id
stringlengths 3
8
| url
stringlengths 32
207
| title
stringlengths 1
114
| text
stringlengths 93
492k
|
---|---|---|---|
2899094
|
https://en.wikipedia.org/wiki/Smeg%20Virus%20Construction%20Kit
|
Smeg Virus Construction Kit
|
The Smeg Virus Construction Kit (or SMEG) is a polymorphic engine written by virus writer Chris Pile, known as The Black Baron. SMEG is an acronym for Simulated Metamorphic Encryption Generator. Messages within the two viruses Pile created with it, SMEG.Pathogen and SMEG.Queeg, suggest that it is also an allusion to the word smeg, used as a profanity by characters in the British TV series Red Dwarf. The engine is designed to be used to add polymorphism to viruses.
In 1995, Pile was sentenced to 18 months in prison for creating the viruses, becoming the first person convicted under the Computer Misuse Act.
References
See also
Timeline of notable computer viruses and worms
Comparison of computer viruses
Computer viruses
Polymorphic code
Virus Creation Laboratory
Malware toolkits
|
20120573
|
https://en.wikipedia.org/wiki/System%203
|
System 3
|
System 3, System/3 or System III could refer to:
Computing and electronics
Acorn System 3, a home computer produced by Acorn Computers from 1980
Cromemco System Three, a home computer produced by Cromemco from 1978
IBM System/3, a low-end business computer manufactured between 1969 and 1985
IBM System/3X, a line of general business midrange computers manufactured from 1975
Operating System/3, operating system made by UNIVAC
System Software 3, operating system made by Apple
System 3 (software company), a software development firm
UNIX System III, operating system released by AT&T
Zenith System 3, a line of television models by Zenith Electronics
Other
System 3 in Trilogy, album by Criss Angel and Klay Scott
System 3 FC, a football club in St Vincent and the Grenadines
STS-3 (Space Transportation System-3), the Space Shuttle mission
See also
Series 3 (disambiguation)
|
19998812
|
https://en.wikipedia.org/wiki/Abbott%20Informatics
|
Abbott Informatics
|
STARLIMS Corporation (Starlims) is a subsidiary of Francisco Partners that develops and sells web-based laboratory information management systems (LIMS) - software used to manage the collection, processing, storage, retrieval, and analysis of information generated in laboratories.
History
The company was founded by Itschak Friedman and Dinu Toiba in Israel in 1986, was originally named Laboratory Information Management Systems, and developed and sold LIMS software called "Starlims"; the company itself eventually was renamed to Starlims. By 2005, the company's software was installed at the US Centers for Disease Control and Prevention and in systems of state health authorities in 12 US states. The company held its IPO in the US in 2007. Friedman served as CEO until the company was acquired by Abbott Laboratories in 2009 for $123 million; at that time the company had 160 employees and most of its operations and sales were in the US, the UK, and Hong Kong. By the time of the sale, Starlims was offered as a web application. Abbott intended to fold Starlims' products offerings into its other health information technology businesses to strengthen its clinical diagnostics business.
In 2014, Abbott changed the subsidiary's name from Starlims to Abbott Informatics. In July 2021 Abbott sold Starlims to Francisco Partners.
QM = Quality Manufacturing
FR = Forensic
ES = Environmental Sciences (US centric)
CL = Clinical (not medical device).
Biorepository = some in QM, some in CL.
References
External links
Tableau Software Provider of Starlims' Advanced Analytics data visualisation tool, a rebranded version of Tableau Server.
Information systems
Laboratory information management system
Software companies based in Florida
Software companies of Israel
Companies based in Broward County, Florida
Hollywood, Florida
Software companies of the United States
1986 establishments in the United States
1986 establishments in Florida
Software companies established in 1986
Companies established in 1986
Technology companies based in Florida
|
4991543
|
https://en.wikipedia.org/wiki/Mitchell%20Hawks
|
Mitchell Hawks
|
The Mitchell Hawks are a Junior ice hockey team based in Mitchell, Ontario, Canada. They play in the Provincial Junior Hockey League of the Ontario Hockey Association.
History
The Mitchell Hawks were found ed in 1966 in one of the many Ontario Hockey Association Junior C leagues. They finished low in the standings and were allowed to compete in the Junior D provincial championships. In the Junior D play downs, the Hawks found their niche and made it all the way to the OHA Cup final against a representative from Madoc, Ontario. The Hawks came up short and lost the series 4-games-to-1.
The following season, the same scenario played out in the Western Junior C league and the Hawks were entered into the Junior D playoffs. The Hawks again made it to the final and defeated a representative from Bobcaygeon, Ontario, 4-games-to-none with one tie to win their first provincial championship in only their second season. After the playoffs concluded, the Hawks dropped down to the Western Ontario Junior D Hockey League.
In 1974, the Hawks won the Western Junior D championship and challenged deep into the OHA championships. Upon reaching the OHA Cup final, they met the South-Central Junior D Hockey League champion Bradford Vasey Juniors. The Vasey Juniors defeated the Hawks 4-games-to-1 to win the provincial championship.
The Hawks fell on hard times in the 1980s and were forced to sit out the 1983–84 season. In 1988, all of Ontario's Junior D was consolidated into one "super league" and in 1991 the league was renamed the OHA Junior Development League.
In 1993, the Hawks came back to prominence and made it all the way to the league final. In the final, the Hawks challenged the Thamesford Trojans and defeated them by 4-games-to-1 to win their second OHA Cup.
The next season, the Hawks finished second overall in league standings with 35 wins and only 3 losses. They battled through the playoffs and met the first place Port Stanley Lakers in the finals. The Hawks defeated the Lakers 4-games-to-none to win their third OHA Cup and second straight OHAJDL championship.
The Mitchell Hawks finished the 2005–06 season first in their conference and fourth overall in the OHAJDL with 23 wins and 9 losses. They entered the conference quarter-final against the eighth seeded West Lorne Lakers. The Lakers created a massive upset and defeated the Hawks 4-games-to-2. The upset helped clear the way for the seventh seeded Lucan Irish to eventually win the title.
In 2006, the OHAJDL disbanded and the Southern Ontario Junior Hockey League was formed. The Hawks finished their first season in the SOJHL in fifth place overall with 26 wins and 12 losses. In the first round of the playoffs, the Hawks drew the Central Elgin Express. The Hawks defeated the Express 4-games-to-none. In the second round, the Hawks came up against the Lambeth Lancers who they promptly swept 4-games-to-none as well. In the conference final, the Hawks found themselves playing the Thamesford Trojans. The Hawks ended up defeating the Trojans 4-games-to-2 to earn a birth to the SOJHL final. Their opponents in the SOJHL final was the Delhi Travellers. The Hawks ended up defeating the Travellers 4-games-to-2 to win their fourth ever OHA Cup and the first ever SOJHL championship.
On May 29, 2008, Mitchell was granted expansion into the Western Ontario Junior C Hockey League. On September 19, the Hawks played their first modern Western Junior C game. They were defeated on the road by the Kincardine Bulldogs 8–2. The following night, the Hawks made their home debut and defeated the defending league champion Walkerton Hawks 3–1.
During the summer of 2016 the eight junior "C" leagues in Southern Ontario came together as the Provincial Junior Hockey League. The former leagues became divisions and assigned to one of four conferences. For the Hawks it means they will play in the Western Conference and the Pollock Division.
Season-by-season standings
Playoffs
1967 Lost OHA final
Madoc Juniors defeated Mitchell Hawks 4-games-to-1 in OHA final
1968 Won OHA Championship
Mitchell Hawks defeated Bobcaygeon Juniors 4-games-to-none with one tie in OHA final
1974 Won League, Lost OHA final
Bradford Vasey Juniors defeated Mitchell Hawks 4-games-to-1 in OHA final
1993 Won League
Mitchell Hawks defeated Thamesford Trojans 4-games-to-1 in final
1994 Won League
Mitchell Hawks defeated Port Stanley Lakers 4-games-to-none in final
2006 Lost conference quarter-final
West Lorne Lakers defeated Mitchell Hawks 4-games-to-2 in conf. quarter-final
2007 Won League
Mitchell Hawks defeated Central Elgin Express 4-games-to-none in conf. quarter-final
Mitchell Hawks defeated Lambeth Lancers 4-games-to-none in conf. semi-final
Mitchell Hawks defeated Thamesford Trojans 4-games-to-2 in conf. final
Mitchell Hawks defeated Delhi Travellers 4-games-to-2 in final
References
External links
Mitchell Hawks' homepage
Ice hockey teams in Ontario
|
22364401
|
https://en.wikipedia.org/wiki/Doom%20%28franchise%29
|
Doom (franchise)
|
Doom (stylized as DooM, and later DOOM) is a video game series and media franchise created by John Carmack, John Romero, Adrian Carmack, Kevin Cloud, and Tom Hall. The series focuses on the exploits of an unnamed space marine operating under the auspices of the Union Aerospace Corporation (UAC), who fights hordes of demons and the undead in order to save Earth from an apocalyptic invasion.
The original Doom is considered one of the pioneering first-person shooter games, introducing to IBM-compatible computers features such as 3D graphics, third-dimension spatiality, networked multiplayer gameplay, and support for player-created modifications with the Doom WAD format. Over 10 million copies of games in the Doom series have been sold; the series has spawned numerous sequels, novels, comic books, board games, and film adaptations.
Overview
The Doom video games consist of first-person shooters in which the player controls an unnamed space marine commonly referred to as Doomguy by fans (in the 2016 series, the protagonist is called the "Doom Slayer" or just "Slayer"). The player battles the forces of Hell, consisting of demons and the undead. The games are usually set within sprawling bases on Mars or its moons, while some parts take place in Hell itself. The classic series had only a limited focus on the story, much of which was present in the manuals rather than the games themselves. More recent titles, particularly the 2016 series, would feature a heavier focus on narrative.
The original game featured a total of eight weapons, designed in such a way that no weapon became obsolete after the acquisition of another. With the player carrying all of these weapons at once, the strategy of "gun juggling"- rapidly switching between the weapons depending on circumstance- can be employed. Outside of combat mechanics, Doom levels often feature mazes, coloured key cards and hidden areas. Due to technical limitations, the player could not jump or look up and down in the classic series. These features were added in newer titles.
Development and history
Classic series (1993–1997)
The development of the original Doom started in 1992, when John Carmack developed a new game engine, the Doom engine, while the rest of the id Software team finished the Wolfenstein 3D prequel, Spear of Destiny. The game launched in an episodic format in 1993- with the first episode available as shareware and two more episodes available by mail order. The first episode was largely designed by John Romero. The title proved extremely popular, with the full version of the game selling one million copies. The term "Doom clone" became the name for new genre now known as first-person shooters for several years.
Doom II: Hell on Earth was released in 1994 exclusively in a commercial format. Only minor changes were made at a technical level; the game however featured new enemies, a new "Super Shotgun" weapon, and more complex levels. The game was followed by an expansion in 1995, entitled Master Levels for Doom II, which added 20 additional levels. A fourth episode was added to the original game by the 1995 re-release.
From 1995 id Software were focused on the development of the new Quake trilogy, which would be developed by the company throughout the late 1990s. However, two additional games would be released over the following years, largely developed by third party groups under id's supervision. The first of these was Final Doom, which featured 64 levels based on the Doom II engine, organised into two episodes. TNT: Evilution was developed by the modding group TeamTNT and completed in November 1995, while the second episode The Plutonia Experiment was developed by TNT's Dario and Milo Casali and completed in January 1996.
Midway Games developed Doom 64 under id supervision for release in 1997. The title featured a new engine, with larger sprites and higher quality textures. The technical changes allowed for greater flexibility with level design, such as the ability to adjust the geometry of the map during play. Id did not allow the title to be called Doom 3, as the name was being reserved for a potential return to the franchise after the development of Quake.
Doom 3 and mobile spin-offs (2004–2012)
Doom 3 was announced in 2000, marking id Software's return to the franchise after the release of Quake III Arena. The troubled development of Quake had resulted in major staffing changes at id, with a number of key figures from the mid 90s having departed. This included the original designer John Romero, who was fired in 1996. In the interim, the company had also hired former Doom modder Tim Willits.
Despite the title, Doom 3 was planned as a remake of the original game, a prospect which caused some internal disagreements among the developers. The design of the title would be led by Willits. Using the new id tech 4 engine, numerous technical improvements were made over the classic series, allowing greater realism and interactivity. The game used voice acting and featured a greater focus on narrative than earlier titles. A demo of the game was shown at E3 2002 and was subsequently leaked online, well ahead of the 2004 release date. At the time, it was the first Doom title in seven years, and helped renew interest in the franchise. An expansion, Doom 3: Resurrection of Evil was released in 2005. Unlike the base game, the expansion was developed by Nerve Software. A 2012 "BFG Edition" featured both previous releases along with a new expansion entitled The Lost Mission.
Doom 4 hints were present in 2007 at QuakeCon, and the game was formally announced in 2008. Response to preview material was negative, with fans nicknaming the project "Call of Doom", after a perceived similarity to the Call of Duty franchise. Bethesda marketing vice president Pete Hines stated in retrospect that "it wasn't Doom enough". The game would never be released, with Bethesda cancelling the project in 2013. John Carmack, one of the few remaining veterans from the development of the classic series still present at id, left the studio in November.
The period also saw the release of several spinoffs for mobile platforms. These included Doom RPG (2005), Doom II RPG (2009), and Doom Resurrection (2009). Additionally, the 2010 Xbox Live Arcade re-release of Doom II featured a new expansion entitled No Rest for the Living, which was developed by Nerve Software. This was structured in a similar manner to classic Doom chapters, with eight primary levels and one secret level. This release was also packaged with the BFG Edition of Doom 3 in 2012.
Rebooted series (2016–present)
After the 2013 scrapping of the Doom 4 project, Willits stated that the next game in the Doom series was still the team's focus. Hugo Martin was hired as creative director on the project in 2013. The project was announced simply as Doom in 2014, and was released to generally positive reception in 2016. A glory kill mechanic and additional platforming manoeuvres were among the main gameplay additions. The game's multiplayer mode received three small DLC releases over the course of the first year, and all three were then released for free with the 6.66 update on July 19, 2017.
The 2016 series was not originally described as a continuation or origin story of earlier games, however plot details in the sequel Doom Eternal and commentary from Martin would later describe it as a continuation of the classic series. The 2020 re-release of Doom 64 included an expansion entitled The Lost Levels, intended "to connect “old” Doom to “new” Doom".
A VR spinoff entitled Doom VFR was released in 2017 to generally positive reception, with reviewers discussing the movement controls in particular- which were well made albeit hidden behind menus. The game featured a single player campaign, and reused enemies and other assets from the 2016 game. The game would be the last Doom title under Willits' leadership, ahead of his departure in 2019. 2018 marked the 25th anniversary of the franchise, and saw The Doom Slayer included as a playable character in id Software's Quake Champions. That year, John Romero also announced Sigil, an unofficial "fifth episode" of the original 1993 game. The episode was released for free via Romero's website in 2019, with a paid version available that included a soundtrack by Buckethead. While Sigil was developed independently, Bethesda added the episode to the console ports of Doom as a free patch in October, alongside the two chapters of Final Doom.
The next main entry in the franchise, Doom Eternal, was directed by Hugo Martin and released in 2020. The title sold very well, generating $450 million in revenue over the first year; double the launch revenue of the previous title. Some commentators cited the timing of the release, which coincided with a wave of interest in gaming worldwide amid restrictions on social gathering during the coronavirus pandemic. The game was made in id Tech 7, which afforded numerous technical improvements over the id Tech 6 engine used by its predecessor. An expansion of the game, The Ancient Gods, was released in two parts, one in October 2020 and the other in March 2021.
Future
In March 2021, Hugo Martin discussed some directions future Doom titles could take, discussing time travel or a game set in the time span between Doom 64 and Doom (2016), when the Doom Slayer “first came to that place with the Sentinels, almost like a more medieval setting”. Romero confirmed in August 2021 that a second Sigil expansion using the Doom II engine was in development.
Games
Main series
Spin-offs
Other media
Novels
A set of four novels based on Doom were written by Dafydd ab Hugh and Brad Linaweaver. The books, listed in order, are titled Knee Deep in the Dead, Hell on Earth, Infernal Sky and Endgame. All were published between June 1995 and January 1996 by Pocket Books. The unnamed Marine is called "Flynn Taggart" or "Fly" in the novels. The first two books feature recognizable locations and situations from the first two games.
In 2008, a new series of Doom novels by Matthew J. Costello, an author who had worked on the story and scripts for Doom 3 and Resurrection of Evil, were published. The series of books aim to novelize the story of Doom 3, with the first installment, Worlds on Fire, published on February 26, 2008. The second book in the series, Maelstrom, was released in March 2009.
Comic book
A one-shot comic book written by Steve Behling and Michael Stewart with art by Tom Grindberg was released in May 1996 by Marvel Comics as a giveaway for a video game convention.
Tabletop games
In 2004, a board game designed by Kevin Wilson and published by Fantasy Flight Games titled Doom: The Boardgame was released.
In 2020, Critical Role published a fifth edition Dungeons & Dragons module entitled Doom Eternal: Assault on Amaros Station. The game was written by Christopher Lockey and Matthew Mercer, and received a digital release via the Critical Role store on December 16, 2020.
Films
Doom (2005)
In 2005, Universal Pictures released the first live-action film adaptation, titled Doom, which starred Karl Urban and Dwayne Johnson.
Doom: Annihilation (2019)
In 2019, Universal released a second live-action film adaptation direct-to-video, titled Doom: Annihilation starring Amy Manson.
Reception
In 1996, Next Generation ranked the series as the 19th top game of all time, for how "despite the hundreds of copycat titles, no one has ever been able to equal id's original, pulsing classic." In 1999, Next Generation listed the Doom series as number 25 on their "Top 50 Games of All Time," commenting that, "despite the graphic advances since Doom was released, the pixilated Barons of Hell and Cyber Demons still rank as some of the scariest things that can grace your screen."
The series' unnamed protagonist, a marine, has had a mostly positive reception. In 2009, GameDaily included "the Marine" on its list of "ten game heroes who fail at the simple stuff" for his inability to look up and down in the original series. UGO Networks ranked him fourth on its 2012 list of best silent protagonists in video games, noting his courage to continue in silence even when he faces Hell's army. In 2013, Complex ranked Doomguy at number 16 on its list of the greatest soldiers in video games for being "the original video game space marine" and "one of the classic silent protagonists." Both CraveOnline and VGRC ranked him the fifth most "badass" male character in the video game's history.
Sales
The original Doom sold 3.5 million physical copies and 1.15 million shareware copies from its 1993 release up through 1999. Doom II sold 1.55 million copies of all types in the United States during the same period, with about a quarter of that number also sold in Europe, a total of some 5-6 million sales for the original duology. Doom 3 sold 3.5 million copies along with many copies of the expansion pack Resurrection of Evil from its 2004 release up through 2007, making it the most successful game in the series at that point. The sales of Doom 64 were not disclosed.
The 2016 reboot sold over 2 million copies on the PC alone from its May 2016 release up to July 2017.
References
ZeniMax Media franchises
Microsoft franchises
Video game franchises introduced in 1993
First-person shooters by series
Science fantasy video games
Video game franchises
Religion in science fiction
Video games set in hell
Video games about demons
Video games set on Mars
Undead in popular culture
Horror video games
|
11437198
|
https://en.wikipedia.org/wiki/Zonbu
|
Zonbu
|
Zonbu was a technology company that markets a computing platform which combines a web-centric service, a small form factor PC, and an open source based software architecture. Zonbu was founded by Alain Rossmann (previously Founder and CEO of Openwave) and Gregoire Gentil (previously co-founder of Twingo Systems).
Hardware
The first-generation Zonbox hardware was the eBox-4854 sold by DMP Electronics of Taiwan.
Called the Zonbu Mini, it was a nettop computer measuring . It is flash based, fanless, and thus effectively silent. The official specifications for the device in 2007 were:
1.2 GHz Via Eden CPU (C7 Esther core),
512 MB RAM,
Ethernet over twisted pair 10/100 Mbit/s,
PS/2 keyboard and mouse ports, VGA display port and 6 USB 2.0 ports,
4 GB CompactFlash local storage, and
Graphics up to 2048 x 1536 with 16 million colors – hardware graphics and MPEG2 acceleration.
Disassembly by Zonbu owners has shown that the Zonbu includes options for internal expansion:
Mini PCI slot (for an optional wireless card),
IDE connector, with room in the case for a 2.5" hard drive, and
serial and parallel ports.
Service
The Zonbu subscription plans include online storage (using Amazon S3), automatic upgrades, online support and remote file access. The subscription service is promoted as reducing the hassle of typical computer maintenance tasks, such as hardware repair, software installation, updates and upgrades, and malicious software removal.
Software architecture
The Zonbu OS is a customized version of Linux based on the Gentoo distribution using the Xfce desktop environment. It is geared towards non-technical users, and the user interface focuses more on simplicity than advanced features.
The filesystem architecture combines a transparent overlay filesystem (pioneered by Linux Live Distributions) with an on-line backup service. User data is locally cached on Compact Flash Card, then transparently encrypted with 128-bit encryption and transferred to remote storage servers at Amazon S3.
Applications
Zonbu comes pre-loaded with a number of software applications. These include the Firefox web browser, OpenOffice productivity suite and Skype IP phone service, and 30 casual games.
With the default OS, the user is not allowed to install any third-party software. The default set of applications is supposed to fit the needs of non-technical users or of a second home PC. However, Zonbu provides instructions to unlock the operating system and install additional software. The procedure is technical and intended for a minority of users (Standard for many linux users, unlocking GRUB, root, and install with emerge/portage).
See also
Everex, provider of the hardware used on some Zonbu models
Linutop Linux PC
Linpus Linux
OLPC laptop
gOS
References
External links
Zonbu official website
EPATec, distributor of same hardware in Germany and Spain
Zonbu First Look Video
Climate Trust
Norhtec MicroClient Jr.
Media
Zonbu Launches Subscription Laptops
A Holiday Helper for the Computer Savvy
Hassle-Free PC
A PC That Uses Less Energy, but Charges a Monthly Fee
Engadget: Zonbu launches subscription-based PC, service plans
Zonbu Desktop Mini
Everex Zonbu Notebook
Sneak Peek at the Zonbu PC
Defunct computer companies of the United States
Linux-based devices
Cloud clients
|
37001174
|
https://en.wikipedia.org/wiki/Encoder%20receiver%20transmitter
|
Encoder receiver transmitter
|
Encoder receiver transmitter (ERT) is a packet radio protocol developed by Itron for automatic meter reading. The technology is used to transmit data from utility meters over a short range so a utility vehicle can collect meter data without a worker physically inspecting each meter.
The ERT protocol was first described in . More technical detail is explained in later .
Technical details
ERT is an OOK modulated radio signal which is transmitted in the unlicensed 900-920 MHz band. The message is transmitted in the clear and uses Manchester encoding. The protocol uses frequency-hopping, a multiple access method to avoid interference with other nearby meters. SCM and IDM packet formats are described in
SCM packet
SCM messages are 12 bytes. Each message contains single, cumulative meter reading value along with the meter serial number, commodity type and checksum and tamper flags.
IDM packet
IDM messages are 92 bytes and contain time of use consumption data.
Later patents describe further variations of packets with variable length.
Implementations
Several vendors (besides Itron) have implemented ERT receivers (usually in order to read consumption data from Itron meters.) Notably, Digi sells an ERT gateway, and Grid Insight sells a PC-based product called the AMRUSB-1.
It should be possible to decode ERT signals using general purpose UHF packet radios such as the Texas Instruments CC1101 or Freescale MC33696. A software-defined radio receiver has been implemented using inexpensive hardware: RTLAMR, and the rtl_433 software will decode SCM messages. Kismet (software) has an rtlamr data source.
References
Further reading
Grid Insight - Itron ERT technology
Dave's Tech Blog - Itron Remote Read Electric Meter
RTLAMR - An rtl-sdr receiver for the ERT protocol
Packet radio
Smart grid
|
64625529
|
https://en.wikipedia.org/wiki/Click%20tracking
|
Click tracking
|
Click tracking is when user click behavior or user navigational behavior is collected in order to derive insights and fingerprint users. Click behavior is commonly tracked using server logs which encompass click paths and clicked URLs (Uniform Resource Locator). This log is often presented in a standard format including information like the hostname, date, and username. However, as technology develops, new software allows for in depth analysis of user click behavior using hypervideo tools. Given that the internet can be considered a risky environment, research strives to understand why users click certain links and not others. Research has also been conducted to explore the user experience of privacy with making user personal identification information individually anonymized and improving how data collection consent forms are written and structured.
Click tracking is relevant in several industries including Human-Computer Interaction (HCI), software engineering, and advertising. Email tracking, link tracking, web analytics, and user research are also related concepts and applications of click tracking. A common utilization of click data from click tracking is to improve results' positions from search engines to make their order more relevant to users' needs. Click tracking employs many modern techniques such as machine learning and data mining.
Tracking and recording technology
Tracking and recording technologies (TRTs) can be split into two categories, institutional TRTs and end-user TRTs. Institutional TRTs and end-user TRTs differ by who is collecting and storing the data, and this can be respectively understood as institutions and users. Examples of TRTs include radio frequency identification (RFID), credit cards, and store video cameras. Research suggests that individuals are concerned with privacy, but they are less concerned with how TRTs are used daily. This discrepancy has been attributed to the public not understanding how information about them is getting collected.
Another means of obtaining user input is eye-tracking or gaze tracking. Gaze-tracking technology is especially beneficial for those with motor disabilities. Systems that employ gaze-tracking often try to mimic cursor and keyboard behavior. In this process, the gaze-tracking system is separated into its own panel in the system interface, and the user experience of this system is compromised as individuals have to switch between the panel and the other interface features. The experience is also difficult because users have to first imagine how to complete the task using keyboard and cursor features and then employ gaze. This causes tasks to take additional time. Hence, researchers created their own web browser called GazeTheWeb (GTW), and the focus of their research was on the user experience. They improved the interface to incorporate gaze better.
Eye-movement tracking is also applied in usability testing when creating web applications. However, in order to track user eye movements, a lab setting with appropriate equipment is often required. Mouse and keyboard activity can be measured remotely, so this quality can be capitalized for usability testing. Algorithms can use mouse movements to predict and trace user eye movements. Such tracking in a remote environment is denoted as a remote logging technique.
Browser fingerprinting is another means of identifying users and tracking them. In this process, information about a user is collected from their web browser to create a browser fingerprint. A browser fingerprint contains information about a device, its operating system, its browser, and its configuration. HTTP headers, JavaScript, and browser plugins can be used to build a fingerprint. Browser fingerprints can change over time from automatic software updates or user browser preference adjustments. Measures to increase privacy in this realm can reduce functionality by blocking features.
Methods of click tracking
User browsing behavior is often tracked using server access logs which contain patterns of clicked URLs, queries, and paths. However, more modern tracking software utilizes JavaScript in order to track cursor behavior. The collected mouse data can be used to create videos, allowing for user behavior to be replayed and easily analyzed. Hypermedia is used to create such visualizations that allow for behavior like highlighting, hesitating, and selecting to be monitored. Technology that is used to record such behavior can also be used to predict it. One of these monitoring tools, SMT2є, collects fifteen cursor features and uses the other fourteen to predict the last feature's outcome. This software also generates a log analysis which summarizes user cursor activity.
In a search session, users can be identified using cookies, identd protocol, or their IP address. This information can then be stored in a database, and every time a user visits a web page again, their click behavior will be appended to the database. DoubleClick Inc. is an example of a company that has such a database and partners with other companies to aid with their web mining. Cookies are added to HTTP (Hypertext Transfer Protocol), and when a user clicks on a link, they are connected to the associated web server. This action of a user clicking on a link is seen as a request, and the server “responds” by sending the user's information, and this information is a cookie. Cookies provide a “bookmark” for users’ sessions on a website, and they store user login information and the pages users visit on a website. This aids with preserving the state of the session. If there is more than one such server, information must be consistent among all servers; hence, information is transferred. Data collected via cookies can be used to improve websites for all users and this also aids with user profiling for advertising.
When data mining techniques and statistical procedures are applied to understand web log data, the process is noted as log analysis or web usage mining. This helps with determining patterns in the users’ navigational behaviors. Some features that can be observed include how long users viewed pages for, click path lengths, and the number of clicks. Web usage mining has three phases. First, the log data is "preprocessed" to see the users and search sessions’ content. Then, tools like association and clustering are applied to look for patterns, and lastly, these patterns are saved to be further analyzed. The tool of association rule mining helps with finding “patterns, associations, and correlations” among pages users visit in a search session. Sequential pattern discovery is association rule mining, but it also accounts for time like the page views in an allotted time period. Classification is a tool that allows for pages to be added to groups representing certain similar qualities.
Some examples of tools individuals can use when conducting click analytics are the Google Analytics tool In-Page Analytics, ClickHeat, and Crazy Egg. These tools create a visual from user click data on a webpage. ClickHeat and Crazy Egg showcase the density of user clicks using specific colors, and all of these tools allow for webpage visitors to be categorized into groups by qualities like being a mobile user or using a particular browser. The specific groups' data can be analyzed for further insight.
Click behaviour
One of the main factors users consider when clicking links is a link's position in a list of results. The closer links are to the top, the more likely they are to be selected by users. When users have a personal connection to a subject matter they tend to click that article more frequently. Pictures, position, and specific individuals in the news content also more heavily influenced users’ decisions. The source of the news was deemed as less important.
Click attitude and click intention play a large role in user click behavior. In one study when research participants were presented with positive and negative insurance advertisement photographs, emotion was seen to have a positive association with click intention and click attitude. The researchers also observed that click attitude affects click intention, and positive emotion has more of an impact than negative emotion on click attitude.
The internet can be considered a risky environment due to the abundance of cybersecurity attacks that can occur and the prevalence of malware. Hence, whenever individuals use the internet, they have to decide whether or not to click on the various links. A 2018 study found that users tend to click on more URLs on websites they are familiar with; this user trait is then exploited by cybercriminals, and personal information can be compromised. Hence, trust is seen to also increase click-through intention. When given Google Chrome warnings, 70% of the time people will click through. They also tend to adjust default computer settings in this process. Users were also found to better recognize malware risks when there is a greater potential for revealing their personal information.
Relevance of search results
Pages that are viewed by users during a particular search session constitute click data. Such data can be used to improve search results in two ways, as explicit and implicit feedback. Explicit feedback is when users indicate which pages are relevant to their search query, while implicit feedback is when user behavior is interpreted to determine results’ relevance. Certain user actions on a webpage that can be used as a part of the interpretation process include bookmarking, saving, or printing a particular web page. Through collecting click data from a few individuals, the relevance of results for all users for given queries can improve. In a search session, a user indicates which documents they are more interested in with their clicks, and this indicates what is relevant to the search. The most relevant click data to determine relevance of results is often the last viewed web page rather than all of the pages clicked on in a search session. Click data outside of search sessions can also be used to improve the accuracy of relevant results for users.
The search results to a given query are usually subject to positional bias. This is because users tend to select links that are at the top of result lists. However, this position does not mean a result is the most relevant since relevance can change over time. As a part of a machine learning approach to improving the result order, human editors begin by supplying an original rank for each result to the algorithm. Then, live user click feedback in the form of tracked click-through rates (CTR) in search sessions can be used to rerank the results based on the data. This improves the order of the results based on the live indicated relevance from the users.
Click dwell time and click sequence information can also be used to improve the relevance of search results. Click dwell time is how long a user takes to return to the search engine results page (SERP) after clicking on a particular result, and this can indicate how satisfied the user is with a particular result. Eye-tracking research indicates that users exhibit an abundance of non-sequential viewing activity when looking at search results. Click models that abide by “top-down” user click behavior cannot interpret the user process of revisiting pages.
Extensions
Advertising
Supply-demand mismatch costs can be reduced through click tracking. Huang et al. defines strategic customers as “forward looking” individuals who know that their clicks are being tracked and expect that companies will engage in appropriate business activities. In the conducted study, researchers used clickstream data from customers to observe their preferences and desired product quantities. Noisy clicks are when customers click but do not actually buy the product. This leads to imperfect advanced demand information or ADI.
Click tracking can be used in the realm of advertising, but there is the potential for this tool to be used negatively. Publishers display advertisements on their websites, and they receive money depending on the amount of traffic, measured as a number of clicks, they send to the advertisers website. Click fraud is when publishers fake clicks to generate revenue for themselves. In the 2012 Fraud Detection in Mobile Advertising (FDMA) conference, competition teams were tasked with having to use data mining and machine learning techniques to determine “fraudulent publishers” from a given dataset. A successful algorithm is able to observe and use morning and night click traffic patterns. When there is density of clicks between these main patterns, it is often an indicator of a fraudulent publisher.
Website content can be adjusted to make it specific to users using “user navigational behavior” and user interests in a process called web personalization. Web personalization is useful in the realm of e-commerce. There are unique steps in the process of web personalization, and the first step is noted as “user profiling.” In this step, the user is understood and constituted through their click behavior, preferences, and qualities. Following user profiling is “log analysis and web usage mining.”
Email
Phishing is usually administered through emails, and when a user clicks on a phishing attempt email, their information will be leaked to particular websites. Spear-phishing is a more “targeted” form of phishing in which user information is used to personalize emails and entice users to click. Some phishing emails will also contain other links and attachments. Once these are either clicked or downloaded, users’ privacy can be encroached. Lin et al. conducted a study to see which psychological “weapons of influence” and “life domains” affect users most in phishing attempts, and they found that scarcity was the most influential factor weapon of influence, and the legal domain was the most influential life domain. Age is also an important factor in determining those who are more susceptible to clicking on phishing attempts.
When a virus infects a computer, it finds email addresses and sends copies of itself through these emails. These emails will usually contain an attachment and will be sent to several individuals. This differs from user email account behavior because users tend to have a particular network they communicate with regularly. Researchers studied how the Email Mining Toolkit (EMT) could be used to detect viruses by studying such user email account behavior and found that it was easier to decipher quick, broad viral propagations in comparison to slow, gradual viral propagations.
In order to know what emails users have opened, email senders engage in email tracking. By merely opening an email, users' email addresses can be leaked to third parties, and if users click on links within the emails, their email address can get leaked to a larger number of third parties. Also, each time a user opens an email sent to them, their information can get sent to a new third party among those that their address has already been leaked to. Many third party email trackers are also involved in web tracking, leading to further user profiling.
Privacy
Privacy-protection models anonymize data after it is sent to a server and stored in a database. Hence, user personal identification information is still collected, and this collection process is based on users trusting such servers. Researchers study giving users control over what information is sent from their mobile devices. They also observe giving users control over how that information is represented in databases in the realm of trajectory data, and they create a system that allows for this approach. This approach gives users the potential to increase their privacy.
When user privacy is going to be encroached, consent forms are often distributed. The type of user activity required in these forms can have an effect on how much information a user retains from the form. Karegar et al. compares the simple agree/disagree format with forms that incorporate checkboxes, drag and drop (DAD), and swipe features. When testing what information users would agree to disclose with each of the consent form formats, researchers observed that users presented with DAD forms had a greater number of eye-fixations and on the given consent form.
When a third-party is associated with a first-party website or mobile application, anytime a user visits the first party website or mobile application, their information will be sent to the third-party. Third-party tracking generates more privacy concerns than first-party tracking because it allows for many website or application records about a particular user to be combined, yielding better user profiles. Binns et al. found that among 5000 popular websites, the top two websites alone had 2000 trackers. Of the 2000 embedded trackers, 253 were used in 25 other websites. Researchers evaluated the reach of third-party trackers based on their contact with users rather than websites, so more "popular" trackers were those who received information about the highest number of people rather than code embedded in the most first-parties. Google and Facebook were deemed as the first and second largest web trackers, and Google and Twitter were deemed as the first and second largest mobile trackers.
See also
Click path
Click analytics
Web analytics
Phishing
Web log analysis software
Web mining
Search session
References
Web analytics
|
37476190
|
https://en.wikipedia.org/wiki/Carmen%20Sandiego%27s%20Great%20Chase%20Through%20Time
|
Carmen Sandiego's Great Chase Through Time
|
Carmen Sandiego's Great Chase Through Time (previously Where in Time Is Carmen Sandiego? and sometimes given the subtitle v3.0) is a 1997 edutainment point-and-click adventure game developed by Broderbund for Microsoft Windows and Macintosh devices. The game is a remake of the 1989 time-travel title Where in Time Is Carmen Sandiego?, making it the second Time video game in the Carmen Sandiego franchise. The game was strongly influenced by the short-lived PBS game show, Where in Time Is Carmen Sandiego?. The game was previewed at the 1997 Toy Fair in New York City. A demo version was included on the CD for Carmen Sandiego Word Detective and was available on the Carmen Sandiego website. After Broderbund was sold to The Learning Company, the game was re-released with the new title—Carmen Sandiego's Great Chase Through Time—but minimal redesign.
The game's narrative involves master thief Carmen Sandiego, who has used a time machine called the Chronoskimmer to plant her associates at key historical events to stop them from occurring. The object of the game is to track down Carmen Sandiego and her henchmen by jumping through time tunnels that link historical periods together, retrieve the stolen item, and correct the course of history. During each case, the player visits a well-known historical event, such as the signing of the Declaration of Independence or Lewis and Clark's expedition to the Pacific Northwest, and meets historical figures like Queen Hatshepsut, William the Conqueror, and Yuri Gagarin. At the end of case 18, the player locates the Chronoskimmer, thereby acquiring the tools to chase and capture Carmen for the final case.
Carmen Sandiego's Great Chase Through Time received critical acclaim upon its release, earning praise for its story, soundtrack, puzzle-solving and historical content. It was awarded Computer Edutainment Game of the Year at the 1998 D.I.C.E. Awards.
Gameplay
On the opening screen, the player can choose to sign into the ACME roster to begin a game, continue with a saved one, or create a customized game by selecting one or more cases (a feature recommended for teachers). The game is a point-and-click adventure with a changeable cursor, drop down menus and on-screen icons. Players must identify on-screen "hot spots" to find items that will help their progress. In each case, the player must investigate clues to help a historical figure solve a problem, recover a stolen treasure, and capture a thief. The Good Guides are available to help the player to complete each challenge. The player also has access to the ACME Agent Handbook supplied with the game, which contains hints and suggestions for solving the puzzles. Each case involves a four-step process of identifying the theft, solving the problem, collecting the Carmen notes and arresting the thief.
