. A Clinical Data Repository (CDR) /Health Data Repository (HDR) (CHDR) allows interoperability between the DoD's Clinical Data Repository (CDR) & the VA's Health Data Repository (HDR). Bidirectional real time exchange of pharmacy, allergy, demographic and laboratory data occurred in phase 1. Phase 2 involved additional drug–drug interaction and allergy checking. Initial deployment of the system was completed in March 2007 at the El Paso, Augusta, Pensacola, Puget Sound, Chicago, San Diego, and Las Vegas facilities. VistA has been interfaced with commercial off-the-shelf products. Standards and protocols used by VA are consistent with current industry standards and include HL7, DICOM, and other protocols. Tools for CCR/CCD support have been developed for VistA, allowing VistA to communicate with other EHRs using these standardized information exchange protocols. This includes the Mirth open source cross platform HL7 interface and NHIN Connect, the open source health information exchange adaptor. The VistA EHR has been used by the VA in combination with Telemedicine to provide surgical care to rural areas in Nebraska and Western Iowa over a area. Usage in non-governmental hospitals Under the Freedom of Information Act (FOIA), the VistA system, the CPRS graphical interface, and unlimited ongoing updates (500–600 per year) are provided as public domain software. This was done by the U.S. government in an effort to make VistA available as a low cost Electronic Health Record (EHR) for non-governmental hospitals and other healthcare entities. The VA has produced a version of VistA that runs on GT.M in a Linux operating system, and which was suitable for use in private settings. VistA has since been adapted by companies such as Medsphere to hundreds of hospitals and clinics in the private sector. VistA has been deployed internationally, running the healthcare information system of entire national healthcare systems, such as the Kingdom of Jordan. Some United States universities, such as UC Davis and Texas Tech, have implemented VistA. The non-profit organization, WorldVistA, was established to extend and collaboratively improve the VistA electronic health record and health information system for use outside in the private and public sector throughout the U.S. and internationally. VistA (and other derivative EMR/EHR systems) can be interfaced with healthcare databases not initially used by the VA system, including billing software, lab databases, and image databases (radiology, for example). VistA implementations have been deployed (or are currently being deployed) in non-VA healthcare facilities in Texas, Arizona, Florida, Hawaii, New Jersey, Oklahoma, West Virginia, California, New York, and Washington, D.C. In one state, the cost of a multiple hospital VistA-based EHR network was implemented for one tenth the price of a commercial EHR network in another hospital network in the same state ($9 million versus $90 million for 7–8 hospitals each). (Both VistA and the commercial system used the MUMPS database). VistA has even been adapted into a Health Information System (VMACS) at the veterinary medical teaching hospital at UC Davis. International deployments VistA software modules have been installed around the world, or are being considered for installation, in healthcare institutions such as the World Health Organization, and in countries such as Mexico, American Samoa, Kurdistan, Iraq, Finland, Jordan, Germany, Kenya, Nigeria, Egypt, Malaysia, India, Brazil, Pakistan, and Denmark. In September 2009, Dell Computer bought Perot Systems, the company installing VistA in Jordan (the Hakeem project). History The name "VistA" (Veterans Health Information System and Technology Architecture) was adopted by the VA in 1994, when the Under Secretary for Health of the U.S. Department of Veterans Affairs (VA), Dr. Ken Kizer, renamed what was previously called the Decentralized Hospital Computer Program (DHCP). Both Dr. Robert Kolodner (National Health Information Technology Coordinator) and George Timson (an architect of VistA who has been involved with it since the early years) date VistA's actual architecture genesis, then, to 1977. The program was launched in 1978 with the deployment of the initial modules in about twenty VA Medical Centers. The program was named the Decentralized Hospital Computer Program (DHCP) in 1981. In December 1981, Congressman Sonny Montgomery of Mississippi arranged for the Decentralized Hospital Computer Program (DHCP) to be written into law as the medical-information systems development program of the VA. VA Administrator Robert P. Nimmo signed an Executive Order in February 1982 describing how the DHCP was to be organized and managed within the VA's Department of Medicine and Surgery. In conjunction with the VA's DHCP development, the (IHS) Indian Health Service deployed a system built on and augmenting DHCP throughout its Federal and Tribal facilities as the Resource and Patient Management System (RPMS). This implementation emphasized the integration of outpatient clinics into the system, and many of its elements were soon re-incorporated into the VA system (through a system of technology sharing). Subsequent VistA systems therefore included elements from both RPMS and DHCP. Health IT sharing between VA and IHS continues to the present day. The U.S. Department of Defense (DoD) then contracted with Science Applications International Corporation (SAIC) for a heavily modified and extended form of the DHCP system for use in DoD healthcare facilities, naming it the Composite Health Care System (CHCS). Meanwhile, in the early 1980s, major hospitals in Finland were the first institutions outside of the United States to adopt and adapt the VistA system to their language and institutional processes, creating a suite of applications called MUSTI and Multilab. (Since then, institutions in Germany, Egypt, Nigeria, and other nations abroad have adopted and adapted this system for their use, as well.) The four major adopters of VistA – VA (VistA), DoD (CHCS), IHS (RPMS), and the Finnish Musti consortium – each took VistA in a different direction, creating related but distinct "dialects" of VistA. VA VistA and RPMS exchanged ideas and software repeatedly over the years, and RPMS periodically folded back into its code base new versions of the VA VistA packages. These two dialects are therefore the most closely related. The Musti software drifted further away from these two but retained compatibility with the infrastructure of RPMS and VA VistA (while adding additional GUI and web capabilities to improve function). Meanwhile, the CHCS code base diverged from that of the VA's VistA in the mid-eighties and has never been reintegrated. The VA and the DoD had been instructed for years to improve the sharing of medical information between the two systems, but for political reasons made little progress toward bringing the two dialects back together. More recently, CHCS's development was brought to a complete stop by continued political opposition within the DoD, and it has now been supplanted by a related, but different, system called AHLTA. While AHLTA is the new system for DoD, the core systems beneath AHLTA (for Computerized Physician Order Entry, appointing, referral management, and creation of new patient registrations) remain those of the underlying CHCS system. (While some ongoing development has occurred for CHCS, the majority of funds are consumed by the AHLTA project.) Thus, the VistA code base was split four ways. Many VistA professionals then informally banded together as the "Hardhats" (a name the original VistA programmers used for themselves) to promote that the FOIA (Freedom of Information Act) release of VA VistA (that allows it to be in the public domain) be standardized for universal usage. WorldVistA was formed from this group and was incorporated in March 2003 as a non-profit corporation. This allowed the WorldVistA board of directors to pursue certain activities (obtaining grants, creating contracts, and making formal alliances) that they otherwise could not pursue as an informal organization. It is, however, an organization independent of the VA system and its version of VistA therefore differs from that of the VA's. Nevertheless, it maintains as an objective that its public version be compatible (interoperable) with the VA's official version. It has developed packages of WorldVistA for multiple operating systems, including Linux (Debian/Ubuntu and Red Hat) -based and Microsoft Windows-based operating systems. Co-operation with the maintainers and vendors of OpenVistA, another widely deployed open source public version of VistA, helps maintain interoperability and a standardized framework. In 2011 the Open Source Electronic Health Record Agent (OSEHRA) project was started (in cooperation with the Department of Veterans Affairs) to provide a common code repository for VistA (and other EHR and health IT) software. On February 10, 2020 the Open Source Electronic Health Record Alliance (OSEHRA) announced that they would cease operations on February 14 of 2020. In summary, it was the joint collaboration of thousands of clinicians and systems experts from the United States and other nations, many of them volunteers, that the VistA system has developed. Supporters of VistA There have been many champions of VistA as the electronic healthcare record system for a universal healthcare plan. VistA can act as a standalone system, allowing self-contained management and retention of healthcare data within an institution. Combined with HIE (or other data exchange protocol) it can be part of a peer-to-peer model of universal healthcare. It is also scalable to be used as a centralized system (allowing regional or even national management of healthcare records). In addition to the unwavering support of congressional representatives such as Congressman Sonny Montgomery of Mississippi, numerous IT specialists, physicians, and other healthcare professionals have donated significant amounts of time in adapting the VistA system for use in non-governmental healthcare settings. The ranking member of the House Veterans Affairs Committee's Oversight and Investigation Subcommittee, Rep. Ginny Brown-Waite of Florida, recommended that the Department of Defense (DOD) adopt VA's VistA system following accusations of inefficiencies in the DOD healthcare system. The DOD hospitals use Armed Forces Health Longitudinal Technology Application (AHLTA) which has not been as successful as VistA and has not been adapted to non-military environments (as has been done with VistA). In November 2005, the U.S. Senate passed the Wired for Health Care Quality Act, introduced by Sen. Enzi of Wyoming with 38 co-sponsors, that would require the government to use the VA's technology standards as a basis for national standards allowing all health care providers to communicate with each other as part of a nationwide health information exchange. The legislation would also authorize $280 million in grants, which would help persuade reluctant providers to invest in the new technology. There has been no action on the bill since December 2005. Two similar House bills were introduced in late 2005 and early 2006; no action has been taken on either of them, either. In late 2008, House Ways and Means Health Subcommittee Chair Congressman Pete Stark (D-CA) introduced the Health-e Information Technology Act of 2008 (H.R. 6898) that calls for the creation of a low-cost public IT system for those providers who do not want to invest in a proprietary one. In April 2009, Sen. John D. Rockefeller of West Virginia introduced the Health Information Technology Public Utility Act of 2009 calling for the government to create an open source electronic health records solution and offer it at little or no cost to safety-net hospitals and small rural providers. VistA Derivatives WorldVistA or WorldVistA EHR OpenVistA (Medsphere) vxVistA (Document Storage Systems, Inc.) Astronaut VistA See also Electronic health record Health informatics MUMPS Veterans Health Administration United States Department of Veterans Affairs FileMan VA Kernel GNUmed GNU Health References External links Vistapedia: the WorldVistA Wiki Hardhats – a VistA user community Hardhats Google Group – a forum to discuss installation of WorldVistA VistA Monograph wiki (OLPC project) VistA Software Alliance (VistA Software Vendor Trade Organization) VistA Imaging overview (Department of Veterans Affairs) – Ash Institute News Release VistA Glossary LiuTiu Medical Administrative Lexicon (Brokenly translated into English from Russian) Ubuntu Doctors Guild Information about implementing VistA and other open source medical applications in Ubuntu Linux A 40-year 'conspiracy' at the VA Politico, 2017 Videos about VistA: History of Vista Architecture Interview with Tom Munnecke Interview with Rob Kolodner regarding VistA's potential for the National Health Information Network Impact of VistA Interview with Dr. Ross Fletcher Interview with Philip Longman Events leading up to the development of VistA Interview with Henry Heffernan History of Vista Interview with Ruth Dayhoff Early development of the Decentralized Hospital Computer Program Interview with Marty Johnson Early days of the VA "Underground Railroad" Interview with Tom Munnecke United States Department of Veterans Affairs Electronic health records Government software Public-domain software
2010495
https://en.wikipedia.org/wiki/Gary%20McKinnon
Gary McKinnon
Gary McKinnon (born 10 February 1966) is a Scottish systems administrator and hacker who was accused in 2002 of perpetrating the "biggest military computer hack of all time", although McKinnon himself states that he was merely looking for evidence of free energy suppression and a cover-up of UFO activity and other technologies potentially useful to the public. On 16 October 2012, after a series of legal proceedings in Britain, then Home Secretary Theresa May blocked extradition to the United States. Alleged crime McKinnon was accused of hacking into 97 United States military and NASA computers over a 13-month period between February 2001 and March 2002, at the house of his girlfriend's aunt in London, using the name 'Solo'. US authorities stated he deleted critical files from operating systems, which shut down the United States Army's Military District of Washington network of 2000 computers for 24 hours. McKinnon also posted a notice on the military's website: "Your security is crap". After the September 11 attacks in 2001, he allegedly deleted weapons logs at the Earle Naval Weapons Station, rendering its network of 300 computers inoperable and paralyzing munitions supply deliveries for the US Navy's Atlantic Fleet. McKinnon was also accused of copying data, account files and passwords onto his own computer. US authorities stated that the cost of tracking and correcting the problems he caused was over $700,000. While not admitting that it constituted evidence of destruction, McKinnon did admit leaving a threat on one computer: US authorities stated that McKinnon was trying to downplay his own actions. A senior military officer at the Pentagon told The Sunday Telegraph: Arrest and legal proceedings McKinnon was first interviewed by police on 19 March 2002. After this interview, his computer was seized by the authorities. He was interviewed again on 8 August 2002, this time by the UK National Hi-Tech Crime Unit (NHTCU). In November 2002, McKinnon was indicted by a federal grand jury in the Eastern District of Virginia. The indictment contained seven counts of computer-related crime, each of which carried a potential ten-year jail sentence. Extradition proceedings McKinnon remained at liberty without restriction for three years until June 2005 (until after the UK enacted the Extradition Act 2003, which implemented the 2003 extradition treaty with the United States wherein the United States did not need to provide contestable evidence), when he became subject to bail conditions including a requirement to sign in at his local police station every evening and to remain at his home address at night. If extradited to the U.S. and charged, McKinnon would have faced up to 70 years in jail. He had also expressed fears that he could be sent to Guantanamo Bay. Appeal to the House of Lords Representing McKinnon in the House of Lords on 16 June 2008, barristers told the Law Lords that the prosecutors had said McKinnon faced a possible 8–10 years in jail per count if he contested the charges (there were seven counts) without any chance of repatriation, but only 37–46 months if he co-operated and went voluntarily to the United States. U.S.-style plea bargains are not a part of English jurisprudence (although it is standard practice to reduce the sentence by one-third for a defendant who pleads guilty). McKinnon's barrister said that the Law Lords could deny extradition if there was an abuse of process: "If the United States wish to use the processes of English courts to secure the extradition of an alleged offender, then they must play by our rules." The House of Lords rejected this argument, with the lead judgement (of Lord Brown of Eaton-under-Heywood) holding that "the difference between the American system and our own is not perhaps so stark as [McKinnon]'s argument suggests" and that extradition proceedings should "accommodate legal and cultural differences between the legal systems of the many foreign friendly states with whom the UK has entered into reciprocal extradition arrangements". Further appeals McKinnon appealed to the European Court of Human Rights, which briefly imposed a bar on the extradition. On 23 January 2009, McKinnon won permission from the High Court to apply for a judicial review against his extradition. On 31 July 2009, the High Court announced that McKinnon had lost this appeal. British government blocks extradition On 16 October 2012, then-Home Secretary Theresa May announced to the House of Commons that the extradition had been blocked, saying that:Mr McKinnon is accused of serious crimes. But there is also no doubt that he is seriously ill ... He has Asperger's syndrome, and suffers from depressive illness. Mr McKinnon's extradition would give rise to such a high risk of him ending his life that a decision to extradite would be incompatible with Mr McKinnon's human rights.She stated that the Director of Public Prosecutions would determine whether McKinnon should face trial before a British court. On 14 December, the DPP, Keir Starmer, announced that McKinnon would not be prosecuted in the United Kingdom, because of the difficulties involved in bringing a case against him when the evidence was in the United States. Judicial review In January 2010, Mr Justice Mitting granted McKinnon a further judicial review of the decision of Home Secretary Alan Johnson to allow McKinnon's extradition. Mitting distinguished two issues which were arguable, the first being whether psychiatrist Jeremy Turk's opinion that McKinnon would certainly commit suicide if extradited means that the Home Secretary must refuse extradition under section 6 of the Human Rights Act 1998 (which prevents a public authority from acting in a way incompatible with convention rights). The second was whether Turk's opinion was a fundamental change to the circumstances that the courts had previously considered and ruled upon. Mitting ruled that if the answer to both questions was "Yes", then it was arguable that it would be unlawful to allow the extradition. Support for McKinnon In early November 2008, eighty British MPs signed an Early Day Motion calling for any custodial sentence imposed by an American court to be served in a prison in the UK. On 15 July 2009, many voted in Parliament against a review of the extradition treaty. In November 2008, the rock group Marillion announced that it was ready to participate in a benefit concert in support of McKinnon's struggle to avoid extradition to United States. The organiser of the planned event was Ross Hemsworth, an English radio host. No date had been set as of November 2008. Many prominent individuals voiced support, including Sting, Trudie Styler, Julie Christie, David Gilmour, Graham Nash, Peter Gabriel, The Proclaimers, Bob Geldof, Chrissie Hynde, David Cameron, Boris Johnson, Stephen Fry, and Terry Waite. All proposed that, at least, he should be tried in the UK. In August 2009, Glasgow newspaper The Herald reported that Scots entrepreneur Luke Heron would pay £100,000 towards McKinnon's legal costs in the event he was extradited to the US. In a further article in The Herald, Joseph Gutheinz, Jr., a retired NASA Office of Inspector General Senior Special Agent, voiced his support for McKinnon. Gutheinz, who is also an American criminal defence attorney and former Member of the Texas Criminal Justice Advisory Committee on Offenders with Medical and Mental Impairments, said that he feared Gary McKinnon would not find justice in the US, because "the American judicial system turns a blind eye towards the needs of the mentally ill". Web and print media across the UK were critical of the extradition. Janis Sharp, McKinnon's mother, stood as an independent candidate in the 2010 general election in Blackburn in protest against the sitting Labour MP Jack Straw, who was Foreign Secretary when the extradition treaty was agreed. She finished last out of eight candidates with 0.38% of the vote. On 20 July 2010, Tom Bradby, ITN's political editor, raised the Gary McKinnon issue with U.S. President Barack Obama and Prime Minister David Cameron in a joint White House press conference who responded that they had discussed it and were working to find an 'appropriate solution'. Song In August 2009, Pink Floyd's David Gilmour released an online single, "Chicago - Change the World", on which he sang and played guitar, bass and keyboards, to promote awareness of McKinnon's plight. A re-titled cover of the Graham Nash song "Chicago", it featured Chrissie Hynde and Bob Geldof, plus McKinnon himself. It was produced by long-time Pink Floyd collaborator Chris Thomas and was made with Nash's support. Statements to the media McKinnon has admitted in many public statements that he obtained unauthorised access to computer systems in the United States including those mentioned in the United States indictment. He states his motivation, drawn from a statement made before the Washington Press Club on 9 May 2001 by the Disclosure Project, was to find evidence of UFOs, antigravity technology, and the suppression of "free energy", all of which he states to have proven through his actions. In an interview televised on the BBC's Click programme, he stated of the Disclosure Project that "they are some very credible, relied-upon people, all saying yes, there is UFO technology, there's anti-gravity, there's free energy, and it's extraterrestrial in origin and [they've] captured spacecraft and reverse engineered it." He said he investigated a NASA photographic expert's claim that at the Johnson Space Center's Building 8, images were regularly cleaned of evidence of UFO craft, and confirmed this, comparing the raw originals with the "processed" images. He stated to have viewed a detailed image of "something not man-made" and "cigar shaped" floating above the northern hemisphere, and assuming his viewing would be undisrupted owing to the hour, he did not think of capturing the image because he was "bedazzled", and therefore did not think of securing it with the screen capture function in the software at the point when his connection was interrupted. Radio play On 12 December 2007, BBC Radio 4 broadcast John Fletcher's 45-minute radio play about the case, entitled The McKinnon Extradition. See also 1980 Rendlesham Forest incident Adrian Lamo Babar Ahmad David Carruthers Peter Dicks Richard O'Dwyer Christopher Tappin Syed Talha Ahsan Lauri Love Julian Assange United Kingdom–United States relations References Further reading The Autistic Hacker: Gary McKinnon hacked thousands of government computers by David Kushner, July 2011 IEEE Spectrum External links "Gary McKinnon now offering Search Engine Optimisation services" Support website by Gary McKinnon's mother Hacker Voice Radio interview with McKinnon "The Briton facing 60 years in US prison after hacking into Pentagon" Profile: Gary McKinnon Dan Bull—Free Gary (an open letter to the Home Secretary) Coverage of the Gary McKinnon case since 2006 16min video interview on Snotr 1966 births 21st-century Scottish criminals Living people Cybercrime European Court of Human Rights cases involving the United Kingdom Hackers Criminals from Glasgow People with Asperger syndrome Free energy conspiracy theorists British conspiracy theorists
24389373
https://en.wikipedia.org/wiki/Network%20management%20software
Network management software
Network management software is software that is used to provision, discover, monitor and maintain computer networks. Purpose With the expansion of the world wide web and the Internet, computer networks have become very large and complex, making them impossible to manage manually. In response, a suite of network management software was developed to help reduce the burden of managing the growing complexity of computer networks. Network management software usually collects information about network devices (which are called Nodes) using protocols like SNMP, ICMP, CDP etc. This information is then presented to network administrators in an easy to understand and accessible manner to help them quickly identify and remediate problems. Problems may present itself in the form of network faults, performance bottlenecks, compliance issues etc. Some advanced network management software may rectify network problems automatically. Network management software may also help with tasks involved in provisioning new networks, such as installing and configuring new network nodes etc. They may also help with maintenance of existing networks like upgrading software on existing network devices, creating new virtual networks etc. Functions Provisioning: This function enables network managers to provision new network devices in an environment. Automating this step reduces cost and eliminates chances of human error. Mapping or Discovery: This function enables the software to discover the features of a target network. Some features that are usually discovered are: the nodes in a network, the connectivity between these nodes, the vendor types and capabilities for these nodes, the performance characteristics etc. Monitoring: This function enables the network management software to monitor the network for problems and to suggest improvements. The software may poll the devices periodically or register itself to receive alerts from network devices. One mechanism for network devices to volunteer information about itself is by sending an SNMP Trap. Monitoring can reveal faults in the network such as failed or misconfigured nodes, performance bottlenecks, malicious actors, intrusions etc. Configuration management: This function enables the software to ensure that the network configuration is as desired and there is no configuration drift. Regulatory compliance: This function enables the network management software to ensure that the network meets the regulatory standards and complies with applicable laws. Change control: This function enables the software to ensure that the network changes are enacted in a controlled and coordinated manner. Change control can enable audit trails which has applications during a forensic investigation after a network intrusion. Software Asset Management: This function enabled the software to inventory software installed on nodes along with details like version and install date. Additionally, it can also provide software deployment and patch management. Cybersecurity: This function enabled the software to use all the data gathered from the nodes to identify security risks in an IT environment. References Network management
12542681
https://en.wikipedia.org/wiki/MadCap%20Software
MadCap Software
MadCap Software is an American computer software firm headquartered in San Diego, California that creates help authoring tools and solutions for technical writers and documentations teams. Several principal managers, software engineers, and support personnel were recruited from rival firms, such as Adobe Systems and Macromedia, to found MadCap Software. MadCap's authoring tools are all based on xHTML. Origins Some of MadCap Software's founders were associated with eHelp and its core product, RoboHelp, a help authoring tool. After it was bought by Macromedia in 2003, the eHelp developers were laid off. MadCap co-founder Bjorn Backlund had headed the RoboHelp development team. He saw an opportunity to compete with RoboHelp by rewriting the program using XML and expanding the software. MadCap's founding CEO, Anthony Olivier, had been eHelp's CEO. Products MadCap Flare, a content authoring tool that generates output in various formats, including HTML5, Eclipse Help, Microsoft Compiled HTML Help, Microsoft Word, PDF, EPUB, and WebHelp MadCap Central, a cloud-based solution for hosting, project management, build automation, and task management MadCap Doc-To-Help, an authoring and publishing tool for users who want to create and manage content in a familiar Microsoft® Word environment MadCap Capture, a screen capture tool MadCap Contributor, content review for subject matter experts, managers MadCap Lingo, a CAT tool used with Flare, Word, PowerPoint MadCap Mimic, a tool for recording tutorials and software simulations MadCap Pulse, analytic and social collaboration tool MadCap Flare The key concept behind MadCap Flare is single-source publishing. This is a method of content management which allows content to be used more than once across different media. Flare supports topic-based authoring and content management. Topic-based authoring means content is written in modular topics that can stand alone and be mixed or reused as needed. Content creators can produce online help systems, eLearning modules, knowledge bases, document portals, and various guides and manuals, for use online or in print. Flare has streamlined content production. There are many ways in Flare to reuse content, which saves time maintaining or updating topics. Create content from scratch or import existing legacy documentation from a variety of sources. Add or edit content in the XML Editor, or edit the source code manually in the Text Editor. Share projects for team collaboration and feedback. Author content in other languages and perform translations with ease. Publish content to one of several different output types. Use built-in analytics to monitor user interaction and improve overall user satisfaction. MadCap Flare Plugins The Kaizen Plugin is a free productivity plugin for MadCap Flare, developed by Sander Improvement Software AB, based in Sweden. The Mad Quality plugin is a quality assurance plugin for MadCap Flare, developed by Sander Improvement Software AB. The Markdown plugin is a Markdown conversion plugin for MadCap Flare, developed by Sander Improvement Software AB. The Automator plugin is a plugin for MadCap Flare that lets you integrate 3rd party apps with Flare, developed by Sander Improvement Software AB. The MadCap Connect for Salesforce® plugin for MadCap Flare, developed by MadCap Software. The MadCap Connect for Zendesk plugin for MadCap Flare, developed by MadCap Software. The Author-it® Converter for MadCap Flare, developed by MadCap Software. See also Office Open XML software Help authoring tool References External links The Official MadCap Software Forum MadCap Flare Review at PCWorld The Kaizen Plugin for Flare Sander Improvement Software AB Software companies based in California Companies based in San Diego Technical communication tools Privately held companies based in California Software companies of the United States
1202613
https://en.wikipedia.org/wiki/Mv%20%28Unix%29
Mv (Unix)
mv is a Unix command that moves one or more files or directories from one place to another. If both filenames are on the same filesystem, this results in a simple file rename; otherwise the file content is copied to the new location and the old file is removed. Using mv requires the user to have write permission for the directories the file will move between. This is because mv changes the content of both directories (i.e., the source and the target) involved in the move. When using the mv command on files located on the same filesystem, the file's timestamp is not updated. On UNIX implementations derived from AT&T UNIX, cp, ln and mv are implemented as a single program with hard-linked binaries. The behavior is selected from the path name argv[0]. This is a common technique by which closely related commands that have been packaged as a unit allow the user to specify the particular course of the intended action. History A command that moves a directory entry to a new directory was first implemented within Multics. It can be contracted to . Later, the command appeared in Version 1 Unix and became part of the X/Open Portability Guide issue 2 of 1987. The version of mv bundled in GNU coreutils was written by Mike Parker, David MacKenzie, and Jim Meyering. The command is available as a separate package for Microsoft Windows as part of the UnxUtils collection of native Win32 ports of common GNU Unix-like utilities. The command has also been ported to the IBM i operating system. Conflicting existing file When a filename is moved to an existing filename, the existing file is deleted (clobbered) by default. If the existing file is not writable but is in a directory that is writable, the mv command asks for confirmation (if run from a terminal) before proceeding, unless the -f (force) option is used. Accidental overwriting can be prevented using the GNU -n (long format: --no-clobber) flag. Alternatively, -i asks for confirmation upon each name conflict. A related ambiguity arises when a filename is moved to an existing directory. By default, mv would handle this as one trying to move a name inside this directory. GNU mv has a switch for disabling this assumption and try to overwrite the directory instead. An inverse makes the move-to-directory operation explicit. Moving versus copying and removing Moving files within the same file system is generally implemented differently than copying the file and then removing the original. On platforms that do not support the rename syscall, a new link is added to the new directory and the original one is deleted. The data of the file is not accessed. All POSIX-conformant systems implement the rename call. An actual move (effectively a rename) is dramatically faster than the circuitous copy-and-move procedure. The file's i-number (short for "inode number") does not change. No permission is required to read the file being moved insofar as—conceptually speaking—it is only information that is being changed as a result of the "move." Since the source and target directories are being modified, to wit, entries are being created within the target directory and erased from within the source directory, "write" permission in both directories is required to complete the move. Moving files from one file system to another may fail entirely or may be automatically performed as an atomic copy-and-delete action; the actual details are dependent upon the implementation. Moving a directory from one parent to a different parent directory requires write permission in the directory being moved, in addition to permissions to modify the old and new parents. This is because the i-number for the directory entry ".." (which can be used in any context as an alias for the parent of the current directory) changes as a result of the rename. Options Most versions of mv support: -i interactively process, write a prompt to standard error before moving a file that would overwrite an existing file. If the response from the standard input begins with the character 'y' or 'Y', the move is attempted. (Overrides previous -f option.) -f force overwriting the destination (overrides previous -i option). These options are a part of X/Open Portability Guidelines, later the basis of POSIX and SUS. All POSIX-compliant mv implementations must support these. Examples Note that, in the above example, /mnt referred to the directory (the "mount point") over which a given file system is mounted. Naming such directories /mnt is a popular convention but is by no means necessary. A "file system" can be thought of as an independent tree that is logically regarded as a unit; its root is "mounted" atop a directory of the administrator's choice. Any previous contents of that directory are invisible, but they are "restored" when the new volume is unmounted. See also cp (Unix) ln (Unix) rm (Unix) List of Unix commands move (command) ren (command) References External links Unix SUS2008 utilities Inferno (operating system) commands
797842
https://en.wikipedia.org/wiki/Fortezza
Fortezza
Fortezza is an information security system that uses the Fortezza Crypto Card, a PC Card-based security token. It was developed for the U.S. government's Clipper chip project and has been used by the U.S. Government in various applications. Each individual who is authorized to see protected information is issued a Fortezza card that stores private keys and other data needed to gain access. It contains an NSA approved security microprocessor called Capstone (MYK-80) that implements the Skipjack encryption algorithm. The original Fortezza card (KOV-8) is a Type 2 product which means it cannot be used for classified information. The most widely used Type 1 encryption card is the KOV-12 Fortezza card which is used extensively for the Defense Message System (DMS). The KOV-12 is cleared up to TOP SECRET/SCI. A later version, called KOV-14 or Fortezza Plus, uses a Krypton microprocessor that implements stronger, Type 1 encryption and may be used for information classified up to TOP SECRET/SCI. It, in turn, is being replaced by the newer KSV-21 PC card with more modern algorithms and additional capabilities. The cards are interchangeable within the many types of equipment that support Fortezza and can be rekeyed and reprogrammed by the owners, making them easy to issue and reuse. This simplifies the process of rekeying equipment for crypto changes: instead of requiring an expensive fill device, a technician is able to put a new Fortezza card in the device's PCMCIA slot. The Fortezza Plus card and its successors are used with NSA's Secure Terminal Equipment voice and data encryption systems that are replacing the STU-III. It is manufactured by the Mykotronx Corporation and by Spyrus. Each card costs about $240 and they are commonly used with card readers sold by Litronic Corporation. The Fortezza card has been used in government, military, and banking applications to protect sensitive data. References External links SafeNet web site (Mykotronx is a division of SafeNet) Spyrus web site Litronic web site National Security Agency encryption devices
225577
https://en.wikipedia.org/wiki/Portland%20State%20University
Portland State University
Portland State University (PSU) is a public research university in Portland, Oregon. It was founded in 1946 as a post-secondary educational institution for World War II veterans. It evolved into a four-year college over the following two decades and was granted university status in 1969. It is the only public university in the state of Oregon that is located in a large city. It is governed by a board of trustees. PSU is classified among "R2: Doctoral Universities – High research activity". Portland State is composed of seven constituent colleges, offering undergraduate degrees in one hundred twenty-three fields, and postgraduate degrees in one hundred seventeen fields. Schools at Portland State include the School of Business Administration, College of Education, School of Social Work, College of Urban and Public Affairs, College of the Arts, Maseeh College of Engineering and Computer Science, and the College of Liberal Arts and Sciences. The athletic teams are known as the Portland State Vikings with school colors of green and white. Teams compete at the NCAA Division I Level, primarily in the Big Sky Conference. History 1946–1964: Establishment Portland State University was established as the Vanport Extension Center in June 1946, founded by Stephen Edward Epler, a native of Iowa. Epler graduated from Cotner College in Lincoln, Nebraska, and later Columbia University in New York City, before joining the army to fight in World War II. After returning to the United States after serving, Epler became a veterans' counselor in Oregon's General Extension Division in Portland. The Vanport Extension Center was conceived by Epler in order to satisfy the demand for higher education in Portland for returning World War II veterans, taking advantage of the G.I. Bill. The G.I. Bill was passed in 1944 to provide college, high school or vocational education for returning World War II veterans, as well as one year of unemployment compensation. The first classes were held in the Vanport Junior High School. This first summer session had 221 students, and tuition and fees were $50. Over 1,410 students registered for the 1946 fall term, which was delayed until October 7, 1946, due to a lack of space. Since the population in Vanport was decreasing after World War II, the extension center was able to use buildings created for other purposes: two childcare centers, a recreation building with three classrooms, and a shopping center, which required substantial modification to house a library, offices, and six classrooms. In addition to Vanport Junior High School, Lincoln and Jefferson high schools were used after school hours, as well as the University of Oregon's dental and medical schools, located in Portland. Following the May 30 Vanport Flood of 1948, the college became known as "the college that wouldn't die" for refusing to close after the flood. The term was coined by Lois Hennessy, a student who wrote about the college and the flood in the Christian Science Monitor, though students nicknamed the school "The college without a future." (Hennessy was the mother of poet Gary Snyder.) The school occupied Grant High School in the summer of 1948, then to hastily converted buildings at the Oregon Shipyard, known as the Oregon Ship. In 1953, the school moved to downtown Portland and occupied the vacated buildings of Lincoln High School on SW Broadway Street, including Lincoln Hall, then known as "Old Main." The school changed its name to the Portland State Extension Center between December 1951 and February 1952, and also earned a colloquial title, "The U by the Slough." In 1955, the Center changed its name to Portland State College to mark its maturation into a four-year degree-granting institution, although severe restrictions were placed on the college's curriculum and growth. Epler, who had campaigned for a presidency role at the college, was not elected by the State Board. Without an administrative stake in the college, Epler left and accepted presidency at Reedley College in California. By 1956, the veteran population at the college had subsided, and baby food was no longer stocked in the bookstore. 1965–2000: Expansion and development A team from Portland State entered and won the 1965 General Electric College Bowl the nationally televised quiz show that pitted teams of college students from across the country against each other. The team knocked off its competitors for five consecutive weeks, retiring as champions, and setting a new record for total points scored. The university's Smith Memorial Student Union building was named after team member Michael J. Smith, who competed in the tournament while suffering from cystic fibrosis and died in 1968. Architecture at the university was a topic of controversy in its early stages. In 1968, incoming university president Gregory Wolfe commented that the buildings were distressing evidence of Stalinist cubism on campus, although urban renewal chairman Ira Keller found them to be "perfectly lovely." Portland State University's growth for the next couple of decades was restricted under the Oregon University System's 1929 ruling that no public university or college in Oregon could duplicate the programs offered by another, with grandfathered exclusions for the University of Oregon and Oregon State University. Nevertheless, graduate programs were added in 1961 and doctoral programs were added in 1972. The institution was granted university status by the Oregon State Board of Higher Education in 1969, becoming Portland State University. In 1993, PSU did away with the traditional undergraduate distribution system and adopted a new interdisciplinary general education program known as University Studies. The University Studies curriculum consists of one year of required freshman inquiry courses followed by a year of sophomore inquiry, junior cluster courses (which serve as upperclassmen electives) and, finally, a senior capstone; the senior capstone course serves as a "culmination of the University Studies program," and requires students to take part in a community-based project of their choosing, often followed by a public presentation on their experience in the project. The program garnered national attention for its learning communities, service-learning, senior capstones, and successful retention of first-year students. U.S. News & World Report has on multiple occasions listed University Studies as a "Program to Look For". In 1995, two years before his death, the university honored Stephen Epler for his contributions to the university's origins. 2001–present In 2003 Portland State was approved to award degrees in Black Studies. That same year the university opened a center housed in the Native American Student and Community Center. In 2004 Fariborz Maseeh, an alumnus of the university, donated, through The Massiah Foundation, $8 million to the College of Engineering and Computer Science. The college was renamed the Maseeh College of Engineering and Computer Science. This was the largest single donation to the university at the time and this gift along with others led to, in May 2006, the opening of a new engineering building, the "Northwest Center for Engineering, Science and Technology", which houses much of the college. The LEED gold-certified engineering building reflects the university's increased emphasis on engineering, science and technology. The facility includes classrooms, offices and 41 research and teaching labs. In 2006, Portland State was declared to be the nation's first Salmon Safe University by the nonprofit organization Salmon Safe. The award was given to recognize campus-wide efforts toward environmental sustainability by treating storm water runoff before it reaches the local watershed. On June 3, 2008, the Jimmy and Rosalynn Carter Partner Foundation announced Portland State as the recipient of The Jimmy and Rosalynn Carter Partnership Award for Campus-Community Collaboration for their Watershed Stewardship Program. The program has led over 27,000 community volunteers donating a quarter of a million hours to install 80,000 plants and restore of watershed along of river. Individual projects have been led and supported by 700 students working as part of class projects, resulting in two master's theses and three research articles. In 2017, the university was once again recognized by U.S. News as one of the top 10 most innovative universities in the country, in a list of "schools that the public should be watching because of the cutting-edge changes being made on their campuses. PSU has been on the most innovative list for three consecutive years." In August 2020, citing the George Floyd protests as well as a police-involved shooting in 2018, university President Stephen Percy announced that PSU police will no longer carry firearms on patrol (though firearms will still be stored in the public safety office for use in case of an active shooter situation). In case of dangerous calls, Portland police will respond instead. The policy took effect on September 1, 2021. Academics Portland State offers undergraduate degrees in one hundred twenty-three fields, and postgraduate degrees in one hundred and seventeen. The university has increasingly added more doctoral programs as it has grown from its original mission as a liberal arts undergraduate college into a more broad-based research university. Recently added fields where doctorates are awarded are mathematics, biology, chemistry, applied physics, computer science, applied psychology, engineering & technology management, mechanical engineering, and sociology. Graduate education is now offered in more than 70 master's degree programs, more than 30 graduate certificate programs, and 20 doctoral programs. In 2006, the College of Urban and Public Affairs established Portland State University's first fully online degree. The Division of Criminology and Criminal Justice offers an online bachelor's degree in criminology and criminal justice as well as certificates in Advanced Crime Analysis, Criminal Behavior, Leadership in Criminal Justice, and a post-baccalaureate certificate in Criminology and Criminal Justice. Portland State awarded a total of 6,050 degrees for the 2014–15 academic year, including 4,250 bachelor's degrees, 1,725 master's degrees and 75 doctoral degrees. Admissions According to the U.S. News & World Report and Forbes, the university's acceptance rate was 66% in 2012, which was considered selective for a state university. According to Forbes in their 2015 survey, the university's acceptance rate was 61%. Portland State also has a dual enrollment agreement with Portland Community College and Clackamas Community College that allows students of the two schools to take courses at either school, and also complies with the Associate of Arts Oregon Transfer Degree curriculum (A.A.O.T.), which allows accepted students who have completed two year associate degrees at an Oregon community college to transfer into the university at junior level. Colleges and schools Portland State University's academic programs are organized into nine major academic units: College of Liberal Arts and Sciences - An array of undergraduate, graduate, and certificate programs in over 20 majors, including Anthropology, Applied Linguistics, Biology, Black Studies, Chemistry, Chicano/Latino Studies, Communication, Conflict Resolution, Economics, English, Environmental Programs, Geography, Geology, History, International Studies, Mathematics and Statistics, Native American Studies, Philosophy, Physics, Psychology, Science Education, Sociology, Speech and Hearing Sciences, Women's Studies, and World Languages and Literatures. School of Business Administration - Undergraduate and graduate majors include Business Administration, Financial Analysis, International Management, Marketing and Logistics. Postgraduate and certificate programs include Accounting, International Business Studies, and Food Industry Management. The school also offers doctoral programs as part of the Systems Science doctoral program. College of Education - Graduate and undergraduate programs in initial and continuing licensure, Education (Early Childhood, Elementary, Middle Level, and High School), Educational Leadership, Counseling and various specializations, endorsements, graduate certificates and professional development programs. OHSU-PSU School of Public Health - A joint project with Oregon Health and Science University. Portland State administers the undergraduate programs, which include bachelor's degrees in Applied Health and Fitness or Health Studies, and an Undergraduate Certificate in Human Lactation. OHSU administers the graduate degrees. Maseeh College of Engineering and Computer Science - Undergraduate and graduate programs include Civil, Computer, Electrical, Environmental, and Mechanical Engineering, as well as Computer Science. Graduate programs also include Engineering Management, Manufacturing Engineering, Systems Engineering, Software Engineering, and Technology Management. The school also offers doctoral programs as part of the Systems Science and the Environmental Sciences and Resources doctoral programs. College of the Arts - Undergraduate programs include Architecture, Art (with separate programs in Art Practice, Graphic Design and Social Practice), Art History, Arts Studies, Film, Film Studies, Music, Theater Arts, and Dance. Graduate studies include Architecture, Art, Music, Theater Arts, and Secondary Art Education. School of Social Work - The school offers programs in Social Work at the undergraduate and graduate levels, Undergraduate Child and Family Studies, and Doctoral social work programs. College of Urban and Public Affairs - This college is organized in a series of subsidiary schools focusing on various aspects of Urban and Public Affairs: School of Community Health - Undergraduate and graduate studies in Health Studies and Community Health. The school also offers a graduate certificate in Gerontology. Mark O. Hatfield School of Government - Undergraduate and graduate studies in Criminology/Criminal Justice, Political Science, and Public Administration. Institutes include the Center for Public Service, Criminal Justice Research Policy Institute, Institute for Nonprofit Management, National Policy Consensus Center, Institute for Tribal Government, and the Center for Turkish Studies. Nohad A. Toulan School of Urban Studies and Planning - Undergraduate programs include a major and minor in Community Development, and minors in Real Estate Development and Sustainable Urban Development. Graduate certificates include Real Estate Development, Transportation, and Urban Design. Graduate studies include Urban Studies, as well as Urban and Regional Planning. Institutes include the Center for Urban Studies, Institute of Portland Metropolitan Studies, Center for Population Research Census, Center for Real Estate, and the Center for Transportation Studies. University Honors College - This college is the only urban-focused honors college in the country. In addition, Portland State University, through the School of Extended Studies, offers continuing education and special learning activities, including credit courses, degree-completion programs, distance-learning courses, noncredit community programs, re-licensure, certifications, high school courses, summer programs, and online study. Undergraduate curriculum University Studies In 1993, PSU comprehensively reformed its undergraduate curriculum with a new curriculum called University Studies that is unique to the institution. The curriculum was conceived to address issues of credit distribution which required students in upper-level courses to enroll in classes outside of their majors. In a 1993 summary report on the reform, it was stated that the University Studies sought to incorporate "'across-the-curriculum' themes including writing, diversity and multiculturalism, ethics, and global studies," as well as form a foundation that "includes the capacity and the propensity to engage in inquiry and critical thinking, to use various forms of communication for learning and expression, to gain an awareness of the broader human experience and its environment, and appreciate the responsibilities of persons to themselves, to each other, and to community." PSU's University Studies curriculum begins with Freshman Inquiry courses, which are interactive and theme-based, and "explore topics and issues using an interdisciplinary approach to show how they can be understood from different perspectives." In these courses, professors are paired with junior and senior level students who assist in leading group discussions, as well as a peer mentor who leads smaller inquiry sessions. The Sophomore Inquiry courses are heavily communication-based, and are focused on group dialogue as well as presentations and research projects. These courses are designed to allow sophomore students to explore topics that are complementary to their chosen majors. As students transition into junior level, they are required to enroll in Upper Division Cluster Courses which are more in-depth and focused, as they pertain more closely to the students' chosen majors. Unlike the inquiry courses that make up students' freshmen and sophomore years, the upper-division courses do not feature mentor sessions. The "clusters" from which students choose their courses cover a wide range of disciplines and themes. During their senior year, while still completing upper-division Cluster Courses, students are also required to complete a six-credit senior capstone project in order to graduate. The capstone integrates class work with community-based work. These projects are integrated with local community organizations, and cover a wide range of issues, from social justice to grantwriting, environmental conservation, youth education, and more. Capstone courses often conclude with a public presentation from the students on their experiences with the community organization or cause which they explored. The university received national recognition for the program from the U.S. News & World Report, the W.K. Kellogg Foundation, the Corporation for National Service, the Atlantic Foundation, and the Pew Charitable Trust for the innovative pedagogical approach to undergraduate education. Research The Carnegie Classification of Institutions of Higher Education ranks Portland State as a university with "higher research activity." The 1.4 million-volume, six-floor Branford Price Millar Library is located in the center of campus, opposite Fariborz Maseeh Hall on Park Avenue, and has several computer labs, technology and faculty reading rooms, and video viewing rooms. Built in 1966 as a rectangular structure, the library's convex wall of glass facing the campus' park blocks was added in 1989 to surround and preserve a large copper beech tree that was planted in 1890. The Millar Library houses approximately 1,422,427 volumes, 640 print subscriptions, 97,065 accessible electronic books, 2,592,288 microforms, 69,762 maps, and 133,978 audio-visual materials. It is also a repository for federal documents, housing over 400,000 government documents. The Millar Library is open to the public, and allows non-students access to their catalogues of PDF files and published online journals. Rankings U.S. News & World Report ranked Portland State as a second tier research university in their 2017 report, but listed it as unranked nationally. The university is ranked among The Best 376 Colleges in its 2012 edition, "Best in the West", and as a "College With a Conscience" by The Princeton Review. Portland State's MBA (Master's of Business Administration) was ranked in the top 100 by The Princeton Review, who also named Portland State as one of the best institutions in the country for undergraduate education. In 2015, the university ranked at number 16 as one of the "Most Innovative" colleges in the nation. Portland State University's School of Business Administration is also ranked in surveys, such as The Princeton Review'''s Best 294 Business Schools. U.S. News & World Report currently ranks Portland State University's graduate Urban & Regional Planning Program as the 14th best in the Nation. Planetizen currently ranks the university's graduate Urban & Regional Planning Program, at the Nohad A. Toulan School of Urban Studies and Planning, within the top 25 best urban planning programs in the nation. Other top programs/colleges at Portland State University include its graduate College of Urban and Public Affairs which is ranked 46th in the nation, its Rehabilitation Counseling and Social Work graduate degrees ranked 23rd and 33rd respectively, its Speech-Language Pathology program is ranked 62nd, as well as its Graduate School of Education is ranked as being among the "Best" by U.S. News & World Report. The university is listed by U.S. News & World Report as having one of The Best Undergraduate Engineering Programs. The Carnegie Foundation ranked PSU as a Top School in Curricular Engagement, Outreach, and Partnerships, and it is ranked as the ninth Best Neighbor Universities. Aside from academics, Portland State University is world-renowned for its sustainability and green initiatives. PSU has a Gold STARS Rating for Sustainability, is ranked among the Nation's Top Green Schools and has a Top Green Business School ranking by The Princeton Review, it is also home to seven LEED-certified schools. Campus The majority of the PSU campus is located across a section of southwest downtown Portland, in an area known as the University District. The campus is situated against the West Hills, and is bound by Clay Street to the north, Fourth Avenue to the east, Interstate 405 to the south, and 12th Avenue to the west. SW Broadway runs through the center of the campus, where the university's central buildings are located: Lincoln Hall, Cramer Hall, Smith Memorial Student Union, Fariborz Maseeh Hall, and Shattuck Hall; Cramer Hall, Smith Memorial, and Fariborz Maseeh Hall are connected by tunnels on the basement levels, as well as by skybridges on the upper levels, which allows students access between buildings without having to use street sidewalks. The university's South Park Blocks, situated on the opposite side of the central buildings, run parallel to Park Avenue, and begin at Market Street where Lincoln Hall is located, and end at Shattuck Hall. The northern edge of the PSU campus is eight blocks away from Pioneer Courthouse Square, and four blocks from the Portland Art Museum. The Keller Auditorium is located at the northwestern edge of the campus, on 3rd Ave. and Clay St. In 2010, the university opened a $62 million Gold LEED (Leadership in Energy and Environmental Design) Certified Student Rec Center. The six-story building houses an aquatics center, climbing wall, basketball/volleyball/badminton courts, an indoor soccer court, a large fitness area, and an outdoor program; it is located in the university's Urban Center, a quadrangle which is also home to the College of Urban and Public Affairs, the university bookstore, and several restaurants; the Portland Streetcar runs west through the center. The student-managed PSU Film Committee operates the 5th Avenue Cinema, one of the only student operated theaters in the United States. The cinema is open to the public and screens films weekly, with students receiving free admission, and many of the university's film studies courses are held in the screening rooms. Residence halls Although largely a commuter school, PSU houses around 3,000 undergraduate and graduate students, and has ten residence halls. Its largest include University Pointe, a sixteen-story apartment building operated by American Campus Communities built in 2011, and Ondine, a fifteen-story high rise. Older residence halls, many of which were originally apartment buildings that were purchased by the university, include Blackstone, built in 1930, and Montgomery Court, built in 1916; other older residence halls include St. Helens Court, built in 1927 and soon to be demolished; the art deco Parkway Manor, built in 1931; and Blumel Hall, built in 1986. Other residence buildings were constructed post-millennium, including the Stephen Epler Hall (built in 2003) and the Broadway (built in 2004). Further steps toward increasing housing capacity — and university control over its own housing — are being taken with plans for further construction, and with Portland State taking over management of the residence halls it currently owns. In March 2007, Portland State University took over the managing of the on-campus housing at Portland State University. College Housing Northwest, which has managed the on-campus housing buildings (including the Broadway, Stephen Epler Hall, West Hall, King Albert Hall, St. Helens, Montgomery Court, and Ondine) for over 30 years, will still maintain its off-campus housing (including Goose Hollow, The Palidian, The Cambrian, and Clay). Greek system Optional residential and social opportunities exist with a small but active Greek system, which includes: Art and galleries Portland State University has numerous pieces of public art around campus from renowned local, national and international artists, such as Frederic Littman, Thomas Hardy, Ken MacKintosh & Lillian Pitt, Emily Ginsburg, Harrell Fletcher with Avalon Kalin, Linda Stein, John Aiken, and Ed Carpenter. There are several art galleries and spaces for exhibiting art at PSU: the MK Gallery, AB Gallery and Sugar Cube Gallery within PSU's School of Art + Design; the Broadway Gallery in Lincoln Performance Hall; and the Littman + White Galleries in Smith Memorial Student Union. Littman + White Galleries are among the United States' only student-run contemporary art galleries. In 2018, the Autzen Gallery at Neuberger Hall was closed amid restorations for the building, and will be replaced with the Jordan Schnitzer Museum of Art at Portland State University. Sustainability The university has made great efforts to make its buildings environmentally sustainable, both in its new architecture as well as through renovation of its older buildings. In September 2008 the James F. and Marion L. Miller Foundation awarded Portland State University a $25 million challenge grant. The grant and the funds raised to match it must be used exclusively for sustainability programs. Portland State's sustainability research and education, led by Jennifer Allen, director of the Portland State Institute for Sustainable Solutions, is focused on four primary areas of inquiry: creating sustainable urban communities, the integration of human societies and the natural environment, implementing sustainability and mechanisms of change and measuring sustainability. Since 1998, the Miller Foundation has also contributed more than $5.3 million to Portland State. , eight buildings on the PSU campus are LEED-certified, two of which are at Platinum status, and the university announced plans for renovations on Neuberger Hall to bring it to LEED certification as well in 2014. Portland State has been named among the most eco-friendly universities in the United States. In addition to the university's eco-conscious architecture and reconstructive work, it has also been recognized for its utilization of mass transit, including light rail, streetcar, and bus systems all central to the campus. It has also been recognized for its abundance of bicycle transportation; in 2013, PSU was ranked one of America's six most bike-friendly universities, third to Stanford University and University of California, Davis. Outside Shattuck Hall, the university's architecture department constructed the Shattuck Hall Ecological Learning Plaza, a garden featuring green walls, solar panels, and permeable pavement. The university also features its own community garden. Student life Student body Portland State differs from the other universities in Oregon partially because, as an urban institution, it attracts a student body older than other universities; in the 2010–2011 school year, it was reported that the average age of an attending undergraduate student was 26 years. Some programs only offer night classes. PSU also delayed the development of its campus for decades after its founding. The institution sold land in a neighboring block soon after its move to downtown Portland, and delayed the construction of student housing until the early 1970s. The student government is the Associated Students of Portland State University (ASPSU). In addition to a student body President and Vice President, there is a Student Fee Committee, a 25-member Student Senate, and a Judicial Board which rules on ASPSU constitutional questions. There are also a number of university committees that have student members appointed by the ASPSU President. Portland State also participates in the Oregon Student Association, the statewide student lobbying non-profit. Publications The fully student-run newspaper at Portland State is the Portland State Vanguard, established in 1946. Student-run broadcasters run radio station KPSU which is ranked in the Top 20 College Radio Stations by several organizations and is one of only a handful of "Free Format" radio stations in the country, and television station PSU TV. The Portland Review is a literary magazine of poetry, fiction, and art published by PSU's Student Publications Board since 1956. Additional student newspapers at PSU were The Rearguard, an alternative-monthly newspaper, and The Spectrum. Following budget cuts for these publications, they were consolidated into a monthly magazine The Pacific Sentinel'' in January 2016. Human resources The university houses a Women's Resources center, a Disability Resources center, a Resource Center for Students with Children, a Queer Resource Center for LGBT students, and a Veteran's Resource Center. Fraternities and sororities at Portland State University are represented by a student-run group called "Greek Life" or "Greek Council". The council's purpose is to facilitate between the university and the Greek Community on campus, provide a venue for communication between individual Chapters, and to facilitate socials, fundraisers, and other philanthropic events. The council is made up of six executive offices (President, Vice President, Secretary, Treasurer, Special Events Chair, and Public Relations) and represents the following Greek Organizations to date: Alpha Kappa Alpha, Alpha Kappa Psi, Alpha Phi Alpha, Alpha Chi Omega, Kappa Sigma, Omega Delta Phi and Phi Delta Theta. Transportation The university contains four parking structures for automobiles: two located on 6th Avenue; one on 12th Street at the northwestern edge of the campus; and one 5th Avenue between Montgomery and Harrison Streets. A guest parking lot is located on the south end of Shattuck Hall. Portland State University is serviced with mass transit by TriMet, which includes fifteen bus lines as well as the MAX light rail system. The MAX Green Line, MAX Yellow Line, and Portland Streetcar all service the university, with numerous stops located within the campus. The Green Line runs to the southernmost point of the university, at the PSU South MAX Station, located at SW 6th & College; the north-bound Yellow Line stop is at 5th & Jackson. Both lines have stops at PSU Urban Center stations, which is located at the center of the campus. The Urban Center plaza also has connections to the Portland Streetcar's NS Line as well as TriMet buses. There are also shuttles available through Oregon Health & Science University and Portland Community College on SW Harrison Street at SW Broadway. In addition to use of mass transit, the university also has a large population of students who travel by bicycle. Athletics Portland State competes at the NCAA Division I level in football, basketball, women's volleyball, golf, soccer, tennis, softball, indoor and outdoor track and field, and cross country as a member of the Big Sky Conference. The football team competes in Division I FCS (Football Championship Subdivision). Prior to joining Division I, the school won NCAA National Division II championships in women's volleyball and wrestling. The school has also placed second twice nationally in football and once in women's basketball at the Division II level. Portland State's colors are green and white, and its mascot is the Viking personified as "Victor E. Viking". Among the two more notable former Portland State athletes are Freeman Williams and Neil Lomax. Williams was the NCAA Division I national men's basketball individual scoring leader in 1977 and 1978. Lomax was a record-setting quarterback who went on to star for the St. Louis Cardinals in the NFL in the mid-1980s. Football's "Run & Shoot" offense was first implemented at the college level at PSU by coach Darryl "Mouse" Davis. An assistant coach at Portland State, Davis took over as head coach in 1975 following the departure of Ron Stratten. Behind his revolutionary new "Run-and-Shoot" offense (developed in the late 1960s at Hillsboro (OR) HS) and a strong-armed quarterback named June Jones, Davis led the Viking program to new heights— an 8–3 record, including a perfect 5–0 home mark. Davis' quarterback protégés were Lomax and Jones. Home games for football are held off-campus at Hillsboro Stadium, and home games for basketball are held on-campus in the Viking Pavilion. In 2008, the men's basketball team earned their first ever bid into the NCAA tournament. The university has 30 student-managed club sports on campus including the PSU Rugby Club, the PSU Ice Hockey Club and the PSU Lacrosse Club. In addition, the Student Activities and Leadership Program sponsors 120 student clubs including the Tango, Fencing, Medieval and Brewers' clubs. Alumni and faculty Notable alumni The university has several alumni in law and government, including Barbara Roberts, the 34th Governor of Oregon, U.S. Federal Judge Anna J. Brown, and American diplomats Joseph LeBaron and Marisa Lino. Betty Roberts, the first woman to serve on the Oregon Supreme Court, and Margaret Carter, the first African American woman elected to the Oregon House of Representatives, are also graduates of the university. Casten Nemra, the seventh president of the Republic of the Marshall Islands, and Arnold I. Palacios the 12th Lt. Governor of the Commonwealth of the Northern Mariana Islands are graduates of Portland State University as well. Portland State has produced many academics across the sciences and humanities; alumni include: cultural anthropologist and professor at Duke University Lee D. Baker; Michael Kazin, historian and professor at Georgetown University; Dali Yang, professor of political science at the University of Chicago; Thomas Talbott, professor of philosophy at Willamette University; and Hans G. Furth, professor of psychology at The Catholic University of America. Businessman and engineer Norm Winningstad, United Parcel Service CEO D. Scott Davis, and Judi Hofer, executive CEO of The May Department Stores Company are also graduates. Business magnate and co-founder and chairman of Nike, Inc., Phil Knight was an assistant professor of business at the university, and his son, animator and CEO of Laika, Travis Knight, is an alumnus. Carolyn Davidson, an alumnus of the university's visual arts department, invented the Nike swoosh while she was a student there. Tarah Wheeler, cybersecurity executive and author of Women In Tech, received her MS in Political Science from the Hatfield School. Writer Francisco Laguna Correa; poets Michael Dickman and John Sibley Williams; and novelists Deborah J. Ross and David James Duncan are among the university's alumni; Mike Richardson, publisher and founder of Dark Horse Comics, is an alumnus as well. In 2007, Dark Horse donated copies of all of its published works to the PSU Library, which maintains both a browsing collection of book titles, in addition to a research collection which also includes every "print, poster, statue, figure, and all other products." In the sciences, the university's alumni base include computer scientist and Turing Award winner Ivan Sutherland, theoretical physicist Mohammad Aslam Khan Khalil, autism researcher Paul Shattuck, and Antarctic researcher Jill Mikucki. Several social activists are among alumni as well, including British political scientist and peace-building initiative pioneer Harry Anastasiou; Native American activist Robert Robideau; gay rights activist Paul Popham, who founded the Gay Men's Health Crisis in New York City and social activist and recipient of the Director's Community Leadership Award (DCLA) Musse Olol. The university's contribution to performing arts and entertainment include actors Mark Dacascos and Terence Knox; four-time Grammy Award-winning jazz musician Esperanza Spalding; film composer Rob Simonsen; and Jack Ely, guitarist of The Kingsmen. Emmy-winning writer, stand-up comedian, and fantasy draft expert; Ian Karmel. Alternative rock singer and guitarist Courtney Love of Hole also attended the university, but did not graduate. Sportsmen who attended Portland State include football players Adam Heyward, Tony Curtis, Super Bowl XLVIII Champion DeShawn Shead, Julius Thomas, two-time Super Bowl Champion (XVII, XXII) Clint Didier, Dave Stief, and Neil Lomax. Freeman Williams, who has the second-highest NCAA score in NBA history, is also an alumnus. Notable current and former faculty References Further reading External links Portland State University Athletics website Universities and colleges accredited by the Northwest Commission on Colleges and Universities Educational institutions established in 1946 1946 establishments in Oregon Universities and colleges in Portland, Oregon Public universities and colleges in Oregon
29860060
https://en.wikipedia.org/wiki/University%20of%20Colorado%20Boulder%20Computer%20Science%20Department
University of Colorado Boulder Computer Science Department
The Computer Science Department at the University of Colorado Boulder is an academic department in the College of Engineering and Applied Science focusing on the teaching and research of Computer Science. The department was founded in 1970 and was later inducted into the College of Engineering and Applied Science in 1980. The department offers both undergraduate and graduate degree programs as well as a minor in Computer Science. Academic programs Undergraduate The department offers a Bachelor of Science in computer science as well as a minor. The four year undergraduate degree program typically culminates in a year-long senior projects course in which industry groups submit projects for groups of students to work on. The department also offers a working and studying area known as the Computer Science Educational Labs (CSEL). It is a common gathering place for students enrolled in at least one computer science course at the university, providing computing resources in the form of Ubuntu workstations. A student-led group called the Computer Science Undergraduate Advisory Committee (CSUAC) works with students and faculty to improve the undergraduate program and provides resources such as career fairs and other community events. Graduate The graduate program offers either a MS or ME or a Ph.D. The program places a high priority on research and the placement of its students in future careers. The department is supported by $4 million annually in the form of research grants primarily from federal agencies such as the National Science Foundation. Graduate students research in many areas, including human-computer interaction, neural networks, numerical and parallel computation, databases, networks, software engineering, systems, and theoretical computer science. Research Currently, the department has 34 research faculty and 18 administrative staff. Some of the more prevalent realms of research include computer architecture, mobile computing, computer security, computational biology, robotics, algorithm design, artificial intelligence, web engineering, programming languages, computer-supported cooperative work, machine learning, lifelong learning and design, speech and language processing, and scientific computing. Achievements and awards The department has received four successive five-year awards from the NSF and Comparative Effectiveness Research to support both research and infrastructure. The department also received the largest ever gift to a public university in the form of $250 million to fund research to improve the lives of people diagnosed with cognitive disabilities. The department is a member of the ARPA National Consortium in High Performance Computing. Apple co-founder Steve Wozniak donated money to create the "Woz Lab" within the Computer Science Education Lab. Wozniak studied at the university in the late 1960s. Notable faculty and alumni Alan Kay Andrzej Ehrenfeucht David Haussler Eugene Myers Steve Wozniak, honorary Doctor of Engineering References University of Colorado Department of Computer Science External links University of Colorado Boulder Department of Computer Science College of Engineering and Applied Science, University of Colorado Boulder University of Colorado Boulder Colorado Computer Science Department
6061230
https://en.wikipedia.org/wiki/XTS-400
XTS-400