The game is divided into 19 cases, starting in Ancient Egypt and advancing towards the modern day. The player must complete all cases to win the game. Before starting a case, the Chief will tell the player the nature of the problem in the period of history. At the start of each case, the player will be assisted by one of five accompanying Good Guides (Ann Tickwittee, Ivan Idea, Rock Solid, Renee Santz, and Polly Tix), characters who are knowledgeable about the culture of each case's historical period and who have a particular area of historical expertise, such as antiquities, exploration or inventions. They provide some historical context and mention any notable figures who will appear throughout the case. They also help the player by liaising with the historical figures on the player's behalf. After clicking on a person, the player can proceed to question them about their situation. If necessary, they may then re-ask any questions via rollover text to extract further information. Historical characters' responses guide the player toward that period's task.
The player begins the game with the rank of Time Pilot but is promoted by the Chief as the game progresses, advancing to Time Scout, Time Trooper, Time Detective, Time Inspector, and, by the end of the game, achieving the rank of Time Sleuth, enabling a chance to capture Carmen Sandiego.
Items must be collected and moved around the screen or placed in the inventory box to complete cases. Characters will either offer the player objects, or the player must seek out items that can be taken. Collectible items can be kept for later use by dragging the object into the Inventory box. Players must also look for scraps of the Carmen Notes, which describe where each thief will hide. These notes have each been torn into three pieces to make them more difficult to find. The player must click on the scraps of paper to assemble them into a whole note. Once all the pieces of the Carmen note are found, the ACME handcuffs (known as Time Cuffs) activate and the player can decode Carmen's message to deduce her henchmen's location. Using the Time Cuffs on the relevant object reveals the thief, whom the Good Guide then arrests. After capturing each crook (with Dee Cryption captured once and the others captured twice), the player pursues Carmen herself.
The player can access the Chronopedia, a historical guide that provides information about each time period and its important people, places, maps and events. Each Good Guide carries a section of the Chronopedia and gives the player the relevant chapter upon arrival in each time period. All the text within the Chronopedia was reviewed and approved by editors of the Encyclopædia Britannica. The information may be used to decipher Carmen's notes.
The gameplay mechanics change once the player retrieves the Chronoskimmer at the end of Case 18, which sees Carmen relinquishing her stolen item to the player. Instead of staying within the same time period for the duration of the final case, the player now follows clues at each location to work out where to go next. This is a return to the Where in Time Is Carmen Sandiego? mechanic. Though the player now has the ability to travel to any period in history whenever they like, Carmen may only travel to time periods that she has already visited, and therefore the game restricts the player to the time periods of the previous cases. Parts of the screen previously occupied by Carmen's notes and in-game collectible items are replaced with the Chronoskimmer slider and the travel button. Throughout this case, the player receives help from all five ACME Good Guides. Originally, players could visit a themed website for "more in-depth learning" about the cultures visited in the game, which included "articles from , hints, and a feedback area." The site also had a Christopher Columbus minigame, which was linked to the finished game's tenth case. Additionally, it offered an extended free trial exclusively to owners of the game. The site—along with the other Carmen Sandiego pages created by Broderbund Software and maintained by The Learning Company—was shut down in 2005.
Plot
The game begins in the present day, when Carmen Sandiego breaks into ACME Timenet headquarters in San Francisco and steals a time travel device called the ACME Chronoskimmer. Carmen sends her V.I.L.E. villains to travel through time and steal historical treasures, thereby altering the course of history. She also provides them with a note detailing where to hide before she picks them up.
After the theft, the Chief greets the player and explains the importance of recovering the device and restoring history, as well as the Chronoskimmer's safeguard mechanic of leaving time tunnels behind. The Chief sends the player on a series of missions to stop Carmen and her crooks. After the ninth case is solved and all the crooks are incarcerated, Carmen Sandiego uses the Chronoskimmer to bail them out and commit more thefts in history. After reinforcing the prison, the Chief sends the player to recapture the crooks and catch Carmen once and for all. After the player finishes recapturing the crooks and restoring history, Carmen Sandiego lets the player retrieve the Chronoskimmer then goes through time, until she returns to the present to steal her personal dossier from ACME HQ. After a chase by all five Good Guides, Carmen Sandeigo is caught and incarcerated.
Once the player is successful, the Chief lets them in on top secret information: Carmen Sandiego was once an ACME agent but felt the challenge of catching crooks was too easy so she became a villain to outsmart her former colleagues. She aimed to delete a detailed dossier about her transition, which is thematically linked to her desire to delete the memory of history's greatest figures and achievements (dubbed "Project: History Sweep"), under the pretense of simply "stealing history's greatest treasures." Though unstated in the game, it is implied that Carmen Sandiego only ordered her henchmen to steal these items as a decoy to ensure the ACME headquarters was completely empty while all agents were cleaning up her trail of historical messes.
Characters and cast
The only live-action role in the game was that of The Chief, played by Lynne Thigpen. All other roles were performed as voice-overs. Brenda Burke, who played Carmen Sandiego on the game show's second season, voiced the character in the game. Although most of the voice actors in the game only play one character, some performed multiple roles in different cases. For example, Charles Martinet plays both William Shakespeare and Ludwig van Beethoven. Jarion Monroe plays a mixture of both historical and fictional characters: Ivor the Blacksmith, Kublai Khan, Huang the Merchant, Richard Burbage, and Yuri Gagarin. While the voice actors playing most of the crooks are not credited, Francine Scott is credited as playing "Villains."
The game distinguishes between historical and fictional characters with rollover text that is displayed when the cursor is placed over a character. With a few exceptions (including ACME agents, V.I.L.E. villains, and the peasants in Case 5), characters who have both first and last names are genuine historical figures, while characters with only a first name or a descriptive title are fictional. However, some of the real historical figures like Queen Elizabeth I and Montezuma are referred to by only their first names.
Development and release
By 1991, Broderbund had released five successful Carmen Sandiego games: World (1985), USA (1985), Europe (1988), Time (1989), and America's Past (1991). This year marked the franchise's debut into television with the PBS game show Where in the World Is Carmen Sandiego? hosted by Greg Lee, starring Lynne Thigpen as the Chief, and featuring the a cappella band Rockapella. This series ultimately lasted for five seasons, winning six Daytime Emmy Awards throughout its run. After cancellation World was followed by a less successful spin-off entitled Where in Time Is Carmen Sandiego? which ran from 1996 to 1997, winning one Daytime Emmy Award. During the run of the World game show, Broderbund had released Space and Junior Detective (based on the animated TV series), and planned on rebooting their most popular titles for a new generation; this resulted in the release of Where in the U.S.A. Is Carmen Sandiego? (1996), Where in the World Is Carmen Sandiego? (1996), and Time (1997). While USA and World became inspired by the World game show, many elements of the Time game show became incorporated into Time, including the theme song (performed by its vocal group The Engine Crew), the names of many of its villains, and the ACME Timenet headquarters (a parody of World's ACME Crimenet). In each of these three titles, Thigpen assigned cases to the player through live-action video clips in her reprised role as Chief. Throughout Times two seasons, these video games were often given to players as prizes for winning. Clear Ink won the contract to create a website for Carmen Sandiego, which was released in line with the shipping of Time and Word. Kenneth Goldstein, who joined Broderbund in 1992 to "strengthen" the Carmen Sandiego series, was executive producer for the game. The game "supports the National Curriculum."
Development
By 1995, Where In The World Is Carmen Sandiego, the first television series based on the franchise, had been airing for five years. The show's producers at PBS decided it was time to "evolve the brand and put something new in front of their audience" that "carried over the core values of the original." Despite Broderbund having meetings to convince the producers to continue World due to its success, they persisted with their creation of a Where in Time spiritual sequel. At the time, Broderbund were putting Where in Time is Carmen Sandiego? into development as a CD-ROM game with a "completely new play paradigm" designed by Broderbund employee Jim Everson. Jim's vision was for Carmen Sandiego to transition into sequential adventure games interspersed with narrative-driven cut scenes. Broderbund put together a prototype based on this vision and showed it to PBS; they also noted a plan to include World cast member Lynne Thigpen as The Chief to introduce and summarize the cases. PBS loved the pitch and agreed to the use of their character, allowing for cross-platform synergy of the franchise.
While Broderbund had previous experience with point-and-click titles with the 1993 video game Myst, Time was the first game of the genre that was part of the Carmen Sandiego franchise. Breaking away from the 'clues to next location' style of gameplay, the developers chose a graphic adventure game, in which each case took place in one historical setting. This allows the player to experience the culture of each period, "learn[ing] about the history of the people, events and life conditions of the time," rather than simply obtaining a clue then traveling elsewhere. The game bears only cosmetic resemblance to the 1989 game of the same name, the latter uses the time-traveling Chronoskimmer, the theft of historical objects by Carmen's crooks, and a form of pun-based humor present in most games in the series. This game was often subtitled v3.0 as it was made in the same style and production batch as World 3.0 and USA 3.0 which are the third versions of their games. (While there was an Enhanced version of Time, it never received a remake in the Deluxe v2.0 style as did World and USA). Both versions of Time share a name though the game play is different. In Where in Time is Carmen Sandiego, the developers were able to incorporate QuickTime video of The Chief. At the time, Lynne Thigpen was playing The Chief on the television series as well. She flew out to San Francisco and recorded her parts in the Broderbund studio. Her presence allowed the developers to have streaming video of TV quality and a well-known actress in their game.
Though the company had experimented with other subject matter in previous Carmen Sandiego games, to many critics this title, along with Carmen Sandiego Word Detective (1997) and Carmen Sandiego Math Detective (1998), marked the franchise's debut in subjects other than geography. The Buffalo News said, "instead of world facts, they aim to teach lessons about history and word usage," adding that the transition was a "smooth one." The Providence Journal Bulletin wrote, "Broderbund's Where In Time is Carmen Sandiego and Carmen Sandiego Word Detective continue the great tradition of the original Carmen, expanding into [history] and language." The Christian Science Monitor wrote, "Now Carmen has taken her criminal activities beyond geography and into the realms of history, math, and the language arts," and argued that Time was "the most closely related to the series' prototype." Closed-captioned CD -ROMs were virtually non-existent by 1996 and there wasn't an organized effort to encourage multimedia companies to provide subtitles for plot-intensive products; Great Chase Through Time broke the mould by including a closed captioning option.
The straightforward question-answer puzzle game Carmen Sandiego's ThinkQuick Challenge (1999) was the final game to be developed by Broderbund; the company was acquired by the Learning Company in 1998, and on June 1, 1999, re-released Time with a minimal redesign and a name change from Where in Time Is Carmen Sandiego? to Carmen Sandiego's Great Chase Through Time.
Design
The character animation was done independently of the background design, and they were layered on the same screen after each element was produced. This allowed the same character animation to be placed in multiple backgrounds. For example, Sacagawea appears in both the opening and final scenes of Case 15 in an identical physical stance. Broderbund was very efficient with its workflow, having an assembly line system. The company's plan was to keep the look consistent throughout. Instead of putting each artist in charge of both design layout and painting, the tasks were given to two separate work streams, done by two separate groups of artists with different skill sets. Approximately two to three artists painted the backgrounds for the game, which began as prototype backgrounds before being colored in. The same system applied with the color models for animated characters. A full-time onsite employee came up with the look and feel of the design while freelance artists were hired to fulfill the vision. Layout artists were required to complete animation on top of static images. Many of those who worked on this game also contributed to World, U.S.A., and Word. Much of the design work took place between 1996–97. The opening, closing, and jailbreak sequences required special attention to ensure they were aesthetically impressive and told a succinctly visual narrative. In mid-1997, the three cut-scene sequences had to be painted over to give them a 3D effect which matched the backgrounds of the game levels. The freelance artists used PhotoShop, and instead of using tools such as Wacom tablets or handheld styluses, they painted with a mouse and developed painting techniques as they went. E.g. to give trees a "leafy look," an improvised technique was to "ha[ve] the mouse fade after two to three pixels [for] several strokes”.
Though the game was "carefully constructed to be fun and factual," in some cases the historical accuracy was sidestepped in favor of ease of gameplay, creating fun puzzles, and increasing visual clarity. The siege in Case 5 is entirely fictional and is a direct result of Carmen's crook stealing the Domesday Book, resulting in a perceived weakness in William's leadership and a rebellion to overthrow him. In addition, while efforts were made to convey historically accurate scenarios, they could only do so based on the available evidence from which they sometimes extrapolated. In situations where the truth is unknown, certain viewpoints were chosen. For example, while there is no evidence that Hatshepsut wore a false beard, she is often depicted wearing one in statues and hieroglyphs and the game's designers decided to include this "intriguing, if debatable, element." Often, the designers created simplified versions of long and complex concepts in order to reduce confusion and make cases shorter. Examples include the mummy-making process in Case 1, the feudal political system presented in Case 5, the sign language of the Plains and Rocky mountain regions in Case 15, and the Vostok rocket parts involved in Yuri Gagarin's spaceflight in Case 18. Also, modern titles were used in favour of contemporary ones in the case of "Pharaoh" for Hatshepsut, "Inca" for the Incan civilization itself, and "Edison" for Thomas Alva Edison. Similarly, a choice was made for every character to speak English instead of using subtitles for the sake of simplicity, even in time periods or locations where English was unknown or was not the local language.
Release
Interviewing Matt Fishbach, Associate Designer at Broderbund Software in January 1997, fansite The Sandiego Manor asked: "Are there going to be updated versions of Where in Time or America's Past?" (in response to the then-recent reboots of Where in the World? and Where in the USA?). He replied: "Quite likely. Look for an announcement at the upcoming Toy Fair event in NYC (in March, I believe)." The following month, on February 10, 1997, Broderbund released a press release explaining they would reveal the game at that year's Toy Fair, and it would be released in stores that fall. Where in Time is Carmen Sandiego? was unveiled at the Toy Fair in New York City by Broderbund later that year. Business Wire noted at the time, "The announcement of this new software title takes place on the heels of the recent releases of Where in the World is Carmen Sandiego? and Where in the USA is Carmen Sandiego?, both top five software titles this past holiday, and the successful launch of the new Where in Time is Carmen Sandiego? PBS game show for kids."
Broderbund Software's marketing strategy aimed at a target demographic: "young parents who have a computer at home and want their kids to learn while playing." To do this, it created edutainment titles with "entertaining graphics and sound," beta-tested them with kids to ensure they were easy to use, and made deals with retailers like Best Buy and Babbages. An MHHE document entitled Marketing's Role within the Firm or Nonprofit Organization explained "retailers are happy to give new Broderbund products shelf space because they know that Broderbund’s promotion will help bring customers into the store." In the case of Great Chase Through Time, Broderbund "not only placed ads in family-oriented computer magazines but also sent direct-mail flyers to its registered customers." Due to brand loyalty, Carmen Sandiego games were able to be sold for more money than software from other companies. Parents appreciated that it "cater[ed] to their needs and offer[ed] good customer value." The Mirror held a promotion where they would give away 10 copies of the video game through The A List. The game was included in the TLC School Alliance, which saw its titles being sold at discount at the NSBA Conference in Nashville and the California CUE Conference in Santa Clara. James Lyband Jackson, Computer Education Coordinator for both the YWCA/Day Care and the Church, included the "hands-on history" program as part of their education program. The School Edition of the game came with a three-ring binder to hold the software, a User's Guide, a custom-developed Teacher's Guide, and the resource book World History Simulations by Max W. Fischer.
Post-release
The game was released on two CD-ROMs, though later re-releases by The Learning Company had the game on one DVD-ROM with a dual layer, supplied with a 36-page instruction manual. This re-release came when the Learning Company changed the game's title to Carmen Sandiego's Great Chase Through Time after acquiring Broderbund's properties. As part of the Carmen Sandiego Social Studies Library, a School Edition of the game "c[ame] packaged in a sturdy three-ring binder that holds the software, User's Guide, a custom-developed Teacher's Guide, and the bonus resource book, World History Simulations, by Max W. Fischer." The Carmen Sandiego site explained: "Developed specifically to help you integrate the program into your classroom curriculum, the School Edition is loaded with lesson plans, reproducible student pages, bibliographies, and many other classroom resources."
Critical reception
Historical learning
While the structure of the earlier games has been criticized by paper The Child and the Machine: How Computers Put Our Children's Education at Risk for having historical people and places "pop up as isolated phenomena that are discarded as soon as they have served their purposes," this new version was often praised for adding context and a framework to absorb their learning. The Learning Village noted that by carefully listening to the story, the player exposes themselves to a variety of interesting historical events and periods, commenting that the historical content was accurate and clearly written. MacWorld noted "the game only skims the surface of most cultures, concentrating on a few select narrow aspects"; alternatively, Advocate deemed the video game "right on target." Anne Reeks of Parenting wrote the game delivers "bits of the era's culture, achievements, government, and technology." KidsWorld magazine noted, "you don't have to know a lot of history to enjoy this game, and there's an electronic reference book for help." Great Chase Through Time was cited by Mary E. Hocks in her journal article "Feminist interventions in electronic environments" as an example of a Carmen Sandiego game which "included educational information in a gender-neutral way and portrayed strong, intelligent women characters" such as the African-American Chief and the Hispanic Carmen Sandiego.
Kids appreciated that students could go to the Carmen Sandiego website for more in-depth learning into the time periods they experienced. Robin Ray of the Boston Herald wrote that the game "manages to bring the educational features inside the game itself," prompting children to learn in order to solve puzzles and complete the game, "never heavy-handed or off-putting [and] just part of the fun." Debbie Maria Leon of the New Straits Times said that "there's so much to learn in this ... fun, upbeat edutainment title" and that "each case is unique and challenging and offers a wealth of knowledge." ICT and Literacy said that "genuine historical clues are hidden in each screen and that each of the 18 cases is designed to be a "discrete historical source for an area of learning," additionally noting that the Chronopedia can "familiarize children with techniques necessary to use non-fiction CD-ROMs." The Sydney Morning Herald noted that "Asian and Australian history is all but neglected."
Deductive learning
The Learning Village noted that the game allows players to use their initiative and encourages them to investigate and think, commenting that the sleuthing aspects were "extremely well constructed, weaving together very cleverly the story telling, solving the challenge and uncovering the clues to find the thief." Anne Reeks of Parenting wrote "each mission delivers wit-sharpening riddles. Elizabeth Hurley of USA Today commented "The beauty of this program is that it's not just a history lesson, but a lesson in thinking," noting that it "has taken the boredom out of learning." FamilyPC said that their 66 testers most enjoyed the "thrill of the hunt and the knowledge they picked up along the way." Debbie Maria Leon of the New Straits Times thought "the high level of interactivity makes [the game] very engaging" and advised players not to "rush through the game [as] the thrill is in exploring for clues and making sense of them." ICT and Literacy noted that "satisfaction comes from detective work, mixed with chases, talking to historical and fictional figures," using skills such as problem-solving, deduction, research, decision-making, memorization, and hand-eye coordination must be used by the player, adding that finding the "baddie" and preventing the "historical disaster" is the reward for the player's efforts. The New York Times said that the game's mysteries were more plausible than those of the "conventional" Carmen Sandiego Math Detective.
Audiovisuals and design
Games Domain Review wrote that the game was enjoyable due to its humorous characters and lush graphics. Lisa Karen Savignano of Allgame noted the occasional goofiness and out-of-syncness, though acknowledged these problems didn't detract from the overall game. Meanwhile, the Milwaukee Journal Sentinel thought the game was lively without being too cutesy. Robin Ray of the Boston Herald wrote that the rebooted version of the game "corrects the faults of the earlier version and adds a lot of great new features." Kristie Rohwedder of Bustle ranked the game's instrumental theme sixth on a list of the best Carmen Sandiego songs. A negative assessment came from the book Telling Children about the Past: An Interdisciplinary Perspective, which suggested it was possible that the game's use of cartoons and stylized graphics were "projecting modern biases to the past and distorting it."
Mitch Gitman of the Pittsburgh Post-Gazette reviewed Carmen Sandiego's Great Chase Through Time, together with Carmen Sandiego Math Detective and Carmen Sandiego Word Detective, and said Time was the "smartest creative move [out] of the three new products," and that "the production value, with cinematic music and quality animation" makes Time all the more deep, and described it "[much more] ingenious and innovative" than either Word or Math." ICT and Literacy explains that the series "mak[es] history accessible to a wide audience" and that the game "fuses fiction with non-fiction in a sophisticated design." Debbie Maria Leon of the New Straits Times enjoyed the "myriad of clickable items are lurking in every scene, waiting to unleash just some more interesting and intriguing information." The Cedar Rapids Gazette noted the game is " packed with that same wry humor and word play of previous Carmen games." Home PC noted that the only downside of this "much improved" Where in Time is Carmen Sandiego? game was that it was a one-time play due to clues not being random and the mystery in each era remaining the same.
Difficulty and The Chief
The Learning Village felt the game "can be just as engaging for the parent to experience as for the child." Anne Reeks of Parenting thought the experience was "unlike earlier Carmen escapades, which dragged on." Kiplinger's Personal Finance noted the game's challenging nature and that it stumped several children who tested the game. The Milwaukee Journal Sentinel described Carmen Sandiego's Great Chase Through Time as "entertaining [and] challenging for their target age groups." Savignano wrote that the game is challenging but not particularly difficult, and that "some hints [and solutions to puzzles] are included with the manual [and] at the website." Karen Campbell of The Christian Science Monitor wrote, "There's a bit of trial and error involved when clues are not immediately apparent. It can get tedious for adults, but children, for whom the tactic is a natural part of learning, don't seem to mind." Telling Children about the Past: An Interdisciplinary Perspective noted the game's accessibility for those with disabilities by offering a hearing impaired assistance setting.
David Colker of the Los Angeles Times enjoyed the "on-screen presence of actress Lynne Thigpen," noting she brought "a winning presence to her role." Debbie Maria Leon of the New Straits Times wrote that "the urgency of the [confident Chief's] voice [gives] enough oomph to make [the player] go scurrying to restore history." Alternatively, Providence Journal - Bulletin wrote "There's a lot to learn along the way, but we spent a lot of time sitting through overblown speeches from the chief especially when we would rather have gotten on with it." Telling Children about the Past: An Interdisciplinary Perspective noted the game's defiance of stereotypes, featuring a leader who is female and black.
References
External links
The product info page pre-The Learning Company
The product info page post-The Learning Company
The product as part of Mattel Interactive in 2000
Where in Time is Carmen Sandiego? (1997) on The Cutting Room Floor, detailing information regarding things cut from the finished version of the game. Subpages detailing further information about the game:
The game's demo
Unused dialogue
Chronopedia entries
1997 video games
Adventure games
Time
Classic Mac OS games
Detective video games
Point-and-click adventure games
Single-player video games
Video games about time travel
Video game reboots
Video games developed in the United States
Video games set in San Francisco
Windows games
|
53289
|
https://en.wikipedia.org/wiki/File%20Transfer%20Protocol
|
File Transfer Protocol
|
The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).
The first FTP client applications were command-line programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.
In January 2021, support for the FTP protocol was disabled in Google Chrome 88, and disabled in Firefox 88.0. In July 2021, Firefox 90 dropped FTP entirely, and Google followed suit in October 2021, removing FTP entirely in Google Chrome 95.
History of FTP servers
The original specification for the File Transfer Protocol was written by Abhay Bhushan and published as on 16 April 1971. Until 1980, FTP ran on NCP, the predecessor of TCP/IP. The protocol was later replaced by a TCP/IP version, (June 1980) and (October 1985), the current specification. Several proposed standards amend , for example (February 1994) enables Firewall-Friendly FTP (passive mode), (June 1997) proposes security extensions, (September 1998) adds support for IPv6 and defines a new type of passive mode.
Protocol overview
Communication and data transfer
FTP may run in active or passive mode, which determines how the data connection is established. (This sense of "mode" is different from that of the MODE command in the FTP protocol, and corresponds to the PORT/PASV/EPSV/etc commands instead.) In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.
In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.
In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.
Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.
The server responds over the control connection with three-digit status codes in ASCII with an optional text message. For example, "200" (or "200 OK") means that the last command was successful. The numbers represent the code for the response and the optional text represents a human-readable explanation or request (e.g. <Need account for storing file>). An ongoing transfer of file data over the data connection can be aborted using an interrupt message sent over the control connection.
FTP needs two ports (one for sending and one for receiving) because it was originally designed to operate on Network Control Program (NCP), which was a simplex protocol that utilized two port addresses, establishing two connections, for two-way communications. An odd and an even port were reserved for each application layer application or protocol. The standardization of TCP and UDP reduced the need for the use of two simplex ports for each application down to one duplex port, but the FTP protocol was never altered to only use one port, and continued using two for backwards compatibility.
NAT and firewall traversal
FTP normally transfers data by having the server connect back to the client, after the PORT command is sent by the client. This is problematic for both NATs and firewalls, which do not allow connections from the Internet towards internal hosts. For NATs, an additional complication is that the representation of the IP addresses and port number in the PORT command refer to the internal host's IP address and port, rather than the public IP address and port of the NAT.
There are two approaches to solve this problem. One is that the FTP client and FTP server use the PASV command, which causes the data connection to be established from the FTP client to the server. This is widely used by modern FTP clients. Another approach is for the NAT to alter the values of the PORT command, using an application-level gateway for this purpose.
Data types
While transferring data over the network, four data types are defined:
ASCII (TYPE A): Used for text. Data is converted, if needed, from the sending host's character representation to "8-bit ASCII" before transmission, and (again, if necessary) to the receiving host's character representation. As a consequence, this mode is inappropriate for files that contain data other than plain text.
Image (TYPE I, commonly called Binary mode): The sending machine sends each file byte by byte, and the recipient stores the bytestream as it receives it. (Image mode support has been recommended for all implementations of FTP).
EBCDIC (TYPE E): Used for plain text between hosts using the EBCDIC character set.
Local (TYPE L n): Designed to support file transfer between machines which do not use 8-bit bytes, e.g. 36-bit systems such as DEC PDP-10s. For example, "TYPE L 9" would be used to transfer data in 9-bit bytes, or "TYPE L 36" to transfer 36-bit words. Most contemporary FTP clients/servers only support L 8, which is equivalent to I.
An expired Internet Draft defined a TYPE U for transferring Unicode text files using UTF-8; although the draft never became an RFC, it has been implemented by several FTP clients/servers.
Note these data types are commonly called "modes", although ambiguously that word is also used to refer to active-vs-passive communication mode (see above), and the modes set by the FTP protocol MODE command (see below).
For text files (TYPE A and TYPE E), three different format control options are provided, to control how the file would be printed:
Non-print (TYPE A N and TYPE E N) – the file does not contain any carriage control characters intended for a printer
Telnet (TYPE A T and TYPE E T) – the file contains Telnet (or in other words, ASCII C0) carriage control characters (CR, LF, etc)
ASA (TYPE A A and TYPE E A) – the file contains ASA carriage control characters
These formats were mainly relevant to line printers; most contemporary FTP clients/servers only support the default format control of N.
File structures
File organization is specified using the STRU command. The following file structures are defined in section 3.1.1 of RFC959:
F or FILE structure (stream-oriented). Files are viewed as an arbitrary sequence of bytes, characters or words. This is the usual file structure on Unix systems and other systems such as CP/M, MS-DOS and Microsoft Windows. (Section 3.1.1.1)
R or RECORD structure (record-oriented). Files are viewed as divided into records, which may be fixed or variable length. This file organization is common on mainframe and midrange systems, such as MVS, VM/CMS, OS/400 and VMS, which support record-oriented filesystems.
P or PAGE structure (page-oriented). Files are divided into pages, which may either contain data or metadata; each page may also have a header giving various attributes. This file structure was specifically designed for TENEX systems, and is generally not supported on other platforms. RFC1123 section 4.1.2.3 recommends that this structure not be implemented.
Most contemporary FTP clients and servers only support STRU F. STRU R is still in use in mainframe and minicomputer file transfer applications.
Data transfer modes
Data transfer can be done in any of three modes:
Stream mode (MODE S): Data is sent as a continuous stream, relieving FTP from doing any processing. Rather, all processing is left up to TCP. No End-of-file indicator is needed, unless the data is divided into records.
Block mode (MODE B): Designed primarily for transferring record-oriented files (STRU R), although can also be used to transfer stream-oriented (STRU F) text files. FTP puts each record (or line) of data into several blocks (block header, byte count, and data field) and then passes it on to TCP.
Compressed mode (MODE C): Extends MODE B with data compression using run-length encoding.
Most contemporary FTP clients and servers do not implement MODE B or MODE C; FTP clients and servers for mainframe and minicomputer operating systems are the exception to that.
Some FTP software also implements a DEFLATE-based compressed mode, sometimes called "Mode Z" after the command that enables it. This mode was described in an Internet Draft, but not standardized.
GridFTP defines additional modes, MODE E and MODE X, as extensions of MODE B.
Additional commands
More recent implementations of FTP support the Modify Fact: Modification Time (MFMT) command, which allows a client to adjust that file attribute remotely, enabling the preservation of that attribute when uploading files.
To retrieve a remote file timestamp, there's MDTM command. Some servers (and clients) support nonstandard syntax of the MDTM command with two arguments, that works the same way as MFMT
Login
FTP login uses normal username and password scheme for granting access. The username is sent to the server using the USER command, and the password is sent using the PASS command. This sequence is unencrypted "on the wire", so may be vulnerable to a network sniffing attack. If the information provided by the client is accepted by the server, the server will send a greeting to the client and the session will commence. If the server supports it, users may log in without providing login credentials, but the same server may authorize only limited access for such sessions.
Anonymous FTP
A host that provides an FTP service may provide anonymous FTP access. Users typically log into the service with an 'anonymous' (lower-case and case-sensitive in some FTP servers) account when prompted for user name. Although users are commonly asked to send their email address instead of a password, no verification is actually performed on the supplied data. Many FTP hosts whose purpose is to provide software updates will allow anonymous logins.
Differences from HTTP
HTTP essentially fixes the bugs in FTP that made it inconvenient to use for many small ephemeral transfers as are typical in web pages.
FTP has a stateful control connection which maintains a current working directory and other flags, and each transfer requires a secondary connection through which the data are transferred. In "passive" mode this secondary connection is from client to server, whereas in the default "active" mode this connection is from server to client. This apparent role reversal when in active mode, and random port numbers for all transfers, is why firewalls and NAT gateways have such a hard time with FTP. HTTP is stateless and multiplexes control and data over a single connection from client to server on well-known port numbers, which trivially passes through NAT gateways and is simple for firewalls to manage.
Setting up an FTP control connection is quite slow due to the round-trip delays of sending all of the required commands and awaiting responses, so it is customary to bring up a control connection and hold it open for multiple file transfers rather than drop and re-establish the session afresh each time. In contrast, HTTP originally dropped the connection after each transfer because doing so was so cheap. While HTTP has subsequently gained the ability to reuse the TCP connection for multiple transfers, the conceptual model is still of independent requests rather than a session.
When FTP is transferring over the data connection, the control connection is idle. If the transfer takes too long, the firewall or NAT may decide that the control connection is dead and stop tracking it, effectively breaking the connection and confusing the download. The single HTTP connection is only idle between requests and it is normal and expected for such connections to be dropped after a time-out.
Software support
Web browser
Most common web browsers can retrieve files hosted on FTP servers, although they may not support protocol extensions such as FTPS. When an FTP—rather than an HTTP—URL is supplied, the accessible contents on the remote server are presented in a manner that is similar to that used for other web content. FireFTP is an browser extension designed as a full-featured FTP client, it could be run within Firefox in the past, but it's now recommend working with Waterfox.
Google Chrome removed FTP support entirely in Chrome 88. As of 2019, Mozilla was discussing proposals, including only removing support for old FTP implementations that are no longer in use to simplify their code. In April, 2021, Mozilla released Firefox 88.0 which disabled FTP support by default. In July 2021, Firefox 90 dropped FTP support entirely.
Syntax
FTP URL syntax is described in , taking the form: ftp://[user[:password]@]host[:port]/url-path (the bracketed parts are optional).
For example, the URL ftp://public.ftp-servers.example.com/mydirectory/myfile.txt represents the file myfile.txt from the directory mydirectory on the server public.ftp-servers.example.com as an FTP resource. The URL ftp://user001:[email protected]/mydirectory/myfile.txt adds a specification of the username and password that must be used to access this resource.
More details on specifying a username and password may be found in the browsers' documentation (e.g., Firefox and Internet Explorer). By default, most web browsers use passive (PASV) mode, which more easily traverses end-user firewalls.
Some variation has existed in how different browsers treat path resolution in cases where there is a non-root home directory for a user.
Download manager
Most common download managers can receive files hosted on FTP servers, while some of them also give the interface to retrieve the files hosted on FTP servers. DownloadStudio and Internet Download Accelerator allows not only download a file from FTP server but also view the list of files on a FTP server.
Security
FTP was not designed to be a secure protocol, and has many security weaknesses. In May 1999, the authors of listed a vulnerability to the following problems:
Brute-force attack
FTP bounce attack
Packet capture
Port stealing (guessing the next open port and usurping a legitimate connection)
Spoofing attack
Username enumeration
DoS or DDoS
FTP does not encrypt its traffic; all transmissions are in clear text, and usernames, passwords, commands and data can be read by anyone able to perform packet capture (sniffing) on the network. This problem is common to many of the Internet Protocol specifications (such as SMTP, Telnet, POP and IMAP) that were designed prior to the creation of encryption mechanisms such as TLS or SSL.
Common solutions to this problem include:
Using the secure versions of the insecure protocols, e.g., FTPS instead of FTP and TelnetS instead of Telnet.
Using a different, more secure protocol that can handle the job, e.g. SSH File Transfer Protocol or Secure Copy Protocol.
Using a secure tunnel such as Secure Shell (SSH) or virtual private network (VPN).
FTP over SSH
FTP over SSH is the practice of tunneling a normal FTP session over a Secure Shell connection. Because FTP uses multiple TCP connections (unusual for a TCP/IP protocol that is still in use), it is particularly difficult to tunnel over SSH. With many SSH clients, attempting to set up a tunnel for the control channel (the initial client-to-server connection on port 21) will protect only that channel; when data is transferred, the FTP software at either end sets up new TCP connections (data channels) and thus have no confidentiality or integrity protection.
Otherwise, it is necessary for the SSH client software to have specific knowledge of the FTP protocol, to monitor and rewrite FTP control channel messages and autonomously open new packet forwardings for FTP data channels. Software packages that support this mode include:
Tectia ConnectSecure (Win/Linux/Unix) of SSH Communications Security's software suite
Derivatives
FTPS
Explicit FTPS is an extension to the FTP standard that allows clients to request FTP sessions to be encrypted. This is done by sending the "AUTH TLS" command. The server has the option of allowing or denying connections that do not request TLS. This protocol extension is defined in . Implicit FTPS is an outdated standard for FTP that required the use of a SSL or TLS connection. It was specified to use different ports than plain FTP.
SSH File Transfer Protocol
The SSH file transfer protocol (chronologically the second of the two protocols abbreviated SFTP) transfers files and has a similar command set for users, but uses the Secure Shell protocol (SSH) to transfer files. Unlike FTP, it encrypts both commands and data, preventing passwords and sensitive information from being transmitted openly over the network. It cannot interoperate with FTP software.
Trivial File Transfer Protocol
Trivial File Transfer Protocol (TFTP) is a simple, lock-step FTP that allows a client to get a file from or put a file onto a remote host. One of its primary uses is in the early stages of booting from a local area network, because TFTP is very simple to implement. TFTP lacks security and most of the advanced features offered by more robust file transfer protocols such as File Transfer Protocol. TFTP was first standardized in 1981 and the current specification for the protocol can be found in .
Simple File Transfer Protocol
Simple File Transfer Protocol (the first protocol abbreviated SFTP), as defined by , was proposed as an (unsecured) file transfer protocol with a level of complexity intermediate between TFTP and FTP. It was never widely accepted on the Internet, and is now assigned Historic status by the IETF. It runs through port 115, and often receives the initialism of SFTP. It has a command set of 11 commands and support three types of data transmission: ASCII, binary and continuous. For systems with a word size that is a multiple of 8 bits, the implementation of binary and continuous is the same. The protocol also supports login with user ID and password, hierarchical folders and file management (including rename, delete, upload, download, download with overwrite, and download with append).
FTP commands
FTP reply codes
Below is a summary of FTP reply codes that may be returned by an FTP server. These codes have been standardized in by the IETF. The reply code is a three-digit value. The first digit is used to indicate one of three possible outcomes — success, failure, or to indicate an error or incomplete reply:
2yz – Success reply
4yz or 5yz – Failure reply
1yz or 3yz – Error or Incomplete reply
The second digit defines the kind of error:
x0z – Syntax. These replies refer to syntax errors.
x1z – Information. Replies to requests for information.
x2z – Connections. Replies referring to the control and data connections.
x3z – Authentication and accounting. Replies for the login process and accounting procedures.
x4z – Not defined.
x5z – File system. These replies relay status codes from the server file system.
The third digit of the reply code is used to provide additional detail for each of the categories defined by the second digit.
See also
References
Further reading
– CWD Command of FTP. July 1975.
– (Standard) File Transfer Protocol (FTP). J. Postel, J. Reynolds. October 1985.
– (Informational) Firewall-Friendly FTP. February 1994.
– (Informational) How to Use Anonymous FTP. May 1994.
– FTP Operation Over Big Address Records (FOOBAR). June 1994.
– Uniform Resource Locators (URL). December 1994.
– (Proposed Standard) FTP Security Extensions. October 1997.
– (Proposed Standard) Feature negotiation mechanism for the File Transfer Protocol. August 1998.
– (Proposed Standard) Extensions for IPv6, NAT, and Extended passive mode. September 1998.
– (Informational) FTP Security Considerations. May 1999.
– (Proposed Standard) Internationalization of the File Transfer Protocol. July 1999.
– (Proposed Standard) Extensions to FTP. P. Hethmon. March 2007.
– (Proposed Standard) FTP Command and Extension Registry. March 2010.
– (Proposed Standard) File Transfer Protocol HOST Command for Virtual Hosts. March 2014.
IANA FTP Commands and Extensions registry – The official registry of FTP Commands and Extensions
External links
FTP Server Online Tester Authentication, encryption, mode and connectivity.
Anonymous FTP Servers by Country Code TLD (2012):
Application layer protocols
Clear text protocols
Computer-related introductions in 1971
History of the Internet
Internet Standards
Network file transfer protocols
OS/2 commands
Unix network-related software
File sharing
|
5115989
|
https://en.wikipedia.org/wiki/InfoPark%2C%20Kochi
|
InfoPark, Kochi
|
Infopark, Kochi is an information technology park situated in the city of Kochi, Kerala, India. Established in 2004 by the Government of Kerala, the park is spread over of campus across two phases, housing 450 companies which employ more than 50,000 professionals as of 2020.
The notable tenants in the park include Indian Technology giants like Tata Consultancy Services, Wipro, HCL Technologies, UST Global, BYJU'S, IBS Software etc. and foreign corporations like IBM, Cognizant, KPMG, Ernst & Young, IQVIA, Xerox, Conduent, EXL Service, Hubbell, Alight, Nielsen, Quest Global, Fragomen, Orion Innovation, Marlabs, Buck etc.
The Phase 1 campus is fully developed spread over a with more than of operational built-up space. Infopark Phase II is spread over of campus area which would have a total built-up space of upon completion and is expected to employ more than 100,000 professionals.
The Infopark campus currently has of built-up area and is the major contributor of IT export revenue from the state of Kerala. IT exports from Infopark which stood at in 2016–17, doubled in a period of 4 years, rising to in 2020–21. A huge real estate boom was triggered soon after Infopark started to attract big MNCs from around the globe. Infopark changed the landscape and lifestyle of Kochi, particularly the Kakkanad area. A new culture got evolved and more and more commercial and residential ventures started to rise up which then extended the limits of Kochi city to further north end.
The park is built on the 'Hub and Spoke model' for the development of the Information Technology industry in Kerala. InfoPark Kochi acts as the hub to the spokes located at Thrissur and Cherthala.
Location and connectivity
Infopark is from downtown Kochi and from the Cochin International Airport. Infopark is connected to Seaport-Airport Road via the Infopark Expressway, a 4-lane road. Kerala State Water Transport Department operates boat service between Kakkanad and Vyttila Mobility Hub. The Ernakulam district administration, which comprise the city of Kochi has proposed a waterway connecting InfoPark to Marine Drive, Kochi.
The Infopark campus lies adjacent to SmartCity, Kochi, an information technology park, making the town of Kakkanad a very important center for IT/ITES in the state of Kerala.
VSNL's communication gateway, is located close to Infopark. Two submarine cables, SAFE and SEA-ME-WE 3, have their landing points at the gateway. Infopark is directly linked by optical fiber to the gigabyte router of VSNL, which provides the park with 100% uptime data connectivity. Other major bandwidth providers such as BSNL, Reliance, Bharti Airtel and Power Grid Corporation are also present in the park.
Revenue and growth
Over the last few years revenues from Infopark has been growing at an impressive rate. In FY 2008-2009 the park reported a growth of 87% to Rs. 463 crore. Infopark registered export revenues of Rs. 750 crore in 2010-11, Rs. 1,095 crore in 2011-12, Rs. 1,534 crore in 2012-13. IT exports from Infopark continue to register strong growth in the 2013-14 financial year, with revenues surging 53 per cent year-on-year to Rs 2,350 crore.
The IT park which is just ten years old has shown tremendous growth in the number of companies and software exports than any other park in the state. Kochi offers good opportunities for companies keen on reducing operational costs, hiring talented professionals, and reducing the rate of attrition. Since its inception in 2004, Infopark has created over three million sq. ft. of work space and intends to double this to six million sq. ft. over the next couple of years. The park also expects to generate over 10,000 additional jobs during the financial year 2015-16.
The work for the second phase of Infopark is progressing well and a number of global IT firms have come up with proposals to set up their campus at the Rs 2,500 crore project, which is expected to be completed by 2020.
Apart from the built-up space for IT, Infopark plans to have a large business convention centre, budget hotels, shopping complexes, commercial centers, recreation and entertainment facilities. Infrastructure development is ongoing.
Educational Institutions
Kochi InfoPark hosts one of the prominent educational and research institutes. The Indian Institute of Management Kozhikode (IIM–K) has set up it first satellite campus at Athulya building in InfoPark. Jain University in Kochi opened in 2019. The satellite campus, initially, offers one-year residential executive MBA programme as well as two-year part-time programmes in addition to several short and long-term management development programmes. The Government of Kerala has offered five acres of land for the full-fledged campus inside InfoPark.
Infrastructure
Infopark campus is divided into Special Economic Zone (SEZ) and non – SEZ facility. Of the existing 98.25 acres of Infopark, 75 acres has been notified as a Special Economic Zone by the Ministry of Commerce, Government of India. The infrastructure developed in the park has been classified as Muilti tenanted facility (MTF)and Built to suit (BTS).
Apart from Infopark owned infrastructure (Thapasya, Vismaya, Athulya), parallel developments by co-developers such as Leela Soft, L&T Techpark and Brigade Enterprises are also taking shape in the campus. Thus offering IT companies a choice of office space solutions to fit their requirement and budget. Major Private IT campus by Wipro, TCS and IBS Software are also in progress. When Infopark Kochi Phase-I is fully developed a total super built-up area of 5 million sqft would be completed. The campus includes amenities such as food courts, banking counters, ATM, shopping arcade, etc.
In 2014, Leela Infopark, a non – SEZ facility owned by Leela Lace Holding Pvt Ltd was acquired by Mumbai-based Carnival Group for INR 280 Crores and the name of the project was changed to Carnival Infopark Lulu Group has acquired the L&T Tech Park for INR 150 Crores and the name of the project was changed to Lulu Tech Park.
Smart Business Centre (SBC) is provided to facilitate Indian and foreign IT/ITES and knowledge based companies to commence operations immediately from a plug and play facility at Infopark.
Infopark Phase II
Considering the requests of various IT companies and developers for space and land, Infopark Kochi is expanding its activities in Infopark Phase II. The Jyothirmaya building inaugurated by the Chief Minister of Kerala on Jan 22 2017 is at a distance of around 1.6 km from Phase I campus and is on the side of Kadamprayar river. The new park is envisaged to be a landmark in the IT history of Kerala with both SEZ and non-SEZ type of development and social infrastructure. The new park lies in an extent of 160 acres in the neighboring Kunnathunad- Puthencruz villages of Kunnathunad Taluk, Ernakulam District. The Board of Approvals (BoA) of the Union Ministry of Commerce have granted SEZ status to the 98 acres in Infopark phase II.
A master plan for the second phase envisages infrastructure development for cost-effective Software development blocks in SEZ and non-SEZ clusters, BPO complexes, utility services including substation, water treatment plant, sewage treatment plant, road network, etc. The park will be designed as an eco-friendly green park with high energy-saving measures and least carbon emission. The existing ecosystem will be maintained to the highest possible level. Apart from the built-up space for IT, the park will have a large business convention center the first of its kind in Kochi, budget hotels, shopping complexes, commercial centers, recreation, and entertainment centers.
Infopark along with its co-developers expect to create 8 million sq.ft. of IT/ITES/BPO and associated basic infrastructure and commercial and social infrastructure space. The basic infrastructure that will be developed by Infopark will include a 220 kV Gas Insulated Substation (GIS) with distribution facilities, access, and internal roads, stormwater drains, cable trenches, water treatment, and supply, data connectivity, etc. Master Plan of the Park has been developed by CannonDesign, New York-based Architectural Consultant.
Three multinational companies have already evinced interest in the Rs 2,500 crore, 8 Million sqft Phase II of Infopark Kochi. The second phase, which will create 80,000 software jobs, is expected to be completed in eight years. Infrastructure development will be undertaken in a phased manner and will be completed by 2011. The construction of the first IT building of around 5 lakhs sq.ft. has commenced and is expected to be completed by December 2012. On full completion, total employment expected to be generated in this new campus is 80,000.
Cognizant Technology Solutions has a 1.6 Million Sq.Ft self owned campus in 15 acres in Infopark phase II.
UST Global is also all set to start a new campus at Infopark Phase II.
Branches
Infopark has branched out to nearby cities and towns. The park is built on the 'Hub and Spoke model' for the development of the Information Technology industry in Kerala. InfoPark, Kochi acts as the hub to the spokes located at Thrissur and Cherthala
Infopark Thrissur
Infopark Thrissur is located at Koratty which is around 45 km from Kochi in Thrissur District. It is approximately 20 km from Cochin International Airport at Nedumbassery. The park is situated very close to the National Highway 47. Currently, Infopark, Thrissur possesses 30 acres of prime land. It is expected that some more land also will be added to the Park in the near future. Infrastructure development work for the Park has already commenced. The first set of IT Buildings of approximately 40,000 sft area with plug and play facilities is ready and companies have started setting-up operations at Thrissur. Phase-II additional 3,30 lakhs sft of space will be ready for allotment by October 2015. Close proximity to the airport and national highway with uninterrupted Power, Water and Connectivity has already generated keen interest among IT Entrepreneurs to commence operations from Infopark, Thrissur.
Infopark Cherthala
Located in Pallipuram village, Cherthala taluk of Alappuzha District. The total area of the park is 66 acres of which 60 acres has been notified as a sector-specific Special Economic Zone by the Ministry of Commerce, Government of India vide notification dated 8 June 2009. The First IT Building by Infopark having an area of 2.4 lakhs sq.ft is now ready for operations. Ready to move in Plug n Play options for Start-ups and Small Medium Companies and Warm shell options for Companies who are looking for a big scale space. The IT Building is well equipped to suit the IT Companies with Food courts, Conference Hall, Discussion Rooms, Game Zones, etc.
Transportation
There are a large number of private buses which operate into the InfoPark campus from different corners of Kochi city such as Aluva, downtown Ernakulam and Thripunithura. KURTC operates AC low-floor bus services to and from InfoPark.
A boat service runs between Vyttila Mobility Hub and Kakkanad jetty, which is located close to the InfoPark Expressway. This ferry covers the distance between Vyttila and Kakkanad in 20 minutes.
The Kochi Metro rail has planned its extension to Kakkanad from Kaloor Stadium. This extension will terminate at InfoPark with a metro station each at Phase-I and Phase-II campuses, thus giving efficient metro rail connectivity to the IT park.
The lack of transport connectivity to Infopark at Kakkanad is a big hurdle for the 30,000 workforces. At a workshop on ‘Connecting the Dots on Public Transport’, recently organized by CPPR and WTC, Kochi has come up with a slew of proposals to develop public transport in the area. These, include re-routing of buses or providing additional bus services to the area, introducing modern transportation infrastructure such as demand-based bus systems and improving existing water and road connectivity to the area.
See also
Cyberpark
Economy of Kochi
Infopark, Thrissur
Smart City, Kochi
Cyber City, Kochi
Electronics City, Kochi
Technopark, Trivandrum
Infopark Cherthala
References
External links
Official site
Infopark Jobs
Infopark Companies
Infopark Blog
Cyberparkkerala.org
Keralait.org
Economy of Kochi
2004 establishments in Kerala
Software technology parks in Kerala
Government-owned companies of Kerala
|
6711184
|
https://en.wikipedia.org/wiki/VTLS
|
VTLS
|
VTLS Inc. was a global company that provided library automation software and services to a diverse customer base of more than 1900 libraries in 44 countries. The for-profit company was founded in 1985 by Dr. Vinod Chachra, who became the President and CEO of the company. VTLS originated as "Virginia Tech Library Systems", an automated circulation and cataloging system created for Virginia Tech’s Newman Library in 1975. In addition to its headquarters in Blacksburg, Virginia, United States, VTLS had five international offices in Australia, Brazil, India, Malaysia and Spain. VTLS was one of the few ISO 9001:2008 quality-certified companies within the library industry for many years. The company was acquired by Innovative Interfaces in 2014.
History
VTLS Inc. was the offspring of a project launched in 1974 at Virginia Polytechnic Institute and State University's (Virginia Tech’s) Newman Library, a member of the Association of Research Libraries with more than 2 million cataloged volumes. Having explored available library automation alternatives and having found no system suitable for the needs of its libraries, Virginia Tech initiated a development project to create an automated library system, spearheaded by Dr. Vinod Chachra, head of Systems Development (SD). This forerunner of VTLS Classic and Virtua, consisting of an Online Public Access Catalog (OPAC) and an automated circulation system, was installed at Virginia Tech's Newman Library in September 1975.
By 1980, the software had evolved into the integrated library system (ILS) known as "VTLS Classic", a MARC based ILS including library automation. In 1983, VTLS became the first integrated library system to implement linked Authority Control and to feature full integration and support of the MARC Format for bibliographic records. On July 1, 1985, VTLS Inc. was formed by Dr. Vinod Chachra as a subsidiary corporation of Virginia Tech Intellectual Properties (VTIP), which granted VTLS Inc. exclusive, worldwide rights to enhance and market VTLS software. The ensuing years witnessed dramatic growth for VTLS and innovative development of the VTLS system. By 1987, VTLS became the first ILS to fully support the US MARC Format for Holdings and Locations in a fully integrated Serials Control Subsystem. In 1989, VTLS introduced a multilingual user interface design that allowed users to change language dynamically within their user session. VTLS also began offering imaging services and digital library solutions in 1993.
In 1998, VTLS launched their next-generation library automation suite with the first release of the "Virtua Integrated Library System" (ILS). Virtua incorporated all of the functionality of VTLS Classic but utilized an entirely new software architecture that included full Unicode support throughout the system as well as full native Z39.50 support. Since the introduction of Virtua, VTLS continued to develop support for new standards and emerging technologies. In 2000, VTLS introduced support for radio-frequency identification (RFID) technology for circulation and security, later expanding it into the "Fastrac" product division. In 2002, VTLS introduced full support for Functional Requirements for Bibliographic Records (FRBR), a key bibliographic standard enabling full Resource Description and Access (RDA) Level 1 implementation. In 2004, VTLS introduced the "VITAL Digital Asset Management System". Later developments focused on discovery software for patrons with the introduction of "Visualizer Discovery" in 2008, the "Chamo Social OPAC" in 2009, and a hybrid of the two products called "Chamo Discovery" in 2012. VTLS later introduced a service called "Vorpal Solutions", which offered custom Drupal modules that allowed deployment of a complete custom Drupal-based front-end for VTLS solutions. This was followed in 2013 by the introduction of the "Open Skies" unified software platform initiative, planning for the future interconnectivity of various VTLS-based software components as well as more open connectivity with external library services.
Throughout its history, VTLS was a member of many industry organizations, including: American Library Association (ALA), Book Industry Study Group (BISG), Coalition for Networked Information (CNI), EDUCAUSE, International Federation of Library Associations and Institutions (IFLA), MARBI, National Information Standards Organization (NISO) for Z39.50, Online Computer Library Center (OCLC), the Unicode Consortium, and the Virginia Business Pipeline (VBP). VTLS was also a founding member of the Coalition for Networked Information (CNI).
In June 2014, VTLS was purchased by Innovative Interfaces Inc., who continues to actively develop and support most of the VTLS-based software suites.
References
External links
Innovative Interfaces Inc. Website
Innovative Interfaces Company Profile on Library Technology Guides (Maintained by Marshal Breeding)
1985 establishments in Virginia
Virginia Tech
Blacksburg, Virginia
Companies established in 1985
Library automation
Library-related organizations
Software companies based in Virginia
Software companies of the United States
|
48291822
|
https://en.wikipedia.org/wiki/Naenara%20%28browser%29
|
Naenara (browser)
|
Naenara is a North Korean intranet web browser software developed by the Korea Computer Center for use of the national Kwangmyong intranet. It is developed from a version of Mozilla Firefox and is distributed with the Linux-based operating system Red Star OS that North Korea developed due to licensing and security issues with Microsoft Windows.
Design
Naenara is a modified version of Mozilla Firefox. Red Star OS and Naenara were developed by the Korea Computer Center that states on its web page that it seeks to develop Linux-based software for use.
Naenara can be used to browse approximately 1,000 to 5,500 websites in the national Kwangmyong intranet.
When Naenara is run, it tries to contact an IP address at http://10.76.1.11/. The default search engine for the browser is Google Korea.
See also
Samjiyon tablet computer
References
External links
Computing and society
Internet in North Korea
Linux web browsers
|
44929752
|
https://en.wikipedia.org/wiki/Hewlett%20Packard%20Enterprise
|
Hewlett Packard Enterprise
|
The Hewlett Packard Enterprise Company (HPE) is an American multinational enterprise information technology company based in Spring, Texas, United States.
HPE was founded on November 1, 2015, in Palo Alto, California, as part of the splitting of the Hewlett-Packard company. It is a business-focused organization which works in servers, storage, networking, containerization software and consulting and support.
The split was structured so that the former Hewlett-Packard Company would change its name to HP Inc. and spin off Hewlett Packard Enterprise as a newly created company. HP Inc. retained the old HP's personal computer and printing business, as well as its stock-price history and original NYSE ticker symbol for Hewlett-Packard; Enterprise trades under its own ticker symbol: HPE. At the time of the spin-off, HPE's revenue was slightly less than that of HP Inc.
In 2017, HPE spun off its Enterprise Services business and merged it with Computer Sciences Corporation to become DXC Technology. Also in 2017, it spun off its software business segment and merged it with Micro Focus.
HPE was ranked No. 107 in the 2018 Fortune 500 list of the largest United States corporations by total revenue.
Naming
The full name for the company is "Hewlett Packard Enterprise Company", which drops the hyphen that previously existed between the "Hewlett" and "Packard" of the former Hewlett-Packard Company. The company is commonly referred to as "Hewlett Packard Enterprise" or by its initials "HPE".
The company has also been referred to as "HP Enterprise" by some media outlets and has even been incorrectly referred to as "HP Enterprises".
History
In May 2016, the company announced it would sell its enterprise services division to one of its competitors, Computer Sciences Corporation in a deal valued at . The merger of HPE Enterprise Services with CSC, to form a new company DXC Technology, was completed on March 10, 2017. Approximately 100,000 current HPE employees were affected. More than 30,000 services employees from other areas of the HPE business will remain at HPE including technology services support and consulting as well as software professional services.
In August 2016, the company announced plans to acquire Silicon Graphics International (SGI), known for their capabilities in high performance computing. On November 1, 2016, HPE announced it completed the acquisition, for per share in cash, a transaction valued at approximately , net of cash and debt.
On September 7, 2016, HPE announced a "spin-merge" with Micro Focus, who would acquire HPE's "non-core" software (which included the HP Autonomy unit), and HPE shareholders would own 50.1 percent of the merged company, which would retain its current name. The merger concluded on September 1, 2017.
In November 2016, PC World wrote that "HPE, and before it, Hewlett-Packard, failed to develop middleware tools to really make a dent in the software market, where other companies like IBM, SAP, and Oracle are excelling," and that "without major software product lines, HPE's integrated offerings won't be as strong as competitors like Dell, which have the software and hardware assets", adding that "If all HPE is doing at this point is focusing largely on hardware, you have to ask what the end game here is."
In September 2016, Hewlett Packard Enterprise transferred two patents to Texas-based wholly owned shell company Plectrum LLC. These two patents were originated at the 3Com Corporation, which was bought by HP in 2010, along with about 1,400 patents. is entitled "Quality of service control mechanism and apparatus," while describes the use of a "high speed cache management unit" which replaces some software-based systems with hardware in order to reduce latency time.
On April 11, 2017, it was reported that Synack had raised in a round of funding that included Hewlett Packard Enterprise.
In January 2017, the company acquired data management platform SimpliVity, the developer of the OmniCube hyper-converged infrastructure appliance, for US$650M.
In April 2017, Hewlett Packard Enterprise completed its acquisition of hybrid flash and all flash manufacturer, Nimble Storage Inc, for or per share. In October, Reuters reported that the company had allowed a Russian defense agency to examine a cyber-defense system used by The Pentagon. The report noted: "Six former U.S. intelligence officials, as well as former ArcSight [Hewlett Packard Enterprise] employees and independent security experts, said the source code review could help Moscow discover weaknesses in the software, potentially helping attackers to blind the U.S. military to a cyber attack."
In November 2017, Meg Whitman announced that she would be stepping down as CEO, after six years at the helm of HP and HPE, stating that, on February 1, 2018, Antonio Neri would officially become HPE's president and chief executive officer. The announcement created controversy leading to a 6% drop in stock price, which quickly recovered during the next few days.
In June 2018, Hewlett Packard Enterprise launched a hybrid cloud service called GreenLake Hybrid Cloud, built on top of HPE's OneSphere cloud management SaaS console, offered under its brand HPE GreenLake. GreenLake is designed to provide cloud management, cost control, and compliance control capabilities, and will run on AWS and Microsoft Azure. GreenLake includes cloud data services for containers, machine learning, storage, compute, data protection and networking through a management portal called GreenLake Central.
In February 2019, Meg Whitman announced she would not be seeking re-election to the board of directors, ending her professional involvement in HPE.
In May 2019, Hewlett Packard Enterprise announced plans to acquire Cray Inc for per share. The announcement came soon after Cray had landed a US Department of Energy contract to supply the Frontier supercomputer to Oak Ridge National Laboratory in 2021. The acquisition was completed in September 2019 in a transaction valued at approximately .
In December 2020, Hewlett Packard Enterprise disclosed it is relocating its corporate headquarters from San Jose, California to Spring, Texas, a northern suburb of Houston. As of December 2021, HPE headquarters remain at the former HP property and headquarters campus of Compaq in northwest Harris County near SH 249 and Louetta. Construction of the new Springwoods Village campus in Spring is expected to complete sometime in early 2022. Concerns about major flooding at the Compaq complex were a contributing factor for HPE CEO Antonio Neri to have the new campus built. The old campus had previously been flooded by Hurricane Harvey in 2017.
Corporate affairs
The headquarters is in Houston, in a limited purpose annexation area.
Operating segments
Intelligent Edge (10% of FY20 revenue) – offers platforms designed for network security, including Aruba Networks and Silver Peak Systems
HPC & MCS (11% of FY20 revenue) – High Performance Compute and Mission Critical Systems. Also includes Hewlett Packard Labs
Compute (44% of FY20 revenue) – the core server business
Storage (17% of FY20 revenue) – the core storage business, including recent acquisition Zerto
HPE Financial Services (12% of FY20 revenue) – provides financing services for HPE customers and partners
A&PS (4% of FY20 revenue) – Advisory and Professional Services through 'HPE Pointnext'.
Corporate Investments (2% of FY20 revenue) – includes 'HPE Pathfinder' (HPE's venture capital arm) and the Communications Technology Group
CEO Antonio Neri announced in 2019 that he expects all products to be sold 'as a service' by 2022 via HPE Greenlake.
Products
Intelligent Edge: Aruba Networks, Silver Peak Systems, FlexFabric
HPC & MCS: Apollo (High-Performance Computing), Cray
Compute: HP XP, HPE GreenLake Hybrid Cloud, ProLiant, Edgeline, Cloudline, Synergy, OneView, OneSphere, ProLiant, Synergy, Cloudline, Edgeline, HPE Integrity Servers, NonStop, HPE Superdome, Apollo (High-Performance Computing), Simplivity (HyperConvergence)
Storage: HPE 3PAR, StoreOnce, StoreEver, Nimble Storage, HP XP, HPE GreenLake Hybrid Cloud, HPE Alletra, HPE Primera, MSA, Nimble & Alletra dHCI
Communications Technology Group: OpenCall and Service Activator
Acquisitions
Note: Aruba Networks was acquired by the Hewlett-Packard Company before demerger and was inducted into Hewlett Packard Enterprise while demerging.
Carbon footprint
HPE reported Total CO2e emissions (Direct + Indirect) for the twelve months ending 30 September 2020 at 343 Kt (-48 /-12.4% y-o-y). The company commits to reduce emissions by 55% by 2025 from 2016 base year, and this science-based target is aligned with the Paris Agreement to limit global warming to 1.5 °C above pre-industrial levels.
See also
List of networking hardware vendors
HP Inc. – the demerged sibling company that offers printers and personal computers.
Hewlett Packard Labs – the research & development arm of Hewlett Packard Enterprise.
References
External links
2015 establishments in California
American companies established in 2015
Companies listed on the New York Stock Exchange
Computer storage companies
Cloud computing providers
Information technology companies of the United States
Multinational companies headquartered in the United States
Software companies of the United States
Software companies based in Texas
Computer companies established in 2015
Software companies established in 2015
Corporate spin-offs
Companies based in Houston
|
31815567
|
https://en.wikipedia.org/wiki/Glitch%20art
|
Glitch art
|
Glitch art is the practice of using digital or analog errors for aesthetic purposes by either corrupting digital data or physically manipulating electronic devices. Glitches appear in visual art such as the film A Colour Box (1935) by Len Lye, the video sculpture TV Magnet (1965) by Nam June Paik and more contemporary work such as Panasonic TH-42PWD8UK Plasma Screen Burn (2007) by Cory Arcangel.
History of the term
As a technical word, a glitch is the unexpected result of a malfunction, especially occurring in software, video games, images, videos, audio, and other digital artefacts. Early examples of glitches used in media art include Digital TV Dinner (1978) created by Jamie Fenton and Raul Zaritsky, with glitch audio done by Dick Ainsworth. This video was made by manipulating the Bally video game console and recording the results on videotape.
The term glitch came to be associated with music in the mid 90s to describe a genre of experimental/noise/electronica (see glitch music). Shortly after, as VJs and other visual artist began to embrace the glitch as an aesthetic of the digital age, glitch art came to refer to a whole assembly of visual arts. One such early movement was later dubbed "net.art", including early work by the art collective JODI, which was started by artists Joan Heemskerk and Dirk Paesmans. JODI's experiments on glitch art included purposely causing layout errors in their website in order to display underlying code and error messages. The explorations of JODI and other net.art members would later influence visual distortion practices like databending and datamoshing (see below).
Glitch art events
In January 2002, Motherboard, a tech-art collective, held the first glitch art symposium in Oslo, Norway, to "bring together international artists, academics and other Glitch practitioners for a short space of time to share their work and ideas with the public and with each other."
On September 29 thru October 3, 2010, Chicago played host to the first GLI.TC/H, a five-day conference in Chicago organized by Nick Briz, Evan Meaney, Rosa Menkman and Jon Satrom that included workshops, lectures, performances, installations and screenings. In November 2011, the second GLI.TC/H event traveled from Chicago to Amsterdam and lastly to Birmingham, UK. It included workshops, screenings, lectures, performance, panel discussions and a gallery show over the course of seven days at the three cities.
2013
Run Computer, Run at GLITCH 2013 arts festival at RuaRed, South Dublin Arts Centre - Dublin, curated by Nora O Murchú.
2015
Glitch Art is Dead at Teatr Barakah in Warsaw, Poland. Curated by Ras Alhague and Aleksandra Pienkosz.
reFrag: glitch at La Gaïté Lyrique in Paris, France. Organized by the School Art Institute of Chicago and Parsons Paris.
2017
Glitch Art is Dead 2 at Gamut Gallery, in Minneapolis, Minnesota, USA. Curated by Miles Taylor, Ras Alhague and Aleksandra Pienkosz.
2018
Blue\x80 & Nuit Blanche at Villette Makerz in Paris, France. Curated by Ras Alhague and Kaspar Ravel.
Refrag #4 Cradle-to-Grave at Espace en cours in Paris, France. Curated by Benjamin Gaulon.
2019
Communication Noise exhibition, Media Mediterranea 21 festival, Pula, Croatia.
2020
An Exercise of Meaning in a Glitch Season an exhibition in National Gallery Singapore. Curated By: Syaheedah Iskandar.
2021
Glitch Art in Iran. La prima mostra artistica collettiva.
Methods
What is called "glitch art" typically means visual glitches, either in a still or moving image. It is made by either "capturing" an image of a glitch as it randomly happens, or more often by artists/designers manipulating their digital files, software or hardware to produce these "errors." Artists have posted a variety of tutorials online explaining how to make glitch art. There are many approaches to making these glitches happen on demand, ranging from physical changes to the hardware to direct alternations of the digital files themselves. Artist Michael Betancourt identified five areas of manipulation that are used to create "glitchart." Betancourt notes that "glitch art" is defined by a broad range of technical approaches that can be identified with changes made to the digital file, its generative display, or the technologies used to show it (such as a video screen). He includes within this range changes made to analog technologies such as television (in video art) or the physical film strip in motion pictures.
Data manipulation
Data manipulation (aka databending) changes the information inside the digital file to create glitches. Databending involves editing and changing the file data. There are a variety of tutorials explaining how to make these changes using programs such as HexFiend. Adam Woodall explains in his tutorial:
Like all files, image files (.jpg .bmp .gif etc) are all made up of text. Unlike some other files, like .svg (vectors) or .html (web pages), when an image is opened in a text editor all that comes up is gobbldygook!
Related processes such as datamoshing changes the data in a video or picture file. Datamoshing with software such as Avidemux is a common method for creating glitch art by manipulating different frame types in compressed digital video:
Datamoshing involves the removal of an encoded video’s I-frames (intra-coded picture, also known as key frames—a frame that does not require any information regarding another frame to be decoded), leaving only the P- (predicted picture) or B- (bi-predictive picture) frames. P-frames contain information predicting the changes in the image between the current frame and the previous one, and B-frames contain information predicting the image differences between the previous, current and subsequent frames. Because P- and B-frames use data from previous and forward frames, they are more compressed than I-Frames.
This process of direct manipulation of the digital data is not restricted to files that only appear on digital screens. "3D model glitching" refers to the purposeful corruption of the code in 3D animation programs resulting in distorted and abstract images of 3D virtual worlds, models and even 3D printed objects.
Misalignment
Misalignment glitches are produced by opening a digital file of one type with a program designed for a different type of file, such as opening a video file as a sound file, or using the wrong codec to decompress a file. Tools commonly used to create glitches of this type include Audacity and WordPad. Artist Jamie Boulton explains the process and the glitches it produces, noting that these glitches depend on how Audacity handles files, even when they are not audio-encoded:
The easiest way to manipulate a file in Audacity is to select a section of the file and apply one of the built in sound effects to it. Now, I’m no computing whizz kid, but the way I see it, when you apply a sound effect to a sound file, the program takes that file and alters the file data in the manner which it’s been told will achieve that effect. So, for example, if you were to apply an echo effect then it would repeat parts of the file, diminishing the repetition after each iteration. The wonderful thing is that it will do this regardless of what the file actually is, Audacity doesn’t know or care whether the file is a sound or not, it will alter it in the manner instructed.
Hardware failure
Hardware failure happens by altering the physical wiring or other internal connections of the machine itself, such as a short circuit, in a process called "circuit bending" causes the machine to create glitches that produce new sounds and visuals. For example, by damaging internal pieces of something like a VHS player, one can achieve different colorful visual images. Video artist Tom DeFanti explained the role of hardware failure in a voice-over for Jamie Fenton's early glitch video Digital TV Dinner that used the Bally video game console system:
This piece represents the absolute cheapest one can go in home computer art. This involves taking a $300 video game system, pounding it with your fist so the cartridge pops out while its trying to write the menu. The music here is done by Dick Ainsworth using the same system, but pounding it with your fingers instead of your fist.
Physically beating the case of the game system would cause the game cartridge to pop out, interrupting the computer's operation. The glitches that resulted from this failure were a result of how the machine was set up:
There was ROM memory in the cartridge and ROM memory built into the console. Popping out the cartridge while executing code in the console ROM created garbage references in the stack frames and invalid pointers, which caused the strange patterns to be drawn. ... The Bally Astrocade was unique among cartridge games in that it was designed to allow users to change game cartridges with power-on. When pressing the reset button, it was possible to remove the cartridge from the system and induce various memory dump pattern sequences. Digital TV Dinner is a collection of these curious states of silicon epilepsy set to music composed and generated upon this same platform.
Misregistration
Misregistration is produced by the physical noise of historically analog media such as motion picture film. It includes dirt, scratches, smudges and markings that can distort physical media also impact the playback of digital recordings on media such as CDs and DVDs, as electronic music composer Kim Cascone explained in 2002:
"There are many types of digital audio ‘failure.' Sometimes, it results in horrible noise, while other times it can produce wondrous tapestries of sound. (To more adventurous ears, these are quite often the same.) When the German sound experimenters known as Oval started creating music in the early 1990s by painting small images on the underside of CDs to make them skip, they were using an aspect of ‘failure' in their work that revealed a subtextual layer embedded in the compact disc.
Oval's investigation of ‘failure' is not new. Much work had previously been done in this area such as the optical soundtrack work of Laszlo Moholy-Nagy and Oskar Fischinger, as well as the vinyl record manipulations of John Cage and Christian Marclay, to name a few. What is new is that ideas now travel at the speed of light and can spawn entire musical genres in a relatively short period of time."
Distortion
Distortion was one of the earliest types of glitch art to be produced, such as in the work of video artist Nam June Paik, who created video distortions by placing powerful magnets in close proximity to the television screen, resulting in the appearance of abstract patterns. Paik's addition of physical interference to a TV set created new kinds of imagery that changed how the broadcast image was displayed:
The magnetic field interferes with the television’s electronic signals, distorting the broadcast image into an abstract form that changes when the magnet is moved.
By recording the resulting analog distortions with a camera, they can then be shown without the need for the magnet.
Compression artifacts is a noticeable distortion of media (including images, audio, and video) caused by the application of lossy compression. They can be intentionally used as a visual style in glitch art. Rosa Menkman's work makes use of compression artifacts, particularly the discrete cosine transform blocks (DCT blocks) found in most digital media data compression formats such as JPEG digital images and MP3 digital audio. Another example is Jpegs by German photographer Thomas Ruff, which uses intentional JPEG artifacts as the basis of the picture's style.
See also
Databending
Distortion (optics)
Electronic art
Glitch (music)
Glitching
Internet art
List of glitch artists
Net.art
New media art
Postdigital
VJing
Wabi-sabi
References
Further reading
Almond, Richard. "Fading Mnemonics and Digital Decay", 2009
Baker-Smith, Ben. "Flickr Glitch Artists", 2010
Betancourt, Michael. "Welcome to Cyberia", Miami Art Exchange, September 19, 2003.
Betancourt, Michael. "Critical Glitches and Glitch Art", 2014
Bosma, Josephine. "Interview with Jodi", 1997
Briz, Nick. Thoughts on Glitch(Art)v2.0, 2015
Briz, Nick. Glitch & Art, 2009
Donaldson, Jeff. "gLossing over Thoughts on Glitch: A Poetry of Error". Artpulse Magazine Vol. 2, No. 3 (Spring 2011)
Downey, Jonas. "Glitch Art". Ninth Letter (2012). Retrieved February 23, 2013.
Gaulon, Benjamin. DeFunct / ReFunct Publication, exhibition catalogue, 2011
Germen, Murat. "Inadvertent – Ars accidentalis." International Symposium on Computational Aesthetics in Graphics, Visualization, and Imaging (CAe 2008), Lisbon, Portugal.
Goriunova, Olga and Alexei Shulgin. "Glitch," in Software Studies: A Lexicon, ed. Matthew Fuller (Cambridge, MA: MIT Press, 2008)
Grenzfurthner, Johannes. Interview with Phil Stearns. Pixel Form, 2010
Krapp, Peter. Noise Channels: Glitch and Error in Digital Culture, Minneapolis: University of Minnesota Press 2011.
Manon, Hugh S and Daniel Temkin, "Notes on Glitch", 2011
Menkman, Rosa. The Glitch Moment(um), Network Notebooks 04, Institute of Network Cultures, Amsterdam., 2011.
Moradi, Iman. "Seeking Perfect Imperfection: A Personal Retrospective on Glitch Art. Vector (e-zine) 6 (July 2008). Retrieved July 15, 2011
Poremba, Cindy. "Point and Shoot: Remediating Photography in Gamespace." Games and Culture Volume 2, Number 1 (January 2007): 49–58.
External links
Glitch Art Documentary produced by the web series Off Book
Glitch Theory wiki at archive.org
Film and video technology
Video art
Digital art
Digital electronics
Software bugs
Software anomalies
Computer errors
Computer art
New media
New media art
Interactive art
Visual arts genres
Artistic techniques
Mass media technology
|
375259
|
https://en.wikipedia.org/wiki/University%20of%20Maryland%2C%20Baltimore%20County
|
University of Maryland, Baltimore County
|
The University of Maryland, Baltimore County (UMBC) is a public research university in Baltimore County, Maryland. It has a fall 2020 enrollment of 13,497 students, 61 undergraduate majors, over 92 graduate programs (38 master, 25 doctoral, and 29 graduate certificate programs) and the first university research park in Maryland. It is classified among "R1: Doctoral Universities – Very High Research Activity".
Established as a part of the University System of Maryland in 1966, the university became the first public college or university in Maryland to be inclusive of all races. UMBC has the fourth highest enrollment of the University System of Maryland, specializing in natural sciences and engineering, as well as programs in the liberal arts and social sciences. Athletically, the UMBC Retrievers have 17 NCAA Division I teams that participate in the America East Conference.
History
The planning of the University of Maryland, Baltimore County was first discussed in the 1950s due to the post-World War II baby boom, the expansion of higher education under the GI Bill, and the large amount of growth both in population and industry in the Baltimore-Washington Metropolitan Area. At this time, the University of Maryland, College Park was the main higher education source in the region, so talks began of adding a branch campus in the Baltimore area. In 1955, Governor Theodore McKeldin issued "The Needs of Higher Education in Maryland," which recommended the need for university expansion. Three years later, the "Advisory Committee on Higher Education in the State of Maryland" report proposed that the Baltimore branch of the University of Maryland be established as a two-year program, subordinate to the College Park campus. In 1960, the Warfield Commission, appointed by Governor Tawes, issued, "A Plan for Expanding the University of Maryland," which propelled the idea of creating three additional university centers throughout Maryland.
In 1963, the Maryland Legislature approved the development of several new universities throughout Maryland. By the end of that year, 435 acres were purchased from Spring Grove State Hospital, a psychiatric facility in Catonsville, Maryland. The new campus would be efficiently located in Southwestern Baltimore, and would be able to be accessed from Wilkens Avenue, the Baltimore Beltway and Interstate 95. Architectural design and planning of the new campus was completed at the University of Maryland, College Park. In 1965, Albin Owings Kuhn, an accomplished administrator and professor at College Park was named Vice President of Baltimore Campuses, including both UMBC and the founding campus, University of Maryland, Baltimore. The new campus also included Dr. Homer Schamp of the College Park as the first Dean of Faculty, David Lewis as the first full-time faculty member and head of Social Sciences, and John Haskell, Jr. as the first Librarian.
The first classes began on September 19, 1966 with 750 students, 3 buildings, and the older wing of the Biological Sciences building, 45 faculty members, 35 support staff, and 500 parking spaces. As university enrollment increased drastically over the coming years, the university would also coincide with the turbulent changes in society in the 1960s. While undergoing the Civil rights movement and the Vietnam War, UMBC would prove to be a new and different atmosphere with open and peaceful minds during campus protests. In 1971, Albin Owings Kuhn resigned his position as UMBC's first chancellor, succeeded by Calvin B. T. Lee. Five years later in 1976, John Dorsey, Administrative Vice President at the University of Maryland, College Park was appointed as UMBC's third Chancellor.