The XTS-400 is a multilevel secure computer operating system. It is multiuser and multitasking that uses multilevel scheduling in processing data and information. It works in networked environments and supports Gigabit Ethernet and both IPv4 and IPv6. The XTS-400 is a combination of Intel x86 hardware and the Secure Trusted Operating Program (STOP) operating system. XTS-400 was developed by BAE Systems, and originally released as version 6.0 in December 2003. STOP provides high-assurance security and was the first general-purpose operating system with a Common Criteria assurance level rating of EAL5 or above. The XTS-400 can host, and be trusted to separate, multiple, concurrent data sets, users, and networks at different sensitivity levels. The XTS-400 provides both an untrusted environment for normal work and a trusted environment for administrative work and for privileged applications. The untrusted environment is similar to traditional Unix environments. It provides binary compatibility with Linux applications running most Linux commands and tools as well as most Linux applications without the need for recompiling. This untrusted environment includes an X Window System GUI, though all windows on a screen must be at the same sensitivity level. To support the trusted environment and various security features, STOP provides a set of proprietary APIs to applications. In order to develop programs that use these proprietary APIs, a special software development environment (SDE) is needed. The SDE is also needed in order to port some complicated Linux/Unix applications to the XTS-400. A new version of the STOP operating system, STOP 7 has since been introduced, with claims to have improved performance and new features such as RBAC. Uses As a high-assurance, MLS system, XTS-400 can be used in cross-domain solutions, which typically need a piece of privileged software to be developed which can temporarily circumvent one or more security features in a controlled manner. Such pieces are outside the CC evaluation of the XTS-400, but they can be accredited. The XTS-400 can be used as a desktop, server, or network gateway. The interactive environment, typical Unix command line tools, and a GUI are present in support of a desktop solution. Since the XTS-400 supports multiple, concurrent network connections at different sensitivity levels, it can be used to replace several single-level desktops connected to several different networks. In support of server functionality, the XTS-400 can be implemented in a rackmount configuration, accepts an uninterruptible power supply (UPS), allows multiple network connections, accommodates many hard disks on a SCSI subsystem (also saving disk blocks using a sparse file implementation in the file system), and provides a trusted backup/save tool. Server software, such as an Internet daemon, can be ported to run on the XTS-400. A popular application for high-assurance systems like the XTS-400 is to guard information flow between two networks of differing security characteristics. Several customer guard solutions are available based on XTS systems. Security XTS-400 version 6.0.E completed a Common Criteria (CC) evaluation in March 2004 at EAL4 augmented with ALC_FLR.3 (validation report CCEVS-VR-04-0058.) Version 6.0.E also conformed with the protection profiles entitled Labeled Security Protection Profile (LSPP) and Controlled Access Protection Profile (CAPP), though both profiles are surpassed in functionality and assurance. XTS-400 version 6.1.E completed evaluation in March 2005 at EAL5 augmented with ALC_FLR.3 and ATE_IND.3 (validation report CCEVS-VR-05-0094), still conforming to the LSPP and CAPP. The EAL5+ evaluation included analysis of covert channels and additional vulnerability analysis and testing by the National Security Agency. XTS-400 version 6.4.U4 completed evaluation in July 2008 at EAL5 augmented with ALC_FLR.3 and ATE_IND.3 (validation report CCEVS-VR-VID10293-2008), also still conforming to the LSPP and CAPP. Like its predecessor, it also included analysis of covert channels and additional vulnerability analysis and testing by the National Security Agency. The official postings for all the XTS-400 evaluations can be seen on the Validated Product List. The main security feature that sets STOP apart from most operating systems is the mandatory sensitivity policy. Support for a mandatory integrity policy, also sets STOP apart from most MLS or trusted systems. While a sensitivity policy deals with preventing unauthorized disclosure, an integrity policy deals with preventing unauthorized deletion or modification (such as the damage that a virus might attempt). Normal (i.e., untrusted) users do not have the discretion to change the sensitivity or integrity levels of objects. The Bell–LaPadula and Biba formal models are the basis for these policies. Both the sensitivity and integrity policies apply to all users and all objects on the system. STOP provides 16 hierarchical sensitivity levels, 64 non-hierarchical sensitivity categories, 8 hierarchical integrity levels, and 16 non-hierarchical integrity categories. The mandatory sensitivity policy enforces the United States Department of Defense data sensitivity classification model (i.e., "Unclassified," "Secret," "Top Secret"), but can be configured for commercial environments. Other security features include: Identification and authentication, which forces users to be uniquely identified and authenticated before using any system services or accessing any information; the user's identification is used for access control decisions and for accountability via the auditing mechanism; Discretionary access control (DAC), which appears just as in Unix, including the presence of access control lists on every object; the set-id function is supported in a controlled fashion; A mandatory subtype policy, which allows some of the functionality of trusted systems which support a full type enforcement or domain-type enforcement policy; Auditing of all security-relevant events and trusted tools to allow administrators to detect and analyze potential security violations; Trusted path, which allows a user to be sure s/he is interacting directly with the trusted security functions (TSF) during sensitive operations; this prevents, for example, a Trojan horse from spoofing the login process and stealing a user's password; Isolation of the operating system code and data files from the activity of untrusted users and processes which, in particular, prevents malware from corrupting or otherwise affecting the system; Separation of processes from one another (so that one process/user cannot tamper with the internal data and code of another process); Reference monitor functionality, so that no access can bypass scrutiny by the operating system; Strong separation of administrator, operator, and user roles using the mandatory integrity policy; Residual information (i.e., object reuse) mechanisms to prevent data scavenging; Trusted, evaluated tools for configuring the system, managing security-critical data, and repairing file systems; Self-testing of security mechanisms, on demand; Exclusion of higher layer network services from the TSF, so that the TSF is not susceptible to the publicly known vulnerabilities in those services. STOP comes in only a single package, so that there is no confusion about whether a particular package has all security features present. Mandatory policies cannot be disabled. Policy configuration does not require a potentially complicated process of defining large sets of domains and data types (and the attendant access rules). To maintain the trustworthiness of the system, the XTS-400 must be installed, booted, and configured by trusted personnel. The site must also provide physical protection of the hardware components. The system, and software upgrades, are shipped from BAE Systems in a secure fashion. For customers who want them, XTS-400 supports a Mission Support Cryptographic Unit (MSCU) and Fortezza cards. The MSCU performs type 1 cryptography and has been separately scrutinized by the United States National Security Agency. Hardware The CC evaluation forces particular hardware to be used in the XTS-400. Though this places restrictions on the hardware configurations that can be used, several configurations are possible. The XTS-400 uses only standard PC, commercial off-the-shelf (COTS) components, except for an optional Mission Support Cryptographic Unit (MSCU). The hardware is based on an Intel Xeon (P4) central processing unit (CPU) at up to 2.8 GHz speeds, supporting up to 2 GB of main memory. A Peripheral Component Interconnect (PCI) bus is used for add-in cards such as Gigabit Ethernet. Up to 16 simultaneous Ethernet connections can be made, all of which can be configured at different mandatory security and integrity levels. A SCSI subsystem is used to allow a number of high-performance peripherals to be attached. One SCSI peripheral is a PC Card reader that can support Fortezza. Multiple SCSI host adapters can be included. History The XTS-400 has been preceded by several evaluated ancestors, all developed by the same group: Secure Communications Processor (SCOMP), XTS-200, and XTS-300. All of the predecessor products were evaluated under Trusted Computer System Evaluation Criteria (TCSEC) (a.k.a. Orange Book) standards. SCOMP completed evaluation in 1984 at the highest functional and assurance level then in place: A1. Since then the product has evolved from proprietary hardware and interfaces to commodity hardware and Linux interfaces. The XTS-200 was designed as a general-purpose operating system supporting a Unix-like application and user environment. XTS-200 completed evaluation in 1992 at the B3 level. The XTS-300 transitioned from proprietary, mini-computer hardware to COTS, Intel x86 hardware. XTS-300 completed evaluation in 1994 at the B3 level. XTS-300 also went through several ratings maintenance cycles (a.k.a. RAMP), very similar to an assurance continuity cycle under CC, ultimately ending up with version 5.2.E being evaluated in 2000. Development of the XTS-400 began in June 2000. The main customer-visible change was specific conformance to the Linux API. Though the security features of the XTS system put some restrictions on the API and require additional, proprietary interfaces, conformance is close enough that most applications will run on the XTS without recompilation. Some security features were added or improved as compared to earlier versions of the system and performance was also improved. As of July 2006, enhancements continue to be made to the XTS line of products. On September 5, 2006, the United States Patent Offices granted BAE Systems Information Technology, LLC. United States Patent # 7,103,914 "Trusted computer system". Architecture STOP is a monolithic kernel operating system (as is Linux). Though it provides a Linux-compatible API, STOP is not derived from Unix or any Unix-like system. STOP is highly layered, highly modularized, and relatively compact and simple. These characteristics have historically facilitated high-assurance evaluations. STOP is layered into four rings and each ring is further subdivided into layers. The innermost ring has hardware privilege and applications, including privileged commands, run in the outermost. The inner three rings constitute the kernel. Software in an outer ring is prevented from tampering with software in an inner ring. The kernel is part of every process's address space and is needed by both normal and privileged processes. A security kernel occupies the innermost and most privileged ring and enforces all mandatory policies. It provides a virtual process environment, which isolates one process from another. It performs all low-level scheduling, memory management, and interrupt handling. The security kernel also provides I/O services and an IPC message mechanism. The security kernel's data is global to the system. Trusted system services (TSS) software executes in ring 1. TSS implements file systems, implements TCP/IP, and enforces the discretionary access control policy on file system objects. TSS's data is local to the process within which it is executing. Operating system services (OSS) executes in ring 2. OSS provides Linux-like API to applications as well as providing additional proprietary interfaces for using the security features of the system. OSS implements signals, process groups, and some memory devices. OSS's data is local to the process within which it is executing. Software is considered trusted if it performs functions upon which the system depends to enforce the security policy (e.g., the establishment of user authorization). This determination is based on integrity level and privileges. Untrusted software runs at integrity level 3, with all integrity categories, or lower. Some processes require privileges to perform their functions—for example the Secure Server needs to access the User Access Authentication database, kept at system high, while establishing a session for a user at a lower sensitivity level. Potential weaknesses The XTS-400 can provide a high level of security in many application environments, but trade-offs are made to attain it. Potential weaknesses for some customers may include: Lower performance due to more rigid internal layering and modularity and to additional security checks; Fewer application-level features available out-of-the-box; Some source level changes may be necessary to get complicated applications to run; The trusted user interface does not utilize a GUI and has limited command line features; Limited hardware choices; Not suited for embedded or real-time environments. References External links , BAE XTS-400 EAL5+ validated product page XTS-400 EAL5+ archived validated product page XTS-400 EAL4+ archived validated product page United States Patent 7,103,914: Trusted computer system Paper on the need for secure operating systems and mandatory security Monterey Security Architecture (MYSEA), a Naval Postgraduate School project which utilized the STOP OS XMPP & Cross Domain Collaborative Information Environment (CDCIE) Overview, multinational information sharing in both single and cross domain environments (utilizes STOP OS) BAE Systems Operating system security Computer security procedures Evaluation of computers
963048
https://en.wikipedia.org/wiki/Carson%20Palmer
Carson Palmer
Carson Hilton Palmer (born December 27, 1979) is a former American football quarterback who played in the National Football League (NFL) for 15 seasons, primarily with the Cincinnati Bengals and Arizona Cardinals. Palmer played college football at USC where he won the Heisman Trophy in 2002. The first overall pick in the 2003 NFL Draft, Palmer was chosen by the Bengals, for whom he played eight seasons. During his tenure in Cincinnati, he helped lead the team to its first winning season and playoff appearance in 15 years and was named to two Pro Bowls. Amid declining success and conflicts with Bengals ownership, Palmer was traded to the Oakland Raiders, where he played two seasons before joining Arizona. With the Cardinals, Palmer resumed the high level (albeit injury prone) play he had been accustomed to earlier in his career. He enjoyed his most successful year in 2015, aiding the Cardinals in reaching the NFC Championship Game and being named to his third Pro Bowl, in addition to being a second-team All-Pro. Palmer retired following the 2017 regular season after spending much of the year on injured reserve. Early years Palmer was born in Fresno, California. By the time he was in seventh grade, Palmer had remarkable size and arm strength for his age. His father, Bill Palmer, enrolled him in private classes in Orange County, where he was later taught by quarterback guru Bob Johnson. He went on to attend Santa Margarita Catholic High School in Rancho Santa Margarita, California. At Santa Margarita High School, he would play on their high school football team. As the quarterback on the freshman team, Palmer was so good that members of the varsity team would halt practices to watch him play. After a successful stint as a starter his junior year, Palmer started to field offers from USC, Notre Dame, Colorado, Miami (Florida), and reportedly San Diego State and Northern Arizona University (where his mother attended college). He followed up a stellar junior season with a remarkable senior season, cementing himself as one of the most touted players ever to come out of Santa Margarita Catholic High School. In his senior season, he led Orange County with a 203.9 quarterback rating. He was named to the first-team all-league and All-CIF despite suffering a stress fracture in his right foot. Palmer finished his high school career with 27 school records and 2 straight CIF championships. College career Freshman season Palmer entered the University of Southern California in 1998, where he played for head coach Paul Hackett the first three years of his college career. He began the season as a back-up to Mike Van Raaphorst. They split time throughout the first 8 games, with Palmer mainly coming in during the second half. The Trojans' season opener was played against Purdue. Palmer only played for three series in the second half and went 3-of-6 and 79 passing yards. The next week, he came in at quarterback during the third quarter and threw his first career touchdown pass while playing against San Diego State. In week 4, he almost played the entire second half in a 30–10 loss to the number-10 Florida State. He bounced back the next week in a comeback win against Arizona State, finishing the game with 4 completions for 69 yards and a touchdown. In the week-8 match-up with Oregon, he came in sporadically but finished the game with a season-high 10/19 completions for 179 yards. After losing to Oregon, Palmer got his first career start the next week against Washington, making him the first true freshman quarterback to start for USC since Rob Johnson in 1991. He finished the game with 18/31 completions, 279 passing yards, and 1 touchdown. He continued as the starter the next week, racking up 19-of-26 completions, 203 yards, and a touchdown in a win against Stanford. In week 11, Palmer started against number 3 UCLA, in what was his toughest test yet. Although his team lost, he had a career-high 28/43 completions, 252 yards, and 1 passing touchdown. The Trojans won 10–0 against #9 Notre Dame in their regular season finale, with Palmer finishing with 14/32 completions, 188 passing yards, and his first career rushing touchdown. Palmer started his first career bowl game against TCU in the Sun Bowl. He was sacked 6 times and completed 17-of-28 passes, 280 passing yards, and 1 touchdown. He ended his freshman season with 130 completions, 235 attempts(55.3%), 1,755 passing yards, 116 rushing yards, 7 passing touchdowns, 6 interceptions, and a rushing touchdown. Sophomore seasons Going into his sophomore year in 1999, he was named the starting quarterback of the Trojans. The season opener was against Hawaii and Palmer played in a little more than two quarters. He finished the game with 14/16 completions (87.5%), 167 passing yards, 1 touchdown pass, and a 9-yard rushing touchdown. The next week against San Diego State he completed 16/24 passes for 188 passing yards and 2 touchdowns. On September 25, Palmer started the game against Oregon, throwing 9 completions for 135 yards. Before halftime, he broke his collarbone while scrambling for a 3-yard gain. This injury effectively ended his season. In only three games he had 39/53 completions (73.6%), 490 passing yards, 3 passing touchdowns, 3 interceptions, and a single rushing touchdown. The NCAA let him use his redshirt, although he had already played in 3 games. After being sidelined for the last 11 months, Palmer returned to his starting role in 2000. He made his return in week 1 against #22 Penn State, going for 10/20 completions for 87 yards and an interception. The following game, Palmer led the Trojans 72-yards down the field with 1:14 left in the fourth quarter. This set up the game-winning field goal against Colorado, putting USC up 17–14. He threw for 25/30(83.3%), 275 passing yards, and a touchdown. The very next week he led another comeback win against San Jose State, bringing USC back from a 12-point deficit in the fourth quarter. Palmer ended the game with 22/38 completions, a career-high 338 passing yards, and 2 touchdowns. After 5 consecutive losses, he started in week 10 against Arizona State and end the game with 22 of 37 completions, for 279 passing yards, 2 touchdowns, and 2 interceptions in the double overtime victory. Palmer started the first half the next game against the Washington and was benched the second half for Mike Van Raaphorst, after going 12 of 26 for 145 yards and an interception. After being benched, he returned against rival UCLA the next game, and had a career-high 350 yards, and 4 touchdowns while throwing 26/37 completions. His performance against the Bruins won him PAC-10 Offensive Player of the Week and USC's Game MVP. In the regular season finale, against Notre Dame, he completed 17 of 35 passes for 251 yards, 2 passing touchdowns, 2 interceptions, and lead USC with 22-yards rushing and 1 rushing touchdown. USC finished the season with a 5–7 record and Palmer finished with 228 completions, 414 attempts(54.9%) 2914 passing yards, 16 touchdowns, and 18 interceptions. Junior season Following a 6–6 record in 1999 and a 5–7 record in 2000, Paul Hackett stepped down as head coach. 2001 marked Pete Carroll's first season with USC and under a new revamped offense, Palmer threw 21/28 completions, 213 passing yards, and an interception in the season opener against San Jose State. During a week 4 loss at Oregon, he threw 25/40 completions, for a career-high 411 yards, 3 interceptions, and a career-high 75-yard touchdown pass and a 93-yard touchdown pass. After four consecutive losses, where he threw a total of 4 touchdowns and 5 interceptions, USC finally received a win against Arizona State with Palmer going 18/26 for 295 passing yards and 3 touchdowns. The next week at Notre Dame, although being sacked 5 times, he finished with 19 of 30 completions, 230 passing yards, 2 touchdowns, and 2 interceptions. Palmer defeated Oregon State in week 10, after going 21 of 28, for 171 passing yards, and an interception. The game came down to overtime, where Palmer bootlegged for a 4-yard scramble, broke one tackle, and dove at the pylon for the game-winning touchdown. After 4 wins in-a-row, USC lost to Utah, and Palmer finished the game with 15 of 26 completions for 150 yards. Although his first season under new head coach Pete Carroll ended with a 6–6 record, he finished his season with 221 completions, 377 attempts(58.6%), 2,717 passing yards, 13 passing touchdowns, and 12 interceptions in 12 starts. Senior season After proving himself to be one of the nation's top college quarterbacks his junior year, he returned to USC for a fifth year in 2002. Palmer resumed the role as starting quarterback for the fourth consecutive year and was voted the team captain. For the season opener against Auburn, he finished the game with 23 of 32 completions, 302 passing yards, 1 passing touchdown, and 2 interceptions in a 24–17 victory. With only 1:26 seconds to go in the fourth, he ran the ball in for a 1-yard touchdown on a quarterback sneak to win the game. USC matched up against #25 Kansas State in week 3, and Palmer became USC's career leader in passing yards and completions after completing 18 of 46 passes for 186 yards and a touchdown. He came back in week 7 to throw 21 of 34 completions for 348 passing yards and 4 passing touchdowns against #19 Washington. Palmer then had a record-setting day the next week against #14 Oregon when he broke the school records with 31/42 completions(73.8%), 448 passing yards, and tied the record with 5 passing touchdowns. In week 11 against #25 UCLA, he racked up 19/32 completions for 254 passing yards and 4 passing touchdowns, winning his third PAC-10 Offensive Player of the Week for the 2002 season and becoming the career leader for passes, completions, and attempts in the PAC-10. He returned the next game to throw another 4 touchdowns, while also throwing the most yards ever (425) against Notre Dame. He played his last collegiate game in the 2003 Orange Bowl against #3 Iowa, finishing with 21 of 31 completions, 303 passing yards, and a touchdown, while also being named the game's MVP. Heisman Trophy Palmer finished his last season with a total of 309 completions, 489 attempts(63.2%), 3,942 passing yards, 33 touchdown passes, and 10 interceptions while also breaking the school record for most completions, passing yards, and passing touchdowns in a season. He was voted the winner of the 2002 Heisman Award, outpacing Iowa's Brad Banks and Penn State's Larry Johnson. Palmer was the fifth player and first quarterback from USC to win the award. After 5 years at USC, he finished his career with 72 passing touchdowns, 49 interceptions, 927 completions, 1,569 attempts, and 11,818 passing yards. He also ended up being the Pac-10's career leader for completions, attempts, and passing yards. Throughout his time in college, he had future NFL players Matt Cassel and Troy Polamalu, as his roommates. College statistics Professional career Cincinnati Bengals 2003 season On July 23, 2003, Palmer signed a six-year contract worth $42.69 million after being selected first overall by the Cincinnati Bengals. Unlike most quarterbacks drafted with the first overall pick, Palmer did not play at all during his rookie season; instead, Palmer learned the position during games and in practice under head coach Marvin Lewis and quarterbacks coach Ken Zampese. Veteran quarterback Jon Kitna, who signed with the Bengals as an unrestricted free agent in 2001, took every snap during the 2003 season. 2004 season After learning the position during his rookie season, Palmer was given the starting quarterback position for the 2004 season and started 13 games; the Bengals finished that season 8–8. Palmer made his NFL debut in Week 1 against the New York Jets. Palmer completed 18 of 27 passes for 248 yards and two touchdowns, but threw a costly interception late as the Jets held on to beat the Bengals, 31–24. "We came here expecting to win," Palmer said. "We had what we needed. We had what we wanted. We had the ball with two minutes to go in good field position and I turned it over. I can’t make plays like that for us to win." Over the next three weeks, Palmer struggled. In Week 2, he completed 21 of 38 passes for just 147 yards, no touchdowns, and 1 interception, but nonetheless recorded his first win as a starter over the Miami Dolphins. In Week 3, he completed 25 of 52 passes for 316 passing yards, but was picked off 3 times and lost a fumble in the 23–9 loss to the Baltimore Ravens. "You can’t get greedy," Palmer said. "When you’re a young quarterback, you get greedy, and I have to fight that temptation. You need to develop patience. When something isn’t there, you don’t just throw it up in the air." In Week 4, Palmer was 20/37 for 164 yards with a touchdown but 2 costly interceptions as the Bengals lost 28–17 to a powerful Pittsburgh Steelers team. Palmer went into the Bengals' week 5 bye with statistics of 84–154 for 875 yards with only three passing touchdowns against 11 sacks, eight total turnovers (seven interceptions and a lost fumble), and three straight games with passer rating of less than 60. The Bengals, meanwhile, were 1–3 and in last place in the AFC North. Palmer's performance improved from this low point, though it seesawed over the next five weeks. His rating was in the 60s in Weeks 6 (17–34 loss at Cleveland Browns), 8 (20–27 loss at Tennessee Titans), and 10 (17–10 win at Washington Redskins), interspersed by a solid 85.0 in a Week 7 win over the Denver Broncos, and 94.8 in a win over the Dallas Cowboys, where he also rushed for a touchdown. In that stretch, Palmer averaged 204 yards per game with four touchdowns and five interceptions. After two touchdowns in a loss to Pittsburgh, in Week 12 Palmer threw a career high four touchdowns along three interceptions and 251 passing yards in a 58–48 shootout win over the Browns (106 points was the second most points in an NFL game). "We kept putting them away, and they kept coming back," said Palmer. "We kept expecting them to slacken up, but they never did." In Week 13, Palmer threw for a career high 382 passing yards and 3 touchdown passes, including a 32-yard pass to T. J. Houshmandzadeh and a 22-yard pass to Chad Johnson to set up Shayne Graham's game-winning field goal with 2 seconds left in the game. In Week 14, Palmer's passer rating was above 100 for the third consecutive week when he sprained his knee in the third quarter. He missed the rest of the season and first put on the knee brace he would wear for much of the rest of his career. His injury-shortened season ended with 18 touchdowns, 18 interceptions, and 2,897 yards. 2005 season In 2005, the Palmer-led Bengals ended 15 years of futility by notching their first winning season since 1990 and winning the AFC North division with an 11–5 record. Statistically, Palmer had a stellar individual season, throwing a league-high 32 touchdown passes and leading the league in completion percentage. He became the first Bengals quarterback to finish with a quarterback rating over 100, which set the team record in that category; and he also tied Indianapolis' Peyton Manning for most consecutive games, 9, with a triple-digit quarterback rating. In Week 1, Palmer completed 26 out of 34 passes and 2 passing touchdowns against the Cleveland Browns. The Bengals won the game 27–13. In Week 2, Palmer had another great game, throwing for 337 yards to go along with 3 passing touchdowns and an interception against the Minnesota Vikings. Palmer threw 3 more touchdown passes in Week 3 against the Chicago Bears to improve to 3–0. That was the first time the Bengals have started the season 3–0 since 1990. In Week 4, Palmer again had a rating over 100 in a game against the Houston Texans. Against the Jacksonville Jaguars in Week 5, Carson completed 22 out of 33 passes for 239 yards and 2 touchdowns. However, the Bengals lost their first game of the year, 23–20. The Bengals bounced back against the Tennessee Titans in Week 6. Palmer threw for 272 passing yards and 2 more passing touchdowns. His rating was over 100 for the ninth straight game dating back to last season. "He feels like he’s invincible, but right now he knows he can go win it the next play," Cincinnati coach Marvin Lewis said of his quarterback. "He doesn’t have to win it on every play. And I think that says a lot for how he is and how important he is to this football team." Palmer's consecutive games streak of over a 100 quarterback rating ended in Week 7 against the Pittsburgh Steelers. Carson completed 21 of 36 passes for 227 yards but was picked off 2 times and for the first time all season, failed to throw at least a touchdown in a game. "It wasn’t anything in particular they did," said Palmer, who had a measly 53.8 passer rating for the game. "I just didn’t play well enough to win. I gave them two turnovers. When you play a championship team, you can’t do that." Palmer bounced back in Week 8 against the Green Bay Packers. He threw for 3 touchdown passes and an interception for 237 yards and the Bengals won the game, 21–14. In Week 9, Palmer passed for 248 yards and 2 touchdowns as the Bengals won their game against the Baltimore Ravens. Palmer finished the season with a 101.1 rating. Carson signed a six-year contract extension through the 2014 season with the Bengals on December 29, 2005. In addition to the three years remaining on his existing deal, the value of the extension was worth $118.75 million over nine years. "Hopefully this is the last place I'll end up playing," Palmer said. "That's so rare in this league these days. It's so rare to see a person have a 5-, 8-, 10-, 12-year career in one place. And I feel very fortunate that it looks like that's going to be my future." On January 8, 2006, the Bengals met their division rival Pittsburgh in the first round of the AFC playoffs at Paul Brown Stadium in Cincinnati. On the Bengals' first pass play, Carson Palmer threw a 66-yard pass to rookie receiver Chris Henry. It was the longest completion in Bengals playoff history. After Palmer released the pass, Steelers defensive tackle Kimo von Oelhoffen dove laterally into Palmer's left knee. A magnetic resonance imaging test revealed a severe injury, thought to be career-threatening at the time; Palmer had tears of both the anterior cruciate and medial collateral ligaments as well as cartilage and meniscus damage, and a displaced kneecap. Coincidentally, Henry himself suffered a knee injury on the same play, though far less severe. With Palmer out of the game, the Steelers went on to win 31–17 en route to their Super Bowl XL victory over the Seattle Seahawks. During the off-season, the league's Rules Committee modified the rule regarding low hits on quarterbacks. The so-called "Kimo von Oelhoffen Rule" which resulted requires that defenders take every opportunity to avoid hitting a quarterback at or below the knees when the quarterback is in a defenseless position looking to throw with both feet on the ground, unless they are blocked into him. Rehabilitation Palmer underwent reconstructive surgery on his injured knee in Houston, Texas, on January 10, 2006. Lonnie Paulos, a surgeon who is independent of the Bengals, performed the operation. Initially, the Bengals organization stated that Palmer had torn the anterior cruciate and medial collateral ligaments with no other damage. However, Paulos later told the Associated Press that the damage was more extensive and also included a dislocation of the patella. Paulos called the injury "devastating and potentially career-ending". The Bengals accepted Paulos's assessment Palmer's knee was reconstructed using an Achilles tendon from a 44-year-old woman who was killed by a drunk driver nearly two years before Palmer's injury. Nonetheless, Palmer vowed that he would be the starting quarterback in the Bengals' regular season opener at Kansas City on September 10, 2006. Bengals head coach Marvin Lewis stated, "This is a serious injury, but we are told the procedure went very well. We know Carson, and we know he will apply himself fully to his rehabilitation. This result encourages our feeling that Carson will be ready to open the 2006 season as our starting quarterback." During his rehabilitation, Palmer made several other pointed comments, particularly in an issue of Sports Illustrated. In the article, Palmer stated that: "I hate the Steelers more than I hate UCLA." 2006 season Palmer returned from his injury in time for the 2006 preseason. After the Bengals' 48–17 pre-season victory over the visiting Green Bay Packers on August 28, 2006, which saw Palmer complete 9 of 14 passes for 140 yards and three touchdowns in just less than two quarters of play in his much-expected debut (which included an 11-yard run for a first down that culminated in a slide on his surgically repaired left knee), Palmer reiterated his position that he would be starting in the Bengals' season opener at Kansas City. His performance drew rave reviews from many experts, many of whom expected far less of him less than a year after such a serious injury. ESPN analyst Joe Theismann, himself a former quarterback with the Washington Redskins (whose own career was ended by a gruesome broken leg against the New York Giants on November 18, 1985), praised Palmer for his mental toughness in taking hits and not being gun-shy about staying in the pocket where chances of injury are often high. Palmer ended up starting all 16 of the Bengals' regular season games, missing only one snap, due to his getting the wind knocked out of him. He actually did not become totally comfortable with his repaired knee until week 9 against the Chargers when he threw for a career high of 440 yards. Despite his previous injury, he passed the 4,000 yard mark for the first time in his career, finishing the season with a franchise record 4,035 passing yards and 28 touchdowns, only 13 interceptions and 93.9 rating. He also made the Pro Bowl for the second year in a row, becoming the first Bengals quarterback to do this since Boomer Esiason in 1988 and 1989. Palmer was named Most Outstanding Player at the Pro Bowl, leading the AFC down the field in the final two minutes for the win. He completed 8 of 17 passes for 190 yards and 2 touchdowns, one to his Bengals teammate Chad Johnson. Palmer placed 3rd in voting for NFL Comeback Player of the Year, behind Drew Brees and Chad Pennington. Unfortunately, his team suffered quite a few misfortunes, such as missed point afters and field goals, while slipping from an 11–5 record in 2005 to 8–8 in 2006 and failing to make the playoffs due to a game 16 loss against their rivals, the Pittsburgh Steelers. After winning the Pro Bowl MVP, Palmer declared, "This is a huge honor and extremely exciting and I feel very blessed just to be here, let alone for the outcome to be this. But my goal's to be in a Super Bowl. And to win a Super Bowl. That's where my mind's at, and after this week I'm going to start focusing on that again." During the 2007 off-season, Palmer had scheduled workouts with not only Chad Johnson (which he usually did), but wide receivers T. J. Houshmandzadeh and Tab Perry. He also said he was fully comfortable with his knee. 2007 season In the season opener on Monday Night Football against their divisional rival Baltimore Ravens, Palmer went 20 for 32 with 194 yards and two touchdowns. Palmer and the Bengals beat the Baltimore Ravens by a score of 27–20. He followed up this performance with 33 completions for 401 passing yards and a franchise record and also a career-high six touchdown passes the next week in a game against the Cleveland Browns. But even so, his team lost the game 51–45. Cleveland quarterback Derek Anderson also threw for five touchdown passes in the game. It was only the third time in NFL history that two quarterbacks had thrown at least five touchdown passes in the same game. In the loss to the Seattle Seahawks, 21–24, Palmer went 27 for 43 for 342 yards for a touchdown, but also threw two interceptions. By Week 8, Palmer and the Bengals were struggling. His team had only a 2–5 record and he had thrown 9 interceptions, the most by any quarterback in the AFC. However, he remained statistically productive, ranking fourth in the NFL in passing yards and fifth in touchdowns with a passer rating of over 90. The Bengals' misfortunes continued throughout the season and a week 15 loss to the San Francisco 49ers ensured that the team finished the season with a losing record for the first time since he had been their starting quarterback. In the same game, Palmer threw his 100th career touchdown pass, becoming the 5th fastest player ever to reach this milestone (59 games). Palmer finished the season with 376 completions for 4,131 yards and 26 touchdowns, with 20 interceptions. His 20 interceptions were a career high, but his 373 completions and 4,131 passing yards set new Bengals franchise records. 2008 season In the season opener against the Baltimore Ravens, Palmer was held to 99 yards and no touchdowns, completing only 10 out of 25 passes with an interception. For the first time in his career, Palmer wore a clear protective visor because of a broken nose. In the following 24–7 loss to the Tennessee Titans, Palmer was 16 of 27 for 134 yards and two interceptions. As the Bengals fell to 0–3 against the New York Giants in a 26–23 overtime loss, Palmer went 27 for 39 for 286 yards and a touchdown. Due to a sore elbow, Palmer missed the next game against the Cleveland Browns, which ended in a loss. This ended Palmer's consecutive start streak of 51 games. Palmer returned the following week against the Dallas Cowboys and completed 23 of 39 of his passes for 217 yards, with two touchdowns, and an interception on the first passing play of the game. The cause of Palmer's sore elbow was later diagnosed as a partially torn ligament and tendon and he was shelved for the remainder of the season. Palmer elected not to undergo Tommy John surgery to repair the damage; instead, he chose to rest the elbow to allow it to heal. By March 2009, Palmer said that he was "100 percent" again. 2009 season In the season opener against the Denver Broncos, Palmer threw the ball 33 times for 247 yards, 2 interceptions, and no touchdowns in a 12–7 loss. The critics sought another mediocre season for the Bengals, with a lack of offensive production. The offense bounced back in week 2 against the Green Bay Packers. Palmer threw for 185 yards, 3 touchdowns, and 2 interceptions in a 31–24 win. In week 7 against the Chicago Bears, Palmer was 20 of 24 passing, with 5 touchdowns, no interceptions, and a passer rating of 146.7, in a 45–10 win. This win improved the Bengals' record to 5–2. After a 16–7 win against the Cleveland Browns in week 12, the Bengals swept their division for the first time in franchise history. Going into a week 15 game at San Diego, Bengals' receiver Chris Henry died. Playing with a heavy heart, Carson Palmer threw for 314 yards, with 2 touchdowns, and 1 interception, but only to lose on a last second field goal by the Chargers. Palmer had a 91.7 passer rating with 2 touchdowns and only 1 interception in 17–10 week 16 win against the Kansas City Chiefs. This win assured the Bengals' first winning season and division title since 2005. In Palmer's first full playoff game, he struggled. Palmer threw the ball with a 50 percent completion percentage, with 1 touchdown, 1 interception, and a 53.8 passer rating, in a 24–14 loss to the New York Jets. Palmer finished the 2009 season with a 60.5 completion percentage, 3,094 yards passing, 21 touchdowns, 13 interceptions, and a passer rating of 83.6. He seemed to have taken a step back from where he was in 2005, 2006, and 2007. 2010 season and initial retirement In the 2010 NFL Draft, the Bengals drafted three more receivers for Carson Palmer: Oklahoma tight end Jermaine Gresham in the first round, Texas wide receiver Jordan Shipley in the third round, and Kansas wide receiver Dezmon Briscoe in the sixth round. During OTA's (Organized Team Activities), Palmer asserted himself as the leader of the team by calling out Chad Ochocinco, saying that the number one receiver should be there with the team. During the 2010 Hall of Fame Game in Canton, Ohio, Palmer completed 2 out of 5 passes for 18 yards, both to wide receiver Terrell Owens. Palmer and the Bengals started out the 2010 campaign with a 2–1 record, but faltered after that, going on a 10-game losing streak to finish out the season with a 4–12 record. Statistically, Carson improved from the previous year as his attempts, completion percentage, yardage and touchdown numbers all rose (although he did throw more interceptions as well). Following the Bengals' 4–12 finish in the 2010 season, Palmer requested to be traded. Bengals president Mike Brown turned down Palmer's request the next day. News reports said that Palmer was prepared to retire if necessary. WCPO-TV reported that a friend of Palmer quoted him as saying, "I will never set foot in Paul Brown Stadium again. I have $80 million in the bank." Palmer also reportedly said: "I don't have to play football for money. I'll play it for the love of the game, but that would have to be elsewhere." Palmer's agent said, "Because of the lack of success that Carson and the Bengals have experienced together, Carson strongly feels that a separation between him and the Bengals would be in the best interest of both parties." In seven seasons under Palmer, the Bengals appeared in the playoffs twice (2005 and 2009), and did not win any playoff games. During an interview at the 2011 NFL Draft, head coach Marvin Lewis said that Carson Palmer told him he has planned to retire. In response, the Bengals selected TCU quarterback Andy Dalton in the second round. On July 26, 2011 a video posted on NFL.com showed a press conference held by Mike Brown, the president of the Bengals, stating that he did not expect Palmer to return to the Bengals for the 2011 season, the organization wished him well, and that there were no plans to trade him. When asked why he would not trade Carson, Mike Brown answered: Carson signed a contract. He made a commitment. He gave his word. We relied on his word. We relied on his commitment. We expected him to perform here. He's going to walk away from his commitment. We aren't going to reward him for doing it. Consequently, Palmer was placed on the reserve/did not report list on July 29, 2011, after failing to report to training camp. Oakland Raiders 2011 season With Bengals rookie quarterback Andy Dalton having led his team to a conference-best 6–2 record after 9 weeks, the Bengals had little motivation to negotiate for Palmer's return. However, on October 18, 2011, after being contacted by the Oakland Raiders who had just lost starting quarterback Jason Campbell for the season and who were desperate to negotiate for Palmer, the Bengals agreed to trade the disgruntled Palmer. Raiders head coach Hue Jackson was previously the offensive coordinator and quarterbacks coach at USC and helped recruit Palmer, and was also the Bengals wide receivers coach during the prime of Palmer's career. Jackson's good relationship with both Palmer and the Bengals organization was key to the deal. In exchange for a player whom the Bengals did not need and who stated he would never suit up for them again, the Bengals received Oakland's first-round pick in the 2012 draft and a conditional second-round pick in the 2013 draft, which would have become a first-round pick had the Raiders reached the AFC Championship game in 2011. Cincinnati would later use the picks to select Alabama cornerback Dre Kirkpatrick in 2012 and North Carolina running back Gio Bernard in 2013. The trade was deemed one of the most one-sided trades in recent memory, and it was one of the factors that resulted in Jackson's termination after the season. Dalton went on to lead the Bengals to the playoffs and was selected to the Pro Bowl, while Jackson was soon re-hired by the Bengals as an assistant coach. Palmer then signed a new four-year contract worth $43 million. With punter Shane Lechler wearing Palmer's number 9 from Cincinnati, Palmer switched his jersey number to 3, his number at USC which was worn by Jon Kitna in Cincinnati at the time the Bengals drafted him. On October 23, Palmer came off the bench against the Kansas City Chiefs to relieve starting quarterback Kyle Boller who had thrown 3 interceptions and had the team down 21–0. Palmer completed 8 of his 21 for 116 yards and threw 3 interceptions in his Raider debut. He stated after the game, "I was told I was not going to play. I didn't know the offense, I also hadn't been training and working out, so it was a complete shock to me at halftime when (Raiders coach Hue Jackson) told me, 'Hey, you know we're going to get you in, in the third quarter.'" In his first start for the Raiders two weeks later Palmer threw for over 330 yards and had three touchdowns. He also threw three interceptions and lost a fumble. In his second start as a Raider during the Week 11 Thursday Night game against the division rival San Diego Chargers, Palmer showed further progress as he finished the game completing 14 of 20 passes for 299 yards and threw two touchdowns and a single interception for a quarterback rating of 125.0 in a 24–17 road win that would ultimately give the Raiders the lead in the division. After going 0 for 2, Palmer completed 10 straight passes, including two touchdowns of 33 & 26 yards to rookie wide receiver Denarius Moore. Palmer was on course for a perfect passer rating of 158.3 until he took a hit from Chargers' linebacker Travis LaBoy while attempting a pass early in the fourth quarter that resulted in wobbly pass picked-off by Paul Oliver. The Raiders ended the season 8–8, 4–5 under Palmer. They lost the AFC West tiebreaker to the Denver Broncos and finished one game out of the playoffs. 2012 season In 2012, the Carson Palmer-led Raiders started the season 0–1 after a 22–14 home loss against the San Diego Chargers. Palmer had a good game statistically going 32 of 46 for 297 yards and a touchdown. In Week 2, Palmer completed 24 of 48 (50%) of his passes for 373 yards and a touchdown, but also an interception in a 35–13 loss to the Miami Dolphins. The Raiders returned home for a Week 3 matchup against their longtime historic rival of the Pittsburgh Steelers. Sitting at 0–2, Palmer drove the Raiders down the field in the final seconds to set up a field goal attempt for the Raiders to win. Palmer went near perfect in his pass attempts completing 24 of 34 for 3 touchdowns and an interception in the 34–31 win. In Week 4 however, Palmer struggled against the Denver Broncos going 19 of 34 for 202 yards in a 37–6 road loss. The Raiders went into their bye week with Palmer's stats standing at 99 of 162 on pass attempts for 1,081 yards with 5 touchdowns and 2 interceptions. The Raiders (who had finished 4–5 with Palmer as a starter) had also gone 5–8 with Palmer at the starting quarterback helm by this time. Returning from the bye week, Palmer and the Raiders traveled down south to face the Atlanta Falcons who were undefeated against AFC opponents. The Raiders got off to a good start with Palmer looking very sharp with 23 of 33 for 353 yards and a touchdown, but he also threw an interception as the Falcons completed the comeback drive to win 23–20. Palmer sat at 26 of 46 for 298 yards, a touchdown, an interception, and also a rushing touchdown against the Jacksonville Jaguars a week later. Palmer stayed sharp through the next game at Kansas City against the Chiefs going 14 of 28 for 209 yards, 2 touchdowns and an interception in a 26–16 win. A week later, the Raiders returned home for a game against the Tampa Bay Buccaneers. Despite the fact that Palmer had completed 39 of 61 for 414 yards and 4 touchdowns, the struggling quarterback also threw 3 costly interceptions in the 42–32 loss. A week later at Baltimore, Palmer still looked sharp in the 55–20 road loss to the Baltimore Ravens going 29 of 45 for 368 yards 2 touchdowns and an interception. In Week 11, the Raiders returned home for a game against a struggling defensive New Orleans Saints team. However, despite the fact that Palmer and the Raiders' offense struggled, the quarterback went 22 of 40 for 312 yards for 2 touchdowns and 2 interceptions in the huge 38–17 loss. In Week 12, Palmer returned to Cincinnati to face off against his former team the Cincinnati Bengals. Palmer struggled in this game going 19 of 34 for a season-low 146 yards for a touchdown and an interception in a 34–10 loss. In Week 13, the Raiders returned home for a game against the Cleveland Browns. Coming into this game at 1–2 against the AFC North, the Raiders were down by 3, but ended up losing 20–17 to the Browns despite the fact that Palmer was 34 of 54 for 351 yards, 2 touchdowns, and an interception. In Week 14, the Raiders stayed home for a Thursday Night Football game against the Denver Broncos. The Raiders lost 26–13 in spite of Palmer going 19 of 30 for 273 yards, 2 touchdowns and an interception. This game was his 9th straight game with at least 1 interception. In Week 15, the Raiders stayed home for the 3rd straight week for game 2 against the division rival Kansas City Chiefs, in which they won 15–0, with Palmer's streak of games with at least 1 interception coming to an end, but he still struggled as he went 18 of 29 for 182 yards. In Week 16, Palmer and the Raiders traveled to Charlotte, North Carolina, to take on the Carolina Panthers. Palmer early in the game suffered a further injury of his ribs, leaving him out for the rest of the game. As he went 3 of 3 for 31 yards in the game, quarterback Matt Leinart took over for the rest of the game. The Raiders, however, went on to lose by a score of 17–6. Out of all 14 games Palmer has started and completed, the Raiders went 4–11 under him, bringing his total to 8–15 as the teams' starting quarterback. Arizona Cardinals 2013 season Palmer was officially traded to the Arizona Cardinals on April 2, 2013, for a 2013 NFL Draft sixth round draft pick and for a conditional pick in the 2014 NFL Draft. He then signed a two-year restructured contract worth $16 million. His coach was Bruce Arians, the former Colts interim coach, who had led the Indianapolis Colts while Chuck Pagano was recovering from cancer treatment. While having a rusty 3–4 start, Palmer led the Cardinals to a 10–6 record his first year but was eliminated from playoff contention in week 17. Palmer ranked 8th in the NFL in passing yards with 4,274 yards, the most of his career. He also became the first player in NFL history to top 4,000 yards passing for three different teams. During week 11, he was nominated for FedEx Air Player of the Week with 419 yards and two touchdowns. This win over the Jacksonville Jaguars ended Carson Palmer's interception streak through the first 9 games of his season (not including the bye week). During Week 14, Palmer hit a career high with an 84.4 completion percentage when he went 27 for 32 with 269 yards and a touchdown in a 30–10 win over the St. Louis Rams. During Week 16, while he threw four interceptions, two to Richard Sherman, he was able to rally the Cardinals to a 17–10 victory over the Seattle Seahawks, who had a perfect home record for the last two years. 2014 season In Week 1 against the San Diego Chargers, Palmer threw two touchdowns late in the game to win in an upset. In the same game, Palmer ran for a career-high 30 yards and got injured running for a first down. Instead of avoiding safety Eric Weddle, Palmer collided with him. He missed the next three games, in which backup Drew Stanton won against the New York Giants and San Francisco 49ers and lost to the Broncos. Upon his return the Cardinals went on to win five games in a row and remain the top seed in the NFC, with Palmer throwing 11 touchdowns to just 3 interceptions. On November 7, 2014, Palmer agreed to a three-year, $49.5 million contract extension with the Cardinals. On November 9, 2014, Palmer re-tore his ACL in a game against the St. Louis Rams. He was placed on the injured reserve list the next day, ending his season. Palmer underwent surgery in which doctors removed the donated Achilles tendon from his knee and replaced it with his own patellar tendon for reconstruction. The Cardinals went on to start Stanton for the remainder of the season until he too suffered a knee injury against the Rams in December. The Cardinals then started Ryan Lindley for the remainder of the season. The Cardinals finished 11–5 and went into the playoffs as a Wild Card, but lost to the Carolina Panthers in the first round, mustering only 78 yards of total offense while missing their starting and backup quarterback, starting and backup running back, starting left outside linebacker, and starting middle linebacker due to injury or suspension. 2015 season In Week 10, towards the end of a 39–32 win over the division rival Seattle Seahawks, Palmer made a crotch chop gesture to the Seattle fans; he pumped his fist twice and followed it up by pointing at his crotch. Later in the week, he was fined $11,576 for the action. Palmer engineered what many considered his best season by recording 35 touchdowns to 11 interceptions and was 13–3 as starter through the 2015 season, winning the NFC West and securing the Cardinals' first first-round bye in the playoffs. Many in the sports world considered Palmer a candidate for the NFL's 2015 MVP award, along with Tom Brady, Russell Wilson and eventual winner Cam Newton. Palmer was also elected to his third Pro Bowl. Palmer set a franchise record with the Cardinals against the Minnesota Vikings in Week 14, throwing his 31st touchdown, passing Kurt Warner. In the same game, the Cardinals clinched a playoff berth. In week 15 against the Philadelphia Eagles, he and the Cardinals clinched the NFC West. In Week 16 against the Packers, Palmer and the Cardinals secured a first round bye in the playoffs by clinching the 2nd seed in the NFC, behind only the 15–1 Panthers. In 16 starts, Palmer threw for a franchise record 4,671 yards with 35 touchdowns. In the NFC Divisional Round, Palmer completed 25 of 41 passes for 349 yards, 3 touchdowns and 2 interceptions in the Cardinals' 26–20 overtime win in a Week 16 rematch against the Green Bay Packers, earning his first, and only, career playoff win in the process. The Cardinals lost the NFC Championship game 49–15 to the Carolina Panthers, and Palmer threw four interceptions and lost two fumbles. Palmer lost the MVP award to Carolina quarterback Cam Newton, who received 48 out of 50 votes while Palmer and Tom Brady received one vote each. He was ranked 12th by his fellow players on the NFL Top 100 Players of 2016. 2016 season On August 5, 2016, Palmer signed a one-year, $24.35 million contract extension with the Cardinals. He started 15 games in 2016 and missed Week 5 against the San Francisco 49ers after suffering a concussion the previous week against the Los Angeles Rams. Palmer threw for over 4,000 yards for the sixth time in his career and finished the season with 4,233 yards with 26 touchdowns and 14 interceptions. However, the Cardinals missed the playoffs with a 7–8–1 record. 2017 season On September 17, 2017, in Week 2, Palmer passed for 332 yards, one touchdown, and one interception in the 16–13 overtime victory over the Indianapolis Colts. During Week 7 against the Los Angeles Rams at Twickenham Stadium, Palmer had 122 passing yards and an interception until leaving the game with a left arm injury. The Cardinals were shut out 33–0. Not long after, Palmer was diagnosed with a broken left arm, and was ruled out for at least eight weeks. He was placed on injured reserve on October 26, 2017. On November 22, the Cardinals announced that Palmer would not return for the rest of 2017. However, on December 1, Palmer said he felt "pretty good" about returning. Retirement On January 2, 2018, Palmer announced his retirement from the NFL. At the time of his retirement, he was 12th all-time in both passing yards and passing touchdowns with 46,247 and 294, respectively. Palmer would be inducted into the Arizona Cardinals Ring of Honor on September 29, 2019, its 18th inductee. NFL career statistics Regular season Playoffs Career awards and highlights 3× Pro Bowl selection (2005, 2006, 2015) Second-team All-Pro selection (2015) Pro Bowl MVP (2006) NFL Alumni Quarterback of the Year (2005) 2× FedEx Air Player of the Year (2005, 2015) AFC Player of the Year (2005) NFL Passing touchdowns leader (2005) NFC Passing touchdowns co-leader (2015) NFL Completion percentage leader (2005) AFC pass completions leader (2005) NFL total quarterback rating leader (2015) SN Comeback Player of the Year (2015) Ed Block Courage Award (2006) College Football Hall of Fame inductee (2021) Bengals franchise records Most completions, season: 373 (2007) Most pass attempts, season: 586 (2010; tied with Andy Dalton) First Bengals quarterback to pass for 4,000 yards in a season (twice; 2006–2007) Most touchdown passes, game: 6 (September 16, 2007 against the Cleveland Browns) Most touchdown passes, rookie game: 4 (November 28, 2004 against the Cleveland Browns) Most consecutive games with a passer rating over 100: 9 Most game winning drives, season: 5 (tied with Jeff Blake) Cardinals franchise records Most passing yards in a single season: 4,671 (2015) Most passing touchdowns in a single season: 35 (2015) Highest passer rating in a single season: 104.6 (2015, in 16 starts) Most yards per pass attempt, career: 7.67 Most yards per pass attempt, season: 8.7 (2015) Most passing yards per game, career: 279.3 Most passing yards per game, season 291.9 (2015) Most consecutive seasons with 4,000 passing yards: 2 (2015–2016) Most seasons with 4,000+ passing yards: 3 Most 400+ yard passing games, career: 3 (2013–2016) Most 300+ yard passing games, career: 22 (2013–2016) Most 300+ yard passing games, season: 10 (2015) Personal life On July 5, 2003, Palmer wed former USC soccer player, Shaelyn, whom he met during freshman orientation. They currently reside in Sun Valley, Idaho. His brother, Jordan Palmer, was his best man at the wedding. Palmer and his wife have four children together: twins Fletch and Elle, Bries, and Carter. Not counting endorsement deals Palmer earned over $174 million during his NFL career. In 2015, Forbes estimated that Palmer's annual income was $29 million. He and his wife pledged to make a challenge gift of $300,000 for Compassion International’s “Fill the Stadium” initiative. Following his first reconstructed knee surgery and learning that the tendon used for his knee came from a cadaver, Palmer had his wife drive him to the local Department of Motor Vehicles to have his driver's license updated to make him an organ donor as gratitude to the family who donated the tendon to him. Coincidentally, the teammate who caught his pass when he first injured his knee, Chris Henry, also donated several organs following his death in a 2009 auto accident. Palmer is a fan of the Los Angeles Angels and Los Angeles Lakers, with his favorite NBA player being Shaquille O'Neal. References External links USC profile Cincinnati Bengals profile Oakland Raiders profile Arizona Cardinals profile 1979 births Living people All-American college football players American Conference Pro Bowl players American football quarterbacks Arizona Cardinals players Cincinnati Bengals players Heisman Trophy winners National Football League first overall draft picks Oakland Raiders players People from Rancho Santa Margarita, California Players of American football from California Sportspeople from Fresno, California Sportspeople from Mission Viejo, California Sportspeople from Orange County, California Unconferenced Pro Bowl players USC Trojans football players
982571
https://en.wikipedia.org/wiki/History%20of%20video%20game%20consoles
History of video game consoles
The history of video game consoles, both home and handheld, had their origins in the 1970s. The concept of home consoles used to play games on a television set was founded by the 1972 Magnavox Odyssey, first conceived by Ralph H. Baer in 1966. Handheld consoles bore out from electro-mechanical games that had used mechanical controls and light-emitting diodes (LED) as visual indicators. Handheld electronic games had replaced the mechanical controls with electronic and digital components, and with the introduction of Liquid-crystal display (LCD) to create video-like screens with programmable pixels, systems like the Microvision and the Game & Watch became the first handheld video game consoles, and fully realized by the Game Boy system. Since then, home game consoles have progressed through technology cycles typically referred to as generations, each lasting approximately five years, during which competing manufacturers have produced consoles with similar specifications. With underlying improvements to technology such as smaller and faster microprocessors, digital communications, and changes to business models, a new generation of consoles is evolved from the previous one. This has led to a shifting landscape of console manufacturers in the marketplace; while early generations were led by manufacturers like Atari and Sega, the current modern generations have come down to three major competitors, Nintendo, Sony Interactive Entertainment, and Microsoft. Handheld consoles have seen similar advances, though typically are grouped into the same generations as home consoles. While there were larger numbers of manufacturers in the earlier generations for handhelds which included Nintendo, Atari, Sega, and Sony, the handheld market has waned since the introduction of mobile gaming in the mid-2000s, and as of today, the only major manufacturer in handheld gaming is Nintendo. Origins While both home and handheld game consoles strive to allow consumers to play video games on personal devices, their points of origin came from different fields, and only more recently can be seen as deriving from common principles. Home consoles The first video games were created on mainframe computers in the 1950s, typically with text-only displays or computer printouts, and limited to simple games like Tic Tac Toe or Nim. Eventually displays with rudimentary vector displays for graphics were available, leading to titles like Spacewar! in 1962. Spacewar! directly influenced Nolan Bushnell and Ted Dabney to create Computer Space in 1971, the first recognized arcade game. Separately, while at Sanders Associates in 1966, Ralph H. Baer conceived of the idea of an electronic device that could be connected to a standard television to play games. With Sanders' permission, he brought this design to practice, creating the prototype "Brown Box" which was able to play a limited number of games, including a version of table tennis and a simple light gun game. Sanders patented the unit and licensed the patents to Magnavox, where it was manufactured as the first home video game console, the Magnavox Odyssey, in 1972. Bushnell, after seeing the Odyssey and its table tennis game, believed he could make something better. He and Dabney formed Atari, Inc., and with Allan Alcorn, created their second arcade game Pong, first released in 1972 which was more successful than Computer Space. Atari released a Pong console of its own design through Sears in 1975. Handheld consoles The origins of handheld game consoles are found in handheld and tabletop electronic game devices of the 1970s and early 1980s. These electronic devices are capable of playing only pre-defined built-in games, they fit in the palm of the hand or on a tabletop, and they may make use of a variety of video display technologies such as LED, VFD, or LCD. Handheld electronic games, in turn, were derived from the emerging optoelectronic-display-driven calculator market of the early 1970s. The first such handheld electronic game was released by Mattel in 1977, where Michael Katz, Mattel's new product category marketing director, told the engineers in the electronics group to design a game the size of a calculator, using LED technology." This effort lead to the 1977 games Auto Race and Football. The two games were so successful that according to Katz, "these simple electronic handheld games turned into a '$400 million category.'" Another Ralph Baer invention, Simon, published by Milton Bradley in 1978, followed, which further popularized such electronic games and remained an enduring property by Milton Bradley (later Hasbro) that brought a number of copycats to the market. Soon, other manufacturers including Coleco, Parker Brothers, Entex, and Bandai began following up with their own tabletop and handheld electronic games. The transition from handheld electronic games to handheld video games came with the introduction of LCD screens which today have the capability to present a large number of pixels across a display, approaching the video format used by home consoles, and giving the unit more flexibility in playing a range of games. Milton Bradley's Microvision, released in 1979, is often considered the first such handheld video game console, as well as the first handheld to use interchangeable games, though the unit never caught on due to short-term technical struggles. Revolutionary at the time, the Microvision featured a 16x16 pixel LCD that a variety of games could be played by swapping out its faceplate, which contained the game's ROM data and controls. Nintendo's line of Game & Watch titles, first introduced in 1980, was based on inspiration from Gunpei Yokoi after seeing a man playing on an LCD calculation while passing time on a bullet train, and had devised the idea of an electronic game that doubled as a watch. Taking advantage of the technology used in the credit-card-sized calculators that had appeared on the market, Yokoi designed the series of LCD-based games to include a digital time display in the corner of the screen. While the Game & Watch series were considered handheld electronic games rather than handheld video game consoles, their success led Nintendo, through Yokoi's design lead, to produce the Game Boy in 1989, considered to be the defining basis of the current handheld game console. Console generations The history of video game consoles are typically segmented into "generations" which are used to group consoles that have shared a competitive market. These console generations typically last about five years, following a Moore's law progression where a rough aggregrate measure of processing power doubles every 18 months or increases ten-fold after five years. This cyclic market has resulted in an industry-wide adoption of the razorblade model in selling consoles at minimal profit margin while making revenue from the sale of games produced for that console, and then transitioning users to the next console model at the fifth year of the generation as the new generation comes on line, and thus incorporate planned obsolescence into the products to continue to bring consumers into the newer generations. However, the exact definition and delineation of console generations has not been consistently defined in the literature. Some schemes have been based on direct market data (including a seminal work published in an IEEE journal in 2002), while others are based on technology shifts. Wikipedia itself has been noted for creating its own version of console generation definitions that differ from other academic sources, the definitions from Wikipedia has been adopted by other sources but without having any true rationale behind it. The discrepancies between how consoles are grouped into generations and how these generations are named have caused confusion when trying to compare shifts in the video game marketplace compared to other consumer markets. Kemerer et al. (2017) provide a comparative analysis of these different generations through systems released up to 2010 as shown below. Console generation timeline For purposes of organization, the generations described here and subsequent pages maintain the Wikipedia breakdown of generation, generally breaking consoles apart by technology features whenever possible and with other consoles released in that same period incorporated within that same generation, and starting with the Odyssey and Pong-style home consoles as the first generation, an approach that has generally been adopted and extended by video game journalism. In this approach the generation "starts" with the release of the first console considered to have those features, and considered to end with the known last discontinuation of a console in that generation. For example, the third generation is considered to end in 2003 with the formal discontinuation of the Nintendo Entertainment System that year. This can create years with overlaps between multiple generations, as shown. This approach uses the concepts of "bits", or the size of individual word length handled by the processors on the console, for the earlier console generations. Longer word lengths generally led to improved gameplay concepts, graphics, and audio capabilities than shorter ones. The use of bits to market consoles to consumers started with the TurboGrafx 16, a console that used an 8-bit central processing unit similar to the Nintendo Entertainment System (NES), but included a 16-bit graphical processing unit. NEC, the console's manufacturer, took to market the console as a "16-bit" system over the NES' "8-bit" to establish it as a superior system. Other advertisers followed suit, creating a period known as the "bit wars" that lasted through the fifth generation, where console manufactures tried to outsell each other simply on the bit-count of their system. Aside from some "128 Bit" advertising slogans at the beginning of the sixth generation, marketing with bits largely stopped after the fifth generation. Though the bit terminology was no longer used in newer generations, the use of bit-count helped to establish the idea of console generations, and the earlier generations gained alternate names based on the dominant bit-count of the major systems of that era, such as the third generation being the 8-bit era or generation. Later console generations are based on groupings of release dates rather than common hardware as base hardware configurations between consoles have greatly diverged, generally following trends in generation definition given by video game and mainstream journalism. Handheld consoles and other gaming systems and innovations are frequently grouped within the release years associated with the home console generations; for example the growth of digital distribution is associated with the seventh generation. Console history timeline by generation The development of video game consoles primarily follows the history of video gaming in the North American and Japanese markets. Few other markets saw any significant console development on their own, such as in Europe where personal computers tended to be favored alongside imports of video game consoles. The clones of video game consoles in less-developed markets like China and Russia are not considered here. First generation (1972–1980) The first generation of home consoles were generally limited to dedicated consoles with just one or two games pre-built into the console hardware, with a limited means to alter gameplay factors. In the case of the Odyssey, while it did ship with "game cards", these did not have any programmed games on them but instead acted as jumpers to alter the existing circuitry pathway, and did not extend the capabilities of the console. Unlike most other future console generations, the first generation of consoles were typically built in limited runs rather than as an ongoing product line. The first home console was the Magnavox Odyssey in September 1972 based on Baer's "Brown Box" design. Originally built from solid-state circuits, Magnavox transitioned to integrated circuit chips that were inexpensive, and developed a new line of consoles in the Odyssey series from 1975 to 1977. At the same, Atari had successfully launched Pong as an arcade game in 1972, and began work to make a home console version in late 1974, which they eventually partnered with Sears to the new home Pong console by the 1975 Christmas season. Pong several technology advantages over the Odyssey, including an internal sound chip and the ability to track score. Baer, who was struggling with Magnavox' management on how to market the console, gave his colleague Arnold Greenberg of Coleco a heads-up of a new low-cost chip ideal for home consoles, which led Coleco to develop the first Telstar console in 1976. With Magnavox, Atari and Coleco all vying in the console space by 1976 and further cost reductions in key processing chips from General Instruments, numerous third-party manufacturers entered the console market by 1977, most simply cloning Pong or other games and of poor quality. This led to market saturation by 1977, with several hundreds of consoles on the market, and the industry's first market crash. Atari and Coleco attempted to make dedicated consoles with wholly new games to remain competitive, including Atari's Video Pinball series and Coleco's Telstar Arcade, but by this point, the first steps of the market's transition to the second generation of consoles had begun, making these units obsolete near release. The Japanese market for gaming consoles followed a similar path at this point. Nintendo had already been a business partner with Magnovox by 1971 and helped to design the early light guns for the console. Dedicated home game consoles in Japan appeared in 1975 with Epoch Co.'s TV Tennis Electrotennis, which it had made in partnership with Magnavox as well. As in the United States, numerous clones of these dedicated consoles began to appear, most made by the large television manufacturers like Toshiba and Sharp, and these games would be called TV geemu or terebi geemu (TV game) as the designation for "video games" in Japan. Nintendo became a major player when Mitsubishi, having lost their manufacturer Systek due to bankruptcy, turned to the company to help continue to build their Color TV-Game line, which went on to sell about 1.5 million units across five different units between 1977 and 1980. Second generation (1976–1992) The second generation of home consoles was distinguished by the introduction of the game cartridge, where the game's code is stored in read-only memory (ROM) within the cartridge. When the cartridge is slotted into the console, the electrical connections allow the main console's processors to read the game's code from the ROM. While ROM cartridges had been used in other computer applications prior, the ROM game cartridge was first implemented in the Fairchild Video Entertainment System (VES) in November 1976. Additional consoles during this generation, all which used cartridge-based systems, included the Atari 2600 (known as the Atari Video Computer System (VCS) at launch), the Magnavox Odyssey 2, Mattel Electronics' Intellivision, and the ColecoVision. In addition to consoles, newer processor technology allowed games to support up to 8 colors and up to 3-channel audio effects. With the introduction of cartridge-based consoles came the need to develop a wide array of games for them. Atari was one of the forefronts in development for its Atari 2600. Atari marketed the console across multiple regions including into Japan, and retained control of all development aspects of the games. Game developments coincided with the Golden age of arcade video games that started in 1978–1979 with the releases of Space Invaders and Asteroids, and home versions of these arcade games were ideal targets. The Atari 2600 version of Space Invaders, released in 1980, was considered the killer app for home video game consoles, helping to quadruple the console's sales that year. Similarly, Coleco had beaten Atari to a key licensing deal with Nintendo to bring Donkey Kong as a pack-in game for the Colecovision, helping to drive its sales. At the same time, Atari has been acquired by Warner Communications, and internal policies led to the departure of four key programmers David Crane, Larry Kaplan, Alan Miller, and Bob Whitehead, who went and formed Activision. Activision proceeded to develop their own Atari 2600 games as well as games for other systems. Atari attempted legal action to stop this practice but ended up settling out of court, with Activision agreeing to pay royalties but otherwise able to continue game development, making Activision the first third-party game developer. Activision quickly found success with titles like Pitfall!, and were able to generate in revenue from about in startup funds within 18 months. Numerous other companies saw Activision's success and jumped into game development to try to make fast money on the rapidly expanding North America video game market. This led to a loss of publishing control and dilution of the game market by the early 1980s. Additionally, in following on the success of Space Invaders, Atari and other companies had remained eager for licensed video game possibilities. Atari had banked heavily on commercial sales of E.T. the Extra-Terrestrial in 1982, but it was rushed to market and poorly-received, and failed to make Atari's sales estimates. Along with competition from inexpensive home computers, the North American home console market crashed in 1983. For the most part, the 1983 crash signaled the end of this generation as Nintendo's introduction of the Famicom the same year brought the start of the third generation. When Nintendo brought the Famicom to North America under the name "Nintendo Entertainment System", it helped to revitalize the industry, and Atari, now owned by Jack Tramiel, pushed on sales of the previously-successful Atari 2600 under new branding to keep the company afloat for many more years while he transitioned the company more towards the personal computer market. The Atari 2600 stayed in production until 1992, marking the end of the second generation. Handhelds of the second generation Handheld electronic games had already been introduced on the market, such as Mattel Auto Race in 1977 and Simon in 1978. While not considered video games as lacking the typical video screen element, instead using LED lights as game indicators, they still established a market for portable video games. The first handheld game console emerged during the second home console generation, using simple LC displays. Early attempts at cartridge-based handheld systems included the Microvision by Milton-Bradley and the Epoch Game Pocket Computer, but neither gained significant traction. Nintendo, on the other hand, introduced its line of Game & Watch portable games, each with a single dedicated game, as its first venture into the video game market. First introduced in 1980, the Game & Watch series ran for over a decade and sold more than 40 million units. Third generation (1983–2003) Frequently called the "8-bit generation", the third generation's consoles used 8-bit processors, which allowed up to five bits of color (25 or 32 colors), five audio channels, and more advanced graphics capability including sprites and tiles rather than block-based graphics of the second generation. Further, the third console saw the market dominance shift from the United States to Japan as a result of the 1983 crash. Both the Sega SG-1000 and the Nintendo Famicom launched near simultaneously in Japan in 1983. The Famicom, after some initial technical recalls, soon gained traction and became the best selling console in Japan by the end of 1984. By that point Nintendo wanted to bring the console to North America but recognized the faults that the video game crash had caused. It took several steps to redesign the console to make it look less like a game console and rebranded it as the "Nintendo Entertainment System" (NES) for North America to avoid the "video game" label stigma. The company also wanted to avoid the loss of publishing control that had occurred both in North America as well as in Asia after the Famicom's release, and created a lockout system that required all game cartridges to be manufactured by Nintendo to include a special chip. If this chip was not present, the console would fail to play the game. This further gave Nintendo direct control on the titles published for the system, rejecting those it felt were too mature. The NES launched in North America in 1985, and helped to revitalize the video game market there. Sega attempted to compete with the NES with its own Master System, released later in 1985 in both the US and Japan, but did not gain traction to compete. Similarly, Atari's attempts to compete with the NES via the Atari 7800 in 1987 failed to knock the NES from its dominant position. The NES remained in production until 2003, when it was discontinued along with its successor, the Super Nintendo Entertainment System. Fourth generation (1987–2004) The fourth generation of consoles, also known as the "16-bit generation", further advanced core console technology with 16-bit processors, improving the available graphics and audio capabilities of games. NEC's TurboGrafx-16 (or PC Engine as released in Japan), first released in 1987, is considered the first fourth generation console even though it still had an 8-bit CPU. The console's 16-bit graphics processor gave it capabilities comparable to the other fourth generation systems, and NEC's marketing had pushed the console being an advancement over the NES as a "16-bit" system. Both Sega and Nintendo entered the fourth generation with true 16-bit systems in the 1988 Sega Genesis (Mega Drive in Japan) and the 1990 Super Nintendo Entertainment System (SNES, Super Famicom in Japan). SNK also entered the competition with a modified version of their Neo Geo MVS arcade system into the Neo Geo, released in 1990, which attempted to bridge the gap between arcade and home console systems with the shared use of common game cartridges and memory cards. This generation was notable for the so-called "console wars" between Nintendo and Sega primarily in North America. Sega, to try to challenge Nintendo's dominant position, created the mascot character Sonic the Hedgehog, who exhibited cool personality to appeal to the Western youth in contrast to Nintendo's Mario, and bundled the Genesis with the game of the same name. The strategy succeeded with Sega becoming the dominant player in North America until the mid-1990s. During this generation, the technology costs of using optical discs in the form of CD-ROMs has dropped sufficiently to make them desirable to be used for shipping computer software, including for video games for personal computers. CD-ROMs offered more storage space than game cartridges and could allow for full-motion video and other detailed audio-video works to be used in games. Console manufacturers adapted by created hardware add-ons to their consoles that could read and play CD-ROMs, including NEC's TurboGrafx-CD add-on (as well as the integrated TurboDuo system) in 1988, and the Sega CD add-on for the Genesis in 1991, and the Neo Geo CD in 1994. Costs of these add-ons were generally high, nearing the same price as the console itself, and with the introduction of disc-based consoles in the fifth generation starting in 1993, these fell by the wayside. Nintendo had initially worked with Sony to develop a similar add-on for the SNES, the Super NES CD-ROM, but just before its introduction, business relationships between Nintendo and Sony broke down, and Sony would take its idea on to develop the fifth generation PlayStation. Additionally, Philips attempted to enter the market with a dedicated CD-ROM format, the CD-i, also released in 1990, that included other uses for the CD-ROM media beyond video games but the console never gained traction. The fourth generation had a long tail that overlapped with the fifth generation, with the SNES's discontinuation in 2003 marking the end of the generation. To keep their console competitive with the new fifth generation ones, Nintendo took to the use of coprocessors manufactured into the game cartridges to enhance the capabilities of the SNES. This included the Super FX chip, which was first used in the game Star Fox in 1993, generally considered one of the first games to use real-time polygon-based 3D rendering on consoles. Handhelds of the fourth generation Nintendo brought its experience from the Game & Watch series to develop the Game Boy system in 1989, with subsequent iterations through the years. The unit included a LCD screen that supported a 4-shade monochrome pixel display, the use of a cartridge-based system, and the means to link up two units to play head-to-head games. One of the early packages included Tetris bundled with the unit, which became the Game Boy's killer app and led the unit to dominate handheld sales at the time. The Game Boy also introduced the Pokémon franchise to the world, which became a staple of Nintendo's handheld consoles. The Atari Lynx was also introduced in 1989 and included a color-LED screen, but its small game library and low battery life failed to make it competitive with the Game Boy. Both Sega and NEC also attempted to compete with the Game Boy with the Game Gear and the TurboExpress, respectively, both released in 1990. Each were attempts to bring the respective home console games to handheld systems, but struggled against the staying power of the Game Boy. Fifth generation (1993–2006) During this time home computers gained greater prominence as a way of playing video games. The video game console industry nonetheless continued to thrive alongside home computers, due to the advantages of much lower prices, easier portability, circuitry specifically dedicated towards video games, the ability to be played on a television set (which PCs of the time could not do in most cases), and intensive first party software support from manufacturers who were essentially banking their entire future on their consoles. Besides the shift to 32-bit processors, the fifth generation of consoles also saw most companies excluding Nintendo shift to dedicated optical media formats instead of game cartridges, given their lower cost of production and higher storage capacity. Initial consoles of the fifth generation attempted to capitalize on the potential power of CD-ROMs, which included the Amiga CD32, 3DO and the Atari Jaguar in 1993. However, early in the cycle, these systems were far more expensive than existing fourth-generation models and has much smaller game libraries. Further, Nintendo's use of co-processors in late SNES games further kept the SNES as one of the best selling systems over new fifth generation ones. Two of the key consoles of the fifth generation were introduced in 1995: the Sega Saturn, and the Sony PlayStation, both which challenged the SNES' ongoing dominance. While the Saturn sold well, it did have a number of technical flaws, but established Sega for a number of key game series going forward. The PlayStation, in addition to using optical media, also introduced the use of memory cards as to save the state of a game. Though memories cards had been used by Neo Geo to allow players to transfer game information between home and arcade systems, the PlayStation's approach allowed games to have much longer gameplay and narrative elements, leading to highly-successful role-playing games like Final Fantasy VII. By 1996, the PlayStation became the best-selling console over the SNES. Nintendo released their next console, the Nintendo 64 in late 1996. Unlike other fifth generation units, it still used game cartridges, as Nintendo believed the load-time advantages of cartridges over CD-ROMs was still essential, as well as their ability to continue to use lockout mechanisms to protect copyrights. The system also included support for memory cards as well, and Nintendo developed a strong library of first-party titles for the game, including Super Mario 64 and The Legend of Zelda: Ocarina of Time that helped to drive its sales. While the Nintendo 64 did not match the PlayStation's sales, it kept Nintendo a key competitor in the home console market alongside Sony and Sega. As with the transition from the fourth to fifth generation, the fifth generation has a long overlap with the sixth console generation, with the PlayStation remaining in production until 2006. Handhelds of the fifth generation Nintendo released the Virtual Boy, an early attempt at virtual reality, in 1995. The unit required the player to play a game through a stereoscopic viewerfinder, which was awkward