By 1980, undergraduate enrollment reached 5,800 students. Also in this year, Homecoming and Quadmania were established as cornerstone events that would become UMBC tradition for years to come. During this decade, the University Center and Sherman Hall were opened, as well as Hillside and Terrace Apartments. In addition, University of Maryland, College Park alum Jim Henson funded the establishment of the Imaging Research Center at UMBC. In 1986, Michael Hooker became chancellor, a post he held until 1992, when he was appointed president of the University of Massachusetts system. In 1988, a proposed merger of UMBC with the University of Baltimore was considered but was voted down by the University System of Maryland Board of Regents.
In 1990, undergraduate enrollment reached over 10,000 students. In 1991, a merger plan between UMBC and the University of Maryland, Baltimore was approved in the Maryland House of Delegates, but was rejected by the Senate. Throughout the last decade of the twentieth century, the university opened the Engineering and Computer Science Building and Potomac Hall. The current university president, Freeman A. Hrabowski III was appointed in 1992.
The first decade of the twenty-first century featured many university developments as UMBC approached its fortieth anniversary in 2006. Some of these developments included the establishment of the Center for Urban Environmental Research and Education, a new partnership with the NASA Goddard Space Flight Center to develop the Goddard Earth Science and Technology (GEST) Center, as well as numerous expansions to the campus such as The Commons, the Physics Building, Information Technology & Engineering Building and the Public Policy Building. During this time, UMBC was recognized by the American Society for Biochemistry and Molecular Biology (ASBMB) for being the leading producers of chemistry and biochemistry degrees, and was classified by The Carnegie Foundation as being among the top tier research universities, Doctoral/Research Universities for achieving 50 or more doctoral degrees per year across at least 15 disciplines.
Academics and research
UMBC offers undergraduate and graduate degree programs in a variety of areas of study. There are 61 majors in 55 distinct programs, 70 minors, and 36 certificate programs offered in its undergraduate program. UMBC's Graduate School offers 38 master's degree programs, 25 doctoral degree programs, and 29 graduate certificate programs. The university is divided into three colleges, three schools, as well as its graduate school.
Colleges
The UMBC College of Natural and Mathematical Sciences includes the Departments of Biological Sciences, Chemistry and Biochemistry, Marine Biotechnology, Mathematics and Statistics, Naval Science, and Physics.
The UMBC College of Engineering and Information Technology offers different areas of study in five departments: the Departments of Chemical, Biochemical & Environmental Engineering, Computer Science and Electrical Engineering, Information Systems, and Mechanical Engineering.
The UMBC College of Arts, Humanities and Social Sciences houses the most departments in the university and awards more than half of all undergraduate and graduate degrees. Among many others, it includes the departments of Ancient Studies, History, Dance, Music, Education, Political Science, Psychology, Media and Communication studies, and Visual Arts. Many of the departments are now housed in the new Performing Arts and Humanities Building. The Media and Communications studies department is housed on the second floor of Sherman Hall, in the A-wing. Groundbreaking and a grand opening ceremony for the Performing Arts building was held on September 19, 2012. Another grand opening ceremony was held to officially open both phases of the building on October 17, 2014.
Schools
The UMBC Erickson School of Aging Studies offers undergraduate and graduate level programs that focuses on various aspects of aging studies, including policy and management issues.
The University of Maryland Graduate School, Baltimore (UMGSB) represents the combined graduate and research programs at UMBC and the University of Maryland, Baltimore (UMB).
The UMBC School of Public Policy includes the public policy programs for the masters and doctorate degrees.
The University of Maryland, Baltimore School of Social Work links with UMBC in offering graduate and undergraduate level social work programs, respectively.
Extension
UMBC Training Centers provide technical and professional training programs remotely and directly at UMBC's South Campus in Arbutus, the Columbia Gateway Campus in nearby Columbia, Maryland, and cybersecurity education in Augusta, Georgia.
Research and Creative Achievement
UMBC is among the fastest-growing research universities in the country and is classified as a Doctoral University with Very High Research Activity by the Carnegie Foundation. The university consistently ranks among the top 100 public U.S. institutions in federal research and development expenditures. UMBC's research themes focus on environmental sciences, especially atmospheric physics and remote sensing, Earth and space sciences, and ecology and remediation; on health and life sciences, including marine biotechnology and bio sciences and engineering; on data sciences and national security, with special focus on cybersecurity and artificial intelligence, cognitive computing, health IT, and big data analytics; on health equity and policy studies, and on public humanities and the arts.
The university is ranked among the Top 15 US universities in NASA funding. UMBC's NASA-funded centers at NASA Goddard include the Joint Center for Earth Systems Technology (JCET), the Goddard Planetary Heliophysics Institute (GPHI), and the Center for Space Sciences and Technology (CSST). In April 2021, CSST received an additional $54M in funding from NASA Goddard for astrophysics research.
Faculty at UMBC have been recognized with 40 National Science Foundation CAREER Awards since 1995, including nine since 2017. Two UMBC researchers have received the Presidential Early Career Award in Science and Engineering (PECASE) — one from NSF in 2005 and one from NSA in 2014. UMBC also has one of only two Howard Hughes Medical Institute investigators at a public university in Maryland, a National Academy of Sciences member, as well as a DARPA Young Faculty Award winner, and NASA's 2012 Distinguished Public Service Medal recipient. UMBC faculty regularly receive Fulbright and Guggenheim fellowship.
bwtech@UMBC, UMBC's incubator and research park, houses over 130 companies and three incubators in cybersecurity, life sciences, and clean technology. UMBC has over 20 campus-wide centers and institutes, including three Collaborative Centers with NASA Goddard (JCET, GPHI, and CSST), the Center for Advanced Real-Time Analytics (CARTA), the Center for Advanced Sensor Technology (CAST), the Center for Urban Environmental Research and Education (CUERE), the Earth and Space Institute (ESI), The Hilltop Institute, the Center for Social Science Scholarship (CS3), the Center for Art, Design & Visual Culture (CADVC), the Dresher Center, and the Imaging Research Center (IRC)
Campus
History
In 1840, the state of Maryland purchased the land that the university is located on today. At that time, it was known as the Stabler Estate, owned by the prominent Stabler family of Baltimore County. James P. Stabler, the chief engineer and superintendent of the Baltimore and Ohio Railroad was connected to the estate. The Baltimore Trade School, an orphan's home located on present day Giffen Hill, was established in that same year. The school continued to operate and farm the surrounding acreage up until World War II. The state later added the property to Spring Grove State Hospital, who farmed the land until the university's establishment. A few of the original structures were still in use by UMBC for some time, including the Hillcrest Building and a farmhouse. Located off of Walker Avenue, the Hillcrest Building was originally built in 1921 to house patients of Spring Grove State Hospital. The building was historically significant for it was the "first building constructed specifically for the care and treatment of mentally ill prisoners to be built at a state psychiatric hospital anywhere in the United States". In 1965, the structure was used as UMBC's administration building, and later used as the office of residential life and a student union. A common campus urban legend claims that the man that Hannibal Lecter was based on lived in a basement cell of the building. Hillcrest was demolished in 2007 due to toxicity concerns, leaving the farm silo on UMBC Boulevard to be oldest surviving structure on the university's campus.
Opened for enrollment in 1966, UMBC was created to serve the overflow of students from the Baltimore area seeking admission to University of Maryland, College Park. From its beginning, the new commuter campus faced a surfeit of problems. Sited on free land taken from a state hospital, the campus was not sponsored or protected by any political constituency. There were already nine other campuses in the metropolitan area. Located a few miles from the University of Maryland, Baltimore campus, there was no chance UMBC could develop the array of professional schools common to research universities. Its County name, an afterthought, was more consistent with two-year schools than a Ph.D. - granting institution. Yet as UMBC continues past its 50th anniversary, it has become a national role model for new American universities. The book Improbable Excellence: the Saga Of UMBC chronicles this development.
Landscape
UMBC's main entrance is approached from Metropolitan Boulevard where there is a UMBC Campus exit that leads to UMBC Boulevard. Soon after the campus exit, UMBC Boulevard intersects Research Park Drive which leads into UMBC's Research & Technology Park. UMBC's campus is also served by Wilkens Avenue, which provides access to the Baltimore Beltway and Rolling Road. Entrances off of Wilkens Avenue include Hilltop Road and Walker Avenue. Hilltop Road leads towards Catonsville's Business District on Frederick Road and Spring Grove Hospital Center. On the other side of the campus, Poplar Avenue gives direct access to Arbutus's Business District on East Drive. The campus core is served by Hilltop Circle, which creates a complete circle encompassing the campus.
Academic Row is known to be the central pedestrian concourse and maintenance vehicle highway in the campus that borders along a series of buildings. Beginning south at Administration Drive, the pathway is covered by mature trees on either side. Friendly squirrels are a common sight near the University Center where students tend to feed them waffle fries from Chick-fil-A. Academic Row is bordered by the Administration Building, the Retriever Activities Center, Janet and Walter Sondheim Hall, Sherman Hall (Previously named Academic IV), University Center, Math and Psychology Building, Biological Sciences Building, and the Meyerhoff Chemistry Building. At the northern end, the walkway is intersected by Schwartz Breezeway leading to the Commons, the university's student union. Academic Row terminates at the Albin O. Kuhn Library & Gallery, where multiple paths radiate across Erickson Field towards the Commons, the Physics and Public Policy Buildings, West Hills, Hillside, and Terrace Apartments, as well as additional dormitories.
Taking any of the tree-lined staircases to the next level of campus leads to the ITE, Engineering, and Fine Arts buildings, all of which can also be accessed though shortcuts from any of the multitude of buildings on Academic Row. As of 2015, the new Performing Arts and Humanities building has also been servicing students, which is another short walk up from the Engineering building. New lots have also been constructed outside of the Performing Arts and Humanities building in order to accommodate more commuter students and faculty. Fall of 2015 brings with it two new roundabouts that have been made at the intersection of Administration Drive and Research Park Drive and between Research Park Drive and the entrance ramp on to I-95.
On the southern side of the Commons, a large grassy area known as the Quad is where many student events and activities take place throughout the school year. Another area of student congregation is at UC Plaza in front of the University Center. The University Center houses multiple dining options, the UC Ballroom, as well as additional university event and teaching space.
Gallery
Location
UMBC's campus is located on 500 acres. It is approximately 15 minutes from Baltimore's Inner Harbor and 60 minutes from Washington, D.C. Baltimore-Washington International Airport is five minutes away, as well as AMTRAK and Baltimore Light Rail stations (BWI Airport and BWI Business District). In addition, the MARC Penn Line serves the UMBC population at Halethorpe Station, which is located approximately two miles away on Southwestern Boulevard in Arbutus, Maryland. The Halethorpe/Satellite bus transit line transports students to and from the train station. UMBC, three miles outside the Baltimore city limits, successfully lobbied the government to use 'Baltimore' as its address. While its suburban campus has minimal interaction with its surroundings, students variously consider it to be located in the towns of Catonsville (by CDP) or Arbutus (whose street grid it borders). The campus is undercut by a series of tunnels.
Originally UMBC was supposed to be located in Baltimore City. However, due to many disputes the university is located in the neighborhood of Southern Catonsville, 1.5 miles south of Catonsville's Central Business District along Frederick Road. Catonsville provides a College town atmosphere for UMBC by having numerous restaurants, bars, and other conveniences. The town also provides festivals and farmers markets every Sunday from May to November.
Research and Technology Park
UMBC Research and Technology Park is a 71-acre development on the campus hosting technology, bioscience and research organizations, many of which are engaged in partnership with the university. The research park, split into two campuses, is the oldest university research park in Maryland. The North Campus focuses primarily on cybersecurity, and includes the Cyber Incubator and a new addition of the CyberHive. The South Campus is a life-science and business incubator, and has graduated over 50 companies through its program. Research Park tenants include the US Geological Survey, US Forestry Service, CardioMed Device Consultants, Audacious Inquiry, Med-IQ, Physician Practice, Inc., Retirement Living TV, Ascentium Corporation, Solvern Innovations, RMF Engineering, Inc., Convergent Technology, Clear Resolution Consulting, Fearless Solutions, Potomac Photonics, and Next Breath.
Transportation
UMBC has several bus shuttle lines that are available to UMBC's students, faculty, and staff. All but the Wave 'n Ride are free by showing of one's campus identification card. The Wave-n-Ride was historically available to anyone who needs intracampus transport around Hilltop Circle and UMBC Boulevard, but the service is pending decommission.
In August 2014, service has expanded to two new lines connect the campus to Downtown Baltimore. These two lines (Downtown A-B Lines) also connect the campus to the Baltimore Metro Subway byway of Lexington Market Station. The Downtown B Line connects to the Metro as well as MARC Train at Camden Station, and the Baltimore Light Rail byway of Convention Center Station.
The Maryland Transit Administration offers additional service to the University of Maryland Baltimore County community. Bus lines 35, 77, and 95 offer service to the campus. The MARC Train provides Penn Line rail service two miles from the campus at Halethorpe station, connecting the university to Baltimore and Washington.
The UMBC campus is home to a number of trails for pedestrians and bicyclists as well. Some of these pathways include a walking bridge and path that connects the central campus to the Research Park to the south, as well as an unpaved path from UMBC Boulevard to Selford Road that is frequented by runners and joggers. Nearby, the Short Line Railroad Trail can be accessed through Hilltop Road and Spring Grove Hospital Center. The rail trail provides paved pathway access from Downtown Catonsville and Paradise, crossing the Baltimore Beltway. Additionally, cyclists have on-road bike routes from the campus to Halethorpe station via Downtown Arbutus.
Campus police
UMBC maintains a 24-hour police staff of sworn officers, supplemented by non-sworn security officers and student marshals. Like the campus police of the University of Maryland, College Park and the University of Maryland, Baltimore, the campus police are accredited by the Commission on Accreditation for Law Enforcement Agencies. Accreditation is expected by the University System of Maryland mandated 2013 deadline. The UMBC police logs all crime reports and statistics as required by law on the UMBC Police Webpage.
President
In May 1992, Freeman A. Hrabowski III began his term as president of the University of Maryland, Baltimore County. He was named by TIME Magazine as one of the "100 Most Influential People in the World", and for his work with UMBC was honored as America's Top 10 College Presidents in 2009. Under his leadership, UMBC has been ranked the #1 Up and Coming University in the US for six consecutive years (2009, 2010, 2011, 2012, 2013, and 2014) by U.S. News and World Report magazine. His research and publications are more focused on science and math education, with particular emphasis on minority participation and performance.
Financial aid and scholarships
The Meyerhoff Scholarship Program at UMBC is a program focused on the cultivation of underrepresented minority scholarship and awareness in the math, science, and engineering disciplines. Other scholarship programs include the CWIT Scholars Program, the Humanities Scholars Program, the Dresher Humanities Fellowships, Honors College Fellowships, the Linehan Artist Scholars Program, the Sondheim Public Affairs Scholars Program and the Sherman Teacher Education Scholars Program. Students can also receive scholarships through the athletic department, after being recruited to play on a sports team at UMBC. The Linehan Artist Scholars Program is a four-year scholarship program for incoming freshmen with a major in the arts, including dance, music, performing arts, visual arts, and theater. The artists learn to work together and collaborate on projects, under the direction of Doug Hamby.
UMBC's Grand Challenge Scholars Program is designed for students from all majors who are interested in solving important societal problems. The program fosters a vibrant interdisciplinary community to help tackle the National Academy of Engineering's (NAE) Grand Challenges, and gives students experiences and skills to create solutions to some of the most pressing challenges of the 21st century.
Rankings
The university is ranked tied for 162nd in the 2022 U.S. News & World Report rankings of "National Universities" in the United States, and is ranked tied for 78th nationally among public universities. It was ranked 6th nationally in undergraduate teaching and 6th in innovation. UMBC ranks fourth among U.S. research universities in the production of IT degrees and certificates, according to U.S. Department of Education data. The data shows UMBC ranking #21 in MS, and #31 in PhD IT degree production.
In 2012, U.S. News & World Report rated UMBC as the 12th most under-performing university, citing a gap between academic reputation and performance in the academic indicators.
The Carnegie Foundation classifies UMBC as a research university with high research activity.
UMBC has received a rating of 4 out of 5 from Campus Pride's LGBT-friendly campus climate index.
Partnerships
The university has formed a variety of centers and institutes. It has a partnership with NASA. The Center for Space Science and Technology, Goddard Earth Sciences and Technology Center, and the Joint Center for Earth Systems Technology all are affiliated with the Goddard Space Flight Center in Greenbelt, Maryland, and share collaboration efforts with the University of Maryland, College Park.
In 2014, the university signed agreements with the United States Army Research Laboratory and the United States Army Research, Development and Engineering Command, for research in information systems, computer science, cybersecurity, networks, sensors, communications, mathematics and statistics, human dimensions, human systems integration, synthetic biology, power, quantum information processing, natural language processing and robotics.
USB and the University of Maryland, Baltimore (UMB) jointly operate the Research & Innovation Partnership Seed Grant program, which aims to promote inter-institutional research collaborations between the two USM institutions and to stimulate joint grant proposals to federal agencies and foundations. This shared program allows students and faculty to receive grants for research, increased collaboration, as well as the ability to use the facilities of both universities.
In February 2015, UMBC formed another partnership with Kyushu University in Fukuoka, Japan, for research in computer security.
Furthermore, in the spring of 2015 an array of partnerships between UMBC and the US Navy were announced. The two announced the opening of the first Naval ROTC unit in Maryland, on the campus of UMBC, with the US Navy sponsoring a multitude of four year full-ride scholarships for select candidates. In addition, a cybersecurity research partnership between the two institutions was announced, beginning with five collaborative research projects between UMBC faculty and students and the US Navy.
Sustainability
In 1997, President Freeman Hrabowski created the Conservation and Environmental Research Areas of UMBC also known as CERA on the south end of the campus. The conservation area encompasses 50 acres surrounding Pig Pen Pond and Bwtech@UMBC Research and Technology Park. At the same time as preserving the land, CERA allowed UMBC students to use the land for educational and recreational purposes. CERA contains two parts. The larger tract, covering approximately 45 acres of the south end of the main campus, contains a wide variety of ecological conditions: mature upland forest, early- and mid- successional forest, and riparian and wetland environments. The second, area is much smaller, with an area of about 3 acres. This surrounds Pigpen Pond, which was once actually a pigpen until it filled with water. There are also several areas within CERA where evidence of previous human occupancy and use can be found. In addition to teaching opportunities for faculty, CERA offers a wide range of opportunities for students and faculty to undertake short and long-term research projects in a variety of disciplines. Management of CERA is guided by the need to maintain these landscapes as natural areas to be preserved and protected for approved uses in education, research and wildlife observation.
In 2007, President Freeman Hrabowski signed on to the American College and University President's Climate Commitment (ACUPCC) and formed the Climate Change Task Force. 20% of the university's emissions comes from renewable energy. Additional sustainable efforts include a green roof on Patapsco Hall, and the construction of new LEED certified buildings such as West Hills Community Center and the Performing Arts and Humanities Building. Preservation has also been a growing focus for UMBC, through the creation of CERA, Conservation Environmental Research Area. "No-mow zones" and stormwater retention ponds have also been added to the campus.
In 2013, UMBC earned Tree Campus USA recognition by the Arbor Day Foundation.
In May 2014, UMBC dedicated 11 acres on the northeastern side of the campus for preservation through the Maryland Department of Natural Resources. Also in 2014, the university has opened its first community garden for its students. The garden will give students the chance to grow their own food on campus.
In May 2015, two Prove It! teams went on to win the $10,000 grant for their sustainability driven ideas to improve the life of students. The first, Retriever Treasure, collects unwanted furniture, clothes, and other items from students moving out of dorms and apartments at the end of each school year. They then resell these items at the beginning of the school year to raise funds for other initiatives and donate the remainder of the items not sold. The second, SolarRetrievers, raised an additional $30,000 from UMBC Residential Life, Facilities Management, and The Commons to purchase 4 EnerFusion Solar Power-Dok solar tables. These tables promote the idea of sustainable energy by directly demonstrating how solar panels are used to charge a battery and power devices in areas that normally would not have electricity readily available. The tables are located in the courtyard between Harbor and Chesapeake Hall, The Commons terrace, and two are on the terrace outside of the Retriever Activities Center.
Mascot
The Chesapeake Bay Retriever is the state dog of Maryland and has been the mascot of UMBC since weeks after its founding in 1966. The costumed mascot was alternately known as "Fever the Retriever" in the late 1990s. The university also once had a live mascot, upon whom the True Grit statue is based, named Campus Sam. At the beginning of the 2008 fall semester, a Chesapeake Bay retriever puppy was chosen as a new mascot. He attends many athletic events and an online poll was held on the Retriever Activities Center website to choose his name, which was ultimately decided as "Gritty". The school's dining hall is named True Grits.
True Grit appears in two forms: Both as a statue in front of the Retriever Activities Center of a Chesapeake Bay retriever and as a costumed mascot, an anthropomorphized Chesapeake Bay retriever. The latter can typically be seen in attire of whatever sport he is currently attending; this is most often basketball or lacrosse. As part of an art installation, there are also several smaller True Grit statues placed around campus, all given themed decoration by various student artists.
Student life
The Resident Student Association and Student Events Board provide social programming during all academic semesters at UMBC. Over 220 student-run organizations exist on campus.
LLC (Language Literacy & Culture)
This unique interdisciplinary doctoral program draws upon faculty from disciplines in the humanities and social sciences from eight departments and programs at UMBC: African Studies; American Studies; Education; English; History; Gender and Women's Studies; Modern Languages, Linguistics and Intercultural Communication; and Sociology and Anthropology.
LLC (Living Learning Community)
A living learning community (LLC) is essentially themed housing. A hallway of one of UMBC's residence halls is set aside for students who share a certain academic ground. LLCs are intended to provide residents with social, academic, and career opportunities related to their theme. Many sponsor a one credit course in which students are required to enroll.
UMBC has eight LLCs, listed below.
The Center for Women in Technology
The Center for Women in Technology LLC houses women and men who major in engineering or information technology, with the special intention of providing a community for females in this traditionally male dominated academic area. It offers academic, social, and career opportunities.
Discovery Scholars
The Discovery Scholars LLC helps students of an undecided career path explore possible majors and careers. Participants must enroll in its sponsored one credit course. Discovery Scholars are provided with social excursions, career exploration services, academic advising.
Honors College
The Honors College LLC houses members of UMBC's honors college, providing an environment for socialization outside the classroom. Graduates of the Honors program must earn an "A" or "B" in special honors-level courses in various categories of academic disciplines. It is located in Susquehanna Hall.
Humanities Floor
The Humanities Floor LLC is composed of students interested in—though not necessarily majoring in—the humanities. It facilitates intelligent discussion and field trips related to the humanities. Residents must attend four sponsored events and assist in planning floor activities. Many of the accepted Humanities Scholars choose to reside on the Humanities Floor LLC. The students who live on the floor find a community of like-minded scholars to study with and join in social activities with.
Intercultural Living Exchange
The Intercultural Living Exchange LLC aims to promote cultural diversity. Residents are mentored by international students and participate in social events centered around cultural items, such as holidays, movies, or cuisine. Students are also expected to maintain at least a 3.5 GPA while earning academic credits during service projects. Students earn academic credit for participating in this LLC. Students can participate in language immersion and live with others who are studying French, Spanish, Korean, or Chinese.
Shriver Living-Learning Center
The Shriver Living-Learning Center LLC is centered around service learning. Students build leadership skills by volunteering three to five hours weekly. They are required to take the LLC's sponsored academic course. Residents also hear presentations from guest speakers and give presentations on their own service experiences. Students are able to earn academic credit for their participation.
Visual and Performing Arts
The Visual and Performing Arts LLC provides students interested in the arts chances to deepen their experience of the arts through learning new skills, holding intelligent discussions, and attending relevant events.
Women Involved in Learning and Leadership
The Women Involved in Learning and Leadership LLC is intended to promote leadership skills in social issues. Residents hear speakers, activists, and organizations involved in social change as well as plan and attend related events. Though not its sole focal points, feminism and gender issues predominate this LLC.
STEM LLC
The STEM LLC is UMBC's tenth and largest LLC, and as of Fall 2016 houses 75 students. The STEM LLC is intended for first and second year students at UMBC majoring in STEM. Residents have access to Peer Mentors that are exclusive to the STEM LLC, resources through the College of Natural and Mathematical Sciences, and different seminars that assist residents with deepening their understanding and knowledge of STEM.
Student Events Board
The Student Events Board, stylized as (seb), is the major programming organization on campus. They host approximately 150 events a semester that are diverse, fun, and often free. The spring festival on campus, Quadmania, is hosted entirely by (seb).
UMBC holds homecoming in the fall semester during the month of October. Homecoming consists of numerous activities and festivities on campus. Namely, Homecoming includes the 5K Dawg Chase race, and a comedy show. Past performances include Trevor Noah, Jim Gaffigan, B.J. Novak, Nick Offerman, Bo Burnham, and others.
Quadmania serves as the university's student festival during the spring semester. The event takes place during April outdoors, near the center of campus on the Quad or Erickson Field. The headliner for the spring of 2012 was Gym Class Heroes. The headliner for the spring of 2013 was Macklemore & Ryan Lewis and that for the spring of 2014 was Capital Cities.
The 2014 Quadmania was also to have elephant rides, but these were allegedly cancelled due to claims of animal cruelty by some students. In 2015, Kesha performed at the Retriever Activities Center. In spring of 2016, Fetty Wap headlined Quad Mania on April 24.
In the spring of 2017, T-Pain returned to UMBC and headlined the event.
In October 2019, SEB announced that it would be hosting rappers Megan Thee Stallion and DaBaby on campus. DaBaby performed on November 14, 2019 in the RAC, and Megan Thee Stallion performed on November 21 in the UC Ballroom.
Greek life
UMBC has 20 officially registered sororities and fraternities with nearly 5% of UMBC's undergraduate students belonging to one of them, as well as one professional fraternal organization. UMBC houses four Greek councils, (NPHC, PHA, MGC, IFC). UMBC is home to 5 PHA organizations, which include Alpha Sigma Alpha, Alpha Sigma Kappa, Delta Phi Epsilon, Phi Mu, and Phi Sigma Sigma. The IFC organizations represented on campus are Lambda Chi Alpha, Pi Kappa Phi, Tau Kappa Epsilon, Phi Kappa Sigma, and Triangle. The NPHC currently houses the organizations Alpha Phi Alpha, Alpha Kappa Alpha, Delta Sigma Theta, Phi Beta Sigma. Their Multicultural Greek Council currently consists of Lambda Theta Alpha, alpha Kappa Delta Phi, Zeta Sigma Chi, Iota Nu Delta, and Lambda Phi Epsilon.
Mock Trial
UMBC has one of the strongest Mock Trial teams in the country. In 2021 the UMBC Mock Trial Team won the American Mock Trial Association (AMTA) National Championship Tournament, defeating Yale University in one of the closest final rounds in AMTA history.
Residential life
Campus housing
There are ten housing areas housing approximately 3,900 students, which are: Potomac Hall, Chesapeake Hall, Erickson Hall, Harbor Hall, Patapsco Hall, Susquehanna Hall, Hillside Apartments, Terrace Apartments, Walker Avenue Apartments, West Hill Apartments.
Those building types denoted "Hall" are traditional dormitories with the following typifying characteristics:
Shared rooms (usually two students per room)
Shared bathrooms (usually four students per bathroom/two rooms per bathroom)
Includes basic furniture (bed, desk, chair, closet), Internet access (Ethernet and Wi-Fi) and access to cable television
Special activities and events every week in the dormitories
Potomac Hall and the on-campus apartments are open all year, including holiday breaks (called "continuous occupancy").
Most international students prefer Potomac Hall because it is always open. (The other dormitories close during Thanksgiving, winter, and spring breaks.)
Erickson and Harbor Hall rooms include a living area between the two bedrooms, with the bathroom located in the living area. (living room shared by four students)
Those denoted "Apartments" are distinct in the following ways:
One student per room
All avail "continuous occupancy" 9-month housing
All include a living room
Off-campus housing
Although 71% of first-year undergraduate students are reported to live on campus, UMBC is known as a commuter campus where approximately 65% of the entire student population lives off campus, often in neighboring communities. These students are provided specialized programs and services through the Off Campus Student Services (OCSS) office. Popular locations for students include Catonsville and Arbutus. Popular apartment complexes include the Westland Garden Apartment & Town homes, and the Colony Hill Apartments located 1.5, and 2.5 miles away from campus, respectively. The UMBC Transit lines serves many neighborhoods. Students also live in numerous Baltimore City neighborhoods such as Beechfield, Oaklee, Irvington, Yale Heights, and Edmondson.
Chess
UMBC has won the Pan American Chess Tournament 9 times in 13 years (1996–2009). The school provides substantial chess scholarships to outstanding high school graduate players at the International or Grandmaster level. Former UMBC team captain GM Alexander Onischuk has gone on to become US Champion in 2006. Professor of Computer Science Alan Sherman has been instrumental in building up the UMBC chess dynasty by recruiting players from around the world. UMBC hosts two annual open chess tournaments, the UMBC Open (March) and the UMBC Championship (September).
Athletics
The school's sports teams are called the Retrievers, with colors black and gold. The mascot of the university is the Chesapeake Bay Retriever, the state dog of Maryland, named True Grit. A statue of True Grit stands in front of the Retriever Activities Center (RAC). The Retrievers participate in NCAA Division I as a member of the America East Conference, fielding 17 varsity sports; eight men's and nine women's. The Retrievers fight song is the UMBC Riser, and was written by Dr. George LaNoue, a professor of policy sciences.
Until 2017, the UMBC Women's Volleyball team has participated in the America East tournament every year since 2008. In 2013 the team became a runner-up after losing to University of New Hampshire.
In 2007, UMBC's women's basketball team won the schools first ever women's basketball title. They were invited to the 2007 NCAA tournament where they fought hard against UConn. The UMBC women's basketball team also won the AEC conference title in the 2011–2012 season. They were invited to the WNIT where they fell short to the University of Florida.
The Retrievers won their first regular season American East Men's Basketball title in 2007–08, and also qualified for their first NCAA Division I Men's Basketball Tournament. They had previously competed in the Division II men's basketball tournament.
In 2009, the men's lacrosse team secured their fifth consecutive outright or shared America East regular season championship and their third America East tournament championship in four years. UMBC has secured a berth in the NCAA tournament each of the past four seasons. In 2007, the unseeded Retrievers upset seventh-seeded Maryland, 13–9, in the NCAA tournament to advance to the Division I second round for the first, and so far only, time in school history.
In 2010, a contest was launched to find a new logo for Athletics. In May 2010, the UMBC Athletic Department unveiled a new logo for the Retrievers created by Jim Lord.
The Retrievers men's swimming and diving program captured its 15th straight conference championship in the 2012–13 season. This streak included every season the UMBC program had competed in the America East, starting with the school's joining the conference in 2003–04 and ending when the America East dropped the sport at the end of the 2012–13 school year. The streak of UMBC conference titles in this sport did not continue in the CCSA.
In March 2016, UMBC announced that their new Men's Basketball coach would be Ryan Odom. Parks Smith criticized the pick, saying that the search firm hired had promoted a candidate more remarkable for his nepotistic ties than for merit.
With the master plan wrapping up in 2018, the school spent $67 million in January 2016 on a new event center completed in Winter 2018. This new event center hosts athletic events such as basketball games, as well as concerts.
The Retrievers’ Men's Basketball team, on March 16, 2018 during the 2018 NCAA Men's Basketball Tournament became the first No. 16 seed in the history of the competition to defeat a No. 1 seed, defeating the Virginia Cavaliers 74–54. They advanced to the Round of 32 for the first time in school history.
Soccer
The Retrievers Men's Soccer Team won the America East Conference in 2010, receiving an automatic bid to the NCAA Division I men's soccer tournament. The Retrievers won their first-round game against Princeton but lost in the second round to William and Mary. Star striker, Levi Houapeu, from the 2010 team was drafted as a 5th pick in the 3rd round of the 2011 MLS SuperDraft by the Philadelphia Union. He is the first UMBC player to be drafted into the MLS. The men also won the conference again in 2012, and advanced to the NCAA tournament once again. They won their first-round game against Old Dominion, but lost in the second round to defending champion, UNC Chapel Hill. In 2013 the Retrievers led the country with an overall record of (16-1-3) and became the first team since 1997 to repeat as America East Conference Champions. They would earn a #16 seed and a first round bye as well as host UMBC's first ever NCAA Tournament match in any sport. The Retrievers would fall in the second round of the tournament to UConn. In 2014, the Retrievers won their third straight America East Conference Championship and advanced the furthest of any UMBC NCAA Division I team by beating the #12-ranked Creighton, as the Retrievers reached the NCAA Men's Soccer Championship semifinals. UMBC is the first team in tournament history to win four consecutive road games and to post shutouts in four consecutive games.
UMBC Women's Soccer Team went 13-5-2 in their 2013 season, tying for the regular-season conference title then winning the conference tournament. This was their first American East Conference title. They then made their first NCAA tournament appearance in 2013, where they lost to #1-ranked VA Tech 2–0 in the first round. This was an amazing accomplishment considering the team had a cumulative record of 3-39-9 in their previous three years.
Notable people
References
External links
UMBC Athletics website
Public universities and colleges in Maryland
Educational institutions established in 1966
Baltimore County, Maryland landmarks
Universities and colleges in Baltimore County, Maryland
1966 establishments in Maryland
Baltimore County, University of Maryland
|
51389500
|
https://en.wikipedia.org/wiki/Meizu%20M3S
|
Meizu M3S
|
The Meizu M3S is a smartphone designed and produced by the Chinese manufacturer Meizu, which runs on Flyme OS, Meizu's modified Android operating system. It is a current model of the M series. It was unveiled on June 13, 2016 in Beijing.
History
On May 25, 2016 it has been reported that a new Meizu device has been certified by the Chinese telecommunication authority TENAA, the Chinese equivalent to the American Federal Communications Commission. According to the certification information, the new device should feature a 5-inch display with a resolution of 720 by 1280 pixels.
In the beginning of June 2016, there were statements on Chinese social media that the upcoming device could be called Meizu M3S. Furthermore, a launch event for the new device on June 13, 2016, was announced.
Release
As announced, the M3S was released in Beijing on June 13, 2016.
Pre-orders for the M3S began after the launch event on June 13, 2016.
Features
Flyme
The Meizu M3S was released with an updated version of Flyme OS, a modified operating system based on Android Lollipop. It features an alternative, flat design and improved one-handed usability.
Hardware and design
The Meizu M3S features a MediaTek MTK 6750 system-on-a-chip with an array of eight ARM Cortex-A53 CPU cores, an ARM Mali-T860 MP2 GPU and 2 GB or 3 GB of RAM.
The M3S reaches a score of 38451 points on the AnTuTu benchmark.
The M3S is available in four different colors (grey, silver, champagne gold and rose gold) and comes with either 2 GB of RAM and 16 GB of internal storage or 3 GB of RAM and 32 GB of internal storage.
The Meizu M3S has a full-metal body, which measures x x and weighs . It has a slate form factor, being rectangular with rounded corners and has only one central physical button at the front.
Unlike most other Android smartphones, the M3S doesn't have capacitive buttons nor on-screen buttons. The functionality of these keys is implemented using a technology called mBack, which makes use of gestures with the physical button. The M3S further extends this button by a fingerprint sensor called mTouch.
The M3S features a fully laminated 5-inch IPS multi-touch capacitive touchscreen display with a HD resolution of 720 by 1080 pixels. The pixel density of the display is 293 ppi.
In addition to the touchscreen input and the front key, the device has volume/zoom control buttons and the power/lock button on the right side, a 3.5mm TRS audio jack on the top and a microUSB (Micro-B type) port on the bottom for charging and connectivity.
The Meizu M3S has two cameras. The rear camera has a resolution of 13 MP, a ƒ/2.2 aperture, a 5-element lens, phase-detection autofocus and an LED flash.
The front camera has a resolution of 5 MP, a ƒ/2.0 aperture and a 4-element lens.
See also
Meizu
Comparison of smartphones
References
External links
Official product page Meizu
Android (operating system) devices
Mobile phones introduced in 2016
Meizu smartphones
Discontinued smartphones
|
56248237
|
https://en.wikipedia.org/wiki/Wheels%20of%20Aurelia
|
Wheels of Aurelia
|
Wheels of Aurelia is a 2016 visual novel and adventure video game that was developed and published by Italian studio Santa Ragione. It was released worldwide in September 2016 for Linux, Microsoft Windows, and OS X; in October 2016 for PlayStation 4 and Xbox One; October 2017 on iOS and Android; and November 2017 for the Nintendo Switch. Its story is set in 1978 Italy and tells the story of Lella who drives along the Italian motorway Via Aurelia alongside one or many companions; commenting on issues such as single parenthood, fascism, and the Mafia.
The player controls Lella's vehicle from a bird's-eye view and dialogue choices using a branching dialogue system. On her way across Via Aurelia, she meets hitchhikers who can alter the story's outcomes. While its gameplay approximately lasts fifteen minutes, it offers sixteen different endings. It was inspired by the 1986 arcade game Out Run and the cult film Il Sorpasso. Wheels of Aurelia received mixed reviews from critics; while its atmosphere and aesthetics were praised, reviewers thought the gameplay was fitted into the narrative poorly.
Gameplay and premise
Wheels of Aurelia follows a female couple in 1978 on a road trip along the motorway Via Aurelia. Lella, a feminist woman driving a sports car stops in a nightclub and finds Olga, who accompanies her for the journey to France, leaving behind the highly political and dangerous Italy. The pair have different reasons to leave the country; Lella is attempting to re-convene with her former kidnapper, whilst Olga is attempting to get to France to have an abortion. The game features topics including single parenthood, fascism and the Mafia.
The player controls the sports car that the couple drive from a bird's-eye view. The vehicle drives forward automatically with the player able to increase the speed of the vehicle and switch lanes to navigate through traffic while simultaneously choosing dialogue options. The player visits locations between Rome and Viareggio but can visit additional locations during each playthrough. The player may change Lella's travel companions in the form of hitchhikers, and change the vehicle Lella is driving at these locations, based on the player's choice of dialogue. Experiences of the game can range from a car race against a stranger to robbing a bank. The game has 16 different endings based on player choice. From start to finish, game playthroughs can last around ten to fifteen minutes.
Development and release
Wheels of Aurelia was designed and coded by Italian studio Santa Ragione's Pietro Righi Riva and Nicolò Tedeschi, with help from Double Fine Productions Anna Kipnis. Kipnis was responsible for the game's dialogue design, a role she worked on with Double Fine Productions. It features Commedia all'italiana which the developers attempted to attach to the release. Designer, producer, and programmer Pietro Righi Riva, described the game as the "natural evolution" of the driving game mentality set out in the Out Run series, but suggested that the game did not fully capture the effortless driving they were looking for. Righi Riva noted the 1962 Italian film Il Sorpasso as the inspiration for the game and credited other driving games including 1993's World Rally Championship, and 1994's Great 1000 Miles Rally for inspiration of the visual aspects. Prior to its development, Righi Riva had discussed with co-developer Nicolò Sala regarding making a game set in Italy. Along with this, Righi Riva wanted to research how the country was in the generation before his.
The artwork was produced by multiple artists. Italian artist Flaminia Grimaldi was responsible for the game's environment, who contributed over 200 assets for its Italien landscape, whereas the characters were created by New Yorker Patrick Leger under the direction of the game's writers. Italian game designer couple We Are Müesli helped create the dialogue and provided voice artist recordings for all of the characters. The graphic design came from freelancer Luca Francesco Rossi.
Wheels of Aurelia was created using the Unity game engine, with pre-production starting in January 2014. The production was delayed until June 2015 for Santa Ragione to work on Fotonica, an action first-person runner, whilst still working on the imagery, movies, and music for Wheels of Aurelia. It was first released as a beta on Humble Bundle in the Humble Weekly Bundle: Fantastic Arcade. Known as the Fantastic Arcade Beta Edition, the game spent only four months in development to meet the deadline for the bundle and cut many features that had been originally planned for the project. A specially designed arcade cabinet was created to display the game at Fantastic Fest. The game later passed through Steam Greenlight and was released for Linux, Microsoft Windows, and OS X on 20 September 2016. The PlayStation 4 version was released on 4 October 2016, and the Xbox One version was released on 18 November 2016. It was ported to iOS and Android on 19 October 2016, and later onto Nintendo Switch via the Nintendo eShop on 2 November 2017.
Reception
According to the review aggregator website Metacritic, the Windows version of Wheels of Aurelia received "mixed or average reviews", while the Switch version received "generally unfavorable reviews". Italy's Eurogamer Manuel Stanislao reviewed the PlayStation version, was interested by the premise and the "captivating" soundtrack but stated it was only suitable for a niche audience. Rosa Piermarco writing for IGN Italy reviewed the PlayStation version, and was very positive about how unique an experience it was.
Critics praised Wheels of Aurelia presentation and graphical interface. Gita Jackson for Kotaku was very positive about the graphics, noting it to capture the themes of Italian neorealist film despite being a modern game. Jackson also praised the game's atmosphere, commenting on the setting of Italian life during this period being particularly interesting. Piermarco of IGN Italy praised its graphics and art style, citing the "nice low poly graphics and two-dimensional portraits" of the characters being inspired by 1970s comics, likening them to Lanciostory and Skorpio Nintendo World Report reviewer David Lloyd shared similar praise, noting the combination of beautiful artwork and the original music score captures the essence of 1970s Italy. Suriel Vazquez for review magazine Game Informer were responded positively particularly on its immersion.
Lloyd found the story and characters uninteresting and criticized having to replay the game from the beginning in order to unlock different endings, rather than choosing specific points in the game. However, some reviews questioned the game's substance. Edge said it is a "shame the journey itself can't match the poignancy of the final destination". When reviewing the Nintendo Switch release, Switch Player Liam Langan was disappointed for it being too short especially as one of the first visual novels on the platform. Langan also commented on the game's value for money, saying "Maybe if the game was longer I might’ve had more time to warm into the story and I may have been able to enjoy Wheels of Aurelia a little more." Liam Doolan's piece for Nintendo Life shared similar opinions, calling the visual novel aspects "lacklustre", but the gameplay "even worse". Vazquez cited the games' "aesthetically flawless" graphics and the "accurate historical reconstruction"; however, it was less appreciative of the driving mechanics and lack of real interaction with the story.
References
External links
Developer Santa Ragoine Website
2016 video games
Android (operating system) games
Hitchhiking in fiction
IOS games
Linux games
MacOS games
Nintendo Switch games
PlayStation 4 games
PlayStation 4 Pro enhanced games
Single-player video games
Video games developed in Italy
Video games set in 1978
Video games set in Italy
Video games with alternate endings
Western visual novels
Windows games
Xbox One games
|
503369
|
https://en.wikipedia.org/wiki/Logica
|
Logica
|
Logica plc was a multinational IT and management consultancy company headquartered in London and later Reading, United Kingdom.
Founded in 1969, the company had offices in London and in a number of major cities across England, Wales and Scotland, as well as in other countries around the world. It was responsible for many telecommunications infrastructure projects, such as the design of the SWIFT network for international money transfers, the Euronet packet-switching network, and the Bay Area Rapid Transit in San Francisco. Following the acquisition of CMG in 2002, the company was known as LogicaCMG from then until 2008, when it changed its name back to Logica. The company's main business at that point was in providing consulting, systems integration, and IT outsourcing in both the public and private sectors.
Logica was acquired by Canada-based CGI Group in 2012 and the Logica brand name ceased being used in 2013.
History
Origins
Logica was started as a systems integration business in 1969. Its founders were five people who left Scicon, an American computer company that had opened a London-based UK subsidiary and that had then been bought by BP. Chief among these were Len Taylor, who took the operational helm, and Philip Hughes, who served in the visionary role. Indeed a later profile would call Hughes "one of the architects of the information age."
The other founders were Pat Coen, Steve Feldman, and John McNeil. Another important figure, David Mann, joined the fledgling outfit a few weeks later. Together these people, in the later words of the Financial Times, "gave the company its distinctive character."
Early projects and expansion
The new firm's first major contract came in 1970 for a computerized hotel reservation system that would operate on a nationwide basis and was worth £100,000. Another early project was the control system for the United Kingdom's natural gas grid in 1971. In its early years the company focused on adapting software to specific customer needs and requirements and advising customers on trends in information technology. The company was premised on the idea that there was tremendous promise in communications technology and that an international approach was warranted. Accordingly, Logica's first overseas office, in the Netherlands, was opened in 1973, the same year that turnover exceeded £1 million for the first time. Overall, Logica played a role in putting into use many of the components that later made the Internet a large-scale success.
Logica had a major success that gave it visibility when it won the design of the SWIFT network for international money transfers in 1972–73. The company produced a whole new production, transmission and management system for the BBC in the late 1970s. Another involved the first bank cash dispenser in the UK. The company's staffing levels were around 200 employees in the early years, and their successes at pulling off large-scale and difficult projects garnered them a reputation for technical excellence and able management.
McNeil led the teams that did many of the company's early projects. He left Logica in 1977 and ended up in a successful career as a novelist and a writer for BBC dramas.
In 1974, Logica, together with the French company SESA, set up a joint venture, Sesa-Logica, to undertake the Euronet development. The project, with the support of partners throughout Europe and the assistance of Bolt, Beranek and Newman in Cambridge, Massachusetts, used the packet switching technology of the NPL network and ARPANET and X.25 protocols to form virtual circuits. It established a network linking research centres in a number of European countries. They hired Roger Scantlebury in 1977 who had worked on the European Informatics Network, a datagram network linking CERN, the French research centre INRIA and the UK’s National Physical Laboratory.
Logica set up operating subsidiaries in the Sweden and the United States in 1977, and ones in other countries would follow..
Logica featured in the 1978 BBC Horizon documentary Now the Chips Are Down. While there were many other British computer services firms started up during this period, most ended up being bought out by bigger companies or overseas services firms. As such Logica became the dominant independent UK computer services company.
The firm was involved in the development of the original automatic train control system for San Francisco Bay Area Rapid Transit (BART) in the late 1970s and early 1980s as part of the original construction of BART.
Logica VTS
In 1975, Logica developed the first electronic typing pool – Unicom – for Unilever. This development allowed the functions of a typing pool to be automated into a single system supporting about 50 workstations.
With the support of the UK's National Enterprise Board, in January 1979 the company established a new subsidiary to exploit this technology, Logica VTS. A range of standalone word processors, the VTS 100, the VTS 2200 ("Whirlwind") and, finally, the VTS 2300 ("Kennet"), were developed and were manufactured at a purpose built factory in Swindon. These machines were sold internationally by BT and by International Computers Ltd, and were amongst the first word processors to achieve mass sales.
The advent of the personal computer, and software such as WordPerfect, led to the decline of this business and its ultimate closure.
In connection with office automation, Logica VTS also engaged in product work related to local area networking, putting out a product called Polynet in 1981 which was based upon the Cambridge Ring idea rather than Ethernet. This aspect of business was still going in 1984, with Logica founder Pat Coen as managing director of Logica VTS.
By the end of 1985, Logica had decided to exit the office automatic business, and Logica VTS was shut down over the course of 1986.
Software Products Group, Rapport, and Xenix
Most of Logica's software products were used only internally, as part of reusing implementation parts of the contracting projects it engaged in. However, Logica staged a foray into the wider software products world in the early-mid 1980s, creating the Software Products Group. The director of the group was Gordon Kirk.
Logica Rapport was an early relational database management system that was developed internally in 1977 and began selling as a general product in 1979, with another release in 1980. Micro Rapport was also released, for the Zilog Z80. By 1986, support for Rapport was being phased out by Logica, to the consternation of some organisations using it.
Xenix was a version of the Unix operating system that Microsoft worked on; in 1982 they engaged with the Santa Cruz Operation (SCO) in this work, with the two companies' engineers working together on improvements. Microsoft and SCO then further engaged Human Computing Resources in Canada, and the Software Products Group within Logica in the United Kingdom, as part of making further improvements to Xenix and porting Xenix to other platforms. In doing so, Microsoft gave HCR and Logica the rights to do Xenix ports and license Xenix binaries in those territories, which for Logica included all of Europe. This second source agreement was formalised between Microsoft and Logica in January 1983.
This Logica group put out several releases, including Xenix 3.0 in 1984, which was based on UNIX System III for 16-bit processors with some Berkeley Software Distribution networking functionality and improved compatibility with MS-DOS. Logica stated that it had over 300 clients for its Xenix product, including other computer manufacturers such as Acorn Computers, Plessey Microsystems, SAGEM, Regnecentralen, and Triumph Adler, indirect sales through resellers, and direct sales to end customers such as Chemical Bank, West Midlands County Council, and Natural Environment Research Council. Logica's positioning of Xenix included features making it easier to use. However, during 1986, Logica decided to, as it said in its annual review, "withdraw from Xenix operations".
The Software Products Group was acquired by SCO in December 1986; it became a wholly owned subsidiary, the Santa Cruz Operation Limited, and the basis for SCO's UK operation, with its office subsequently being relocated first to Soho and then to Watford outside London. Initially supplemented by some engineers who transferred from SCO's headquarters operation in Santa Cruz, California, the ex-Logica group now in Watford became one of the major development sites for SCO and over the next few years did the operating system kernel development work behind the subsequent SCO OpenDesktop and SCO OpenServer product releases, as well as later working in networking, security, escalations, and other areas, in addition to being the sales, marketing, and customer engineering hub for SCO's (and later Caldera International's) EMEA region (although most development work in Watford was shut down in 2000).
Public company and the David Mann era
The company floated on the London Stock Exchange on 26 October 1983. The company had 1,000 employees at this time, and they were major shareholders, owning some 40 percent of the firm. However the stock price remained flat during this time, and indeed would for much of the next ten years.
In 1985 they were faced with a hostile takeover bid by the Ross Perot-led competitor Electronic Data Systems (EDS), but they were able to fend it off. Around this time the UK trade magazine Computing named Logica as the "Company of the Decade".
In 1984 the company developed the automated clearing system for the UK banks (CHAPS) as well as the customer service system for British Telecom.
Logica pioneered the automated ticketing system for London Underground in 1987 and a new version of the system which randomly generates Premium Bond numbers (ERNIE) in 1988.
Logica set up joint ventures in Hong Kong with Jardine Matheson in 1984, in Italy with Finsiel in 1993, and in the UK with British Airways in 1990. The company's research and development arm was known as Logica Cambridge and located in Cambridge, England.
Logica's competitors in the IT services and contracting realm in general included not just EDS but also Andersen Consulting, Cap Gemini Sogeti, and the Sema Group, as well as in specialty areas (such as banking) Hoskyns Group, Admiral Consulting, and Advanced Computer Techniques.
Near-original employee David Mann became managing director and CEO of the company in 1987. Founder Philip Hughes resigned as chairman of the board of directors in 1990, and left the board entirely in 1995, focusing instead on a completely different career as a very successful landscape painter. Other original founders of the company were also playing a lesser role at this point.
During the late 1980s and early 1990s the company was led by David Mann. During this period the company's turnover fell flat, and it suffered a loss in 1991, as it struggled with the effects of the early 1990s recession, especially among customers in the financial services industry. There were also problems in the Logica US subsidiary, and changes in the software marketplace. The company gained a reputation for emphasizing the creation of technically difficult, bespoke solutions, but ones that did not always maximise customer or shareholder value. By February 1994, Mann was out as CEO.
Martin Read era
Martin Read was recruited from GEC Marconi, where he had worked for Arnold Weinstock, and appointed CEO in August 1993. Most of the executive directors left the company during the two years following his appointment – David Mann, Colin Rowland, Andrew Karney, Ian Macleod and Cliff Preddy. This was not unexpected; as one of the very few still left, Andrew Given, later said, "As executive directors we knew we were being brave in choosing him, because for most of us it was like turkeys voting for Christmas."
By 1994 the company had some 3,400 employees.
Defence work was still going on within the company, being done both by both Logica plc and by a specific group known as Logica, Defence and Civil Government.
By the close of the 1990s, Logica had seen large-scale growth, with an average annual earnings increase of 35 percent over the previous five years and an increase in the company's market capitalisation from £130 million in August 1993 to £6.1 billion in December 1999. Logica had 8,500 employees and had gained entry into the FTSE 100. Its customers included large governmental organizations and private companies such as Ford, Exxon, IBM, Compaq, Vodafone, Reuters, Merrill Lynch, Prudential, Deutsche Bank, and Diageo. Read had great ambitions for the company, saying that over the next five years, "I would like to make Logica as famous a brand as IBM."
In 2000, Logica acquired the German computing services business PDV for £370 million, increasing the size of the German workforce by 1,200 in the process.
In 2001 the company secured an outsourcing contract to create and operate a new case management system for the Crown Prosecution Service. At this time the level of Read's remuneration received attention when it was revealed that he enjoyed a £28 million pay packet.
LogicaCMG
The merger of Logica (60 percent) with British company CMG (40 percent) to form LogicaCMG on 30 December 2002 united an established technology firm (Logica) with an established consulting firm (CMG).
In December 2003, LogicaCMG’s software controlled the doomed Beagle 2 probe after separation from the Mars Express orbiter.
During the mid-2000s the company embarked on a series of acquisitions of Continental European firms. In 2005, LogicaCMG purchased 60 percent of the Portuguese company Edinfor (and in March 2008 purchased the remaining portion). In 2006, LogicaCMG purchased the French company Unilog for £631 million and the Swedish company WM-data for £876 million.
The company suffered some embarrassment in 2006 when laptops containing police payroll data were stolen from LogicaCMG and an outsourcing contract with Transport for London for IT services was terminated early after disputes over payments and service level agreements.
By 2007, the firm had some 39,000 employees and offices in 36 countries, and was one of Europe's largest IT services and outsourcing firms. Its largest locations in terms of employees counts were France, the Netherlands, and the United Kingdom, in that order. Its most profitable sales regions were the UK, France, the Netherlands, and Scandinavia.
On 20 February 2007, LogicaCMG Telecom Products was sold for £265m (US $525m) to private investors Atlantic Bridge Ventures and Access Industries, and became known as Acision.
Following a profit warning in 2007, shareholders became increasingly skeptical about the wisdom of the European acquisitions strategy, and Martin Read was forced out as CEO by these shareholders.
Return to Logica
Andy Green was recruited as the new CEO and took office from 1 January 2008.
On 27 February 2008, the company changed its name back to Logica. Nevertheless news accounts often referred to the company as being Anglo-Dutch.
In April 2008 Green announced a major restructuring programme for the company, leading to 1,300 job losses. In May 2008 the company announced that it would offshore more of its activities including SAP support and HR and payroll administration to Makati in the Philippines, and saw a subsequent increase in its outsourced HR and payroll services business to more than 850 customer organisations.
Beginning in late 2009, Logica's revenues suffered from the effects of the European debt crisis. In December 2011, Logica announced it would cut 1,300 jobs or around 3 percent of the workforce spread across Benelux, the United Kingdom and Sweden, to save 50 to 60 million pounds a year from the second half of 2012. Logica's shares fell to half their value from a year prior. Gradually the outsourcing component came to represent some 45 percent of the company's overall business.
Acquisition by CGI
On 31 May 2012, Canada's CGI Group agreed to buy Logica in a £1.7 billion cash deal. The acquisition would give CGI a large presence in Europe for the first time and make it the sixth-largest IT services provider in the world. The acquisition was completed on 20 August 2012.
At the time of the acquisition, CGI had some 35,000 employees compared to Logica's 40,000; following elimination of redundancies, around 71,000 employees were in the newly merged company. By March 2013, Logica had been fully integrated into CGI and the Logica brand name disappeared from use.
Operations
Logica was a management consultancy, outsourcing and IT services and solutions company. Its activities included:
Supporting the missions of over 150 orbiting satellites.
Processing more than $100 billion of salaries globally each year.
Supporting 300 telecoms operators in 130 countries.
LogiBods
Some Former Logica staff have referred to themselves as a "LogiBod".
During the 1980s and 1990s Logica ran an extensive graduate recruitment programme that resulted in the company having a relatively young workforce.
Ties between former employees often persist longterm up to and including the present. There is an independently operated alumni society, run by former employees, to cater for nostalgic needs of LogiBods and help them keep in touch.
See also
Defence Information Infrastructure
References
External links
– CGI
www.logica.co.uk – Logica official website – archived May 2012
1969 establishments in England
2012 disestablishments in England
2012 mergers and acquisitions
Business services companies of the United Kingdom
Companies based in Reading, Berkshire
Companies based in the City of Westminster
Consulting firms established in 1969
Former defence companies of the United Kingdom
International information technology consulting firms
Software companies disestablished in 2012
Software companies established in 1969
|
12790894
|
https://en.wikipedia.org/wiki/ISO/IEC%2027006
|
ISO/IEC 27006
|
ISO/IEC 27006 is an information security standard published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). Part of the ISO/IEC 27000 series of ISO/IEC Information Security Management System (ISMS) standards, it is titled Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems.
ISO/IEC 27006 lays out formal requirements for accredited organizations which certify other organizations compliant with ISO/IEC 27001.
It effectively replaces EA 7/03 (Guidelines for the Accreditation of bodies operating certification/ registration of. Information Security Management Systems).
The standard helps ensure that ISO/IEC 27001 certificates issued by accredited organizations are meaningful and trustworthy, in other words it is a matter of assurance.
Description of standard
ISO 27006 outlines requirements to be accredited for third parties who audit and certify information security management systems (ISMS), in addition to the requirements set by ISO 17021-1 and ISO 27001. This standard was first published in 2007, and it had to be revised twice due to significant changes made to ISO 17021 standard. The current version is ISO 27006 third edition published in 2015.
ISO 27006:2015 sets standards for demonstration of ISMS auditors' competence. Certification Body auditing ISMS is required to verify each auditor on the auditing team has the knowledge of:
ISMS monitoring, measurement, analysis, and evaluation,
Information security,
Management systems,
Auditing principles, and
Technical knowledge of systems to be audited.
All auditors on the team must collectively be versed in information systems management terminology, principles, and techniques. They must know all requirements from ISO 27001, all controls listed in ISO 27002. Also, auditors must be aware of business management practices, the legal and regulatory requirements in a particular information systems field, geography, and jurisdictions.
Competence must also be demonstrated by personnel reviewing the audits and making certification decisions. They need to have sufficient knowledge to verify the accuracy of the certification scope. Also, they need to have general knowledge of management systems, audit procedures, principles, and techniques.
ISO27006:2015 also outlines adequate education, professional development, training covering ISMS audits, and current/relevant experience level.
Intent of standard
The primary intent of ISO 27006 is to support the accreditation for third parties certifying the information security management system. Any accredited third-party auditing and confirming compliance with ISO 27001 must follow the requirements in this standard to ensure the ISMS certifications are valid. Accredited third parties need to demonstrate their competence and reliability.
Application
A mid-size organization seeking ISO 27001 certification need to hire an accredited certification body to complete ISMS certification audit. The organization should complete due diligence to ensure the selected auditing firm complies with ISO27006:2015 standard. During the audit, the organization should ensure all documentation necessary to complete the audit is available, provide the auditing team ISMS records, including but limited to information about ISMS design and effectiveness of the controls.
See also
ISO/IEC 27000-series
ISO/IEC JTC 1/SC 27 - IT Security techniques
References
External links
ISO Website
27006
|
12148063
|
https://en.wikipedia.org/wiki/Ontario%20Linux%20Fest
|
Ontario Linux Fest
|
The Ontario Linux Fest was an annual grass roots conference organized by, and for, Linux and Open Source enthusiasts, held in Ontario, Canada from 2007 to 2009. The event debuted on October 13, 2007. Each conference lasted one day. Topics included technical discussions regarding software projects, new and emerging technologies and how to's, and non-technical topics such as advocacy, history and motivational talks.
History
The Ontario Linux Fest was the idea of Richard Weait and John Van Ostrand. The pair attended the Ohio LinuxFest for the first time in 2004 and were very pleased with the content and organizations of the event. A few different ideas about an Ontario Linux Fest were discussed on the way back from Ohio, but it wasn't until late 2006 that Van Ostrand took the first steps in organizing the Ontario Linux Fest.
The organizers canceled the event in 2010.
References
Linux conferences
Recurring events established in 2007
Recurring events disestablished in 2009
|
68743957
|
https://en.wikipedia.org/wiki/Blue%20Chip%20Electronics
|
Blue Chip Electronics
|
Blue Chip Electronics was an American computer company founded by John Rossi in 1982. Rossi, a former employee of Commodore Business Machines, founded the company to develop peripherals for Commodore's home computers. The company switched gears in 1986, when Rossi employed Hyundai Electronics as an original equipment manufacturer (OEM) for Blue Chip's own line of computers, which were low-cost IBM PC clones.
1982: Foundation and Commodore peripherals
John Rossi founded Blue Chip Electronics in 1982 from his home in Scottsdale, Arizona. Rossi formerly worked at Commodore Business Machines as a sales manager of the company's European market. Rossi expressed dissatisfaction with Commodore's management during the mid-1980s, when the company underwent three changes of chief executive officer (CEO), which removed its founder Jack Tramiel from office. In 1986, Rossi referred to Commodore as a "well-known revolving door". Among the company's first offerings in 1983 was a line of RS-232 serial and HP-IB parallel high-resolution dot-matrix printers for computers such as the Commodore 64 and the IBM PC. Later that year they introduced a daisy wheel printer, the BCD-4015, that supported both cut-sheet and tractor-feed stationery, 5 to 15 inches wide. In 1984 they released a lower-resolution dot-matrix printer, the M120/10, compatible only with the C64, in direct competition with Commodore's own branded dot-matrix printers.
By early 1986, the company had moved from Scottsdale to Tempe. In late 1985, Blue Chip released the BCD/5.25, a direct-drive 5.25-inch floppy disk drive, again directly competing against Commodore with their 1541 floppy drives for the C64. The BCD/5.25 was faster than the 1541 and had a smaller footprint. When paired with the Commodore 128, the BCD/5.25 could be used in that computer's C64 compatibility mode while retaining its increase in speed, whereas Commodore's 1571 drive could not take advantage of its own "burst" mode within the C128's C64 mode, instead emulating the earlier 1541 with its slower thoughtput.
By mid-1986, Blue Chip had moved again, Tempe to Chandler, It was now valued at US$60 million. In the same year they planned to release the BCD/128, a competitor to the 1571, complete with its own burst mode, and the BCD/3.5, which would allow 3.5-inch floppy disks to be used with the C64. The BCD/3.5 was to be compatible with the 128 but without burst mode. Only the BCD/128 was ever released.
1986: Partnership with Hyundai
In July 1986, the company announced a clone of IBM's PC XT, called the Blue Chip Personal Computer, to be released in October of the same year. Although some mail order companies were offering lower-priced systems, Blue Chip's clone was expected to be the lowest-priced system sold through retail channels. Blue Chip hired an unnamed company in Japan to design the computer and Hyundai Electronics in Korea to manufacture it. Under their contract, Blue Chip was the exclusive seller of computers manufactured by Hyundai. This partnership came into being when Blue Chip were looking for a manufacturer of their Commodore printers. When Rossi chose Hyundai as a candidate, Hyundai hinted at their plans to develop their own IBM PC clone. Rossi convinced Hyundai to sell their computers under the Blue Chip name.
The Blue Chip PC featured an Intel 8088 microprocessor running at 4.77 MHz, 512 KB of RAM (supporting up to 640 KB), six expansion slots, one 5.25-inch floppy drive, a high-resolution Hercules-compatible monochrome graphics card, and serial and parallel ports built into the motherboard. The base configuration originally retailed for US$699 —the cheapest PC clone sold through department stores at the time, according to the Los Angeles Times. A green- or amber-phosphor monochrome monitor was sold separately for US$89. The Blue Chip PC was intended to be bundled with MS-DOS 3.2 as part of its base configuration. However, on launch, this was sold separately, along with GW-BASIC, for US$100.
Blue Chip contracted the manufacturing of 120,000 units of the computer to Hyundai in July and had several department stores on board to sell all units, including Target and Caldor. In the next month, the company chose these two stores as test markets for the computer. Rossi expected interest from the educational sector to exceed that from retail customers. However, 80 percent of purchases during this test run came from small- and medium-sized businesses who sought a computer at around US$700 that they could buy from stores. Blue Chip then nearly doubled the number of units for Hyundai to manufacture, with Rossi expecting to sell up to 200,000 units by the next year.
On launch in October, the Blue Chip PC was stocked in over 500 department stores across the continental United States, including Target, Caldor, Sears, Venture, Federated Group, and Fedco, as well as select Walmart and Toys "R" Us stores. Blue Chip supported this launch with a radio advertising campaign devised by WFC Advertising of Phoenix, Arizona. Meanwhile, Hyundai Electronics' sister automotive company were becoming established in the United States with their low-cost cars during the mid-1980s, and Rossi expressed interest in tying future versions of the computer with the Hyundai name.
From September to November, 27,000 units of the Blue Chip PC were sold. Hyundai projected a total of 50,000 units sold by the end of 1986 but expressed doubt that this would turn much of a profit, while remaining optimistic about sales of future versions of Hyundai's computer designs at higher prices. Blue Chip themselves were concerned about their lack of a repair service network and skilled sales force. They sought to rectify the latter by educating retail salespeople through seminars, training videos, and a floppy disk that demonstrated the computer's strengths. The company also hired Bryan Kerr, previously the director of marketing for the Tramiel-led Atari Corporation, as vice-president of marketing and sales in late November.
By November 1986, Blue Chip had 20 employees working from their Chandler office. It was in this month that they introduced the Blue Chip PC AT, an AT-compatible with an Intel 80286 running at a user-switchable 8- or 10-MHz clock speed, 1 MB of RAM (expandable to 16 MB), a single 1.2 MB 5.25-inch floppy drive, an optional 40- or 80-MB hard disk drive, integrated EGA graphics, a 12-inch monochrome monitor, and a keyboard. Its base configuration retailed for US$1895.
1987–90: Breakup with Hyundai and acquisition
In May 1987, Blue Chip collaborated with Hyundai again to develop the Blue Chip PC Popular, also based on the PC XT but with a lower initial retail price of US$549. Blue Chip included with the PC Popular a keyboard, mouse, and other value-adds but still sold the monitor separately. A month later they announced the PC Turbo, featuring similar specifications to their original PC including six expansion slots but now with an 8088 processor with a clock speed switchable between 4.77 MHz and 8 MHz and a 30 MB hard drive. Blue Chip abruptly terminated their relationship with Hyundai within the next month, after the former alleged that Hyundai let an order of 9,000 original PC Turbos and 21,400 PC Populars lapse and that Hyundai were selling their computers to other dealers. Blue Chip followed up with a lawsuit, seeking US$4.5 million in damages, and turned to TriGem Computer, another Korean electronics company, for their manufacturing. In November that year, Blue Chip and TriGem released the MasterPC, increasing the clock speed of the Blue Chip AT to 10–12 MHz switchable and with eight expansion slots.
The company established a subsidiary for international business, Blue Chip International, in 1988. During this time, the company was struggling. Rossi blamed this on their dealings with thematically inappropriate retailers such as Service Merchandise and camera stores, and sought to rectify it by adding configurations to their line-ups of computers available only to specialist retailers. The company released the Blue Chip 286 and Blue Chip 386, each of which featured a 1.2-MB 5.25 floppy drive and a 40 MB hard drive. The 386 was their most expensive product to date, at US$3199 in its base configuration, while base configuration for the 286 was US$1299. The 386 featured an Intel 80386 processor and 1 MB of base memory, expandable to 16 MB, while the latter featured an 80286 and 512 KB of RAM (expandable up to 1 MB). They also released a compact laser printer, for US$2499.
In late 1989, Capewood Limited, a holding company based in Hong Kong, acquired Blue Chip Electronics and its International subsidiary for an undisclosed sum. Rossi stated that Capewood intended to continue to market Blue Chip's products while expanding their product lines into the 1990s. Capewood apparently struggled with the Blue Chip name in 1990, with allegations of the company delivering faulty machines and generating bad debt among its dealers. At least one dealer, Crown Computers, took legal action against Blue Chip that year. The Blue Chip trademark was declared abandoned in 1995.
See also
Indus GT
MSD Super Disk
Leading Edge Model D
Citations
References
American companies established in 1982
American companies disestablished in 1995
Commodore 64 peripheral manufacturers
Computer companies established in 1982
Computer companies disestablished in 1995
Defunct computer companies of the United States
Defunct computer hardware companies
Defunct manufacturing companies based in Arizona
|
1188604
|
https://en.wikipedia.org/wiki/Interactive%20kiosk
|
Interactive kiosk
|
An interactive kiosk is a computer terminal featuring specialized hardware and software that provides access to information and applications for communication, commerce, entertainment, or education.
By 2010, the largest bill pay kiosk network is AT&T for the phone customers which allows customers to pay their phone bills. Verizon and Sprint have similar units for their customers.
Early interactive kiosks sometimes resembled telephone booths, but have been embraced by retail, foodservice, and hospitality to improve customer service and streamline operations. Interactive kiosks are typically placed in the high foot traffic settings such as shops, hotel lobbies, or airports.
The integration of technology allows kiosks to perform a wide range of functions, evolving into self-service kiosks. For example, kiosks may enable users to order from a shop's catalog when items are not in stock, check out a library book, look up information about products, issue a hotel key card, enter a public utility bill account number to perform an online transaction, or collect cash in exchange for merchandise. Customized components such as coin hoppers, bill acceptors, card readers, and thermal printers enable kiosks to meet the owner's specialized needs.
History
The first self-service, interactive kiosk was developed in 1977 at the University of Illinois at Urbana–Champaign by a pre-med student, Murray Lappe. The content was created on the PLATO computer system and accessible by the plasma touch screen interface. The plasma display panel was invented at the University of Illinois by Donald L. Bitzer. Lappe's kiosk, called The Plato Hotline allowed students and visitors to find movies, maps, directories, bus schedules, extracurricular activities, and courses. When it debuted in the U of Illinois Student Union in April 1973.
, more than 30,000 students, teachers, and visitors stood in line during its first 6 weeks, to try their hand at a "personal computer" for the first time.
The first successful network of interactive kiosks used for commercial purposes was a project developed by the shoe retailer Florsheim Shoe Co., led by their executive VP, Harry Bock, installed circa 1985. The interactive kiosk was created, manufactured, and customized by ByVideo Inc. of Sunnyvale, CA. The network of over 600 kiosks provided images and video promotion for customers who wished to purchase shoes that were not available in the retail location. Style, size, and color could be selected, and the product paid for on the kiosk itself. The transaction was sent to the Florsheim mainframe in St, Louis, MO, via dialup lines, for next-day home or store delivery via Federal Express. The hardware (including a microcomputer, display system, touchscreen) was designed and built by ByVideo, while other components (like the CRT, floppy disk, printer, keyboard, and physical housing) were sourced from other vendors. The videodisc material was created quarterly by ByVideo at Florsheim's direction, in ByVideo's state-of-the-art video production facility in CA. This kiosk network operated for over 6 years in Florsheim retail locations.
In 1991, the first commercial kiosk with an internet connection was displayed at Comdex. The application was for locating missing children. The first true documentation of a kiosk was the 1995 report by Los Alamos National Laboratory which detailed what the interactive kiosk consisted of. This was first announced on comp.infosystems.kiosks by Arthur the original Usenet moderator.
In 1997, KioskCom was launched to provide a tradeshow for organizations looking to deploy interactive self-service kiosks. These trade shows used to occur twice a year, and offer companies education and demonstrations for successful self-service deployments.
The first company to launch a statewide interactive kiosk program was Imperial Multimedia in 2007. Imperial Multimedia installed interactive kiosks in 31 of Virginia's State Parks and these electronic kiosks included park overviews, printable maps, waypoints, points of interest, video tours of trails, and emergency information.
Today's kiosks are usually found in the airport at departure and also baggage, QSR, and Fast Casual self-order deployments have greatly expanded. There are now restaurants that orders only come in via mobile or kiosks. With the COVID-19 outbreak, new kiosk iterations such as the temperature screening kiosk have seen exponential growth in a very short time. Bill payment kiosks for AT&T and Verizon are expanding as well.
Design and construction
The aesthetic and functional design of interactive kiosks is a key element that drives user adoption, overall up-time, and affordability. There are many factors to consider when designing an interactive kiosk including:
Aesthetic design: The design of the enclosure is often the driving factor in user adoption and brand recognition.
Manufacturing volume: This will determine which manufacturing processes are appropriate to use (i.e. sheet-metal, thermoformed plastic, etc.).
Kiosk software: The interactive function of the kiosk hardware is largely determined by the software program and kiosk software configuration.
Graphic messaging: Plays a key role in communicating with potential users.
Maintenance and thermal design: Critical to maximizing up-time (the time between failures or crashes).
Component specification: Typical components include Touch-screen, P.C., pointing device, keyboard, bill acceptor, mag-stripe and/ or bar-code scanner, surge protector, UPS, etc.
Ergonomic: Is important to ensure comfortable and easy user accessibility.
Regulatory compliance: In the US it is important to design to the Americans with Disabilities Act (ADA). Electrical standards include UL in the U.S. and CE in Europe. In the retail space, you have Payment Card Industry (PCI) certification in the U.S. which is a descendant of VISA PED (relative of Chip and PIN in Europe).
Interface design: Designing for interactive kiosks typically requires larger buttons and simpler decision trees than designing for a web or computer-based interactive. Catchy attractive animations and short dwell times are important.
Durability: The intended location of the kiosk will largely influence the construction as materials and electronic requirements are significantly different for indoor vs. outdoor kiosks.
Interactive kiosks around the world
Government usage
Several countries historically implemented the nationwide installation of kiosks for various purposes. One example of such large scale installations can be found in the United Kingdom, where thousands of special-purpose kiosks are now available to aid job-seekers in finding employment.
The United States Department of Homeland Security has created immigration kiosks where visitors register when they enter the United States. There are also Exit kiosks where visitors register when they leave the U.S.
The postal service has automated kiosks in many of the postal offices for self-service.
The Veterans Administration has over 5,000 patient kiosks deployed. In 2020 the next generation kiosks along with mobile check-in for veterans began.
In India, digital kiosks are used for various purposes, such as payment of bills.
Industry usage
It is estimated that over 1,200,000 kiosk terminals exist in the U.S. and Canada alone.
Groups who use kiosks in their business environment include: Delta Airlines, United Airlines, JetBlue Airways, GTAA, Future Shop, The Home Depot, Target Corporation, and Wal-Mart.
Types of kiosks
Telekiosk
The telekiosk can be considered the technical successor to the telephone booth, a publicly accessible set of devices that are used for communication. These can include email, fax, SMS, as well as standard telephone service. The Telekiosk is rarely seen anymore.
Telekiosks gradually appeared around the United Kingdom in the first years of the 21st century. Some are situated in shopping centers and transport terminals, to provide detailed local information. Others are in public places, including motorway service areas and airports.
The International Telecommunication Union is promoting the use of the telekiosk in Africa and parts of Asia where local people do not have access to communications technology. In part, this work addresses the "digital divide" between rich and poor nations. There are, however, great practical benefits. The scheme in Bhutan aims to provide an E-Post system, whereby messages are relayed by telephone, then delivered by hand to rural areas, easing the problems of transporting letters across the countryside. Health, agricultural and educational information is also available.
Financial services kiosk
The financial services kiosk can provide the ability for customers to perform transactions that may normally require a bank teller and maybe more complex and longer to perform than desired at an ATM. These are sometimes referred to as "bank-in-a-box" and the first prime example would be the Vcom units deployed in 7–11 in the U.S.
These units are generally referred to as 'multi-function financial service kiosks' and the first iteration was back in the late 1990s with the VCOM product deployed in Southland (7-Eleven) convenience stores. Check-cashing, bill-payment and even dispensing cash cards. New multi-function machines have been deployed in "c-store" markets supported by Speedway and others.
Photo kiosk
An interactive kiosk allows users to print pictures from their digital images. The marquee example began with Kodak who had at one point had over 100,000 units up and running in the U.S. Many of these units were customized PCs with an LCD which would then print to the central printer in Customer service. Two major classes of photo kiosks exist:
Digital Order Stations -- This type of photo kiosk exists within retail locations and allows users to place orders for prints and photographic products. Products typically get produced in-store by a digital minilab, or at another location to be shipped directly to the consumer, or back to the store to be picked up at a later time. Digital Order Stations may or may not support instant printing, and typically do not handle payments.