and difficult, and did not lend well to portable gaming. Nintendo instead returned to focus on incremental improvements to the Game Boy, including the Game Boy Pocket and the Game Boy Color. Sega also released the Genesis Nomad, a handheld unit that played Sega Genesis games, in 1995 in North America only. The unit had been developed through Sega of America with little oversight from Sega's main headquarters, and as Sega moved forward, the company as a whole decided to put more focus on the Sega Saturn to stay competitive and drop support for all other ongoing systems, including the Nomad. Despite Nintendo's domination of handheld console market, some competing consoles such as Neo Geo Pocket, WonderSwan, Neo Geo Pocket Color, and WonderSwan Color appeared in the late 1990s and discontinued several years later after their appearance in handheld console market. Sixth generation (1998–2013) By the sixth generation, console technology began to catch up to performance of personal computers of the time, and the use of bits as their selling point fell by the wayside. The console manufactures focused on the individual strengths of their game libraries as marketing instead. The consoles of the sixth generation saw further adoption of optical media, expanding into the DVD format for even greater data storage capacity, additional internal storage solutions to function as memory cards, as well as adding support either directly or through add-ons to connect to the Internet for online gameplay. Consoles began to move towards a convergence of features of other electronic living room devices and moving away from single-feature systems. By this point, there were only three major players in the market: Sega, Sony, and Nintendo. Sega got an early lead with the Dreamcast first released in Japan in 1998. It was the first home console to include a modem to allow players to connect to the Sega network and play online games. However, Sega found several technical issues that had to be resolved before its Western launch in 1999. Though its Western release was more successful than in Japan, the console was soon outperformed by Sony's PlayStation 2 released in 2000. The PlayStation 2 was the first console to add support for DVD playback in addition to CD-ROM, as well as maintaining backward compatibility with games from the PlayStation library, which helped to draw consumers that remained on the long-tail of the PlayStation. While other consoles of the sixth generation had not anticipated this step, the PlayStation 2's introduction of backwards compatibility became a major design consideration of future generations. Along with a strong game library, the PlayStation 2 went on to sell 155 million units before it was discontinued in 2013, and , remains the best selling home console of all time. Unable to compete with Sony, Sega discontinued the Dreamcast in 2001 and left the hardware market, instead focusing on its software properties. Nintendo's entry in the sixth generation was the GameCube in 2001, its first system to use optical discs based on the miniDVD format. A special Game Boy Player attachment allowed the GameCube to use any of the Game Boy cartridges as well, and adapters were available to allow the console to connect to the Internet via broadband or modem. At this point Microsoft also entered the console market with its first Xbox system, released in 2001. Microsoft considered the PlayStation 2's success as a threat to the personal computer in the living room space, and had developed the Xbox to compete. As such, the Xbox was designed based more on Microsoft's experience from personal computers, using an operating system built out from its Microsoft Windows and DirectX features, utilizing a hard disk for save game store, built-in Ethernet functionality, and created the first console online service, Xbox Live to support multiplayer games. While the original Xbox had modest sales compared to the PlayStation 2 and was not profitable for the company, Microsoft considered the Xbox to have successfully demonstrated their abilities to participate in the console market. Handhelds of the sixth generation Nintendo continued to refine its Game Boy design with the Game Boy Advance in 2001, including its Game Boy Advance SP in 2003 and Game Boy Micro in 2005, all with the ability to link to the GameCube to extend the functionality of certain games. Also introduced were the Neo Geo Pocket Color in 1998 and Bandai's WonderSwan Color, launched in Japan in 1999. South Korean company Game Park introduced its GP32 handheld in 2001, and with it came the dawn of open source handheld consoles. During the sixth generation, a new type of market for gaming came from the growing mobile phone arena, where advanced smart phones and other portable devices could be loaded with games. Nokia's N-Gage was one of the first devices marketed as a mobile phone and game system, first released in 2003 and later redesigned as the N-Gage QD. Seventh generation (2005–2017) Video game consoles had become an important part of the global IT infrastructure by the mid-2000s. It was estimated that video game consoles represented 25% of the world's general-purpose computational power in the year 2007. By the seventh generation, Sony, Microsoft, and Nintendo had all developed consoles designed to interface with the Internet, adding networking support for either wired and wireless connections, online services to support multiplayer games, digital storefronts for digital purchases of games, and both internal storage and support for external storage on the console for these games. With the start and transition to the HD-era, these consoles also added support for digital television resolutions through HDMI interfaces, but as the generation occurred in the midst of the High-definition optical disc format war between Blu-ray and HD-DVD, a standard for high-definition playback was yet to be fixed. A further innovation came by the use of motion controllers, either built into the console or offered as an add-on afterwards. Consoles in this generation started using custom CPUs based on the PowerPC instruction set, and were increasingly sharing similarities with the personal computer in game development, although with challenges due to the more complex nature of porting between the differences in architectures. Microsoft entered the seventh generation first with the Xbox 360 in 2005. The Xbox 360 saw several hardware revisions over its lifetime which became a standard practice for Microsoft going forward; these revisions offered different features such as a larger internal hard drive or a fast processor at a higher price point. As shipped, the Xbox 360 supported DVD discs and Microsoft had opted to support the HD-DVD format with an add-on for playback of HD-DVD films. However, this format ended up as deprecated compared to Blu-ray. The Xbox 360 was backward compatible with about half of the original Xbox library. Through its lifetime, the Xbox 360 was troubled by a consistent hardware fault known as "the Red Ring of Death" (RROD), and Microsoft spent over $1 billion correcting the problem. Sony's PlayStation 3 was released in 2006. The PlayStation 3 represented a shift of the internal hardware from Sony's custom Emotion Engine to a PowerPC-based system. Initial PlayStation 3 units shipped with a special Emotion Engine daughterboard that allowed for backwards compatibility of PlayStation 2 games, but later revisions of the unit removed this, leaving only software-based emulation for PlayStation games available. Sony banked on the Blu-ray format, which was included from the start, and parially helped spurred the adoption of Blu-Ray as the favoured format for high-definition optical media. With the PlayStation 3, Sony introduced the PlayStation Network for its online services and storefront. While the system would initially have a slow start in the market in part, due to its high price, complex game development environment and initial lack of quality games, the PlayStation 3 eventually became more well received over time following gradual price cuts, improved marketing campaigns, new hardware revisions particularly the Slim models, and key critically-aclaimed exclusives. Nintendo introduced the Wii in 2006 around the same time as the PlayStation 3. Nintendo lacked the same manufacturing capabilities and relationships with major hardware supplies as Sony and Microsoft, and to compete, diverged on a feature-for-feature approach and instead developed the Wii around the novel use of motion controls in the Wii Remote. This "blue ocean strategy", releasing a product where there was no competition, was considered part of the unit's success, and which drove Microsoft and Sony to develop their own motion control accessors to compete. Nintendo provided various online services that the Wii could connect to, including the Virtual Console where players could purchase emulated games from Nintendo's past consoles as well as games for the Wii. The Wii used regular sized DVDs for its game medium but also directly supported GameCube discs. The Wii was generally considered a surprising success that many developers had initially overlooked. The seventh generation concluded with the discontinuation of the PlayStation 3 in 2017. Handhelds of the seventh generation Nintendo introduced the new Nintendo DS system in 2004, a game cartridge-based unit that support two screens including one being touch-sensitive. The DS also included built-in wireless connectivity to the Internet to purchase new DS games or Virtual Console titles, as well as the ability to connect to each other or to a Wii system in an ad hoc manner for certain multiplayer titles. Sony entered the handheld market in 2004 with the PlayStation Portable (PSP), with a reduced design based on the PlayStation 3. Like the DS, the PSP also supported wireless connectivity to the Internet to download new games, and ad hoc connectivity to other PSP or to a PlayStation 3. The PSP used a new format called Universal Media Disc (UMD) for game and other media. Nokia revived its N-Gage platform in the form of a service for selected S60 devices. This new service launched on April 3, 2008. Other less-popular handheld systems released during this generation include the Gizmondo (launched on March 19, 2005 and discontinued in February 2006) and the GP2X (launched on November 10, 2005 and discontinued in August 2008). The GP2X Wiz, Pandora, and Gizmondo 2 were scheduled for release in 2009. Another aspect of the seventh generation was the beginning of direct competition between dedicated handheld video game devices, and increasingly powerful PDA/cell phone devices such as the iPhone and iPod Touch, and the latter being aggressively marketed for gaming purposes. Simple games such as Tetris and Solitaire had existed for PDA devices since their introduction, but by 2009 PDAs and phones had grown sufficiently powerful to where complex graphical games could be implemented, with the advantage of distribution over wireless broadband. Apple had launched its App Store in 2008 that allowed developers to publish and sell games for iPhones and similar devices, beginning the rise of mobile gaming. Other seventh generation hardware Based on the success of the Wii Remote controller, both Microsoft and Sony released similar motion detection controllers for their consoles. Microsoft introduced the Kinect motion controller device for the Xbox 360, which served as both a camera, microphone, and motion sensor for numerous games. Sony released the PlayStation Move, a system consisting of a camera and lit handheld controllers, which worked with its PlayStation 3. Eighth generation (2012–present) Aside from the usual hardware enhancements, consoles of the eighth generation focus on further integration with other media and increased connectivity. Consoles at this point had also standardized on CPUs using the x86 instruction set, the same as in personal computers, and there was a convergence of the individual hardware components between consoles and personal computers, making the porting of games between these systems much easier. Later hardware improvements pushed for higher frame rates at up to 4K resolutions. Digital distribution increased in popularity, while the addition and improvements to remote play capabilities became standard, and second screen experiences via companion apps added more interactivity to games. The Wii U, introduced in 2012, was considered by Nintendo to be a successor to the Wii but geared to more serious players. The console supported backward compatibility with the Wii, including its motion controls, and introduced the Wii U GamePad, a tablet/controller hybrid that acted as a second screen. Nintendo further refined its network offerings to develop the Nintendo Network service to combine storefront and online connectivity services. The Wii U did not sell as well as Nintendo had planned, as they found people mistook the GamePad to be a tablet they could take with them away from the console, and the console struggled to draw the third-party developers as the Wii had. Both the PlayStation 4 and Xbox One came out in 2013. Both were similar improvements over the previous generation's respective consoles, providing more computational power to support up to 60 frames per second at 1080p resolutions for some games. Each unit also saw a similar set of revisions and repackaging to develop high- and low-end cost versions. In the case of the Xbox One, the console's initial launch had included the Kinect device but this became highly controversial in terms of potential privacy violations and lack of developer support, and by its mid-generation refresh, the Kinect had been dropped and discontinued as a game device. Both consoles eventually released upgraded hardware during their mid-cycle refresh, with Sony releasing the PlayStation 4 Pro and Microsoft releasing the Xbox One X, which allowed for higher frame rates and up to 4K resolution, in addition to Slim models, marking a departure from previous generations, while adding considerable longevity to this generation cycle. Later in the eighth generation, Nintendo released the Nintendo Switch in 2017. The Switch is considered the first hybrid game console. It uses a special CPU/GPU combination that can run at different clock frequencies depending on how it is used. It can be placed into a special docking unit that is hooked to a television and a permanent power supply, allowing faster clock frequencies to be used to be played at higher resolutions and frame rates, and thus more comparable to a home console. Alternatively, it can be removed and used either with the attached JoyCon controllers as a handheld unit, or can be even played as a tablet-like system via its touchscreen. In these modes, the CPU/GPU run at lower clock speeds to conserve battery power, and the graphics are not as robust as in the docked version. A larger suite of online services was added through the Nintendo Switch Online subscription, including several free NES and SNES titles, replacing the past Virtual Console system. The Switch was designed to addressed many of the hardware and marketing faults around the Wii U's launch, and has become one of the company's fastest-selling consoles after the Wii. Game systems in the eighth generation also faced increasing competition from mobile device platforms such as Apple's iOS and Google's Android operating systems. Smartphone ownership was estimated to reach roughly a quarter of the world's population by the end of 2014. The proliferation of low-cost games for these devices, such as Angry Birds with over 2 billion downloads worldwide, presents a new challenge to classic video game systems. Microconsoles, cheaper stand-alone devices designed to play games from previously established platforms, also increased options for consumers. Many of these projects were spurred on by the use of new crowdfunding techniques through sites such as Kickstarter. Notable competitors include the GamePop, OUYA, GameStick Android-based systems, the PlayStation TV, the NVIDIA SHIELD, the Apple TV and Steam Machines. Handhelds of the eighth generation The Nintendo 3DS released in 2011 expanded on the Nintendo DS design and added support for an autostereoscopic screen to project stereoscopic 3D effects without the use of 3D glasses. The console was otherwise remained backward compatible with all of the DS titles. Sony introduced its PlayStation Vita in 2011, a revised version of the PSP but eliminating the use of external media and focusing on digital acquisition of games, as well as incorporating a touchscreen. and was released in Europe and North America on February 22, 2012. As noted above, the Nintendo Switch is a hybrid console, capable of both being used as a home console in its docked mode and as a handheld. The Nintendo Switch Lite revision was released in 2019, which reduced some of the features of the system and its size, including eliminating the ability to dock the unit, making the Switch Lite primarily a handheld system, but otherwise compatible with most of the Switch's library of games. Other eighth generation hardware Virtual reality systems appeared during the eighth generation, with three main systems: the PlayStation VR headset that worked with PlayStation 4 hardware, the Oculus Rift which could run off its own dedicated Android-based hardware console or connect to a personal computer, and the HTC Vive which ran off a personal computer. Ninth generation (2020–present) Both Microsoft and Sony released successors to their home consoles in November 2020. Consoles in this generation also launched with lower-cost models lacking optical disc drives, targeting those who would prefer to purchase games exclusively through digital downloads. Both console families target 4K and 8K resolution televisions at high frame rates, support for real-time ray tracing rendering, 3D spatial audio, variable refresh rates, the use of high-performance solid-state drives (SSD) as internal high-speed memory to make delivering game content much faster than reading from optical disc or standard hard drives, which can eliminate loading times and support in-game streaming. With features that were commonly standard in PCs, and the move to higher performance APUs, consoles in the ninth generation now have capabilities comparable to high-end personal computers, often making cross-platform development easier and more widely available than previously, further converging and blurring the line between video game consoles and personal computers. Microsoft released the fourth generation of Xbox with the Xbox Series X and Series S on November 10, 2020. The Series X has a base performance target of 60 frames per second at 4K resolution to be four times as powerful as the Xbox One X. One of Microsoft's goals with both units was to assure backward compatibility with all games supported by the Xbox One, including those original Xbox and Xbox 360 titles that are backward compatible with the Xbox One, allowing the Xbox Series X and Series S to support four generations of games. Sony's PlayStation 5 was released on November 12, 2020, and also is a similar performance boost over the PlayStation 4. The PlayStation 5 uses a custom SSD solution with much higher input/output rates that are almost comparable to RAM chip speeds, significantly improving rendering and data streaming speeds. The chip architecture is comparable to the PlayStation 4, allowing backwards compatible with most of the PlayStation 4 library while select games will need chip timing tweaking to make them compatible. In terms of handhelds, Sony has announced no further plans for handhelds after discontinuing the Vita, while Nintendo continues to offer the Nintendo Switch and Switch Lite. The market here still continues to compete with the growing mobile gaming market, but developers have taken advantage of new opportunities in cross-platform play support, in part due to the popularity of Fortnite in 2018, to make games that are compatible on consoles, computers, and mobile devices. Cross platform is now used widely in various games. Cloud gaming also is seen as a potential replacement of handheld gaming. While earlier cloud gaming platforms have gone by the wayside, newer approaches including PlayStation Now, Microsoft's xCloud, Google's Stadia and Amazon Luna can deliver computer and console-quality gameplay to nearly any platform including mobile devices, limited by bandwidth quality. Console sales Below is a timeline of each generation with the top three home video consoles of each generation based on worldwide sales. Notes References Consoles
8175250
https://en.wikipedia.org/wiki/VMware%20Workstation
VMware Workstation
VMware Workstation Pro (known as VMware Workstation until release of VMware Workstation 12 in 2015) is a hosted hypervisor that runs on x64 versions of Windows and Linux operating systems (an x86-32 version of earlier releases was available); it enables users to set up virtual machines (VMs) on a single physical machine and use them simultaneously along with the host machine. Each virtual machine can execute its own operating system, including versions of Microsoft Windows, Linux, BSD, and MS-DOS. VMware Workstation is developed and sold by VMware, Inc. There is a free-of-charge version, VMware Workstation Player (known as VMware Player until release of VMware Workstation 12 in 2015), for non-commercial use. An operating systems license is needed to use proprietary ones such as Windows. Ready-made Linux VMs set up for different purposes are available from several sources. VMware Workstation supports bridging existing host network adapters and sharing physical disk drives and USB devices with a virtual machine. It can simulate disk drives; an ISO image file can be mounted as a virtual optical disc drive, and virtual hard disk drives are implemented as .vmdk files. VMware Workstation Pro can save the state of a virtual machine (a "snapshot") at any instant. These snapshots can later be restored, effectively returning the virtual machine to the saved state, as it was and free from any post-snapshot damage to the VM. VMware Workstation includes the ability to group multiple virtual machines in an inventory folder. The machines in such a folder can then be powered on and powered off as a single object, useful for testing complex client-server environments. 2016 company changes and future development VMware Workstation versions 12.0.0, 12.0.1, and 12.1.0 were released at intervals of about two months in 2015. In January 2016 the entire development team behind VMware Workstation and Fusion was disbanded and all US developers were immediately fired. The company said that "the restructuring activities will not impact the existence of any current product lines", that "roles and responsibilities associated with particular businesses will be moved to other regions and office locations", and that investment would continue "with emphasis on our growth products". The future of Workstation and Fusion became uncertain. On 24 April 2016 maintenance release 12.1.1 was released. In September, same year, the company announced that "we’re very much alive and well". Consequently, on September 13 Workstation 12.5 and Fusion 8.5 were released as free upgrades which added support for Windows 10 Anniversary edition and Windows Server 2016. Since then versions 14 (in 2017, skipping number 13), 15 (in 2018) and 16 (in 2020) were released. Version history Host OS support Variants There was a free VMware Player distinct from Workstation, with similar but reduced functionality, until VMware Player v7, Workstation v11. In 2015 the two packages were combined as VMware Workstation 12, with a free VMware Workstation Player version which, on purchase of a license code, became the higher specification VMware Workstation Pro. VMware Workstation Player, like VMware Player before it, is free of charge for non-commercial use, or for distribution or other use by written agreement. (Workstation Pro is also available for download for a free trial period, and is easily confused with the unlimited-time restricted-functionality version.) VMware Workstation Player (formerly known as Player Pro), free for non-commercial use; a license may be purchased for commercial use, also providing eligibility for paid support. VMware Workstation Pro, available for a 30-day free trial before purchase but distinct from the permanently free version. The features of the versions are compared on the VMware web site. VMware Tools VMware Tools, a package with drivers and other software available for the various guest operating systems VMware products support, installs in guest operating systems to add functionality. Tools is updated from time to time, with v11.2.5 in January 2021. It has several components, including the following: Drivers for emulated hardware: VESA-compliant graphics for the guest machine to access high screen resolutions Network drivers for the vmxnet2 and vmxnet3 NIC Ensoniq AudioPCI audio Mouse integration Support of shared folders and drag-and-drop file transfer between host and guest. This functionality is described as HGFS (Host Guest File System), and may be disabled by default for security; it may be enabled by changes to the .VMX configuration file Clipboard sharing between host and guest Time-synchronization capabilities (guest synchronizes with host machine's clock) Support for Unity, a feature that allows seamless integration of applications with the host desktop by hiding virtual monitor and drawing the windows of applications running in the virtual machine on the host. Unity support was added for Windows 10 and removed for Linux in Workstation 12. Third-party resources Ready-to-use virtual machines Many ready-made virtual machines (VMs) which run on VMware Player, Workstation, and other virtualization software are available for specific purposes, either for purchase or free of charge; for example free Linux-based "browser appliances" with the Firefox or other browser installed which can be used for safe Web browsing; if infected or damaged it can be discarded and replaced by a clean copy. The appliance can be configured to automatically reset itself after each use so personal information and other changes are not stored. VMs distributed legally only have freely distributable operating systems, as operating systems on VMs must be licensed; ready-to-use Microsoft Windows VMs, in particular, are not distributed, except for evaluation versions. Other tools PowerWF - Provides a visual representation of VMware VIX scripts, converting them into workflows, or converting workflows into Powershell cmdlets and modules. VIX is VMware's addition to Microsoft's Powershell for automation of the VMware Player. See also Comparison of platform virtualization software OS level virtualization Virtualbox VMware Fusion VMware Workstation Player x86 virtualization References External links VMware Workstation product page VMware Lifecycle Product Matrix Workstation Virtualization software Windows software Proprietary cross-platform software 1998 software
312028
https://en.wikipedia.org/wiki/Packet%20Switch%20Stream
Packet Switch Stream
In the United Kingdom, Packet Switch Stream (PSS) was an X.25-based packet-switched network, provided by the British Post Office Telecommunications and then British Telecommunications starting in 1980. After a period of pre-operational testing with customers (mainly UK universities and computer manufacturers at this early phase) the service was launched as a commercial service on 20 August 1981. The experimental predecessor network (EPSS) formally closed down on 31 July 1981 after all the existing connections had been moved to PSS. Description Companies and individual users could connect into the PSS network using the full X.25 interface, via a dedicated four-wire telephone circuit using a PSS analog modem and later on, when problems of 10-100 ms transmission failures with the PCM Voice based transmission equipment used by the early Kilostream service were resolved, via a Kilostream digital access circuit (actually a baseband modem). In this early 1980s era installation lead times for suitable 4-wire analog lines could be more than 6 months in the UK. Companies and individual users could also connect into the PSS network using a basic non-error correcting RS232/V.24 asynchronous character based interface via an X.3/X.28/X.29 PAD (Packet Assembler/Disassembler) service oriented to the then prevalent dumb terminal market place. The PAD service could be connected to via a dedicated four-wire telephone circuit using a PSS analog modem and later on via a Kilostream digital access circuit. However most customers, for cost reasons, chose to dial up via an analog modem over the then UK analog telephony network to their nearest public PAD, via published phone numbers, using an ID/password provided as a subscription service. The current day analogy of ISPs offering broadband always on and dial up services to the internet applies here. Some customers connected to the PSS network via the X.25 service and bought their own PADs. PSS was one of the first telecommunications networks in the UK to be fully liberalised in that customers could connect their own equipment to the network. This was before privatisation and the creation of British Telecommunications plc (BT) in 1984. Connectivity to databases and mainframe systems PSS could be used to connect to a variety of online databases and mainframe systems. Of particular note was the use of PSS for the first networked Clearing House Automated Payment System (CHAPS). This was a network system used to transfer all payments over £10,000 GBP (in early 1980s monetary value) between the major UK banks and other major financial institutions based in the UK. It replaced a paper based system that operated in the City of London using electrical vehicles similar to milk floats. Logica (now LogicaCMG) designed the CHAPS system and incorporated an encryption system able to cope with HDLC bit stuffing on X.25 links. Speeds There was a choice of different speeds of PSS lines; the faster the line the more expensive it cost to rent it. The highest and lowest speed lines were provided by the Megastream and Kilostream services, 2M (Mega) bit/s and 256K (kilo) bit/s respectively. On analog links 2400 bit/s, 4800 bit/s, 9600 bit/s and 48 kbit/s were offered. Individual users could link into PSS, on a pay as you go basis, by using a 110, 300, 1200/75, 1,200 or 2,400 bit/s PSTN modem to connect a Data Terminal Equipment terminal into a local PSS exchange. Note: in those days 2,400 bit/s modems were quite rare; 1,200 bit/s was the usual speed in the 1980s, although 110 and 300 bit/s modems were not uncommon. History of implementation The International Packet Switch Stream (IPSS) is an international X.25 network service launched by the international division of BT to which PSS was linked to other packet switched networks around the world. This started in about 1978 before PSS went into operation due to the high demand for affordable access to US based database and other network services. A PAD service was provided by IPSS to this market in advance of PSS launch. For a brief time the EEC operated a packet switched network, Euronet, and a related project Diane to encourage more database and network services to develop in Europe. These connections moved over to PSS and other European networks as commercial X.25 services launched. Later on the InterStream gateway between the Telex network and PSS was introduced based on a low speed PAD interface. The network was initially based upon a dedicated modular packet switch using DCC's TP 4000 communication processor hardware. The operating system and the packet switching software was developed by Telenet (later on GTE Telenet). At the time of PSS's launch this was in advance of both Telenet's own network and most others that used general purpose mini-computers as packet switches. BT bought Telenet's system via Plessey Controls of Poole, Dorset who also sold Telex and Traffic light systems. Later on BT used Telematics packet switches for the Vascom network to support the Prestel service and also bought the Tymnet network from McDonneld Douglas. In the words of BT's own history: British Telecom purchased the Tymnet network systems business and its associated applications activities from the McDonnell Douglas Corporation on 19 November (1989) for $355 million. Its activities included TYMNET, the public network business, plus its associates private and hybrid (mixed public and private) network activities, the OnTyme electronic mail service, the Card Service processing business, and EDI*Net, the US market leader in electronic data interchange. BT Tymnet anticipated developing an end to end managed network service for multi-national customers, and developing dedicated or hybrid networks that embraced major trading areas. Customers would be able to enjoy one-stop-shopping for global data networks, and a portfolio of products designed for a global market place. These services were subsequently offered by BT Global Network Services, and subsequently by Concert as part of Concert Global Network Services after the Concert joint venture company was launched on 15 June 1994. Exchange for other assets It is believed BT subsequently exchanged major US elements of the Tymnet business with MCI for other assets when the proposed merger of their two businesses was thwarted by MCI's purchase by WorldCom. The last PSS node in the UK was finally switched off Wednesday, June 28, 2006. Network management had been run on a system of 24 Prime 63xx and 48xx computers running a modified versions of Revisions 20 and 22 of the Primos operating system. These network management systems were based in London and Manchester. Packet switches were installed at major trunk exchanges in most major conurbations in the UK. The DNICs used by IPSS and PSS were 2341 and 2342 respectively. BT's attitude to packet switching was ambivalent at best. Compared to France's Transpac that had a separate commercial company with dedicated management and saw X.25 packet switching as a core offering BT's then senior management regarded packet switching as a passing phase until the telecommunications nirvana of ISDN's 64 kbit/s for everyone arrived. Even in its recent history BT's senior management stated that the Internet was "not fit for purpose". Investment challenges PSS suffered from inconsistent investment during its early years. Sometimes not enough and sometimes too much but mostly for the wrong reasons. Investments in value added network services (VANS) and BT's own access level packet switching hardware delayed operating profit. This in turn dented PSS's low credibility with BT's management still further. Despite healthy demand for basic X.25 services and the obvious trend for more demanding bandwidth intensive applications that required investment in more powerful switches a decision to develop BT's own hardware and network applications was made instead. In the midst of this IBM (the then market leader in computing) and BT attempted to launch a joint venture, called Jove, for managed SNA services in the UK. And for a time significant extra expenditure was allowed for BT's data services, PSS being the major part, as one concern of regulators was this joint venture might damage work on Open Systems Interconnection. This only made cost control worse and achieving operating profit delayed further. Eventually the UK government decided the SNA joint venture was anti-competitive and vetoed it. But not before PSS management was allowed to commit to large investments that caused serious problems later. One of the few successful value added applications was the transaction phone used to check credit cards by retailer to validate transactions and prevent fraud. It was believed that putting a packet switch in every local telephone exchange would allow this and other low bandwidth applications to drive revenue. The lesson of Tymnet's similar transaction phone that just used a dial up link to a standard PAD based service was not followed. Each low end packet switch installed added costs for floor space, power, etc. without any significant value added revenue benefit resulting. Nor were they adequate for X.25 host traffic. Ideas like providing a more user friendly menu based interface, called Epad, than X.28 was proven obsolete by the advent windows based clients on PCs. As the added value services, named PSS Plus collectively, added significant costs and headcount while contributed virtually no revenue a change in PSS's management eventually resulted. While a decision was eventually made to put some of the basic network services people in senior positions and try to launch what had been developed this proved to be a major mistake. An exodus of people who were developing the value added network services helped reduce some costs. However significant on-going expenditure had been committed already to manufacture packet switch hardware and by using the very expensive Tandem computers in existing VANS. Operating profit was still not achieved and a further change in management with McKinsey consulting being called in. McKinsey's recommendation that increasing revenue while cutting costs was required to turn around the business was duly followed by the new management and an operating profit achieved in about 1988. This rested on running PSS efficiently and cutting the VANS as much as possible. PSS was then merged with other failing business like Prestel as it became part of a larger Managed Network Services division that was used to fix or close BT's problem businesses. Later history While PSS eventually went the way of all X.25 networks and was overwhelmed by the internet and more significantly the internet's superior application suite and cost model. BT did not capitalise as much as other packet switch operators by subsequent mistakes concerning the internet, Tymnet, BT's North American operations and the Concert Global Services with ATT. BT's failure to become the major ISP in its own home market unlike every other former PTT and the success of Dixon's Freeserve, Demon and Energis based virtual ISPs in the same sector has only been recovered from recently. Only after BT changed its most senior management who were fixated on circuit switching/ISDN based on System X/Y telephone exchanges and embracing broadband/internet lock stock and barrel has this changed. An emergency rights issue also helped resolve the debt from acquiring second or third ranked old telcos style companies around the world. Now BT appears to be inheriting a dominating position in the Global Network Services market, based on packet switching, as CSC and Reuters sell up their networks to BT. As the commodity price of IP services based in their core 21st century MPLS network to carry voice and data finally gives them the real cost efficiencies that packet switching always promised. See also Internet in the United Kingdom § History NPL network Telecommunications in the United Kingdom External links Pictures of the BT PSS equipment BT Group General Post Office History of computing in the United Kingdom History of telecommunications in the United Kingdom Packets (information technology) X.25
50014953
https://en.wikipedia.org/wiki/Gholamali%20Montazer
Gholamali Montazer
Gholam Ali Montazer was born on 22nd of March in 1969 in Davan village located 10-km away from Kazeroon city (Faras Province, Iran). He spent his childhood in Abadan and Shiraz and received his high school Diploma as the first-ranked student from Towhid high school in Shiraz in 1987. In the same year, having been elected to the National Students Mathematics Competitions, he has been admitted in Electrical Engineering Department at Khaje Nasireddin Toosi University of Technology, Tehran, Iran and graduated in 1992. Then he continued his education at Tarbiat Modares University and received the MSc. and Ph.D. degree both in Electrical Engineering in 1993 and 1998, respectively. He joined Tarbiat Modares University as a faculty member since 1999 and know works as a Full Professor of Information Technology in School of Engineering. He has commenced his research activities in two main disciplines: “Information Technology (IT)” and “Science and Technology Policy (STP)”. By the beginning of the 21st century, Information Technology has become one of the most powerful enabler technology and expanded in all fields of science and technology. After completing his education, He changed his research sphere into IT, consequently, he founded the first IT Research Institute in Iran at Tarbiat Modares University. He managed to turn the institute as one of the most significant research center in IT field in Iran. In addition, he founded “Iranian Conference on E-Learning and E-Teaching(ICELET)” accompanied by Dr. Parvin Kadivar (Kharazmi University), Dr. Ahmad Kardan (Amirkabir University of Technology) and Dr. Fattaneh Taghiyareh (University of Tehran) in 2006. The conference is taken into account as the most active conference in IT field in Iran which are held with the presence of fully-fledged professors and researchers from all walks of the world. Moreover, he established The Iranian Association of E-Learning (YADA) with the aid of expertise in 2011 and being elected as the director of the association (2011-2018) for two consecutive periods. Researching in various fields of IT, including “E-learning”, “E-government”, “Soft security” and “Intelligent system design using soft-computing methods” are his main research activities. In addition, the publication of more than 400 articles, writing 7 books, managing 56 national research projects and 4 international ones as well as the membership of editorial board of 3 scientific journals and being the referee for more than 60 international and domestic scientific journals has turned him as the most prominent IT scientist in Iran. So far, he has succeeded in obtaining the Iranian Book Award (2002), the selected researcher at ISESCO (2003), International Kharazmi Award (2005), the leading IT expert Award (2009), Member of International Atanasov Prize Board (2015), The UNESCO National Chair E-learning Prize (2018) and Nasir's Online Prize (2018). The second area of his activity is "Science and Technology Policy". Since 1997, he has carried out scientific and extensive activities in the areas of "scientific publishing ", "Research and Technology policy", " Higher education planning” , "Elite system policymaking" and "Planning and supervision of research, technology and innovation", while attending international commissions and committees as well as continuous presence in the past two decades at various national positions, turned him as one of the most well-known theoretician and policy makers of higher education, research , technology and innovation in Iran. Some of his most important responsibilities include: Director of Scientific Publications Center (1997 to 2000), Head of the Central Library at Tarbiat Modares University (1998-2001), Founder and Head of IT Research Institute (2001-2003),General Director of the Academic Office of the Ministry of Science (2003-2006), General Director of Higher Education of the Ministry of Science (2003-2006), Deputy of Research Center of Policy Studies (2006-2009), Vice President of Iran Research Institute for Information Science and Technology (2009-2013) and Vice President of Planning and Supervision of the National Elite Foundation (2013 to 2017). The turning point in his executive management is the combination of science and practice in the field of performance, so that he has been able to bring new scientific ideas to action on all sides, for example, Establishing “Scientific Documents Supply Center in Iran", "Standardization of academic-library processes "," Designing the comprehensive architecture of elite system and implementing it at the National Elite Foundation ", and " Designing new Iranian businesses in the field of IT and their vocational training standards " (awarded by the International Kharazmi Award(KIA). In addition, his views on "the futures of Iranian universities" and "Integrating and Unifying the institutional system of science, technology and innovation in Iran", published in several books and a series of lectures. In spite of his youth, all mentioned activities has made him one of the most famous theorists and future scholars in the field of scientific development and innovative human resources. External links Home page at Tarbiat Modares University Home page at Iran's National Elites Foundation ISNA Fars News Agency Mehr News Agency KarAfarinha IranSeda Iranian computer scientists Computer vision researchers Living people Tarbiat Modares University faculty Year of birth missing (living people) Tarbiat Modares University alumni
194418
https://en.wikipedia.org/wiki/Ferguson%20Big%20Board
Ferguson Big Board
The Big Board (1980) and Big Board II (1982) were Z80 based single-board computers designed by Jim Ferguson. They provided a complete CP/M compatible computer system on a single printed circuit board, including CPU, memory, disk drive interface, keyboard and video monitor interface. The printed circuit board was sized to match the Shugart 801 or 851 floppy drive. This allowed attachment to up to two 8 inch or 5 1/4 inch floppy disk drives . The Big Board II added a SASI interface which could be used to drive hard drives, enhancements to system speed (4 MHz vs. 2.5 MHz) and enhancements to the terminal interface. One version of the Big Board was used in the Xerox 820. Hardware The Big Board was sold as an unpopulated printed circuit board with sockets for integrated circuits, with documentation and options to purchase additional components . The Big Board design was simple enough to build a system around that many people with no prior electronics experience were able to build and bring up a capable computer system of their own at a cost far less than that of a fully assembled system of the time. In this way, the Big Boards anticipated the DIY PC clones that became popular later. In its most popular form, the fully assembled and tested Big Board need only be connected to a power supply, one or two eight inch floppy disk drives, a composite monitor, and an ASCII encoded keyboard in order to provide a fully functioning system. A serial terminal could be used in place of the monitor and keyboard, further simplifying assembly. The only tool required for basic assembly was a screwdriver for the terminal block power connections. The design was also simple to modify for the sake of system expansion and enhancement. Many different modifications to increase the system clock speed were possible, including some that required nothing more than jumpers (e.g. the 3.5 MHz speed upgrade obtained by jumpering the clock divider, with no software modifications or changes to the ICs on the board.) There was also a minor industry in user-installable system upgrades such as real time clocks, 4 MHz upgrades, double density floppy upgrades, character enhancements for the display (reverse video, blinking, etc.), and the addition of hard disk interfaces such as SASI and SCSI. Most of these upgrades were accomplished through the use of daughter boards that plugged into existing IC sockets on the board, with the original IC either replaced by a more capable IC or placed into a socket on the daughter board. It was possible to upgrade the memory to 256 KB, which was extremely large for the time. While not directly supported by CP/M, the extra memory could be used to implement a ram disk, caching of the operating system image (to greatly improve warm boot time), or a print spooler. The Big Board II (1982) incorporated many of the most popular upgrades for the original Big Board into its design. It also featured a small breadboard area that allowed for many simple upgrades to be performed without the addition of daughter boards. Software The Big Board was designed primarily to run the CP/M operating system, version 2.2. It came with a monitor program in ROM called PFM-80 which was the "software front panel" of the system. The source code listing of PFM was a feature of the first and second issues of Micro Cornucopia. PFM featured many well-documented routines that could be employed in user code. The board featured 3 spare 2K ROM sockets that allowed for the addition of additional firmware. Popular additions were Tiny BASIC, FORTH, and enhanced versions of PFM. Documentation The Big Board came with a full set of schematics, a document titled "Theory of Operation", the PFM-80 User's Manual, instructions for assembly and testing of the Big Board, a parts list, and addenda to these. The Theory of Operation described the details of the operation of the system, including the CRT controller, floppy disk controller, serial communications, memory bank switching, and connector pinouts. Specifications Big Board I Z80 CPU at 2.5 MHz. 64 KB dynamic RAM in 32 4116s or equivalent. An ASCII keyboard interface. A TTL / composite video CRT interface allowing a display of 24 lines by 80 characters. A SS/SD floppy disk interface allowing addition of up to four 8" Shugart Associates SA800 compatible 8" floppy disk drives. Two (optional) RS-232 serial ports. A parallel Centronics compatible printer port. An optional real time clock. Board dimensions 8.5" (215 mm) by 13.75" (349.3 mm). (Compare to SA-800 disk drive: 9.5" x 14.5".) Big Board II Z80 CPU at 4 MHz. 64 KB dynamic RAM in 8 4164s or equivalent. SASI/SCSI hard disk interface, also usable as a general purpose I/O or for control of other SCSI devices. An ASCII keyboard interface. A TTL / composite video CRT interface allowing a display of 24 lines by 80 characters. A DS/DD floppy disk interface allowing addition of up to four 8" or 5.25" floppy disk drives. Two RS-232 serial ports via a Z80 SIO. A parallel Centronics compatible printer port via a Z80 PIO. An optional real time clock. Board dimensions 8.875" (225.4 mm) x 14.5" (368.3 mm) 6 ROM/EPROM sockets, including ability to program EPROMs in place. Big Board Community The success of the Big Board spawned Micro Cornucopia magazine. Many Big Board kits included a subscription flyer for the magazine. The magazine regularly featured user reports, hardware upgrade articles, and reviews of third party products. The magazine's publisher hosted the SOG (Semi Official Get-together) annually, where the magazine's readers would join staff and writers for white water rafting, potluck feasts, and technical discussions. Third Party Products The Xerox 820 computer was based on the Big Board; InfoWorld stated that its "considerable virtues ... lie mostly in its use of the Big Board's design". Shugart Associates was a common source of floppy disk drives, as was Tandon Corporation. Taylor Electric Company provided the "Better Board", including floppy disk drive interface enhancements, enhancements to PFM, and corrections to the original assembly and testing instructions bundled with the Big Board. SWP Microcomputer Products of Arlington, TX (formerly Software Publishers) provided the Bigboard Dual Density upgrade, which provided both hardware and software to allow the Big Board I to use dual density formats on its drives. Micro Cornucopia provided many products to enhance the Big Board computers, including speed upgrades, utility software and development tools both on ROM and on disk, and I/O enhancements. AB Computer Products sold enclosures, monitors, and pre-punched I/O panels targeted at Big Board users. D&W Associates of Rome, NY sold monitors, ASCII-encoded keyboards, and power supplies targeted to the Big Board market. Paradise Valley Electronics of Moscow, ID sold a version of FORTH, as well as graphics upgrades and utility software for the Big Board. Several manufacturers, including JBW and Andy Bakkers sold SASI interface kits. Kuzara Enterprises of San Diego, CA (formerly Design Technology) sold printer interfaces that allowed the Big Board to use the full feature sets of the Xerox Diablo printers. Several manufacturers provided real time clock upgrades as a CPU daughter board. Andy Bakkers sold a 1 MB RAM Disk daughter board for Big Board II. Kenmore Computer Technologies (from Buffalo, NY) offered the Ztime-I calendar/clock board kit and software. Calendar/clock circuits enabled early computers to time-stamp data and perform time-sensitive tasks with accuracy. References External links Bigboard Big Board II Documentation at Bitsavers Oscar's Vintage Computer Collection Dave's Old Computers: Big Board Dave's Old Computers: Big Board Ad from Byte (150K JPG.) BigBoard I Ad Italy 1983 Bigboard Formatter Program (assembly source) BigBoard I Italian Page Early microcomputers
174815
https://en.wikipedia.org/wiki/Backslash
Backslash
The backslash is a typographical mark used mainly in computing and is the mirror image of the common slash . It is sometimes called a hack, whack, escape (from C/UNIX), reverse slash, slosh, downwhack, backslant, backwhack, bash, reverse slant, and reversed virgule. In Unicode and ASCII it is encoded at . History , efforts to identify either the origin of this character or its purpose before the 1960s have not been successful. The earliest known reference found to date is a 1937 maintenance manual from the Teletype Corporation with a photograph showing the keyboard of its Kleinschmidt keyboard perforator WPE-3 using the Wheatstone system. The symbol was called the "diagonal key", and given a (non-standard) Morse code of . (The code for the slash symbol, entered backwards.) In June 1960, IBM published an "Extended character set standard" that includes the symbol at 0x19. In September 1961, Bob Bemer (IBM) proposed to the X3.2 standards committee that , and be made part of the proposed standard, describing the backslash as a "reverse division operator" and cited its prior use by Teletype in telecommunications. In particular, he said, the was needed so that the ALGOL boolean operators (logical conjunction) and (logical disjunction) could be composed using and respectively. The Committee adopted these changes into the draft American Standard (subsequently called ASCII) at its November 1961 meeting. These operators were used for min and max in early versions of the C programming language supplied with Unix V6. and V7 The Teletype Model 33 (1963) appears to be the first commercially available unit that has the character as a standard keytop for sale in some markets; this model has a full ASCII character set. Usage Programming languages In many programming languages such as C, Perl, PHP, Python, Unix scripting languages, and many file formats such as JSON, the backslash is used as an escape character, to indicate that the character following it should be treated specially (if it would otherwise be treated normally), or normally (if it would otherwise be treated specially). For instance, inside a C string literal the sequence produces a newline byte instead of an 'n', and the sequence produces an actual double quote rather than the special meaning of the double quote ending the string. An actual backslash is produced by a double backslash . Regular expression languages used it the same way, changing subsequent literal characters into metacharacters and vice versa. For instance searches for either '|' or 'b', the first bar is escaped and searched for, the second is not escaped and acts as an "or". Outside quoted strings, the only common use of backslash is to ignore ("escape") a newline immediately after it. In this context it may be called a "continued line" as the current line continues into the next one. Some software replaces the backslash+newline with a space. To support computers that lacked the backslash character, the C trigraph was added, which is equivalent to a backslash. Since this can escape the next character, which may itself be a , the primary modern use may be for code obfuscation. Support for trigraphs was removed in C++17. In Visual Basic (and some other BASIC dialects) the backslash is used as an operator symbol to indicate integer division. This rounds toward zero. The ALGOL 68 programming language uses the "\" as its Decimal Exponent Symbol. ALGOL 68 has the choice of 4 Decimal Exponent Symbols: e, E, \, or 10. Examples: , , or . In APL is called Expand when used to insert fill elements into arrays, and Scan when used to produce prefix reduction (cumulative fold). In PHP version 5.3 and higher, the backslash is used to indicate a namespace. In Haskell, the backslash is used both to introduce special characters and to introduce lambda functions (since it is a reasonable approximation in ASCII of the Greek letter lambda, λ). Filenames MS-DOS 2.0, released 1983, copied the hierarchical file system from Unix and thus used the (forward) slash as the directory separator. Possibly on the insistence of IBM, Microsoft added the backslash to allow paths to be typed at the command line interpreter prompt, while retaining compatibility with MS-DOS 1.0 (in which was the command-line option indicator. Typing "" gave the "wide" option to the "" command, so some other method was needed if you actually wanted to run a program called inside a directory called ). Except for COMMAND.COM, all other parts of the operating system accept both characters in a path, but the Microsoft convention remains to use a backslash, and APIs that return paths use backslashes. In some versions, the option character can be changed from to via SWITCHAR, which allows COMMAND.COM to preserve in the command name. The Microsoft Windows family of operating systems inherited the MS-DOS behavior and so still support either character – but individual Windows programs and sub-systems may, wrongly, only accept the backslash as a path delimiter, or may misinterpret a forward slash if it is used as such. Some programs will only accept forward slashes if the path is placed in double-quotes. The failure of Microsoft's security features to recognize unexpected-direction slashes in local and Internet paths, while other parts of the operating system still act upon them, has led to some serious lapses in security. Resources that should not be available have been accessed with paths using particular mixes, such as . Text markup The backslash is used in the TeX typesetting system and in RTF files to begin markup tags. In USFM, the backslash is used to mark format features for editing Bible translations. In caret notation, represents the control character 0x1C, file separator. This is entirely a coincidence and has nothing to do with its use in file paths. Mathematics A backslash-like symbol is used for the set difference. The backslash is also sometimes used to denote the right coset space. Especially when describing computer algorithms, it is common to define backslash so that is equivalent to . This is integer division that rounds down, not towards zero. In Wolfram Mathematica the backslash is used this way for integer divide. In MATLAB and GNU Octave the backslash is used for left matrix divide, while the (forward) slash is for right matrix divide. Confusion with ¥ and other characters In the Japanese encodings ISO 646-JP (a 7-bit code based on ASCII), JIS X 0201 (an 8-bit code), and Shift JIS (a multi-byte encoding which is 8-bit for ASCII), the code point 0x5C that would be used for backslash in ASCII is instead rendered as a yen sign . Due to extensive use of the 005C code point to represent the yen sign, even today some fonts such as MS Mincho render the backslash character as a ¥, so the characters at Unicode code points 00A5 (¥) and 005C (\) both render as when these fonts are selected. Computer programs still treat 005C as a backslash in these environments but display it as a yen sign, causing confusion, especially in MS-DOS filenames. Several other ISO 646 versions also replace backslash with other characters, including ₩ (Korean), Ö (German, Swedish), Ø (Danish, Norwegian), ç (French) and Ñ (Spanish), leading to similar problems, though with less lasting impact compared to the yen sign. In 1991, RFC 1345 suggested as a unique two-character mnemonic that might be used in internet standards as "a practical way of identifying [this] character, without reference to a coded character set and its code in [that] coded character set". Consequently, this style may be seen in early Internet Engineering Task Force documents. See also Slash (or 'solidus'), References External links Backslash Definition by The Linux Information Project (LINFO) Punctuation Typographical symbols pl:Ukośnik
60162718
https://en.wikipedia.org/wiki/Cheryl%20Jones
Cheryl Jones
Cheryl Jones (born May 3, 1964) is an American former professional tennis player. Biography Jones played college tennis for the USC Trojans in 1983 and 1984, then joined the professional tour. As a doubles player she reached a best world ranking of 91 and won one WTA Tour title, the 1987 Brasil Open, partnering Katrina Adams. In 1988 she featured in the main draw of the women's doubles at the French Open, Wimbledon and US Open. From 1989 to 1995, Jones was the women's tennis head coach of the USC Trojans. She is the first African-American woman to have coached an NCAA Division I tennis team. WTA Tour finals Doubles (1–0) References External links 1964 births Living people American female tennis players African-American female tennis players USC Trojans women's tennis players USC Trojans women's tennis coaches 21st-century African-American people 21st-century African-American women 20th-century African-American sportspeople 20th-century African-American women American tennis coaches
43467616
https://en.wikipedia.org/wiki/Trojan%20750
Trojan 750
The Trojan 750 is a trailer yacht made in New Zealand. It was designed by Ferris de Joux and Alan Warwick and built by Trojan Yachts Ltd from the late 1970s to the early 1980s. It is on the large side for a trailer yacht, with room for 4–6 people. In the forward cabin it has a double "V" berth; aft, two large single beds that go under the cockpit floor, normally equipped with a head in its own room just behind the "V" berth, and a small integrated galley with a sink, stove and storage behind that, joined to the centre board case. Subsequent development Pacific Trailer Yachts made an updated version of the trojan called the Eclipse 750, which had a NACA airfoil drop keel. References Sailing in New Zealand Trailer sailers Yachts
1068987
https://en.wikipedia.org/wiki/BATON
BATON
BATON is a Type 1 block cipher in use since at least 1995 by the United States government to secure classified information. While the BATON algorithm itself is secret (as is the case with all algorithms in the NSA's Suite A), the public PKCS#11 standard includes some general information about how it is used. It has a 320-bit key and uses a 128-bit block in most modes, and also supports a 96-bit electronic codebook mode. 160 bits of the key are checksum material. It supports a "shuffle" mode of operation, like the NSA cipher JUNIPER. It may use up to 192 bits as an initialization vector, regardless of the block size. In response to a Senate question about encrypted video links, the NSA said that BATON could be used for encryption at speeds higher than those possible with Skipjack. Usage BATON is used in a variety of products and standards: APCO Project 25 (Public standard for land mobile radio) (Algorithm IDs 01 and 41) PKCS#11 (Public standard for encryption tokens) CDSA/CSSM (Another public standard) HAIPE-IS (NSA's version of IPsec) FNBDT (Advanced flexible voice security protocol) Thales Datacryptor 2000 (a British network-encryption box) SecNet-11 (a crypto-secure 802.11b PC Card, based on the Sierra chip) Fortezza Plus (a PC Card product, used in the STE) SafeXcel-3340 (a HAIPIS network-encryption box) Numerous embeddable encryption modules: AIM, CYPRIS, MYK-85, Sierra (microchip), etc. See also Advanced Encryption Standard References External links PKCS documentation Discussion of BATON Quotes about BATON Senate security interview Type 1 encryption algorithms Block ciphers
208571
https://en.wikipedia.org/wiki/Yahoo%21%20Inc.%20%281995%E2%80%932017%29
Yahoo! Inc. (1995–2017)
The original incarnation of Yahoo! Inc. was an American multinational technology company headquartered in Sunnyvale, California. Yahoo was founded by Jerry Yang and David Filo in January 1994 and was incorporated on March 2, 1995. Yahoo was one of the pioneers of the early internet era in the 1990s. Marissa Mayer, a former Google executive, served as CEO and President of Yahoo until June 2017. It was globally known for its Web portal, search engine Yahoo! Search, and related services, including Yahoo! Directory, Yahoo! Mail, Yahoo! News, Yahoo! Finance, Yahoo! Groups, Yahoo! Answers, advertising, online mapping, video sharing, fantasy sports, and its social media website. At its height it was one of the most popular sites in the United States. According to third-party web analytics providers, Alexa and SimilarWeb, Yahoo! was the highest-read news and media website, with over 7 billion views per month, being the sixth most visited website globally in 2016 According to news sources, roughly 700 million people visited Yahoo websites every month. Yahoo itself claimed it attracted "more than half a billion consumers every month in more than 30 languages". Once the most popular website in the U.S., Yahoo slowly started to decline since the late 2000s, and on February 21, 2017, Verizon Communications announced its intent to acquire old Yahoo's internet business (excluding its stakes in Alibaba Group and Yahoo! Japan) for $4.48 billion—the company was once valued at over $100 billion. Before the transaction was completed, the company expected to change its name to Altaba Inc. Verizon completed its acquisition of the old iteration of Yahoo! Inc's internet business on June 13, 2017. Verizon announced that the old Yahoo! Inc's internet assets would be combined under a new subsidiary, Oath, which later known as Verizon Media in 2019 and eventually renamed to the current iteration of Yahoo! Inc. in 2021. History Founding In January 1994, Yang and Filo were electrical engineering graduate students at Stanford University, when they created a website named "Jerry and David's guide to the World Wide Web". The site was a directory of other websites, organized in a hierarchy, as opposed to a searchable index of pages. In March 1994, "Jerry and David's Guide to the World Wide Web" was renamed "Yahoo!", the human-edited Yahoo! Directory, provided for users to surf through the internet, being their first product and original purpose. The "yahoo.com" domain was created on January 18, 1995. The word "yahoo" is a backronym for "Yet Another Hierarchically Organized Oracle" or "Yet Another Hierarchical Officious Oracle". The term "hierarchical" described how the Yahoo database was arranged in layers of subcategories. The term "oracle" was intended to mean "source of truth and wisdom", and the term "officious", rather than being related to the word's normal meaning, described the many office workers who would use the Yahoo database while surfing from work. However, Filo and Yang insist they mainly selected the name because they liked the slang definition of a "yahoo" (used by college students in David Filo's native Louisiana in the late 1980s and early 1990s to refer to an unsophisticated, rural Southerner): "rude, unsophisticated, uncouth." This meaning derives from the Yahoo race of fictional beings from Gulliver's Travels. Expansion Yahoo grew rapidly throughout the 1990s. Like many search engines and web directories, Yahoo added a web portal. By 1998, Yahoo was the most popular starting point for web users and the human-edited Yahoo Directory the most popular search engine. It also made many high-profile acquisitions. Its stock price skyrocketed during the dot-com bubble, Yahoo stocks closing at an all-time high of $118.75 a share on January 3, 2000. However, after the dot-com bubble burst, it reached a post-bubble low of $8.11 on September 26, 2001. Yahoo began using Google for search in 2000. Over the next four years, it developed its own search technologies, which it began using in 2004. In response to Google's Gmail, Yahoo began to offer unlimited email storage in 2007. The company struggled through 2008, with several large layoffs. In February 2008, Microsoft Corporation made an unsolicited bid to acquire Yahoo for $44.6 billion. Yahoo formally rejected the bid, claiming that it "substantially undervalues" the company and was not in the interest of its shareholders. Three years later Yahoo had a market capitalization of $22.24 billion. Carol Bartz replaced Yang as CEO in January 2009. In September 2011 she was removed from her position at Yahoo by the company's chairman Roy Bostock, and CFO Tim Morse was named as Interim CEO of the company. In early 2012, after the appointment of Scott Thompson as CEO, rumors began to spread about looming layoffs. Several key executives, such as Chief Product Officer Blake Irving, left. On April 4, 2012, Yahoo announced a cut of 2,000 jobs or about 14 percent of its 14,100 workers. The cut was expected to save around $375 million annually after the layoffs were completed at end of 2012. In an email sent to employees in April 2012, Thompson reiterated his view that customers should come first at Yahoo. He also completely reorganized the company. On May 13, 2012, Yahoo issued a press release stating that Thompson was no longer with the company, and would immediately be replaced on an interim basis by Ross Levinsohn, recently appointed head of Yahoo's new Media group. Thompson's total compensation for his 130-day tenure with Yahoo was at least $7.3 million. On July 16, 2012, Marissa Mayer was appointed president and CEO of Yahoo, effective the following day. On May 19, 2013, the Yahoo board approved a $1.1 billion purchase of blogging site Tumblr. Tumblr's CEO and founder David Karp would remain a large shareholder. The announcement reportedly signified a changing trend in the technology industry, as large corporations like Yahoo, Facebook, and Google acquired start-up Internet companies that generated low amounts of revenue as a way in which to connect with sizeable, fast-growing online communities. The Wall Street Journal stated that the purchase of Tumblr would satisfy Yahoo's need for "a thriving social-networking and communications hub." On May 20, the company announced the acquisition of Tumblr officially. The company also announced plans to open a San Francisco office in July 2013. On August 2, 2013, Yahoo acquired Rockmelt; its staff was retained, but all of its existing products were terminated. Data collated by comScore during July 2013, revealed that more people in the U.S. visited Yahoo websites during the month in comparison to Google; the occasion was the first time that Yahoo outperformed Google since 2011. The data did not count mobile usage, nor Tumblr. In November 2014, Yahoo! announced that it would acquire the video advertising provider BrightRoll for $640 million. On November 21, 2014, it was announced that Yahoo had acquired Cooliris. Decline, security breaches, Verizon purchase By the fourth quarter of 2013, the company's share price had more than doubled since Marissa Mayer took over as president in July 2012; however, the share price peaked at about $35 in November 2013. It did go up to $36.04 in the mid afternoon of December 2, 2015, perhaps on news that the board of directors was meeting to decide on the future of Mayer, whether to sell the struggling internet business, and whether to continue with the spinoff of its stake in China's Alibaba e-commerce site. Not all had gone well during Mayer's tenure, including the $1.1 billion acquisition of Tumblr that had yet to prove beneficial and the forays into original video content that led to a $42 million write-down. Sydney Finkelstein, a professor at Dartmouth College's Tuck School of Business, told The Washington Post that sometimes, "the single best thing you can do ... is sell the company." The closing price of Yahoo! Inc. on December 7, 2015, was $34.68. The Wall Street Journals Douglas MacMillan reported on February 2, 2016, that Yahoo's CEO Marissa Mayer was expected to cut 15% of its workforce. On July 25, 2016, Verizon Communications announced that it had agreed to purchase Yahoo's core internet business for $4.83 billion. Following the conclusion of the purchase, these assets will be merged with AOL to form a new entity known as Oath; Yahoo, AOL, and Huffington Post will continue to operate under their own names, under the Oath umbrella. The deal excludes Yahoo's 15% stake in Alibaba Group and 35.5% stake in Yahoo! Japan; following the completion of the acquisition, these assets will be retained under the name Altaba, with a new executive team. On September 22, 2016, Yahoo disclosed a data breach that occurred in late 2014, in which information associated with at least 500 million user accounts, one of the largest breaches reported to date. The United States have indicted four men, including two employees of Russia's Federal Security Service (FSB), for their involvement in the hack. On December 14, 2016, the company revealed that another separate data breach had occurred in 2014, with hackers obtaining sensitive account information, including security questions, to at least one billion accounts. The company stated that hackers had utilized stolen internal software to "forge" cookies. In response to these breaches, Bloomberg News reported that Verizon was attempting to re-negotiate the deal to reduce the purchase price by $250 million, causing a 2% increase in Yahoo stock prices. On February 21, 2017, Verizon agreed to lower its purchase price for Yahoo! by $350 million, and share liabilities regarding the investigation into the data breaches. On June 8, 2017, Yahoo shareholders approved the company's sale of some of its Internet assets to Verizon for $4.48 billion. The deal officially closed on June 13, 2017. Products and services Yahoo operated a portal that provides the latest news, entertainment, and sports information. The portal also gave users access to other Yahoo services like Yahoo! Search, Yahoo Mail, Yahoo Maps, Yahoo Finance, Yahoo Groups and Yahoo Messenger. Communication Yahoo provided Internet communication services such as Yahoo Messenger and Yahoo Mail. As of May 2007, its e-mail service would offer unlimited storage. Yahoo provided social networking services and user-generated content, including products such as My Web, Yahoo Personals, Yahoo 360°, Delicious, Flickr, and Yahoo Buzz. Yahoo closed Yahoo Buzz, MyBlogLog, and numerous other products on April 21, 2011. Yahoo Photos was closed on September 20, 2007, in favor of Flickr. On October 16, 2007, Yahoo announced that it would discontinue Yahoo 360°, including bug repairs; the company explained that in 2008 it would instead establish a "universal profile" similar to the Yahoo Mash experimental system. Content Yahoo partners with numerous content providers in products such as Yahoo Sports, Yahoo Finance, Yahoo Music, Yahoo Movies, Yahoo Weather, Yahoo News, Yahoo! Answers and Yahoo Games to provide news and related content. Yahoo provides a personalization service, My Yahoo, which enables users to combine their favorite Yahoo features, content feeds and information onto a single page. On March 31, 2008, Yahoo launched Shine, a site tailored for women seeking online information and advice between the ages of 25 and 54. Co-branded Internet services Yahoo developed partnerships with broadband providers such as AT&T Inc. (via Prodigy, BellSouth & SBC), Verizon Communications, Rogers Communications, and British Telecom, offering a range of free and premium Yahoo content and services to subscribers. Mobile services Yahoo Mobile offers services for email, instant messaging, and mobile blogging, as well as information services, searches and alerts. Services for the camera phone include entertainment and ring tones. Yahoo introduced its Internet search system, called OneSearch, for mobile phones on March 20, 2007. The results include news headlines, images from Flickr, business listings, local weather and links to other sites. Instead of showing only, for example, popular movies or some critical reviews, OneSearch lists local theaters that at the moment are playing the movie, along with user ratings and news headlines regarding the movie. A zip code or city name is required for OneSearch to start delivering local search results. The results of a Web search are listed on a single page and are prioritized into categories. As of 2012, Yahoo used Novarra's mobile content transcoding service for OneSearch. On October 8, 2010, Yahoo announced plans to bring video chat to mobile phones via Yahoo Messenger. Commerce Yahoo offers shopping services such as Yahoo! Shopping, Yahoo Autos, Yahoo Real Estate and Yahoo Travel, which enables users to gather relevant information and make commercial transactions and purchases online. Yahoo Auctions were discontinued in 2007 except for Asia. Yahoo Shopping is a price comparison service which uses the Kelkoo price comparison service it acquired in April 2004. Small business Yahoo provides business services such as Yahoo DomainKeys, Yahoo Web Hosting, Yahoo Merchant Solutions, Yahoo Business Email and Yahoo Store to small business owners and professionals allowing them to build their own online stores using Yahoo's tools. Advertising Yahoo Search Marketing provides services such as Sponsored Search, Local Advertising and Product/Travel/Directory Submit that let different businesses advertise their products and services on the Yahoo network. Following the closure of a "beta" version on April 30, 2010, the Yahoo Publisher Network was relaunched as an advertising tool that allows online publishers to monetize their websites through the use of site-relevant advertisements. Yahoo launched its new Internet advertisement sales system on February 5, 2007, called Panama. It allows advertisers to bid for search terms to trigger their ads on search results pages. The system considers bids, ad quality, clickthrough rates and other factors in ranking ads. Through Panama, Yahoo aims to provide more relevant search results to users, a better overall experience, and to increase monetization. On April 7, 2008, Yahoo announced APT from Yahoo, which was originally called AMP from Yahoo, an online advertising management platform. The platform simplifies advertising sales by unifying buyer and seller markets. The service was launched in September 2008. In September 2011, Yahoo formed an ad selling strategic partnership with 2 of its top competitors, AOL and Microsoft. But by 2013 this was found to be underperforming in market share and revenue, as Microsoft simply skimmed off four percent of the search market from Yahoo, without growing their combined share. GeoPlanet Yahoo offers cartographic and geographic services via GeoPlanet. Yahoo Next Yahoo Next is an incubation ground for future Yahoo technologies currently undergoing testing. It contains forums for Yahoo users to give feedback to assist in the development of these future Yahoo technologies. Yahoo BOSS Yahoo Search BOSS is a service that allows developers to build search applications based on Yahoo's search technology. Early Partners in the program include Hakia, Me.dium, Delver, Daylife and Yebol. In early 2011, the program switched to a paid model using a cost-per-query model from $0.40 to $0.75 CPM (cost per 1000 BOSS queries). The price, as Yahoo explained, depends on whether the query is of web, image, news or other information. Yahoo Meme Yahoo Meme is a beta social service, similar to the popular social networking sites Twitter and Jaiku. Y!Connect Y!Connect enables individuals to leave comments in online publication boards by using their Yahoo ID, instead of having to register with individual publications. The Wall Street Journal reported that Yahoo plans to mimic this strategy used by rival Facebook Inc. to help drive traffic to its site. Yahoo Accessibility Yahoo has invested resources to increase and improve access to the Internet for the disabled community through the Yahoo Accessibility Lab. Yahoo Axis Yahoo Axis is a desktop web browser extension and mobile browser for iOS devices created and developed by Yahoo. The browser made its public debut on May 23, 2012. A copy of the private key used to sign official Yahoo browser extensions for Google Chrome was accidentally leaked in the first public release of the Chrome extension. Yahoo SearchMonkey Yahoo SearchMonkey (often misspelled Search Monkey) was a Yahoo service which allowed developers and site owners to use structured data to make Yahoo Search results more useful and visually appealing, and drive more relevant traffic to their sites. The service was shut down in October 2010 along with other Yahoo services as part of the Microsoft and Yahoo search deal. The name SearchMonkey is an homage to Greasemonkey. Officially the product name has no space and two capital letters. Yahoo SearchMonkey was selected as one of the top 10 Semantic Web Products of 2008. Defunct services Geocities was a popular web hosting service founded in 1995 and was one of the first services to offer web pages to the public. At one point it was the third-most-browsed site on the World Wide Web. Yahoo purchased GeoCities in 1999 and ten years later the web host was closed, deleting some seven million web pages. A great deal of information was lost but many of those sites and pages were mirrored at the Internet Archive, OOcities.com, and other such databases. Yahoo Go, a Java-based phone application with access to most of Yahoo services, was closed on January 12, 2010. Yahoo 360° was a blogging/social networking beta service launched in March 2005 by Yahoo and closed on July 13, 2009. Yahoo Mash beta was another social service closed after one year of operation prior to leaving beta status. Yahoo Photos was shut down on September 20, 2007, in favor of integration with Flickr. Yahoo Tech was a website that provided product information and setup advice to users. Yahoo launched the website in May 2006. On March 11, 2010, Yahoo closed down the service and redirected users to Yahoo's technology news section. Other discontinued services include Farechase, My Web, Audio Search, Pets, Live, Kickstart, Briefcase, and Yahoo for Teachers. Hotjobs was acquired by and merged with Monster.com. Yahoo Koprol was an Indonesian geo-tagging website that allowed users to share information about locations without the use of a GPS device. Koprol was acquired by Yahoo a year following its inception and, in 2011, 1.5 million people were utilizing the website, with users also based in Singapore, the Philippines and Vietnam. However, eighty percent of users were Indonesian. Yahoo officially discontinued Koprol on August 28, 2012, because it did "not meaningfully drive revenue or engagement". Yahoo Mail Classic was announced as to be shut down in April 2013. Yahoo made a notice that, starting in June 2013, Mail Classic and other old versions of Yahoo Mail will be shut down. All users of Mail Classic are expected to switch to the new Yahoo Mail, use IMAP, or switch to another email service. In addition, April 2013 brought the closure of Upcoming, Yahoo Deals, Yahoo SMS Alerts, Yahoo Kids, Yahoo Mail and Messenger feature phone (J2ME). In early July 2013 Yahoo announced the scheduled closure of the task management service Astrid. Yahoo had acquired the company in May 2013 and was to discontinue the service on August 5, 2013. The team at Astrid has supplied its customers with a data export tool and recommended former competitors such as Wunderlist and Sandglaz. Twitter slide leak on changes to Yahoo On December 15, 2010, one day after Yahoo announced layoffs of 4% of its workers across their portfolio, MyBlogLog founder Eric Marcoullier posted a slide from a Yahoo employee on Twitter. The slide was visible during an employee-only strategy webcast indicating changes in Yahoo's offerings. The following services were in a column under "Sunset": Yahoo Picks, AltaVista, MyM, AlltheWeb, Yahoo Bookmarks, Yahoo Buzz, del.icio.us, and MyBlogLog. Under the "Merge" column were: Upcoming, FoxyTunes, Yahoo Events, Yahoo People Search, Sideline, and FireEagle. 11 other properties were listed that Yahoo was interested in developing into feature sites within the portal to take the place of the "Sunset" and "Merge" vacancies, including the prior feature services (before the new Yahoo Mail was launched), were Yahoo Address Book, Calendar, and Notepad. Despite Notepad being listed as a feature service instead of sunset or merge in 2010, Yahoo has since taken steps to de-emphasize Notepad. For example, in January 2013, Notepad was no longer linked within the new Yahoo mail service, although it continued to be linked in the older Classic version. Also, starting in mid- to late January 2013, Notepad was no longer searchable. The blog on the del.icio.us website released a post by Chris Yeh after the slide was leaked in which Yeh stated that "Sunset" doesn't necessarily mean that Yahoo is closing down the site. Yeh further explained that other possibilities—including del.icio.us leaving Yahoo (through sale or spinoff)—were still being considered: "We can only imagine how upsetting the news coverage over the past 24 hours has been to many of you. Speaking for our team, we were very disappointed by the way that this appeared in the press." On April 27, 2011, Yahoo's sale of del.icio.us to Avos was announced. Yahoo Buzz was closed down on April 21, 2011, without an official announcement from Yahoo. MyBlogLog was then discontinued by Yahoo on May 24, 2011. Privacy In September 2013, Yahoo's transparency report said the company received 29 thousand requests for information about users from governments in the first six months of 2013. Over 12 thousand of the requests came from the United States. In October 2013, The Washington Post reported that the U.S. National Security Agency intercepted communications between Yahoo's data centers, as part of a program named Muscular. In late January 2014, Yahoo announced on its company blog that it had detected a "coordinated effort" to hack into possibly millions of Yahoo Mail accounts. The company prompted users to reset their passwords, but did not elaborate on the scope of the possible breach, citing an ongoing federal investigation. Storing personal information and tracking usage Working with comScore, The New York Times found that Yahoo was able to collect far more data about users than its competitors from its Web sites and advertising network. By one measure, on average Yahoo had the potential in December 2007 to build a profile of 2,500 records per month about each of its visitors. Yahoo retains search requests for a period of 13 months. However, in response to European regulators, Yahoo obfuscates the IP address of users after three months by deleting its last eight bits. On March 29, 2012, Yahoo announced that it would introduce a "Do Not Track" feature that summer, allowing users to opt out of Web-visit tracking and customized advertisements. However, on April 30, 2014, Yahoo announced that it would no longer support the "Do Not Track" browser setting. According to a 2008 article in Computerworld, Yahoo has a 2-petabyte, specially built data warehouse that it uses to analyze the behavior of its half-billion Web visitors per month, processing 24 billion daily events. In contrast, the United States Internal Revenue Service (IRS) database of all United States taxpayers weighs in at only 150 terabytes. In September 2016, it was reported that data from at least 500 million Yahoo accounts was stolen in 2014. In October 2016, Reuters reported that in 2015, Yahoo! created a software to search their customers e-mail at the request of NSA or FBI. Criticism In 2000, Yahoo was taken to court in France by parties seeking to prevent French citizens from purchasing memorabilia relating to the Nazi Party. In March 2004, Yahoo launched a paid inclusion program whereby commercial websites were guaranteed listings on the Yahoo search engine. Yahoo discontinued the program at the end of 2009. Yahoo was criticized for providing ads via the Yahoo ad network to companies who display them through spyware and adware. Yahoo, as well as other search engines, cooperated with the Chinese government in censoring search results. In April 2005, dissident Shi Tao was sentenced to 10 years in prison for "providing state secrets to foreign entities" as a result of being identified by IP address by Yahoo. Human rights organizations and the company's general counsel disputed the extent of Yahoo's foreknowledge of Shi's fate. Human rights groups also accuse Yahoo of aiding authorities in the arrest of dissidents Li Zhi and Jiang Lijun. In April 2017, Yahoo was sued for failing to uphold settlement agreements in this case. Yahoo pledged to give support to the families of those arrested and create a relief fund for those persecuted for expressing their views online with Yahoo Human Rights Trust. Of the $17.3 million allotted to this fund, $13 million had been used for a townhouse in Washington, DC and other purchases. In September 2003, dissident Wang Xiaoning was convicted of charges of "incitement to subvert state power" and was sentenced to ten years in prison. Yahoo Hong Kong connected Wang's group to a specific Yahoo e-mail address. Both Xiaoning's wife and the World Organization for Human Rights sued Yahoo under human rights laws on behalf of Wang and Shi. As a result of media scrutiny relating to Internet child predators and a lack of significant ad revenues, Yahoo's "user created" chatrooms were closed down in June 2005. On May 25, 2006, Yahoo's image search was criticized for bringing up sexually explicit images even when SafeSearch was active. Yahoo was a 40% (24% in September 2013) owner of Alibaba Group, which was a subject of controversy for allowing the sale of shark-derived products. The company banned the sale of shark fin products on all its e-commerce platforms effective January 1, 2009. On November 30, 2009, Yahoo was criticized by the Electronic Frontier Foundation for sending a DMCA notice to whistle-blower website "Cryptome" for publicly posting details, prices, and procedures on obtaining private information pertaining to Yahoo's subscribers. After some concerns over censorship of private emails regarding a website affiliated with Occupy Wall Street protests were raised, Yahoo responded with an apology and explained it as an accident. Allegations of sexism against men Scott Ard, a prominent editorial director, fired from Yahoo in 2015 has filed a lawsuit accusing Mayer of leading a sexist campaign to purge male employees. Ard, a male employee, stated "Mayer encouraged and fostered the use of (an employee performance-rating system) to accommodate management's subjective biases and personal opinions, to the detriment of Yahoo's male employees". In the suit Ard claimed prior to his firing, he had received "fully satisfactory" performance reviews since starting at the company in 2011 as head of editorial programming for Yahoo's home page, however, he was relieved of his role that was given to a woman who had been recently hired by Megan Lieberman, the editor-in-chief of Yahoo News. The lawsuit states: "Liberman stated that she was terminating (Ard) because she had not received a requested breakdown of (his) duties. (Ard) had already provided that very information as requested, however, and reminded Liberman that he had done so. Liberman's excuse for terminating (Ard) was a pretext." A second sexual discrimination lawsuit was filed separately by Gregory Anderson, who was fired in 2014, alleging the company's performance management system was arbitrary and unfair, making it the second sexism lawsuit Yahoo and Meyer has faced in 2016. Management Board of Directors David Filo (2014) Co-founder, Chief Yahoo and Director, Yahoo Inc.! Sue James (2010) Retired Partner, Ernst & Young LLP Max Levchin (2012) Chairman and CEO, HVF, LLC Marissa Mayer (2012) – CEO, Yahoo! Inc. Thomas J. McInerney (2012) – Former Executive Vice President and Chief Financial Officer, IAC/InterActiveCorp Charles R. Schwab (2014) Chairman The Charles Schwab Corporation. H. Lee Scott, Jr. (2014) Retired President and chief executive officer Wal-Mart Stores Jane E. Shaw (2014) Retired Chairman of the Board Intel Corporation Maynard Webb (2012) – chairman, Yahoo, founder, Webb Investment Network and chairman and former CEO of LiveOps Chief Executive Officers Marissa Mayer (2012–2017) Ross Levinsohn Interim (2012) Scott Thompson (2012) Tim Morse Interim (2011–2012) Carol Bartz (2009–2011) Jerry Yang (2007–2009) Terry Semel (2001–2007) Timothy Koogle (1995–2001) Former chief operating officer Henrique de Castro departed from the company in January 2014 after Mayer, who initially hired him after her appointment as CEO, dismissed him. De Castro, who previously worked for Google and McKinsey & Company, was employed to revive Yahoo's advertising business. Yahoo International Yahoo offers a multi-lingual interface. The site is available in over 20 languages. The company's international sites are wholly owned by Yahoo, with the exception of its Japan and China sites. Yahoo holds a 34.75% minority stake in Yahoo Japan, while SoftBank holds 35.45%, YahooXtra in New Zealand, which Yahoo!7 have 51% of and 49% belongs to Telecom New Zealand, and Yahoo!7 in Australia, which is a 50–50 agreement between Yahoo and the Seven Network. Historically, Yahoo entered into joint venture agreements with SoftBank for the major European sites (UK, France and Germany) and well as South Korea and Japan. In November 2005, Yahoo purchased the minority interests that SoftBank owned in Europe and Korea. Yahoo used to hold a 40% stake in Alibaba, which manages a web portal in China using the Yahoo brand name. Yahoo in the USA does not have direct control over Alibaba, which operates as a completely independent company. On September 18, 2012, following years of negotiations, Yahoo agreed to sell a 20% stake back to Alibaba for $7.6 billion. On March 8, 2011, Yahoo launched its Romania local service after years of delay due to the financial crisis. Yahoo officially entered the MENA region when it acquired Maktoob, a pan-regional, Arabic-language hosting and social services online portal, on August 25, 2009. Since the service is pan-regional, Yahoo officially became Yahoo Maktoob in the region. On December 31, 2012, Yahoo Korea shut down all its services and left the country, with its previous domain saying in Korean, "Starting from December 31, 2012, Yahoo! Korea has ended. You can go to the original Yahoo! for more Yahoo's information." Sooner did that message also disappear, leaving with just an abandoned, empty search bar powered by Bing. On September 2, 2013, Yahoo China shut down and was redirected to taobao.com, and has been being redirected to Yahoo Singapore's search page. Logos and themes The first logo appeared when the company was founded in 1994—it was red with three icons on each side. The logo used on the Yahoo home page formerly consisted of the color red with a black outline and shadow; however, in May 2009, together with a theme redesign, the logo was changed to purple without an outline or shadow. This change also applied to several international Yahoo home pages. In some countries, most notably Yahoo!7 (of Australia), the logo remained red until 2014. On occasion the logo is abbreviated: "Y!" On August 7, 2013, at around midnight EDT, Yahoo announced that the final version of the new logo would be revealed on September 5, 2013, at 4:00 a.m. UTC. In the period leading up to the unveiling of the new logo, the "30 Days of Change" campaign was introduced, whereby a variation of the logo was published every day for the 30 days following the announcement. The new logo was eventually launched with an accompanying video that showed its digital construction, and Mayer published a personalized description of the design process on her Tumblr page. Mayer explains: So, one weekend this summer, I rolled up my sleeves and dove into the trenches with our logo design team ... We spent the majority of Saturday and Sunday designing the logo from start to finish, and we had a ton of fun weighing every minute detail. We knew we wanted a logo that reflected Yahoo – whimsical, yet sophisticated. Modern and fresh, with a nod to our history. Having a human touch, personal. Proud. On September 19, 2013, Yahoo launched a new version of the "My Yahoo" personalized homepage. The redesign allows users to tailor a homepage with widgets that access features such as email accounts, calendars, Flickr and other Yahoo content, and Internet content. Users can also select "theme packs" that represent artists such as Polly Apfelbaum and Alec Monopoly, and bands such as Empire of the Sun. Mayer then explained at a conference in late September 2013 that the logo change was the result of feedback from both external parties and employees. See also List of search engines List of web analytics software Yahoo! litigation Yahoo! Messenger Protocol References External links Internet search engines Alibaba Group American websites Companies based in Sunnyvale, California Companies in the PRISM network Internet properties established in 1994 Multinational companies headquartered in the United States Software companies based in California Technology companies based in the San Francisco Bay Area Technology companies established in 1994 Telecommunications companies established in 1994 1994 establishments in California 2017 disestablishments in California Companies formerly listed on the Nasdaq Web portals Web service providers World Wide Web
1098280
https://en.wikipedia.org/wiki/OpenTracker
OpenTracker
OpenTracker is the open-source version of the Tracker file manager for BeOS-compatible operating systems. Be Inc. developed the original Tracker for their operating system, BeOS. In 2000, prior to selling all of their assets to Palm, Inc., Be Inc. open-sourced some of their software, including Tracker. The software license, called the Open Tracker License , is an MIT License with two addenda restricting the use of Be Inc. trademarks. Be Inc. hosted OpenTracker until 2001. Before the dissolution of the corporation, both Be developers and outside volunteers contributed to Be's open-source software projects. With Be's dissolution imminent, prominent OpenTracker contributor Axel Dörfler oversaw the relocation of the OpenTracker project to SourceForge, and at the same time began a new software versioning scheme. Dörfler established the new software version at 5.1.0. Some open-source software developers continued to develop OpenTracker, while others forked the source code into novel variations. One such divergence, Tracker.NewFS, has distinctive source code for file system operations, as well as support for SVG icons. yellowTAB, too, added support for SVG icons in their closed-source fork. See also Comparison of file managers Taskbar Haiku Tracker References External links Tracker.NewFS, a derivative of OpenTracker BeOS software Free file managers Free software programmed in C++ Software using the MIT license
8955640
https://en.wikipedia.org/wiki/Altium
Altium
Altium Limited (formerly known as Protel Systems until 2001) is a publicly traded software company that provides PC-based electronics design software for engineers who design printed circuit boards. Founded as Protel Systems Pty Ltd in Australia in 1985, the company has regional headquarters in the United States, Australia, China, Europe, and Japan. Its products are designed for use in a Microsoft Windows environment and used in industries such as automotive, aerospace, defense, and telecommunications. Its flagship product, Altium Designer, is a software for unified electronics design. History Early history The history of Altium dates to 1985 with the founding of Protel Systems Pty Ltd by electronics designer Nicholas Martin. He was working at the University of Tasmania in the 1980s. He saw an opportunity to make the design of electronics product affordable, by marrying the techniques of electronics design to the PC platform. The company launched its first product in 1985, a DOS-based printed circuit board (PCB) layout and design tool. Protel PCB was marketed internationally by HST Technology Pty Ltd. since 1986. In October 1986 the San Diego-based ACCEL Technologies, Inc. acquired marketing and support responsibilities of the PCB program for the US, Canada and Mexico under the name Tango PCB. In 1987, Protel launched the circuit diagram editor Protel Schematic for DOS. This was followed by Autotrax and Easytrax in 1988. In the 1990s, the company began developing a unified electronics design system, which uses a single data model to hold all of the design data required to create a product. FPGA, PCB and embedded software development processes were unified with a common project view and data model. A variety of editing tools could then be used to access and manipulate the design, covering areas such as board layout and design, schematic capture, routing (EDA), testing, analysis and FPGA design. In 1991, Protel released Advanced Schematic/PCB 1.0 for Windows, the world's first Windows-based PCB design system. It also began acquisition of various companies with the technologies needed to create a unified electronics design solution, including Accolade Design Automation in 1998. 1999-2010; IPO and name change to Altium In August 1999, Altium went public on the Australian Securities Exchange under symbol (ASX:ALU). The company continued to develop and release new versions of this design tool, including Protel 98 in 1998, Protel 99 in 1999 and Protel 99 SE in 2000. In 2000, Altium acquired ACCEL with whom they previously partnered with in 1986. In 2001, the company changed its name from Protel Systems to Altium and continued to expand throughout the United States, Europe, and Asia. It also made more acquisitions including embedded software developer Tasking in 2001 for A$73.4 million and EDA software distributor Hoschar AG in 2002. Protel DXP was issued in 2003, Protel 2004 in 2004, Altium Designer 6.0 in 2005. In 2010, Altium acquired Morfik Technology Pty Ltd., a developer of visual design tools for engineering and deploying cloud-based software applications. Morfik's founders originally worked for Altium/Protel before leaving to found the company after Altium's IPO. 2011-present; Expansion and acquisitions In 2011, Altium announced it would be expanding its presence in Shanghai, China in the second half of 2011 to take advantage of lower wages. On October 15, 2012, the Altium board removed Nick Martin as CEO and named executive vice chairman Kayvan Oboudiyat to replace him. On January 16, 2014, Altium announced Kayvan Oboudiyat's retirement and succession by Aram Mirkazemi as CEO. In May of the same year, Altium announced that the core R&D operations for its flagship PCB CAD tools would again relocate in a "cost neutral" move to San Diego, California. In 2015, Altium acquired Octopart, a search engine for electronic and industrial parts. The same year, it acquired the cloud-based electronic component management system company Ciiva. Additional acquisitions by the company have included enterprise PLM integration solutions provider Perception Software in 2016 and cloud-based EDA tool company Upverter in 2017. On 7 June 2021, it was revealed that Altium rejected a bid from Autodesk valuing the company at $5.05 billion AUD. Products Altium develops software that is used for designing of electronic products including printed circuit board. Its products are designed for use in a Microsoft Windows environment and used in industries such as automotive, aerospace, defense, and telecommunications. Altium Designer Altium Designer is a PCB and electronic design automation software package for printed circuit boards. It allows engineers to design and customize their own circuit boards. Altium Designer is considered the flagship software of the company. Autotrax / Easytrax Autotrax is the original Protel PCB design software used for DOS, released in the 1980s. CircuitMaker CircuitMaker is electronic design automation software for printed circuit board designs targeted at the hobby, hacker, and maker community. CircuitMaker is available as freeware, and the hardware designed with it may be used for commercial and non-commercial purposes without limitations. The first non-beta version was released on January 17, 2016. Other products Altium Concord Pro – single source for component data, real-time sourcing information, component traceability within designs, and collaboration tool. Altium NEXUS – team-based PCB workflow solution designed to provide the transparency. AltiumLive – the cloud-based community that connects Altium designers, collaborators, suppliers, manufacturers and customers. Altium Vault – Formal release, re-use and design data management server software. CircuitStudio – PCB design software tool NanoBoard – reconfigurable hardware development platform. P-CAD - Obtained through AccelEDA acquisition, retired in 2006. PDN Analyzer - analyze Power Distribution Network (PDN) voltage and current performance TASKING – An embedded systems software development tool. See also List of EDA companies Electronics Electronic engineering FPGAs Embedded systems Printed circuit board (PCB) List of companies of Australia References Further reading Buetow, Mike (2017-05-25). "The Makers March". Circuit Assembly. Retrieved 2017-05-26. Rako, Paul (2017-03-30). "Altium CircuitStudio review: The glory". EDN Network. Retrieved 2017-04-03. Drysdale, Chelsey (2015-11-12). "Altium Releases Designer 16 PCB Design Tool". Printed Circuit Design & Fab. Retrieved 2017-04-03. Companies established in 1985 Companies listed on the Australian Securities Exchange Electronic design automation software Companies based in Sydney La Jolla, San Diego Companies based in California Software companies of the United States 1985 establishments in Australia
48991154
https://en.wikipedia.org/wiki/Stratoscale
Stratoscale
Stratoscale was a software company offering software-defined data center technology, with hyper-converged infrastructure and cloud computing capabilities. Stratoscale combined compute, storage, and networking hardware with no additional third party software. Stratoscale has shut down with no details for the future of its products. History Stratoscale was founded in 2013 by Ariel Maislos. Stratoscale is headquartered in Israel with offices in Herzliya and Haifa, and offices in North America in Sunnyvale, California, Boston, Massachusetts, and New York City, New York. Stratoscale announced Stratoscale Symphony, in December 2015, selling through channel partners. Stratoscale raised $70 million from Battery Ventures, Bessemer Venture Partners, Intel Capital, Cisco, Leslie Ventures, Qualcomm Ventures, and SanDisk. The company shut down at the end of 2019 due to lack of funding. Products Stratoscale Symphony was marketed for software-defined data centers or hyper-converged infrastructure. The software was intended to work on customers' hardware. Stratoscale Symphony was available on subscription basis. The Symphony suite could be deployed on commodity x86 servers to provide an Amazon Web Services (AWS) capability with the capacity to augment legacy VMware. In 2016, Stratoscale released Symphony 3. Partner program Stratoscale had channel partners, technology partners, and system partners. Channel partners consisted of resellers, integrators, and distributors. Technology partners included CloudEndure, Cloudera, Docker, Hortonworks, Intel, Mellanox Technologies, Midokura, OpenStack, and SanDisk. System partners included Cisco, Hewlett Packard Enterprise (HPE), Infinidat, Lenovo, and Supermicro. References External links Official website Cloud storage Software companies of Israel Companies established in 2013 Data centers Cloud infrastructure Cloud computing providers Cloud platforms VMware Privately held companies of Israel 2010s establishments in Israel Virtualization software Object storage Virtual machines
17682339
https://en.wikipedia.org/wiki/Xgrid
Xgrid
Xgrid is a proprietary program and distributed computing protocol developed by the Advanced Computation Group subdivision of Apple Inc that allows networked computers to contribute to a single task. It provides network administrators a method of creating a computing cluster, which allows them to exploit previously unused computational power for calculations that can be divided easily into smaller operations, such as Mandelbrot maps. The setup of an Xgrid cluster can be achieved at next to no cost, as Xgrid client is pre-installed on all computers running Mac OS X 10.4 to Mac OS X 10.7. The Xgrid client was not included in Mac OS X 10.8. The Xgrid controller, the job scheduler of the Xgrid operation, is also included within Mac OS X Server and as a free download from Apple. Apple has kept the command-line job control mechanism minimalist while providing an API to develop more sophisticated tools built around it. The program employs its own communication protocol layered on top of a schema to communicate to other nodes. This communication protocol interfaces with the BEEP infrastructure, a network application protocol framework. Computers discovered by the Xgrid system, that is computers with Mac OS X's Xgrid service enabled, are automatically added to the list of available computers to use for processing tasks. When the initiating computer sends the complete instructions, or job, for processing to the controller, the controller splits the task up into these small instruction packets, known as tasks. The design of the Xgrid system consists of these small packets being transferred to all the Xgrid-enabled computers on the network. These computers, or nodes, execute the instructions provided by the controller and then return the results. The controller assembles the individual task results into the whole job results and returns them to the initiating computer. Apple modeled the design of Xgrid on the Zilla program, distributed with NeXT's OpenStep operating system application programming interface (API), which Apple owned the rights to. The company also opted to provide the client version of Mac OS X with only command-line functions and little flexibility, while giving the Mac OS X Server version of Xgrid a GUI control panel and a full set of features. History Xgrid's original concept can be traced back to Zilla.app, found in the OPENSTEP operating system, created by NeXT in the late 1980s. Zilla was the first distributed computing program released on an end-user operating system and which used the idle screen-saver motif, a design feature since found in widely used projects such as Seti@Home and Distributed.net. Zilla won the national Computerworld Smithsonian Award (Science Category) in 1991 for ease of use and good design. Apple acquired Zilla, along with the rest of NeXT, in 1997 and later used Zilla as inspiration for Xgrid. The first beta version of Xgrid was released in January 2004. Several organizations have adopted Xgrid in large international computing networks. One example of an Xgrid cluster is MacResearch's OpenMacGrid, where scientists can request access to large amounts of processing power to run tasks related to their research. Another was the now defunct Xgrid@Stanford project, which used a range of computers on the Stanford University campus and around the world to perform biochemical research. In a pre-release promotional piece, MacWorld cited Xgrid among the Unix features in "10 Things to Know about TIGER", calling it "handy if you work with huge amounts of experimental data or render complex animations". After Xgrid's introduction in 2004, InfoWorld noted that it was a "'preview' grade technology" which would directly benefit from the Xserve G5's launch later that year. InfoWorld commentator Ephraim Schwartz also predicted that Xgrid was an opening move in Apple's entry into the enterprise computing market. Apple discontinued Xgrid with OS X v10.8 (Mountain Lion), along with dependent services such as Podcast Producer. Protocol The Xgrid protocol uses the BEEP network framework to communicate with nodes on the network. The system's infrastructure includes three types of computers which communicate over the protocol. One is the client, which communicates the calculation. Next is the controller, which starts and segregates the calculation. Finally, the agents process their own allocated part of the calculation. A computer can act as one or all three of these components at the same time. The Xgrid protocol provides the basic infrastructure for computers to communicate, but is not involved in the processing of the specified calculation. Xgrid is targeted towards time-consuming computations that can be easily segregated into smaller tasks, sometimes called embarrassingly parallel tasks. This includes Monte Carlo calculations, 3D rendering and Mandelbrot maps. Within the Xgrid protocol, three types of messages can be passed to other computers on the same cluster: requests, notifications and replies. Requests must be responded to by the recipient with a reply, notifications do not require a reply, and replies are responses to sent messages. They are identified by their name, type (request/notification/reply) and contents. Each message is encapsulated in a BEEP message (BEEP MSG) and is acknowledged on receipt by an empty reply (RPY). Xgrid does not leverage BEEPs message/reply infrastructure. Any received message which requires a response merely generates an independent BEEP message containing the reply. The Xgrid messages are encoded as dictionaries of key/value pairs which are converted to XML before being sent across the BEEP network. Architecture The architecture of the Xgrid system is designed around a job based system; the controller sends agents jobs, and the agents return the responses. The actual computation that the controller executes in an Xgrid system is known as a job. The job contains all the files required to complete the task successfully, such as the input parameters, data files, directories, executables and/or shell scripts, the files included in an Xgrid job must be able to be executed either simultaneously or asynchronously, or any benefits of running such a job on an Xgrid is lost. Once the job completes, the controller can be set to notify the client of the task's completion or failure, for example by email. The client can leave the network while the tasks are running. It can also monitor the job status on demand by querying the controller, although it cannot track the ongoing progress of individual tasks. The controller is central to the correct function of an Xgrid, as this node is responsible for the distribution, supervision and coordination of tasks on agents. The program running on the controller can assign and reassign tasks to handle individual agent failures on demand. The number of tasks assigned to an agent depend on two factors: the number of agents on an Xgrid and the number of processors in each node. The number of agents on an Xgrid determines how the controller will assign tasks. The tasks may be assigned simultaneously for a large number of agents, or queued for a small number of agents. When a node with more than one processor is detected on an Xgrid, the controller may assign one task per processor; this only occurs if the number of agents on the network is lower than the number of tasks the controller has to complete. Xgrid is layered upon the Blocks Extensible Exchange Protocol (BEEP), an IETF standard comparable to HTTP, but with a focus on two-way multiplexed communication, such as that found in peer-to-peer networks. BEEP, in turn, uses XML to define profiles for communicating between multiple agents over a single network or internet connection. Interface While it is possible to access Xgrid from the command line, the Xgrid graphical user interface, a program bundled with Mac OS X Server and, as of March 2009, available online, is a much more efficient way of administering an Xgrid system. Originally, the Xgrid agent was included in all Mac OS X version 10.4 installations but the GUI was reserved for users of Mac OS X Server. This decision limited the efforts of the computer community to embrace the platform. Eventually, Apple released the Mac OS X Server Administration Tools to the public, which included the Xgrid administration application bundled with Mac OS X Server. Despite the lack of a graphical controller interface in the standard (non-server) Mac OS X distribution, it is possible to set up an Xgrid controller via the command line tools xgridctl and xgrid. Once the Xgrid controller daemon is running, administration of the grid with Apple's Xgrid Admin tool is possible. Some applications, such as VisualHub, provided Xgrid controller capability through their user interfaces. Further reading An Xgrid Primer gives recreational uses of Xgrid. (Link now requires login) See also Condor High-Throughput Computing System Notes Apple Inc. software MacOS Server Job scheduling Cluster computing Grid computing Proprietary software
97275
https://en.wikipedia.org/wiki/Victoria%20and%20Albert%20Museum
Victoria and Albert Museum
The Victoria and Albert Museum (often abbreviated as the V&A) in London is the world's largest museum of applied arts, decorative arts, and design, housing a permanent collection of over 2.27 million objects. It was founded in 1852 and named after Queen Victoria and Prince Albert. The V&A is located in the Royal Borough of Kensington and Chelsea, in an area known as "Albertopolis" because of its association with Prince Albert, the Albert Memorial and the major cultural institutions with which he was associated. These include the Natural History Museum, the Science Museum, the Royal Albert Hall and Imperial College London. The museum is a non-departmental public body sponsored by the Department for Digital, Culture, Media and Sport. As with other national British museums, entrance is free. The V&A covers and 145 galleries. Its collection spans 5000 years of art, from ancient times to the present day, from the cultures of Europe, North America, Asia and North Africa. However, the art of antiquity in most areas is not collected. The holdings of ceramics, glass, textiles, costumes, silver, ironwork, jewellery, furniture, medieval objects, sculpture, prints and printmaking, drawings and photographs are among the largest and most comprehensive in the world. The museum owns the world's largest collection of post-classical sculpture, with the holdings of Italian Renaissance items being the largest outside Italy. The departments of Asia include art from South Asia, China, Japan, Korea and the Islamic world. The East Asian collections are among the best in Europe, with particular strengths in ceramics and metalwork, while the Islamic collection is amongst the largest in the Western world. Overall, it is one of the largest museums in the world. Since 2001, the museum has embarked on a major £150m renovation programme. New 17th- and 18th-century European galleries were opened on 9 December 2015. These restored the original Aston Webb interiors and host the European collections 1600–1815. The V&A Museum of Childhood in East London is a branch of the museum, and a new branch in London is being planned. The first V&A museum outside London, V&A Dundee opened on 15 September 2018. History Foundation The Victoria and Albert Museum has its origins in the Great Exhibition of 1851, with which Henry Cole, the museum's first director, was involved in planning. Initially it was known as the Museum of Manufactures, first opening in May 1852 at Marlborough House, but by September had been transferred to Somerset House. At this stage, the collections covered both applied art and science. Several of the exhibits from the Exhibition were purchased to form the nucleus of the collection. By February 1854 discussions were underway to transfer the museum to the current site and it was renamed South Kensington Museum. In 1855 the German architect Gottfried Semper, at the request of Cole, produced a design for the museum, but it was rejected by the Board of Trade as too expensive. The site was occupied by Brompton Park House; this was extended in 1857, including the first refreshment rooms opened—the museum being the first in the world to provide such a facility. The official opening by Queen Victoria was on 20 June 1857. In the following year, late-night openings were introduced, made possible by the use of gas lighting. This was to enable in the words of Cole "to ascertain practically what hours are most convenient to the working classes"—this was linked to the use of the collections of both applied art and science as educational resources to help boost the productive industry. In these early years the practical use of the collection was very much emphasised as opposed to that of "High Art" at the National Gallery and scholarship at the British Museum. George Wallis (1811–1891), the first Keeper of Fine Art Collection, passionately promoted the idea of wide art education through the museum collections. This led to the transfer to the museum of the School of Design that had been founded in 1837 at Somerset House; after the transfer, it was referred to as the Art School or Art Training School, later to become the Royal College of Art which finally achieved full independence in 1949. From the 1860s to the 1880s the scientific collections had been moved from the main museum site to various improvised galleries to the west of Exhibition Road. In 1893 the "Science Museum" had effectively come into existence when a separate director was appointed. Queen Victoria returned to lay the foundation stone of the Aston Webb building (to the left of the main entrance) on 17 May 1899. It was during this ceremony that the change of name from 'South Kensington Museum' to 'Victoria and Albert Museum' was made public. Queen Victoria's address during the ceremony, as recorded in The London Gazette, ended: "I trust that it will remain for ages a Monument of discerning Liberality and a Source of Refinement and Progress." The exhibition which the museum organised to celebrate the centennial of the 1899 renaming, A Grand Design, first toured in North America from 1997 (Baltimore Museum of Art, Museum of Fine Arts, Boston, Royal Ontario Museum, Toronto, Museum of Fine Arts, Houston and the Fine Arts Museums of San Francisco), returning to London in 1999. To accompany and support the exhibition, the museum published a book, Grand Design, which it has made available for reading online on its website. 1900–1950 The opening ceremony for the Aston Webb building by King Edward VII and Queen Alexandra took place on 26 June 1909. In 1914 the construction commenced of the Science Museum, signaling the final split of the science and art collections. In 1939, on the outbreak of the Second World War, most of the collection was sent to a quarry in Wiltshire, to Montacute House in Somerset, or to a tunnel near Aldwych tube station, with larger items remaining in situ, sand-bagged and bricked in. Between 1941 and 1944 some galleries were used as a school for children evacuated from Gibraltar. The South Court became a canteen, first for the Royal Air Force and later for Bomb Damage Repair Squads. Before the return of the collections after the war, the Britain Can Make It exhibition was held between September and November 1946, attracting nearly a million-and-a-half visitors. This was organised by the Council of Industrial Design, established by the British government in 1944 "to promote by all practicable means the improvement of design in the products of British industry". The success of this exhibition led to the planning of the Festival of Britain (1951). By 1948 most of the collections had been returned to the museum. Since 1950 In July 1973, as part of its outreach programme to young people, the V&A became the first museum in Britain to present a rock concert. The V&A presented a combined concert/lecture by the British progressive folk-rock band Gryphon, who explored the lineage of medieval music and instrumentation and related how those contributed to contemporary music 500 years later. This innovative approach to bringing young people to museums was a hallmark of the directorship of Roy Strong and was subsequently emulated by some other British museums. In the 1980s, Sir Roy Strong renamed the museum as "The Victoria and Albert Museum, the National Museum of Art and Design". Strong's successor Elizabeth Esteve-Coll oversaw a turbulent period for the institution in which the museum's curatorial departments were re-structured, leading to public criticism from some staff. Esteve-Coll's attempts to make the V&A more accessible included a criticised marketing campaign emphasising the café over the collection. In 2001, the museum embarked on a major £150m renovation programme, called the "FuturePlan". The plan involves redesigning all the galleries and public facilities in the museum that have yet to be remodelled. This is to ensure that the exhibits are better displayed, more information is available, access for visitors is improved, and the museum can meet modern expectations for museum facilities. A planned Spiral building was abandoned, in its place a new Exhibition Road Quarter designed by Amanda Levete's AL A was created. It features a new entrance on Exhibition Road, a porcelain-tiled courtyard (The Sackler Courtyard) and a new 1,100-square-metre underground gallery space (The Sainsbury Gallery) accessed through the Blavatnik Hall. The Exhibition Road Quarter project provided 6,400 square metres of extra space, which is the largest expansion at the museum in over 100 years. It opened on 29 June 2017. The museum also runs the Museum of Childhood at Bethnal Green; it used to run Apsley House, and also the Theatre Museum in Covent Garden. The Theatre Museum is now closed; the V&A Theatre Collections are now displayed within the South Kensington building. In March 2018, it was announced that the Duchess of Cambridge would become the first royal patron of the museum. on 15 September 2018, the first V&A museum outside London, V&A Dundee, opened. The museum, built as a cost of £80.11m, is located on the Dundee's waterfront, and is focused on Scottish design, furniture, textiles, fashion, architecture, engineering and digital design. Although it uses the V&A name, its operation and funding is independent of the V&A. Architecture Victorian parts of the building have a complex history, with piecemeal additions by different architects. Founded in May 1852, it was not until 1857 that the museum moved to its present site. This area of London, previously known as Brompton, had been renamed 'South Kensington'. The land was occupied by Brompton Park House, which was extended, most notably by the "Brompton Boilers", which were starkly utilitarian iron galleries with a temporary look and were later dismantled and used to build the V&A Museum of Childhood. The first building to be erected that still forms part of the museum was the Sheepshanks Gallery in 1857 on the eastern side of the garden. Its architect was civil engineer Captain Francis Fowke, Royal Engineers, who was appointed by Cole. The next major expansions were designed by the same architect, the Turner and Vernon galleries built in 1858–1859 to house the eponymous collections (later transferred to the Tate Gallery) and now used as the picture galleries and tapestry gallery respectively. The North and South Courts were then built, both of which opened by June 1862. They now form the galleries for temporary exhibitions and are directly behind the Sheepshanks Gallery. On the very northern edge of the site is situated the Secretariat Wing; also built in 1862, this houses the offices and boardroom, etc. and is not open to the public. An ambitious scheme of decoration was developed for these new areas: a series of mosaic figures depicting famous European artists of the Medieval and Renaissance period. These have now been removed to other areas of the museum. Also started were a series of frescoes by Lord Leighton: Industrial Arts as Applied to War 1878–1880 and Industrial Arts Applied to Peace, which was started but never finished. To the east of this were additional galleries, the decoration of which was the work of another designer, Owen Jones; these were the Oriental Courts (covering India, China and Japan), completed in 1863. None of this decoration survives. Part of these galleries became the new galleries covering the 19th century, opened in December 2006. The last work by Fowke was the design for the range of buildings on the north and west sides of the garden. This includes the refreshment rooms, reinstated as the Museum Café in 2006, with the silver gallery above (at the time the ceramics gallery); the top floor has a splendid lecture theatre, although this is seldom open to the general public. The ceramic staircase in the northwest corner of this range of buildings was designed by F. W. Moody and has architectural details of moulded and coloured pottery. All the work on the north range was designed and built in 1864–1869. The style adopted for this part of the museum was Italian Renaissance; much use was made of terracotta, brick and mosaic. This north façade was intended as the main entrance to the museum, with its bronze doors, designed by James Gamble and , having six panels, depicting Humphry Davy (chemistry); Isaac Newton (astronomy); James Watt (mechanics); Bramante (architecture); Michelangelo (sculpture); and Titian (painting); The panels thus represent the range of the museum's collections. Godfrey Sykes also designed the terracotta embellishments and the mosaic in the pediment of the North Façade commemorating the Great Exhibition, the profits from which helped to fund the museum. This is flanked by terracotta statue groups by Percival Ball. This building replaced Brompton Park House, which could then be demolished to make way for the south range. The interiors of the three refreshment rooms were assigned to different designers. The Green Dining Room (1866–68) was the work of Philip Webb and William Morris, and displays Elizabethan influences. The lower part of the walls is paneled in wood with a band of paintings depicting fruit and the occasional figure, with moulded plaster foliage on the main part of the wall and a plaster frieze around the decorated ceiling and stained-glass windows by Edward Burne-Jones. The Centre Refreshment Room (1865–77) was designed in a Renaissance style by James Gamble. The walls and even the Ionic columns in this room are covered in decorative and moulded ceramic tile, the ceiling consists of elaborate designs on enamelled metal sheets and matching stained-glass windows, and the marble fireplace was designed and sculpted by Alfred Stevens and was removed from Dorchester House prior to that building's demolition in 1929. The Grill Room (1876–81) was designed by Sir Edward Poynter; the lower part of its walls consist of blue and white tiles with various figures and foliage enclosed by wood panelling, while above there are large tiled scenes with figures depicting the four seasons and the twelve months, painted by ladies from the Art School then based in the museum. The windows are also stained glass; there is an elaborate cast-iron grill still in place. With the death of Captain Francis Fowke of the Royal Engineers, the next architect to work at the museum was Colonel (later Major General) Henry Young Darracott Scott, also of the Royal Engineers. He designed to the northwest of the garden the five-storey School for Naval Architects (also known as the science schools), now the Henry Cole Wing, in 1867–1872. Scott's assistant J. W. Wild designed the impressive staircase that rises the full height of the building. Made from Cadeby stone, the steps are in length, while the balustrades and columns are Portland stone. It is now used to jointly house the prints and architectural drawings of the V&A (prints, drawings, paintings and photographs) and Royal Institute of British Architects (RIBA Drawings and Archives Collections), and the Sackler Centre for arts education, which opened in 2008. Continuing the style of the earlier buildings, various designers were responsible for the decoration. The terracotta embellishments were again the work of Godfrey Sykes, although sgraffito was used to decorate the east side of the building designed by F. W. Moody. A final embellishment was the wrought iron gates made as late as 1885 designed by Starkie Gardner. These lead to a passage through the building. Scott also designed the two Cast Courts (1870–73) to the southeast of the garden (the site of the "Brompton Boilers"); these vast spaces have ceilings in height to accommodate the plaster casts of parts of famous buildings, including Trajan's Column (in two separate pieces). The final part of the museum designed by Scott was the Art Library and what is now the sculpture gallery on the south side of the garden, built in 1877–1883. The exterior mosaic panels in the parapet were designed by Reuben Townroe, who also designed the plaster work in the library. Sir John Taylor designed the bookshelves and cases. This was the first part of the museum to have electric lighting. This completed the northern half of the site, creating a quadrangle with the garden at its centre, but left the museum without a proper façade. In 1890 the government launched a competition to design new buildings for the museum, with architect Alfred Waterhouse as one of the judges; this would give the museum a new imposing front entrance. Edwardian period The main façade, built from red brick and Portland stone, stretches along Cromwell Gardens and was designed by Aston Webb after winning a competition in 1891 to extend the museum. Construction took place between 1899 and 1909. Stylistically it is a strange hybrid: although much of the detail belongs to the Renaissance, there are medieval influences at work. The main entrance, consisting of a series of shallow arches supported by slender columns and niches with twin doors separated by the pier, is Romanesque in form but Classical in detail. Likewise, the tower above the main entrance has an open work crown surmounted by a statue of fame, a feature of late Gothic architecture and a feature common in Scotland, but the detail is Classical. The main windows to the galleries are also mullioned and transomed, again a Gothic feature; the top row of windows are interspersed with statues of many of the British artists whose work is displayed in the museum. Prince Albert appears within the main arch above the twin entrances, and Queen Victoria above the frame around the arches and entrance, sculpted by Alfred Drury. These façades surround four levels of galleries. Other areas designed by Webb include the Entrance Hall and Rotunda, the East and West Halls, the areas occupied by the shop and Asian Galleries, and the Costume Gallery. The interior makes much use of marble in the entrance hall and flanking staircases, although the galleries as originally designed were white with restrained classical detail and mouldings, very much in contrast to the elaborate decoration of the Victorian galleries, although much of this decoration was removed in the early 20th century. Post-war period The Museum survived the Second World War with only minor bomb damage. The worst loss was the Victorian stained glass on the Ceramics Staircase, which was blown in when bombs fell nearby; pockmarks still visible on the façade of the museum were caused by fragments from the bombs. In the immediate post-war years, there was little money available for other than essential repairs. The 1950s and early 1960s saw little in the way of building work; the first major work was the creation of new storage space for books in the Art Library in 1966 and 1967. This involved flooring over Aston Webb's main hall to form the book stacks, with a new medieval gallery on the ground floor (now the shop, opened in 2006). Then the lower ground-floor galleries in the south-west part of the museum were redesigned, opening in 1978 to form the new galleries covering Continental art 1600–1800 (late Renaissance, Baroque through Rococo and neo-Classical). In 1974 the museum had acquired what is now the Henry Cole wing from the Royal College of Science. To adapt the building as galleries, all the Victorian interiors except for the staircase were recast during the remodelling. To link this to the rest of the museum, a new entrance building was constructed on the site of the former boiler house, the intended site of the Spiral, between 1978 and 1982. This building is of concrete and very functional, the only embellishment being the iron gates by Christopher Hay and Douglas Coyne of the Royal College of Art. These are set in the columned screen wall designed by Aston Webb that forms the façade. Recent years A few galleries were redesigned in the 1990s including the Indian, Japanese, Chinese, ironwork, the main glass galleries, and the main silverware gallery, which was further enhanced in 2002 when some of the Victorian decoration was recreated. This included two of the ten columns having their ceramic decoration replaced and the elaborate painted designs restored on the ceiling. As part of the 2006 renovation the mosaic floors in the sculpture gallery were restored—most of the Victorian floors were covered in linoleum after the Second World War. After the success of the British Galleries, opened in 2001, it was decided to embark on a major redesign of all the galleries in the museum; this is known as "FuturePlan", and was created in consultation with the exhibition designers and masterplanners Metaphor. The plan is expected to take about ten years and was started in 2002. To date several galleries have been redesigned, notably, in 2002: the main Silver Gallery, Contemporary; in 2003: Photography, the main entrance, The Painting Galleries; in 2004: the tunnel to the subway leading to South Kensington tube station, new signage throughout the museum, architecture, V&A and RIBA reading rooms and stores, metalware, Members' Room, contemporary glass, and the Gilbert Bayes sculpture gallery; in 2005: portrait miniatures, prints and drawings, displays in Room 117, the garden, sacred silver and stained glass; in 2006: Central Hall Shop, Islamic Middle East, the new café, and sculpture galleries. Several designers and architects have been involved in this work. Eva Jiřičná designed the enhancements to the main entrance and rotunda, the new shop, the tunnel and the sculpture galleries. Gareth Hoskins was responsible for contemporary and architecture, Softroom, Islamic Middle East and the Members' Room, McInnes Usher McKnight Architects (MUMA) were responsible for the new Cafe and designed the new Medieval and Renaissance galleries which opened in 2009. Garden The central garden was redesigned by Kim Wilkie and opened as the John Madejski Garden on 5 July 2005. The design is a subtle blend of the traditional and modern: the layout is formal; there is an elliptical water feature lined in stone with steps around the edge which may be drained to use the area for receptions, gatherings or exhibition purposes. This is in front of the bronze doors leading to the refreshment rooms. A central path flanked by lawns leads to the sculpture gallery. The north, east and west sides have herbaceous borders along the museum walls with paths in front which continues along the south façade. In the two corners by the north façade, there is planted an American Sweetgum tree. The southern, eastern and western edges of the lawns have glass planters which contain orange and lemon trees in summer, which are replaced by bay trees in winter. At night both the planters and the water feature may be illuminated, and the surrounding façades lit to reveal details normally in shadow. Especially noticeable are the mosaics in the loggia of the north façade. In summer a café is set up in the southwest corner. The garden is also used for temporary exhibits of sculpture; for example, a sculpture by Jeff Koons was shown in 2006. It has also played host to the museum's annual contemporary design showcase, the V&A Village Fete, since 2005. Exhibition Road Quarter In 2011 the V&A announced that London-based practice AL A had won an international competition to construct a gallery beneath a new entrance courtyard on Exhibition Road. Planning for the scheme was granted in 2012. It replaced the proposed extension designed by Daniel Libeskind with Cecil Balmond but abandoned in 2004 after failing to receive funding from the Heritage Lottery Fund. The Exhibition Road Quarter opened in 2017, with a new entrance providing access for visitors from Exhibition Road. A new courtyard, the Sackler Courtyard, has been created behind the Aston Webb Screen, a colonnade built in 1909 to hide the museum's boilers. The colonnade was kept but the wall in the lower part was removed in the construction to allow public access to the courtyard. The new 1,200-square meter courtyard is the world's first all-porcelain courtyard, which is covered with 11,000 handmade porcelain tiles in fifteen different linear patterns glazed in different tone. A pavilion of Modernist design with glass walls and an angular roof covered with 4,300 tiles is located at the corner and contains a cafe. Skylights on the courtyard provide natural light for the stairwell and the exhibition space located below the courtyard created by digging 15m into the ground. The Sainsbury Gallery's column-less space at 1,100 square metres is one of the largest in the country, providing space for temporary exhibitions. The gallery can be assessed through the existing Western Range building where a new entrance to the Blavatnik Hall and the Museum has been created, and visitors can descend into the gallery via stairs with lacquered tulipwood balustrades. Collections The collecting areas of the museum are not easy to summarize, having evolved partly through attempts to avoid too much overlap with other national museums in London. Generally, the classical world of the West and the Ancient Near East is left to the British Museum, and Western paintings to the National Gallery, though there are all sorts of exceptionsfor example, painted portrait miniatures, where the V&A has the main national collection. The Victoria & Albert Museum is split into four curatorial departments: Decorative Art and Sculpture; Performance, Furniture, Textiles and Fashion; Art, Architecture, Photography and Design; and Asia. The museum curators care for the objects in the collection and provide access to objects that are not currently on display to the public and scholars. The collection departments are further divided into sixteen display areas, whose combined collection numbers over 6.5  million objects, not all items are displayed or stored at the V&A. There is a repository at Blythe House, West Kensington, as well as annex institutions managed by the V&A, also the Museum lends exhibits to other institutions. The following lists each of the collections on display and the number of objects within the collection. The museum has 145 galleries, but given the vast extent of the collections, only a small percentage is ever on display. Many acquisitions have been made possible only with the assistance of the National Art Collections Fund. Architecture In 2004, the V&A alongside Royal Institute of British Architects opened the first permanent gallery in the UK covering the history of architecture with displays using models, photographs, elements from buildings and original drawings. With the opening of the new gallery, the RIBA Drawings and Archives Collection has been transferred to the museum, joining the already extensive collection held by the V&A. With over 600,000 drawings, over 750,000 papers and paraphernalia, and over 700,000 photographs from around the world, together they form the world's most comprehensive architectural resource. Not only are all the major British architects of the last four hundred years represented, but many European (especially Italian) and American architects' drawings are held in the collection. The RIBA's holdings of over 330 drawings by Andrea Palladio are the largest in the world; other Europeans well represented are Jacques Gentilhatre and Antonio Visentini. British architects whose drawings, and in some cases models of their buildings, in the collection, include: Inigo Jones, Sir Christopher Wren, Sir John Vanbrugh, Nicholas Hawksmoor, William Kent, James Gibbs, Robert Adam, Sir William Chambers, James Wyatt, Henry Holland, John Nash, Sir John Soane, Sir Charles Barry, Charles Robert Cockerell, Augustus Welby Northmore Pugin, Sir George Gilbert Scott, John Loughborough Pearson, George Edmund Street, Richard Norman Shaw, Alfred Waterhouse, Sir Edwin Lutyens, Charles Rennie Mackintosh, Charles Holden, Frank Hoar, Lord Richard Rogers, Lord Norman Foster, Sir Nicholas Grimshaw, Zaha Hadid and Alick Horsnell. As well as period rooms, the collection includes parts of buildings, for example, the two top stories of the facade of Sir Paul Pindar's house dated 1600 from Bishopsgate with elaborately carved woodwork and leaded windows, a rare survivor of the Great Fire of London, there is a brick portal from a London house of the English Restoration period and a fireplace from the gallery of Northumberland house. European examples include a dormer window dated 1523–1535 from the chateau of Montal. There are several examples from Italian Renaissance buildings including, portals, fireplaces, balconies and a stone buffet that used to have a built-in fountain. The main architecture gallery has a series of pillars from various buildings and different periods, for example, a column from the Alhambra. Examples covering Asia are in those galleries concerned with those countries, as well as models and photographs in the main architecture gallery. Asia The V&A's collection of Art from Asia numbers more than 160,000 objects, one of the largest in existence. It has one of the world's most comprehensive and important collections of Chinese art whilst the collection of South Asian Art is the most important in the West. The museum's coverage includes items from South and South East Asia, Himalayan Kingdoms, China, the Far East and the Islamic world. Islamic art The V&A holds over 19,000 items from the Islamic world, ranging from the early Islamic period (the 7th century) to the early 20th century. The Jameel Gallery of Islamic Art, opened in 2006, houses a representative display of 400 objects with the highlight being the Ardabil Carpet, the centrepiece of the gallery. The displays in this gallery cover objects from Spain, North Africa, the Middle East, Central Asia and Afghanistan. A masterpiece of Islamic art is a 10th-century Rock crystal ewer. Many examples of Qur'āns with exquisite calligraphy dating from various periods are on display. A 15th-century minbar from a Cairo mosque with ivory forming complex geometrical patterns inlaid in wood is one of the larger objects on display. Extensive examples of ceramics especially Iznik pottery, glasswork including 14th-century lamps from mosques and metalwork are on display. The collection of Middle Eastern and Persian rugs and carpets is amongst the finest in the world, many were part of the Salting Bequest of 1909. Examples of tile work from various buildings including a fireplace dated 1731 from Istanbul made of intricately decorated blue and white tiles and turquoise tiles from the exterior of buildings from Samarkand are also displayed. South Asia The Museum's collections of South and South-East Asian art are the most comprehensive and important in the West comprising nearly 60,000 objects, including about 10,000 textiles and 6000 paintings, the range of the collection is immense. The Jawaharlal Nehru gallery of Indian art, opened in 1991, contains art from about 500 BC to the 19th century. There is an extensive collection of sculptures, mainly of a religious nature, Hindu, Buddhist and Jain. The gallery is richly endowed with the art of the Mughal Empire and the Marathas, including fine portraits of the emperors and other paintings and drawings, jade wine cups and gold spoons inset with emeralds, diamonds and rubies, also from this period are parts of buildings such as a jaali and pillars. India was a large producer of textiles, from dyed cotton chintz, muslin to rich embroidery work using gold and silver thread, coloured sequins and beads is displayed, as are carpets from Agra and Lahore. Examples of clothing are also displayed. In 1879–80, the collections of the defunct East India Company's India Museum were transferred to the V&A and the British Museum. Items in the collection include Tipu's Tiger, an 18th-century automaton created for Tipu Sultan, the ruler of the Kingdom of Mysore. The personal wine cup of Mughal Emperor Shah Jahan also on display. East Asia The Far Eastern collections include more than 70 works of art from the countries of East Asia: China, Japan and Korea. The T. T. Tsui Gallery of Chinese art opened in 1991, displaying a representative collection of the V&As approximately 16,000 objects from China, dating from the 4th millennium BC to the present day. Though the majority of artworks on display date from the Ming and Qing dynasties, there are objects dating from the Tang dynasty and earlier periods, among them a metre-high bronze head of the Buddha dated to about 750 AD, and one of the oldest items, a 2000-year-old jade horse head from a burial. Other sculptures include life-size tomb guardians. Classic examples of Chinese manufacturing are displayed that include lacquer, silk, porcelain, jade and cloisonné enamel. Two large ancestor portraits of a husband and wife painted in watercolour on silk date from the 18th century. There is a unique Chinese lacquerware table, made in the imperial workshops during the reign of the Xuande Emperor in the Ming dynasty. Examples of clothing are also displayed. One of the largest objects is a bed from the mid-17th century. The work of contemporary Chinese designers is also displayed. The Toshiba gallery of Japanese art opened in December 1986. The majority of exhibits date from 1550 to 1900, but one of the oldest pieces displayed is the 13th-century sculpture of Amida Nyorai. Examples of classic Japanese armour from the mid-19th century, steel sword blades (Katana), Inrō, lacquerware including the Mazarin Chest dated c1640 is one of the finest surviving pieces from Kyoto, porcelain including Imari, Netsuke, woodblock prints including the work of Andō Hiroshige, graphic works include printed books, as well as a few paintings, scrolls and screens, textiles and dress including kimonos are some of the objects on display. One of the finest objects displayed is Suzuki Chokichi's bronze incense burner (koro) dated 1875, standing at over 2.25 metres high and 1.25 metres in diameter it is also one of the largest examples made. The museum also holds some cloisonné pieces from the Japanese art production company, Ando Cloisonné. The smaller galleries cover Korea, the Himalayan kingdoms and South East Asia. Korean displays include green-glazed ceramics, silk embroideries from officials' robes and gleaming boxes inlaid with mother-of-pearl made between 500 AD and 2000. Himalayan items include important early Nepalese bronze sculptures, repoussé work and embroidery. Tibetan art from the 14th to the 19th century is represented by notable 14th- and 15th-century religious images in wood and bronze, scroll paintings and ritual objects. Art from Thailand, Burma, Cambodia, Indonesia and Sri Lanka in gold, silver, bronze, stone, terracotta and ivory represents these rich and complex cultures, the displays span the 6th to 19th centuries. Refined Hindu and Buddhist sculptures reflect the influence of India; items on the show include betel-nut cutters, ivory combs and bronze palanquin hooks. Books The museum houses the National Art Library, a public library containing over 750,000 books, photographs, drawings, paintings, and prints. It is one of the world's largest libraries dedicated to the study of fine and decorative arts. The library covers all areas and periods of the museum's collections with special collections covering illuminated manuscripts, rare books and artists' letters and archives. The Library consists of three large public rooms, with around a hundred individual study desks. These are the West Room, Centre Room and Reading Room. The centre room contains 'special collection material'. One of the great treasures in the library is the Codex Forster, one of Leonardo da Vinci's note books. The Codex consists of three parchment-bound manuscripts, Forster I, Forster II, and Forster III, quite small in size, dated between 1490 and 1505. Their contents include a large collection of sketches and references to the equestrian sculpture commissioned by the Duke of Milan Ludovico Sforza to commemorate his father Francesco Sforza. These were bequeathed with over 18,000 books to the museum in 1876 by John Forster. The Reverend Alexander Dyce was another benefactor of the library, leaving over 14,000 books to the museum in 1869. Amongst the books he collected are early editions in Greek and Latin of the poets and playwrights Aeschylus, Aristotle, Homer, Livy, Ovid, Pindar, Sophocles and Virgil. More recent authors include Giovanni Boccaccio, Dante, Racine, Rabelais and Molière. Writers whose papers are in the library are as diverse as Charles Dickens (that includes the manuscripts of most of his novels) and Beatrix Potter (with the greatest collection of her original manuscripts.in the world). Illuminated manuscripts in the library dating from the 12th to 16th centuries include: a leaf from the Eadwine Psalter, Canterbury; Pocket Book of Hours, Reims; Missal from the Royal Abbey of Saint Denis, Paris; the Simon Marmion Book of Hours, Bruges; 1524 Charter illuminated by Lucas Horenbout, London; the Armagnac manuscript of the trial and rehabilitation of Joan of Arc, Rouen. also the Victorian period is represented by William Morris. The National Art Library (also called Word and Image Department) at the Victoria and Albert Museum collection catalogue used to be kept in different formats including printed exhibit catalogues, and card catalogues. A computer system called MODES cataloguing system was used from the 1980s to the 1990s, but those electronic files were not available to the library users. All of the archival material at the National Art Library is using Encoded Archival Description (EAD). The Victoria and Albert Museum has a computer system but most of the items in the collection, unless those were newly accessioned into the collection, probably do not show up in the computer system. There is a feature on the Victoria and Albert Museum website called "Search the Collections," but not everything is listed there. The National Art Library also includes a collection of comics and comic art. Notable parts of the collection include the Krazy Kat Arkive, comprising 4,200 comics, and the Rakoff Collection, comprising 17,000 items collected by writer and editor Ian Rakoff. The Victoria and Albert Museum's Word and Image Department was under the same pressure being felt in archives around the world, to digitise their collection. A large scale digitisation project began in 2007 in that department. That project was entitled the Factory Project to reference Andy Warhol and to create a factory to completely digitise the collection. The first step of the Factory Project was to take photographs using digital cameras. The Word and Image Department had a collection of old photos but they were in black and white and in variant conditions, so new photos were shot. Those new photographs will be accessible to researchers to the Victoria and Albert Museum web-site. 15,000 images were taken during the first year of the Factory Project, including drawings, watercolors, computer-generated art, photographs, posters, and woodcuts. The second step of the Factory Project is to catalogue everything. The third step of the Factory Project is to audit the collection. All of those items which were photographed and catalogued, must be audited to make sure everything listed as being in the collection was physically found during the creation of the Factory Project. The fourth goal of the Factory Project is conservation, which means performing some basic preventable procedures to those items in the department. There is a "Search the Collections" feature on the Victoria and Albert web-site. The main impetus behind the large-scale digitisation project called the Factory Project was to list more items in the collections in those computer databases. British galleries These fifteen galleries—which opened in November 2001—contain around 4,000 items. The displays in these galleries are based around three major themes: "Style", "Who Led Taste" and "What Was New". The period covered is 1500 to 1900, with the galleries divided into three major subdivisions: Tudor and Stuart Britain, 1500–1714, covering the Renaissance, Elizabethan, Jacobean, Restoration and Baroque styles Georgian Britain, 1714–1837, covering Palladianism, Rococo, Chinoiserie, Neoclassicism, the Regency, the influence of Chinese, Indian and Egyptian styles, and the early Gothic Revival Victorian Britain, 1837–1901, covering the later phases of the Gothic Revival, French influences, Classical and Renaissance revivals, Aestheticism, Japanese style, the continuing influence of China, India, and the Islamic world, the Arts and Crafts movement and the Scottish School. Not only the work of British artists and craftspeople is on display, but also work produced by European artists that was purchased or commissioned by British patrons, as well as imports from Asia, including porcelain, cloth and wallpaper. Designers and artists whose work is on display in the galleries include Gian Lorenzo Bernini, Grinling Gibbons, Daniel Marot, Louis Laguerre, Antonio Verrio, Sir James Thornhill, William Kent, Robert Adam, Josiah Wedgwood, Matthew Boulton, Canova, Thomas Chippendale, Pugin, William Morris. Patrons who have influenced taste are also represented by works of art from their collections, these include: Horace Walpole (a major influence on the Gothic Revival), William Thomas Beckford and Thomas Hope. The galleries showcase a number of complete and partial reconstructions of period rooms, from demolished buildings, including: The parlour from 2 Henrietta Street, London, dated 1727–1728, designed by James Gibbs The Norfolk House Music Room, St James Square, London, dated 1756, designed by Matthew Brettingham and Giovanni Battista Borra A section of a wall from the Glass Drawing Room of Northumberland House, dated 1773–1775, designed by Robert Adam Some of the more notable works displayed in the galleries include: Pietro Torrigiani's coloured terracotta bust of Henry VII, dated 1509–1511 Henry VIII's writing desk, dated 1525, made from walnut and oak, lined with leather and painted and gilded with the king's coat of arms A spinet dated 1570–1580, made for Elizabeth I The Great Bed of Ware, dated 1590–1600, a large, elaborately carved four-poster bed with marquetry headboard Gianlorenzo Bernini's bust of Thomas Baker, from the 1630s 17th-century tapestries from the Sheldon and Mortlake Tapestry Works The wood relief of The Stoning of St Stephen, dated c1670, by Grinling Gibbons The Macclesfield Wine Set, dated 1719–1720, made by Anthony Nelme, the only complete set known to survive. The life-size sculpture of George Frederick Handel, dated 1738, by Louis-François Roubiliac Furniture by Thomas Chippendale and Robert Adam The sculpture of Bashaw, dated 1831–1834, by Matthew Cotes Wyatt Aesthetic and Arts & Crafts furniture by Edward William Godwin and Charles Rennie Mackintosh; and carpets and interior textiles by William Morris. The galleries also link design to wider trends in British culture. For instance, design in the Tudor period was influenced by the spread of printed books and the work of European artists and craftsmen employed in Britain. In the Stuart period, increasing trade, especially with Asia, enabled wider access to luxuries like carpets, lacquered furniture, silks and porcelain. In the Georgian age there was an increasing emphasis on entertainment and leisure. For example, the increase in tea drinking led to the production of tea paraphernalia such as china and caddies. European styles are seen on the Grand Tour also influenced taste. As the Industrial Revolution took hold, the growth of mass production produced entrepreneurs such as Josiah Wedgwood, Matthew Boulton and Eleanor Coade. In the Victorian era new technology and machinery had a significant effect on manufacturing, and for the first time since the reformation, the Anglican and Roman Catholic Churches had a major effect on art and design such as the Gothic Revival. There is a large display on the Great Exhibition which, among other things, led to the founding of the V&A. In the later 19th century, the increasing backlash against industrialisation, led by John Ruskin, contributed to the Arts and Crafts movement. Cast courts One of the most dramatic parts of the museum is the Cast Courts in the sculpture wing, comprising two large, skylighted rooms two storeys high housing hundreds of plaster casts of sculptures, friezes and tombs. One of these is dominated by a full-scale replica of Trajan's Column, cut in half to fit under the ceiling. The other includes reproductions of various works of Italian Renaissance sculpture and architecture, including a full-size replica of Michelangelo's David. Replicas of two earlier Davids by Donatello and Verrocchio, are also included, although for conservation reasons the Verrocchio replica is displayed in a glass case. The two courts are divided by corridors on both storeys, and the partitions that used to line the upper corridor (the Gilbert Bayes sculpture gallery) were removed in 2004 to allow the courts to be viewed from above. Ceramics and glass This is the largest and most comprehensive ceramics and glass collection in the world, with over 80,000 objects from around the world. Every populated continent is represented. Apart from the many pieces in the Primary Galleries on the ground floor, much of the top floor is devoted to galleries of ceramics of all periods covered, which include display cases with a representative selection, but also massed "visible storage" displays of the reserve collection. Well represented in the collection is Meissen porcelain, from the first factory in Europe to discover the Chinese method of making porcelain. Among the finest examples are the Meissen Vulture from 1731 and the Möllendorff Dinner Service, designed in 1762 by Frederick II the Great. Ceramics from the Manufacture nationale de Sèvres are extensive, especially from the 18th and 19th centuries. The collection of 18th-century British porcelain is the largest and finest in the world. Examples from every factory are represented, the collections of Chelsea porcelain and Worcester porcelain being especially fine. All the major 19th-century British factories are also represented. A major boost to the collections was the Salting Bequest made in 1909, which enriched the museum's stock of Chinese and Japanese ceramics. This bequest forms part of the finest collection of East Asian pottery and porcelain in the world, including Kakiemon ware. Many famous potters, such as Josiah Wedgwood, William De Morgan and Bernard Leach as well as Mintons & Royal Doulton are represented in the collection. There is an extensive collection of Delftware produced in both Britain and Holland, which includes a circa 1695 flower pyramid over a metre in height. Bernard Palissy has several examples of his work in the collection including dishes, jugs and candlesticks. The largest objects in the collection are a series of elaborately ornamented ceramic stoves from the 16th and 17th centuries, made in Germany and Switzerland. There is an unrivalled collection of Italian maiolica and lustreware from Spain. The collection of Iznik pottery from Turkey is the largest in the world. The glass collection covers 4000 years of glassmaking, and has over 6000 items from Africa, Britain, Europe, America and Asia. The earliest glassware on display comes from Ancient Egypt and continues through the Ancient Roman, Medieval, Renaissance covering areas such as Venetian glass and Bohemian glass and more recent periods, including Art Nouveau glass by Louis Comfort Tiffany and Émile Gallé, the Art Deco style is represented by several examples by René Lalique. There are many examples of crystal chandeliers, both English, displayed in the British galleries, and foreign – for example, a Venetian one attributed to Giuseppe Briati and dated to about 1750. The stained glass collection is possibly the finest in the world, covering the medieval to modern periods, and covering Europe as well as Britain. Several examples of English 16th-century heraldic glass is displayed in the British Galleries. Many well-known designers of stained glass are represented in the collection including, from the 19th century: Dante Gabriel Rossetti, Edward Burne-Jones and William Morris. There is also an example of Frank Lloyd Wright's work in the collection. 