Instant Print Stations - This type of photo kiosk uses internal printers to instantly create photographic prints for a self serve paying customer. Often located in public locations (hotels, schools, airports), Instant Print Stations handle payments. Often such systems will only print 4x6 inch prints, although popular dye-sublimation photo printers as of 2008 allow for 4x6, 5x7, 8x10, 8x12. It's more a matter of resupply labor economics and chassis size.
Internet kiosk
An Internet kiosk is a terminal that provides public Internet access. Internet kiosks sometimes resemble telephone booths, and are typically placed in settings such as hotel lobbies, long-term care facilities, medical waiting rooms, apartment complex offices, or airports for fast access to e-mail or web pages. Internet kiosks sometimes have a bill acceptor or a credit card swipe, and nearly always have a computer keyboard, a mouse (or a fixed trackball which is more robust), and a monitor.
Some Internet kiosks are based on a payment model similar to vending machines or Internet café, while others are free. A common arrangement with pay-for-use kiosks has the owner of the Internet kiosk enter into a partnership with the owner of its location, paying either a flat rate for rental of the floor space or a percentage of the monthly revenue generated by the machine.
One of the first companies in North America to develop and deploy internet kiosks with touch screens via user login and password was Streetspace Inc. based out of San Francisco, California. Starting in 1999 they deployed internet kiosks across locations inside cafes, restaurants, and record shops in Berkeley, California. Street space was also one of the first companies to roll-out targeted advertising and services to these internet kiosks based on the location of the kiosk and the profile of the user when they logged into the terminal.
Internet kiosks have been the subject of hacker activity. Hackers will download spyware and catch user activity via keystroke logging. Other hackers have installed hardware keystroke logging devices that capture user activity.
Businesses that provide Internet kiosks are encouraged to use special Internet kiosk software and management procedures to reduce liability exposure.
Ticketing kiosk
Many amusement parks such as Disney have unattended outdoor ticketing kiosks. Amtrak has automated self-service ticketing kiosks. Busch Gardens uses kiosks for amusement parks. Lisbon Oceanarium has self-service ticketing kiosks by Partteam & Oemkiosks. Cruise ships use ticketing kiosks for passengers. Check-in Kiosks for auto rental companies such as Alamo and National have had national deployments.
The ticket halls of train stations and metro stations have ticketing kiosks that sell transit passes, train tickets, transit tickets, and train passes.
Movie ticket kiosk
Many movie theater chains have specialized ticket machines that allow their customers to purchase tickets and/or pick up tickets that were purchased online. Radiant and Fujitsu have been involved in this segment.
Restaurant kiosk
A new way to order in-cafe from tablet kiosks. Kiosks are available in addition to cashier stations so that wait time is reduced for all guests. The kiosk is highly visual and includes a product builder to assist with order accuracy and customization.
DVD vending kiosk
An example of a vending kiosk is that of the DVD rental kiosks, where a user can rent a DVD, secured by credit card. One of the largest is Redbox with a presence throughout North America.
Visitor management and security kiosk
Visitor management and security kiosk can facilitate the visitor check-in process at businesses, schools, and other controlled access environments. These systems can check against blacklists, run criminal background checks, and print access badges for visitors. School security concerns in the United States have led to an increase in these types of kiosks to screen and track visitors.
Building directory and wayfinding kiosk
Many shopping malls, hospitals, airports and other large public buildings use interactive kiosks to allow visitors to navigate in buildings. Harris County Hospital District, Baptist Hospital of Miami, the Children's Hospital of Philadelphia and the Cayuga Medical Center are but a few medical centers utilizing interactive touch screen kiosks with a building directory and wayfinding solution.
Hospital and medical clinic registration and check-in kiosks
Hospitals and medical clinics are looking to kiosks to allow patients to perform routine activities. Kiosks that allow patients to check-in for their scheduled appointments and update their demographics to reduce the need to line up and interact with a registration clerk. In areas where patients must make a co-pay, kiosks will also collect payment. As the requirements for documentation, waivers, and consent increase, kiosks with integrated signature capture devices can present the documentation to the patient and collect their signature. A business case for registration and check-in kiosks is built around:
workload reduction,
data quality improvements,
consistency of the registration process, and
patient experience improvement.
A large community hospital has been able to reduce their registration staff by 30%, improve data quality, and shorten lineups.
Kiosks can display information customized to the user such as personalized messages helping them to manage their health.
Information kiosk
Museums, historical sites, national parks, and other tourists/visitor attractions often engage kiosks as a method for conveying information about a particular exhibit or site. Kiosks allow guests to read about - or view the video of - particular artifacts or areas at their own pace and in an interactive manner, learning more about those areas that interest them most. The Rockwell Museum in New York City uses touchscreen tablets to provide visitors with accessible and relevant labels for a particular exhibit. The Penn State All sports museum employs interactive kiosks to display up to date information about past and current Penn State athletes and sports teams. The Ellis Island National Museum of Immigration now boasts a citizen test available for visitors to take online via an informational kiosk. Additional kiosk displays include a "Threads of Migration" interactive exhibition featuring three touch-screen kiosks as part of "The Journey: New Eras of Immigration" section, which covers immigration since 1954.
Video kiosk
Video kiosk integrates video conferencing and collaboration capabilities to help users run video calls or conferences with available operators, view content or exchange messages. Video kiosks are often used in banking or telemedicine for improved customer service.
Kiosk reliability
Reliability is an important consideration, and as a result, many specialized kiosk software applications have been developed for the industry. These applications interface with the bill acceptor and credit card swipe, meter time, prevent users from changing the configuration of software or downloading computer viruses and allow the kiosk owner to see revenue. Threats to reliability come from vulnerabilities to hacking, allowing access to the OS, and the need for a session or hardware restart.
Kiosk industry segments
The kiosk industry is divided into four segments: kiosk enclosures, kiosk software (application and remote monitoring), components, service, and installation. Kiosk software provides the application for the users. A patient check-in or bill payment application are good templates. The software can also lock down your operating system (be it Apple, Windows, Android, or Linux or ChromeOS) to restrict access and/or functionality of a kiosk hardware device. USB devices and exposed external ports present security risks for example.
Temperature Kiosks
Temperature kiosks began with the COVID-19 outbreak. They typically require no interaction except for the user to approach the terminal. A thermal imaging camera or a thermopile temperature sensor is typically used in conjunction with a camera to measure surface temperature (usually the forehead). Thermal imaging systems can drill down to the inner canthus which yields a more representative temperature. As of 2020 August, temperature kiosks are still relatively unregulated by the FDA.
Smart City Kiosks
The project in NYC pretty much lays out smart city kiosks. They are typically outdoor, larger than 42" and often two-sided. The idea is to provide internet access on the street which means applications like Wayfinding or tie-ins to transportation systems come integrated.
Kiosk manufacturing industry
Historically electronic kiosks though are standalone enclosures that accept user input, integrate many devices, include a software GUI application, and remote monitoring, and are deployed widely across all industry verticals. This is considered "Kiosk Hardware" within the kiosk industry.
POS-related "kiosks" are "lane busting" check-outs such as seen at large retailers like Home Depot and Kroger.
Simple touchscreen terminals or panel-pcs are another segment and enjoy most of their footprint in POS retail applications and typically facing the employee. Terminals include NCR Advantage (740x terminal) and the IBM Anyplace computer terminal. These units are considered "kiosks" only in functionality delivered and typically only incorporate touchscreen, bar code scanner, and/or magnetic stripe reader.
Market segments for kiosks and self-service terminal manufacturers include photo kiosks, government, airlines, internet, music, retail loyalty, HR, and financial services, just to name some.
Customer flow, queue and check-in
This segment includes healthcare patient check-in and "take a number" type custom flow. Devices range from simple ticket dispense to biometrics (fingerprint readers) for patient check-in.
The basic application of kiosks in the hotel industry is to reduce waiting time for guests at check-in/checkout and relieve the reception desk. Usually, hotel kiosks are located in the lobby and are integrated or interface with the hotel's property management system. The machines allow guests to fill in and sign a registration card, select a room, issue hotel key cards, check for extra offers or upgrades, and book and pay for them.
In retail, clients can place online orders in store for home delivery, avoid queuing in fast-food restaurants, and issue library books. Generally, kiosks are seen as an enhancement to a retail or hospitality offer rather than a replacing staff members.
Regulatory Issues
The main regulatory issues are ADA and Accessibility, PCI-EMV, UL, CE, and HIPAA. There are many more regulations including state-specific regulations (e.g. Unruh Act in California). In 2019 the Kiosk Association released a new Code of Practice for Accessibility. It was presented to the entire U.S. Access Board in 2019.
See also
Automated teller machine
Internet cafe
Kiosk
Kiosk software
Self service
Vending machine
Self-checkout
References
External links
https://www.oemkiosks.com/blog/relation-millenials-self-service-kiosks/#.W92Lv1NUk0M
https://www.oemkiosks.com/blog/touchscreen-technology-offers-interactivity-users/#.W-APtmj7SUk
Advertising techniques
Advertising tools
Kiosks
Embedded systems
Kiosk
Commercial machines
Computer-related introductions in 1977
Marketing techniques
Promotion and marketing communications
|
1126769
|
https://en.wikipedia.org/wiki/Daily%20build
|
Daily build
|
A daily build or nightly build is the practice of completing a software build of the latest version of a program, on a daily basis. This is so it can first be compiled to ensure that all required dependencies are present, and possibly tested to show no bugs have been introduced. The daily build is also often publicly available allowing access to the latest features for feedback.
In this context, a build is the result of compiling and linking all the files that make up a program. The use of such disciplined procedures as daily builds is particularly necessary in large organizations where many programmers are working on a single piece of software. Performing daily builds helps ensure that developers can work knowing with reasonable certainty that any new bugs that show up are a result of their own work done within the last day.
Daily builds typically include a set of tests, sometimes called a "smoke test." These tests are included to assist in determining what may have been broken by the changes included in the latest build. The critical piece of this process is to include new and revised tests as the project progresses.
Continuous integration builds
Although daily builds were considered a best practice of software development in the 1990s, they have now been superseded. Continuous integration is now run on an almost continual basis, with a typical cycle time of around 20-30 minutes since the last change to the source code. Continuous integration servers continually monitor the source code control system. When these servers detect new changes, they use a build tool to rebuild the software. Good practice today is also to use continuous integration as part of continuous testing, so that unit tests are re-run for each build, and more extensive functional testing (which takes longer to perform than the build) performed as frequently as its duration permits.
See also
Neutral build
Smoke testing in software development
External links
IEEE Best software practices at Steve-McConnell
Joel-on-software
Daily builds of ubuntu, updated almost everyday, a good example of what a daily build is
Software testing
Extreme programming
Computer programming
|
13575603
|
https://en.wikipedia.org/wiki/Fifth%20Amendment%20to%20the%20United%20States%20Constitution
|
Fifth Amendment to the United States Constitution
|
The Fifth Amendment (Amendment V) to the United States Constitution addresses criminal procedure and other aspects of the Constitution. It was ratified, along with nine other articles, in 1791 as part of the Bill of Rights. The Fifth Amendment applies to every level of the government, including the federal, state, and local levels, in regard to a US citizen or resident of the US. The Supreme Court furthered the protections of this amendment through the Due Process Clause of the Fourteenth Amendment.
One provision of the Fifth Amendment requires that felonies be tried only upon indictment by a grand jury. Another provision, the Double Jeopardy Clause, provides the right of defendants to be tried only once in federal court for the same offense. The self-incrimination clause provides various protections against self-incrimination, including the right of an individual not to serve as a witness in a criminal case in which they are the defendant. "Pleading the Fifth" is a colloquial term often used to invoke the self-incrimination clause when witnesses decline to answer questions where the answers might incriminate them. In the 1966 case of Miranda v. Arizona, the Supreme Court held that the self-incrimination clause requires the police to issue a Miranda warning to criminal suspects interrogated while under police custody. The Fifth Amendment also contains the Takings Clause, which allows the federal government to take private property for public use if the government provides "just compensation."
Like the Fourteenth Amendment, the Fifth Amendment includes a due process clause stating that no person shall "be deprived of life, liberty, or property, without due process of law." The Fifth Amendment's due process clause applies to the federal government, while the Fourteenth Amendment's due process clause applies to state governments. The Supreme Court has interpreted the Fifth Amendment's Due Process Clause as providing two main protections: procedural due process, which requires government officials to follow fair procedures before depriving a person of life, liberty, or property, and substantive due process, which protects certain fundamental rights from government interference. The Supreme Court has also held that the Due Process Clause contains a prohibition against vague laws and an implied equal protection requirement similar to the Fourteenth Amendment's Equal Protection Clause.
Text
The amendment as proposed by Congress in 1789:
Background before adoption
On June 8, 1789, Congressman James Madison introduced several proposed constitutional amendments during a speech to the House of Representatives. His draft language that later became the Fifth Amendment was as follows:
No person shall be subject, except in cases of impeachment, to more than one punishment or trial for the same offense; nor shall be compelled to be a witness against himself; nor be deprived of life, liberty, or property, without due process of law; nor be obliged to relinquish his property, where it may be necessary for public use, without just compensation....[E]xcept in cases of impeachments, and cases arising in the land or naval forces, or the militia when on actual service, in time of war or public danger... in all crimes punishable with loss of life or member, presentment or indictment by a grand jury shall be an essential preliminary...
This draft was edited by Congress; all the material before the first ellipsis was placed at the end, and some of the wording was modified. After approval by Congress, the amendment was ratified by the states on December 15, 1791 as part of the Bill of Rights. Every one of the five clauses in the final amendment appeared in Madison's draft, and in their final order those clauses are the Grand Jury Clause (which Madison had placed last), the Double Jeopardy Clause, the Self Incrimination Clause, the Due Process Clause, and then the Takings Clause.
Grand jury
The grand jury is a pre-constitutional common law institution, and a constitutional fixture in its own right exclusively embracing common law. The process applies to the states to the extent that the states have incorporated grand juries and/or common law. Most states have an alternative civil process. "Although state systems of criminal procedure differ greatly among themselves, the grand jury is similarly guaranteed by many state constitutions and plays an important role in fair and effective law enforcement in the overwhelming [p688] majority of the States." Branzburg v. Hayes (No. 70-85) 1972. Grand juries, which return indictments in many criminal cases, are composed of a jury of peers and operate in closed deliberation proceedings; they are given specific instructions regarding the law by the judge. Many constitutional restrictions that apply in court or in other situations do not apply during grand jury proceedings. For example, the exclusionary rule does not apply to certain evidence presented to a grand jury; the exclusionary rule states that evidence obtained in violation of the Fourth, Fifth or Sixth amendments cannot be introduced in court. Also, an individual does not have the right to have an attorney present in the grand jury room during hearings. An individual would have such a right during questioning by the police while in custody, but an individual testifying before a grand jury is free to leave the grand jury room to consult with his attorney outside the room before returning to answer a question.
Currently, federal law permits the trial of misdemeanors without indictments. Additionally, in trials of non-capital felonies, the prosecution may proceed without indictments if the defendants waive their Fifth Amendment right.
Grand jury indictments may be amended by the prosecution only in limited circumstances. In Ex Parte Bain, , the Supreme Court held that the indictment could not be changed at all by the prosecution. United States v. Miller, partly reversed Ex parte Bain; now, an indictment's scope may be narrowed by the prosecution. Thus, lesser included charges may be dropped, but new charges may not be added.
The Grand Jury Clause of the Fifth Amendment does not protect those serving in the armed forces, whether during wartime or peacetime. Members of the state militia called up to serve with federal forces are not protected under the clause either. In O'Callahan v. Parker, , the Supreme Court held that only charges relating to service may be brought against members of the militia without indictments. As a decision, O'Callahan, however, lived for a limited duration and was more a reflection of Justice William O. Douglas's distrust of presidential power and anger at the Vietnam Conflict. O'Callahan was overturned in 1987, when the Court held that members of the militia in actual service may be tried for any offense without indictments.
The grand jury indictment clause of the Fifth Amendment has not been incorporated under the Fourteenth Amendment. This means the grand jury requirement applies only to felony charges in the federal court system. While many states do employ grand juries, no defendant has a Fifth Amendment right to a grand jury for criminal charges in state court. States are free to abolish grand juries, and many (though not all) have replaced them with preliminary hearing.
Infamous crime
Whether a crime is "infamous", for purposes of the Grand Jury Clause, is determined by the nature of the punishment that may be imposed, not the punishment that is actually imposed; however, crimes punishable by death must be tried upon indictments. The historical origin of "infamous crime" comes from the infamia, a punishment under Roman law by which a citizen was deprived of his citizenship. In United States v. Moreland, , the Supreme Court held that incarceration in a prison or penitentiary, as opposed to a correction or reformation house, attaches infamy to a crime. In Mackin v. United States, , the Supreme Court judged that "'Infamous crimes' are thus, in the most explicit words, defined to be those 'punishable by imprisonment in the penitentiary'," while it later in Green v. United States stated that "imprisonment in a penitentiary can be imposed only if a crime is subject to imprisonment exceeding one year." Therefore, an infamous crime is one that is punished by imprisonment for over one year. Susan Brown, a former defense attorney and Professor of Law at the University of Dayton School of Law, concluded: "Since this is essentially the definition of a felony, infamous crimes translate as felonies."
Double jeopardy
... nor shall any person be subject for the same offense to be twice put in jeopardy of life or limb...
The Double Jeopardy Clause encompasses four distinct prohibitions: subsequent prosecution after acquittal, subsequent prosecution after conviction, subsequent prosecution after certain mistrials, and multiple punishment in the same indictment. Jeopardy applies when the jury is empaneled in a jury trial, when the first witness is sworn in during a bench trial, or when a plea is rendered.
Prosecution after acquittal
The government is not permitted to appeal or try again after the entry of an acquittal, whether a directed verdict before the case is submitted to the jury, a directed verdict after a deadlocked jury, an appellate reversal for sufficiency (except by direct appeal to a higher appellate court), or an "implied acquittal" via conviction of a lesser included offense. In addition, the government is barred by collateral estoppel from re-litigating against the same defense, a fact necessarily found by the jury in a prior acquittal, even if the jury hung on other counts.
This principle does not prevent the government from appealing a pre-trial motion to dismiss or other non-merits dismissal, or a directed verdict after a jury conviction, nor does it prevent the trial judge from entertaining a motion for reconsideration of a directed verdict, if the jurisdiction has so provided by rule or statute. Nor does it prevent the government from retrying the defendant after an appellate reversal other than for sufficiency, including habeas, or "thirteenth juror" appellate reversals notwithstanding sufficiency on the principle that jeopardy has not "terminated." There is also an exception for judicial bribery in a bench trial.
Multiple punishment, including prosecution after conviction
In Blockburger v. United States (1932), the Supreme Court announced the following test: the government may separately try to punish the defendant for two crimes if each crime contains an element that the other does not. Blockburger is the default rule, unless the legislature intends to depart; for example, Continuing Criminal Enterprise (CCE) may be punished separately from its predicates, as can conspiracy.
The Blockburger test, originally developed in the multiple punishments context, is also the test for prosecution after conviction. In Grady v. Corbin (1990), the Court held that a double jeopardy violation could lie even where the Blockburger test was not satisfied, but Grady was overruled in United States v. Dixon (1993).
Prosecution after mistrial
The rule for mistrials depends upon who sought the mistrial. If the defendant moves for a mistrial, there is no bar to retrial, unless the prosecutor acted in "bad faith", i.e., goaded the defendant into moving for a mistrial because the government specifically wanted a mistrial. If the prosecutor moves for a mistrial, there is no bar to retrial if the trial judge finds "manifest necessity" for granting the mistrial. The same standard governs mistrials granted sua sponte.
Prosecution in different states
In Heath v. Alabama (1985), the Supreme Court held, that the Fifth Amendment rule against double jeopardy does not prohibit two different states from separately prosecuting and convicting the same individual for the same illegal act.
Self-incrimination
The Fifth Amendment protects individuals from being forced to incriminate themselves. Incriminating oneself is defined as exposing oneself (or another person) to "an accusation or charge of crime," or as involving oneself (or another person) "in a criminal prosecution or the danger thereof." The privilege against compelled self-incrimination is defined as "the constitutional right of a person to refuse to answer questions or otherwise give testimony against himself". To "plead the Fifth" is to refuse to answer any question because "the implications of the question, in the setting in which it is asked" lead a claimant to possess a "reasonable cause to apprehend danger from a direct answer", believing that "a responsive answer to the question or an explanation of why it cannot be answered might be dangerous because injurious disclosure could result."
Historically, the legal protection against compelled self-incrimination was directly related to the question of torture for extracting information and confessions.
The legal shift away from widespread use of torture and forced confession dates to turmoil of the late 16th and early 17th century in England.
The Supreme Court of the United States has held that "a witness may have a reasonable fear of prosecution and yet be innocent of any wrongdoing. The privilege serves to protect the innocent who otherwise might be ensnared by ambiguous circumstances."
However, Professor James Duane of the Regent University School of Law argues that the Supreme Court, in a 5–4 decision in Salinas v. Texas, significantly weakened the privilege, saying "our choice to use the Fifth Amendment privilege can be used against you at trial depending exactly how and where you do it."
In the Salinas case, justices Alito, Roberts, and Kennedy held that "the Fifth Amendment's privilege against self-incrimination does not extend to defendants who simply decide to remain mute during questioning. Long-standing judicial precedent has held that any witness who desires protection against self-incrimination must explicitly claim that protection."
Justice Thomas, siding with Alito, Roberts and Kennedy, in a separate opinion, held that, "Salinas' Fifth Amendment privilege would not have been applicable even if invoked because the prosecutor's testimony regarding his silence did not compel Salinas to give self-incriminating testimony." Justice Antonin Scalia joined Thomas' opinion.
Legal proceedings and congressional hearings
The Fifth Amendment privilege against compulsory self-incrimination applies when an individual is called to testify in a legal proceeding. The Supreme Court ruled that the privilege applies whether the witness is in a federal court or, under the incorporation doctrine of the Fourteenth Amendment, in a state court, and whether the proceeding itself is criminal or civil.
The right to remain silent was asserted at grand jury or congressional hearings in the 1950s, when witnesses testifying before the House Committee on Un-American Activities or the Senate Internal Security Subcommittee claimed the right in response to questions concerning their alleged membership in the Communist Party. Under the Red Scare hysteria at the time of McCarthyism, witnesses who refused to answer the questions were accused as "fifth amendment communists". They lost jobs or positions in unions and other political organizations, and suffered other repercussions after "taking the Fifth."
Senator Joseph McCarthy (R-WI) asked, "Are you now, or have you ever been, a member of the Communist Party?" while he was chairman of the Senate Government Operations Committee Permanent Subcommittee on Investigations. Admitting to a previous Communist Party membership was not sufficient. Witnesses were also required to "name names", i.e. implicate others they knew to be Communists or who had been Communists in the past. Academy Award winning director Elia Kazan testified before the House Committee on Un-American Activities that he had belonged to the Communist Party briefly in his youth. He also "named names", which incurred enmity of many in Hollywood. Other entertainers such as Zero Mostel found themselves on a Hollywood blacklist after taking the Fifth, and were unable to find work for a while in show business. Pleading the Fifth in response to such questions was held inapplicable, since being a Communist itself was not a crime.
The amendment has also been used by defendants and witnesses in criminal cases involving the American Mafia.
Statements made to non-governmental entities
The privilege against self-incrimination does not protect an individual from being suspended from membership in a non-governmental, self-regulatory organization (SRO), such as the New York Stock Exchange (NYSE), where the individual refuses to answer questions posed by the SRO. An SRO itself is not a court of law, and cannot send a person to jail. SROs, such as the NYSE and the National Association of Securities Dealers (NASD), are generally not considered to be state actors. See United States v. Solomon, D. L. Cromwell Invs., Inc. v. NASD Regulation, Inc., and Marchiano v. NASD. SROs also lack subpoena powers. They rely heavily on requiring testimony from individuals by wielding the threat of loss of membership or a bar from the industry (permanent, if decided by the NASD) when the individual asserts his Fifth Amendment privilege against compelled self-incrimination. If a person chooses to provide statements in testimony to the SRO, the SRO may provide information about those statements to law enforcement agencies, who may then use the statements in a prosecution of the individual.
Custodial interrogation
The Fifth Amendment limits the use of evidence obtained illegally by law enforcement officers. Originally, at common law, even a confession obtained by torture was admissible. However, by the eighteenth century, common law in England provided that coerced confessions were inadmissible. The common law rule was incorporated into American law by the courts. The Supreme Court has repeatedly overruled convictions based on such confessions, in cases such as Brown v. Mississippi, .
Law enforcement responded by switching to more subtle techniques, but the courts held that such techniques, even if they do not involve physical torture, may render a confession involuntary and inadmissible. In Chambers v. Florida (1940) the Court held a confession obtained after five days of prolonged questioning, during which time the defendant was held incommunicado, to be coerced. In Ashcraft v. Tennessee (1944), the suspect had been interrogated continuously for thirty-six hours under electric lights. In Haynes v. Washington, the Court held that an "unfair and inherently coercive context" including a prolonged interrogation rendered a confession inadmissible.
Miranda v. Arizona (1966) was a landmark case involving confessions. Ernesto Miranda had signed a statement confessing to the crime, but the Supreme Court held that the confession was inadmissible because the defendant had not been advised of his rights. The Court held "the prosecution may not use statements ... stemming from custodial interrogation of the defendant unless it demonstrates the use of procedural safeguards effective to secure the privilege against self-incrimination." Custodial interrogation is initiated by law enforcement after a person has been taken into custody or otherwise deprived of his freedom of movement before being questioned as to the specifics of the crime. As for the procedural safeguards to be employed, unless other fully effective means are devised to inform accused persons of their right of silence and to assure a continuous opportunity to exercise it, the following measures are required. Before any questioning, the person must be warned that he has a right to remain silent, that any statement he does make may be used as evidence against him, and that he has a right to the presence of an attorney, either retained or appointed.
The warning Chief Justice Earl Warren referred to is now called the Miranda warning, and it is customarily delivered by the police to an individual before questioning. Miranda has been clarified by several further Supreme Court rulings. For the warning to be necessary, the questioning must be conducted under "custodial" circumstances. A person detained in jail or under arrest is, of course, deemed to be in police custody. Alternatively, a person who is under the reasonable belief that he may not freely leave from the restraint of law enforcement is also deemed to be in "custody." That determination of "reasonableness" is based on a totality of the objective circumstances. A mere presence at a police station may not be sufficient, but neither is such a presence required. Traffic stops are not deemed custodial. The Court has ruled that age can be an objective factor. In Yarborough v. Alvarado (2004), the Court held that "a state-court decision that failed to mention a 17-year-old's age as part of the Miranda custody analysis was not objectively unreasonable". In her concurring opinion Justice O'Connor wrote that a suspect's age may indeed "be relevant to the 'custody' inquiry"; the Court did not find it relevant in the specific case of Alvarado. The Court affirmed that age could be a relevant and objective factor in J.D.B. v. North Carolina where they ruled that "so long as the child's age was known to the officer at the time of police questioning, or would have been objectively apparent to a reasonable officer, its inclusion in the custody analysis is consistent with the objective nature of that test".
The questioning does not have to be explicit to trigger Miranda rights. For example, two police officers engaging in a conversation designed to elicit an incriminating statement from a suspect would constitute questioning. A person may choose to waive his Miranda rights, but the prosecution has the burden of showing that such a waiver was actually made.
A confession not preceded by a Miranda warning where one was necessary cannot be admitted as evidence against the confessing party in a judicial proceeding. The Supreme Court, however, has held that if a defendant voluntarily testifies at the trial that he did not commit the crime, his confession may be introduced to challenge his credibility, to "impeach" the witness, even if it had been obtained without the warning.
In Hiibel v. Sixth Judicial District Court of Nevada (2004), the Supreme Court ruled 5–4 that being required to identify oneself to police under states' stop and identify statutes is not an unreasonable search or seizure, and is not necessarily self-incrimination.
Explicit invocation
In June 2010, the Supreme Court ruled in Berghuis v. Thompkins that a criminal suspect must now invoke the right to remain silent unambiguously. Unless and until the suspect actually states that he is relying on that right, police may continue to interact with (or question) him, and any voluntary statement he makes can be used in court. The mere act of remaining silent is, on its own, insufficient to imply the suspect has invoked those rights. Furthermore, a voluntary reply, even after lengthy silence, can be construed as implying a waiver. The new rule will defer to police in cases where the suspect fails to assert the right to remain silent. This standard was extended in Salinas v. Texas in 2013 to cases where individuals not in custody who volunteer to answer officers' questions and who are not told their Miranda rights. The Court stated that there was no "ritualistic formula" necessary to assert this right, but that a person could not do so "by simply standing mute."
Production of documents
Under the Act of Production Doctrine, the act of an individual in producing documents or materials (e.g., in response to a subpoena) may have a "testimonial aspect" for purposes of the individual's right to assert the Fifth Amendment right against self-incrimination to the extent that the individual's act of production provides information not already in the hands of law enforcement personnel about the (1) existence; (2) custody; or (3) authenticity, of the documents or materials produced. See United States v. Hubbell. In Boyd v. United States, the U.S. Supreme Court stated that "It is equivalent to a compulsory production of papers to make the nonproduction of them a confession of the allegations which it is pretended they will prove".
By corporations
Corporations may also be compelled to maintain and turn over records; the Supreme Court has held that the Fifth Amendment protections against self-incrimination extend only to "natural persons". The Court has also held that a corporation's custodian of records can be forced to produce corporate documents even if the act of production would incriminate him personally. The only limitation on this rule is that the jury cannot be told that the custodian personally produced those documents in any subsequent prosecution of him, but the jury is still allowed to draw adverse inferences from the content of the documents combined with the position of the custodian in the corporation.
Refusal to testify in a criminal case
In Griffin v. California (1965), the Supreme Court ruled that a prosecutor may not ask the jury to draw an inference of guilt from a defendant's refusal to testify in his own defense. The Court overturned as unconstitutional under the federal constitution a provision of the California state constitution that explicitly granted such power to prosecutors.
Refusal to testify in a civil case
While defendants are entitled to assert the right against compelled self-incrimination in a civil court case, there are consequences to the assertion of the right in such an action.
The Supreme Court has held that "the Fifth Amendment does not forbid adverse inferences against parties to civil actions when they refuse to testify in response to probative evidence offered against them." Baxter v. Palmigiano, "[A]s Mr. Justice Brandeis declared, speaking for a unanimous court in the Tod case, 'Silence is often evidence of the most persuasive character.'" "'Failure to contest an assertion ... is considered evidence of acquiescence ... if it would have been natural under the circumstances to object to the assertion in question.'"
In Baxter, the state was entitled to an adverse inference against Palmigiano because of the evidence against him and his assertion of the Fifth Amendment right.
Some civil cases are considered "criminal cases" for the purposes of the Fifth Amendment. In Boyd v. United States, the U.S. Supreme Court stated that "A proceeding to forfeit a person's goods for an offence against the laws, though civil in form, and whether in rem or in personam, is a "criminal case" within the meaning of that part of the Fifth Amendment which declares that no person "shall be compelled, in any criminal case, to be a witness against himself."
In United States v. Lileikis, the court ruled that Aleksandras Lileikis was not entitled to Fifth Amendment protections in a civil denaturalization case even though he faced criminal prosecution in Lithuania, the country that he would be deported to if denaturalized.
Federal income tax
In some cases, individuals may be legally required to file reports that call for information that may be used against them in criminal cases. In United States v. Sullivan, the United States Supreme Court ruled that a taxpayer could not invoke the Fifth Amendment's protections as the basis for refusing to file a required federal income tax return. The Court stated: "If the form of return provided called for answers that the defendant was protected from making[,] he could have raised the objection in the return, but could not on that account refuse to make any return at all. We are not called on to decide what, if anything, he might have withheld."
In Garner v. United States, the defendant was convicted of crimes involving a conspiracy to "fix" sporting contests and to transmit illegal bets. During the trial the prosecutor introduced, as evidence, the taxpayer's federal income tax returns for various years. In one return the taxpayer had showed his occupation to be "professional gambler." In various returns the taxpayer had reported income from "gambling" or "wagering." The prosecution used this to help contradict the taxpayer's argument that his involvement was innocent. The taxpayer tried unsuccessfully to keep the prosecutor from introducing the tax returns as evidence, arguing that since the taxpayer was legally required to report the illegal income on the returns, he was being compelled to be a witness against himself. The Supreme Court agreed that he was legally required to report the illegal income on the returns, but ruled that the right against self-incrimination still did not apply. The Court stated that "if a witness under compulsion to testify makes disclosures instead of claiming the right, the Government has not 'compelled' him to incriminate himself."
Sullivan and Garner are viewed as standing, in tandem, for the proposition that on a required federal income tax return a taxpayer would probably have to report the amount of the illegal income, but might validly claim the right by labeling the item "Fifth Amendment" (instead of "illegal gambling income," "illegal drug sales," etc.) The United States Court of Appeals for the Eleventh Circuit has stated: "Although the source of income might be privileged, the amount must be reported." The U.S. Court of Appeals for the Fifth Circuit has stated: "...the amount of a taxpayer's income is not privileged even though the source of income may be, and Fifth Amendment rights can be exercised in compliance with the tax laws 'by simply listing his alleged ill-gotten gains in the space provided for "miscellaneous" income on his tax form'." In another case, the Court of Appeals for the Fifth Circuit stated: "While the source of some of [the defendant] Johnson's income may have been privileged, assuming that the jury believed his uncorroborated testimony that he had illegal dealings in gold in 1970 and 1971, the amount of his income was not privileged and he was required to pay taxes on it." In 1979, the U.S. Court of Appeals for the Tenth Circuit stated: "A careful reading of Sullivan and Garner, therefore, is that the self-incrimination privilege can be employed to protect the taxpayer from revealing the information as to an illegal source of income, but does not protect him from disclosing the amount of his income."
Grants of immunity
If the government gives an individual immunity, then that individual may be compelled to testify. Immunity may be "transactional immunity" or "use immunity"; in the former, the witness is immune from prosecution for offenses related to the testimony; in the latter, the witness may be prosecuted, but his testimony may not be used against him. In Kastigar v. United States, the Supreme Court held that the government need only grant use immunity to compel testimony. The use immunity, however, must extend not only to the testimony made by the witness, but also to all evidence derived therefrom. This scenario most commonly arises in cases related to organized crime.
Record keeping
A statutorily required record-keeping system may go too far such that it implicates a record-keeper's right against self-incrimination. A three part test laid out by Albertson v. Subversive Activities Control Board, is used to determine this: 1. the law targets a highly selective group inherently suspect of criminal activities; 2. the activities sought to be regulated are already permeated with criminal statutes as opposed to essentially being non-criminal and largely regulatory; and 3. the disclosure compelled creates a likelihood of prosecution and is used against the record-keeper. In this case, the Supreme Court struck down an order by the Subversive Activities Control Board requiring members of the Communist Party to register with the government and upheld an assertion of the privilege against self-incrimination, on the grounds that statute under which the order had been issued was "directed at a highly selective group inherently suspect of criminal activities."
In Leary v. United States, the court struck down the Marijuana Tax Act because its record keeping statute required self-incrimination.
In Haynes v. United States, the Supreme Court ruled that, because convicted felons are prohibited from owning firearms, requiring felons to register any firearms they owned constituted a form of self-incrimination and was therefore unconstitutional.
Combinations & passwords
While no such case has yet arisen, the Supreme Court has indicated that a respondent cannot be compelled to turn over "the contents of his own mind", e.g. the password to a bank account (doing so would prove his control of it).
Lower courts have given conflicting decisions on whether forced disclosure of computer passwords is a violation of the Fifth Amendment.
In In re Boucher (2009), the US District Court of Vermont ruled that the Fifth Amendment might protect a defendant from having to reveal an encryption password, or even the existence of one, if the production of that password could be deemed a self-incriminating "act" under the Fifth Amendment. In Boucher, production of the unencrypted drive was deemed not to be a self-incriminating act, as the government already had sufficient evidence to tie the encrypted data to the defendant.
In January 2012 a federal judge in Denver ruled that a bank-fraud suspect was required to give an unencrypted copy of a laptop hard drive to prosecutors. However, in February 2012 the Eleventh Circuit ruled otherwise—finding that requiring a defendant to produce an encrypted drive's password would violate the Constitution, becoming the first federal circuit court to rule on the issue. In April 2013, a District Court magistrate judge in Wisconsin refused to compel a suspect to provide the encryption password to his hard drive after FBI agents had unsuccessfully spent months trying to decrypt the data.
Employer coercion
As a condition of employment, workers may be required to answer their employer's narrowly defined questions regarding conduct on the job. If an employee invokes the Garrity rule (sometimes called the Garrity Warning or Garrity Rights) before answering the questions, then the answers cannot be used in criminal prosecution of the employee. This principle was developed in Garrity v. New Jersey, 385 U.S. 493 (1967). The rule is most commonly applied to public employees such as police officers.
Due process
The Fifth and Fourteenth Amendments to the United States Constitution each contain a due process clause. Due process deals with the administration of justice and thus the due process clause acts as a safeguard from arbitrary denial of life, liberty, or property by the government outside the sanction of law. The Supreme Court has interpreted the due process clauses to provide four protections: procedural due process (in civil and criminal proceedings), substantive due process, a prohibition against vague laws, and as the vehicle for the incorporation of the Bill of Rights.
Takings Clause
Eminent domain
The "Takings Clause", the last clause of the Fifth Amendment, limits the power of eminent domain by requiring "just compensation" be paid if private property is taken for public use. This provision of the Fifth Amendment originally applied only to the federal government, but the U.S. Supreme Court ruled in the 1897 case Chicago, B. & Q. Railroad Co. v. Chicago that the Fourteenth Amendment incidentally extended the effects of that provision to the states. The federal courts, however, have shown much deference to the determinations of Congress, and even more so to the determinations of the state legislatures, of what constitutes "public use". The property need not actually be used by the public; rather, it must be used or disposed of in such a manner as to benefit the public welfare or public interest. One exception that restrains the federal government is that the property must be used in exercise of a government's enumerated powers.
The owner of the property that is taken by the government must be justly compensated. When determining the amount that must be paid, the government does not need to take into account any speculative schemes in which the owner claims the property was intended to be used. Normally, the fair market value of the property determines "just compensation". If the property is taken before the payment is made, interest accrues (though the courts have refrained from using the term "interest").