20th-century designers include Harry Clarke, John Piper, Patrick Reyntiens, Veronica Whall and Brian Clarke. The main gallery was redesigned in 1994, the glass balustrade on the staircase and mezzanine are the work of Danny Lane, the gallery covering contemporary glass opened in 2004 and the sacred silver and stained-glass gallery in 2005. In this latter gallery stained glass is displayed alongside silverware starting in the 12th century and continuing to the present. Some of the most outstanding stained glass, dated 1243–1248 comes from the Sainte-Chapelle, is displayed along with other examples in the new Medieval & Renaissance galleries. The important 13th-century glass beaker known as the Luck of Edenhall is also displayed in these galleries. Examples of British stained glass are displayed in the British Galleries. One of the most spectacular items in the collection is the chandelier by Dale Chihuly in the rotunda at the Museum's main entrance. Contemporary These galleries are dedicated to temporary exhibits showcasing both trends from recent decades and the latest in design and fashion. Prints and drawings Prints and drawings from the over 750,000 items in the collection can be seen on request at the print room, the "Prints and Drawings study Room"; booking an appointment is necessary. The collection of drawings includes over 10,000 British and 2,000 old master works, including works by: Dürer, Giovanni Benedetto Castiglione, Bernardo Buontalenti, Rembrandt, Antonio Verrio, Paul Sandby, John Russell, Angelica Kauffman, John Flaxman, Hugh Douglas Hamilton, Thomas Rowlandson, William Kilburn, Thomas Girtin, Jean-Auguste-Dominique Ingres, David Wilkie, John Martin, Samuel Palmer, Sir Edwin Henry Landseer, Lord Leighton, Sir Samuel Luke Fildes and Aubrey Beardsley. Modern British artists represented in the collection include: Paul Nash, Percy Wyndham Lewis, Eric Gill, Stanley Spencer, John Piper, Robert Priseman, Graham Sutherland, Lucian Freud and David Hockney. The print collection has more than 500,000 items, covering: posters, greetings cards, bookplates, as well as a comprehensive collection of old master prints from the Renaissance to the present, including works by Rembrandt, William Hogarth, Giovanni Battista Piranesi, Canaletto, Karl Friedrich Schinkel, Henri Matisse and Sir William Nicholson. Fashion The costume collection is the most comprehensive in Britain, containing over 14,000 outfits plus accessories, mainly dating from 1600 to the present. Costume sketches, design notebooks, and other works on paper are typically held by the Word and Image department. Because everyday clothing from previous eras has not generally survived, the collection is dominated by fashionable clothes made for special occasions. One of the first significant gifts of the costume came in 1913 when the V&A received the Talbot Hughes collection containing 1,442 costumes and items as a gift from Harrods following its display at the nearby department store. Some of the oldest items in the collection are medieval vestments, especially Opus Anglicanum. One of the most important items in the collection is the wedding suit of James II of England, which is displayed in the British Galleries. In 1971, Cecil Beaton curated an exhibition of 1,200 20th-century high-fashion garments and accessories, including gowns worn by leading socialites such as Patricia Lopez-Willshaw, Gloria Guinness and Lee Radziwill, and actresses such as Audrey Hepburn and Ruth Ford. After the exhibition, Beaton donated most of the exhibits to the Museum in the names of their former owners. In 1999, V&A began a series of live catwalk events at the museum titled Fashion in Motion featuring items from historically significant fashion collections. The first show featured Alexander McQueen in June 1999. Since then, the museum has hosted recreations of various designer shows every year including Anna Sui, Tristan Webber, Elspeth Gibson, Chunghie Lee, Jean Paul Gaultier, Missoni, Gianfranco Ferré, Christian Lacroix, Kenzo and Kansai Yamamoto amongst others. In 2002, the Museum acquired the Costiff collection of 178 Vivienne Westwood costumes. Other famous designers with work in the collection include Coco Chanel, Hubert de Givenchy, Christian Dior, Cristóbal Balenciaga, Yves Saint Laurent, Guy Laroche, Irene Galitzine, Mila Schön, Valentino Garavani, Norman Norell, Norman Hartnell, Zandra Rhodes, Hardy Amies, Mary Quant, Christian Lacroix, Jean Muir and Pierre Cardin. The museum continues to acquire examples of modern fashion to add to the collection. The V&A runs an ongoing textile and dress conservation programme. For example, in 2008, an important but heavily soiled, distorted and water-damaged 1954 Dior outfit called 'Zemire' was restored to displayable condition for the Golden Age of Couture exhibition. The V&A Museum has a large collection of shoes around 2000 pairs from different cultures around the world. The collection shows the chronological progression of shoe height, heel shape and materials, revealing just how many styles we consider to be modern have been in and out of fashion across the centuries. Furniture In November 2012, the Museum opened its first gallery to be exclusively dedicated to furniture. Prior to this date furniture had been exhibited as part of a greater period context, rather than in isolation to showcase its design and construction merits. Among the designers showcased in the new gallery are Ron Arad, John Henry Belter, Joe Colombo, Eileen Gray, Verner Panton, Thonet, and Frank Lloyd Wright. The furniture collection, while covering Europe and America from the Middle Ages to the present, is predominantly British, dating between 1700 and 1900. Many of the finest examples are displayed in the British Galleries, including pieces by Chippendale, Adam, Morris, and Mackintosh. One of the oldest items is a chair leg from Middle Egypt dated to 200-395AD. The Furniture and Woodwork collection also includes complete rooms, musical instruments, and clocks. Among the rooms owned by the Museum are the Boudoir of Madame de Sévilly (Paris, 1781–82) by Claude Nicolas Ledoux, with painted panelling by Jean Simeon Rousseau de la Rottière; and Frank Lloyd Wright's Kaufmann Office, designed and constructed between 1934 and 1937 for the owner of a Pittsburgh department store. The collection includes pieces by William Kent, Henry Flitcroft, Matthias Lock, James Stuart, William Chambers, John Gillow, James Wyatt, Thomas Hopper, Charles Heathcote Tatham, Pugin, William Burges, Charles Voysey, Charles Robert Ashbee, Baillie Scott, Edwin Lutyens, Edward Maufe, Wells Coates and Robin Day. The museum also hosts the national collection of wallpaper, which is looked after by the Prints, Drawings and Paintings department. The Soulages collection of Italian and French Renaissance objects was acquired between 1859 and 1865, and includes several cassone. The John Jones Collection of French 18th-century art and furnishings was left to the museum in 1882, then valued at £250,000. One of the most important pieces in this collection is a marquetry commode by the ébéniste Jean Henri Riesener dated c1780. Other signed pieces of furniture in the collection include a bureau by Jean-François Oeben, a pair of pedestals with inlaid brass work by André Charles Boulle, a commode by Bernard Vanrisamburgh and a work-table by Martin Carlin. Other 18th-century ébénistes represented in the Museum collection include Adam Weisweiler, David Roentgen, Gilles Joubert and Pierre Langlois. In 1901, Sir George Donaldson donated several pieces of art Nouveau furniture to the museum, which he had acquired the previous year at the Paris Exposition Universelle. This was criticised at the time, with the result that the museum ceased to collect contemporary items and did not do so again until the 1960s. In 1986 the Lady Abingdon collection of French Empire furniture was bequeathed by Mrs T. R. P. Hole. There are a set of beautiful inlaid doors, dated 1580 from Antwerp City Hall, attributed to Hans Vredeman de Vries. One of the finest pieces of continental furniture in the collection is the Rococo Augustus Rex Bureau Cabinet dated c1750 from Germany, with especially fine marquetry and ormolu mounts. One of the grandest pieces of 19th-century furniture is the highly elaborate French Cabinet dated 1861–1867 made by M. Fourdinois, made from ebony inlaid with box, lime, holly, pear, walnut and mahogany woods as well as marble with gilded carvings. Furniture designed by Ernest Gimson, Edward William Godwin, Charles Voysey, Adolf Loos and Otto Wagner are among the late 19th-century and early 20th-century examples in the collection. The work of modernists in the collection include Le Corbusier, Marcel Breuer, Charles and Ray Eames, and Giò Ponti. One of the oldest clocks in the collection is an astronomical clock of 1588 by Francis Nowe. One of the largest is James Markwick the younger's longcase clock of 1725, nearly 3 metres in height and japanned. Other clockmakers with work in the collection include: Thomas Tompion, Benjamin Lewis Vulliamy, John Ellicott and William Carpenter. Jewellery The museum's jewellery collection, containing over 6000 items is one of the finest and most comprehensive collections of jewellery in the world and includes works dating from Ancient Egypt to the present day, as well as jewellery designs on paper. The museum owns pieces by renowned jewellers Cartier, Jean Schlumberger, Peter Carl Fabergé, Andrew Grima, Hemmerle and Lalique. Other items in the collection include diamond dress ornaments made for Catherine the Great, bracelet clasps once belonging to Marie Antoinette, and the Beauharnais emerald necklace presented by Napoleon to his adopted daughter Hortense de Beauharnais in 1806. The museum also collects international modern jewellery by designers such as Gijs Bakker, Onno Boekhoudt, Peter Chang, Gerda Flockinger, Lucy Sarneel, Dorothea Prühl and Wendy Ramshaw, and African and Asian traditional jewellery. Major bequests include Reverend Chauncy Hare Townshend's collection of 154 gems bequeathed in 1869, Lady Cory's 1951 gift of major diamond jewellery from the 18th and 19th centuries, and jewellery scholar Dame Joan Evans' 1977 gift of more than 800 jewels dating from the Middle Ages to the early 19th century. A new jewellery gallery, funded by William and Judith Bollinger, opened on 24 May 2008. Metalwork This collection of more than 45,000 items covers decorative ironwork, both wrought and cast, bronze, silverware, arms and armour, pewter, brassware and enamels (including many examples Limoges enamel). The main iron work gallery was redesigned in 1995. There are over 10,000 objects made from silver or gold in the collection, the display (about 15% of the collection) is divided into secular and sacred covering both Christian (Roman Catholic, Anglican and Greek Orthodox) and Jewish liturgical vessels and items. The main silver gallery is divided into these areas: British silver pre-1800; British silver 1800 to 1900; modernist to contemporary silver; European silver. The collection includes the earliest known piece of English silver with a dated hallmark, a silver gilt beaker dated 1496–1497. Silversmiths whose work is represented in the collection include Paul Storr (whose Castlereagh Inkstand, dated 1817–1819, is one of his finest works) and Paul de Lamerie. The main iron work gallery covers European wrought and cast iron from the medieval period to the early 20th century. The master of wrought ironwork Jean Tijou is represented by both examples of his work and designs on paper. One of the largest items is the Hereford Screen, weighing nearly 8 tonnes, 10.5 metres high and 11 metres wide, designed by Sir George Gilbert Scott in 1862 for the chancel in Hereford Cathedral, from which it was removed in 1967. It was made by Skidmore & Company. Its structure of timber and cast iron is embellished with wrought iron, burnished brass and copper. Much of the copper and ironwork is painted in a wide range of colours. The arches and columns are decorated with polished quartz and panels of mosaic. One of the rarest items in the collection is the 58 cm-high Gloucester Candlestick, dated to c1110, made from gilt bronze; with highly elaborate and intricate intertwining branches containing small figures and inscriptions, it is a tour de force of bronze casting. Also of importance is the Becket Casket dated c1180 to contain relics of St Thomas Becket, made from gilt copper, with enamelled scenes of the saint's martyrdom. Another highlight is the 1351 Reichenau Crozier. The Burghley Nef, a salt-cellar, French, dated 1527–1528, uses a nautilus shell to form the hull of a vessel, which rests on the tail of a parcelgilt mermaid, who rests on a hexagonal gilt plinth on six claw-and-ball feet. Both masts have main and top-sails, and battlemented fighting-tops are made from gold. These items are displayed in the new Medieval & Renaissance galleries. Musical instruments Musical instruments are classified as furniture by the museum, although Asian instruments are held by their relevant departments. Among the more important instruments owned by the museum are a violin by Antonio Stradivari dated 1699, an oboe that belonged to Gioachino Rossini, and a jewelled spinet dated 1571 made by Annibale Rossi. The collection also includes a 1570 virginal said to have belonged to Elizabeth I, and late 19th-century pianos designed by Edward Burne-Jones, and Baillie Scott. The Musical Instruments gallery closed on 25 February 2010, a decision which was highly controversial. An online petition of over 5,100 names on the Parliamentary website led to Chris Smith asking in Parliament about the future of the collection. The answer, from Bryan Davies, was that the museum intended to preserve and care for the collection and keep it available to the public, with items being redistributed to the British Galleries, the Medieval & Renaissance Galleries, and the planned new galleries for Furniture and Europe 1600–1800, and that the Horniman Museum and other institutions were possible candidates for loans of material to ensure that the instruments remained publicly viewable. The Horniman went on to host a joint exhibition with the V&A of musical instruments, and has the loan of 35 instruments from the museum. Paintings (and miniatures) The collection includes about 1130 British and 650 European oil paintings, 6800 British watercolours, pastels and 2000 miniatures, for which the museum holds the national collection. Also on loan to the museum, from Her Majesty the Queen Elizabeth II, are the Raphael Cartoons: the seven surviving (there were ten) full-scale designs for tapestries in the Sistine Chapel, of the lives of Peter and Paul from the Gospels and the Acts of the Apostles. There is also on display a fresco by Pietro Perugino, dated 1522, from the church of Castello at Fontignano (Perugia) which is amongst the painter's last works. One of the largest objects in the collection is the Spanish retable of St George, c. 1400, 670 x 486 cm, in tempera on wood, consisting of numerous scenes and painted by Andrés Marzal De Sax in Valencia. 19th-century British artists are well represented. John Constable and J. M. W. Turner are represented by oil paintings, watercolours and drawings. One of the most unusual objects on display is Thomas Gainsborough's experimental showbox with its back-lit landscapes, which he painted on glass, which allowed them to be changed like slides. Other landscape painters with works on display include Philip James de Loutherbourg, Peter De Wint and John Ward. In 1857 John Sheepshanks donated 233 paintings, mainly by contemporary British artists, and a similar number of drawings to the museum with the intention of forming a 'A National Gallery of British Art', a role since taken on by Tate Britain; artists represented are William Blake, James Barry, Henry Fuseli, Sir Edwin Henry Landseer, Sir David Wilkie, William Mulready, William Powell Frith, Millais and Hippolyte Delaroche. Although some of Constable's works came to the museum with the Sheepshanks bequest, the majority of the artist's works were donated by his daughter Isabel in 1888, including the large number of sketches in oil, the most significant being the 1821 full size oil sketch for The Hay Wain. Other artists with works in the collection include: Bernardino Fungai, Marcus Gheeraerts the Younger, Domenico di Pace Beccafumi, Fioravante Ferramola, Jan Brueghel the Elder, Anthony van Dyck, Ludovico Carracci, Antonio Verrio, Giovanni Battista Tiepolo, Domenico Tiepolo, Canaletto, Francis Hayman, Pompeo Batoni, Benjamin West, Paul Sandby, Richard Wilson, William Etty, Henry Fuseli, Sir Thomas Lawrence, James Barry, Francis Danby, Richard Parkes Bonington and Alphonse Legros. Richard Ellison's collection of 100 British watercolours was given by his widow in 1860 and 1873 'to promote the foundation of the National Collection of Water-Color Paintings'. Over 500 British and European oil paintings, watercolours and miniatures and 3000 drawings and prints were bequeathed in 1868–1869 by the clergymen Chauncey Hare Townshend and Alexander Dyce. Several French paintings entered the collection as part of the 260 paintings and miniatures (not all the works were French, for example Carlo Crivelli's Virgin and Child) that formed part of the Jones bequest of 1882 and as such are displayed in the galleries of continental art 1600–1800, including the portrait of François, Duc d'Alençon by François Clouet, Gaspard Dughet and works by François Boucher including his portrait of Madame de Pompadour dated 1758, Jean François de Troy, Jean-Baptiste Pater and their contemporaries. Another major Victorian benefactor was Constantine Alexander Ionides, who left 82 oil paintings to the museum in 1901, including works by Botticelli, Tintoretto, Adriaen Brouwer, Jean-Baptiste-Camille Corot, Gustave Courbet, Eugène Delacroix, Théodore Rousseau, Edgar Degas, Jean-François Millet, Dante Gabriel Rossetti, Edward Burne-Jones, plus watercolours and over a thousand drawings and prints The Salting Bequest of 1909 included, among other works, watercolours by J. M. W. Turner. Other watercolourists include: William Gilpin, Thomas Rowlandson, William Blake, John Sell Cotman, Paul Sandby, William Mulready, Edward Lear, James Abbott McNeill Whistler and Paul Cézanne. There is a copy of Raphael's The School of Athens over 4 metres by 8 metres in size, dated 1755 by Anton Raphael Mengs on display in the eastern Cast Court. Miniaturists represented in the collection include Jean Bourdichon, Hans Holbein the Younger, Nicholas Hilliard, Isaac Oliver, Peter Oliver, Jean Petitot, Alexander Cooper, Samuel Cooper, Thomas Flatman, Rosalba Carriera, Christian Friedrich Zincke, George Engleheart, John Smart, Richard Cosway and William Charles Ross. Photography The collection contains more than 500,000 images dating from the advent of photography, the oldest image dating from 1839. The gallery displays a series of changing exhibits and closes between exhibitions to allow full re-display to take place. Already in 1858, when the museum was called the South Kensington Museum, it had the world's first international photographic exhibition. The collection includes the work of many photographers from Fox Talbot, Julia Margaret Cameron, Viscountess Clementina Hawarden, Gustave Le Gray, Benjamin Brecknell Turner, Frederick Hollyer, Samuel Bourne, Roger Fenton, Man Ray, Henri Cartier-Bresson, Ilse Bing, Bill Brandt, Cecil Beaton (there are more than 8000 of his negatives), Don McCullin, David Bailey, Jim Lee and Helen Chadwick to the present day. One of the more unusual collections is that of Eadweard Muybridge's photographs of Animal Locomotion of 1887, this consists of 781 plates. These sequences of photographs taken a fraction of a second apart capture images of different animals and humans performing various actions. There are several of John Thomson's 1876-7 images of Street Life in London in the collection. The museum also holds James Lafayette's society portraits, a collection of more than 600 photographs dating from the late 19th to early 20th centuries and portraying a wide range of society figures of the period, including bishops, generals, society ladies, Indian maharajas, Ethiopian rulers and other foreign leaders, actresses, people posing in their motor cars and a sequence of photographs recording the guests at the famous fancy-dress ball held at Devonshire House in 1897 to celebrate Queen Victoria's diamond jubilee. In 2003 and 2007 Penelope Smail and Kathleen Moffat generously donated Curtis Moffat's extensive archive to the museum. He created dynamic abstract photographs, innovative colour still-lives and glamorous society portraits during the 1920s and 1930s. He was also a pivotal figure in Modernist interior design. In Paris during the 1920s, Moffat collaborated with Man Ray, producing portraits and abstract photograms or "rayographs". Sculpture The sculpture collection at the V&A is the most comprehensive holding of post-classical European sculpture in the world. There are approximately 22,000 objects in the collection that cover the period from about 400 AD to 1914. This covers among other periods Byzantine and Anglo Saxon ivory sculptures, British, French and Spanish medieval statues and carvings, the Renaissance, Baroque, Neo-Classical, Victorian and Art Nouveau periods. All uses of sculpture are represented, from tomb and memorial, to portrait, allegorical, religious, mythical, statues for gardens including fountains, as well as architectural decorations. Materials used include, marble, alabaster, stone, terracotta, wood (history of wood carving), ivory, gesso, plaster, bronze, lead and ceramics. The collection of Italian, Medieval, Renaissance, Baroque and Neoclassical sculpture (both original and in cast form) is unequalled outside of Italy. It includes Canova's The Three Graces, which the museum jointly owns with National Galleries of Scotland. Italian sculptors whose work is held by the museum include: Bartolomeo Bon, Bartolomeo Bellano, Luca della Robbia, Giovanni Pisano, Donatello, Agostino di Duccio, Andrea Riccio, Antonio Rossellino, Andrea del Verrocchio, Antonio Lombardo, Pier Jacopo Alari Bonacolsi, Andrea della Robbia, Michelozzo di Bartolomeo, Michelangelo (represented by a freehand wax model and casts of his most famous sculptures), Jacopo Sansovino, Alessandro Algardi, Antonio Calcagni, Benvenuto Cellini (Medusa's head dated c. 1547), Agostino Busti, Bartolomeo Ammannati, Giacomo della Porta, Giambologna (Samson Slaying a Philistine c. 1562, his finest work outside Italy), Bernini (Neptune and Triton c. 1622–3), Giovanni Battista Foggini, Vincenzo Foggini (Samson and the Philistines), Massimiliano Soldani Benzi, Antonio Corradini, Andrea Brustolon, Giovanni Battista Piranesi, Innocenzo Spinazzi, Canova, Carlo Marochetti and Raffaelle Monti. An unusual sculpture is the ancient Roman statue of Narcissus restored by Valerio Cioli c1564 with plaster. There are several small scale bronzes by Donatello such as The Ascension with Christ giving the Keys to St Peter and Lamentation of Christ, Alessandro Vittoria, Tiziano Aspetti and Francesco Fanelli in the collection. The largest item from Italy is the Chancel Chapel from Santa Chiara Florence dated 1493–1500, designed by Giuliano da Sangallo it is 11.1 metres in height by 5.4 metres square, it includes a grand sculpted tabernacle by Antonio Rossellino and coloured terracotta decoration. Rodin is represented by more than 20 works in the museum collection, making it one of the largest collections of the sculptor's work outside France; these were given to the museum by the sculptor in 1914, as acknowledgement of Britain's support of France in the First World War, although the statue of St John the Baptist had been purchased in 1902 by public subscription. Other French sculptors with work in the collection are Hubert Le Sueur, François Girardon, Michel Clodion, Jean-Antoine Houdon, Jean-Baptiste Carpeaux and Jules Dalou. There are also several Renaissance works by Northern European sculptors in the collection including work by: Veit Stoss, Tilman Riemenschneider, Hendrick de Keyser, Jan van Schayck, Hans Daucher and Peter Flötner. Baroque works from the same area include the work of Adriaen de Vries and Sébastien Slodtz. The Spanish sculptors with work in the collection include Alonso Berruguete and Luisa Roldán represented by her Virgin and Child with St Diego of Alcala c. 1695. Sculptors, both British and European, who were based in Britain and whose work is in the collection include Nicholas Stone, Caius Gabriel Cibber, Grinling Gibbons, John Michael Rysbrack, Louis-François Roubiliac, Peter Scheemakers, Sir Henry Cheere, Agostino Carlini, Thomas Banks, Joseph Nollekens, Joseph Wilton, John Flaxman, Sir Francis Chantrey, John Gibson, Edward Hodges Baily, Lord Leighton, Alfred Stevens, Thomas Brock, Alfred Gilbert, George Frampton, and Eric Gill. A sample of some of these sculptors' work is on display in the British Galleries. With the opening of the Dorothy and Michael Hintze sculpture galleries in 2006 it was decided to extend the chronology of the works on display up to 1950; this has involved loans by other museums, including Tate Britain, so works by Henry Moore and Jacob Epstein along with other of their contemporaries are now on view. These galleries concentrate on works dated between 1600 and 1950 by British sculptors, works by continental sculptors who worked in Britain, and works bought by British patrons from the continental sculptors, such as Canova's Theseus and the Minotaur. The galleries overlooking the garden are arranged by theme, tomb sculpture, portraiture, garden sculpture and mythology. Then there is a section that covers late 19th-century and early 20th-century sculpture, this includes work by Rodin and other French sculptors such as Dalou who spent several years in Britain where he taught sculpture. Smaller-scale works are displayed in the Gilbert Bayes gallery, covering medieval especially English alabaster sculpture, bronzes, wooden sculptures and has demonstrations of various techniques such as bronze casting using lost-wax casting. The majority of the Medieval and Renaissance sculpture is displayed in the new Medieval and Renaissance galleries (opened December 2009). One of the largest objects in the collection is the rood loft from St. John's Cathedral ('s-Hertogenbosch), from the Netherlands, dated 1610–1613 this is as much a work of architecture as sculpture, 10.4 metres wide, 7.8 metres high, the architectural framework is of various coloured marbles including columns, arches and balustrade, against which are statues and bas-reliefs and other carvings in alabaster, the work of sculptor Conrad van Norenberch. Textiles The collection of textiles consists of more than 53,000 examples, mainly western European though all populated continents are represented, dating from the 1st century AD to the present, this is the largest such collection in the world. Techniques represented include weaving, printing, quilting embroidery, lace, tapestry and carpets. These are classified by technique, countries of origin and date of production. The collections are well represented in these areas: early silks from the Near East, lace, European tapestries and English medieval church embroidery. The tapestry collection includes a fragment of the Cloth of St Gereon, the oldest known surviving European tapestry. A highlight of the collection is the four Devonshire Hunting Tapestries, very rare 15th-century tapestries, woven in the Netherlands, depicting the hunting of various animals; not just their age but their size make these unique. Both of the major English centres of tapestry weaving of the 16th and 17th centuries respectively, Sheldon & Mortlake are represented in the collection by several examples. Also included are tapestries from John Vanderbank's workshop which was the leading English tapestry manufactory in the late 17th century and early 18th century. Some of the finest tapestries are examples from the Gobelins workshop, including a set of 'Jason and the Argonauts' dating from the 1750s. Other continental centres of tapestry weaving with work in the collection include Brussels, Tournai, Beauvais, Strasbourg and Florence. One of the earliest surviving examples of European quilting, the late 14th-century Sicilian Tristan Quilt, is also held by the collection. The collection has numerous examples of various types of textiles designed by William Morris, including, embroidery, woven fabrics, tapestries (including The Forest tapestry of 1887), rugs and carpets, as well as pattern books and paper designs. The art deco period is covered by rugs and fabrics designed by Marion Dorn. From the same period there is a rug designed by Serge Chermayeff. The collection also includes the Oxburgh Hangings, which were made by Mary, Queen of Scots and Bess of Hardwick. However, the Oxburgh Hangings are on permanent long-term loan at Oxburgh Hall. Theatre and performance The V&A holds the national collection of performing arts in the UK, including drama, dance, opera, circus, puppetry, comedy, musical theatre, costume, set design, pantomime, popular music and other forms of live entertainment. The Theatre & Performance collections were founded in the 1920s when private collector, Gabrielle Enthoven, donated her collection of theatrical memorabilia to the V&A. In 1974 two further independent collections were compiled to form a comprehensive performing arts collection at the V&A. The collections were displayed at the Theatre Museum, which operated from Covent Garden until closing in 2007. Theatre & Performance galleries opened at South Kensington in March 2009 tracing the production process of performance and include a temporary exhibition space. Types of items displayed include costumes, set models, wigs, prompt books, and posters. The department holds significant archives documenting current practice and the history of performing arts. These include the English Stage Company at the Royal Court Theatre, D'Oyly Carte and the design collection of the Arts Council. Notable personal archives include Vivien Leigh, Peter Brook, Henry Irving and Ivor Novello. Rock and pop are well represented with the Glastonbury Festival archive, Harry Hammond photographic collection and Jamie Reid archive documenting punk. Costumes include those worn by John Lennon, Mick Jagger, Elton John, Adam Ant, Chris Martin, Iggy Pop, Prince, Shirley Bassey and the stage outfit worn by Roger Daltrey at Woodstock. Departments Education The education department has wide-ranging responsibilities. It provides information for the casual visitor as well as for school groups, including integrating learning in the museum with the National Curriculum; it provides research facilities for students at degree level and beyond, with information and access to the collections. It also oversees the content of the museum's website in addition to publishing books and papers on the collections, research and other aspects of the museum. Several areas of the collection have dedicated study rooms, these allow access to items in the collection that are not currently on display, but in some cases require an appointment to be made. The new Sackler education suite, occupying the two lower floors of the Henry Cole Wing opened in September 2008. This includes lecture rooms and areas for use by schools, which will be available during school holidays for use by families, and will enable direct handling of items from the collection. V&A Publishing V&A Publishing, within the education department, works to raise funds for the museum by publishing around 30 books and digital items each year. The company has around 180 books in print. Activities for children Activity backpacks are available for children. These are free to borrow and include hands-on activities such as puzzles, construction games and stories related to themes of the museum. Activities for adults The Learning Academy offers adult courses as well as training for professionals in the culture and heritage sector, both nationally and internationally. We also have great facilities in which to teach, study and get closer to our collections. Learning Activity Research and conservation Research is a very important area of the museum's work, and includes: identification and interpretation of individual objects; other studies contribute to systematic research, this develops the public understanding of the art and artefacts of many of the great cultures of the world; visitor research and evaluation to discover the needs of visitors and their experiences of the museum. Since 1990, the museum has published research reports; these focus on all areas of the collections. Conservation is responsible for the long-term preservation of the collections, and covers all the collections held by the V&A and the V&A Museum of Childhood. The conservators specialise in particular areas of conservation. Areas covered by the conservator's work include "preventive" conservation this includes: performing surveys, assessments and providing advice on the handling of items, correct packaging, mounting and handling procedures during movement and display to reduce risk of damaging objects. Activities include controlling the museum environment (for example, temperature and light) and preventing pests (primarily insects) from damaging artefacts. The other major category is "interventive" conservation, this includes: cleaning and reintegration to strengthen fragile objects, reveal original surface decoration, and restore shape. Interventive treatment makes an object more stable, but also more attractive and comprehensible to the viewer. It is usually undertaken on items that are to go on public display. Partnerships The V&A works with a small number of partner organisations in Sheffield, Dundee and Blackpool to provide a regional presence. The V&A discussed with the University of Dundee, University of Abertay, Dundee City Council and the Scottish Government in 2007 with a view to opening a new £43 million gallery in Dundee, which would use the V&A brand although it would be funded through and operated independently. Costs was estimated at £76 million in 2015, making it the most expensive gallery project ever undertaken in Scotland. V&A Dundee opened on 15 September 2018. Dundee City Council pays for a major part of the running costs. The V&A does not contribute financially, but it provides expertise, loans and exhibitions. Plans for a new gallery in Blackpool are also under consideration. This follows earlier plans to move the theatre collection to a new £60m museum in Blackpool, which failed due to lack of funding. The V&A exhibits twice a year at the Millennium Galleries in partnership with Museums Sheffield. The V&A is one of 17 museums across Europe and the Mediterranean participating in a project called Discover Islamic Art. Developed by the Brussels-based consortium Museum With No Frontiers, this online "virtual museum" brings together more than 1200 works of Islamic art and architecture into a single database. The museum is a non-departmental public body sponsored by the Department for Digital, Culture, Media and Sport. As with other national British museums, entrance is free. Exhibitions The V&A has large galleries devoted to temporary exhibitions. A typical year will see more than a dozen different exhibitions being staged, covering all areas of the collections. Notable exhibitions of recent years have been: Britain Can Make It, 1946 Hats: An Anthology, 2009 Power of Making, 2011 Food: Bigger Than the Plate, 2019 The V&A came second in London's top paid exhibitions in 2015 with the record-breaking Alexander McQueen show (3,472 a day). Controversies In November 2019 the art photographer Nan Goldin led a ‘die-in’ in the Sackler courtyard entrance of the museum, in protest against the V&A's acceptance of donations from the Sackler family, which owned Purdue Pharma, makers of the addictive opioid painkiller OxyContin. The museum’s director, Tristram Hunt, defended the museum’s relationship with the Sacklers, saying it was proud to have received support from the family over a number of years. Also in 2019, the V&A received sponsorship for an exhibition on cars from Bosch, which had been fined 90 million euro over its part in the diesel emissions scandal. A V&A spokeswoman said: “Bosch is at the forefront of innovation, with a focus on delivering sustainable solutions for the mobility of the future. Extinction Rebellion staged a dirty protest outside the V&A Dundee, in protest against Barclays Bank's sponsorship of the museum's Mary Quant exhibition. In 2021 plans to cut the museum’s costs by reorganising its collections by date rather than by material were abandoned after critics said it would lead to staff cuts and thereby a loss of expertise. Media Starting in March 2020, BBC Two transmitted a series of six programmes depicting the back-stage work of the curators and restorers of the museum, entitled Secrets of the Museum. Galleries General views Museum galleries Asia British galleries Metalwork Paintings English paintings French paintings Italian paintings Sculptures Gothic Art See also List of most visited art museums Director of the Victoria and Albert Museum Philippa Glanville V&A Digital Futures events on digital art References Bibliography External links V&A websites: A list of past exhibitions held at the V&A Historical images of V&A Construction of V&A Museum The V&A Museum prior to opening Victoria and Albert Museum at the Survey of London online: Architectural history (to 1975) and description Plans Architecture of the V&A Albertopolis: Victoria and Albert Museum 1852 establishments in England Albert, Prince Consort Architecture museums in the United Kingdom Art museums and galleries in London Art museums and galleries in England Art museums established in 1852 Asian art museums Ceramics museums in the United Kingdom Charities based in London Decorative arts museums in England Decorative arts museums Design museums Domes Edwardian architecture in London English design Exempt charities Fashion museums in the United Kingdom Glass museums and galleries Grade I listed buildings in the Royal Borough of Kensington and Chelsea Grade I listed museum buildings Great Exhibition Jewellery museums Museums in the Royal Borough of Kensington and Chelsea Museums sponsored by the Department for Digital, Culture, Media and Sport Non-departmental public bodies of the United Kingdom government Performing arts museums Photography museums and galleries in England Queen Victoria Textile museums in the United Kingdom Victoria and Albert Museum South Kensington Art Nouveau collections
663905
https://en.wikipedia.org/wiki/Qinetiq
Qinetiq
Qinetiq ( as in kinetic; styled as QinetiQ) is a British multinational defence technology company headquartered in Farnborough, Hampshire, England. It is the world's 52nd-largest defence contractor measured by 2011 defence revenues, and the sixth-largest based in the United Kingdom. As a private entity, Qinetiq was created in April 2001; prior to this, it had been part of Defence Evaluation and Research Agency (DERA), a now-defunct British government organisation. While a large portion of DERA's assets, sites, and employees were transferred to Qinetiq, other elements were incorporated into Defence Science and Technology Laboratory (DSTL), which remains in government ownership. Some former DERA locations have thus become key sites for Qinetiq. These include Farnborough, Hampshire; MoD Boscombe Down, Wiltshire; and Malvern, Worcestershire. In February 2006, Qinetiq was floated on the London Stock Exchange. The privatisation process was subject to an inquiry by the UK's National Audit Office, which was critical of the generous incentive scheme available to the company's management. Qinetiq has completed numerous acquisitions of defence- and technology-related companies, primarily those that are based in the United States, and is a trusted supplier to the US government. Qinetiq USA operates under a Special Security Arrangement which allows it to work independently and separately on some of the most sensitive United States defense programs despite its foreign ownership. It has also spun off some its technologies into new companies, such as Omni-ID Ltd. It is currently a constituent of the FTSE 250 Index. Name "Qinetiq" is an invented name. "Qi" is supposed to reflect the company's energy, "net" its networking ability, and "iq" its intellectual resources. The name was adopted in early 2001 as a marker of Defence Evaluation and Research Agency (DERA) privatisation; the rebranding reportedly came at a cost of £400,000. History Creation and early years In early 2001, defence minister Lewis Moonie announced the creation of Qinetiq via the privatisation of the Defence Evaluation and Research Agency (DERA). At the time, Moonie stated that the entity would remain a British business, being based in the UK, and that the Ministry of Defence (MoD) would retain a 'special share' in the company, while safeguards would be in place to prevent conflicts of interest. By April 2002, while Qinetiq had taken steps to operate on a commercial basis and saw third parties as its key growth area, 80% of its annual sales was reportedly being derived from the UK MoD. It was observed that Qinetiq's close relationship with the MoD gave it a competitive edge over most private-sector rivals. Initially, Qinetiq was entirely owned by the British government; it was planned for a stock market flotation of the firm to be conducted sometime during 2002. However, this flotation was postponed; according to aerospace industry periodical Flight International, a lack of investor confidence was the principal reason for the delay. In late 2002, the Carlyle Group, an American private equity firm, publicly declared its intention to purchase a large stake in Qinetiq. In February 2003, the Carlyle Group completed the acquisition of a 33.8% share for £42 million. Prior to Qinetiq's flotation years later, ownership of the firm was divided between the MoD (56%), Carlyle Group (31%) and staff (13%). The Carlyle Group was expected to remain invested in Qinetiq for between three and five years, after which a stock exchange float would take place. In September 2004, Qinetiq acquired the US defence companies Westar Corporation and Foster-Miller, maker of the Talon robot. Also in 2004, it acquired HVR Consulting Services a leading UK-based engineering consultancy. In early August 2005, the company announced it would acquire Apogen Technologies, Inc., pending regulatory approval; according to Qinetiq's website, the purchase came at a cost of $288.0m (£162.7m). In September 2005, the company acquired a 90% share of Verhaert Design and Development NV (VDD), a Belgian space systems integrator. In October that year, it acquired Broadreach Networks Limited, a supplier of Wi-Fi internet equipment to the European rail industry, and in February 2006, it bought Graphics Research Corporation Ltd, developer of the Paramarine software suite of ship and submarine design tools. Stock exchange listing On 12 January 2006, an announcement was made in Parliament by John Reid, Secretary of State for Defence, regarding the pending floatation of Qinetiq. Reid stated that the Carlyle Group 'will continue to retain a significant stake in the company', and that the government would continue to hold a 'Golden Share' to protect the UK's security and defence interests. On 10 February 2006, Qinetiq was floated on the London Stock Exchange. The valuation of the company, and of how much taxpayers would benefit from QinetiQ's privatisation, was a subject of considerable debate and controversy. The company had been valued at between £1.1bn and £1.3bn, with the MoD holding estimated to be worth £616m – £728m, the Carlyle Group's holding £341m – £403m, and staff/management's holding worth £143m – £169m. Controversy was generated by the very large returns generated for both the Carlyle Group and senior managers at the company; reportedly Sir John Chisholm is speculated to have benefitted by over £20 million alone. Lord Moonie, who handled the initial sale, stated in 2006 that the government's 31 per cent stake should not have been sold when equity markets were languishing in 2002. Moonie said that he had argued for the sale to be delayed, but was over-ruled by the Treasury, which had convinced the Ministry of Defence to go ahead. Controversy also arose around the fact that retail investors were excluded from the initial public offering (IPO) due to Qinetiq's complexity and that institutional investors would require less complicated marketing and financing. This led to contrasts with the 'Sid' campaign for British Gas plc in 1986, where retail investors were encouraged to buy shares, with discounts and a large advertising campaign. The issue was partially resolved by allowing some brokerage firms to place orders in the IPO as part of a combined order, allowing the firm to purchase as though an institutional investor but on behalf of clients. While this did not result in a public campaign or retail investor discounts, it did allow many investors to purchase shares. Upon its floating on 10 February 2006, Qinetiq had an IPO of 200p per share, resulting in a market value of £1.3bn. On 13 February 2006, shares closed at 219.5p, valuing it at over £1.4bn. Speculation that a consortium including Qinetiq was about to win a £10bn MoD training contract helped push their share price back above 190p in early November 2006. It was announced on 17 January 2007 that the Qinetiq-led Metrix consortium was the preferred bidder for package one of the MoD's Defence Training Rationalisation programme, worth approx £16bn. NAO inquiry In 2007, the National Audit Office conducted an inquiry into the privatisation to determine whether UK taxpayers received good value for money. The inquiry looked at the following issues: the choice of privatisation strategy; management of the process (the split of the Defence Evaluation and Research Agency into two, the sale to Carlyle and the flotation); costs incurred and the proceeds achieved; and whether the deal met its objectives. In November 2007, the NAO reported that taxpayers could have gained "tens of millions" more and was critical of the incentive scheme given to Qinetiq managers, the 10 most senior of whom gained £107.5m on an investment of £540,000 in the company's shares. The return of 19,990% was described as "excessive" by the NAO. The role of Qinetiq's management in negotiating terms with the Carlyle Group while the private equity company was bidding for the business was also criticised by the NAO. Carlyle bought a third of the business for £42m, which grew in value to £372m in less than four years. However, the Ministry of Defence defended the sale: "It has delivered excellent value for money, generating more than £800m for the taxpayer, while protecting UK defence and security interests," said Baroness Taylor, Minister for Defence Equipment and Support. Expansion In January 2007, the company bought Analex, a US corporation that provides high technology professional services, principally to the US government and its agencies. It was originally incorporated in 1964 under the name Biorad and evolved into Hadron, a US government systems consulting firm. In February 2007, the acquisition of ITS Corporation, a provider of IT services to the US government and its agencies, was announced. The disposal of Aerospace Filtration Systems (formerly part of Westar) was announced at the same time. In June of that year, Qinetiq announced that Apogen Technologies Inc., its US subsidiary, had completed the acquisition of 3H Technology LLC, a specialist IT company with US government and commercial clients. In October, the company completed the acquisition of Boldon James Holdings Limited, a UK-based provider of software for high end secure messaging, primarily for military, government and security customers worldwide. In March 2007, Qinetiq spun off a new company, Omni-ID Ltd; this entity specialises in the commercial opportunities for passive UHF radio-frequency identification (RFID) tags. Prior to the spin off, a research team at Qinetiq had been active since the 1990s to develop new and more effective RFID technologies. On 9 February 2007, the Carlyle Group sold its remaining 10.3% stake in the group at 205p per share, resulting in a £290 million return on its original investment. During September 2008, the MoD sold its remaining 18.9% holding in Qinetiq at 206p per share, raising £254 million. The British government retained its 'special share', giving it control over any potential takeover. In February 2020, Qinetiq acquired military training specialist Newman & Spurr Consultancy Ltd for £14 million. Cyber security During mid-2013, reports emerged that Chinese hackers had allegedly compromised sensitive military research being performed by Qinetiq. It was claimed that, between 2007 and 2010, Qinetiq's North American business was the subject of a cyber-attack. At the time of the incidents, the company said it disclosed all of its breaches to the responsible government agencies and these were resolved to their satisfaction. The Pentagon has stated that it still entrusts Qinetiq with sensitive defence technology. The issue of cyber security affected other organisations; a Pentagon report stated that various US government agencies had been victims of cyber attacks. Qinetiq provides auditing and consultancy services on cyber security to third party businesses. In 2011, the company announced the launch of a strategic collaboration with information security firm Nexor to pool their cyber security portfolios. During 2016, Qinetiq released a whitepaper on the topic, which identified employee behaviour as a major contributing factor in the majority of security breaches. Qinetiq has partnered with mobile phone network provider Vodafone to support end-to-end internet security services. Operations Qinetiq provides technology-based products and services to numerous government and commercial customers. More than 2,000 of Qinetiq subsidiary Foster-Miller's Talon robots have been deployed to Iraq and Afghanistan, most used to remotely locate and disable roadside bombs. Qinetiq's SPO stand-off threat detection system has been sold to the US Transportation Security Administration for railway stations and airports. During August 2008, Qinetiq's Zephyr, a solar powered unmanned aerial vehicle (UAV), performed a non-stop flight spanning 14 day; this was a world record for the longest duration unmanned flight. Over the following years, Qinetic performed further record-breaking flights of the UAV. During summer 2018, an improved model of the Zephyr conducted an even-longer flight, lasting nearly 26 days. The Zephyr UAV has been offered as a commercial product, the programme having been acquired by multinational aerospace company Airbus Group. Qinetiq have been involved in the further development of the Zephyr, such as the provision of LIDAR payload for the type. Qinetiq has a 25-year Long Term partnering Agreement (LTPA) with the UK Ministry of Defence (MoD) to provide test and evaluation services and manage military ranges. It is a major stakeholder in the UK Defence Technology Centre, which places military research contracts on behalf of the MoD. Qinetiq has a 15-year Maritime Strategic Facilities Agreement (MSCA) with the MoD to provide strategic maritime facilities and capabilities, including hydromechanic facilities at Haslar, biomedical facilities on the UK's South Coast, and submarine structures, survivability and shock testing facilities at Rosyth. Organisation The Qinetiq Group comprises Qinetiq EMEA (Europe, Middle East and Australasia) and Qinetiq North America. Qinetiq North America, which was set up after the takeover of Foster-Miller, is a wholly owned subsidiary of Qinetiq, but remains independent and separated from the Qinetiq group by a proxy agreement with the US to comply with US laws that prevent sensitive technology coming under the control of a foreign venture that takes over a US company. The major UK sites are at Farnborough, Hampshire (the historical Royal Aircraft Establishment) and Malvern, Worcestershire (the historical RSRE/RRE/TRE). Workforce Qinetiq is one of the ten largest UK employers of science and engineering graduates, recruiting around 150 per year. Between 2002 and 2006, it has appeared in the Times Top 100 Graduate Employers list. During 2005, Qinetiq was accused by union officials of its employees exhibiting higher than average levels of stress-related depression, a finding that was strongly denied by the company. On March 25, 2021, a worker was seriously injured at a Qinetiq-run Ministry of Defence facility in Pendine, Carmarthen. Services and products The company's services and products include: Defence LAST Armour Talon Robot ALARM radar (Alerter of Approaching Rocket Munitions) Family of Advanced Cost Estimating Tools (FACET) Operating and Support Cost Model (OSCAM) Airships and balloons QinetiQ 1 UAS Qinetiq Mercator Formerly Zephyr (sold to Airbus in 2013) Security Cyveillance Optasense – Distributed acoustic sensing X-Net Aviation Acoustic testing Wind tunnel testing Notable staff Former Central Intelligence Agency Director George Tenet was an independent non-executive director between October 2006 and January 2008. David Sharp was a mechanical engineer who worked for the company until 2005 when he resigned. The UK Secretary of State for Defence, Ben Wallace MP, joined the company in 2003 as a director. See also Railgun Scramjet Aerogenerator References External links Official site British companies established in 2001 Defence companies of the United Kingdom Science and technology in the United Kingdom Technology companies of the United Kingdom Aerospace companies of England Companies based in Farnborough Privatised executive agencies of the United Kingdom government Privatization controversies Privatisation in the United Kingdom Private equity portfolio companies Malvern, Worcestershire The Carlyle Group companies Technology companies established in 2001 2001 establishments in England British brands Manufacturing companies of the United Kingdom Companies listed on the London Stock Exchange
12119787
https://en.wikipedia.org/wiki/Green%20Packet
Green Packet
Green Packet is an international technology company that was founded in the heart of California's Silicon Valley. Founded in 2000, it was listed on the Malaysian Stock Exchange in 2005. In 2007, Green Packet crossed US$1 billion in market capitalization. Today, Green Packet designs and produces wireless devices, user-centric applications and services. Its core businesses are Solution (cellular devices), Communication (voice minutes and data), and Digital Services (fintech and proptech). It is headquartered in Petaling Jaya, Malaysia, with branch offices in China, Singapore, Hong Kong and Taiwan. Products and services Green Packet's businesses are anchored in five key segments: Solutions, Communications, FinTech, PropTech and Digital Services (Cloud Technology, Internet of Things and Artificial Intelligence). Subsidiary In August 2008, Green Packet created Packet One Networks, the first Wimax service provider in Malaysia. History Green Packet was started in Cupertino, California, and later moved to Malaysia. In 2005, it was listed on the Malaysia Board of Exchange. References Malaysian brands Software companies of Malaysia Telecommunications equipment vendors Telecommunications companies established in 2000 2000 establishments in Malaysia Companies formerly listed on MESDAQ Companies listed on Bursa Malaysia
3270224
https://en.wikipedia.org/wiki/List%20of%20SIP%20software
List of SIP software
This list of SIP software documents notable software applications which use Session Initiation Protocol (SIP) as a voice over IP (VoIP) protocol. Servers Free and open-source license A SIP server, also known as a SIP proxy, manages all SIP calls within a network and takes responsibility for receiving requests from user agents for the purpose of placing and terminating calls. Asterisk Cipango SipServlets 1.1 application server ejabberd FreeSWITCH FreePBX GNU SIP Witch Issabel, fork of Elastix Kamailio, formerly OpenSER Mobicents Platform (JSLEE[2] 1.0 compliant and SIP Servlets 1.1 compliant application server) Mysipswitch OpenSIPS, fork of OpenSER SailFin SIP Express Router (SER) Enterprise Communications System sipXecs Yate Proprietary license 3Com VCX IP telephony module: back-to-back user agent SIP PBX 3CX Phone System, for Windows, Debian 8 GNU/Linux Aastra 5000, 800, MX-ONE Alcatel-Lucent 5060 IP Call server Aricent SIP UA stack, B2BUA, proxy, VoLTE/RCS Client AskoziaPBX Avaya Application Server 5300 (AS5300), JITC certified ASSIP VoIP Bicom Systems IP PBX for telecoms Brekeke SIP Server, SIP proxy, SIP registrar, SIP NAT, TCP/UDP Brekeke PBX, SIP PBX for service providers and enterprises Cisco SIP Proxy Server, Cisco unified border element (CUBE), Cisco Unified Communication Manager (CUCM) CommuniGate Pro, virtualized PBX for IP Centrex hosting, voicemail services, self-care, ... Comverse Technology softswitch, media applications, SIP registrars Creacode SIP Application Server Real-time SIP call controller and IVR product for carrier-class VoIP networks Dialogic Corporation Powermedia Media Servers, audio and video SIP IVR, media and conferencing servers for Enterprise and Carriers. Dialexia VoIP Softswitches, IP PBX for medium and enterprise organizations, billing servers. IBM WebSphere Application Server - Converged HTTP and SIP container JEE Application Server Interactive Intelligence Windows-based IP PBX for small, medium and enterprise organizations Kerio Operator, IP PBX for small and medium enterprises Microsoft Lync Server 2010 & 2013 Mitel Communications Director NEC SV7000 back-to-back user agent SIP PBX NEC UNIVERGE 3C Unified Communications and Collaboration software Nokia Siemens Networks hiQ8000 Nortel SCS500 Nortel SIP Multimedia Communication Server 5200 Objectworld UC Server Oracle Communications Converged Application Server (OCCAS) Oracle WebLogic SIP Server Spirent SIP Server Platform ShoreTel IP phone systems with unified communications and contact center built in Snom One free/blue/yellow (Snom acquired and renamed pbxnsip) (SIP) Speedflow Communications VoIP class 4/5 softswitches with integrated billing, transcoding, SIP-H.323 converter. Sterlite Technologies Neox IPPBX, IMS - ISC, Dial Center - OmniChannel Call Center, IVR products Sun Microsystems Sun GlassFish Communication Server Tadiran Telecom Coral Ipx family and Aeonix softswitch Tandberg Video Communication Server - SIP application server, media server and H.323 gateway TrueConf Server - video conferencing server software, SIP gateway Unify OpenScape Voice, OpenScape 8000 SIP softswitch, mediaserver, ... (SIP) Voice Elements Inventive Labs' .NET Voice Development software and SIP stack platform. Wildix WGW series Unified communication platform up to 5000 users on a single server. Up to 65535 users on WMS network Zultys MX250/MX30 IP PBXs for SMB and enterprise Clients Free and open-source license Jami, with GTK/Qt GUI, also supports IAX2 protocol, for Linux, OS X, Windows GPL Jitsi, a Java VoIP and Instant Messaging client with ZRTP encryption, for FreeBSD, Linux, OS X, Windows; LGPL Linphone, with a core/UI separation, the GUI is using GTK libraries, for Linux, OS X, Windows, and mobile phones (Android, iPhone, Windows Phone, BlackBerry) MicroSIP, lightweight softphone, using PJSIP stack, for Windows Telephone, OS X softphone written in Cocoa/Swift Twinkle, using Qt libraries, GPL, for Linux Yate client, using Qt libraries, GPL Proprietary license Blink, for Mac Librestream's 2500 Camera, 5000HD camera, Onsight Cube (wearable/modular camera), Onsight Connect (Windows, iOS, Android). LifeSize Desktop, for Windows Phoner and PhonerLite, for Windows, Voice: G.711, G.722, G.726, GSM, iLBC, Speex, Opus; security: TLS, SRTP, ZRTP Polycom PVX, for Windows. Voice: G.711, G.722, G.722.1, G.728, G.729A, Siren Codec; Video: H.261, H.263, H.264; Data: T.120, People+ Content, H.239, H.323 Annex Q far-end camera control Windows Messenger versions 4 and 5 (not to be confused with Windows Live Messenger or MSN Messenger which do not support SIP) Discontinued eyeBeam, discontinued in 2018 QuteCom, formerly named OpenWengo, using Qt libraries, GPL, for Windows, Mac, and RPM- DEB-based Linux, discontinued in 2016 Gizmo5, formerly PhoneGaim, discontinued in 2011 Empathy, using GTK libraries and Telepathy framework, GPL, discontinued in earliest visible, 2021. Mobile clients Free and open-source license Jami for Android, iOS; GPL v3 Linphone for Android, BlackBerry, iPhone, Windows phone; GPL v2 Sipdroid for Android, GPL v3 Proprietary license Acrobits for iOS and Android CounterPath Corporation Bria Mobile for iOS and Android Discontinued CSipSimple for Android, GPL v3, discontinued in 2019 Session border controllers Acme Packet Session Director Audiocodes Mediant Genband Quantix SBC Ingate Systems Ingate SIParators Metaswitch Perimeta Kamailio Enabled firewalls Check Point VPN-1 firewalls, include complete SIP support for multiple vendors The firewall feature in Cisco IOS includes complete SIP support Cisco PIX/ASA firewalls include complete SIP support D-Link Firewall DFL-210/260/800/860/1600/2500 supports SIP (SIP-ALG) with firmware 2.20.01.05 and above Fortinet, all FortiGates running v280/v300 builds Intertex SIP transparent routers, firewalls and ADSL modems, for broadband deployments and SOHO market Juniper Networks Netscreen and SRX firewalls include complete SIP Application Layer Gateway support Linux Netfilter's SIP conntrack helper fully understands SIP and can classify (for QOS) and NAT all related traffic Netopia Netopia supports ALG PF, built-in OpenBSD firewall PF can handle the NAT through the "static-port" directive and the bandwidth control through the built-in queuing system of SIP connections pfSense, a firewall/router distribution based on FreeBSD and PF; has QoS that properly tags VoIP traffic and a SIP proxy package that is available for NATed endpoints. Its functionality can be expanded with packages like FreeSWITCH, a free/open source software communications platform for making SIP, voice and chat driven products. Secure Computing, SnapGear firewall includes siproxd SIP proxy, Sidewinder 7 firewall includes a SIP proxy SonicWall, supports SIP ZyXEL ZyWALL P1, 2Plus, 5 UTM, 35 UTM, 70 UTM, 1050, USG 100, USG 200, USG 300, USG 1000 supports SIP-ALG Libraries oSIP Test tools Codenomicon Defensics: commercial test automation framework Ixia (company) commercial SIP-VoIP and Video test and emulation and load test platform Mu Dynamics: commercial SIP-VoIP, RTSP-IPTV Triple Play service assurance platform See also Comparison of VoIP software List of video telecommunication services and product brands Mobile VoIP References External links Lists of software VoIP software Videotelephony
876512
https://en.wikipedia.org/wiki/Legend%20of%20the%20Red%20Dragon
Legend of the Red Dragon
Legend of the Red Dragon (LORD) is a text-based online role-playing video game, released in 1989 by Robinson Technologies. LORD is one of the best known door games. The player's goal is to improve their skills in order to defeat the Red Dragon which has been attacking the village. The software is compatible with DOS, Microsoft Windows, and OS/2. The game was sold to and is currently owned by Metropolis Gameport. History LORD was created by Seth Robinson of Robinson Technologies and is currently maintained by Michael Preslar. Robinson began to write LORD in Pascal to run on his bulletin board system. As he did not have access to other door games such as Trade Wars, he needed something that would occasionally bring people back to the BBS. The first version of LORD only featured the chatting and flirting systems. Over time, Robinson incorporated features that he had seen work well in other games: for example, the restricted number of turns per day, and the concept of random events. Eventually LORD became a mixture of action and romance. Initially only intended to run on his own BBS, Robinson eventually received offers from users who wanted to run it on other systems. After the first sale, word-of-mouth advertising increased its popularity. LORD was a successful game, and by 1993 many BBSs had active communities of players. Over the next few years, MUDs began to overtake BBS door games as the multiplayer online format of choice, and in 1998 Robinson sold the game and its sequel to Metropolis Gameport. He went on to write other small games for PC and mobile platforms. His final release of LORD was version 4.00a. Metropolis Gameport contracted Michael Preslar on January 8, 2001, to continue the game's development. The most recent version of LORD (4.08) was released in 2009 as a patch (via the DOSEMU patch archive), and was labeled as "Patch for Lord 4.07 for OS/2, dosemu, and most all other emulated environments". The latest version available on the official site is 4.07, with the full package for 4.08 being under inspection since Oct 22, 2007. According to Preslar, further updates to the LORD software were planned, including a web application and versions for ELF-compatible Linux and Unix systems (completed but available only to beta testers), but his latest statement on the matter, in 2013, is that he no longer has a system that allows him to work on the game. Gameplay The premise of LORD is that a red dragon is wreaking havoc in a town where the player has recently arrived. Multiple players compete over a period of weeks to advance their skills and to kill the dragon. In order to achieve this goal, players must face combat to gain experience. Once they have gained enough experience, they must face their master at Turgon's Warrior Training and advance in skill level. Advancement increases the players fighting stats and gives an additional skill point in the current skill (up to 40). Advancement also presents stronger enemies and masters; a player must challenge and defeat master Turgon himself to reach level 12, the final level, before attempting to search for and slay the dragon. As a BBS game, LORD uses a text-only interface. Later versions of LORD also gave the option of using RIP (Remote Imaging Protocol) graphics, which required the use of a RIP client to view. Players select a character class, choosing from among Death Knight Skills, Mystical Skills, and Thieving Skills. While a player is training in a particular skill, s/he is subject to random events in the woods for that particular skill, which provide opportunities for advancement. Eventually, players may master all three skills. Players can take a certain number of actions every day. Actions could be to fight monsters in the forest, attack other players or to attempt to slay the red dragon itself. In addition, every day a player can send a "flirt" to another player character which may range from a shy wink, to sex, to a marriage proposal. Sometimes this can be done more than once a day. Sex may result in contracting sexually transmitted diseases, and female characters might become pregnant. While a player is looking for forest monsters a number of random forest events can occur; these involve simple events such as finding gold or gems as well as interactions with a number of non-player characters such as Olivia, men/maidens in distress, The old hag, the old man, etc. and the opportunity to advance in your skill if they pass the test. This is also where a player encounters the Flowers in the fairy garden and meets up with a group of fairies bathing. There are three non-player characters located at the Inn: Seth Able the bard, Violet the barmaid, and the unnamed Bartender. Seth Able the bard will sing a song for a player. Once a day, players can listen to Seth's song and receive a bonus, such as the doubling of one's bank account, or additional forest or player vs. player fight opportunities. The Bartender provides services and information to any warrior who can pay him in gold or gems, but provides nothing for free. Male players can also flirt with Violet, and female players with Seth Able (named after Robinson), in a fashion similar to flirting with other players. Success is based on the player's charm points. A marriage to Violet or Seth may last one day or two months or more; unlike player-player marriages, the software may terminate these bonds at any time. During marriage, offspring are possible for male players, and more likely for female players. Offspring bring sometimes surprising benefits to warriors. LORD allows many players to play simultaneously, in BBSs that support it. This allows real-time player-versus-player battles. LORD features several in-game message boards, as well as a limited electronic mail system, which allow players to converse. Players may use the mail system to send flirtations to other players of the opposite sex, propose trysts, or marriage. The registration system let all players play until level six, then it wouldn't allow players to get past to level 7 until the program was registered. Users often sent in funds for that very purpose. Some players even registered their own copy of LORD for local use so they could practice skills and test strategies. IGMs In-Game Modules (IGMs) are small software extensions written by third-party developers that add functionality to LORD. A number of these were created and widely distributed. IGM software was first developed on the Amiga, and then ported to MS-DOS. Some IGMs were written to allow a "cheating" style of game play, and others have presented bugs or loopholes to be exploited by players. The current maintainer of the LORD software, has introduced a scripting language called Lady in order to allow smoother development of game extensions. Wizardstone Wizardstone was planned to be a major IGM and the author was so enthusiastic about it, he convinced Robinson to advertise it by mentioning its two main characters in a forest event within the game itself. The IGM had a number of features that Robinson was impressed with, most notably its blackjack game. Though the IGM Wizardstone was never released it is, none-the-less, important to the history of the game, perhaps the most important LORD IGM because it is the only IGM mentioned in the game itself and it was the inspiration for the forest event character "Olivia" and was the source of the Blackjack event, thus impacting Lord games which don't even have IGMs installed. It was supposed to contain an ending to Olivia's story (which the games states will be continued in it). There was once talk of adding an ending to Olivia's story to the game, but nothing ever came of that. Reception The game sold only seven copies in its debut year, but word of mouth drove sales to 30,000 units over the next seven years of release. In Gamasutra's essay on the history of computer role-playing video games, LORD was considered to be a highly playable and memorable game, with colorful text and humor. The Escapist magazine highlighted the way LORD handled sexuality, which became more mature as Robinson developed the game over the years. Ports and sequels Robinson developed an official sequel, Legend of the Red Dragon II: New World, in 1992. It featured real-time multiplayer gameplay, with ANSI art graphics, in a Roguelike top-down view. LORD II's final release came in 1998, before its sale to Metropolis Gameport. The first LORD spin-off, Tournament LORD, was written by Robinson. It was a multiplayer version designed for the MBBS/Worldgroup BBS systems. The second port was Wildcat Tournament Legend of the Red Dragon (WT-LORD), a multi-player version created for Wildcat! BBS systems, written by Joseph Marcelletti and Allan Benjamin. Robinson was impressed with this port and used some of its features in the next version of TLORD. It was maintained by IceRage Technologies but is now freeware and no longer developed or supported. Legend of the Green Dragon Legend of the Green Dragon is a Web-based variation with major differences in game play. Despite the similarity in name, it is an entirely different game that is not written or authorized by the author or the current owners of Legend of the Red Dragon. Legend of the Green Dragon (also referred to as LotGD) is an open-source game that allows any Web developer to customize and create their own version of the game using the PHP language. References External links 1989 video games Door games DOS games Video games about dragons Massively multiplayer online role-playing games OS/2 games Video games developed in Japan Windows games
33891070
https://en.wikipedia.org/wiki/Lenovo%20Essential%20desktops
Lenovo Essential desktops
Lenovo’s line of Essential desktops is a collection of budget-conscious machines designed for consumers, and advertised as being "affordable, space saving, and energy efficient". The Essential desktop line is different from both Lenovo’s ThinkCentre line and Lenovo’s IdeaCentre line. Lenovo defines its ThinkCentre desktops as business-oriented computers, while the IdeaCentre desktops are meant primarily for entertainment. The Essential range of desktops can be categorized as being between the two – meant more for ordinary everyday use. The Essential desktops are frequently (and erroneously) referred to as IdeaCentre desktops. For example, Desktop Review indicated that the C300 was an IdeaCentre. However, the Lenovo U.S. Web site indicates that the C300 is part of their value line, or ‘Essential’ line. The only brand associated with these desktops is ‘Lenovo’ – ‘Essential’ represents a range of products and is not a brand in itself. Product series There are two lines of Lenovo-branded desktops sold under the ‘Essential’ banner. These are: C Series H Series C Series The Lenovo C Series desktops launched by Lenovo are the C100, C200, C300, and C315. 2010 The Lenovo C Series desktops launched in 2010 were the C200 and C315. C200 The C200 was an All-in-one (AIO) desktop launched by Lenovo in April 2010. Hardware Bistro indicated that the desktop had entry-level specifications, making it more affordable than the B500. The review also indicated that the desktop’s unique selling point was its 18.5 inch Touchscreen display. The desktop was made available with the Intel Atom D510 processor, 2GB of RAM, and could be configured for up to 500GB storage capacity. The desktop offered options for both integrated and discrete graphics. The integrated graphics option on offer was Intel GMA 3150, while the discrete graphics option was the NVIDIA Ion graphics card with 256MB of video RAM. Additional features on the desktop included a DVD multiburner, an integrated Web camera, integrated stereo speakers, LAN, and WiFi. C315 The C315 was released in 2010 by Lenovo. In its review, silentpcreview said that the “C315 is one of the more interesting all-in-one PCs with which we've crossed paths.” The C315 was equipped with an AMD Athlon II X2 250u processor – a low voltage processor with a speed of 1.6 GHz. The hard disk storage capacity on the desktop was 500GB. The desktop also offered discrete graphics, with an ATI Mobility Radeon HD4530 graphics card. The desktop also offered 4GB of DDR2 RAM and a slim dual-layer DVD writer. Detailed specifications of the desktop are given below: Chipset: AMD 690M ATSC Tuner: Built-in Networking: 10/100 Ethernet, 802.11g Card Reader: 6-in-1 Webcam: 0.3 megapixel (maximum resolution of 640x480) USB Ports: 6 USB 2.0 Operating System: Microsoft Windows 7 Professional x64 Dimensions: 19.05 x 14.12 x 2.56 inches Weight: 16.3 lbs 2009 The Lenovo C Series desktops launched in 2009 by Lenovo were the C100 and C300. C100 Announced in September 2009, the C100 was an All-in-one (AIO) desktop designed for consumer use. The 18.5 inch display was 2 inches deep, with an aspect ratio of 16:9. The desktop also included software such as Lenovo’s OneKey Antivirus and OneKey Recovery that allowed one-button system scanning and restoration. The dimensions of the desktop were 18.5 x 14.5 x 4 inches. The desktop also was made available with options for either Intel Atom 230 single core processors, or Intel Atom 330 dual core processors. In addition, the desktop also included a DVD reader/writer and four USB ports. C300 The C300 was an AIO launched in 2009 as part of Lenovo’s Essential product line. Desktop Review listed the pros of the desktop as the good 20-inch display with a resolution of 1600x900, the 3.5 inch hard disk drive, and the optional discrete graphics. The cons were listed as the keyboard, and the standard single core Intel Atom 230 1.6 GHz processor. The desktop’s dimensions were 19.05 x 14.12 x 3.28 inches. Additional specifications of the desktop are as follows: Operating system: Windows Vista Home Basic Memory: 3GB DDR2 Hard drive: 320GB Optical drive: 8X DVD+/-RW Audio: Integrated HD audio Speakers: built-in Graphics: Intel GMA 950 Wireless networking: 802.11b/g Card reader: Built-in SDHC memory card reader H Series The Lenovo H Series desktops launched by Lenovo are the H200, H210, H215, H230, H320, and H405. 2011 The Lenovo H Series desktops released in 2011 were the H215, H220, and H320. H215 The H215 offered AMD Athlon II X2 dual core processors, 2GB of DDR3 RAM, and a 320GB hard disk drive. Additional, detailed specifications for the H215 are given below: Chipset: AMD 760G Graphics: ATI Radeon HD 3000 (integrated) Optical drive: dual layer DVD reader/writer Audio: integrated HD audio Media Card reader: integrated, 16-in-1 Operating system: Microsoft Windows 7 Home Premium (32-bit) USB ports: 6 USB 2.0 H220 The specifications of the H220 desktop are as follows: Operating System: DOS Processor: 3 GHz Intel E5500 RAM: 2GB DDR3 Storage: 320GB Optical drive: DVD reader/writer H320 The H320 was a small form factor desktop in the Lenovo H Series desktop line released in 2011. Desktop review called the H320 “a little - but not too little - box that does it all”. Desktop Review listed the pros of the desktop as the Blu-ray drive, the Intel Core i5 processor, and the small form factor. The cons were indicated to be the low graphics capabilities, few USB ports, and the lack of wireless networking. Detailed specifications of the desktop are given below: Processor: 3.20 GHz Intel Core i5-650 RAM: 6GB DDR3 Storage: 640GB 7200 RPM SATA2 Operating system: Windows 7 Home Premium 64-bit Optical drive: Blu-ray ROM DVD reader/writer Graphics: NVIDIA GeForce 310 2010 The Lenovo H Series desktop launched in 2010 was the H230. H230 The H230 was launched at the same time as the Lenovo IdeaCentre K300 desktop. The desktop offered an Intel Core 2 Duo processor, Intel GMA integrated graphics, 4GB of RAM, a 640GB hard disk drive, and a DVD reader/writer. 2009 The Lenovo H Series desktops released in 2009 were the H200 and the H210. H200 The H200 was announced by Lenovo at CES 2009. It offered the Intel Atom 230 processor, 1GB of RAM, and a 160GB hard disk drive. It was Lenovo’s first desktop with the low power Intel Atom processor. The CPU incorporated a fanless design, minimizing desktop noise and, according to tech2, made the H200 Lenovo’s quietest desktop. The display was 15.4 inch Thin-film Transistor (TFT) screen. H210 The Lenovo H210 was also released in 2009 as part of the Essential range of desktops. PCWorld listed the pros of the desktop as above average performance for a desktop that cost less than US$500. The cons were listed as average expandability. Although PCWorld reported that the desktop was “one of the better sub-$500 systems”, it was reported not to handle games well. The inability to handle games came from the integrated graphics – Intel GMA 3100 graphics. The H210 could not run PCWorld’s Unreal Tournament 3 benchmark and offered only 24 frames per second on Far Cry (at a resolution of 1280x1024 with no antialiasing). Additional specifications of the H210 include: Processor: 2.5 GHz Intel Pentium Dual Core E5200 RAM: 4GB DDR2-667 Storage: 500GB Operating System: Microsoft Windows Vista Home Premium (32 bit) PCI Express x16 slot: 1 PCI Express x1 slot: 2 PCI slot: 1 Optical drivel: DVD reader/writer USB ports: 6 2008 The Lenovo H Series desktop released in 2008 was the H215. H215 The H215, released in October 2008, was an entry-level addition to Lenovo’s Essential line of budget PCs. It was praised for its large storage capacity - a total of 1TB. While performance was reported by About.com to be "decent", it was indicated that options to upgrade the desktop were limited. This was due to the low-wattage power supply commonly used in small form factor PCs as opposed to traditional tower PCs. Another point not in the desktop's favor was the recessed optical drive. This was described by About.com as being difficult to open and appearing out of place. Detailed specification of the desktop are as follows: Processor: AMD Athlon II X2 250 Dual Core RAM: 4GB PC3-8500 DDR3 Storage: 1TB 7200rpm SATA Hard Drive Optical drive: 16x DVD+/-RW Dual Layer Burner Graphics: ATI Radeon HD 3000 Integrated Graphics Processor Audio: 7.1 Audio Support Ports and slots: six USB 2.0, HDMI, VGA, 16-in-1 Card Reader References Lenovo personal computers
102908
https://en.wikipedia.org/wiki/System%20call
System call
In computing, a system call (commonly abbreviated to syscall) is the programmatic way in which a computer program requests a service from the kernel of the operating system on which it is executed. This may include hardware-related services (for example, accessing a hard disk drive or accessing the device's camera), creation and execution of new processes, and communication with integral kernel services such as process scheduling. System calls provide an essential interface between a process and the operating system. In most systems, system calls can only be made from userspace processes, while in some systems, OS/360 and successors for example, privileged system code also issues system calls. Privileges The architecture of most modern processors, with the exception of some embedded systems, involves a security model. For example, the rings model specifies multiple privilege levels under which software may be executed: a program is usually limited to its own address space so that it cannot access or modify other running programs or the operating system itself, and is usually prevented from directly manipulating hardware devices (e.g. the frame buffer or network devices). However, many applications need access to these components, so system calls are made available by the operating system to provide well-defined, safe implementations for such operations. The operating system executes at the highest level of privilege, and allows applications to request services via system calls, which are often initiated via interrupts. An interrupt automatically puts the CPU into some elevated privilege level and then passes control to the kernel, which determines whether the calling program should be granted the requested service. If the service is granted, the kernel executes a specific set of instructions over which the calling program has no direct control, returns the privilege level to that of the calling program, and then returns control to the calling program. The library as an intermediary Generally, systems provide a library or API that sits between normal programs and the operating system. On Unix-like systems, that API is usually part of an implementation of the C library (libc), such as glibc, that provides wrapper functions for the system calls, often named the same as the system calls they invoke. On Windows NT, that API is part of the Native API, in the library; this is an undocumented API used by implementations of the regular Windows API and directly used by some system programs on Windows. The library's wrapper functions expose an ordinary function calling convention (a subroutine call on the assembly level) for using the system call, as well as making the system call more modular. Here, the primary function of the wrapper is to place all the arguments to be passed to the system call in the appropriate processor registers (and maybe on the call stack as well), and also setting a unique system call number for the kernel to call. In this way the library, which exists between the OS and the application, increases portability. The call to the library function itself does not cause a switch to kernel mode and is usually a normal subroutine call (using, for example, a "CALL" assembly instruction in some Instruction set architectures (ISAs)). The actual system call does transfer control to the kernel (and is more implementation-dependent and platform-dependent than the library call abstracting it). For example, in Unix-like systems, fork and execve are C library functions that in turn execute instructions that invoke the fork and exec system calls. Making the system call directly in the application code is more complicated and may require embedded assembly code to be used (in C and C++), as well as requiring knowledge of the low-level binary interface for the system call operation, which may be subject to change over time and thus not be part of the application binary interface; the library functions are meant to abstract this away. On exokernel based systems, the library is especially important as an intermediary. On exokernels, libraries shield user applications from the very low level kernel API, and provide abstractions and resource management. IBM's OS/360 and DOS/360 implement most system calls through a library of assembly language macros, although there are a few services with a call linkage. This reflects their origin at a time when programming in assembly language was more common than high-level language usage. IBM system calls were therefore not directly executable by high-level language programs, but required a callable assembly language wrapper subroutine. Since then, IBM has added many services that can be called from high level languages in, e.g., z/OS and z/VSE. Examples and tools On Unix, Unix-like and other POSIX-compliant operating systems, popular system calls are open, read, write, close, wait, exec, fork, exit, and kill. Many modern operating systems have hundreds of system calls. For example, Linux and OpenBSD each have over 300 different calls, NetBSD has close to 500, FreeBSD has over 500, Windows has close to 2000, divided between win32k (graphical) and ntdll (core) system calls while Plan 9 has 51. Tools such as strace, ftrace and truss allow a process to execute from start and report all system calls the process invokes, or can attach to an already running process and intercept any system call made by the said process if the operation does not violate the permissions of the user. This special ability of the program is usually also implemented with system calls such as ptrace or system calls on files in procfs. Typical implementations Implementing system calls requires a transfer of control from user space to kernel space, which involves some sort of architecture-specific feature. A typical way to implement this is to use a software interrupt or trap. Interrupts transfer control to the operating system kernel, so software simply needs to set up some register with the system call number needed, and execute the software interrupt. This is the only technique provided for many RISC processors, but CISC architectures such as x86 support additional techniques. For example, the x86 instruction set contains the instructions SYSCALL/SYSRET and SYSENTER/SYSEXIT (these two mechanisms were independently created by AMD and Intel, respectively, but in essence they do the same thing). These are "fast" control transfer instructions that are designed to quickly transfer control to the kernel for a system call without the overhead of an interrupt. Linux 2.5 began using this on the x86, where available; formerly it used the INT instruction, where the system call number was placed in the EAX register before interrupt 0x80 was executed. An older mechanism is the call gate; originally used in Multics and later, for example, see call gate on the Intel x86. It allows a program to call a kernel function directly using a safe control transfer mechanism, which the operating system sets up in advance. This approach has been unpopular on x86, presumably due to the requirement of a far call (a call to a procedure located in a different segment than the current code segment) which uses x86 memory segmentation and the resulting lack of portability it causes, and the existence of the faster instructions mentioned above. For IA-64 architecture, EPC (Enter Privileged Code) instruction is used. The first eight system call arguments are passed in registers, and the rest are passed on the stack. In the IBM System/360 mainframe family, and its successors, a Supervisor Call instruction (), with the number in the instruction rather than in a register, implements a system call for legacy facilities in most of IBM's own operating systems, and for all system calls in Linux. In later versions of MVS, IBM uses the Program Call (PC) instruction for many newer facilities. In particular, PC is used when the caller might be in Service Request Block (SRB) mode. The PDP-11 minicomputer used the and instructions, which, similar to the IBM System/360 and x86 , put the code in the instruction; they generate interrupts to specific addresses, transferring control to the operating system. The VAX 32-bit successor to the PDP-11 series used the , , and instructions to make system calls to privileged code at various levels; the code is an argument to the instruction. Categories of system calls System calls can be grouped roughly into six major categories: Process control create process (for example, fork on Unix-like systems, or NtCreateProcess in the Windows NT Native API) terminate process load, execute get/set process attributes wait for time, wait event, signal event allocate and free memory File management create file, delete file open, close read, write, reposition get/set file attributes Device management request device, release device read, write, reposition get/set device attributes logically attach or detach devices Information maintenance get/set total system information (including time, date, computer name, enterprise etc.) get/set process, file, or device metadata (including author, opener, creation time and date, etc.) Communication create, delete communication connection send, receive messages transfer status information attach or detach remote devices Protection get/set file permissions Processor mode and context switching System calls in most Unix-like systems are processed in kernel mode, which is accomplished by changing the processor execution mode to a more privileged one, but no process context switch is necessary although a privilege context switch does occur. The hardware sees the world in terms of the execution mode according to the processor status register, and processes are an abstraction provided by the operating system. A system call does not generally require a context switch to another process; instead, it is processed in the context of whichever process invoked it. In a multithreaded process, system calls can be made from multiple threads. The handling of such calls is dependent on the design of the specific operating system kernel and the application runtime environment. The following list shows typical models followed by operating systems: Many-to-one model: All system calls from any user thread in a process are handled by a single kernel-level thread. This model has a serious drawback any blocking system call (like awaiting input from the user) can freeze all the other threads. Also, since only one thread can access the kernel at a time, this model cannot utilize multiple cores of processors. One-to-one model: Every user thread gets attached to a distinct kernel-level thread during a system call. This model solves the above problem of blocking system calls. It is found in all major Linux distributions, macOS, iOS, recent Windows and Solaris versions. Many-to-many model: In this model, a pool of user threads is mapped to a pool of kernel threads. All system calls from a user thread pool are handled by the threads in their corresponding kernel thread pool. Hybrid model: This model implements both many to many and one to one models depending upon the choice made by the kernel. This is found in old versions of IRIX, HP-UX and Solaris. See also Linux kernel API VDSO Notes References External links Linux 64-bit system call reference/listing Up to kernel version 4.20 Linux system call reference Updated system call reference for Linux kernel 2.6.35.4, includes register and data structure references. Also for Linux kernel 4.14 64 bit and 32 bit. A list of modern Unix-like system calls Interactive Linux kernel map with main API functions and structures, PDF version Linux system calls system calls for Linux kernel 2.2, with IA-32 calling conventions How System Calls Work on Linux/i86 (1996, based on the 1993 0.99.2 kernel) Sysenter Based System Call Mechanism in Linux 2.6 (2006) Kernel command using Linux system calls, IBM developerWorks Choudhary, Amit; HOWTO for Implementing a System Call on Linux 2.6 Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, and Andrew S. Tanenbaum, Modular system programming on Minix 3, ;login: 31, no. 2 (April 2006); 19-28, accessed March 5, 2018 A simple open Unix Shell in C language examples on System Calls under Unix Inside the Native API Windows NT Native API, including system calls Gulbrandsen, John; System Call Optimization with the SYSENTER Instruction, CodeGuru.com, 8 October 2004 Operating system technology Application programming interfaces
64795106
https://en.wikipedia.org/wiki/Mail-in-a-Box
Mail-in-a-Box
Mail-in-a-Box is a free, Open Source software for mail server hosting developed by Joshua Tauberer. The software's goal is to enable any user to turn a fresh cloud system into a Mail server in few hours. The tool enables developers to host mail for multiple users and multiple domain names while controlling the entire process top to bottom. The default configuration of the software provides a spam detection system, monitoring, reporting and backup mechanisms. It can also set up and automatically renew a Let's Encrypt certificate for your email domains, as well as configuring the detailed DNS configurations needed to ensure your mail server's IP address is trusted by other servers, and less likely to be blacklisted. First developed in 2013 by Tauberer, the tool is written in Python and the current version runs on Ubuntu Server 18.04. References External links Official website Latest Release 0.55 Free software programmed in Python 2013 software Free software culture and documents Ubuntu
4315433
https://en.wikipedia.org/wiki/WHOIS
WHOIS
WHOIS (pronounced as the phrase "who is") is a query and response protocol that is widely used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address block or an autonomous system, but is also used for a wider range of other information. The protocol stores and delivers database content in a human-readable format. The current iteration of the WHOIS protocol was drafted by the Internet Society, and is documented in . Whois is also the name of the command-line utility on most UNIX systems used to make WHOIS protocol queries. In addition WHOIS has a sister protocol called Referral Whois (RWhois). History Elizabeth Feinler and her team (who had created the Resource Directory for ARPANET) were responsible for creating the first WHOIS directory in the early 1970s. Feinler set up a server in Stanford's Network Information Center (NIC) which acted as a directory that could retrieve relevant information about people or entities. She and the team created domains, with Feinler's suggestion that domains be divided into categories based on the physical address of the computer. The process of registration was established in RFC 920. WHOIS was standardized in the early 1980s to look up domains, people, and other resources related to domain and number registrations. As all registration was done by one organization at that time, one centralized server was used for WHOIS queries. This made looking up such information very easy. At the time of the emergence of the internet from the ARPANET, the only organization that handled all domain registrations was the Defense Advanced Research Projects Agency (DARPA) of the United States government (created during 1958.). Responsibility of domain registration remained with DARPA as the ARPANET became the Internet during the 1980s. UUNET began offering domain registration service; however, they simply handled the paperwork which they forwarded to the DARPA Network Information Center (NIC). Then the National Science Foundation directed that management of Internet domain registration would be handled by commercial, third-party entities. InterNIC was formed in 1993 under contract with the NSF, consisting of Network Solutions, Inc., General Atomics and AT&T. The General Atomics contract was canceled after several years due to performance issues. 20th century WHOIS servers were highly permissive and would allow wild-card searches. A WHOIS query of a person's last name would yield all individuals with that name. A query with a given keyword returned all registered domains containing that keyword. A query for a given administrative contact returned all domains the administrator was associated with. Since the advent of the commercialized Internet, multiple registrars and unethical spammers, such permissive searching is no longer available. On December 1, 1999, management of the top-level domains (TLDs) , , and was assigned to ICANN. At the time, these TLDs were converted to a thin WHOIS model. Existing WHOIS clients stopped working at that time. A month later, it had self-detecting Common Gateway Interface support so that the same program could operate a web-based WHOIS lookup, and an external TLD table to support multiple WHOIS servers based on the TLD of the request. This eventually became the model of the modern WHOIS client. By 2005, there were many more generic top-level domains than there had been in the early 1980s. There are also many more country-code top-level domains. This has led to a complex network of domain name registrars and registrar associations, especially as the management of Internet infrastructure has become more internationalized. As such, performing a WHOIS query on a domain requires knowing the correct, authoritative WHOIS server to use. Tools to do WHOIS domain searches have become common. CRISP and IRIS In 2003, an IETF committee was formed to create a new standard for looking up information on domain names and network numbers: Cross Registry Information Service Protocol (CRISP). Between January 2005 and July 2006, the working name for this proposed new standard was Internet Registry Information Service (IRIS) The initial IETF Proposed Standards RFCs for IRIS are: 3981 - 3982 - 3983 - 4992 - The status of RFCs this group worked on can be found on the IETF Tools site. As of March 2009, the CRISP IETF Working Group concluded, after a final RFC 5144 was published by the group . Note: The IETF CRISP working group is not to be confused with the Number Resource Organization's (NRO) Team of the same name "Consolidated RIR IANA Stewardship Proposal Team" (CRISP Team). WEIRDS and RDAP In 2013, the IETF acknowledged that IRIS had not been a successful replacement for WHOIS. The primary technical reason for that appeared to be the complexity of IRIS. Further, non-technical reasons were deemed to lie in areas upon which the IETF does not pass judgment. Meanwhile, ARIN and RIPE NCC managed to serve WHOIS data via RESTful web services. The charter (drafted in February 2012) provided for separate specifications, for number registries first and for name registries to follow. The working group produced five proposed standard documents: 7480 - 7481 - 7482 - 7483 - 7484 - and an informational document: 7485 - Protocol The WHOIS protocol had its origin in the ARPANET NICNAME protocol and was based on the NAME/FINGER Protocol, described in RFC 742 (1977). The NICNAME/WHOIS protocol was first described in RFC 812 in 1982 by Ken Harrenstien and Vic White of the Network Information Center at SRI International. WHOIS was originally implemented on the Network Control Program (NCP) but found its major use when the TCP/IP suite was standardized across the ARPANET and later the Internet. The protocol specification is the following (original quote): Connect to the service host TCP: service port 43 decimal NCP: ICP to socket 43 decimal, establishing two 8-bit connections Send a single "command line", ending with <CRLF>. Receive information in response to the command line. The server closes its connections as soon as the output is finished. The command line server query is normally a single name specification. i.e. the name of a resource. However, servers accept a query, consisting of only the question mark (?) to return a description of acceptable command line formats. Substitution or wild-card formats also exist, e.g., appending a full-stop (period) to the query name returns all entries beginning with the query name. On the modern Internet, WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43. Clients are simple applications that establish a communications channel to the server, transmit a text record with the name of the resource to be queried and await the response in form of a sequence of text records found in the database. This simplicity of the protocol also permits an application, and a command line interface user, to query a WHOIS server using the Telnet protocol. Augmentations In 2014, June ICANN published the recommendation for status codes, the "Extensible Provisioning Protocol (EPP) domain status codes" Implementation WHOIS lookups were traditionally performed with a command line interface application, but now many alternative web-based tools exist. A WHOIS database consists of a set of text records for each resource. These text records consists of various items of information about the resource itself, and any associated information of assignees, registrants, administrative information, such as creation and expiration dates. Two data models exist for storing resource information in a WHOIS database, the thick and the thin model. Thin and thick lookups WHOIS information can be stored and looked up according to either a thick or a thin data model: Thick A Thick WHOIS server stores the complete WHOIS information from all the registrars for the particular set of data (so that one WHOIS server can respond with WHOIS information on all .org domains, for example). Thin A Thin WHOIS server stores only the name of the WHOIS server of the registrar of a domain, which in turn has the full details on the data being looked up (such as the .com WHOIS servers, which refer the WHOIS query to the registrar where the domain was registered). The thick model usually ensures consistent data and slightly faster queries, since only one WHOIS server needs to be contacted. If a registrar goes out of business, a thick registry contains all important information (if the registrant entered correct data, and privacy features were not used to obscure the data) and registration information can be retained. But with a thin registry, the contact information might not be available, and it could be difficult for the rightful registrant to retain control of the domain. If a WHOIS client did not understand how to deal with this situation, it would display the full information from the registrar. Unfortunately, the WHOIS protocol has no standard for determining how to distinguish the thin model from the thick model. Specific details of which records are stored vary among domain name registries. Some top-level domains, including and , operate a thin WHOIS, requiring domain registrars to maintain their own customers' data. The other global top-level registries, including , operate a thick model. Each country-code top-level registry has its own national rules. Software The first applications written for the WHOIS information system were command-line interface tools for Unix and Unix-like operating systems (i.e. Solaris, Linux etc.). WHOIS client and server software is distributed as free open-source software and binary distributions are included with all Unix-like systems. Various commercial Unix implementations may use a proprietary implementation (for example, Solaris 7). A WHOIS command line client passes a phrase given as an argument directly to the WHOIS server. Various free open source examples can still be found on sites such as sourceforge.net. However, most modern WHOIS tools implement command line flags or options, such as the -h option to access a specific server host, but default servers are preconfigured. Additional options may allow control of the port number to connect on, displaying additional debugging data, or changing recursion/referral behavior. Like most TCP/IP client–server applications, a WHOIS client takes the user input and then opens an Internet socket to its destination server. The WHOIS protocol manages the transmission of the query and reception of results. Web With the advent of the World Wide Web and especially the loosening up of the Network Solutions monopoly, looking up WHOIS information via the web has become quite common. At present, popular web-based WHOIS-queries may be conducted from ARIN, RIPE and APNIC. Most early web-based WHOIS clients were merely front-ends to a command-line client, where the resulting output just gets displayed on a web page with little, if any, clean-up or formatting. Currently, web based WHOIS clients usually perform the WHOIS queries directly and then format the results for display. Many such clients are proprietary, authored by domain name registrars. The need for web-based clients came from the fact that command-line WHOIS clients largely existed only in the Unix and large computing worlds. Microsoft Windows and Macintosh computers had no WHOIS clients installed by default, so registrars had to find a way to provide access to WHOIS data for potential customers. Many end-users still rely on such clients, even though command line and graphical clients exist now for most home PC platforms. Microsoft provides the Sysinternals Suite that includes a whois client at no cost. CPAN has several Perl modules available that work with WHOIS servers. Many of them are not current and do not fully function with the current (2005) WHOIS server infrastructure. However, there is still much useful functionality to derive including looking up AS numbers and registrant contacts. Servers WHOIS services are mainly run by registrars and registries; for example the Public Interest Registry (PIR) maintains the .ORG registry and associated WHOIS service. Regional Internet registries WHOIS servers operated by regional Internet registries (RIR) can be queried directly to determine the Internet service provider responsible for a particular resource. The records of each of these registries are cross-referenced, so that a query to ARIN for a record which belongs to RIPE will return a placeholder pointing to the RIPE WHOIS server. This lets the WHOIS user making the query know that the detailed information resides on the RIPE server. In addition to the RIRs servers, commercial services exist, such as the Routing Assets Database used by some large networks (e.g., large Internet providers that acquired other ISPs in several RIR areas). Server discovery There is currently no widely extended way for determining the responsible WHOIS server for a DNS domain, though a number of methods are in common use for top-level domains (TLDs). Some registries use DNS SRV records (defined in RFC 2782) to allow clients to discover the address of the WHOIS server. Some WHOIS lookups require searching the procuring domain registrar to display domain owner details. Query example Normally the contact information of the resources assignee is returned. However, some registrars offer private registration, in which case the contact information of the registrar is shown instead. Some registry operators are wholesalers, meaning that they typically provide domain name services to a large number of retail registrars, who in turn offer them to consumers. For private registration, only the identity of the wholesale registrar may be returned. In this case, the identity of the individual as well as the retail registrar may be hidden. Below is an example of WHOIS data returned for an individual resource holder. This is the result of a WHOIS query of example.com: whois example.com [Querying whois.verisign-grs.com] [Redirected to whois.iana.org] [Querying whois.iana.org] [whois.iana.org] % IANA WHOIS server % for more information on IANA, visit http://www.iana.org % This query returned 1 object domain: EXAMPLE.COM organisation: Internet Assigned Numbers Authority created: 1992-01-01 source: IANA Referral Whois Referral Whois (RWhois) is an extension of the original Whois protocol and service. RWhois extends the concepts of Whois in a scalable, hierarchical fashion, potentially creating a system with a tree-like architecture. Queries are deterministically routed to servers based on hierarchical labels, reducing a query to the primary repository of information. Lookups of IP address allocations are often limited to the larger Classless Inter-Domain Routing (CIDR) blocks (e.g., /24, /22, /16), because usually only the regional Internet registries (RIRs) and domain registrars run RWhois or Whois servers, although RWhois is intended to be run by even smaller local Internet registries, to provide more granular information about IP address assignment. RWhois is intended to replace Whois, providing an organized hierarchy of referral services where one could connect to any RWhois server, request a look-up and be automatically re-directed to the correct server(s). However, while the technical functionality is in place, adoption of the RWhois standard has been weak. RWhois services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 4321. Rwhois was first specified in RFC 1714 in 1994 by Network Solutions, but the specification was superseded in 1997 by RFC 2167. The referral features of RWhois are different than the feature of a Whois server to refer responses to another server, which RWhois also implements. Criticism One criticism of WHOIS is the lack of full access to the data. Few parties have realtime access to the complete databases. Others cite the competing goal of domain privacy as a criticism, although this problem is strongly mitigated by domain privacy services. Currently, the Internet Corporation for Assigned Names and Numbers (ICANN) broadly requires that the mailing address, phone number and e-mail address of those owning or administering a domain name to be made publicly available through the "WHOIS" directories. The registrant's (domain owner's) contact details, such as address and telephone number, are easily accessible to anyone who queries a WHOIS server. However, that policy enables spammers, direct marketers, identity thieves or other attackers to loot the directory for personal information about these people. Although ICANN has been exploring changing WHOIS to enable greater privacy, there is a lack of consensus among major stakeholders as to what type of change should be made. Some domain registrars offer private registrations (also known as domain privacy), by which the contact information of the registrar is shown instead of the customer's. With the offer of private registration from many registrars, some of the risk has been mitigated. Studies have shown that spammers can and do harvest plain-text email addresses from WHOIS servers. For this reason, some WHOIS servers and websites offering WHOIS queries have implemented rate-limiting systems, such as web-based CAPTCHA and limited amounts of search queries per user IP address. The WHOIS requirements conflict with the General Data Protection Regulation (GDPR), effective in the European Union 25 May 2018, which places strict regulations on the processing and publication of personally identifiable information. ICANN stated in November 2017 that it would not reprimand "noncompliance with contractual obligations related to the handling of registration data" if registrars provide alternative solutions for compliance with its rules, until the WHOIS requirements are updated to take GDPR into account. The WHOIS protocol was not written with an international audience in mind. A WHOIS server and/or client cannot determine the text encoding in effect for the query or the database content. Many servers were originally using US-ASCII and Internationalization concerns were not taken into consideration until much later. This might impact the usability or usefulness of the WHOIS protocol in countries outside the USA. In the case of internationalized domain names it is the responsibility of the client application to perform the translation of the domain name between its native language script and the DNS name in punycode. Accuracy of information In cases where the registrant's (Domain Owner) identity is public, anyone can easily confirm the status of a domain via WHOIS. In the case of private registrations, ascertaining registration information may be more difficult. If a registrant, who acquired a domain name, wants to verify the registrar has completed the registration process, three steps may be required: Perform a WHOIS and confirm that the resource is at least registered with ICANN, Determine the name of the wholesale registrar, and Contact the wholesaler and obtain the name of the retail registrar. This provides some confidence that the retailer actually registered the name. But if the registrar goes out of business, as with the failure of RegisterFly in 2007, the rightful domain holder with privacy-protected registrations may have difficulty regaining the administration of their domain name. Registrants using "private registration" can attempt to protect themselves by using a registrar that places customer data in escrow with a third party. ICANN requires that every registrant of a domain name be given the opportunity to correct any inaccurate contact data associated with their domain. For this reason, registrars are required to periodically send the holder the contact information on record for verification, but they do not provide any guarantee about the accuracy of information if the registrant provided inaccurate information. Law and policy WHOIS has generated policy issues in the United States federal government. As noted above, WHOIS creates a privacy issue which is also tied to free speech and anonymity. However, WHOIS is an important tool for law enforcement officers investigating violations like spam and phishing to track down the holders of domain names. As a result, law enforcement agencies have sought to make WHOIS records both open and verified: The Federal Trade Commission has testified about how inaccurate WHOIS records thwart their investigations. Congressional hearings have been conducted about the importance of WHOIS in 2001, 2002 and 2006. The Fraudulent Online Identity Sanctions Act "make it a violation of trademark and copyright law if a person knowingly provided, or caused to be provided, materially false contact information in making, maintaining, or renewing the registration of a domain name used in connection with the violation," where the latter "violation" refers to a prior violation of trademark or copyright law. The act does not make the submission of false WHOIS data illegal in itself, only if used to shield oneself from prosecution for crimes committed using that domain name. ICANN proposal to abolish WHOIS The Expert Working Group (EWG) of the Internet Corporation for Assigned Names and Numbers (ICANN) recommended on 24 June 2013 that WHOIS should be scrapped. It recommends that WHOIS be replaced with a system that keeps information secret from most Internet users, and only discloses information for "permissible purposes". ICANN's list of permissible purposes includes domain-name research, domain-name sale and purchase, regulatory enforcement, personal data protection, legal actions, and abuse mitigation. Although WHOIS has been a key tool of journalists in determining who was disseminating certain information on the Internet, the use of WHOIS by the free press is not included in ICANN's proposed list of permissible purposes. The EWG collected public input on the initial report until 13 September 2013. Its final report was issued on 6 June 2014, without meaningful changes to the recommendations. , ICANN is in the "process of re-inventing WHOIS," working on "ICANN WHOIS Beta." Standards documents – NICNAME/WHOIS (1982, obsolete) – NICNAME/WHOIS (1985, obsolete) – WHOIS protocol specification (2004, current) See also Domain name registry Regional Internet registry Routing Assets Database Routing Policy Specification Language Shared Whois Project Registration Data Access Protocol References Sources External links IANA WHOIS Service The Internet Corporation for Assigned Names and Numbers The Internet Assigned Numbers Authority XML Whois Server list ICANN Whois Inaccuracy Complaint Form Whois status codes Internet protocols Internet Standards
14562589
https://en.wikipedia.org/wiki/JumpStart%20%28Solaris%29
JumpStart (Solaris)
JumpStart is a computer network installation tool set used by the Solaris operating system. Usage JumpStart is used to manage operating system installation in many Information technology environments (corporate and otherwise) where Solaris operating system computers are widely used. It can provide easier installation (minor setup on central server, then one command on an installation "client" system to start it installing). It also allows completely consistent system installation on many systems over time - each install can have exactly the same system configuration and software tools. Alternatively, different types of systems can be installed for different purposes, in each case with consistent installations for a given defined type. Tools used to manipulate JumpStart include JET, the JumpStart Enterprise Toolkit. Created by: Thomas Fritz in 1994, at Sun. Structure JumpStart consists of two main parts: network booting of a system, and then network installation. Network booting proceeds similarly to Solaris' standard network booting capabilities. A JumpStart and network booting server is set up on the same local network as the system(s) to be installed. Technically, the network boot and install servers can be separate functions, but they are typically the same system. Once a client system begins the JumpStart process, it then accesses the operating system component software packages stored on the JumpStart server, usually but not exclusively using Network File System. Those packages, and optionally additional tools or applications, are automatically installed, and then the system is rebooted. Some additional configuration may be manually performed, or the system's configuration may be set up completely automatically. See also Kickstart (Linux) Fully Automatic Installation System Installer References Solaris 10 Installation Guide: Network-Based Installations Unix package management-related software Sun Microsystems software
7380371
https://en.wikipedia.org/wiki/Computer%20programming%20in%20the%20punched%20card%20era
Computer programming in the punched card era
From the invention of computer programming languages up to the mid-1970s, most computer programmers created, edited and stored their programs line by line on punch cards. Punched cards A punched card is a flexible write-once medium that encodes data, most commonly 80 characters. Groups or "decks" of cards form programs and collections of data. The term is often used interchangeably with punch card, the difference being that an unused card is a "punch card," but once information had been encoded by punching holes in the card, it was now a "punched card." For simplicity, this article will use the term punched card to refer to either. Often programmers first wrote their program out on special forms called coding sheets, taking care to distinguish the digit zero from the letter O, the digit one from the letter I, eight from B, two from Z, and so on using local conventions such as the "slashed zero". These forms were then taken by keypunch operators, who using a keypunch machine such as the IBM 026 (later IBM 029) punched the deck. Often another keypunch operator would then take that deck and re-punch from the coding sheets – but using a "verifier" such as the IBM 059 that checked that the original punching had no errors. A typing error generally necessitated re-punching an entire card. The editing of programs was facilitated by reorganizing the cards, and removing or replacing the lines that had changed; programs were backed up by duplicating the deck, or writing it to magnetic tape. In smaller organizations programmers might do their own punching, and in all cases would often have access to a keypunch to make small changes to a deck. Work environment The description below describes an all-IBM shop (a "shop" is programmer jargon for a programming site) but shops using other brands of mainframes (or minicomputers) would have similar equipment although because of cost or availability might have different manufacturer's equipment, e.g. an NCR, ICL, Hewlett-Packard (HP) or Control Data shop would have NCR, ICL, HP, or Control Data computers, printers and so forth, but have IBM 029 keypunches. IBM's huge size and industry footprint often caused many of their conventions to be adopted by other vendors, so the example below is fairly similar to most places, even in non-IBM shops. A typical corporate or university computer installation would have a suite of rooms, with a large, access-restricted, air-conditioned room for the computer (similar to today's server room) and a smaller quieter adjacent room for submitting jobs. Nearby would be a room full of keypunch machines for programmer use. An IBM 407 Accounting Machine might be set up to allow newly created or edited programs to be listed (printed out on fan-fold paper) for proofreading. An IBM 519 might be provided to reproduce program decks for backup or to punch sequential numbers in columns 73-80. In such mainframe installations, known as "closed shops," programmers submitted the program decks, often followed by data cards to be read by the program, to a person working behind a counter in the computer room. During peak times, it was common to stand in line waiting to submit a deck. To solve that problem, the card reader could be reinstalled (or initially installed) outside of the computer room to allow programmers to do "self-service" job submission. Many computer installations used cards with the opposite corner cut (sometimes no corner cut) as "job separators", so that an operator could stack several job decks in the card reader at the same time and be able to quickly separate the decks manually when they removed them from the stacker. These cards (e.g., a JCL "JOB" card to start a new job) were often pre-punched in large quantities in advance. This was especially useful when the main computer did not read the cards directly, but instead read their images from magnetic tape that was prepared offline by smaller computers such as the IBM 1401. After reading the cards in, the computer operator would return the card deck – typically to one of a set of alphabetically labelled cubby holes, based on the programmer's last initial. Because programs were run in batch-mode processing it might be a considerable time before any hardcopy printed or punched output was produced, and put into these same cubby holes – however, on a lightly-used system, it was possible to make alterations and rerun a program in less than an hour. Dedicated programmers might stay up well past midnight to get a few quick turnarounds. Use of this expensive equipment was often charged to a user's account. A mainframe computer could cost millions of dollars and usage was measured in seconds per job. Smaller computers like the IBM 1000, 1620 and 1130, and minicomputers such as the PDP-11 were less expensive, and often run as an "open shop", where programmers had exclusive use of the computer for a block of time. A keypunch was usually located nearby for quick corrections – although many of these smaller machines ran from punched tape. Identification and sequence Many early programming languages, including FORTRAN, COBOL and the various IBM assembler languages, used only the first 72 columns of a card – a tradition that traces back to the IBM 711 card reader used on the IBM 704/709/7090/7094 series (especially the IBM 704, the first mass-produced computer with floating-point arithmetic hardware), which could only read 72 of the 80 columns in one pass. Columns 73-80 were ignored by the compilers and could be used for identification or a sequence number so that if the card deck was dropped it could be restored to its proper order using a card sorter. Depending on the programming language, debugging output statements could be quickly activated and "commented out" by using cards with such statements punched with the comment character (e.g., 'C' in Fortran) in column 80 of the card; turning the card end-for-end would put the 'C' in the leading column, which transformed the now backwards card's contents into a comment while leaving the physical card in place in deck. (An alternative, imperfect but commonly employed technique to maintain proper card order was to draw one or more diagonal stripes across the top edge of all the cards in a deck.) In later years, as punch card data was converted to magnetic tape files the sequence numbers were often used as a column in an array as an index value that can be correlated to time sequences, such as in the natural sciences where the data on the cards were related to the periodic output of a measuring device such as water stage level recorders for rivers and streams in hydrology, or temperatures in meteorology. Entire vaults full of card decks could be reduced to much smaller racks of nine-track tapes. See also Unit record equipment history Footnotes References : Article about the programming culture that developed around use of the punched card, following Fisk's experience of "learning the craft" from people around him. External links Gallery Computer programming Programming in the punch card era
29052283
https://en.wikipedia.org/wiki/CANoe
CANoe
CANoe is a development and testing software tool from Vector Informatik GmbH. The software is primarily used by automotive manufacturers and electronic control unit (ECU) suppliers for development, analysis, simulation, testing, diagnostics and start-up of ECU networks and individual ECUs. Its widespread use and large number of supported vehicle bus systems makes it especially well suited for ECU development in conventional vehicles, as well as hybrid vehicles and electric vehicles. The simulation and testing facilities in CANoe are performed with CAPL, a programming language. CANoe supports CAN, LIN, FlexRay, Ethernet and MOST bus systems as well as CAN-based protocols such as J1939, CANopen, ARINC 825, ISOBUS and many more. Description In 1996 the first CANoe license was sold by Vector. Since then, the software has become established worldwide as a tool for ECU development. In addition to its primary use in automotive in-vehicle electronic networking, CANoe is also used in industries such as heavy trucks, rail transportation, special purpose vehicles, avionics, medical technology and many more. New technologies based on IP architectures in the automotive industry are supported by CANoe. Beyond the scope of communication in a single car, CANoe is used in the development of cooperative systems via V2X. At the beginning of the development process for an ECU or ECU, CANoe is used to create simulation models that simulate the behavior of the ECUs. Throughout the further course of ECU development, these models serve as a base for analysis, testing and integration of the bus systems and ECUs. Data is displayed and evaluated in either raw or symbolic format. Back in 1992, Vector developed the DBC data format, which has become a de facto standard for exchanging CAN descriptions in the automotive field. Other relevant standards are supported for other bus systems, e.g. FIBEX for FlexRay, LDF for LIN, Fibex for SOME/IP, EDS/DCF/XDD for CANopen. While CANoe can simulate the whole communication in a vehicle, it also includes a Test Feature Set, for creating automated test sequences. These automated test sequences can be controlled fully automated by usual CI tools (such as Jenkins etc). The Test Feature Set included in CANoe has a long history and is therefore available in variants; creation of test cases can be created in CAPL (Communication Access Programming Language - a C-like programming language), in XML, or in C#. The tests can either be manually programmed or generated automatically by different generators. CANoe's Ethernet option includes Ethernet Conformance Tests (TC8 test suite). CANoe's LIN option includes LIN Conformance slave tests. Versions Version 1.0 was released in 1996. The latest version of CANoe is 15. Program Levels Different variants of CANoe are available. They differ in functional scope (full, run, pex), supported bus systems (CAN, FlexRay, etc.) and supported higher protocols (SAE J1939, CANopen, etc.). The product supports the languages German, English and Japanese. See also CANalyzer CANape References Sources Pfeiffer, Ayre, Keydel: Embedded Networking with CAN and CANopen, RTC Books San Clemente, USA, 2003 Pfeiffer, Ayre, Keydel: Embedded Networking with CAN and CANopen, RTC Books, Japan, 2006 (jap) Toshikatsu Suzuki (Senko Medical), Hiroyoshi Takahashi (VJ): Developing a CANopen system for heart-lung machines, CAN Newsletter, Nuremberg Germany, September 2009 Patrick E. Lanigan, Priya Narasimhan (ECE Department, Carnegie Mellon University), Thomas E. Fuhrman (GM R&D): Experiences with a CANoe-based Fault Injection Framework for AUTOSAR, http://www.ece.cmu.edu/~planigan/research/lanigan-dsn10.pdf, downloaded September 30, 2010 Becker, Hübner, Hettich, Constabel, Eisenmann, Luka: Dynamic and Partial FPGA Exploitation, in Proceedings of the IEEE Vol. 95, No. 2, February 2007, http://www.gstitt.ece.ufl.edu/courses/spring09/eel4930_5934/reading/pr.pdf, downloaded September 30, 2010 Institute of Electrical Engineering, Beijing Fang Li, Lifang Wang and Chenglin Liao: Evaluating the Communication Impact on Quality of Service in Steer-by-wire Systems, IEEE Vehicle Power and Propulsion Conference (VPPC), September 3–5, 2008, Harbin, China, https://web.archive.org/web/20110722014340/http://up.daneshpajooh.ir/pdf/ieee2008/Evaluating-the-Communication-Impact-on-Quality-of-Service-in-Steer-by-wire-Systems_www.daneshpajooh.ir.pdf, downloaded September 30, 2010 Sandeep Neema, Gabor Karsai (Institute for Software Integrated Systems Vanderbilt University): Embedded Control Systems Language for Distributed Processing (ECSL-DP), http://w3.isis.vanderbilt.edu/Janos/CS388/Reading%20List/Papers/Automotive%20testbed%20report.pdf, downloaded September 30, 2010 Jürgen Wölfle (Conti Temic): Testing Concepts and Test Environments of a Tier 1 Supplier, Vector Congress, Stuttgart, 2010 External links CANoe website Computer-aided engineering software Data analysis software
2818080
https://en.wikipedia.org/wiki/Don%20Sannella
Don Sannella
Donald T. Sannella FRSE is professor of computer science in the Laboratory for Foundations of Computer Science, at the School of Informatics, University of Edinburgh, Scotland. Sannella graduated from Yale University, University of California, Berkeley and University of Edinburgh with degrees in computer science. His research interests include: algebraic specification and formal software development, correctness of modular systems, types and functional programming, resource certification for mobile code. Sannella is founder of the European Joint Conferences on Theory and Practice of Software, a confederation of computer science conferences, held annually in Europe since 1998. He is editor-in-chief of the journal Theoretical Computer Science, and is co-founder and CEO of Contemplate Ltd. His father is Ted Sannella. Honours and awards In 2014 Sannella was elected a Fellow of the Royal Society of Edinburgh. References External links Official home page Personal home page Publications Year of birth missing (living people) Living people Scottish computer scientists Alumni of the University of Edinburgh Academics of the University of Edinburgh Formal methods people Academic journal editors Place of birth missing (living people) Yale University alumni University of California alumni Fellows of the Royal Society of Edinburgh
60073593
https://en.wikipedia.org/wiki/Fdm%20%28software%29
Fdm (software)
fdm (fetch/filter and deliver mail) is a mail delivery agent and email filtering software for Unix-like operating systems, similar to fetchmail and procmail. It was started in 2006 by Nicholas Marriott who later also started tmux in 2007. Adoption fdm is available as a package in many Unix-like operating systems. It has been included in OpenBSD ports since 2007-01-18. When in 2014 the last maintainer of procmail posted a message to an OpenBSD mailing list himself suggesting that he remove the procmail port, it has been suggested by a well-known OpenBSD ports maintainer that fdm is the natural alternative (the procmail port, however, has not been removed and remains in place as of 2020). fdm is listed on the OpenBSD Innovations page, in the section of projects maintained by OpenBSD developers outside of OpenBSD. See also fetchmail procmail maildrop Sieve (mail filtering language) References External links Unix software Free email software Mail delivery agents OpenBSD Free software programmed in C Software using the ISC license Email clients
64350108
https://en.wikipedia.org/wiki/MacOS%20Big%20Sur
MacOS Big Sur
macOS Big Sur (version 11) is the seventeenth major release of macOS, Apple Inc.'s operating system for Macintosh computers. It was announced at Apple's Worldwide Developers Conference (WWDC) on June 22, 2020, and was released to the public on November 12, 2020. Big Sur is the successor to macOS Catalina, and was succeeded by macOS Monterey, which was released on October 25, 2021. Most notably, macOS Big Sur features a user interface redesign that features new blurs to establish a visual hierarchy and also includes a revamp of the Time Machine backup mechanism, among other changes. It is also the first macOS version to support Macs with ARM-based processors. To mark the transition, the operating system's major version number was incremented, for the first time since 2000, from 10 to 11. The operating system is named after the coastal region of Big Sur in the Central Coast of California. Development history Providing some indication as to how the pre-release operating system may have been viewed internally at Apple during its development cycle, documentation accompanying the initial beta release of macOS Big Sur referred to its version as "10.16", and when upgrading from prior versions of macOS using the Software Update mechanism to early beta releases, the version referred to was "10.16". An exception to this was the Developer Transition Kit, which always reported the system version as "11.0". macOS Big Sur started reporting the system version as "11.0" on all Macs as of the third beta release. To maintain backwards compatibility, macOS Big Sur identified itself as 10.16 to software and in the browser user agent. System requirements Unlike macOS Catalina, which supported every standard configuration Mac that Mojave supported, Big Sur drops support for various Macs released in 2012 and 2013. Big Sur runs on the following Macs: MacBook: Early 2015 and newer MacBook Air: Mid 2013 and newer MacBook Pro: Late 2013 and newer Mac Mini: Late 2014 and newer iMac: Mid 2014 and newer iMac Pro: Late 2017 Mac Pro: Late 2013 and newer Developer Transition Kit (only up to Big Sur 11.3 beta 2) Changes Design macOS Big Sur refreshes the design of the user interface, described by Apple as the biggest change since the introduction of Mac OS X. Its changes include translucency in various places, a new abstract wallpaper for the first time and a new color palette. All standard apps, as well as the Dock and the Menu Bar, are redesigned and streamlined, and their icons now have rounded-square shapes like iOS and iPadOS apps. Compared to iOS, Big Sur's icons include more shading and highlights to give a three-dimensional appearance. Its aesthetic has been described as "neumorphism", a portmanteau of new and skeuomorphism. System sounds are redone as well. The new OS also brings further integration with Apple's SF Symbols, enabling easier use by third-party developers as UI elements for their applications through AppKit, SwiftUI, and Catalyst, which makes it possible to unify third party applications with the existing Apple-made design language. Interface Control Center An interface with quick toggles for Wi-Fi, Bluetooth, screen brightness and system volume has been added to the menu bar. This interface is functionally and visually similar to Control Center on iOS and iPadOS. Notification Center The Notification Center is redesigned, featuring interactive notifications and a transparent user interface. Notification Center also features a new widget system similar to that in iOS 14, displaying more information with more customization than previously available. System Support for Apple silicon macOS Big Sur is the first release of macOS for Macs powered by Apple-designed ARM64-based processors, a key part of the transition from Intel x86-64-based processors. The chip mentioned in demo videos, and used in the Developer Transition Kit, is the A12Z Bionic. On November 10, 2020, Apple announced the first Mac Apple silicon chip, the Apple M1, in the Late 2020 Mac Mini, MacBook Air, and MacBook Pro. Apple has said that it will support Intel Macs "for years to come", and most software that has not been ported to run on ARM Macs can use Rosetta 2, an update of a compatibility mechanism originally developed for the PowerPC-to-Intel x86 transition. Likewise, Apple also introduced an updated universal binary format, Universal 2, which allows developers to package their applications so that they can run natively on both ARM64 and x86-64 processors. Support for iOS and iPadOS applications On Macs based on Apple silicon, macOS Big Sur can run iOS and iPadOS applications natively and without any modifications needed from developers, aside from allowing the app to be available on the Mac App Store. The first Macs with this capability are those that use the Apple M1 SoC (system on a chip). Time Machine Time Machine, the backup mechanism introduced in Mac OS X 10.5 Leopard, has been overhauled to utilize the APFS file system instead of HFS+. Specifically, the new version of Time Machine makes use of APFS's snapshot technology. According to Apple, this enables "faster, more compact, and more reliable backups" than were possible previously with HFS+-formatted backup destinations. An independent evaluation of this claim found that Time Machine on macOS 11 in conjunction with APFS was 2.75-fold faster upon initial local backup and 4-fold faster upon subsequent backups relative to macOS 10.15's Time Machine implementation using HFS+. A more modest yet nevertheless significant advantage was noted as well for backups to network-attached disks. New local (i.e. USB- or Thunderbolt-connected) and network-connected Time Machine backup destinations are formatted as APFS by default, though Time Machine can continue backing up to existing HFS+ backup volumes. There is no option to convert existing, HFS+-based backups to APFS; instead, users who want to benefit from the advantages of the new, APFS-based implementation of Time Machine need to start with a fresh volume. In the new version of Time Machine, encryption appears to be required (instead of merely optional) for local disks, but it remains elective for networked volumes. It is no longer possible to restore the whole system using a Time Machine backup, as the signed system volume is not backed up. Non-core applications and user data can be restored in full using Migration Assistant, preceded by a system reinstall if necessary. Spotlight Spotlight, the file system indexing-and-search mechanism introduced in Mac OS X 10.4 Tiger, is faster and the interface has been refined. Spotlight is now the default search mechanism in Safari, Pages, and Keynote. Signed system volume The system volume containing the core operating system is cryptographically signed. Apple indicates this is a security measure to prevent malicious tampering. This includes adding an SHA-256 hash for every file on the system volume, preventing changes from third-party entities and the end user. Software updates Software updates can begin in the background before a restart, thus requiring less downtime to complete. Because system files are cryptographically signed, the update software can rely on them being in precise locations, thus permitting them to be effectively updated in place. Encryption macOS Big Sur supports encryption at the file level. Earlier versions of macOS (10.15 Catalina and older) supported encryption only at the level of entire volumes. As of June 2020, this capability is known to be compatible with Macs based on Apple silicon; it is unclear whether it is compatible with Intel-based Macs. Other changes Bilingual dictionaries in French–German, Indonesian–English, Japanese–Simplified Chinese and Polish–English Better predictive input for Chinese and Japanese users New fonts for Indian users The "Now Playing" widget has been moved from the Notification Center to the Menu Bar Podcasts "Listen Now" feature FaceTime sign language prominence Network Utility has been deprecated macOS startup sound is enabled by default (it had been disabled by default on some machines in 2016), and an option in System Preferences was added to enable or disable this functionality. Application features Safari Big Sur includes Safari 14, which was also released for macOS Catalina and macOS Mojave on September 16, 2020. Safari 14 includes features such as a new home page in which users can customize what features are visible in addition to being able to set a custom wallpaper. It also allows the viewer to preview a page and favicon before visiting it. Safari 14 also includes built-in web page translations in English, Spanish, German, French, Russian, Chinese and Portuguese as well as support for 4K HDR content from Netflix on Macs with an Apple T2 chip, although none of these were made available for macOS Catalina and Mojave. Privacy features such as iCloud Keychain (which notifies users of compromised passwords), extension privacy management and Privacy Report (which monitors privacy trackers and further increases Safari's security) were added for Safari 14. Users were now also able to import password from Google's Chrome browser in addition to being notified of compromised passwords. Safari 14 also supports WebExtensions API, the WebP image format as well as VP9 decoding, the latter of which allows for the playback of 4K and HDR content from YouTube. In addition, it allowed for better performance and power efficiency. Safari 14 ended support for Adobe Flash Player in September, 3 months prior to its end-of-life on December 31, 2020. Messages The Messages app was rewritten to be based upon Apple's Catalyst technology to enable it to have feature parity with its iOS counterpart. The new version of the app included a refined design as well as the ability to pin up to nine conversations that can sync across iOS, IPadOS and macOS. Users were also now allowed to search for messages and share their names and photos. Photo thumbnails could now also be used for group chats on the app. In addition, users could mention contacts by putting the @ symbol in front of their name. They were also able to reply to specific messages. Memojis, 3d avatars were also made available on Messages. On Messages, users could now select photos based on parameters. In India, text message effects were added when users sent certain texts (e.g., texting "Happy Holi" will result in users seeing effects). App Store Refinements and new features of the Mac App Store include: A new "nutrition label" section dedicated to the data and information an app collects, also featured in the iOS App Store A new Safari extensions category Third party Notification Center widgets, similar to those in iOS and iPadOS 14 The ability to share in-app purchases and subscriptions on the Mac via iCloud Family Sharing Notes Collapsible pinned section Quick text style and formatting options Scanning enhancements Photos New editing capabilities Improved Retouch tool New zooming feature in views Maps "Look Around" interactive street-level 360° panoramas, first implemented in the iOS 13 version of Maps, have been incorporated into the macOS version of Maps. Availability of directions for cyclists. Electric vehicle routing, based on proximity to charging stations and monitoring of battery levels (on selected car models). Guides for exploring new places. Voice Memos a file structure has been implemented to allow organization of recordings in folders recordings can be marked as Favorites for easier subsequent access Smart Folders automatically group Apple Watch recordings, recently deleted recordings, and Favorites audio can be enhanced to reduce background noise and room reverb Other applications found in macOS 11 Big Sur About This Mac Activity Monitor AirPort Utility Archive Utility Audio MIDI Setup Automator Bluetooth File Exchange Books Boot Camp Assistant Calculator Calendar Chess ColorSync Utility Console Contacts Dictionary Digital Color Meter Directory Utility Disk Utility DVD Player Expansion Slot Utility FaceTime Feedback Assistant Find My Finder Folder Actions Setup Font Book Grapher Home Image Capture iOS App Installer Keychain Access Mail Launchpad Migration Assistant Mission Control Music Network Utility News (only available for Australia, Canada, United Kingdom, and United States) Photo Booth Podcasts Preview QuickTime Player Reminders Screen Sharing Screenshot (succeeded Grab since macOS 10.14 Mojave) Script Editor Siri Stickies Stocks Storage Management System Information Terminal TextEdit Ticket Viewer Time Machine TV VoiceOver Utility Wireless Diagnostics Removed functionality Calculator Notification Center Widget Option to toggle Font Smoothing in System Preferences Support for AdBlock plugins like uBlock Origin Criticism The rollout of Big Sur came with several problems. Upgrading to the initial public release of Big Sur (version 11.0.1) bricked some computers, rendering them unusable. Many of these were 2013 and 2014 MacBook Pros, though problems were also observed on a 2019 MacBook Pro and an iMac from the same year. The initial rollout also disrupted Apple's app notarization process, causing slowdowns even on devices not running Big Sur. Users also reported that the update was slow or even might fail to install. macOS Catalina and Big Sur apps were taking a long time to load because of Gatekeeper issues. The ongoing issues with the COVID-19 pandemic meant it was hard for users to visit an Apple Store to get their machines fixed. Shortly afterwards, Apple released a series of steps explaining how these Macs could be recovered. Certain Apple applications running on early versions of Big Sur were reported to bypass firewalls, raising privacy and security concerns. This was addressed with the release of macOS Big Sur 11.2, which removed the whitelist for built-in programs. Conversely, security experts have reported that Big Sur will check an application's certificate every time it is run, degrading system performance. There have been reports that the operating system sends a hash back to Apple of every program run and when it was executed. Apple responded that the process is part of efforts to protect users from malware embedded in applications downloaded outside of the Mac App Store. Some users have reported problems connecting external displays to Macs running Big Sur 11.1 and 11.2. When upgrading Macs from 10.13, 10.14 and 10.15 to Big Sur the upgrade process could become stuck for seemingly unclear reasons. Only a full system restore from backup would solve this problem. On 21 October 2021 a solution became known that required removal of up to several hundreds of thousands excess temporary files in the system folders. Vulnerability In 2021, there were reports of two malware codes that infected macOS and include both x86-64 and ARM64 code. The first one was detected in early 2021. The second one, Silver Sparrow, was detected on nearly 30,000 Macs in February 2021. Release history The public release of macOS 11 Big Sur began with 11.0.1 for Intel Macs. Version 11.0 was preinstalled on Apple silicon Macs, and Apple advised those with that version to be updated to 11.0.1. References External links – official site 16 2020 software Computer-related introductions in 2020 ARM operating systems X86-64 operating systems
1584125
https://en.wikipedia.org/wiki/Test%20plan
Test plan
A test plan is a document detailing the objectives, resources, and processes for a specific test for a software or hardware product. The plan typically contains a detailed understanding of the eventual workflow. Test plans A test plan documents the strategy that will be used to verify and ensure that a product or system meets its design specifications and other requirements. A test plan is usually prepared by or with significant input from test engineers. Depending on the product and the responsibility of the organization to which the test plan applies, a test plan may include a strategy for one or more of the following: Design verification or compliance test – to be performed during the development or approval stages of the product, typically on a small sample of units. Manufacturing test or production test – to be performed during preparation or assembly of the product in an ongoing manner for purposes of performance verification and quality control. Acceptance test or commissioning test – to be performed at the time of delivery or installation of the product. Service and repair test – to be performed as required over the service life of the product. Regression test – to be performed on an existing operational product, to verify that existing functionality was not negatively affected when other aspects of the environment were changed (e.g., upgrading the platform on which an existing application runs). A complex system may have a high level test plan to address the overall requirements and supporting test plans to address the design details of subsystems and components. Test plan document formats can be as varied as the products and organizations to which they apply. There are three major elements that should be described in the test plan: Test Coverage, Test Methods, and Test Responsibilities. These are also used in a formal test strategy. Test coverage Test coverage in the test plan states what requirements will be verified during what stages of the product life. Test coverage is derived from design specifications and other requirements, such as safety standards or regulatory codes, where each requirement or specification of the design ideally will have one or more corresponding means of verification. Test coverage for different product life stages may overlap, but will not necessarily be exactly the same for all stages. For example, some requirements may be verified during Design Verification test, but not repeated during Acceptance test. Test coverage also feeds back into the design process, since the product may have to be designed to allow test access. Test methods Test methods in the test plan state how test coverage will be implemented. Test methods may be determined by standards, regulatory agencies, or contractual agreement, or may have to be created new. Test methods also specify test equipment to be used in the performance of the tests and establish pass/fail criteria. Test methods used to verify hardware design requirements can range from very simple steps, such as visual inspection, to elaborate test procedures that are documented separately. Test responsibilities Test responsibilities include what organizations will perform the test methods and at each stage of the product life. This allows test organizations to plan, acquire or develop test equipment and other resources necessary to implement the test methods for which they are responsible. Test responsibilities also include what data will be collected and how that data will be stored and reported (often referred to as "deliverables"). One outcome of a successful test plan should be a record or report of the verification of all design specifications and requirements as agreed upon by all parties. IEEE 829 test plan structure IEEE 829-2008, also known as the 829 Standard for Software Test Documentation, is an IEEE standard that specifies the form of a set of documents for use in defined stages of software testing, each stage potentially producing its own separate type of document. These stages are: Test plan identifier Introduction Test items Features to be tested Features not to be tested Approach Item pass/fail criteria Suspension criteria and resumption requirements Test deliverables Testing tasks Environmental needs Responsibilities Staffing and training needs Schedule Risks and contingencies Approvals The IEEE documents that suggest what should be contained in a test plan are: 829-2008 IEEE Standard for Software and System Test Documentation 829-1998 IEEE Standard for Software Test Documentation (superseded by 829-2008) 829-1983 IEEE Standard for Software Test Documentation (superseded by 829-1998) 1008-1987 IEEE Standard for Software Unit Testing 1012-2004 IEEE Standard for Software Verification and Validation 1012-1998 IEEE Standard for Software Verification and Validation (superseded by 1012-2004) 1012-1986 IEEE Standard for Software Verification and Validation Plans (superseded by 1012-1998) 1059-1993 IEEE Guide for Software Verification & Validation Plans (withdrawn) See also Software testing Test suite Test case Test script Scenario testing Session-based testing IEEE 829 Ad hoc testing References External links Public domain RUP test plan template at Sourceforge (templates are currently inaccessible but sample documents can be seen here: DBV Samples) Software testing
33687073
https://en.wikipedia.org/wiki/Rose%20Hill%20Packet
Rose Hill Packet
Rose Hill Packet, was a marine craft built in Australia, named after the second place of European settlement in Australia, "Rose Hill", the furthest navigable point inland on the Parramatta River. The boat design was later called a packet (or mail) boat, because its use was that of running the first Parramatta River trade ferry, passenger, cargo, and mail service between the Sydney Cove and the Rose Hill (Parramatta) First Fleet settlements after she was launched in Sydney Cove in September and commissioned on 5 October 1789. She was the first purpose-built sailing vessel constructed in Australia. She later earned the nickname 'The Lump'. Authorising construction Governor Arthur Phillip had appointed a midshipman, Henry Brewer, as temporary superintendent of building works in the colony seven years before. In 1796, Governor John Hunter would establish a government shipyard in Sydney Town. The craft was laid down on 30 December 1788 on King's Slipway, later the James Underwood yards on the east side of Sydney Cove, somewhere near the site of the present Customs House, by convicts under supervision of Robinson Reid, a carpenter from . Construction resource problems Fourteen ship's carpenters are known to have been sailing with the First Fleet ships, so the selection of Reed as the builder was unlikely to have been accidental. Unfortunately the quality of local timber left few options for the construction, and "From the quantity of wood used, she appeared to be a 'mere bed of timber." What made construction difficult was the lack of specialised shipbuilding tools, and many of the carpentry tools intended for use in the cutting and shaping of the European timbers turned out to be unsuitable for the task mainly due to the density of the local hardwood timber. Although there were sixteen ship's carpenters in the colony, of the convicts used in the building of the packet only twelve were trained as carpenters. All these factors forced excessive use of timber. Australian timbers in early shipbuilding attempts The difficulties in constructing Rose Hill Packet lay with the type of timber readily available in the Sydney area, the Sydney red gum. Some trees were or more high with no lateral branches until . Their girth could measure in excess of in diameter, but the trunks were hollow and rotten in eleven out of a dozen felled trees. Cox and Freeland describe the species as, "almost without exception, they rot out at the heart before they are any useful size leaving a mere shell of living sound wood." It was found that no matter in what way it was sawn or how well it was dried, that when placed in water "it sinks to the bottom like a stone." Members of the First Fleet soon realised that, "despite their amazing size the trees were scarcely worth cutting down." Several years later, George Thompson summed up Australian timber as "of little use - not fit for building either houses or boats." It wasn't until later that Australian settlers found that the most useful timbers for boat and ship building were the Eucalypts species: iron bark, stringy bark, box and the blackbutt, the bluegum, and turpentine. Consequently, the axes, saws and chisels used by carpenters broke or became blunt with the unfamiliar timber which only much later was discovered to have a density three times that of the European Oak. To add to their woes, the red gum began to split and warp almost as soon as it was cut, making the usual seasoning impossible, and forcing the use of green timber. However, the same timber after being seasoned for 15 years was reportedly very strong and suitable by the time the colony's first three-masted ship King George was being built. Craft design Reid called the craft a 20-ton (about 15.9m3) launch, a term appropriate for the Royal Navy service, which would produce a craft, larger than any fleet ships could have carried on board to the new colony. No plans or illustrations survive. Several contemporary accounts reported her to be 10 or 12 ton, or alternatively the size of a small hoy-decked boat, which in England were commonly sloop-rigged, designed for inshore work. She carried a single mast, and was also provided with oars, reportedly requiring occasional use of poles due to her "heaviness", however this refers to a vessel's handling during sailing, not physical weight. The naming confusion perhaps stemms from the variety of coastal craft used in Britain at the time: the English Cutter of the late 18th century, the Margate hoy used for Channel crossing, the Leith sloop, and the English Channel packet-boat. However, the description closely matches the Southampton fishing hoys, with "heavy", i.e. nearly vertical, stem and stern posts, larger than expected beams and rounded mid-ship sections. The clinker-built Southampton fishing hoys carried the smack or cutter rigs rather than the sloop rigs of the south-eastern English coast (Dover & Thames) hoys. David Steel's The Elements and Practice of Naval Architecture. Illustrated with a series of Thirty-Eight Large Draughts and Numerous Smaller Engravings, 1805 illustrates a 13-ton hoy of this type on Plate XXVIII. The reason for the design and rig differences are suggested by the need to navigate the Solent within the proximity of the Isle of Wight with its Eastern Solent, Portsmouth road, Bramble Bank, Bembridge Ledges, and Needles Channel hazards. It is then understandable where the design came from since the First Fleet set sail from Portsmouth, 19 miles (31 km) south east of Southampton. When launched, was named by the convicts, Rose Hill Packet, but afterwards, was appropriately known by the name of 'The Lump'. Craft's performance Despite the colloquial name given to the Packet, it did not necessarily refer to the 'ugliness' of construction, or the lack of construction skills, but the actual design shape produced by the stem and stern rakes, because in use she was "...going up with the tide of flood, at the top of high water, she passed very well over the flats at the upper part of the (Parramatta river) harbour." Reports suggest she could carry up to thirty passengers on deck. Because of the amount of timber used, the craft's performance was considered sluggish, and she was an awkward looking row-and-sail boat. As much as the service was useful to the settlers, the craft lacked durability due to use of green timber, and was difficult in operating, sometimes even requiring the passengers to assist in rowing. Other lighter sailing craft and rowing boats were soon brought into service as ferries across the Harbour to Manly Cove and up and down the river. The packet service was discontinued by 1800. See also List of Sydney Harbour ferries Timeline of Sydney Harbour ferries References Recommended reading Walker, M. 1978. Pioneer Crafts of Early Australia. The Macmillan Company of Australia Pty Ltd. Melbourne. External links Rose Hill Packet in the Dictionary of Sydney, 2008. [CC-By-SA] 1789 ships Ships built in New South Wales Maritime history of Australia 1788–1850 ships of Australia Merchant ships of Australia Individual sailing vessels
2869726
https://en.wikipedia.org/wiki/XCircuit
XCircuit
XCircuit is a Unix/X11 and Windows program for drawing publication-quality electrical circuit schematic diagrams and related figures and the production of circuit netlists through schematic capture. XCircuit regards circuits as inherently hierarchical and writes both PostScript output and hierarchical SPICE netlists. Circuit components are saved in and retrieved from libraries which are fully editable. XCircuit does not separate artistic expression from circuit drawing; it maintains flexibility in style without compromising the power of schematic capture. History XCircuit was written and is maintained by Tim Edwards, currently with Efabless Corp., formerly with the Johns Hopkins University Applied Physics Laboratory in Laurel, Maryland. XCircuit was initially written in the summer of 1993 as a drawing program to render circuit diagrams for an undergraduate electrical engineering course in the Johns Hopkins University Whiting School of Engineering Part-time programs. Since then it has expanded to encompass schematic capture and is used by people all over the world for both presentations and as an EDA (Electronic Design Automation) tool. PCB layout editing can be accomplished with the program "PCB" that can use net-lists and other files from XCircuit. See also Comparison of EDA software List of free electronics circuit simulators References External links Free electronic design automation software Free diagramming software Electronic design automation software for Linux Software that uses Tk (software)
18928084
https://en.wikipedia.org/wiki/David%20Maier
David Maier
David Maier (born 2 June 1953) is the Maseeh Professor of Emerging Technologies in the Department of Computer Science at Portland State University. Born in Eugene, OR, he has also been a computer science faculty member at the State University of New York at Stony Brook (1978–82), Oregon Graduate Center (OGC, 1982–2001), University of Wisconsin (UW, 1997–98), Oregon Health & Science University (2001–present) and National University of Singapore (2012–15). He holds a B.A. in Mathematics and Computer Science from the University of Oregon (Honors College, 1974) and a Ph.D. in Electrical Engineering and Computer Science from Princeton University (1978). Maier has been chairman of the program committee of ACM SIGMOD. He also served as an associate editor of ACM Transactions on Database Systems. Maier has consulted with Tektronix, Inc., Servio Corporation, the Microelectronics and Computer Technology Corporation (MCC), Digital Equipment Corporation, Altair Engineering, Honeywell, Texas Instruments, IBM, Microsoft, Informix, Oracle Corporation, NCR, and Object Design, as well as several governmental agencies. He is a founding member of the Data-Intensive Systems Center (DISC), a joint project of OGI and Portland State University. He is the author of books on relational databases, logic programming and object-oriented databases, as well as papers in database theory, object-oriented technology and scientific databases. He received the Presidential Young Investigator Award from the National Science Foundation in 1984 at OGC, and was awarded the 1997 SIGMOD Edgar F. Codd Innovations Award for his contributions in objects and databases at UW. He is also an ACM Fellow. Maier established some of the earliest results on using the relational model. Together with his thesis advisor, Jeffrey Ullman, and fellow Princeton students, including Alberto O. Mendelzon and Yehoshua Sagiv, he co-authored a number of influential papers that laid out the fundamental issues and approaches for relational databases. In a now-famous paper (Maier, Mendelzon and Sagiv, TODS 1979), he introduced the chase, a method for testing implication of data dependencies that is now of widespread use in the database theory literature. This work has been highly influential: it is used, directly or indirectly, on an everyday basis by people who design databases, and it is used in commercial systems to reason about the consistency and correctness of a data design. New applications of the chase in meta-data management and data exchange are still being discovered. He is credited for coining the term Datalog. References David Maier's homepage: http://web.cecs.pdx.edu/~maier/ His database theory book, now available online: http://web.cecs.pdx.edu/~maier/TheoryBook/TRD.html American computer scientists Database researchers Fellows of the Association for Computing Machinery Portland State University faculty Living people Oregon Graduate Institute people 1953 births
59697347
https://en.wikipedia.org/wiki/Barren%20County%20High%20School
Barren County High School
Barren County High School is a four-year public high school located in Glasgow, Kentucky, U.S. It is one of two high schools serving the Barren County school system, the other being the Trojan Academy. It is located on the south side of Glasgow on Trojan Trail off of U.S. Route 31E near the exit 11 interchange off the Louie B. Nunn Cumberland Parkway. The school's principal is Amy Irwin. Athletics The Barren County High School athletic teams are known as the Trojans. The school colors are burgundy and gold, a similar color scheme to that of the University of Southern California, whose collegiate teams are also called the Trojans. References External links Barren County Schools BCHS Live! on YouTube Schools in Barren County, Kentucky Public high schools in Kentucky Glasgow, Kentucky Barren County, Kentucky
35457247
https://en.wikipedia.org/wiki/Academy%20of%20Information%20Technology%20%28Australia%29
Academy of Information Technology (Australia)
AIT, Creative Technology Educators (also known as the Academy of Information Technology) is a specialist higher education and vocational education institution based in Sydney, Australia, with a second campus opening in Melbourne, Australia in 2015. AIT was established in 1999, and specialises in three disciplines: digital media, information technology, and business. AIT is a member of the RedHill Education group, alongside Greenwich English College, Go Study Australia, and the International School of Colour and Design (ISCD). AIT was the first in Australia to offer courses in Motion capture technology, and has the latest markerless Motion Capture system installed in its Sydney campus, in 2013, AIT was still the first Mobile Applications Development course provided. AIT holds and participates in many events, including the AIT Oscar Night, the AIT Games Night, and the Vivid Light Festival. AIT is recognised as a quality tertiary education provider by the Australian Government's Tertiary Education Quality & Standards Agency (TEQSA) and the Australian Skills Quality Authority (ASQA). Courses 2D & 3D Animation Bachelor of Interactive Media (Specialisation: Animation) Diploma of Digital Media Technologies (Specialisation: Animation) Design Bachelor of Interactive Media (Specialisation: Design) Diploma of Digital Media Technologies (Specialisation: Design) Film Making Bachelor of Interactive Media (Specialisation: Film Making) Diploma of Digital Media Technologies (Specialisation: Film Making) Game Design Bachelor of Interactive Media (Specialisation: Game Development) Diploma of Digital Media Technologies (Specialisation: Game Development) Digital Design Bachelor of Digital Design Diploma of Design IT Bachelor of IT (Mobile Applications Development) Diploma of Software Development Facilities Motion capture The motion capture (or organic motion) is a markerless motion capture system that was designed and manufactured by Organic Motion of New York. This type of technology was the first of its kind implemented in Australia. The Motion Capture, aka MoCap, allows users to motion track and animate their 3D characters easily. Green Screen Room The Green Screen Room is a state of the art filming environment located on the Sydney campus. The space was launched on 28 May 2014 and allows students to extend their editing skills in Adobe Premiere and Adobe After Effects for Green Screen compositing. Controversies Wage underpayment In 2019 the Academy of Information Technology (AIT) admitted to its staff that they “may” have been paying casual educators below the Award rate. The National Tertiary Education Union (NTEU) estimated around 40 casual employees are affected by underpayment, which in some cases has employees receiving less than 50% of the Award rate for lectures. The underpayment case was settled for around $2million dollars for 83 current and former staff. CEO Glenn Elith apologised for the underpayment: "AIT sincerely regrets the underpayments of its valued and hard-working staff. AIT is committed to ensuring all staff are fully compensated and properly paid in future. Upon becoming aware of this matter, AIT’s academic staff were immediately informed and the company worked quickly to determine the back-payments required. AIT has been grateful for the constructive approach taken by NTEU in this matter, and respects its strong advocacy for their members.” Student council and social activities Student Representative Council The Student Representative Council (SRC) is a small group of students selected by the student body. Their job is to help improve the quality of life on the AIT campus, and do so by communicating with teachers and staff members on the student bodies behalf. The current president of the SRC is Mikhaila Katte. Clubs As of 2015 AIT currently has five clubs running: the 3D Club, Film Club, Drawing Club, Table Top Club and Fight Club. These clubs are overseen and assisted by the SRC. Events AIT holds regular events throughout the year, held by a mixture of staff members, teachers and the SRC. Smaller events include barbecues, Christmas parties and Trivia Nights. AIT Oscar Night The AIT Oscar Night is an annual event held at AIT. This event allows student works to be recognised and rewarded by their teacher and peers in the fields of Animation and Film. The event is run by Film Coordinator, Patrick Huang. AIT Games Night The AIT Games Night is an annual event held at AIT. This event features student games alongside other activities like cosplay competitions. Prizes are awarded to the best student games. This event is run by both the teachers and SRC, allowing multiple activities to run in one night. .ink Student Art Exhibition The .ink Student Art Exhibition is an annual event held off campus that celebrates the traditional art, digital illustrations, digital design, concept art, photography and promotional products students have produced. Vivid In 2015 AIT participated in the Vivid Light Festival. Their entry, titled "Lightwell", was a collaborative task between teachers and students. The structure itself was created by Helen Goritsas, Patrick Huang, Nik Sutila, Adam Katz, Sharon Sanders, Carlton Zhu, Kwan Chemsripong and Kriss Mahatumaratana. The interactive structure displayed a collection of student artworks onto a wall along Walsh Bay, Sydney. See also List of universities in Australia References External links RedHill Education: Our Businesses The Tertiary Education Quality Standards Agency (TEQSA) Australian Government MyUniversity Australian Government Study Assist Organic Motion Information technology education Universities in Sydney
5274374
https://en.wikipedia.org/wiki/Supersoft
Supersoft
Supersoft is a software and computer game developer and publisher founded in England in 1978. It was founded by Peter Calver and Pearl Wellard to develop and publish software primarily for the Commodore PET. History The earliest Supersoft catalogue known to have survived dates from December 1979. Earlier catalogues were photocopied in small quantities. Hardware In 1980 Supersoft released the first user-installable firmware product to be developed in the UK, the Petmaster Superchip. The following year the company expanded into hardware with the release of a high-resolution graphics card for the Commodore PET - and although by modern standards the resolution of 320 × 200 pixels is not high, it was a considerable improvement on the 80 × 50 capability of the standard model. Originally run from the founders' home in Eastcote, Middlesex the business moved to office premises in Wealdstone in 1981. Software Early games published by Supersoft for the Commodore PET included Air Attack (see Blitz computer game) and Super Glooper, the latter based on the popular Pac-Man arcade game. A text-adventure game based on the Douglas Adams book Hitchhiker's Guide to the Galaxy was withdrawn following legal action. The game's programmer, Bob Chappell, rewrote the game to remove all Hitchhiker's references, and Supersoft republished it as "Cosmic Capers.". The most successful business program developed by Supersoft was Busicalc, a spreadsheet program originally produced for the Commodore PET, and converted to the Vic-20 and Commodore 64; it was one of Supersoft's most successful products in the UK and became the company's first and most successful product in the USA, where it was published under licence by Skyles Electric Works. Busicalc 2 and Busicalc 3 followed, the latter offering three-dimensional capabilities. Forming Audiogenic In 1984 development commenced on a cricket game for the Commodore 64, which was programmed by Michael McLean and released the following year as Graham Gooch's Test Cricket by Audiogenic Software, a newly formed subsidiary of Supersoft. From 1985 onwards Supersoft focused on home office programs and utilities, as the Audiogenic name was better-known in the games business. Microvox In 1987 Supersoft released Microvox, a high-quality digital sampler for the Commodore 64 which, with its accompanying software was developed by Andrew Trott. While only hundreds were sold (the device cost more than the computer), many were used by serious musicians and in professional studios, and one was supplied to Feargal Sharkey, the former lead singer of the Undertones. Present day Although Supersoft is still in existence, the company has not developed any new products for retail sale since 1990. The company is wholly owned by Peter Calver. Reception Ahoy! in May 1984 stated that the original Busicalc program was written in Commodore BASIC and was "very sluggish". The original program had been rushed out to compete with an earlier spreadsheet for the Commodore PET called Simplicalc, which was also written in BASIC. By the time the review was published the program had been largely superseded by Busicalc 2, written in compiled BASIC and machine code, and which was many times faster. See also Audiogenic Commodore 64 software Notes Video game companies established in 1978 Software companies of the United Kingdom Video game companies of the United Kingdom Video game development companies Video game publishers Software companies established in 1978 1978 establishments in England
36078665
https://en.wikipedia.org/wiki/Where%20Is%20My%20Heart%3F
Where Is My Heart?