Property under the Fifth Amendment includes contractual rights stemming from contracts between the United States, a U.S. state or any of its subdivisions and the other contract partner(s), because contractual rights are property rights for purposes of the Fifth Amendment. The United States Supreme Court held in Lynch v. United States, 292 U.S. 571 (1934) that valid contracts of the United States are property, and the rights of private individuals arising out of them are protected by the Fifth Amendment. The court said: "The Fifth Amendment commands that property be not taken without making just compensation. Valid contracts are property, whether the obligor be a private individual, a municipality, a state, or the United States. Rights against the United States arising out of a contract with it are protected by the Fifth Amendment. United States v. Central Pacific R. Co., 118 U. S. 235, 118 U. S. 238; United States v. Northern Pacific Ry. Co., 256 U. S. 51, 256 U. S. 64, 256 U. S. 67. When the United States enters into contract relations, its rights and duties therein are governed generally by the law applicable to contracts between private individuals."
The federal courts have not restrained state and local governments from seizing privately owned land for private commercial development on behalf of private developers. This was upheld on June 23, 2005, when the Supreme Court issued its opinion in Kelo v. City of New London. This 5–4 decision remains controversial. The majority opinion, by Justice Stevens, found that it was appropriate to defer to the city's decision that the development plan had a public purpose, saying that "the city has carefully formulated a development plan that it believes will provide appreciable benefits to the community, including, but not limited to, new jobs and increased tax revenue." Justice Kennedy's concurring opinion observed that in this particular case the development plan was not "of primary benefit to ... the developer" and that if that was the case the plan might have been impermissible. In the dissent, Justice Sandra Day O'Connor argued that this decision would allow the rich to benefit at the expense of the poor, asserting that "Any property may now be taken for the benefit of another private party, but the fallout from this decision will not be random. The beneficiaries are likely to be those citizens with disproportionate influence and power in the political process, including large corporations and development firms." She argued that the decision eliminates "any distinction between private and public use of property—and thereby effectively delete[s] the words 'for public use' from the Takings Clause of the Fifth Amendment". A number of states, in response to Kelo, have passed laws and/or state constitutional amendments which make it more difficult for state governments to seize private land. Takings that are not "for public use" are not directly covered by the doctrine, however such a taking might violate due process rights under the Fourteenth amendment, or other applicable law.
The exercise of the police power of the state resulting in a taking of private property was long held to be an exception to the requirement of government paying just compensation. However the growing trend under the various state constitution's taking clauses is to compensate innocent third parties whose property was destroyed or "taken" as a result of police action.
Just compensation
The last two words of the amendment promise "just compensation" for takings by the government. In United States v. 50 Acres of Land (1984), the Supreme Court wrote that "The Court has repeatedly held that just compensation normally is to be measured by "the market value of the property at the time of the taking contemporaneously paid in money." Olson v. United States, 292 U.S. 246 (1934) ... Deviation from this measure of just compensation has been required only "when market value has been too difficult to find, or when its application would result in manifest injustice to owner or public". United States v. Commodities Trading Corp., 339 U.S. 121, 123 (1950).
Civil asset forfeiture
Civil asset forfeiture or occasionally civil seizure, is a controversial legal process in which law enforcement officers take assets from persons suspected of involvement with crime or illegal activity without necessarily charging the owners with wrongdoing. While civil procedure, as opposed to criminal procedure, generally involves a dispute between two private citizens, civil forfeiture involves a dispute between law enforcement and property such as a pile of cash or a house or a boat, such that the thing is suspected of being involved in a crime. To get back the seized property, owners must prove it was not involved in criminal activity. Sometimes it can mean a threat to seize property as well as the act of seizure itself.
In civil forfeiture, assets are seized by police based on a suspicion of wrongdoing, and without having to charge a person with specific wrongdoing, with the case being between police and the thing itself, sometimes referred to by the Latin term in rem, meaning "against the property"; the property itself is the defendant and no criminal charge against the owner is needed. If property is seized in a civil forfeiture, it is "up to the owner to prove that his cash is clean" and the court can weigh a defendant's use of their 5th amendment right to remain silent in their decision. In civil forfeiture, the test in most cases is whether police feel there is a preponderance of the evidence suggesting wrongdoing; in criminal forfeiture, the test is whether police feel the evidence is beyond a reasonable doubt, which is a tougher test to meet. In contrast, criminal forfeiture is a legal action brought as "part of the criminal prosecution of a defendant", described by the Latin term in personam, meaning "against the person", and happens when government indicts or charges the property which is either used in connection with a crime, or derived from a crime, that is suspected of being committed by the defendant; the seized assets are temporarily held and become government property officially after an accused person has been convicted by a court of law; if the person is found to be not guilty, the seized property must be returned.
Normally both civil and criminal forfeitures require involvement by the judiciary; however, there is a variant of civil forfeiture called administrative forfeiture which is essentially a civil forfeiture which does not require involvement by the judiciary, which derives its powers from the Tariff Act of 1930, and empowers police to seize banned imported merchandise, as well as things used to import or transport or store a controlled substance, money, or other property which is less than $500,000 value.
See also
United States constitutional criminal procedure
References
Further reading
Fifth Amendment with Annotations
"Fifth Amendment Rights of a Resident Alien After Balsys". Lloyd, Sean K. In: Tulsa Journal of Comparative & International Law, Vol. 6, Issue 2 (Spring 1999), pp. 163–194.
"An analysis of American Fifth Amendment jurisprudence and its relevance to the South African right to silence". Theophilopoulos C. In: South African Law Journal, Mar 2006, Vol. 123, Issue 3, pp. 516–538. Juta Law Publishing, 2006.
"Fifth Amendment: Rights of Detainees". The Journal of Criminal Law and Criminology. 70(4):482–489; Williams & Wilkins Company, 1979.
"FBAR Reporting and the Required Records Doctrine: Continued Erosion of Fifth Amendment Rights". COMISKY, IAN M.; LEE, MATTHEW D. Journal of Taxation & Regulation of Financial Institutions. Mar/Apr 2012, Vol. 25 Issue 4, pp. 17–22.
"Fifth Amendment Rights of a Client regarding Documents Held by His Attorney: United States v. White. In: Duke Law Journal. 1973(5):1080–1097; Duke University School of Law, 1973.
Matthew J. Weber. "Warning—Weak Password: The Courts' Indecipherable Approach to Encryption and the Fifth Amendment", U. Ill. J.L Tech & Pol'y (2016).
External links
Cornell Law Information
1954 essay on reasons to plead the 5th
Don't Talk to the Police Video
1791 in American law
05
05
1791 in American politics
Eminent domain
|
868126
|
https://en.wikipedia.org/wiki/TetriNET
|
TetriNET
|
TetriNET is a multiplayer online Tetris game for up to six people that supports team play.
History
Tetrinet was originally developed by St0rmCat in 1997.
The last official version is 1.13. The game was originally developed for Windows and was later ported to other systems.
St0rmCat released TetriNET 2 in 2000, which features improved graphics, more types of special blocks, additional features (such as hold piece and block shadows), and a master server.
Gameplay
TetriNET plays like standard multiplayer Tetris but with a twist: clearing rows will cause special blocks to appear in the player's field. If a line containing a special block is cleared, then that special block is added to the player's inventory. Clearing multiple lines at once increases the number of special blocks received.
At any point, a player may use the special block at the beginning of their inventory on one of the six fields (either their own or an opponent's). The effect depends on the type of special block:
a : Add Line - Adds one broken line to the bottom of the target field.
c : Clear Line - Clears the line on the bottom of the target field.
b : Clear Special Blocks - Causes all special blocks on the target field to return to normal blocks.
r : Random Blocks Clear - Random blocks are removed from the target field, often creating gaps in lines.
o : Block Bomb - Causes any Block Bombs on the target field to "explode", causing surrounding pieces to scatter throughout the field.
q : Blockquake - Causes blocks on each line on the target field to shift, creating an earthquake-like effect.
g : Block Gravity - Causes blocks on that target field to immediately fall into any gaps and instantly deletes any complete lines which are created.
s : Switch Fields - User and target switch fields.
n : Nuke Field - Removes all blocks from the target field.
The last player still able to place pieces in their field is the winner.
Depending on the server used, some alternative rules may be available.
pure: special blocks are disabled, providing gameplay similar to traditional multiplayer Tetris.
7tetris: the first player to make seven Tetris is the winner.
Music
The classic TetriNET download came with a single MIDI file that plays during game. This music is known as "The Dance of the Spheres" and its authorship is claimed by David Lilja, though other sources list the author as Davie M Karlsson.
Variants
In addition to the rules implemented by the standard TetriNET 1.13 client, there are a number of variants available.
TetriFast
TetriFast removes the one second delay between pieces found in the standard TetriNET gameplay. As the piece delay is implemented client side, a trivial modification was made to the network protocol to prevent TetriFast clients connecting to standard TetriNET games.
TetriNET/TetriFast 1.14
The 1.14 protocol is another variant, where every player will receive the same sequence of pieces.
Blocktrix
Blocktrix is an alternative TetriNET client for Windows. In addition to supporting traditional TetriNET and TetriFast protocols, it has a newer Blocktrix mode that includes a number of additional special block types:
l : Left Gravity - Pulls all blocks as far left as possible, leaving any horizontal gaps at the right edge of the field.
p : Piece Change - Changes the current piece.
z : Zebra Field - Clears every second column of the field.
TetriNET2
TetriNET2 is a multiplayer Tetris game by the original creator of TetriNET. In addition to the special blocks found in the original TetriNET, it has five new ones:
Immunity - Target cannot be affected by any special for a default of 15 seconds.
Clear Column - Deletes a random column from the target field.
Mutate Pieces - A certain number of the target's next pieces (default 3) become large and awkwardly shaped.
Darkness - Target cannot see anything on his field besides the current piece and its immediate surroundings for a default of 10 seconds.
Confusion - Causes target's controls to "mix up" for a default of 10 seconds (for example, the key that normally moves the piece left may start moving the piece right instead.)
In late 2007, like other clones, TetriNET2 was shut down per the request of The Tetris Company. The TetriNET2 website and servers became unavailable for several years. As of early 2010, TetriNET2 is back up and running (per request of many fans that are not satisfied with the lack of game development by The Tetris Company). The TetriNET2 website and servers have been recovered, relocated, and restored.
Popularity and reception
With clients for various platforms available, the game was also well received in the Linux community. The Linux conference linux.conf.au even included a programming contest where contestants tried to program TetriNET playing bots, who could connect to the game server and play the game. The prize for the best bot was a A$40,000 IBM pSeries server. The game was also played in LAN parties. Game Revolution named Tetrinet as affordable alternative to Tetris.
In a 1999 review of The Next Tetris, Game Revolution named TetriNet as "truer to its Tetris roots" and "If you want multi-player Tetris, the network based Tetrinet is much more fun.".
References
External links
TetriNET.info - Official TetriNET resource
gtetrinet source code repository on sourceforge.net
1997 video games
BeOS games
Fangames
Freeware games
Multiplayer online games
Tetris
Video game clones
Open-source video games
Unix games
Linux games
Windows games
Video games developed in Poland
Classic Mac OS games
|
34441636
|
https://en.wikipedia.org/wiki/IBooks%20Author
|
IBooks Author
|
iBooks Author (iBA) was an e-book authoring application by Apple Inc, released in early 2012, only available for macOS, and discontinued in 2020.
Overview
Documents created by iBooks Author could only be sold for a fee if they are accepted by and distributed by Apple, but authors also had the option to distribute their work elsewhere for free.
It allowed many aspects of a document to be edited in WYSIWYG fashion, including text, fonts, colors, foreground and background images, interactive widgets, and charts.
iBooks Author was discontinued on July 1, 2020, with Apple suggesting Pages as a replacement.
References
External links
Former official homepage, now showing information of how to transition from iBooks Author to Pages
Apple Inc. software
MacOS-only software made by Apple Inc.
MacOS graphics software
Typesetting software
Desktop publishing software
Discontinued software
|
12707615
|
https://en.wikipedia.org/wiki/EarMaster
|
EarMaster
|
EarMaster is a music software program launched in 1996 by Danish editor Miditec, who changed its name to EarMaster ApS in 2005. The first prototype version of the software was DOS-based, but since 1996, it has continuously evolved with the Microsoft Windows OS. In November 2008, EarMaster became multi-platform with the release of a version for Mac OS X. The main focus of EarMaster is ear training and sight-singing, even though EarMaster seems to tend towards a more general approach to music teaching since v. 4.0, covering a broader spectrum of music theory and practice. In June 2016, EarMaster was also made available on iOS.
History
The prototype of EarMaster was a DOS-based software programmed in 1994 by Hans Jakobsen. The first proprietary version of EarMaster was EarMaster 1.0, released in 1996 by Miditec. It was distributed by Roland in Scandinavia and available in 5 languages. EarMaster 2.0 was launched in 1997 and was the first version to be commercialized online. In 1998, EarMaster develops the first educational version of its ear training software, EarMaster School 2.5, in collaboration with 29 music teachers. EarMaster Pro 4.0 and EarMaster School 4.0 follow in 2000, with a new interface and more options. EarMaster 5.0 was released in 2005 in both a Pro and a School version, first for Windows and later for Mac OS X. The release of EarMaster 5.0 also marks a name change for the editing company from Miditec to EarMaster ApS. EarMaster 6 was released in 2012, followed by two major updates (6.1 in 2013 and 6.2 in 2015), and a completely new version for iPad in 2016. In 2017, EarMaster 7 was released on Windows and Mac, followed by a version for iPhone in 2020 which was featured in the App Store in the "Best of the Month - New Apps we love" section.
In 2014, EarMaster released an educational Cloud solution for e-learning called EarMaster Cloud. EarMaster Cloud enables music schools, choirs and private teachers to give access to the EarMaster application on Windows, macOS and iOS to students and teachers. The solution includes Learning Management System features and Course Authoring Software, making it possible to create and deploy interactive Musicianship assignments and review the results of the students. EarMaster Cloud was nominated for a Music Teacher Award for Excellence in 2019 and is used by prominent institutions such as Berklee College of Music in the USA.
Content
EarMaster includes several training modes: workshops with progressive sets of lessons about various music theory and ear training topics, a customization mode, and a beginner's course. While the general workshops are rather general and their lessons focus on most of the aspects of ear training, the jazz workshops focuses exclusively on the particularities of Jazz music (e.g. jazz chord, swing rhythms and real book sight-singing). With the customization mode, the user can set up custom exercises for tailored practice. The topics covered by EarMaster are interval singing, interval comparison, interval identification, scale identification, chord identification, chord inversion identification, chord progression identification, rhythm dictation, rhythm reading (sight reading), rhythm clap-back, rhythmic error detection, melodic dictation, melody sing-back and melodic sight-singing.
Questions are answered with on-screen interfaces (staff, piano, guitar, bass, violin, cello, banjo and other stringed instruments), a functional keyboard with scale degrees and solfege syllables, multiple-choice buttons, a MIDI instrument, or through a microphone (voice, clapping or acoustic instruments).
The user can choose between several note-naming systems to complete the exercises: Anglo-Saxon (A, B, C, etc.), Fixed-Do Solfege, or Relative-Do Solfege, which makes it compatible with the Kodály method.
The results of each lesson are recorded and analyzed in a statistics window. They can be synchronized automatically via the EarMaster Cloud system for instant access by music teachers. EarMaster Cloud is a cloud-based system for music schools developed by EarMaster ApS. It combines online license management and cloud syncing of student assignments and results.
Technical Features
EarMaster is distributed electronically as a download. The software is compatible with the Microsoft Windows OS (XP, Vista, Windows 7, Windows 8, Windows 10), Mac OS X 10.10 or superior, and iOS 9 or newer.
User can input answers with a MIDI device by playing their answers. The software also includes real-time pitch detection, which enable users to sing or play their answers and obtain an immediate evaluation of their pitch and rhythm accuracy.
The sounds played by the software are produced by a SoundFont playback engine and cover the complete set of General Midi (GM) sound presets.
Since version 6.1, EarMaster can import music scores with up to 8 voices in the Music XML format in order to use them in its rhythmic and melodic exercises (for SATB sight-singing for example)
EarMaster includes an editable library with chords, scales, chord progressions, and over 600 Jazz and Classical music scores to be used in custom exercises and assignments by students and teachers.
See also
Ear training
Music theory
Solfège
Electronic tuner
List of music software
References
Buckleitner, Warren (2006), EarMaster Pro 5 - Children's Technology Review Technology Integration for Teachers, October 2006 vol. 11 no. 2, p. 3
Music Educators Journal, March 2008 vol. 94 no. 4, pp. 26–27
Sander, Florian (2007), Earmaster Pro 5 - Lernsoftware zur musikalischen Gehörbildung Multimediales Lernen – Masterstudiengang Medienautor – Hochschule der Medien
External links
Musical training software
Ear training
|
58041835
|
https://en.wikipedia.org/wiki/Marie%20desJardins
|
Marie desJardins
|
Marie desJardins is an American computer scientist, known for her research on artificial intelligence and computer science education. She is also active in broadening participation in computing.
Biography
DesJardins grew up in Columbia, Maryland. She received an A. B. in Engineering and Computer Science from Harvard University in 1985.
She received a Ph.D in Computer Science from University of Berkeley in 1992.
In 1991 she joined SRI International, working in the Artificial
Intelligence Center. In 2001 she joined the Department of Computer Science
and Electrical Engineering
at the University of Maryland, Baltimore County as an Assistant Professor. While there she was
promoted to Associate Professor in 2007 and to Professor in 2011.
In 2015, she was appointed Associate Dean for Academic Affairs in UMBC
College of Engineering and Information Technology. She left UMBC in 2018 to become the Founding Dean of the College of
Organizational, Computational, and Information Sciences at
Simmons College in Boston.
Career
DesJardins has explored the effect of the network topology on the efficiency of
team formation in multi-agent systems, showing that scale-free networks are
often the most effective topologies for facilitating team formation and
leading to the development of learning methods for agents to adapt their
behavioral strategies.
She has shown the first approach to trust modeling that explicitly
separates the effect of competence (that is, the degree to which an agent is
able to carry out its commitments) and integrity (that is, the degree to which
an agent is actually committed to complete its part of a joint action) on
decision making. This framework was later extended to incorporate reputation
(indirect observations provided by third-party agents, with applications to
online rating systems and supply chain formation.
In many domains, when a set of items is presented as a collection, interactions between the items may increase (due to complementarity) or decrease (due to redundancy or incompatibility) the quality of the set as a whole. Although this “portfolio effect” had occasionally been mentioned in the literature, this work was the first to address this problem a general way, by modeling the tradeoff between the “depth” of the set (i.e., which characteristics of the individual items are seen as more or less desirable) and its “diversity” (i.e., how broadly or narrowly distributed the objects in the set are over their possible range).
This work presented a heuristic method for taking advantage of taxonomies, or
hierarchies of values, in Bayesian network learning by searching for the most
effective level of abstraction within the taxonomy, discovering which
distinctions are relevant for the input data, and ignoring the others.
This process reduces the number of parameters that must be estimated, and
simplifies the representation, while preserving the meaningful distinctions in
the domain.
This paper, presenting comprehensive advice to help graduate students navigate
the process of earning an M.S. or Ph.D. and develop strong mentoring
relationships, has been circulated widely to graduate students around the
world and has been translated into multiple languages. It has also been published in IAPPP Communications (Winter 1995,
no. 58) and excerpted in SHPE (the official magazine of the Society of
Hispanic Professional Engineers), Winter 2000, and in IEEE Potentials (August/
September 1996).
Awards
In 2018, she became an AAAI Fellow.
Her other notable awards include:
Association for Computing Machinery Distinguished Member, 2011.
A. Richard Newton Educator ABIE Award, Anita Borg Institute, 2017.
American Council on Education Fellow, 2014-2015
Distinguished Alumni Award in Computer Science, UC Berkeley, 2018
UMBC Presidential Teaching Professor, 2014–2017
American Crossword Puzzle Tournament: B Division champion and winner of Fifties age division, 2018
CRA-E (Computing Research Association Education Committee) Undergraduate Research Faculty Mentoring Award, 2016.
NCWIT (National Center for Women in Information Technology) Undergraduate Research Mentoring Award, 2014
Association for Computing Machinery Senior Member, 2006.
References
External links
University of Maryland, Baltimore County: Marie desJardins, Department of Computer Science and Electrical Engineering
American women computer scientists
American computer scientists
University of Maryland, Baltimore County faculty
Living people
University of California, Berkeley alumni
Harvard University alumni
Year of birth missing (living people)
21st-century American women
|
8786822
|
https://en.wikipedia.org/wiki/Mahindra%20Group
|
Mahindra Group
|
Mahindra Group is an Indian multinational conglomerate, headquartered in Mumbai. The group has operations in over 100 countries, with a presence in aerospace, agribusiness, aftermarket automotive components, construction equipment, defence, energy, farm equipment, finance and insurance, industrial equipment, information technology, leisure and hospitality, logistics, real estate, retail and education. The group's flagship company Mahindra & Mahindra has market leadership in utility vehicles as well as tractors in India.
History
Mahindra & Mahindra was incorporated as Muhammad & Mahindra in 1945 by the brothers J. C. Mahindra and K. C. Mahindra, and Malik Ghulam Muhammad in Ludhiana, Punjab to trade steel. Following the Partition of India in 1947, Malik Ghulam Muhammad left the company and emigrated to Pakistan, where he became the first finance minister of the new state (and later the third Governor General in 1951). In 1948, K. C. Mahindra changed the company's name to Mahindra & Mahindra.
Building on their expertise in the steel industry, the Mahindra brothers began trading steel with UK suppliers. They won a contract to manufacture Willys Jeeps in India and began producing them in 1947. By 1956, the company was listed on the Bombay Stock Exchange, and by 1969 the company became an exporter of utility vehicles and spare parts. Like many Indian companies, Mahindra responded to the restrictions of the Licence Raj by expanding into other industries. Mahindra & Mahindra created a tractor division in 1982 and a tech division (now Tech Mahindra) in 1986. It has continued to diversify its operations through both joint ventures and greenfield investments.
By 1994, the group had become so diverse that it undertook a fundamental reorganization, dividing into six Strategic Business Units: Automotive; Farm Equipment; Infrastructure; Trade and Financial services; Information Technology; and Automotive Components (known internally as Systech). The new managing director, Anand Mahindra, followed this reorganization with a new logo in 2000 and the successful launch of the Mahindra Scorpio (a wholly indigenously designed vehicle) in 2002. Along with an overhaul in production and manufacturing methods, these changes helped make the company more competitive, and since then the Group's reputation and revenues have risen noticeably. Currently, Mahindra & Mahindra is one of the 20 largest companies in India In 2009, Forbes ranked Mahindra among the top 200 most reputable companies in the world.
In January 2011, the Mahindra Group launched a new corporate brand, Mahindra Rise, to unify Mahindra's image across industries and geographies. The brand positions Mahindra products and services as aspirational, supporting customers' ambitions to 'Rise.'
In April 2012, the Mahindra Group expressed interest in purchasing the bankrupt automobile company Saab, and placed several bids for Saab, though was outbid by Saab's new owner National Electric Vehicle Sweden.
Major business ventures
Aerospace
Mahindra Aerospace
Aftermarket
Mahindra FirstChoice Services
Mahindra First Choice Wheels
Agribusiness
Mahindra Agribusiness Division
EPC Mahindra
Automotive
Mahindra & Mahindra
Mahindra Truck & Bus
Mahindra Electric
Mahindra Two Wheelers
GenZe
Jawa Moto
Pininfarina
Automobili Pininfarina
Peugeot Motocycles
SsangYong Motors
Components
Engines Engineering
Mahindra Castings
Mahindra Composites
Mahindra Engineering
Mahindra Gears and Transmissions
Mahindra Forgings
Mahindra Hinoday Ltd
Mahindra Intertrade
Mahindra Sona Ltd.
Mahindra Steel Service Centre
Mahindra Systech
Mahindra Ugine Steel
Metalcastello S.p.A.
Consulting
Mahindra Integrated Business Solutions
Mahindra Consulting Engineers
Mahindra Logisoft
Mahindra Special Services Group
Defence
Mahindra & Mahindra – Military Defence Division
Defence Land Systems
Education
Mahindra United World College of India
Mahindra École Centrale
Energy
Mahindra & Mahindra – Energy Division
Mahindra Solar One
Mahindra Susten Pvt. Ltd., formerly (Mahindra EPC Services Pvt. Ltd.)
Farm Equipment
Mahindra & Mahindra – Farm Equipment Division
Mahindra USA Inc
Mahindra Yueda (Yancheng) Tractor Co
Mahindra Tractors
Erkunt Tractor
Gromax Agri Equipment Ltd. (erstwhile Mahindra Gujarat Tractor Ltd)
Mahindra Swaraj
Jiangling Tractors
Financial Services
Mahindra & Mahindra Financial Services Limited
Mahindra Insurance Brokers
Mahindra Rural Housing Finance
Mahindra Mutual Fund
Hospitality
Mahindra Holidays and Resorts
Industrial Equipment
Mahindra Conveyor Systems
Information Technology
Tech Mahindra
Mahindra Comviva
Bristlecone
CanvasM
Logistics
Mahindra Logistics
Smart Shift
Luxury Boats
Mahindra Marine Private Limited
Ecommerce
M2ALL – Official Mahindra e-store
Real Estate
Mahindra Lifespaces
Mahindra World City
Retail
Mahindra Retail
Sports
Mahindra United FC
Mahindra Racing
Mahindra-NBA Partnership
Mahindra-Celtic Football Club Partnership
Defunct
Mahindra Satyam
Mahindra Renault
Community initiatives
The Mahindra Group is extensively involved in philanthropy and volunteering. It is considered an active participant in the Indian Corporate Social Responsibility field and received the Pegasus Award for CSR in 2007. Mahindra engages in philanthropy primarily through the KC Mahindra Trust, which serves as the CSR arm of the group (although many subsidiaries have their own CSR initiatives, notably Tech Mahindra and Mahindra Satyam). Founded in 1953 by K.C Mahindra, the trust focuses primarily on fostering literacy in India and promoting higher learning through grants and scholarships. Mahindra operates several vocational schools as well as the Mahindra United World College. The KC Mahindra Trust's primary project however is Project Nanhi Kali, which targets the education of young Indian girls. The foundation currently supports the education of approximately 153,190 underprivileged girls. Other initiatives include Mahindra Hariyali (a 1 million tree planting campaign) as well as sponsorship of the Lifeline Express, a mobile hospital train. Mahindra employees also plan and lead their own service projects through Mahindra's Employee Social Options Plans. In 2009, more than 35,000 employees participated.
The Mahindra Group was responsible for the creation of Mahindra United World College, a UWC campus located in Pune.
Mahindra supports the Mahindra Excellence in Theatre Awards to recognize Indian theater talent, the Mahindra Indo-American Film Festival, and the Mahindra Lucknow Festival. In 2011, it held the first annual Mahindra Blues Festival with guests including Buddy Guy, Johnny Lang, and Shemekia Copeland at the Mehboob Studios in Mumbai. Mahindra partners with the NBA and Celtic Football Club to bring grassroots basketball and football to India.
Leadership
Keshub Mahindra, the Chairman Emeritus of Mahindra & Mahindra, is a graduate of Wharton Business School, University of Pennsylvania, USA. He joined the company in 1947 and became the chairman in 1963.
During his career he has also been Chairman of Bombay Chamber of Commerce and Industry (1966–67), President of ASSOCHAM (1969–70), Chairman of the Indian Institute of Management Ahmedabad (1975–85); Member of the Foundation Board – International Institute for Management Development (1984–89)
His awards include:
Companion – British Institute of Management(1985),
Chevalier de la Légion d'honneur (1987),
Business India – Businessman of the Year(1989),
Honorary Fellowship of All India Management Association (1990),
Institute of Company Secretaries of India (ICSI) Lifetime Achievement Award for Excellence in Corporate Governance (2004),
Lakshya Business Visionary Award – NITIE (2006),
ICFAI Business School (IBS) Kolkata Lifetime Achievement Award presented by the Institute of Chartered Financial Analysts of India (ICFAI)(2007)
At the time of the Bhopal Disaster he was managing director of Union Carbide India Ltd.(In 2010 he was charged and indicted for causing death due to negligence and sentenced to 2 years' imprisonment and Rs 1 Lakh fine. He was granted bail shortly after being sentenced.
Anand Mahindra is chairman and managing director of Mahindra & Mahindra. He graduated from Harvard University and earned his MBA from Harvard Business School in 1981. He joined the Mahindra Group in 1981 as an Executive Assistant to the Finance Director of the Mahindra Ugine Steel Company.
See also
Club Mahindra Holidays
Mahindra & Mahindra
Tech Mahindra
Mahindra Aerospace
References
External links
Indian companies established in 1945
Companies based in Mumbai
Conglomerate companies established in 1945
Indian brands
Multinational companies headquartered in India
|
346608
|
https://en.wikipedia.org/wiki/Tangerine%20Computer%20Systems
|
Tangerine Computer Systems
|
Tangerine Computer Systems was a British microcomputer company founded in 1979 by Dr. Paul Johnson, Mark Rainer and Nigel Penton Tilbury in St. Ives, Cambridgeshire.
The very first product was the successful TAN1648 VDU kit which received much acclaim in the technical press.
The home computer market was beginning to move, albeit slowly, and it was essential to establish a presence. Development and expansion was imperative. It was decided that the latter two partners would relinquish their involvement in order to focus on their consultancy work.
Barry Muncaster became involved operationally and the company moved to new premises in Ely, Cambridgeshire. The company was later renamed, and was known as Oric Products International.
Early years: Microtan 65
Tangerine produced one of the first 6502-based kit computers, the Microtan 65. It had a 3U form factor, a small amount of memory (RAM), a video character generator and UHF modulator for use with a TV set, and a simple latch for entering hex data from a keypad, and the computer was designed to be expandable. The manual came with a one-kilobyte listing of Conway's Game of Life. An optional expansion board could be built with a UART, more memory and BASIC ROMs. Additional expansion boards became available later, offering more RAM, dedicated serial and parallel I/O boards, etc.
After the Microtan 65, Tangerine planned to build a desktop machine and managed to get as far as selling the design for the Microtan 2 also known as Tangerine Tiger to HH Electronics, better known for building amplifiers. They released it as the HH Tiger, but it was not a commercial success.
Tantel
Several Prestel machines where sold, under the general designation of Tantel:
AlphaTantel (1981) - Prestel adapter with a full keyboard and a phone connection jack. Connection to a TV was through a RF modulator, but there was also a RGB output. Built in modem was 1200 baud. It was possible to connect a tape recorder to save data and a printer.
New Tantel Adaptor (1981) - Prestel adapter
Tantel Data Adaptor (1984) - Data adaptor for use with the Prestel system, including a data tape recorder
1983 onwards: The Oric family
With the success of the Sinclair ZX Spectrum Tangerine's backers suggested a home computer and Tangerine formed Oric Products International Ltd to develop and release the Oric-1 in 1983. A series of Oric computers (including the Atmos) followed through to 1987.
On 13 October 1983 the factory of Kenure Plastics in Berkshire, where the Oric-1 was manufactured, burnt to the ground. The factory was rebuilt, minus a considerable stock of bits (including 15,000 old ROMs) that went to make up the Oric-1. In the meantime production was said to have restarted within 24 hours in a new factory. Just a day later, a neighbouring warehouse went up in flames. Police were said at the time to suspect that the arsonist got the wrong place first time round. It was about this time, too, that Tansoft moved to co-exist with Oric Research at the Techno Park, Cambridge.
About 160,000 Oric-1s were sold in the UK in 1983 with another 50,000 sold in France (where it was the top-selling machine that year). Although not the 350,000 predicted, it was enough for Oric International to be bought out by Edenspring and given £4m in funding. This enabled the release of the Oric Atmos, an improved successor to the Oric-1 which added a true keyboard and improved ROM.
Although the Atmos failed to turn around Oric's fortunes, in early 1985 they announced several forthcoming models, including an IBM-compatible and an MSX-compatible. On 1 February they demonstrated the Oric Stratos/IQ164 at the Frankfurt Computer Show; on the 2nd however, Edenspring put Oric International into receivership with Tansoft, by then a company in its own right, following in May.
French company Eureka bought the remains of Oric and, after renaming itself, continued to produce the Stratos under that name, followed by the Oric Telestrat in late 1986.
In December 1987 after announcing the Telestrat 2, Oric International went into receivership for the second and final time.
References
Defunct computer companies of the United Kingdom
Defunct computer hardware companies
Computer companies disestablished in 1987
Videotex
|
34945391
|
https://en.wikipedia.org/wiki/2011%20Canadian%20federal%20election%20voter%20suppression%20scandal
|
2011 Canadian federal election voter suppression scandal
|
The 2011 Canadian federal election voter suppression scandal (also known as the Robocall scandal, Robogate, or RoboCon) is a political scandal stemming from events during the 2011 Canadian federal election. It involved robocalls and real-person calls that were designed to result in voter suppression. Elections Canada and the Royal Canadian Mounted Police (RCMP) conducted investigations into the claims that calls were made to dissuade voters from casting ballots by falsely telling them that the location of their polling stations had changed. Further possible electoral law violations were alleged as the evidence unfolded. Under the Canada Elections Act, it is an offence to wilfully prevent or endeavour to prevent an elector from voting in an election.
On Election Day, May 2, 2011, reports of voter suppression, mostly centred on the riding of Guelph, led to the discovery that a computer in the Guelph Conservative campaign office had possibly been used to make the calls. While the Elections Canada investigation initially focused on calls sent into Guelph amidst nationwide complaints, the investigation expanded to complaints in other ridings across the country. Court documents filed in mid-August 2012 by the Commissioner of Canada Elections indicated that the elections watchdog had received complaints of fraudulent or misleading calls in 247 of Canada's 308 ridings, recorded in all ten provinces and at least one territory. The allegations received widespread national media attention, and led to a series of protests in March and April 2012 in at least 27 Canadian cities. April 29, 2012, was termed by protest organizers a "National Day Against Election Fraud".
On April 24, 2014, Commissioner of Canada Elections Yves Cote issued a press release that stated, "the Commissioner has concluded that, following a thorough investigation by his Office, the evidence is not sufficient to provide reasonable grounds to believe that an offence was committed. Therefore, the Commissioner will not refer the matter to the Director of Public Prosecutions". However, in August 2014 former junior Conservative staffer Michael Sona was found guilty of one violation of the Elections Act.
Voter suppression in Guelph
In February 2012, Postmedia News and the Ottawa Citizen reported that, during the 2011 Canadian federal election, misleading phone calls were made in at least 14 ridings, including Guelph, Ontario. The calls directed voters to the wrong polling stations. The fraudulent automated calls displayed the phone number of a prepaid "burner phone", registered to a "Pierre Poutine" of "Separatist Street" in Joliette, Quebec. In addition, "Pierre Poutine" also used the alias "Pierre Jones" of pierres1630 at gmail.com, living at the fictional address of 54 Lajoie Nord in Joliette, Quebec.
The day before Election Day, "Pierre Poutine" sent out a series of messages using 2call.ca, an automated call company subsidiary of Edmonton-based Internet service provider RackNine, which directed voters to the wrong voting locations. The calls were falsely displayed as originating from Liberal candidate Frank Valeriote's campaign office. A PayPal account was used to pay for the calls to RackNine, and logged Poutine's credit card information. Both RackNine and Paypal turned over activity and transaction logs to investigators.
A transcript of the false robocall in Guelph, used during Election Day to impersonate an Elections Canada official, reads: "This is an automated message from Elections Canada. Due to a projected increase in voter turnout, your poll location has been changed. Your new voting location is at the Old Quebec Street Mall, at 55 Wyndham Street North. Once again, your new poll location is at the Old Quebec Street Mall, at 55 Wyndham Street North. If you have any questions, please call our hotline at 1-800-443-4456. We apologize for any inconvenience this may cause. (French version recorded in another woman's voice follows.)"
Elections Canada emails were revealed under Access to Information requests, and exposed internal communications on the matter. At 11:06 am on election day election officer Anita Hawdur sent an email to legal counsel Karen McNeil titled: "URGENT Conservative campaign office communication with electors". Hawdur reported that returning officers also called to ask about the calls. Another email was sent from legal counsel to Ronnie Molnar, the deputy Chief Electoral Officer who in turn emailed a senior director: "This one is far more serious. They have actually disrupted the voting process."
In response to the Guelph robocalls alone, 281 people called back Pierre Poutine's cellphone. A voice broadcasting expert contracted by Al Mathews of Elections Canada, estimated that at a typical one-percent call-back rate, the 281 call-backs indicated that many thousands of electors were affected, even considering that the nature of these calls would probably have resulted in a higher callback rate. An affidavit filed to secure a search warrant reported that 7,760 call attempts were made in Guelph.
Elections Canada investigation
The investigation into fraudulent calls in Guelph revealed that thousands of automated calls telling people their voting location had changed were sent shortly after 10:00 am on election day. Complaints flooded into Elections Canada, and a local returning officer called a Guelph-area radio station at 10:53 am and put out an advisory to ignore the calls. Liberal MP Frank Valeriote received a call at his home notifying him that Liberal supporters were being targeted. It quickly emerged that there was an extensive campaign to discourage Liberal supporters. In under an hour, 100 voters arrived at the phony voting location. A signed affidavit indicates that 150 to 200 voters in Guelph showed up at a phony vote location at the Quebec Street Mall; some voters ripped up their voter identification cards in anger. He also noted that the voters who were targeted were voters who had indicated they would not vote for the Conservative Party when contacted by the party. This caused the opposition parties to allege that the calls were a campaign by the Conservative Party to intimidate supporters of other parties.
After being accused by some journalists and members of political parties of direct involvement and having Conservative Party ties, Matt Meier, the CEO of RackNine, originally described his company as a "non-partisan firm, free from any party affiliation, bias, or designation", that provided services to "political parties across the political spectrum". However, later in March 2012, Meier stated that the company held an exclusive contract with the Conservative Party that precluded them working for other parties during the 2011 election, a standard requirement among all political parties.
RackNine was used legitimately by a number of Conservative candidates, including Guelph Conservative candidate Marty Burke, and Conservative leader Stephen Harper in Calgary Southwest. In November 2011, an Edmonton judge ordered RackNine to turn over all correspondence, emails and records of contact between the company and representatives of the Conservative Party general election campaign in Guelph, although Elections Canada made clear that "RackNine Inc. is not under investigation for an offence against this Act or any other Act of Parliament".