Where is my Heart? is a platform video game developed by Danish studios Schulenburg Software and Die Gute Fabrik. It was released as a PlayStation mini on the PlayStation Network in North America on November 8, 2011 and Europe on November 16, 2011. On March 2, 2012, Die Gute Fabrik announced plans to release the game for Windows, macOS, and Linux in the spring of 2012, a date which was pushed back, eventually seeing the Windows and macOS versions released on May 29, 2014, with the Linux version "still on the way…". Story Where is my Heart? tells the story of a family of three monsters who find themselves lost in the forest after setting out to find their home (a tree) after it mysteriously floats away one day. Elements of familial struggle and working together are sprinkled throughout. Gameplay The game starts out as any platformer might, but soon the image breaks into frames of varying sizes, often shuffling them. The player must then try to navigate their way through the level, by piecing together where their character appears to be in any given frame, as well as collecting hearts or figuring out other puzzles that might feature in a level. The player is able to switch between one of the three monster characters at will, each of them having a special ability that can aid in solving a level. Development The idea for the game was derived from Die Gute Fabrik designer Bernhard Schulenburg's memories of being lost in the woods as a child while on a hike with his parents. The game is also an homage to platformers of the 1980s and '90s, and its story and art direction are inspired by "German fairytales, the mythical creatures of Central Europe, and Japanese pictogram aesthetics." Reception Reviews of Where is my Heart? have been generally favorable, with a Metacritic score of 81 out of 100. GameZone reviewer David Sanchez gave applause to the gameplay and art direction, proclaiming Where is my Heart? "...a wonderful experience that's both a work of art and proper homage to classic game design...one of the most genius gameplay formats seen in a platformer in a long time." Brendon Keogh of Edge praised the ingenuity in the separated frames mechanic, stating, "A less skilled developer could easily abuse such a novel device, but the restrained, careful design of Where is my Heart? ensures the game lasts just long enough to get the most out of its mechanic without succumbing to padding." Christian Donlan of Eurogamer also commended the design as "...a concept so ingenious, I'm stunned I've never seen it before." Conversely, David Wolinsky of The A.V. Club found the game interesting but somewhat repetitive, saying, "A bit one-note. It's an incredibly interesting note, but still, there isn't much variation as you work your way through all 26 levels." The major complaint of IGN's Ryan Clements was simply that the game's play-through time is too short, recommending the game with a caveat: "Play it for something a little different, even if the experience doesn't last longer than a few hours." References External links Official site Where is my Heart? developer page 2011 video games Indie video games Linux games MacOS games Network Network Network PlayStation Network games Video games developed in Denmark Windows games
421071
https://en.wikipedia.org/wiki/Apple%20Public%20Source%20License
Apple Public Source License
The Apple Public Source License (APSL) is the open-source and free software license under which Apple's Darwin operating system was released in 2000. A free and open-source software license was voluntarily adopted to further involve the community from which much of Darwin originated. The first version of the Apple Public Source License was approved by the Open Source Initiative (OSI). Version 2.0, released July 29, 2003, is also approved as a free software license by the Free Software Foundation (FSF) which finds it acceptable for developers to work on projects that are already covered by this license. However, the FSF recommends that developers should not release new projects under this license, because the partial copyleft is not compatible with the GNU General Public License and allows linking with files released entirely as proprietary software. The license does require that if any derivatives of the original source are released externally, their source should be made available; the Free Software Foundation compares this requirement to a similar one in its own GNU Affero General Public License. Many software releases from Apple have now been relicensed under the more liberal Apache License, such as the Bonjour Zeroconf stack. However, most OS component source code remains under APSL. See also Software using the Apple Public Source License (category) References External links Text of the Apple Public Source License Free Software Foundation's opinion on the license Free and open-source software licenses Permissive software licenses Apple Inc.
15185373
https://en.wikipedia.org/wiki/Facebook%20Platform
Facebook Platform
The Facebook Platform is the set of services, tools, and products provided by the social networking service Facebook for third-party developers to create their own applications and services that access data in Facebook. The current Facebook Platform was launched in 2010. The platform offers a set of programming interfaces and tools which enable developers to integrate with the open "social graph" of personal relations and other things like songs, places, and Facebook pages. Applications on facebook.com, external websites, and devices are all allowed to access the graph. History Facebook launched the Facebook Platform on May 24, 2007, providing a framework for software developers to create applications that interact with core Facebook features. A markup language called Facebook Markup Language was introduced simultaneously; it is used to customize the "look and feel" of applications that developers create. Prior to the Facebook platform, Facebook had built many applications themselves within the Facebook website, including Gifts, allowing users to send virtual gifts to each other, Marketplace, allowing users to post free classified ads, Facebook events, giving users a method of informing their friends about upcoming events, Video, letting users share homemade videos with one another, and social network game, where users can use their connections to friends to help them advance in games they are playing. The Facebook Platform made it possible for outside partners to build similar applications. Many of the popular early social network games would combine capabilities. For instance, one of the early games to reach the top application spot, (Lil) Green Patch, combined virtual Gifts with Event notifications to friends and contributions to charities through Causes. Third party companies provide application metrics, and several blogs arose in response to the clamor for Facebook applications. On July 4, 2007, Altura Ventures announced the "Altura 1 Facebook Investment Fund," becoming the world's first Facebook-only venture capital firm. On August 29, 2007, Facebook changed the way in which the popularity of applications is measured, to give attention to the more engaging applications, following criticism that ranking applications only by the number of people who had installed the application was giving an advantage to the highly viral, yet useless applications. Tech blog Valleywag has criticized Facebook Applications, labeling them a "cornucopia of uselessness." Others have called for limiting third-party applications so the Facebook user experience is not degraded. Applications that have been created on the Platform include chess, which both allow users to play games with their friends. In such games, a user's moves are saved on the website, allowing the next move to be made at any time rather than immediately after the previous move. By November 3, 2007, seven thousand applications had been developed on the Facebook Platform, with another hundred created every day. By the second annual f8 developers conference on July 23, 2008, the number of applications had grown to 33,000, and the number of registered developers had exceeded 400,000. Within a few months of launching the Facebook Platform, issues arose regarding "application spam", which involves Facebook applications "spamming" users to request it be installed. Facebook integration was announced for the Xbox 360 and Nintendo DSi on June 1, 2009 at E3. On November 18, 2009, Sony announced an integration with Facebook to deliver the first phase of a variety of new features to further connect and enhance the online social experiences of PlayStation 3. On February 2, 2010, Facebook announced the release of HipHop for PHP as an opensource project. Mark Zuckerberg said that his team from Facebook is developing a Facebook search engine. “Facebook is pretty well placed to respond to people’s questions. At some point, we will. We have a team that is working on it", said Mark Zuckerberg. For him, the traditional search engines return too many results that do not necessarily respond to questions. “The search engines really need to evolve a set of answers: 'I have a specific question, answer this question for me.'" On June 10, 2014, Facebook announced Haxl, a Haskell library that simplified the access to remote data, such as databases or web-based services. Partnerships with device manufacturers Starting in 2007, Facebook formed data sharing partnerships with at least 60 handset manufacturers, including Apple, Amazon, BlackBerry, Microsoft and Samsung. Those manufacturers were provided with Facebook user data without the users' consent. Most of the partnerships remained in place as of 2018, when the partnerships were first publicly reported. High-level Platform components Graph API The Graph API is the core of Facebook Platform, enabling developers to read from and write data into Facebook. The Graph API presents a simple, consistent view of the Facebook social graph, uniformly representing objects in the graph (e.g., people, photos, events, and pages) and the connections between them (e.g., friend relationships, shared content, and photo tags). Authentication Facebook authentication enables developers’ applications to interact with the Graph API on behalf of Facebook users, and it provides a single-sign on mechanism across web, mobile, and desktop apps. Social plugins Social plugins – including the Like Button, Recommendations, and Activity Feed – enable developers to provide social experiences to their users with just a few lines of HTML. All social plugins are extensions of Facebook and are designed so that no user data is shared with the sites on which they appear. On the other hand, the social plugins let Facebook track its users’ browsing habits through any sites that feature the plugins. Open Graph protocol The Open Graph protocol enables developers to integrate their pages into Facebook's global mapping/tracking tool Social Graph. These pages gain the functionality of other graph objects including profile links and stream updates for connected users. OpenGraph tags in HTML5 might look like this: <meta property="og:title" content="Example title of article"> <meta property="og:site_name" content="example.com website"> <meta property="og:type" content="article"> <meta property="og:url" content="http://example.com/example-title-of-article"> <meta property="og:image" content="http://example.com/article_thumbnail.jpg"> <meta property="og:image" content="http://example.com/website_logo.png"> <meta property="og:description" content="This example article is an example of OpenGraph protocol."> iframes Facebook uses iframes to allow third-party developers to create applications that are hosted separately from Facebook, but operate within a Facebook session and are accessed through a user's profile. Since iframes essentially nest independent websites within a Facebook session, their content is distinct from Facebook formatting. Facebook originally used 'Facebook Markup Language (FBML)' to allow Facebook Application developers to customize the "look and feel" of their applications, to a limited extent. FBML is a specification of how to encode content so that Facebook's servers can read and publish it, which is needed in the Facebook-specific feed so that Facebook's system can properly parse content and publish it as specified. FBML set by any application is cached by Facebook until a subsequent API call replaces it. Facebook also offers a specialized Facebook JavaScript (FBJS) library. Facebook stopped accepting new FBML applications on March 18, 2011, but continued to support existing FBML tabs and applications. Since January 1, 2012 FBML was no longer supported, and FBML no longer functioned as of June 1, 2012. Facebook Connect Facebook Connect, also called Log in with Facebook, like OpenID, is a set of authentication APIs from Facebook that developers can use to help their users connect and share with such users' Facebook friends (on and off Facebook) and increase engagement for their website or application. When so used, Facebook members can log on to third-party websites, applications, mobile devices and gaming systems with their Facebook identity and, while logged in, can connect with friends via these media and post information and updates to their Facebook profile. Originally unveiled during Facebook’s developer conference, F8, in July 2008, Log in with Facebook became generally available in December 2008. According to an article from The New York Times, "Some say the services are representative of surprising new thinking in Silicon Valley. Instead of trying to hoard information about their users, the Internet companies (including Facebook, Google, MySpace and Twitter) all share at least some of that data so people do not have to enter the same identifying information again and again on different sites." Log in with Facebook cannot be used by users in locations that cannot access Facebook, even if the third-party site is otherwise accessible from that location. According to Facebook, users who logged into The Huffington Post with Facebook spent more time on the site than the average user. Microformats In February 2011, Facebook began to use the hCalendar microformat to mark up events, and the hCard for the events' venues, enabling the extraction of details to users' own calendar or mapping applications. Mobile platform The UI framework for the mobile website is based on Xhp, the Javelin Javascript library, and WURFL. The mobile platform has grown dramatically in popularity since its launch. In December 2012, the number of users signing into the site from mobile devices exceeded web-based logins for the first time. Reception Many Facebook application developers have attempted to create viral applications. Stanford University even offered a class in the Fall of 2007, entitled Computer Science (CS) 377W: "Create Engaging Web Applications Using Metrics and Learning on Facebook". Numerous applications created by the class were highly successful, and ranked amongst the top Facebook applications, with some achieving over 3.5 million users in a month. In 2011, The Guardian expressed concerns that users publishing content through a third party provider are exposed to losing their web positioning if their service is removed; and the open graph could force connecting web presence to Facebook social services even for people using their own publishing channels. In June 2018, The New York Times criticized Facebook's partnerships with device manufacturers, writing that the data available to these manufacturers "raise concerns about the company's privacy protections and compliance with a 2011 consent decree with the Federal Trade Commission." See also Facebook features Distributed social networking software and protocols References External links Facebook Computer-related introductions in 2007 Federated identity Social media
3571085
https://en.wikipedia.org/wiki/Celtx
Celtx
Celtx () is media pre-production software, designed for creating and organizing media projects like screenplays, films, videos, stageplays, documentaries, machinima, games, and podcasts. History Celtx originates from desktop software built on open, non-proprietary standards (e.g., HTML, XML and RDF) and licensed under the Mozilla Public License version 2.0. Feature development and language translations (23+) of the application were driven largely by the feedback and volunteer efforts of members of the international Celtx community. In 2013, development, support, and distribution of the desktop software of version 2.9.7 and older was discontinued, and is no longer officially available. However, the Windows executable and macOS file of 2.9.7 were still available in June 2014. The 32-bit source code for 2.9.7 is still available for download. The 64-bit source code for 2.9.7 was available until at least August 2015. "Celtx" is an acronym for Crew, Equipment, Location, Talent and XML. Features Celtx offers several features to screenwriters and anyone involved in pre-production. Writing Celtx uses an industry standard screenwriting editor typical for screenplays and stageplays. Celtx also includes a rich text editor module for writing novels. Project collaboration, management and storage Celtx Studio offers project collaboration and online file storage. Publishing Scripts can be uploaded to the Celtx Exchange for public viewing, peer reviews and commentary. Scheduling Celtx supports creation of production calendars, stripboards, shooting schedules, and call sheets. Elements Celtx features thirty-five different elements, such as Actor or Special Effects, that can be added to the project. These elements can have various information added to them, such as media or text. Celtx allows directors and writers to tag elements within each script. These tagged elements can then be automatically transferred to a script breakdown. Pre-visualization tools Storyboarding Celtx allows people to create storyboard sequences, which can be printed or viewed using Celtx's built-in animatic playback feature. Shot Blocker The Shot Blocker tool can be used to draw a sketch or setup which can also be added to a storyboard. The Shot Blocker includes pre-loaded icons and imagery for cameras, lights and people that can be tagged with text, and tools for drawing lines, arrows, shapes and text. See also List of screenwriting software References External links Celtx Support Center Screenwriting software Software that uses XUL Software using the Mozilla license
53375072
https://en.wikipedia.org/wiki/Social%20profiling
Social profiling
Social profiling is the process of constructing a social media user's profile using his or her social data. In general, profiling refers to the data science process of generating a person's profile with computerized algorithms and technology. There are various platforms for sharing this information with the proliferation of growing popular social networks, including but not limited to LinkedIn, Google+, Facebook and Twitter. Social profile and social data A person's social data refers to the personal data that they generate either online or offline (for more information, see social data revolution). A large amount of these data, including one's language, location and interest, is shared through social media and social network. Users join multiple social media platforms and their profiles across these platforms can be linked using different methods to obtain their interests, locations, content, and friend list. Altogether, this information can be used to construct a person's social profile. Meeting the user's satisfaction level for information collection is becoming more challenging. This is because of too much "noise" generated, which affects the process of information collection due to explosively increasing online data. Social profiling is an emerging approach to overcome the challenges faced in meeting user's demands by introducing the concept of personalized search while keeping in consideration user profiles generated using social network data. A study reviews and classifies research inferring users social profile attributes from social media data as individual and group profiling. The existing techniques along with utilized data sources, the limitations, and challenges were highlighted. The prominent approaches adopted include machine learning, ontology, and fuzzy logic. Social media data from Twitter and Facebook have been used by most of the studies to infer the social attributes of users. The literature showed that user social attributes, including age, gender, home location, wellness, emotion, opinion, relation, influence are still need to be explored. Personalized meta-search engines The ever-increasing online content has resulted in the lack of proficiency of centralized search engine's results. It can no longer satisfy user's demand for information. A possible solution that would increase coverage of search results would be meta-search engines, an approach that collects information from numerous centralized search engines. A new problem thus emerges, that is too much data and too much noise is generated in the collection process. Therefore, a new technique called personalized meta-search engines was developed. It makes use of a user's profile (largely social profile) to filter the search results. A user's profile can be a combination of a number of things, including but not limited to, "a user's manual selected interests, user's search history", and personal social network data. Social media profiling According to Warren and Brandeis (1890), disclosure of private information and the misuse of it can hurt people's feelings and cause considerable damage in people's lives. Social networks provide people access to intimate online interactions; therefore, information access control, information transactions, privacy issues, connections and relationships on social media have become important research fields and are subjects of concern to the public. Ricard Fogues and other co-authors state that "any privacy mechanism has at its base an access control", that dictate "how permissions are given, what elements can be private, how access rules are defined, and so on". Current access control for social media accounts tend to still be very simplistic: there is very limited diversity in the category of relationships on for social network accounts. User's relationships to others are, on most platforms, only categorized as "friend" or "non-friend" and people may leak important information to "friends" inside their social circle but not necessarily users to they consciously want to share the information to. The below section is concerned with social media profiling and what profiling information on social media accounts can achieve. Privacy leaks A lot of information is voluntarily shared on online social networks, such as photos and updates on life activities (new job, hobbies, etc.). People rest assured that different social network accounts on different platforms will not be linked as long as they don't grant permission to these links. However, according to Diane Gan, information gathered online enables "target subjects to be identified on other social networking sites such as Foursquare, Instagram, LinkedIn, Facebook and Google+, where more personal information was leaked". The majority of social networking platforms use the "opt out approach" for their features. If users wish to protect their privacy, it is user's own responsibility to check and change the privacy settings as a number of them are set to default option. A major social network platforms have developed geo-tag functions and are in popular usage. This is concerning because 39% of users have experienced profiling hacking; 78% burglars have used major social media networks and Google Street-view to select their victims; and an astonishing 54% of burglars attempted to break into empty houses when people posted their status updates and geo-locations. Facebook Formation and maintenance of social media accounts and their relationships with other accounts are associated with various social outcomes. In 2015, for many firms, customer relationship management is essential and is partially done through Facebook. Before the emergence and prevalence of social media, customer identification was primarily based upon information that a firm could directly acquire: for example, it may be through a customer's purchasing process or voluntary act of completing a survey/loyalty program. However, the rise of social media has greatly reduced the approach of building a customer's profile/model based on available data. Marketers now increasingly seek customer information through Facebook; this may include a variety of information users disclose to all users or partial users on Facebook: name, gender, date of birth, e-mail address, sexual orientation, marital status, interests, hobbies, favorite sports team(s), favorite athlete(s), or favorite music, and more importantly, Facebook connections. However, due to the privacy policy design, acquiring true information on Facebook is no trivial task. Often, Facebook users either refuse to disclose true information (sometimes using pseudonyms) or setting information to be only visible to friends, Facebook users who "LIKE" your page are also hard to identify. To do online profiling of users and cluster users, marketers and companies can and will access the following kinds of data: gender, the IP address and city of each user through the Facebook Insight page, who "LIKED" a certain user, a page list of all the pages that a person "LIKED" (transaction data), other people that a user follow (even if it exceeds the first 500, which we usually can not see) and all the publicly shared data. Twitter First launched on the Internet in March 2006, Twitter is a platform on which users can connect and communicate with any other user in just 280 characters. Like Facebook, Twitter is also a crucial tunnel for users to leak important information, often unconsciously, but able to be accessed and collected by others. According to Rachel Numer, in a sample of 10.8 million tweets by more than 5,000 users, their posted and publicly shared information are enough to reveal a user's income range. A postdoctoral researcher from the University of Pennsylvania, Daniel Preoţiuc-Pietro and his colleagues were able to categorize 90% of users into corresponding income groups. Their existing collected data, after being fed into a machine-learning model, generated reliable predictions on the characteristics of each income group. The mobile app called Streamd.in displays live tweets on Google Maps by using geo-location details attached to the tweet, and traces the user's movement in the real world. Profiling photos on social network The advent and universality of social media networks have boosted the role of images and visual information dissemination. Many types of visual information on social media transmit messages from the author, location information and other personal information. For example, a user may post a photo of themselves in which landmarks are visible, which can enable other users to determine where they are. In a study done by Cristina Segalin, Dong Seon Cheng and Marco Cristani, they found that profiling user posts' photos can reveal personal traits such as personality and mood. In the study, convolutional neural networks (CNNs) is introduced. It builds on the main characteristics of computational aesthetics CA (emphasizing "computational methods", "human aesthetic point of view", and "the need to focus on objective approaches") defined by Hoenig (Hoenig, 2005). This tool can extract and identify content in photos. Tags In a study called "A Rule-Based Flickr Tag Recommendation System", the author suggests personalized tag recommendations, largely based on user profiles and other web resources. It has proven to be useful in many aspects: "web content indexing", "multimedia data retrieval", and enterprise Web searches. Delicious Flickr Zooomr Marketing In 2011, marketers and retailers are increasing their market presence by creating their own pages on social media, on which they post information, ask people to like and share to enter into contests, and much more. Studies in 2011 show that on average a person spends about 23 minutes on a social networking site per day. Therefore, companies from small to large ones are investing in gathering user behavior information, rating, reviews, and more. Facebook Until 2006, communications online are not content led in terms of the amount of time people spend online. However, content sharing and creating has been the primary online activity of general social media users and that has forever changed online marketing. In the book Advanced Social media Marketing, the author gives an example of how a New York wedding planner might identify his audience when marketing on Facebook. Some of these categories may include: (1) who live in the United States; (2) Who live within 50 miles of New York; (3) Age 21 and older; (4) engaged female. No matter you choose to pay cost per click or cost per impressions/views "the cost of Facebook Marketplace ads and Sponsored Stories is set by your maximum bid and the competition for the same audiences". The cost of clicks is usually $0.5–1.5 each. Tools Klout Klout is a popular online tool that focuses on assessing a user's social influence by social profiling. It takes several social media platforms (such as Facebook, Twitter etc.) and numerous aspects into account and generate a user's score from 1-100. Regardless of one's number of likes for a post, or connections on LinkedIn, social media contains plentiful personal information. Klout generates a single score that indicates a person's influence. In a study called "How Much Klout do You Have...A Test of System Generated Cues on Source Credibility" done by Chad Edwards, Klout scores can influence people's perceived credibility. As Klout Score becomes a popular combined-into-one-score method of accessing people's influence, it can be a convenient tool and a biased one at the same time. A study of how social media followers influence people's judgments done by David Westerman illustrates that possible bias that Klout may contain. In one study, participants were asked to view six identical mock Twitter pages with only one major independent variable: page followers. Result shows that pages with too many or too fewer followers would both decrease its credibility, despite of its similar content. Klout score may be subject to the same bias as well. While this is sometimes used during recruitment process, it remains to be controversial. Kred Kred not only assigns each user an influence score, but also allows each user to claim a Kred profile and Kred account. Through this platform, each user can view how top influencers engage with their online community and how each of your online action impacted your influence scores. Several suggestions that Kred is giving to the audience about increasing influence are: (1) be generous with your audience, free comfortable sharing content from your friends and tweeting others; (2) join an online community; (3) create and share meaningful content; (4) track your progress online. Follower Wonk Follower Wonk is specifically targeted towards Twitter analytics, which helps users to understand follower demographics, and optimizes your activities to find which activity attracts the most positive feedback from followers. Keyhole Keyhole is a hashtag tracking and analytics device that tracks Instagram, Twitter and Facebook hashtag data. It is a service that allows you to track which top influencer is using a certain hashtag and what are the other demographic information about the hashtag. When you enter a hashtag on its website, it will automatically randomly sample users that currently used this tag which allows user to analyze each hashtag they are interested in. Online activist social profile The prevalence of the Internet and social media has provided online activists both a new platform for activism, and the most popular tool. While online activism might stir up great controversy and trend, few people actually participate or sacrifice for relevant events. It becomes an interesting topic to analyse the profile of online activists. In a study done by Harp and his co-authors about online activist in China, Latin America and United States, the majority of online activists are males in Latin America and China with a median income of $10,000 or less, while the majority of online activist is female in United States with a median income of $30,000 - $69,999; and the education level of online activists in the United States tend to be postgraduate work/education while activists in other countries have lower education levels. A closer examination of their online shared content shows that the most shared information online include five types: To fundraise: Out of the three countries, China's activists have the most content on fundraise out of the three. To post links: Latin American activists have does the most on posting links. To promote debate or Discussion: Both Latin America's and China's activists posts more contents to promote debate or discussion than American activists do. To post information such as announcements and news: American activists post more such content than the activists from other countries. To communicate with Journalist: In this section, China's activists gets the lead. Social credit score in China The Chinese government hopes to establish a "social-credit system" that aims to score "financial creditworthiness of citizens", social behavior and even political behaviour. This system will be combining big data and social profiling technologies. According to Celia Hatton from BBC News, everyone in China will be expected to enroll in a national database that includes and automatically calculates fiscal information, political behavior, social behavior and daily life including minor traffic violations – a single score that evaluates a citizen's trustworthiness. Credibility scores, social influence scores and other comprehensive evaluations of people aren't rare in other countries. However, China's "social-credit system" remains to be controversial as this single score can be a reflection of a person's every aspect. Indeed, "much about the social-credit system remains unclear". How would companies be limited by credit score system in China? Although the implementation of social credit score remains controversial in China, Chinese government aims to fully implement this system by 2018. According to Jake Laband (the deputy director of the Beijing office of the US-China Business Council), low credit scores will "limit eligibility for financing, employment, and Party membership, as well restrict real estate transactions and travel." Social credit score will not only be affected by legal criteria, but also social criteria, such as contract breaking. However, this has been a great concern for privacy for big companies due to the huge amount of data that will be analyzed by the system. References Identity management Data mining Social networks
67531566
https://en.wikipedia.org/wiki/List%20of%20war%20films%20and%20TV%20specials%20set%20between%203050%20BC%20and%20AD%20476
List of war films and TV specials set between 3050 BC and AD 476
War depictions in film and television include documentaries, TV mini-series, and drama serials depicting aspects of historical wars, the films included here are films set in the Anacient world starting with Ancient Egypt and lasting until the fall of Western Roman Empire in about AD 476. Note: All wars are BC unless other wise noted. War of Ancient Egypt (3050 BC –332 BC) The Loves of Pharaoh (1922) Sudan (1945) The Egyptian (1954) Land of the Pharaohs (1955) The Pharaohs' Woman (1960) Nefertiti, Queen of the Nile (1961) Pharaoh (1966) Nefertiti, figlia del sole (1994) The Scorpion King (2002) Tut (2015) War of Ancient Israel (1600–400 BC) Esther (1916) The Queen of Sheba (1921) Salome (1923) The Ten Commandments (1923) Judith and Holofernes (1929) David and Bathsheba (1951) The Queen of Sheba (1952) Slaves of Babylon (1953) The Ten Commandments (1956) Solomon and Sheba (1959) Judith and Holofernes (1959) Esther and the King (1960) Moses the Lawgiver (1974) The Story of David (1976) King David (1985) Moses (1995) Solomon & Sheba (1995) One Night with the King (2006) The Ten Commandments (2007) The Book of Esther (2013) Exodus: Gods and Kings (2014) Trojan War (1193–1183 BC) The Fall of Troy (1911) Helena (1924) The Private Life of Helen of Troy (1927) Helen of Troy (1956) The Trojan Horse (1961) L'ira di Achille (1962) The Trojan Women (1971) Iphigenia (1977) Helen of Troy (2003) Troy (2004) Troy: Fall of a City (2018),TV series Wars of Ancient China (771 BC–280 AD) Spring and Autumn period (771-476 BC) The Great Revival (2007) Warring States period (476–221 BC) Qu Yuan (1977) The Emperor's Shadow (1996) The Emperor and the Assassin (1999) Hero (2002) A Battle of Wits (2006) Wheat (2009) Sacrifice (2010) Little Big Soldier (2010) The Warring States (2011) Chu–Han Contention (206–202 BC) The Great Conqueror's Concubine (1994) White Vengeance (2011) The Last Supper (2012) Legend of Chu and Han (2012) Han–Xiongnu War (133 BC–89 AD) Mulan (1998), animated film Mulan (2009) The Rise of King Modu (2013) Mulan (2020), live-action remake of 1998 animated film Wars of the Three Kingdoms (220–280 AD) Diao Chan (1938) Diao Chan (1958) Diao Chan yu Lu Bu (1967) Red Cliff (2008) Three Kingdoms: Resurrection of the Dragon (2008) Three Kingdoms (2010) The Lost Bladesman (2011) The Assassins (2012) Greco-Persian Wars (499–450 BC) La battaglia di Maratona (1959) The 300 Spartans (1962) 300 (2006) Battle of Thermopylae, Battle of Plataea Last Stand of the 300 (2007) TV documentary/reenactment which premièred on The History Channel 300: Rise of an Empire (2014) Battle of Plataea, Battle of Marathon, Battle of Artemisium, Battle of Salamis Wars of Alexander the Great (338–325 BC) Sikandar (1941) Alexander the Great (1956) Goliath e la schiava ribelle (1963) Alexander (2004), depictions of the Battles of Gaugamela and Hydaspes Young Alexander the Great (2010) Wars of the Diadochi (322–275 BC) Il Colosso di Rodi (1961) Asoka the Great's conquests (ca. 304–232 BC) Asoka (2001) Chakravartin Ashoka Samrat Wars of the Roman Republic/Empire Brennus, Enemy of Rome (1963), the first Gallic invasion of Italy Rome (TV series) (2005/2007) Augustine: The Decline of the Roman Empire (2010) TV miniseries about St Augustine set during the Vandal invasion Dragon Blade (2015) Punic Wars (264–146 BC) Cabiria (1914) Scipio Africanus: The Defeat of Hannibal (1937) Annibale (1960), the Second Punic War Carthage in Flames (1960), the Third Punic War Siege of Syracuse (1960) Hannibal (2006), TV depiction of the Second Punic War Servile Wars (135–75 BC) Sins of Rome (1953) Spartacus (1960), the Third Servile War The Slave (1962) Spartacus and the Ten Gladiators (1964) Spartacus (2010) Roman civil wars during the Late Republic (133–31 BC) Cleopatra (1917) Cleopatra (1934) Caesar and Cleopatra (1945) Julius Caesar (1950) Julius Caesar (1953) Serpent of the Nile (1953) Legions of the Nile (1959) Cleopatra (1963) Julius Caesar (1970) Antony and Cleopatra (1972) Antony and Cleopatra (1974) Antony and Cleopatra (1981) Cleopatra (1999) Rome (2005) Jewish–Roman wars (63 BC – 135 AD) Ben-Hur (1925) Salome (1953) Ben Hur (1959) King of Kings (1961) Masada (1981) Ben Hur (2016) Risen (2016) Gallic Wars (58–50 BC) Slave of Rome (1961) Caesar the Conqueror (1962) Giants of Rome (1964) Asterix animated films based on the comic book character and the Gallic Wars Druids (a.k.a. Vercingétorix) (2001), the Gallic Wars War of Roman Britain (43–410) Boudica (2003), fictionalized story of Boudicca, Queen of the Iceni of Britain and the revolt against Roman occupation. Centurion (2010), Roman ninth Legion in 2nd century Britain The Eagle (2011), Roman centurion in 2nd century Britain Britannia (2018) Dacian Wars (86–106) Dacii (1967), the Domitian's Dacian War The Column (1968), the Trajan's Dacian Wars Marcomannic Wars (167–180) The Fall of the Roman Empire (1964), the Marcomannic Wars Gladiator (2000), the Marcomannic Wars Roman civil wars during the Late Empire (306–398) Constantine and the Cross (1961), chronicle of emperor Constantine's life including the famous Battle of the Milvian Bridge Decline of an Empire (2014) War with the Huns (395–453) Attila (1954), European campaign of Attila the Hun Sign of the Pagan (1954) Attila flagello di Dio (1982) Attila (2001), TV miniseries of the European campaign of Attila the Hun Fall of the Western Roman Empire (455–476) The Last Legion (2007) Anglo-Saxon settlement of Britain (410–600) King Arthur (2004), depiction of the Battle of Mons Badonicus The Last Legion (2007) Pendragon: Sword of His Father (2008) (direct-to-video) See also List of war films and TV specials References Phoenicia in fiction Ancient Greece in fiction Ancient Egypt in fiction Ancient Rome in art and culture Israel in fiction China in fiction Trojan War films
56384658
https://en.wikipedia.org/wiki/Minetest
Minetest
Minetest is a free and open-source sandbox video game and game creation system developed by a team of volunteers, with significant contributions from the community. The first publicly available version was Minetest 0.0.1, created by Perttu Ahola, and released on the Web in November 2010. Minetest is programmed in C++ using the Irrlicht Engine, and is available for Linux-based systems, FreeBSD, Microsoft Windows, MacOS, and Android. Minetest provides an API for users to create their own games and mods written in Lua. In Minetest, players explore a blocky, procedurally-generated 3D world with seemingly infinite terrain, and may discover and extract raw materials, craft tools and items, and build structures and landscapes. Depending on game mode and mods present, players can fight computer-controlled "mobs", as well as cooperate with or compete against other players in the same world. The game mechanics of Minetest are similar to those of the 2009 game Minecraft, though the original author stopped just short of describing it as a "Minecraft clone". Over a decade of active development Minetest has garnered critical acclaim and gained in popularity; since November 2013 Minetest has been downloaded over 1.4 million times from GitHub, and the Android version of Minetest has over 500 thousand downloads on the Google Play store. Minetest has also been used in school education to teach abstract thinking and as an interactive visualization tool. Minetest is free software since November 29, 2010, allowing users to study and modify both the source code and the included art. Gameplay Minetest is a voxel sandbox video game that has no specific goals to accomplish, allowing players a large amount of freedom in choosing how to play the game. Gameplay is in the first-person perspective by default, but players have the option for third-person perspective. The game world is composed of voxels: 3D objects, many of them simple cubes, commonly called "nodes". Different voxels represent various materials, such as dirt, stone, ores, tree trunks, water, and lava. The core gameplay revolves around picking up and placing these objects, one node at a time. Nodes are arranged in a 3D grid, while players can move smoothly around the world. Players can "mine" (or "dig") blocks and then "place" (or "build") them elsewhere, enabling them to modify the game world. Players can also craft a wide variety of hand-held tools to aid them with the world modification. Pick axes allow to dig rocky nodes, shovels speed up the digging of dirt and sand, water buckets allow to pick up water nodes, etc. A player controls a 3D character known as Sam, which is a recursive acronym for "Sam ain't Minecraft". The game world is very large and appears to be infinite for many practical purposes. As players explore the world, new areas are procedurally generated, using a map seed specified by the player. A new game puts the player in the center of a voxel cube 62 thousand nodes across, so the player can travel 31 thousand nodes in any direction (sideways, up, or down) before reaching the invisible wall at the end of the world. Storing the entire voxel array of that size would require hundreds of terabytes of memory, but the game sidesteps this requirement by splitting the world data into smaller 16x16x16 sections called "map blocks" that are only created or loaded when players are nearby. The world is divided into biomes ranging from deserts to jungles to snowfields; the terrain includes plains, mountains, forests, caves, and various lava/water bodies. The in-game time system follows a day and night cycle, and one full cycle lasts 20 real-time minutes. Minetest provides two basic game mode options: Enable Damage and Creative Mode which affect how players interact with the world and use items. Creative Mode is intended to provide players with infinite resources, while toggling the damage setting determines whether the players are able to take damage from environmental hazards and other players. Multiplayer Minetest implements a client-server architecture, and can be played solo or with other people over the Internet. A player starting a new game can choose between playing in a single-player mode, or hosting a server to which other Minetest clients can connect. For hosted games, there is an option to announce them at the public server list. Alternatively, a player can browse the public server list and connect to one of the Internet servers. Many Minetest servers are run by volunteers who are not affiliated with the Minetest project, and feature wildly different rules, options, and modifications, with game modes that can be described as cooperative voxel art, player-versus-player survival, capture the flag, etc. Customizations The full source code of Minetest, and all of its artistic assets such as textures and sounds, are distributed under a variety of free licenses, making it easier to create modified versions and derivatives. The base version of Minetest provides an interface for games and mods written in Lua. Games define the basic rules of the game world, and are a core feature of Minetest. Most games feature sandbox gameplay focused on construction, mining, and creativity. Mods are used to further customize various aspects of gameplay, and are an inherent part of Minetest. Mods are server-side and work out of the box when playing on Internet servers, with no manual installation required. Players can also download texture packs to change the appearance of nodes. Games Developers refer to Minetest as an engine rather than a "game" because almost every aspect of gameplay is implemented within so-called games written in Lua. Since version 5.0.0, the main menu of the Minetest engine allows users to browse and install games from a curated list. Minetest is shipped with two games: Minetest Game implementing a feature-rich sandbox, and Development Test implementing a minimal sandbox useful for debugging. Minetest Game implements a simple and peaceful game with no goals and no built-in computer enemies. It features over 200 node types and a variety of digging tools, trees, flowers, ores, biomes, and caves. Mods There are over 1000 free and open-source mods available at Minetest forums. Since version 5.0.0, Minetest features a built-in content picker, allowing users to browse a curated list of add-ons and install mods and texture packs with a single click. Mods can be used to add node types, tools, monsters, player skins, and alter many aspects of the gameplay. Both the forums and the in-game browser exclude non-free or closed source software as a matter of policy. Development Minetest was originally released in November 2010 under a proprietary license. Shortly afterwards the license was changed to the GPL-2.0-or-later license. By agreement among major contributors, in June 2012 the project license was to be changed to LGPL-2.1-or-later, though at the time small parts still remained under the GPL-2.0-or-later license. In September 2013, the transition was complete. While LGPL-2.1-or-later remains the main license for the Minetest engine, other free and open-source licenses are used for various other parts of the latest release. Perttu Ahola was the only developer working on the project for about six months, until Ciaran Gultnieks started making code contributions in May 2011. The roster of contributors grew and changed over the years. As of July 2020, there are 9 active core developers and 15 active contributors. Core developer is considered primarily a position of trust, and they are the ones deciding what is merged into the upstream repositories, and do not necessarily contribute the most by volume. Project participants do not have set roles, but rather keep their activity within their respective areas of expertise. Perttu Ahola's role morphed over the years: whereas initially it was engine development, now it is mostly Web-hosting and administration, assigning core developer, moderator, and other roles to people, as well as being the final word in cases where other developers are unable to render a decision. Usage in education Minetest has been used in educational environments to teach subjects such as mathematics, programming, and earth sciences. Its advantages over similar commercial titles include zero cost, allowing for massive deployments in a classroom or a research setting. Also, Minetest's graphics engine, while not fully optimized for the most recent hardware, performs very well on a wide range of low-cost, low-end hardware. Minetest was used as a co-design tool for teaching children who can not attend in person sessions. Minetest was used for teaching logic, creating, and debugging to primary and secondary students. In 2017 in France, Minetest was used to teach calculus and trigonometry. At Federal University of Santa Catarina in Brazil, Minetest was used to teach programming in a variant called MineScratch. In 2018, for Laboratory Education and Apprenticeships (EDA) at the Paris Descartes University, Minetest was used to teach life and earth sciences to year 6 students who could not observe some phenomena in person but could experience them in the Minetest virtual world. Reception Opensource.com listed Minetest at #1 in its "Best open source games of 2015", stating that it is maybe "the most complete alternative to Minecraft", and noted its expansibility, stating that it contains a user-friendly API for creating mods in Lua. PC Magazine listed Minetest among "The best Sandbox Creation Games for Minecraft Fans". See also Free and open source software List of open-source video games Linux gaming Minecraft References Survival video games Linux games Windows games Android (operating system) games Multiplayer online games Open-source video games Open-world video games Free and open-source software Free and open-source Android software MacOS games Multiplayer and single-player video games Video games developed in Finland 2010 video games Minecraft clones
33976548
https://en.wikipedia.org/wiki/I.TV
I.TV
i.TV (pronounced i dot TV) is a second screen and social television technology company, and creator of tvtag, a second screen app for iPhone. i.TV is also behind the popular namesake app for iOS and Android, and is co-creator of Nintendo TVii for the Nintendo Wii U video game console. i.TV has standing partnerships with AOL, Huffington Post and Entertainment Weekly magazine (EW), for which it powered viEWer, a social television platform that enabled television viewers to interact with each other and EW editors, and product integration agreements with TiVo, Netflix, Hulu, and Comcast. i.TV's financial backers include venture capital firms Union Square Ventures (backer of Twitter, Tumblr and other companies), RRE Ventures, Rho Ventures, Time Warner Investments, DIRECTV, and others. i.TV's advisory board includes Carlton Cuse, executive producer of ABC's Lost and A&E's Bates Motel, who in 2010 was named to the Time 100, an annual list of the "100 most influential people in the world"; and Gordon Ho, former executive vice president of Walt Disney Studios Home Entertainment. History i.TV was founded in 2008 by Brad Pelo, who serves as CEO, and Justin Whittaker. Pelo previously co-founded Folio Corporation and served as founding CEO of the parent company of Ancestry.com, among other ventures and projects. In May 2011 i.TV and AOL together re-launched AOL's online destination for TV viewers, AOL TV, based on i.TV's technology platform. AOL TV receives 1.6 million hits per day. In November 2013 i.TV acquired GetGlue, maker of a leading second screen and social TV check-in platform. Headquartered in New York City, GetGlue reportedly has over 4.5 million registered users. In January 2014 i.TV launched tvtag, a second screen iPhone app that provides a feed of television moments that users can then share, doodle on and comment on in a variety of ways. These moments in a “tagline” are captured and curated by a team of 50 staffers. A year later, tvtag was shut down. References External links Software companies based in Utah Social software IOS software Android (operating system) software Software companies established in 2008 Defunct software companies of the United States 2008 establishments in Utah Software companies disestablished in 2015 2015 disestablishments in Utah
2273418
https://en.wikipedia.org/wiki/The%20Unix%20Programming%20Environment
The Unix Programming Environment
The Unix Programming Environment, first published in 1984 by Prentice Hall, is a book written by Brian W. Kernighan and Rob Pike, both of Bell Labs and considered an important and early document of the Unix operating system. Unix philosophy The book addresses the Unix philosophy of small cooperating tools with standardized inputs and outputs. Kernighan and Pike gives a brief description of the Unix design and the Unix philosophy: The authors further write that their goal for this book is "to communicate the UNIX programming philosophy." Content and topics The book starts off with an introduction to Unix for beginners. Next, it goes into the basics of the file system and shell. The reader is led through topics ranging from the use of filters, to how to use C for programming robust Unix applications, and the basics of grep, sed, make, and awk. The book closes with a tutorial on making a programming language parser with yacc and how to use troff with ms and mm to format documents, the preprocessors tbl, eqn, and pic, and making man pages with the man macro set. The appendices cover the ed editor and the abovementioned programming language, named hoc, which stands for "high-order calculator". Historical context Although Unix still exists decades after the publication of this book, the book describes an already mature Unix: In 1984, Unix had already been in development for 15 years (since 1969), it had been published in a peer-reviewed journal 10 years earlier (SOSP, 1974, "The UNIX Timesharing System"), and at least seven official editions of its manuals had been published (see Version 7 Unix). In 1984, several commercial and academic variants of UNIX already existed (e.g., Xenix, SunOS, BSD, UNIX System V, HP-UX), and a year earlier Dennis Ritchie and Ken Thompson won the prestigious Turing Award for their work on UNIX. The book was written not when UNIX was just starting out, but when it was already popular enough to be worthy of a book published for the masses of new users that were coming in. In retrospect, not only was 1984 not an early stage of Unix's evolution, in some respects it was the end of Unix evolution, at least in Bell Labs: The important UNIX variants had already forked from AT&T's Research Unix earlier: System V was published in 1983, BSD was based on the 1979 Seventh Edition Unix – and most commercial Unix variants were based on System V, BSD, or some combination of both. Eighth Edition Unix came out right after this book, and further development of UNIX in Bell Labs (the Ninth and Tenth Edition) never made it outside Bell Labs – until their effort evolved into Plan 9 from Bell Labs. C programming style The book was written before ANSI C was first drafted; the programs in it follow the older K&R style. However, the source code available on the book's website has been updated for ANSI C conformance. Critical reception Technical editor Ben Everard for Linux Voice praised the book for providing relevant documentation despite being 30 years old and for being a good book for an aspiring programmer who does not know much about Linux. Editions (paperback) (hardback). Notes 1984 non-fiction books Computer programming books Software engineering books Unix books Prentice Hall books
9053231
https://en.wikipedia.org/wiki/Functional%20specification
Functional specification
A functional specification (also, functional spec, specs, functional specifications document (FSD), functional requirements specification) in systems engineering and software development is a document that specifies the functions that a system or component must perform (often part of a requirements specification) (ISO/IEC/IEEE 24765-2010). The documentation typically describes what is needed by the system user as well as requested properties of inputs and outputs (e.g. of the software system). A functional specification is the more technical response to a matching requirements document, e.g. the Product Requirements Document "PRD". Thus it picks up the results of the requirements analysis stage. On more complex systems multiple levels of functional specifications will typically nest to each other, e.g. on the system level, on the module level and on the level of technical details. Overview A functional specification does not define the inner workings of the proposed system; it does not include the specification of how the system function will be implemented. Instead, it focuses on what various outside agents (people using the program, computer peripherals, or other computers, for example) might "observe" when interacting with the system. A functional requirement in a functional specification might state as follows: When the user clicks the OK button, the dialog is closed and the focus is returned to the main window in the state it was in before this dialog was displayed. Such a requirement describes an interaction between an external agent (the user) and the software system. When the user provides input to the system by clicking the OK button, the program responds (or should respond) by closing the dialog window containing the OK button. Functional specification topics Purpose There are many purposes for functional specifications. One of the primary purposes on team projects is to achieve some form of team consensus on what the program is to achieve before making the more time-consuming effort of writing source code and test cases, followed by a period of debugging. Typically, such consensus is reached after one or more reviews by the stakeholders on the project at hand after having negotiated a cost-effective way to achieve the requirements the software needs to fulfill. To let the developers know what to build. To let the testers know what tests to run. To let stakeholders know what they are getting. Process In the ordered industrial software engineering life-cycle (waterfall model), functional specification describes what has to be implemented. The next, Systems architecture document describes how the functions will be realized using a chosen software environment. In non industrial, prototypical systems development, functional specifications are typically written after or as part of requirements analysis. When the team agrees that functional specification consensus is reached, the functional spec is typically declared "complete" or "signed off". After this, typically the software development and testing team write source code and test cases using the functional specification as the reference. While testing is performed, the behavior of the program is compared against the expected behavior as defined in the functional specification. Methods One popular method of writing a functional specification document involves drawing or rendering either simple wire frames or accurate, graphically designed UI screenshots. After this has been completed, and the screen examples are approved by all stakeholders, graphical elements can be numbered and written instructions can be added for each number on the screen example. For example, a login screen can have the username field labeled '1' and password field labeled '2,' and then each number can be declared in writing, for use by software engineers and later for beta testing purposes to ensure that functionality is as intended. The benefit of this method is that countless additional details can be attached to the screen examples. Examples of functional specifications Advanced Microcontroller Bus Architecture Extensible Firmware Interface Multiboot Specification Real-time specification for Java Single UNIX Specification Types of software development specifications Bit specification (disambiguation) Design specification Diagnostic design specification Product design specification Software Requirements Specification See also Benchmarking Software development process Specification (technical standard) Verification and Validation (software) References External links Painless Functional Specifications, 4-part series by Joel Spolsky Systems engineering Software documentation Software design bs:Specifikacija programa de:Pflichtenheft hr:Specifikacija programa pt:Especificação de programa
2507344
https://en.wikipedia.org/wiki/31-bit%20computing
31-bit computing
In computer architecture, 31-bit integers, memory addresses, or other data units are those that are 31 bits wide. In 1983, IBM introduced 31-bit addressing in the System/370-XA mainframe architecture as an upgrade to the 24-bit physical and virtual, and transitional 24-bit-virtual/26-bit physical, addressing of earlier models. This enhancement allowed address spaces to be 128 times larger, permitting programs to address memory above 16 MB (referred to as "above the line"). Support for COBOL, FORTRAN and later on Linux/390 were included. In the early 1980s, the Motorola 68012 was introduced; it had 32-bit data and address registers, as the Motorola 68010 did, but instead of providing the lower 24 bits of an address on the address pins, it provided all but bit 30 on the address pins. 31-bit IBM mainframes Architecture In the System/360, other than the 360/67, and early System/370 architectures, the general purpose registers were 32 bits wide, the machine did 32-bit arithmetic operations, and addresses were always stored in 32-bit words, so the architecture was considered 32-bit, but the machines ignored the top 8 bits of the address resulting in 24-bit addressing. With the XA extension, only the high order bit (bit 0) in the word was ignored for addressing. An exception is that mode-switching instructions also used bit 0. There were at least two reasons that IBM did not implement the 32-bit addressing of the 360/67 The loop control instructions BXH and BXLE did signed comparisons. Much of the existing software used bit 0 as an end-of-list indicator. Transition The transition was tricky: assembly language programmers, including IBM's own operating systems architects and developers, had been using the spare byte at the top of addresses for flags for almost twenty years. IBM chose to provide two forms of addressing to minimize the pain: if the most significant bit (bit 0) of a 32-bit address was on, the next 31 bits were interpreted as the virtual address. If the most significant bit was off, then only the lower 24 bits were treated as the virtual address (just as with pre-XA systems). Thus programs could continue using the seven low-order bits of the top byte for other purposes as long as they left the top bit off. The only programs requiring modification were those that set the top (leftmost) bit of a word containing an address. This also affected address comparisons: The leftmost bit of a word is also interpreted as a sign-bit in 2's complement arithmetic, indicating a negative number if bit 0 is on. Programs that use signed arithmetic comparison instructions could get reversed results. Two equivalent addresses could be compared as non-equal if one of them had the sign bit turned on even if the remaining bits were identical. Most of this was invisible to programmers using high-level languages like COBOL or FORTRAN, and IBM aided the transition with dual mode hardware for a period of time. Certain machine instructions in this 31-bit addressing mode alter the addressing mode bit as a possibly intentional side effect. For example, the original subroutine call instructions BAL, Branch and Link, and its register-register equivalent, BALR, Branch and Link Register, store certain status information, the instruction length code, the condition code and the program mask, in the top byte of the return address. A BAS, Branch and Save, instruction was added to allow 31-bit return addresses. BAS, and its register-register equivalent, BASR, Branch and Save Register, was part of the instruction set of the System/360 Model 67, which was the only System/360 model to allow addresses longer than 24 bits. These instructions were maintained, but were modified and extended for 31-bit addressing. Additional instructions in support of 24/31-bit addressing include two new register-register call/return instructions which also effect an addressing mode change (e.g. Branch and Save and Set Mode, BASSM, the 24/31 bit version of a call where the linkage address including the mode is saved and a branch is taken to an address in a possibly different mode, and BSM, Branch and Set Mode, the 24/31 bit version of a return, where the return is directly to the previously saved linkage address and in its previous mode). Taken together, BASSM and BSM allow 24-bit calls to 31-bit (and return to 24-bit), 31-bit calls to 24-bit (and return to 31-bit), 24-bit calls to 24-bit (and return to 24-bit) and 31-bit calls to 31-bit (and return to 31-bit). Like BALR 14,15 (the 24-bit-only form of a call), BASSM is used as BASSM 14,15, where the linkage address and mode are saved in register 14, and a branch is taken to the subroutine address and mode specified in register 15. Somewhat similarly to BCR 15,14 (the 24-bit-only form of an unconditional return), BSM is used as BSM 0,14, where 0 indicates that the current mode is not saved (the program is leaving the subroutine, anyway), and a return to the caller at the address and mode specified in register 14 is to be taken. Refer to IBM publication MVS/Extended Architecture System Programming Library: 31-Bit Addressing, GC28-1158-1, for extensive examples of the use of BAS, BASR, BASSM and BSM, in particular, pp. 29–30. ESA/370 architecture In the 1990s IBM introduced Enterprise System Architecture/370 (ESA/370) architecture (later extended to ESA/390 or System/390, in short S/390), completing the evolution to full 31-bit virtual addressing and keeping this addressing mode flag. These later architectures allow more than 2 GB of physical memory and allow multiple concurrent address spaces up to 2 GB each in size. As of mid-2006 there were too many programs unduly constrained by this multiple 31-bit addressing mode. z/Architecture IBM broke the 2 GB linear addressing barrier ("the bar") in 2000 with the introduction of the first 64-bit z/Architecture system, the IBM zSeries Model 900. Unlike the XA transition, z/Architecture does not reserve a top bit to identify earlier code. z/Architecture maintains compatibility with 24-bit and 31-bit code, even older code running concurrently with newer 64-bit code. Linux/390 Since Linux/390 was first released for the existing 32-bit data/31-bit addressing hardware in 1999, initial mainframe Linux applications compiled in pre-z/Architecture mode are also limited to 31-bit addressing. This limitation disappeared with 64-bit hardware, 64-bit Linux on IBM Z, and 64-bit Linux applications. The 64-bit Linux distributions still run 32-bit data/31-bit addressing programs. IBM's 31-bit addressing allows 31-bit code to make use of additional memory. However, at any one instant, a maximum of 2 GB is in each working address space. For non-64-bit Linux on processors with 31-bit addressing, it is possible to assign memory above the 2 GB bar as a RAM disk. 31-bit Linux kernel (not user-space) support was removed in version 4.1. Ruby & Smalltalk Interpreters for Ruby & Smalltalk languages use the lowest bit to tell whether a value is an unboxed integer or not. This means that on 32-bit machines (or 16-bit machines with 32-bit pointers), 31-bit integers are unboxed. In case of overflow, the result is fit into a boxed object, which means that it has to be allocated and garbage-collected. Thus if you have 32-bit values that don't fit in the 31-bit signed format, they will be very inefficient in those interpreters. Same goes with 63-bit unboxed integers on 64-bit computers. Similar designs may be found in LISP and some of the other languages whose variables can take values of any type. In some cases, there was hardware support for this kind of design: see Tagged architecture and Lisp machine. References Data unit
53741333
https://en.wikipedia.org/wiki/Citrix%20ADC
Citrix ADC
Citrix ADC is a line of networking products owned by Citrix Systems. The products consist of Citrix ADC, an application delivery controller (ADC), NetScaler AppFirewall, an application firewall, NetScaler Unified Gateway, NetScaler Management & Analytics System, and NetScaler SD-WAN, which provides software-defined wide-area networking management. NetScaler was initially developed in 1997 by Michel K Susai and acquired by Citrix in 2005. Citrix consolidated all of its networking products under the NetScaler brand in 2016. Overview The NetScaler line of products are part of Citrix Systems' networking business. It includes NetScaler ADCs, NetScaler Unified Gateway, NetScaler AppFirewall, NetScaler SD-WAN, and NetScaler Management & Analytics System. The products can work in conjunction with other Citrix offerings, including its Xen line of products. NetScaler is integrated with OpenStack as part of Citrix Systems' sponsorship of the Openstack Foundation. Products Citrix ADC is Citrix Systems' core networking product. It is an application delivery controller (ADC), a tool that improves the delivery speed and quality of applications to an end user. The product is aimed at business customers and it performs tasks such as traffic optimization, L4-L7 load balancing, and web app acceleration while maintaining data security. Citrix ADC monitors server health and allocates network and application traffic to additional servers for efficient use of resources. It also performs several kinds of caching and compression. It can be made a server proxy, process SSL requests, and offers VPN and micro-app VPN operations. It also includes NetScaler application firewall and SSL encryption capabilities. NetScaler ADC can manage traffic during DDoS attacks, making sure traffic gets to critical applications. Additionally, Netscaler's logs of network activity feed into Citrix's cloud-based analytics service and are used to analyze and identify security risks. There are four versions of Citrix ADC: NetScaler MPX, a hardware-based appliance for use in data centers; NetScaler SDX, a hardware-based appliance intended for service providers that provides virtualization delivering multitenancy for virtual and cloud-based data centers; NetScaler VPX, a software-based application that is implemented as a virtual machine and intended for small business use; and NetScaler CPX, a NetScaler ADC packaged in a container and designed for cloud and microservices applications. In addition, the NetScaler line of products include Citrix SD-WAN, formerly CloudBridge SD-WAN, which provides software-defined wide-area networking and branch networking. NetScaler Unified Gateway offers secure remote access of virtual desktops and a variety applications from a single point of entry and with single sign-on (SSO). The NetScaler Management and Analytics System is a platform designed for the organization and automation of policy management across devices and applications. The tool is intended for IT professionals to manage the various NetScaler products from a single dashboard. The platform also provides real-time analytics. History Entrepreneur Michel K. Susai founded NetScaler in 1997 in San Jose, California. He created NetScaler as a solution for reducing infrastructure during the growth of the Internet in the late 1990s. The company repositioned NetScaler as a security and optimization tool in 2001. By 2005, NetScaler estimated 75 percent of Internet users used its systems through clients including Google and Amazon. Citrix acquired NetScaler in 2005 for approximately $300 million in cash and stock. Citrix released NetScaler MPX, a faster and more power efficient NetScaler ADC model, in 2008. It introduced the VPX edition the following year. In 2011, Citrix launched NetScaler SDX. In 2016, Citrix transitioned all of its delivery products under the NetScaler brand. Citrix CloudBridge SD-WAN became NetScaler SD-WAN. The company also introduced “NetScaler Management and Analytics System”, a console for users to manage all NetScaler products, including the ADCs and SD-WAN, and a containerized version of NetScaler called NetScaler CPX. Citrix released a free developer version of NetScaler CPX called NetScaler CPX Express in August 2016. Reception Reviewing NetScaler ADC in 2007, InfoWorld gave it a score of 8.6 out of 10. The reviewer noted that it was easy to set up and administer, and provided performance improvements in load balancing and Web application speed. However, there were variable results with features such as TCP session buffering and TCP session consolidation, as these would depend on other factors. As well, InfoWorld said that NetScaler is best suited for "organizations making corporate applications available over the Web for internal or external customers" and "large, heavily trafficked Web sites" but was more costly than other available solutions for a "small, three-node Web farm that will be lightly loaded". GCN wrote in 2011 that NetScaler is "much more than a load balancer; it’s really an all-in-one Web application delivery system". The site gave NetScaler an A+ rating for features, B- for ease of use, A+ for performance and a C for value. The same article noted that it was difficult to learn and expensive. , annual net revenue from sales of NetScaler products and services was . References External links Citrix Systems Load balancing (computing) Cloud applications Servers (computing) Networking hardware Network management Configuration management
1651366
https://en.wikipedia.org/wiki/Private%20peer-to-peer
Private peer-to-peer
Private peer-to-peer (P2P) systems are peer-to-peer (P2P) systems that allow only mutually trusted peers to participate. This can be achieved by using a central server such as a Direct Connect hub to authenticate clients. Alternatively, users can exchange passwords or cryptographic keys with friends to form a decentralized network. Private peer-to-peer systems can be divided into friend-to-friend (F2F) and group-based systems. Friend-to-friend systems only allow connections between users who know one another, but may also provide automatic anonymous forwarding. Group-based systems allow any user to connect to any other, and thus they cannot grow in size without compromising their users' privacy. Some software, such as WASTE, can be configured to create either group-based or F2F networks. Software list Direct Connect - file sharing and chat using private hubs GigaTribe - a private community-oriented file-sharing program Retroshare - a private F2F system based on PGP, implementing Turtle F2F file sharing. n2n - a peer-to-peer VPN software The following software titles have been discontinued. Infinit - file sharing app with local encryption based on research made at the University of Cambridge. Madster (formerly Aimster) - early P2P software that used a buddy list to restrict sharing Groove - a corporate groupware software based on P2P technology Turtle F2F - instant messaging and file sharing with private connections only WASTE - private P2P software suitable for groups of 10 to 50 users See also Friend-to-friend Darknet LAN messenger Social VPN References How to disappear completely: A survey of private peer-to-peer networks. SPACE 2007 workshop, July 2007. Comparison of P2P file sharing tools for LAN parties. File sharing Peer-to-peer
1570885
https://en.wikipedia.org/wiki/Meanings%20of%20minor%20planet%20names%3A%2028001%E2%80%9329000
Meanings of minor planet names: 28001–29000
28001–28100 |-id=004 | 28004 Terakawa || 1997 XA || Syoji Terakawa, expert mirror polisher. || |-id=007 | 28007 Galhassin || || GAL Hassin is an International Center for Astronomy in Isnello (Sicily, Italy) undertaking science education and outreach activities, along with advanced astronomical research. The latter will be implemented with the upcoming 1-meter Wide-field Mufara Telescope (WMT). This facility will be mostly devoted to NEO observations. || |-id=019 | 28019 Warchal || || Bohdan Warchal (1930–2000), Slovak violinist, conductor and educator, member of the Slovak Philharmonic Orchestra and chief conductor and soloist of the Slovak Chamber Orchestra || |-id=037 | 28037 Williammonts || || William Lowell Monts (born 1997) is a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students, for his physical sciences project. || |-id=038 | 28038 Nicoleodzer || || Nicole Brooke Odzer (born 1998) is a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students, for her environmental sciences project. || |-id=039 | 28039 Mauraoei || || Maura Clare Oei (born 1998) is a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students, for her engineering project. || |-id=042 | 28042 Mayapatel || || Maya Mona Patel (born 1998) is a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students, for her earth and space sciences project. || |-id=043 | 28043 Mabelwheeler || || Mabel Elizabeth Wheeler (born 2000) is a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students, for her physical sciences project. She attends the Cherry Hill Elementary School, Orem, Utah || |-id=045 | 28045 Johnwilkins || || John C. Wilkins (born 2000) is a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students, for his earth and space sciences project. || |-id=048 | 28048 Camilleyoke || || Camille Virginia Yoke (born 1998) is a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students, for her physical sciences project. || |-id=049 | 28049 Yvonnealex || || Yvonne Alexander mentored a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students. || |-id=050 | 28050 Asekomeh || || Demetrius Asekomeh mentored a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students. || |-id=051 | 28051 Bruzzone || || Juan Sebastian Bruzzone (born 1981) is a Uruguayan Postdoctoral Researcher at the NASA Goddard Space Flight Center. He specializes in the study of meteors, meteoroids, debris disks and planetary systems, including developments in processing of radar, polarimetric and optical observations of meteors. || |-id=059 | 28059 Kiliaan || || Cornelis Kiliaan, 16th-century Flemish linguist || |-id=068 | 28068 Stephbillings || || Stephanie Billings mentored a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students. || |-id=072 | 28072 Lindbowerman || || Lindsay Bowerman mentored a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students. || |-id=073 | 28073 Fohner || || Nancy Fohner mentored a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students. || |-id=074 | 28074 Matgallagher || || Matthew Gallagher mentored a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students. || |-id=075 | 28075 Emilyhoffman || || Emily Hoffman mentored a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students. || |-id=077 | 28077 Hard || || Michael W. Hard (born 1937) is a long-time friend of Lowell Observatory who has championed the Observatory in many ways. He had a 39-year senior executive career in banking in Arizona and served as a trustee on two foundation boards of directors. Michael was also very active in the community after retirement. || |-id=078 | 28078 Mauricehilleman || || Maurice Hilleman, American microbiologist who developed 8 of the 14 most common vaccines in use today. || |-id=081 | 28081 Carriehudson || || Carrie Hudson mentored a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students. || |-id=091 | 28091 Mikekane || || Michael Kane mentored a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students. || |-id=092 | 28092 Joannekear || || Joanne Kear mentored a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students. || |-id=093 | 28093 Staceylevoit || || Stacey Levoit mentored a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students. || |-id=094 | 28094 Michellewis || || Michelle Lewis mentored a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students. || |-id=095 | 28095 Seanmahoney || || Sean Mahoney mentored a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students. || |-id=096 | 28096 Kathrynmarsh || || Kathryn Marsh mentored a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students. || |} 28101–28200 |-id=103 | 28103 Benmcpheron || || Ben McPheron mentored a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students. || |-id=105 | 28105 Santallo || || Roland Santallo (born 1943), an amateur astronomer observing from Tahiti. || |-id=107 | 28107 Sapar || || Arved-Ervin Sapar (born 1933) carried out pioneering studies of cosmology in Tartu, Estonia. He took into account the photon and neutrino background in cosmological equations. His contribution to modelling of stellar atmospheres has found acknowledgement among the astronomical community || |-id=108 | 28108 Sydneybarnes || || Sydney Barnes (born 1967), an assistant astronomer at Lowell Observatory, enjoys working at the interface between theory and observations, particularly on topics related to the global properties of stars, and their changes with stellar age || |-id=125 | 28125 Juliomiguez || || Julio Miguez mentored a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students. || |-id=126 | 28126 Nydegger || || Jason Nydegger mentored a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students. || |-id=127 | 28127 Ogden-Stenerson || || Carolyn Ogden-Stenerson mentored a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students. || |-id=128 | 28128 Cynthrossman || || Cynthia Rossman mentored a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students || |-id=129 | 28129 Teresummers || || Teresa Summers mentored a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students || |-id=130 | 28130 Troemper || || Brett Troemper mentored a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students. || |-id=131 | 28131 Dougwelch || || Doug Welch mentored a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students. || |-id=132 | 28132 Karenzobel || || Karen Zobel mentored a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students. || |-id=133 | 28133 Kylebardwell || || Kyle Thomas Bardwell (born 1993) was awarded first place in the 2011 Intel International Science and Engineering Fair for his animal sciences project. || |-id=136 | 28136 Chasegross || || Chase Carter Gross (born 1995) was awarded second place in the 2011 Intel International Science and Engineering Fair for his animal sciences project. || |-id=137 | 28137 Helenyao || || Helen Yao (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for her animal sciences project. || |-id=141 | 28141 ten Brummelaar || 1998 TC || Theo ten Brummelaar (born 1962) is an Australian-American astronomer at the Georgia State University. He is the Director of the CHARA Array and a leader in the development of the use of optical interferometry throughout the astronomical community. || |-id=151 | 28151 Markknopfler || || Mark Knopfler (born 1949), a Scottish composer, guitarist and singer, who founded Dire Straits in 1977. || |-id=155 | 28155 Chengzhendai || || Chengzhen Li Dai (born 1994) was awarded second place in the 2011 Intel International Science and Engineering Fair for his animal sciences project. || |-id=156 | 28156 McColl || || Adrienne Brooke McColl (born 1993) was awarded best of category and first place in the 2011 Intel International Science and Engineering Fair for her animal sciences project. || |-id=159 | 28159 Giuricich || || Alessio Pio Giuricich (born 1994) was awarded second place in the 2011 Intel International Science and Engineering Fair for his behavioral and social sciences project. He attends the Bishops Diocesan College, Cape Town, Western Cape, South Africa || |-id=161 | 28161 Neelpatel || || Neel Sanjay Patel (born 1994) was awarded second place in the 2011 Intel International Science and Engineering Fair for his behavioral and social sciences project. || |-id=163 | 28163 Lorikim || || Lori Kim (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for her behavioral and social sciences project. || |-id=165 | 28165 Bayanmashat || || Bayan Mohammed Mashat (born 1995) was awarded first place in the 2011 Intel International Science and Engineering Fair for her behavioral and social sciences project. || |-id=167 | 28167 Andrewkim || || Andrew Wooyoung Kim (born 1993) was awarded best of category and first place in the 2011 Intel International Science and Engineering Fair for his behavioral and social sciences project. || |-id=168 | 28168 Evanolin || || Evan Daniel Olin (born 1994) was awarded second place in the 2011 Intel International Science and Engineering Fair for his behavioral and social sciences team project. || |-id=169 | 28169 Cathconte || || Catherine Marie Conte (born 1995) was awarded second place in the 2011 Intel International Science and Engineering Fair for her behavioral and social sciences team project. || |-id=171 | 28171 Diannahu || || Dianna Hu (born 1993) was awarded best of category and first place in the 2011 Intel International Science and Engineering Fair for her biochemistry project. || |-id=173 | 28173 Hisakichi || || Hisakichi Sato (1902–1989), the discoverer's father || |-id=174 | 28174 Harue || || Harue Sato (1909–2001), the discoverer's mother || |-id=182 | 28182 Chadharris || || Chad Lawrence Harris (born 1992) was awarded second place in the 2011 Intel International Science and Engineering Fair for his biochemistry project. || |-id=183 | 28183 Naidu || || Yamini T. Naidu (born 1995) was awarded first place in the 2011 Intel International Science and Engineering Fair for her biochemistry project. || |-id=184 | 28184 Vaishnavirao || || Vaishnavi Lakshminarasimha Rao (born 1995) was awarded second place in the 2011 Intel International Science and Engineering Fair for her biochemistry project. || |-id=196 | 28196 Szeged || || Szeged, Hungary † || |} 28201–28300 |- | 28201 Lifubin || || Li Fubin (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for his biochemistry team project. || |-id=204 | 28204 Liyakang || || Li Yakang (born 1992) was awarded second place in the 2011 Intel International Science and Engineering Fair for his biochemistry team project. || |-id=206 | 28206 Haozhongning || || Hao Zhongning (born 1995) was awarded second place in the 2011 Intel International Science and Engineering Fair for his biochemistry team project. || |-id=207 | 28207 Blakesmith || || Blake Edward Smith (born 1994) was awarded first place in the 2011 Intel International Science and Engineering Fair for his cellular and molecular biology project. || |-id=208 | 28208 Timtrippel || || Timothy D. Trippel (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for his cellular and molecular biology project. || |-id=209 | 28209 Chatterjee || || Ishan Chatterjee (born 1994) was awarded second place in the 2011 Intel International Science and Engineering Fair for his cellular and molecular biology project. || |-id=210 | 28210 Howardfeng || || Howard Feng (born 1995) was awarded second place in the 2011 Intel International Science and Engineering Fair for his cellular and molecular biology project. || |-id=220 | 28220 York || || York, UK † || |-id=222 | 28222 Neilpathak || || Neil Pathak (born 1992) was awarded second place in the 2011 Intel International Science and Engineering Fair for his chemistry project. || |-id=235 | 28235 Kasparvonbraun || || Kaspar von Braun (born 1971) is a German astronomer at the Lowell Observatory. His research interests in optical interferometry, stellar fundamental properties, and precision photometry guide his work in characterizing extrasolar planets. || |-id=242 | 28242 Mingantu || || Ming Antu (1692–c. 1765), a Chinese astronomer and mathematician of the Qing Dynasty. || |-id=245 | 28245 Cruise || || Sallie Cruise (born 1958) is a singer, musician and philanthropist from Hobart, Australia. Her stalwart support of the arts and literature have improved the communities around her. || |-id=248 | 28248 Barthelemy || || Pierre Barthélémy (born 1967), a French scientific journalist working mainly for Le Monde. || |-id=251 | 28251 Gerbaldi || || Michele Gerbaldi (born 1944), a French astronomer specializing in stellar astrophysics. || |-id=254 | 28254 Raghrama || || Raghavendra Ramachanderan (born 1994) was awarded best of category and first place in the 2011 Intel International Science and Engineering Fair for his chemistry project. || |-id=272 | 28272 Mikejanner || || Michael Leonard Janner (born 1996) was awarded second place in the 2011 Intel International Science and Engineering Fair for his chemistry project. || |-id=273 | 28273 Maianhvu || || Mai-Anh N. Vu (born 1995) was awarded first place in the 2011 Intel International Science and Engineering Fair for her chemistry team project. || |-id=275 | 28275 Quoc-Bao || || Quoc-Bao Duy Nguyen (born 1994) was awarded first place in the 2011 Intel International Science and Engineering Fair for his chemistry team project. || |-id=276 | 28276 Filipnaiser || || Filip Naiser (born 1992) was awarded second place in the 2011 Intel International Science and Engineering Fair for his computer science project. || |-id=277 | 28277 Chengherngyi || || Cheng Yi Herng (born 1993) was awarded first place in the 2011 Intel International Science and Engineering Fair for his computer science project. || |-id=287 | 28287 Osmanov || || Gadzhi Shamil'evich Osmanov (born 1994) was awarded second place in the 2011 Intel International Science and Engineering Fair for his computer science project. || |-id=295 | 28295 Heyizheng || || Gadzhi Shamil'evich Osmanov (born 1994) was awarded second place in the 2011 Intel International Science and Engineering Fair for his computer science project. || |-id=299 | 28299 Kanghaoyan || || Kang Haoyan (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for his computer science team project. || |} 28301–28400 |-id=305 | 28305 Wangjiayi || || Wang Jiayi (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for her computer science team project. || |-id=309 | 28309 Ericfein || || Eric E. Fein (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for his earth and planetary science project. || |-id=317 | 28317 Aislinndeely || || Aislinn Deely (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for her earth and planetary science project. || |-id=318 | 28318 Janecox || || Jane M. Cox (born 1994) was awarded best of category and first place in the 2011 Intel International Science and Engineering Fair for her earth and planetary science project. || |-id=321 | 28321 Arnabdey || || Arnab Dey (born 1994) was awarded second place in the 2011 Intel International Science and Engineering Fair for his electrical and mechanical engineering project. || |-id=322 | 28322 Kaeberich || || Jan Kaeberich (born 1992) was awarded second place in the 2011 Intel International Science and Engineering Fair for his electrical and mechanical engineering project. || |-id=324 | 28324 Davidcampeau || || David Alexandre Joseph Campeau (born 1995) was awarded second place in the 2011 Intel International Science and Engineering Fair for his electrical and mechanical engineering project. || |-id=331 | 28331 Dianebérard || || Diane Bérard (born 1990) is a research engineer at the Paris Observatory (Meudon, France). Her work includes observing stellar occultations to study small-body ring systems (Chariklo and Haumea) and astronomy outreach. || |-id=340 | 28340 Yukihiro || || Yukihiro Adachi, Japanese member of the Matsue Astronomy Club and an observing partner of the discoverer || |-id=341 | 28341 Bingaman || || Missouri-born Kory Bingaman (born 1984) is a talented artist and graphic novelist || |-id=342 | 28342 Haverhals || || Peter Haverhals (born 1950) is a retired teacher, formerly of Watson Groen Christian School. He taught junior and senior high school students for almost two decades, inspiring students in math, literature, and the fundamentals of good judgment. || |-id=343 | 28343 Florcalandra || || Maria Florencia Calandra (born 1990) is a member of the Planetary Science Group of the Universidad Nacional de San Juan (Argentina). She studies the formation and evolution of Oort clouds in the Solar and exoplanetary systems. || |-id=345 | 28345 Akivabarnun || || Akiva Bar-Nun (1940–2017) studied the thermal evolution of comets, planetary atmospheres of Jupiter, Saturn and Titan, and chemical processes on Mars, the Moon, and other bodies. Bar-Nun was a contributor to the Rosetta mission as head of Israel's space agency. || |-id=346 | 28346 Kent || || Kent Hodgson, teacher and author || |-id=351 | 28351 Andrewfeldman || || Andrew Beekman Feldman (born 1994) was awarded second place in the 2011 Intel International Science and Engineering Fair for his electrical and mechanical engineering project. || |-id=353 | 28353 Chrisnielsen || || Christopher Stephen Nielsen (born 1993) was awarded first place in the 2011 Intel International Science and Engineering Fair for his electrical and mechanical engineering project. || |-id=364 | 28364 Bruceelmegreen || || Bruce Elmegreen (born 1950), is an American astronomer who experimented on devices and materials at IBM Research, the research and development division for IBM. His research included the interstellar medium, galaxy formation and evolution, and the formation of stars. || |-id=366 | 28366 Verkuil || || Robert Huntington Verkuil (born 1994) was awarded second place in the 2011 Intel International Science and Engineering Fair for his electrical and mechanical engineering project. || |-id=376 | 28376 Atifjaved || || Atif Javed (born 1992) was awarded second place in the 2011 Intel International Science and Engineering Fair for his electrical and mechanical engineering team project. || |-id=382 | 28382 Stevengillen || || Steven Donald Gillen (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for his electrical and mechanical engineering team project. || |-id=390 | 28390 Demjohopkins || || Demitri Joseph Hopkins (born 1993) was awarded best of category and first place in the 2011 Intel International Science and Engineering Fair for his electrical and mechanical engineering team project. He attends the Merlo Station High School, Beaverton, Oregon, U.S.A || |-id=394 | 28394 Mittag-Leffler || || Magnus Gustav Mittag-Leffler (1848–1927), a professor in Helsinki and Stockholm. || |-id=396 | 28396 Eymann || || Raymond Eymann, a French amateur astronomer. || |-id=397 | 28397 Forrestbetton || || Forrest Evan Betton (born 1993) was awarded best of category and first place in the 2011 Intel International Science and Engineering Fair for his electrical and mechanical engineering team project. || |-id=398 | 28398 Ericthomas || || Eric Michael Thomas (born 1992) was awarded best of category and first place in the 2011 Intel International Science and Engineering Fair for his electrical and mechanical engineering team project. || |-id=400 | 28400 Morgansinko || || Morgan Walker Sinko (born 1994) was awarded second place in the 2011 Intel International Science and Engineering Fair for his environmental management project. || |} 28401–28500 |-id=402 | 28402 Matthewkim || || Matthew Jaebol Kim (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for his environmental management project. || |-id=407 | 28407 Meghanarao || || Meghana Vijay Rao (born 1995) was awarded second place in the 2011 Intel International Science and Engineering Fair for her environmental management project. || |-id=411 | 28411 Xiuqicao || || Xiuqi Cao (born 1994) was awarded first place in the 2011 Intel International Science and Engineering Fair for his environmental management team project. || |-id=415 | 28415 Yingxiong || || Ying Xiong (born 1995) was awarded first place in the 2011 Intel International Science and Engineering Fair for his environmental management team project. || |-id=416 | 28416 Ngqin || || Ng Qin Xiang (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for his environmental management team project. || |-id=417 | 28417 Leewei || || Lee Liang Matthew Wei (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for his environmental management team project. || |-id=418 | 28418 Pornwasu || || Pornwasu Pongtheerawan (born 1994) was awarded best of category and first place in the 2011 Intel International Science and Engineering Fair for his environmental management team project. || |-id=419 | 28419 Tanpitcha || || Tanpitcha Phongchaipaiboon (born 1993) was awarded best of category and first place in the 2011 Intel International Science and Engineering Fair for her environmental management team project. || |-id=425 | 28425 Sungkanit || || Arada Sungkanit (born 1994) was awarded best of category and first place in the 2011 Intel International Science and Engineering Fair for her environmental management team project. || |-id=426 | 28426 Sangani || || Kunal Ashok Sangani (born 1994) was awarded first place in the 2011 Intel International Science and Engineering Fair for his environmental management team project. || |-id=427 | 28427 Gidwani || || Mishka Gidwani (born 1993) was awarded first place in the 2011 Intel International Science and Engineering Fair for her environmental management team project. || |-id=428 | 28428 Ankurvaishnav || || Ankur Kanjibhai Vaishnav (born 1994) was awarded second place in the 2011 Intel International Science and Engineering Fair for his environmental management team project. || |-id=433 | 28433 Samarquez || || Samantha Marie Marquez (born 1995) was awarded best of category and first place in the 2011 Intel International Science and Engineering Fair for her materials and bioengineering project. || |-id=438 | 28438 Venkateswaran || || Shyam Venkateswaran (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for his materials and bioengineering project. || |-id=439 | 28439 Miguelreyes || || Miguel Arnold Silverio Reyes (born 1995) was awarded second place in the 2011 Intel International Science and Engineering Fair for his materials and bioengineering project. || |-id=442 | 28442 Nicholashuey || || Nicholas Michael Huey (born 1992) was awarded second place in the 2011 Intel International Science and Engineering Fair for his materials and bioengineering project. || |-id=443 | 28443 Crisara || || Alexander Raymond Crisara (born 1994) was awarded first place in the 2011 Intel International Science and Engineering Fair for his materials and bioengineering team project. || |-id=444 | 28444 Alexrabii || || Alexander Jahan Rabii (born 1996) was awarded first place in the 2011 Intel International Science and Engineering Fair for his materials and bioengineering team project. || |-id=446 | 28446 Davlantes || || Christopher Joseph Davlantes (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for his energy and transportation project. || |-id=447 | 28447 Arjunmathur || || Arjun Mathur (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for his energy and transportation project. || |-id=449 | 28449 Ericlau || || Eric Lau (born 1994) was awarded second place in the 2011 Intel International Science and Engineering Fair for his energy and transportation project. || |-id=450 | 28450 Saravolz || || Sara Ellen Volz (born 1995) was awarded first place in the 2011 Intel International Science and Engineering Fair for her energy and transportation project. || |-id=451 | 28451 Tylerhoward || || Tyler Trettel Howard (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for his energy and transportation project. || |-id=452 | 28452 Natkondamuri || || Nathan Sai Kondamuri (born 1994) was awarded best of category and first place in the 2011 Intel International Science and Engineering Fair for his energy and transportation project. || |-id=453 | 28453 Alexcecil || || Alexander Michael Cecil (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for his environmental sciences project. || |-id=457 | 28457 Chloeanassis || || Chloe Anassis (born 1995) was awarded second place in the 2011 Intel International Science and Engineering Fair for her environmental sciences project. || |-id=460 | 28460 Ariannepapa || || Arianne Elizabeth Papa (born 1994) was awarded second place in the 2011 Intel International Science and Engineering Fair for her environmental sciences team project. || |-id=465 | 28465 Janesmyth || || Jane Elizabeth Smyth (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for her environmental sciences team project. || |-id=467 | 28467 Maurentejamie || || Ruth Maurente Jamie (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for her environmental sciences team project. || |-id=468 | 28468 Shichangxu || || Shi Changxu, material-scientist-academician of the Chinese Academy of Sciences and the Chinese Academy of Engineering. || |-id=474 | 28474 Bustamante || || Elisa Bustamante (born 1990) was awarded second place in the 2011 Intel International Science and Engineering Fair for her environmental sciences team project. || |-id=475 | 28475 Garrett || 2000 CU || Lawrence Garrett (born 1959) has been the Assistant Coordinator for the Minor Planets Section of the Association of Lunar and Planetary Observers since 1999. He also has several asteroid discoveries to his credit. || |-id=479 | 28479 Varlotta || || David Varlotta (born 1992) was awarded second place in the 2011 Intel International Science and Engineering Fair for his environmental sciences team project. || |-id=480 | 28480 Seojinyoung || || Seo Jinyoung (born 1993) was awarded best of category and first place in the 2011 Intel International Science and Engineering Fair for his environmental sciences team project. || |-id=481 | 28481 Shindongju || || Shin Dongju (born 1993) was awarded best of category and first place in the 2011 Intel International Science and Engineering Fair for his environmental sciences team project. || |-id=482 | 28482 Bauerle || || Matthew Russel Bauerle (born 1994) was awarded best of category and first place in the 2011 Intel International Science and Engineering Fair for his mathematical sciences project. || |-id=483 | 28483 Allenyuan || || Allen Yuan (born 1993) was awarded first place in the 2011 Intel International Science and Engineering Fair for his mathematical sciences project. || |-id=484 | 28484 Aishwarya || || Aishwarya Ananda Vardhana (born 1994) was awarded second place in the 2011 Intel International Science and Engineering Fair for her mathematical sciences project. || |-id=485 | 28485 Dastidar || || Manosij G. Dastidar (born 1992) was awarded second place in the 2011 Intel International Science and Engineering Fair for his mathematical sciences project. || |-id=488 | 28488 Gautam || || Simanta Gautam (born 1995) was awarded second place in the 2011 Intel International Science and Engineering Fair for his mathematical sciences project. || |-id=492 | 28492 Marik || || Miklós Marik, Hungarian astronomer † || |-id=493 | 28493 Duncan-Lewis || || Christopher Anthony Duncan-Lewis (born 1992) was awarded second place in the 2011 Intel International Science and Engineering Fair for his medicine and health sciences project. || |-id=494 | 28494 Jasmine || || Jasmine Samaiya Roberts (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for her medicine and health sciences project. || |} 28501–28600 |-id=503 | 28503 Angelazhang || || Angela Zhang (born 1994) was awarded first place in the 2011 Intel International Science and Engineering Fair for her medicine and health sciences project. || |-id=504 | 28504 Rebeccafaye || || Rebecca Faye Alford (born 1994) was awarded second place in the 2011 Intel International Science and Engineering Fair for her medicine and health sciences project. || |-id=505 | 28505 Sagarrambhia || || Sagar Hitendra Rambhia (born 1994) was awarded first place in the 2011 Intel International Science and Engineering Fair for his medicine and health sciences project. || |-id=508 | 28508 Kishore || || Kishore Balasubramanian (born 1996) was awarded second place in the 2011 Intel International Science and Engineering Fair for his medicine and health sciences project. || |-id=509 | 28509 Feddersen || || Matthew Troy Feddersen (born 1993) was awarded best of category and first place in the 2011 Intel International Science and Engineering Fair for his medicine and health sciences team project. || |-id=511 | 28511 Marggraff || || Blake Marggraff (born 1992) was awarded best in show (the Gordon E. Moore award), best of category, and first place in the 2011 Intel International Science and Engineering Fair for his medicine and health sciences team project. || |-id=512 | 28512 Tanyuan || || Tan Jin Yuan (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for his microbiology project. || |-id=513 | 28513 Guo || || Yanping Guo (born 1960) is the mission trajectory designer of the New Horizons Pluto Kuiper Belt mission. || |-id=516 | 28516 Möbius || || August Ferdinand Möbius, German mathematician and astronomer. || |-id=519 | 28519 Sweetman || || Michael Sweetman (born 1952) has been an amateur astronomer since the early 1960s, becoming an accomplished artist with his lunar and planetary observations. In recent years he has also been engaged in high-quality imaging of the moon. || |-id=521 | 28521 Mattmcintyre || || Matthew Karmen McIntyre (born 1992) was awarded second place in the 2011 Intel International Science and Engineering Fair for his microbiology project. || |-id=524 | 28524 Ebright || || Katherine Yon Ebright (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for her microbiology project. || |-id=525 | 28525 Andrewabboud || || Andrew Nickolas Abboud (born 1993) was awarded first place in the 2011 Intel International Science and Engineering Fair for his microbiology project. || |-id=527 | 28527 Kathleenrose || || Kathleen Rose Maguire (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for her microbiology project. || |-id=530 | 28530 Shiyimeng || || Shi Yimeng (born 1992) was awarded first place in the 2011 Intel International Science and Engineering Fair for her physics and astronomy project. || |-id=531 | 28531 Nikbogdanov || || Nikita Michael Bogdanov (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for his physics and astronomy project. || |-id=533 | 28533 Iansohl || || Ian Alexander Sohl (born 1994) was awarded second place in the 2011 Intel International Science and Engineering Fair for his physics and astronomy project. || |-id=534 | 28534 Taylorwilson || || Taylor Ramon Wilson (born 1994) was awarded best of category and first place in the 2011 Intel International Science and Engineering Fair for his physics and astronomy project. || |-id=535 | 28535 Sungjanet || || Sung Janet Yun-Chen (born 1993) was awarded second place in the 2011 Intel International Science and Engineering Fair for her physics and astronomy team project. || |-id=536 | 28536 Hunaiwen || || Hu Nai-Wen (born 1994) was awarded second place in the 2011 Intel International Science and Engineering Fair for her physics and astronomy team project. || |-id=537 | 28537 Kirapowell || || Kira Elizabeth Powell (born 1994) was awarded best of category and first place in the 2011 Intel International Science and Engineering Fair for her plant sciences project. || |-id=538 | 28538 Ruisong || || Rui Song (born 1995) was awarded second place in the 2011 Intel International Science and Engineering Fair for her plant sciences project. || |-id=542 | 28542 Cespedes-Nano || || Kelvin Russell Cespedes Nano (born 1995) was awarded second place in the 2011 Intel International Science and Engineering Fair for his plant sciences team project. || |-id=543 | 28543 Solis-Gozar || || Angel Francisco Solis Gozar (born 1995) was awarded second place in the 2011 Intel International Science and Engineering Fair for his plant sciences team project. || |-id=547 | 28547 Johannschröter || || Johann Hieronymus Schröter (1745–1816) was a lunar astronomer influenced by William Herschel and who later influenced Karl Ludwig Harding and Fredrich Wilhelm Bessel || |-id=551 | 28551 Paulomi || || Paulomi Bhattacharya (born 1994) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for her chemistry project || |-id=553 | 28553 Bhupatiraju || || Surya Narayanaraju Bhupatiraju (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for his mathematics project || |-id=554 | 28554 Adambowman || || Adam Joseph Bowman (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for his engineering project. || |-id=555 | 28555 Jenniferchan || || Jennifer Chan (born 1994) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for her biochemistry project || |-id=556 | 28556 Kevinchen || || Kevin Chen (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for his engineering project || |-id=557 | 28557 Lillianchin || || Lillian Tiffany Chin (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for her bioengineering project || |-id=558 | 28558 Kathcordwell || || Katherine Leigh Cordwell (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for her mathematics project || |-id=559 | 28559 Anniedai || || Annie Dai (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for her materials science project || |-id=563 | 28563 Dantzler || || Alexa Victoria Dantzler (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for her chemistry project || |-id=564 | 28564 Gunderman || || Lane Gunderman (born 1994) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for his chemistry project || |-id=568 | 28568 Jacobjohnson || || Jacob Paul Smullin Johnson (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for his bioinformatics and genomics project || |-id=569 | 28569 Kallenbach || || Jonah Kallenbach (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for his bioinformatics and genomics project || |-id=570 | 28570 Peterkraft || || Peter Kraft (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for his chemistry project || |-id=571 | 28571 Hannahlarson || || Hannah Kerner Larson (born 1994) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for her mathematics project || |-id=572 | 28572 Salebreton || || Stephen Adam Le Breton (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for his medicine and health project || |-id=575 | 28575 McQuaid || || Daniel Conor McQuaid (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for his biochemistry project || |-id=583 | 28583 Mehrotra || || Pavan N. Mehrotra (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for his engineering project || |-id=587 | 28587 Mundkur || || Naethan Sid Mundkur (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for his materials science project || |-id=592 | 28592 O'Leary || || Vincent Jacob O'Leary (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for his animal sciences project || |-id=594 | 28594 Ronaldballouz || || Ronald Ballouz (born 1989) is a postdoctoral scholar at the Lunar and Planetary Laboratory (Tucson, AZ) focusing on computer simulations of grain interactions throughout the Solar System, including the surfaces of small bodies relevant for missions. || |-id=598 | 28598 Apadmanabha || || Akshay Padmanabha (born 1996) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for his bioengineering project || |-id=599 | 28599 Terenzoni || || Michael Terenzoni (born 1964) served as the Astronomy Coordinator at Flandrau Science Center. He later worked as an Observatory Specialist with Steward Observatory at the University of Arizona. This has made him well known and liked among both the professional and amateur astronomical communities in southern Arizona. || |-id=600 | 28600 Georgelucas || || George Lucas (born 1944) is best known as the director of the films American Graffiti and Star Wars. || |} 28601–28700 |- | 28601 Benton || || Julius Benton (born 1949) has been a key member of the Association of Lunar and Planetary Observers (ALPO) serving as Saturn & Venus Coordinators since 1971. || |-id=602 | 28602 Westfall || || John Westfall (born 1938), a Professor Emeritus at San Francisco State University and the former Executive Director of the Association of Lunar & Planetary Observers (1985–1995) || |-id=603 | 28603 Jenkins || || Jamey Jenkins (born 1955), an American amateur astronomer who served as Assistant Coordinator-Archivist for the Association of Lunar and Planetary Observers from 2003 to 2014 and is author of The Sun and How to Observe It. || |-id=607 | 28607 Jiayipeng || || Jiayi Peng (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for her physics and space science project || |-id=609 | 28609 Tsirvoulis || || Georgios Tsirvoulis (born 1987) is a postdoctoral researcher at the Luleå University of Technology (Sweden) whose studies include the identification and long-term dynamical evolution of collisional asteroid families. || |-id=611 | 28611 Liliapopova || || Lilia Popova (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for her plant science project || |-id=614 | 28614 Vejvoda || || Jaromír Vejvoda, Czech musician, bandmaster and composer † || |-id=618 | 28618 Scibelli || || Samantha Marie Scibelli (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for her physics and space science project || |-id=625 | 28625 Selvakumar || || Raja Selvakumar (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for his biochemistry project || |-id=626 | 28626 Meghanshea || || Meghan Marjorie Shea (born 1994) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for her environmental science project || |-id=628 | 28628 Kensenshi || || Kensen Shi (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for his computer science project || |-id=629 | 28629 Solimano || || Jamie Lee Solimano (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for her microbiology project || |-id=630 | 28630 Mayuri || || Mayuri Sridhar (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for her biochemistry project || |-id=631 | 28631 Jacktakahashi || || Jack Ryan Takahashi (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for his medicine and health project || |-id=632 | 28632 Christraver || || Chris Traver (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for his behavioral and social sciences project || |-id=633 | 28633 Ratripathi || || Raghav Tripathi (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for his biochemistry project || |-id=636 | 28636 Vasudevan || || Sahana Vasudevan (born 1997) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for her mathematics project || |-id=638 | 28638 Joywang || || Joy Yiran Wang (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for her chemistry project || |-id=640 | 28640 Cathywong || || Catherine Wong (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for her bioengineering project || |-id=642 | 28642 Zbarsky || || Samuel Zbarsky (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for his mathematics project || |-id=643 | 28643 Kellyzhang || || Kelly Zhang (born 1995) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for her bioengineering project || |-id=644 | 28644 Michaelzhang || || Michael Zhang (born 1994) is a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors, for his behavioral and social sciences project. He attends the Smithtown High School East, Saint James, New York || |-id=652 | 28652 Andybramante || || Andrew Bramante mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=653 | 28653 Charliebrucker || || Charles F. Brucker mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=654 | 28654 Davidcaine || || David Caine mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=655 | 28655 Erincolfax || || Erin Colfax mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=656 | 28656 Doreencurtin || || Doreen Curtin mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=657 | 28657 Briandempsey || || Brian Dempsey mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=660 | 28660 Derbes || || David Derbes mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=661 | 28661 Jimdickens || || James Dickens mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=662 | 28662 Ericduran || || Eric Duran mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=664 | 28664 Maryellenfay || || Mary Ellen Fay mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=665 | 28665 Theresafultz || || Theresa Fultz mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=666 | 28666 Trudygessler || || Trudy Gessler mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=667 | 28667 Whithagins || || Whitney Hagins mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=669 | 28669 Bradhelsel || || Bradley Helsel mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=672 | 28672 Karolhiggins || || Karol Higgins mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=673 | 28673 Valholmes || || Valerie M. Holmes mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=675 | 28675 Suejohnston || || Susanne C. Johnston mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=676 | 28676 Bethkoester || || Beth Koester mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=677 | 28677 Laurakowalski || || Laura Kowalski mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=678 | 28678 Lindquester || || Terri E. Lindquester mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=680 | 28680 Sandralitvin || || Sandra Litvin mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=681 | 28681 Loseke || || Meghann Loseke mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=682 | 28682 Newhams || || Mike Newhams mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=683 | 28683 Victorostrik || || Victor Ostrik mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=686 | 28686 Tamsenprofit || || Tamsen Profit mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=687 | 28687 Reginareals || || Regina A. Reals mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=688 | 28688 Diannerister || || Dianne E. Rister mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=689 | 28689 Rohrback || || Joan Rohrback mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=690 | 28690 Beshellem || || Bernie Shellem mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=692 | 28692 Chanleysmall || || Chanley M. Small mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=695 | 28695 Zwanzig || || Glenn "Skip" Zwanzig mentored a finalist in the 2013 Intel Science Talent Search, a science competition for high-school seniors || |-id=697 | 28697 Eitanacks || || Eitan Samuel Acks (born 1999) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for his engineering project. || |-id=698 | 28698 Aakshi || || Aakshi Agarwal (born 1999) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for her biochemistry, medicine, health science, and microbiology project. || |-id=700 | 28700 Balachandar || || Sidhika Balachandar (born 1999) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for her physical sciences project. || |} 28701–28800 |-id=705 | 28705 Michaelbecker || || Michael David Becker (born 1999) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for his physical sciences project. || |-id=707 | 28707 Drewbecker || || Drew William Becker (born 2000) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for his environmental sciences project. || |-id=710 | 28710 Rebeccab || || Rebecca Ann Bloomfield (born 1999) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for her earth and space sciences project. || |-id=711 | 28711 Oliverburnett || || Oliver Burnett (born 2000) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for his earth and space sciences project. He attends the Ellis School, Pittsburgh, Pennsylvania. || |-id=712 | 28712 Elizabethcorn || || Elizabeth Alyn Corn (born 1999) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for her biochemistry, medicine, health science, and microbiology project. || |-id=714 | 28714 Gandall || || Keoni K. Gandall (born 1999) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for his biochemistry, medicine, health science, and microbiology project. || |-id=715 | 28715 Garimella || || Mihir Tejas Garimella (born 1999) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for his engineering project. || |-id=716 | 28716 Calebgonser || || Caleb Allen Tuttle Gonser (born 2000) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for his animal & plant sciences project. || |-id=718 | 28718 Rivergrace || || River Connell Grace (born 1999) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for his animal & plant sciences project. || |-id=719 | 28719 Sahoolahan || || Seamus Andrew Hoolahan (born 2000) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for his physical sciences project. || |-id=720 | 28720 Krystalrose || || Krystal Rose Horton (born 2001) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for her animal & plant sciences project. || |-id=722 | 28722 Dhruviyer || || Dhruv Iyer (born 1999) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for his mathematics and computer science project. || |-id=723 | 28723 Cameronjones || || Cameron Cole Jones (born 2001) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for his engineering project. || |-id=726 | 28726 Kailey-Steiner || || Johann Rod Kailey-Steiner (born 1999) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for his engineering project. || |-id=729 | 28729 Moivre || || Abraham de Moivre (1667–1754), French mathematician. || |-id=732 | 28732 Rheakamat || || Rhea G. Kamat (born 1998) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for her animal & plant sciences project. || |-id=734 | 28734 Austinmccoy || || Austin Sagan McCoy (born 2000) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for his biochemistry, medicine, health science, and microbiology project. || |-id=737 | 28737 Mohindra || || Smita Mohindra (born 2000) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for her engineering project.. || |-id=738 | 28738 Carolinolan || || Caroline Grace Nolan (born 2000) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for her animal & plant sciences project. || |-id=739 | 28739 Julisauer || || Julienne Isabelle Sauer (born 1999) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for her physical sciences project. || |-id=740 | 28740 Nathansperry || || Nathaniel Poort Sperry (born 1999) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for his physical sciences project. || |-id=742 | 28742 Hannahsteele || || Hannah Mae Steele (born 2000) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for her earth and space sciences project. || |-id=747 | 28747 Swintosky || || Megan Christine Swintosky (born 1999) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for her biochemistry, medicine, health science, and microbiology project. || |-id=750 | 28750 Brennawallin || || Brenna Caroline Wallin (born 2001) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for her environmental sciences project. || |-id=757 | 28757 Seanweber || || Sean Austin Weber (born 2000) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for his animal & plant sciences project. || |-id=759 | 28759 Joshwentzel || || Joshua Wentzel (born 1999) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for his physical sciences project. || |-id=760 | 28760 Grantwomble || || Grant Donovan Womble (born 2000) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for his engineering project. || |-id=765 | 28765 Katherinewu || || Katherine Jean Wu (born 2000) is a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students, for her behavioral and social sciences project. || |-id=766 | 28766 Monge || || Gaspard Monge, French mathematician. || |-id=770 | 28770 Sarahrines || || Sarah Rines mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=778 | 28778 Michdelucia || || Michelle DeLucia mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=779 | 28779 Acthieke || || Adrienne C. Thieke mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=780 | 28780 Lisadeaver || || Lisa Deaver mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students || |-id=781 | 28781 Timothylohr || || Timothy Lohr mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=782 | 28782 Mechling || || Kim Mechling mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=784 | 28784 Deringer || || Nancy Deringer mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=785 | 28785 Woodjohn || || John Wood mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=787 | 28787 Peterpinko || || Peter Pinko mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=788 | 28788 Hayes-Gehrke || || Melissa Hayes-Gehrke (born 1973) is an astronomy instructor at the University of Maryland who introduces the techniques of asteroid light curve photometry as a method of teaching observational astronomy, with students often producing publishable results. || |-id=791 | 28791 Edithsykeslowell || || Edith Sykes Lowell (born 1927), with her husband David, have been supporters of Lowell Observatory. Edith is the granddaughter of Stanley Sykes. The Sykes brothers (Stanley and Godfrey) built the dome which houses Lowell's 24-inch historic refractor telescope. || |-id=792 | 28792 Davidlowell || || James David Lowell (1928–2020) was a long-time supporter of Lowell Observatory. He was a descendant of Percival Lowell, who brought the family to the U.S. from England in the 1600s. James had a degree in geology and located a large copper mine in Chile and a major gold mine in Peru. || |-id=793 | 28793 Donaldpaul || || Donald Paul (born 1946) is a long-time member of Lowell Observatory's Advisory Board. Don supported the Giovale Open Deck Observatory with a TEC telescope which enhances visitors views of our solar system. || |-id=794 | 28794 Crowley || || Leo Crowley (born 1944) is a long-time member of Lowell Observatory's Advisory Board. Leo serves on Lowell's Executive Committee and as Chair of Lowell's Audit Committee. || |-id=800 | 28800 Speth || || Dustin Speth mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |} 28801–28900 |- | 28801 Maryanderson || || Mary Anderson mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=802 | 28802 Boborino || || Bob Orino mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=803 | 28803 Roe || || Henry G. Roe (born 1975), is an assistant astronomer at Lowell Observatory || |-id=807 | 28807 Lisawaller || || Lisa Waller mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=808 | 28808 Ananthnarayan || || Vidya Ananthnarayan mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=810 | 28810 Suchandler || || Suzanne Chandler mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=813 | 28813 Jeffreykurtz || || Jeffrey Kurtz mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=816 | 28816 Kimneville || || Kim Neville mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=817 | 28817 Simoneflood || || Simone Flood mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=818 | 28818 Kellyryan || || Kelly Ryan mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=819 | 28819 Karinritchey || || Karin Ritchey mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=820 | 28820 Sylrobertson || || Sylvia Robertson mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=821 | 28821 Harryanselmo || || Sylvia Robertson mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=822 | 28822 Angelabarker || || Angela Barker mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=823 | 28823 Archibald || || Angela Barker mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=824 | 28824 Marlablair || || Marla Blair mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=825 | 28825 Bryangoehring || || Bryan S. Goehring mentored a finalist in the 2013 Broadcom MASTERS, a math and science competition for middle school students. || |-id=828 | 28828 Aalamiharandi || || Arshia Aalami Harandi (born 1995) was awarded second place in the 2013 Intel International Science and Engineering Fair for his behavioral and social sciences project. || |-id=829 | 28829 Abelsky || || Julia Beth Abelsky (born 1994) was awarded second place in the 2013 Intel International Science and Engineering Fair for her materials and bioengineering project. || |-id=831 | 28831 Abu-Alshaikh || || Salahaldeen Ibrahim Abu-Alshaikh (born 1997) was awarded second place in the 2013 Intel International Science and Engineering Fair for his mathematical sciences project. || |-id=832 | 28832 Akana || || Reid Toshio Kealii Akana (born 1996) was awarded second place in the 2013 Intel International Science and Engineering Fair for his plant sciences project. || |-id=833 | 28833 Arunachalam || || Easun Piraichoody Arunachalam (born 1996) was awarded second place in the 2013 Intel International Science and Engineering Fair for his medicine and health sciences project. || |-id=836 | 28836 Ashmore || || Elisabeth Anne Ashmore (born 1996) was awarded second place in the 2013 Intel International Science and Engineering Fair for her computer science project. || |-id=837 | 28837 Nibalachandar || || Niranjan Balachandar (born 1997) was awarded second place in the 2013 Intel International Science and Engineering Fair for his mathematical sciences team project. || |-id=841 | 28841 Kelseybarter || || Kelsey Mackenzie Barter (born 1996) was awarded second place in the 2013 Intel International Science and Engineering Fair for her biochemistry project. || |-id=842 | 28842 Bhowmik || || Aprotim Cory Bhowmik (born 1996) was awarded second place in the 2013 Intel International Science and Engineering Fair for his medicine and health sciences project. || |-id=848 | 28848 Nicolemarie || || Nicole Marie Biddinger (born 1995) was awarded first place in the 2013 Intel International Science and Engineering Fair for her animal sciences project. || |-id=851 | 28851 Londonbolsius || || London Reeve Bolsius (born 1997) was awarded second place in the 2013 Intel International Science and Engineering Fair for his computer science project. || |-id=852 | 28852 Westonbraun || || Weston Daniel Braun (born 1995) was awarded second place in the 2013 Intel International Science and Engineering Fair for his electrical and mechanical engineering project. || |-id=853 | 28853 Bukhamsin || || Abdullah Hassan Bu Khamsin (born 1995) was awarded second place in the 2013 Intel International Science and Engineering Fair for his plant sciences project. || |-id=854 | 28854 Budisteanu || || Ionut Alexandru Budisteanu (born 1993) was awarded best of category and first place in the 2013 Intel International Science and Engineering Fair for his computer science project. || |-id=855 | 28855 Burchell || || Sydney Veronica Burchell (born 1996) was awarded first place in the 2013 Intel International Science and Engineering Fair for her environmental management team project. || |-id=860 | 28860 Cappelletto || || Massimo Cappelletto (born 1993) was awarded second place in the 2013 Intel International Science and Engineering Fair for his energy and transportation team project. || |-id=866 | 28866 Chakraborty || || Uttara Chakraborty (born 1995) was awarded second place in the 2013 Intel International Science and Engineering Fair for her computer science project. || |-id=868 | 28868 Rianchandra || || Rian Naveen Chandra (born 1995) was awarded second place in the 2013 Intel International Science and Engineering Fair for his physics and astronomy team project. || |-id=869 | 28869 Chaubal || || Manotri Chaubal (born 1996) was awarded second place in the 2013 Intel International Science and Engineering Fair for her cellular and molecular biology project. || |-id=874 | 28874 Michaelchen || || Michael Zhu Chen (born 1996) was awarded first place in the 2013 Intel International Science and Engineering Fair for his chemistry project. || |-id=878 | 28878 Segner || || Ján Andrej Segner (Johan Andreas von Segner), Carpatho-German mathematician, physicist, doctor † || |-id=884 | 28884 Youngjunchoi || || Young-Jun Choi (born 1969) is a planetary scientist at Korea Astronomy and Space Science Institute (Daejeon, South Korea). He studies photometry and thermal models of Kuiper belt objects and is Co-I of DEEP-South, a project to observe asteroids and comets in the southern sky. || |-id=886 | 28886 Ericajawin || || Erica R. Jawin (born 1989) is a postdoctoral researcher at the Smithsonian National Museum of Natural History (Washington, DC) working on the OSIRIS-REx mission sample site selection. Her wide range of research expertise spans studies of Mars, the moon and now asteroids. || |-id=894 | 28894 Ryanchung || || Ryan Kyong-Doc Chung (born 1996) was awarded first place in the 2013 Intel International Science and Engineering Fair for his computer science project. || |} 28901–29000 |-id=912 | 28912 Sonahosseini || || Sona Hosseini (born 1982) is a research and instrument scientist at the Jet Propulsion Laboratory. She has led numerous studies to simulate and study low-density gas environments in our solar system and conceptualized innovative technology to enable such measurements in future NASA missions. || |-id=916 | 28916 Logancollins || || Logan Thrasher Collins (born 1996) was awarded second place in the 2013 Intel International Science and Engineering Fair for his microbiology project. || |-id=917 | 28917 Zacollins || || Zachary White Collins (born 1996) was awarded second place in the 2013 Intel International Science and Engineering Fair for his physics and astronomy team project. || |-id=924 | 28924 Jennanncsele || || Jennifer Ann Csele (born 1996) was awarded first place in the 2013 Intel International Science and Engineering Fair for her physics and astronomy project. || |-id=934 | 28934 Meagancurrie || || Meagan Elizabeth Currie (born 1996) was awarded second place in the 2013 Intel International Science and Engineering Fair for her animal sciences project. || |-id=935 | 28935 Kevincyr || || Kevin James Cyr (born 1994) was awarded second place in the 2013 Intel InternationalScience and Engineering Fair for his microbiology project. || |-id=936 | 28936 Dalapati || || Trisha Dalapati (born 1997) was awarded second place in the 2013 Intel International Science and Engineering Fair for her energy and transportation project. || |-id=942 | 28942 Yennydieguez || || Yenny Dieguez (born 1997) was awarded second place in the 2013 Intel International Science and Engineering Fair for her electrical and mechanical engineering project. || |-id=945 | 28945 Taideding || || Yenny Dieguez (born 1997) was awarded second place in the 2013 Intel International Science and Engineering Fair for her electrical and mechanical engineering project. || |-id=948 | 28948 Disalvo || || Samantha Hayley DiSalvo (born 1996) was awarded best of category and first place in the 2013 Intel International Science and Engineering Fair for her plant sciences team project. || |-id=950 | 28950 Ailisdooner || || Ailis Clare Dooner (born 1996) was awarded second place in the 2013 Intel International Science and Engineering Fair for her biochemistry project. || |-id=952 | 28952 Ericepstein || || Eric Samuel Epstein (born 1995) was awarded second place in the 2013 Intel International Science and Engineering Fair for his animal sciences project. || |-id=953 | 28953 Hollyerickson || || Holly Catherine Erickson (born 1995) was awarded second place in the 2013 Intel International Science and Engineering Fair for her materials and bioengineering project. || |-id=954 | 28954 Feiyiou || || Fei Yiou (born 1995) was awarded second place in the 2013 Intel International Science and Engineering Fair for her electrical and mechanical engineering team project. || |-id=955 | 28955 Kaliadeborah || || Kalia Deborah Firester (born 1997) was awarded second place in the 2013 Intel International Science and Engineering Fair for her plant sciences project. || |-id=957 | 28957 Danielfulop || || Daniel Jeremy Fulop (born 1995) was awarded first place in the 2013 Intel International Science and Engineering Fair for his cellular and molecular biology project. || |-id=958 | 28958 Binns || || Hilda Binns (born 1945) is a retired multi-sport athlete who won Canada's first Paralympic gold medal in Tel Aviv in 1968. She won a total of six medals in two Paralympics and many medals and honors in other national and international competitions. || |-id=963 | 28963 Tamyiu || || Tam Yiu (born 1928), a driving instructor by profession, had inspired thousands of followers who study his teachings in Tai Chi philosophy. || |-id=966 | 28966 Yuyingshih || || Yu Ying-shih (1930–2021) is a renowned Chinese-American historian and Sinologist. He was a tenured professor at Harvard University, Yale University and Princeton University. He won the Tang Prize and used the NT\$10 million prize money to establish the Yu Ying-shih Fellowship for the Humanities. || |-id=967 | 28967 Gerhardter || || Herbert Gerhardter (born 1993) was awarded second place in the 2013 Intel International Science and Engineering Fair for his energy and transportation team project. || |-id=968 | 28968 Gongmiaoxin || || Gong Miaoxin (born 1995) was awarded second place in the 2013 Intel International Science and Engineering Fair for her electrical and mechanical engineering team project. || |-id=969 | 28969 Youngminjeongahn || || Youngmin JeongAhn (born 1980) is a postdoctoral researcher at Korea Astronomy and Space Science Institute (Daejeon, South Korea) who works on dynamics of small solar system bodies. He has discovered more than one hundred asteroids including four near-Earth objects and twenty Jupiter trojans. || |-id=978 | 28978 Ixion || || Ixion tried to win the love of Hera, but Zeus thwarted this by creating the cloud Nephele, which resembled Hera and by whom Ixion fathered the Centaurs. For his crimes Ixion was bound to a wheel that turns forever in the underworld. || |-id=980 | 28980 Chowyunfat || || Chow Yun-fat (born 1955) is an actor born in Hong Kong. He is best known for his roles as Sao Feng in Pirates of the Caribbean: At World's End. He has won three Hong Kong Film Awards for Best Actor. His simple daily life style has won him the nickname "Son of Hong Kong". || |-id=983 | 28983 Omergranek || || Omer Granek (born 1995) was awarded second place in the 2013 Intel International Science and Engineering Fair for his electrical and mechanical engineering team project. || |-id=990 | 28990 Ariheinze || || Aren (Ari) Heinze (born 1979) is a postdoctoral fellow working on ATLAS at the University of Hawai'i (Manoa). His areas of study include Pluto and other dwarf planets, brown dwarfs, and asteroid discoveries. || |} References 028001-029000
51997255
https://en.wikipedia.org/wiki/Bangladesh%20Computer%20Council
Bangladesh Computer Council
The Bangladesh Computer Council (BCC), is a statutory and autonomous government body located in Dhaka, Bangladesh, that aids in the use of information technology and the formulation of related policy. Bangladesh Computer Council operates a tier III certified national data center in Bangladesh. The ICT Division of Bangladesh Computer Council is building a tier IV (most reliable) National Data Center (4TDC) at Bangabandhu Hi-Tech City, Kaliakoir, Gazipur with the help of the Chinese Government. This data center will be equipped with cloud computing and G-cloud (e-Governance through cloud computing) technology. History In 1983, the National Computer Council was formed by the government of Bangladesh. The name was changed to the Bangladesh Computer Council in 1990 by the Bangladesh Computer Council Ordinance. It falls under the Information Technology (ICT) division of the Ministry of Posts, Telecommunications and Information and provides support and services to 661 government organizations and agencies. In 2016, the BCC launched eshikkha.net to teach computer programming in Bengali. The Bangladeshi government awarded the BCC a contract worth over 12 billion taka (US$149 million in February 2017) to connect 2,600 union councils to the internet via fiber optic cable. References 1983 establishments in Bangladesh Government agencies of Bangladesh Organisations based in Dhaka Information technology in Bangladesh