Elections Canada traced the automated calls to a disposable cellphone in the 450 area code of Joliette, Quebec, and issued a subpoena to the cellphone provider. The provider produced a list of outgoing calls from the same number. One of the calls was found to be made to RackNine; in November 2011 the investigator served RackNine with a production order for records. The account holder associated with the false calls was quickly identified. The owner of RackNine said they had no idea what had transpired on election day until contacted by an Elections Canada investigator. Phone records show numbers connected with Guelph Conservative candidate Marty Burke and the Guelph Conservative Party riding association made a total of 31 calls to RackNine between March 26 and early May.
On March 28, 2012, Elections Canada indicated that they were closer to identifying the person behind the fraudulent robocalls in Guelph from records obtained from Rogers Communications under a production order. This followed a lead provided by RackNine who provided the IP address used both to set up and use to make the robocalls to constituents in Guelph. Elections Canada emphasized that RackNine itself was not under any suspicion and that RackNine cooperated completely in the investigation.
Investigators pointed out that whoever set up the account that sent out the fraudulent recorded messages tried hard to cover his or her electronic tracks by using a prepaid credit card to buy a prepaid cellphone, registered an account under a fake name and address, and used a different fake name and address (Pierre Poutine of Separatist Street, Joliette, Quebec) to set up the cellphone. However, the CEO of RackNine was able to trace a specific IP address associated with the calls, which belonged to a private home. In August 2012, Elections Canada investigators indicated that they had hit a dead end in the Poutine investigation, as the IP address they were tracing resolved to a Guelph residence apparently unconnected to the investigation, although the family living there was inadvertently running an open Wi-Fi connection. The residence is located across the city from the Burke campaign office, and so access was unlikely to have been achieved from that office. The IP address assignment was later shown to have been incorrect. As a result of the lack of progress in the Guelph investigation, the RCMP was called in. Diane Benson, a spokeswoman for Elections Canada, confirmed, "The office of the Commissioner of Canada Elections has been assisted by the RCMP in its investigation in fraudulent calls in the 41st general election."
Pierre Poutine/Pierre Jones had also considered the idea of having calls made to Guelph constituents in the middle of the night, while spoofing the phone number of local Liberal party candidate Frank Valeriote. The intention was to anger and annoy the recipients of these phone calls. The message itself had been recorded but was not transmitted.
Meier also informed Elections Canada that "Pierre" had telephoned him on his "unlisted office number" and had asked to speak with him personally when initially setting up the account. Elections Canada investigator Allan Matthews said, "Pierre referred to knowing someone in the Conservative Party", and, "In Meier's view, these facts mean someone must have given Pierre his contact information".
According to court filings, Elections Canada alleged that someone connected to the Conservative party campaign in Guelph had planned to deceive non-Conservative party supporters by making misleading and harassing telephone calls, either directing voters to non-existent polling stations or by angering them by phoning them in the middle of the night.
Liberal Member of Parliament Marc Garneau requested that the Canadian Radio-television and Telecommunications Commission (CRTC), which "can investigate unsolicited calling activity without court orders", be involved in the investigation.
On May 4, 2012, a court filing by Elections Canada investigator Al Mathews indicated that the same IP address used to create the misleading calls on RackNine's service was also used within four minutes by Conservative campaign staff member Andrew Prescott to also make legitimate RackNine calls. The IP address was assigned to a computer in the campaign headquarters of Guelph Conservative candidate Marty Burke. Prescott also downloaded a list of telephone numbers from the Conservative Party's central database on April 30, the same day that Pierre Poutine account was created. Witnesses also recalled that Conservative Party campaign worker Michael Sona had discussed his extensive plans for a disinformation campaign, including sending identified non-Conservative voters to the wrong poll locations. Both Prescott and Sona have repeatedly denied any involvement in making the illegal robocalls.
Also, in August, a more detailed analysis of Elections Canada court filings showed that Andrew Prescott and "Pierre Poutine" had used the same computer in the middle of the night of 1–2 May 2011, within minutes of each other, without signing out in between. Direct Leap Technologies CEO Simon Rowland explained the court filings: "on May 1 and 2, on three occasions Pierre Poutine logged into the Racknine web interface, logged out, and then logged into the Prescott account during the same browser session. This means Poutine logged out of his account, and then logged into the account used for the official calls without closing his browser tab. So it's not just what was reported so far — that the Poutine account and Prescott account were accessed by the same IP within 4 minutes of each other during the middle of this night. It's also that on three separate occasions, someone with both the Prescott and Poutine account passwords used the same browser window to log into both accounts. Also, Poutine logged into Racknine through the proxy, closed his browser window, and 1 minute later logged in again, but this time forgot to go to the proxy website first, accidentally accessing the site directly. There were two session records for the Poutine account 1 minute apart: the first coming from the proxy, and the second coming from the Burke Campaign's office IP at 99.225.28.34." Rowland commented that this is "pretty great evidence, as it shows that someone had both passwords".
On October 31, 2012, accused Conservative Party staff member Michael Sona, whom anonymous reports had named as responsible for the Guelph voter suppression efforts, gave an extensive media interview on CBC's Power & Politics. Sona stated that he had hoped that the Elections Canada investigation would have shown he was not involved by this point in time, but that given that there was no end in sight to the lengthy investigation, he felt he had to speak out. In the interview, Sona denied involvement and indicated that he was "not going to take responsibility for something that [he was] not responsible for". He added, "I think that there's some people that maybe had an interest in seeing me take the fall for it." During the interview, he was asked who was involved and Sona stated, "You've got to take a look at the options and just say, you know what, what is the more realistic option here? That some then-22-year-old guy managed to co-ordinate this entire massive scheme when he didn't even have access to the data to be able to do this, or the alternative — that this was much more co-ordinated or possibly that there were people that knew how to do this, that it was being done? ... I don't know for sure who it could have been, but I will say this. It's interesting that you had a bunch of people come out and point the finger at me, officially to Elections Canada, only after my name was leaked to the media by anonymous sources."
In November 2012, the Guelph Mercury reported that Burke's campaign manager, Ken Morgan, had moved to Kuwait, changed his email, left no phone number and refused to speak with Elections Canada.
In August 2013 court filings made by Mathews as part of Information to Obtain (ITO) court orders showed that Sona admitted his involvement in the events and suggested that others were involved as well. Mathews also stated, "Sona also said in his media interviews that Elections Canada had told him in June that they had cleared him of involvement and that our investigation was completed. These last statements are wrong." Elections Canada also presented evidence that at least one named voter was dissuaded from voting as a result of the deception. The case judge, Célynne Dorval, issued a temporary publication ban covering much of the content of the ITO orders at the request of Sona's lawyer and agreed to by the Crown prosecutor, to ensure a fair trial. The filed court documents also clarify why the IP address used to set-up the RackNine calls traced to an uninvolved home address, as Rogers had incorrectly identified the holder of the IP address. It was confirmed that the correct user on the date in question was the Marty Burke campaign office. Further filed court documents indicated that the Conservative Party admitted that its CIMS database was used to create the list of non-Conservative supporters used, that five people in Guelph had accessed CIMS, and that Sona was not one of them.
The 29 August 2013 pretrial conference resulted in the judge, Justice Norman Douglas, indicating that the case may not result in a trial, but that would be determined at the next meeting on 25 September 2013, stating, "If there needs to be a trial, we'll set the date at that time."
On 15 January 2014 it was announced that Andrew Prescott, the Conservative deputy campaign manager and IT coordinator in Guelph, had been granted immunity from prosecution in the case, in exchange for his participation as a witness.
Conservative Party internal investigation
There were concerns that the Guelph robo-call user had access to the Conservative Party national voter identification database, known as "CIMS". The information from this database was used to target voters who identified themselves as voting against the Conservative Party. The CIMS database requires a secure login, and all use of the database is logged. Since the voters who were targeted had spoken (during legitimate calls) with the Conservative Party and identified themselves as non-Conservative voters, the initiator of the robocalls ("Pierre Poutine") had been one of a limited number of Conservative Party staff or volunteers who had access to the voter database. The Conservative Party did not reveal the list of people who had access to this database. The party's investigator, lawyer Arthur Hamilton, instructed party workers not to discuss the events during the Elections Canada investigation of the Conservative Party headquarters.
Voter suppression across Canada
Elections Canada's investigation initially focused on complaints in Guelph, but reports of similar automated misdirection calls were received in some 200 ridings, in every province. The initial investigation was expanded with interviews in other ridings. Media reports published complaints of alleged fraudulent robocalls or harassing live calls in 100 ridings. The calls were reported from Yukon to Nipissing, Ontario. In Yukon, the election was won by only 132 votes and a number of voters were sent to a phony voting location. Four ridings were won by fewer than 1,000 votes, including Nipissing—Timiskaming, Mississauga East—Cooksville, Winnipeg South Centre and Willowdale all of which experienced robo-calls. In three of these ridings, robocalls allegedly directed voters to false voting locations and in all four ridings complaints were filed.
By March 2, Elections Canada had received 31,000 complaints related to the robocall scandal. These complaints were not necessarily all reports from voters personally affected by the robocalls, but rather voicing concern about the robocalls and their impact on Canadian democracy. On March 29, Elections Canada reported that they had received 800 actual reports from voters who alleged that they had been called and given misleading polling information. By mid-August, the number of reports had risen to 1,394 according to court documents filed by the Commissioner of Canada Elections. In the Guelph investigation alone, Elections Canada is aware of at least 7,600 robocalls directing voters to the wrong voting station, which resulted in 68 formal complaints in the midst of intense local media coverage in Guelph on Election Day.
Calls from live operators announcing false polling location changes
While the messages directed to Guelph voters using RackNine's services were automated, there were also nationwide reports of calls made using live operators in addition to other reports of fraudulent robocalls across the country. In one widely reported version, the caller identified themselves as representing Elections Canada and read a message that indicated that the voter's voting station had been moved "due to higher than anticipated voter turnout". This call was seen as suspicious by some recipients due to the fact that some of them had either already voted at their original voting station, had used the same voting station for decades, or were party staffers.
Employees of Responsive Marketing Group Inc, a call centre with live operators located in Thunder Bay and used only by the Conservative Party, stated earlier in the 2011 campaign that they had made calls to identify recipients as either Conservative supporters or Liberal/NDP supporters. Depending on their stated allegiance, the recipients later received different scripted messages, such as get-out-the-vote calls targeted at identified Conservative supporters. Some call centre workers became concerned that what they were doing was wrong and possibly illegal, and informed their supervisors and the RCMP. Their supervisors told them to stick to their script. The RCMP in Thunder Bay referred it to the RCMP in Ottawa. Cpl. Laurence Trottier referred it to Elections Canada. Elections Canada has a policy of not discussing ongoing investigations and refused to make any statements.
The legal challenge brought forward by the Council of Canadians case relies on the affidavit of Annette Desgagne, a Responsive Marketing Group call centre worker who says that she and her co-workers were given scripts to mislead voters on election day into going to the wrong location to vote. Arthur Hamilton, a lawyer representing the Conservative Party, called the affidavit "false" and stated that he would seek to have the Council of Canadians court case thrown out as "flawed" and a "publicity stunt". The lawyer served motions to have the case thrown out of court before the supporting evidence had been filed. Fred DeLorey, a Conservative Party spokesman, added about the case, "This is a transparent attempt to overturn certified election results simply because this activist group doesn't like them". Desgagne claimed that she was given scripts while working at the Responsive Marketing Group call centre. These scripts identified the calls as coming from the "Voter Outreach Centre", and told voters about false changes to voting stations.
While speaking to voters to tell them that their voting location had changed, many voters told Desgagne that they had already voted or that the voting location was over an hour from their house. Desgagne said she remembered calling someone in the contested Nipissing—Temiskaming riding because she had repeated difficulty pronouncing it – a riding with no actual poll location changes. The affidavit states that other employees noticed that the change-of-location voting information was erroneous and discussed it on their breaks. When hearing another RMG employee use a script that identified himself as from Elections Canada, Desgagne said, "Dude, you're not from Elections Canada." RMG's spokesperson said that they did not call anyone but Conservative Party supporters, and that their scripts honestly and correctly identified themselves as from the Conservative Party. RMG further insisted that they made no change-of-address calls regarding voting locations.
In August 2012, RMG CEO Andrew Langhorne filed an affidavit which called Desgagne's story "categorically false", and denied that the company even called opposition supporters in the last days of the election. He referred to a review of recordings of Desgagne's calls. However, court documents filed on November 5, 2012, showed that the Responsive Marketing Group, using scripts provided by the Conservative Party, had called voters at the end of the election campaign telling them that their polling stations had been moved when they had not been moved. The factum was filed by Steven Shrybman for the plaintiffs. On January 14, 2013, The Ottawa Citizen posted an audio recording of a robocall recorded by a voter in London, Ontario, that is being investigated by Elections Canada.
Part of the Council of Canadians case involves expert witness testimony from Bob Penner, president and CEO of Strategic Communications Inc. Penner's affidavit says: "The only plausible explanation for such calling to have occurred is for someone at the senior level in a central political campaign to have authorized the strategy and provided the data and the funds with which to carry it out."
Harassing calls claiming to be from the Liberal Party
Some reports centered on live and automated calls falsely claiming to be from the Liberal Party. Voters reported rude calls, racist calls mimicking ethnic accents, or very-early or late-night phone calls from live callers.
Jewish voters from ridings including Eglinton—Lawrence and York Centre reported receiving calls while observing the Sabbath, where the Liberal campaigns report that they did not send these calls. The campaigns explained that their campaigns are careful to respect religious observation on the Sabbath and definitely were not the source of these calls.
Falsely misrepresenting oneself as a political party is a crime under the Canada Elections Act.
Investigation
On March 15, 2012, Elections Canada indicated that it would expand its investigation in response to additional complaints received. Tim Charbonneau, an Elections Canada investigator, joined Al Mathews, a former investigator for the RCMP. Mathews had been previously involved in the investigation of Rt. Hon. Brian Mulroney over the Airbus affair, as well as Privacy Commissioner Radwanski. The Conservative Party's investigation was conducted by Arthur Hamilton, a lead lawyer for the Conservative Party, who was previously involved in the Gomery inquiry, and the Helena Guergis and Rahim Jaffer investigations.
Elections Canada followed up on at least two instances in which voters received robocalls supposedly from Elections Canada telling voters that their polling stations had been changed. In one instance, Eduardo Harari, a volunteer working on Ken Dryden's Liberal campaign in York Centre, stated that the reason he had been told in one of the calls for the polling station location change was due to the high number of people voting at his polling station. Harari also said that he had received eight bilingual fake calls from Elections Canada telling him his polling station had changed, including one on April 21 and the last on May 2. While Harari did report the calls to Elections Canada during and after the election, he was only contacted by Elections Canada after the second call. Charbonneau also interviewed Peggy Walsh Craig of Nipissing—Timiskaming, who said she had received a robocall purportedly from Elections Canada. Craig also stated that she received voter-identification calls earlier in the campaign ostensibly from someone representing the Conservative party. Harari also reported having received a similar voter identification call from someone claiming to be from the Conservative party. Both Harari and Craig had indicated they would not be voting Conservative.
Further investigation by the Canadian Broadcasting Corporation (CBC) seemed to reveal a similar pattern to that experienced by Harari and Craig. Mark Mayrand, the chief electoral officer, indicated that he had received over 700 calls from Canadians who claimed to have received deceptive calls purportedly from Elections Canada. Specifically, a pattern was identified in which voters who had previously received phone calls from someone allegedly from the Conservative party and who had indicated that they would not be voting Conservative, subsequently received a robocall directing them to an incorrect polling station. Tim McCoy, in the riding of Ottawa—Vanier was one such person who had received a robocall falsely from Elections Canada but only after having received a call from someone claiming to be from the Conservative Party and asking McCoy for his support in the upcoming election. McCoy reportedly declined to pledge his support for the Conservatives. Elections Canada does not contact voters by telephone, nor does it have telephone numbers for voters.
An EKOS poll confirmed that non-Conservative voters were targeted by robocalls over Conservative voters, and voters in contested ridings were targeted over those in less contested ridings. The president of EKOS described the result as "highly statistically significant and we can say with confidence that this is not an artifact of chance." and that "These results strongly suggest that significant voter-suppression activities took place that were targeted at non-Conservative voters" The polling data indicated that the number of voters affected could have affected the election results in a number of ridings. The EKOS poll aimed to answer three questions: to what extent may voter suppression techniques have been used to influence outcomes in the seven ridings; if voter suppression activities occurred, did they deliberately target electors who were supporters of particular political parties and how effective were any suppression activities in discouraging those from casting a ballot who would otherwise have voted?
In mid-November 2012 a media Access to Information Act request resulted in the release of emails that showed that Elections Canada had already received many complaints from voters about calls directing them to the wrong polling location days before the election was actually held. Elections Canada had identified that these calls originated with the Conservative Party and had contacted the party before the election. Conservative Party officials admitted they were calling voters but denied they were misleading anyone. On the Sunday before the elections Elections Canada lawyer Michèle René de Cotret wrote that there was "some mischief purportedly done by representatives of the Conservative party calling people to tell them that the location of their polling site has been moved." In response to this new information NDP MP Charlie Angus stated, "the defence of the Conservatives is starting to crumble because now we have the information to access documents that reveal that Elections Canada was so concerned about voter fraud, it believed the Conservative Party was 'running a scam' and its investigators traced the calls back to a 1-800 number that went to the Conservative Party headquarters."
By mid-November 2012 the very slow pace of progress by Elections Canada in investigating the matter was causing concern among the Canadian public and the opposition parties. Interim Liberal leader Bob Rae said, "I don't have an explanation as to why it would be taking Elections Canada so long to indicate where it's going and how it's proceeding with this investigation. I'm increasingly hearing concerns from Canadians that Elections Canada is not moving with the kind of clarity and the kind of speed that they would expect of an organization which is intended to ensure Canadians that the electoral process in Canada is fair."
In mid-January 2013 an Ontario court released records showing that an Elections Canada Information to Obtain order served on Rogers to obtain phone records had been completed. The telephone records pertained to 45 complaints of misleading or harassing phone calls.
In mid-March 2013, after more than 21 months of investigation, Commissioner of Canada Elections Yves Côté recommended to Director of Public Prosecutions, Brian Saunders, that charges should be laid with regard to the Guelph robocalls. On 2 April 2013 Conservative campaign worker Michael Sona was charged under section 491(3)d of the Canada Elections Act for preventing or trying to prevent a voter from casting a ballot, which carries a maximum penalty of a $5,000 fine and five years in prison. In June 2013, Croft Michaelson, the federal lawyer with the Public Prosecution Service of Canada, confirmed that they are proceeding by indictment against Sona, which carries the maximum penalty.
In May 2013 Marc Mayrand, the head of Elections Canada, confirmed that witnesses who work for the Conservative Party of Canada were not cooperating with the investigation.
In April 2014 Elections Canada announced that no further charges would be laid. Yves Côté, Commissioner of Canada Elections, said in a press release, "ultimately, investigators have been able to determine that incorrect poll locations were provided to some electors, and that some nuisance calls occurred. However, the evidence does not establish that calls were made a) with the intention of preventing or attempting to prevent an elector from voting, or b) for the purpose of inducing an elector by some pretence or contrivance to vote or not vote, or to vote or not vote for a particular candidate. This proof of intent is necessary for the Commissioner to consider recommending to the Director of Public Prosecutions that a prosecution under the Act be initiated."
Lawyer Steven Shrybman, who represented the Council of Canadians in their related case, called the Elections Canada investigation "fatally flawed" and stated that it ignored key evidence presented. He charged that Côté failed "to pursue the central question to emerge about voter fraud during the Election". Shrybman said in a report he authored, "in spite of having narrowly confined his inquiry, the Commissioner draws an aggressive and overly broad conclusion that goes well beyond an acknowledgement that he was simply unable to identify the culprit or culprits behind the voter suppression calls that were widely reported...Remarkably, there is no indication that the Commissioner asked the CPC (Conservative Party of Canada) to produce the record of CIMS database use in the days leading to the Election to determine how often, and by whom, lists of non-CPC supporters were downloaded."
The Elections Canada report has been criticized for being incomplete. In Winnipeg South Centre, the riding with the second largest number of complaints about misdirection calls Elections Canada did not contact Dimark Research, the company that made calls for the Conservative Party. Simon Rowland, a telephone systems expert, who once ran for the NDP and who assisted in the Elections Canada investigations in Guelph indicated that Elections Canada did not even consider some plausible methods by which fraud could have been implemented. The Regina Leader-Post reported that scripts published by Elections Canada in their report and used by the Conservative Party misled voters about changes in polling locations and sent voters up to 740 km away to vote, but were not investigated. Party lawyer Arthur Hamilton denied in writing that they were doing this and Elections Canada had previously warned the party not to communicate with voters about changes in polling locations and yet the report did not address this.
Responsibility
Prime Minister Stephen Harper and the Conservative Party of Canada denied any knowledge or involvement in the affair. Harper dismissed the allegations, calling them, "broad" and "sweeping". Then-NDP leader Nycole Turmel replied, "The Prime Minister must be tough on crime."
A Conservative Party staff member who worked for the Guelph riding campaign during the election and since then as an assistant for Conservative MP Eve Adams resigned soon after the scandal was reported, but later came forward stating that he was not involved.
The Conservatives blamed the calls upon multiple parties including the Liberal Party, Elections Canada, unnamed "third parties", an isolated incident, that they do not know who was responsible and that they did misdirect voters, but accidentally.
Other allegations of fraud
By early March, the scandal had spread to include more than just allegations of phone calls affecting the election outcome. On March 8, 2012, allegations were reported by The National Post that hundreds of unregistered voters who were not eligible to vote may have cast votes in the Toronto-area riding of Eglinton—Lawrence. At least 2,700 applications for late registration did not provide addresses or gave false or non-residential addresses.
In Etobicoke Centre, the Liberal candidate, Borys Wrzesnewskyj, alleged that 86 voters voted without valid ID and that a total of 181 people were improperly allowed to vote. The margin of victory in the riding was 26 votes for Conservative Ted Opitz. After being allowed to examine the election records, a court challenge was filed claiming 181 disputed votes. Two voters gave addresses outside of the riding, while 32 others were listed in another riding. Five voters were found to have voted twice, illegally. One polling division Deputy Returning Officer and Polling Clerk vouched for several voters, which they knew was illegal from their Elections Canada training. Wrzesnewskyj's case under Part 20 of the Canada Elections Act started in Ontario Superior Court in Toronto on April 23, 2012. On May 2, 2012 Elections Canada confirmed in court that 51 registration certificates from three polls were missing and cannot be confirmed as ever having been completed. Registration certificates are used to qualify a non-registered voter to vote. On May 18, 2012 Justice Thomas Lederer set aside 79 ballots, ruled that the election result was invalid due to irregularities and ordered a by-election. In response to the court ruling in early June the Conservative Party commenced robocalls into the riding telling voters that Wrzesnewskyj had plotted to "overthrow" the riding and telling voters that they have had their votes "taken away" by the court's decision. Opitz appealed the case to the Supreme Court of Canada, who on 25 October 2012 upheld Opitz's election in a split 4-3 decision, in which Chief Justice Beverley McLachlin sided with the minority.
In a further scandal, Elections Canada investigated the election finances of Associate Minister of National Defence Julian Fantino, after three former Conservative riding executives from Vaughan signed affidavits alleging impropriety in Fantino's 2010 and 2011 election campaigns. They alleged there was a second, secret, illegal bank account containing $300,000. Elections Canada requires that candidates have only one bank account during an election, to facilitate tracking of election related spending. Penalties include up to $1,000 fine and one year in jail, or $5,000 and 5 years in jail. An account statement showed by that the account held $357,939.86 on January 18, 2011.
Elections Canada investigations are conducted in private until charges are laid, and accordingly a spokesperson would not confirm if this was under investigation.
John Fryer, an adjunct professor of the School of Public Administration at the University of Victoria, and a holder of the Order of Canada, claimed that he attended a Conservative campaign school where it was taught that misleading phone calls to suppress voting were acceptable. The course was organized by Fraser McDonald of the Manning Centre and Richard Ciano and Nick Kouvalis, founding members of Campaign Research, the Conservative Party's voter identification and market research company in the election. Fryer alleges that in January 2010 he attended a three-day seminar on robocalling techniques that included questions and answers directly discussing posing as a member of another party and regarding making rude calls at inconvenient times, as a strategy to get the supporter of another party to not go out and vote for their candidate. In a letter to the Globe and Mail, John Fryer said the voter suppression tactics described at this seminar were borrowed from those used by the Republican Party of the United States. In March 2012 Fryer issued a letter to Aaron Wudrick of Campaign Research stating "I am writing at your request to state that my comments which have been published recently were not intended to suggest that Mr Kouvalis, Mr Ciano or Campaign Research provided, discussed or made suggestions to participants regarding any illegal or unethical campaign or election tactics and apologize for any distress that this has been caused to your clients.".
On April 9, 2012 allegations were raised that two Front Porch Strategies American employees, company director PJ Wenzel and CEO Matthew Parker, had taken part in campaigning for Conservative candidates in contravention of the Canada Elections Act. The two had posted photos of themselves campaigning in Canada on Facebook.
Response
Elections Canada received 31,000 complaints during February 2012 and the first days of March 2012 alone. Most of the 31,000 contacts made to Elections Canada were the result of template letters and automated complaints from websites and various activist groups. Involvement of American activist groups such as Avaaz has worried many MPs, including NDP leader Nycole Turmel. The number of actual complaints was about 700. These 700 complaints, not the 31,000 complaints sent in protest, were the subject of investigation by Elections Canada. Complaints brought to Conservative MP Ryan Leef's Facebook page were repeatedly ignored and deleted.
Public support for Harper's government in polling was 31% and 37% as of early March 2012. The president of polling organization Ipsos-Reid, which conducted the poll, believed that the Conservatives had not suffered any real political damage over the controversy at that time. Later polls, have shown a tremendous drop in support for the Conservatives, partly linked to fallout from the robocall scandal. A poll done on March 22 - April 2, by the Canadian Press Harris-Decima showed the Conservatives at 34% and the NDP at 32%. An Ipsos-Reid poll done April 3–5 showed the Conservatives tied with the NDP, at 34% and 33%. Ipsos-Reid attributed this to weeks of enduring controversy, including the robocall scandal, an uninspiring budget and the auditor general's report on the troubled F-35 stealth-fighter program. A Leger Marketing April 2012 poll put the NDP ahead of the Conservatives at 34% vs 32%.
Preston Manning, who was a key player in the formation of the current conservative movement in Canada, indicated that he found the robocall and voter suppression tactics "deplorable". In Ottawa for a gathering of other conservatives, Manning reiterated to reporters that the use of voter suppression tactics is a concern for all political parties. A second concern voiced by Manning is that the revelation of such voter suppression and the use of unethical robocalls means that the Conservatives "have to worry and all the politicians have to worry about this declining respect – it's bordering on contempt for political people". Manning added that "If people don't respect and don't like politicians, they're going to rate that government, no matter what it does, low". A former Chief Electoral Officer, Jean Pierre Kingsley, called for a full disclosure of what happened and who did what.
According to an early March online survey, half of Canadians thought that by-elections should be held as soon as possible in those ridings in which the misleading calls took place. The same survey also stated that 63% of Canadians believe the Conservatives are "likely to provide false and misleading information to voters through telephone calls with pre-recorded messages during a political campaign", while the numbers for the Liberal, NDP, and Green Parties are lower at 55%, 33%, and 32%, respectively.
In a poll conducted by Ipsos-Reid, 75% of respondents agreed that "a special, independent commission of inquiry with judicial powers should be established to find out what happened in the past election and make recommendations on our future election rules and structure". 68% of poll respondents want by-elections to be held in affected ridings.
Protests
Protests began on March 3, 2012, with approximately 250 people rallying in Vancouver, British Columbia. Protests spread across Canada, with a protest held in Ottawa on March 5, 2012 and with protests taking place across 27 Canadian cities on March 11, promoted by groups including the Council of Canadians. The protest at Parliament Hill in Ottawa attracted between 40 and 100 people. A petition calling for an inquiry into the robocall scandal had accumulated 37,000 signatures by March 3, 2012.
In Toronto a protest march, starting at Dundas Square, was held March 11 to demand by-elections and a public inquiry, attracted a crowd of 1,500 demonstrators. A Calgary protest attracted 100 protesters including the Raging Grannies, while 60 protestors in Edmonton shouted slogans and sang O Canada. In northern Canada, a handful protested in the territorial capitals of Iqaluit and Yellowknife. The provincial capital of Prince Edward Island, Charlottetown, drew a protest of 60 at Province House. Windsor's protest drew a couple of dozen people. Downtown Nanaimo had a small and passionate crowd demanding a public inquiry. In Halifax, 80 people protested and were joined by an NDP MP, and in Victoria hundreds demanded accountability. Peterborough, the riding of Dean Del Mastro, the Conservative MP responsible for responding to the robocall scandal also had around 100 protesters. In Regina's Victoria Park, protestors blindfolded a statue of Sir John A. Macdonald. North Bay residents held a protest at their MP's office, while twenty people in Kelowna held a two-hour protest and asked drivers to honk their horns. Kamloops had ten residents protest. In Montreal, protesters, some of whom held up placards, held a demonstration and demanded a full public inquiry. Protests also took place in Winnipeg with more than 300 people in attendance including current and former NDP and Liberal MPs. In the riding where much of the robocall scandal began, Guelph, a small rally was held, as a few dozen protested in Kitchener.
Simultaneously, protests were held in St. John's, and planned for Brampton, Brantford, Hamilton, Kingston, London, Nelson, Oshawa, Saskatoon, Hope, and Fort St. John.
The second round of protests occurred March 31, 2012, in a number of Canadian cities including Toronto, St. John's, Brantford, Kitchener-Waterloo, Regina, Winnipeg, Victoria, Vancouver, Kelowna, Fraser Valley, Saint John, Montreal, Hamilton, Halifax, Calgary, Lethbridge, Edmonton, Canmore, Nelson, Ottawa (April 1), and Windsor. This day was termed the National Day against Election Fraud by organizers.
In between the first two cross-Canada protests, Belleville held an electoral fraud rally in solidarity with other ridings who have suffered electoral fraud. It was held at Market Square drawing 100 protestors, as well as Liberal, NDP and Green Party candidates, but not the Conservative MP.
Legal challenges
One contested riding, Nipissing—Timiskaming, was won by only 18 votes for the Conservative Party candidate. On March 7, Liberals indicated they were intending to launch a court challenge and were seeking evidence.
On March 27, 2012, the Council of Canadians announced that they had launched a lawsuit in the Federal Court of Canada to ask for by-elections to be ordered in seven ridings where complaints were received and where Conservatives had won by slim margins. The ridings named are Don Valley East, Winnipeg South Centre, Saskatoon—Rosetown—Biggar, Vancouver Island North, Yukon, Nipissing—Timiskaming and Elmwood—Transcona. In these seven ridings, none of the winning candidates filed statements in their defence.
On May 22, 2012, Conservatives who had claimed the seven seats called on the courts to dismiss all claims that could cause a byelection, relying on the tight deadlines for such a filing (30 days) rather than on the substance of the allegations. The Council of Canadians, which had organized the plaintiffs, indicated it would continue to press all seven cases, was abandoning none of them, and would oppose the Conservatives' motions, referring to them as "nothing more than an effort to dismiss the democratic rights of individual Canadians ... If the Conservatives really want to get to the bottom of the robocalls scandal, they would be keen to have these cases heard and decided. Instead, they are bringing entirely meritless motions to prevent that from happening." The move to dismiss was not allowed, Federal Court Prothonotary Martha Milczynski ruled on July 19, 2012 that the case should proceed, indicating that Council of Canadians' application raised serious doubts about the integrity of the democratic process.
On June 26, 2012, Brother Kornelis Klevering who was the Marijuana Party of Canada candidate for the riding of Guelph, launched his own legal challenge on the grounds that the robo fraud had completely poisoned the integrity of the electoral process, contrary to section 3 of the Canadian Constitution.
In August 2012 it was announced that the Council of Canadians case would be heard December 10–14, 2012, by the Federal Court. Also in August 2012 Elections Canada refused to hand over investigation records to the Federal Court cited jeopardizing ongoing investigations. Commissioner of Canada Elections Yves Côté stated in a written a Canada Evidence Act certificate, requesting an exemption from the court order, "public disclosure information from a partially completed investigation carries the serious risk of compromising the investigation by, among other things. influencing the testimony of witnesses, impairing the ability to verify information already obtained and affecting the willingness of witnesses to speak." Maude Barlow of the Council of Canadians responded, "Elections Canada won't tell us the basic facts of the case: when the complaints were received, which ridings are involved or what they are doing about it other than chasing Mr. Poutine. Canadians have the right to know whether the elections in their ridings might have been hijacked and what Elections Canada is doing about it. That is all we are asking." Among the evidence is the affidavit from the Responsive Marketing Group call centre worker who says she and her co-workers were given scripts to mislead voters on election into going to the wrong location to vote. The Conservative legal team called her testimony false.
In October 2012, the riding of Don Valley East was dropped from the legal case after it was found that Leeanne Bielli, the voter who initially brought the challenge forward, did not live in the riding and therefore was ineligible to challenge the result.
As part of the Council of Canadians case, court documents filed on November 5, 2012, showed that the Responsive Marketing Group, using scripts provided by the Conservative Party, had called voters at the end of the election campaign telling them that their polling stations had been moved when they had not been moved. The factum was filed by Steven Shrybman for the plaintiffs.
Many ridings in the election were won by a margin of fewer than 1,000 votes. If any riding has had electoral fraud that affected a number of voters that could have changed the outcome of the election, a judge can overturn the results. If the election results are thrown out in those ridings where election fraud is found to have altered the final results of the vote by-elections could be called potentially altering the makeup of the House of Commons.
On March 12, 2012, the House of Commons passed a unanimous non-binding motion in favour of granting greater investigative powers to Elections Canada and requiring telecommunication companies that contact voters during elections to register with Elections Canada. The government was given six months to bring forward legislation containing these reforms.
Justice Richard G. Mosley stated the official findings of the inquiry concluded that the epicenter of the voting fraud focused on Guelph. Although voting irregularities and misconduct occurred in the six contested ridings, it was not significant enough to warrant overturn the Conservative MP's mandated terms.
Judge Mosley wrote in his May 2013 decision: "I am satisfied that [it] has been established that misleading calls about the locations of polling stations were made to electors in ridings across the country, including the subject ridings, and that the purpose of those calls was to suppress the votes of electors who had indicated their voting preference in response to earlier voter identification calls ... I am satisfied, however, that the most likely source of the information used to make the misleading calls was the CIMS database maintained and controlled by the [Conservative Party of Canada], accessed for that purpose by a person or persons currently unknown to this court. There is no evidence to indicate that the use of the CIMS database in this manner was approved or condoned by the CPC."
Conservative MPs sought $355,907 in legal fees from the voters who challenged them in the failed bid by the Council of Canadians' attempt to overturn the election results. Although the court determined that there was widespread tampering of votes, it was not widespread enough to warrant overturning the seats.
In February 2015 enquiries by The Ottawa Citizen showed that Conservative MPs who were called to testify in the Council of Canadians' case about their party's involvement had at least a portion of their legal bills paid for by the taxpayers and not the party. The payments were approved by the Conservative-controlled House of Commons Board of Internal Economy.
Other controversial robocalls from the 2011 federal election
In Peterborough, Ontario, Conservative Dean Del Mastro's campaign used robocalls. The calls did not identify the Tory campaign, but only used the name "Jeff", the name of Del Mastro's campaign manager, Jeff Westlake, and included a callback number. Telemarketing rules require a name or legal entity to be named in each call. The calls were made using Campaign Research, a firm used by 39 Conservative ridings during the 2011 election. Voters reported confusion following the endorsement message, as the Liberal Member of Provincial Parliament for Peterborough is also named Jeff, who subsequently issued a public statement to explain that he was not, in fact, endorsing Dean Del Mastro. Del Mastro became the MP in charge of responding to the robo-call scandal. In June 2012 Del Mastro himself became the subject of an Elections Canada investigation for alleged election over-spending irregularities in the 2008 general election campaign.
The Liberal campaign in Guelph sent a controversial automated phone call, which did not identify the origin of the calls as the Liberal Party and attacked the Conservative candidate over his position on abortion. The calls did not misdirect voters regarding polling stations, or fraudulently represent themselves as another party or from Elections Canada, but gave a pseudonym. They said that the Conservative candidate Marty Burke did not support a woman's right to choose. The Liberals said they fully disclosed their spending related to the robo-calls to Elections Canada. They released all their information about the calls, including a pair of transcripts and voice recordings. As a result Elections Canada did not find anything requiring investigation. On August 23, 2012, the Guelph Liberal riding association was fined $4,900 by the Canadian Radio-television and Telecommunications Commission for not identifying the source of robocalls they had made. According to the CRTC, it "reached a compliance agreement with Valeriote's riding association that included an admission of wrongdoing".
In response to the investigation the Liberals opened their books and challenged the Conservative Party to do the same. The Conservative Party has called for opposition parties to open their books, but has refused to do the same and release their own records.
Electoral law in Canada
Criminal consequences
It is illegal under the Canada Elections Act to impersonate Elections Canada or to interfere with somebody's right to vote. Under Section 403 of the Criminal Code finds individuals who fraudulently impersonate others "(a) with intent to gain advantage for themselves or another person" or "(c) with intent to cause disadvantage to the person being personated or another person" guilty of identity fraud. On an indictment, the convicted faces up to 10 years in prison.
Furthermore, the Canada Elections Act specifies a variety of penalties for violating electoral law, including fines, jail time, and deregistration of a party. The Act lists a number of offenses that can result in the deregistration and liquidation of a party's assets, including providing false or misleading information.
The Elections Canada Act describes elections fraud as:
Section 43(a) and 43(b): the wilful obstruction and impersonation of the duties of an election officer;
S.56(e): the misuse of information obtained from the Register of Elections;
S.281(g): the wilful endeavour to prevent and elector from voting;
S.480(1): the intent of delaying or obstructing the electoral process; and
S.482(b): anyone who "induces a person to vote or refrain from voting or to vote or refrain from voting for a particular candidate at an election" guilty of intimidation of the electoral process. Anyone convicted under s. 482(b) faces, on a summary conviction, a maximum $2,000 fine, or a maximum of one year in prison, or both. On an indictment, individuals found guilty face a maximum of five years in prison, a maximum $5,000 fine, or both.
The current Commissioner is William Corbett. The Commissioner (not the Chief Electoral Officer) is responsible for enforcing the Canada Elections Act and investigating complaints made. He can dismiss complaints if they are outside his jurisdiction, if sufficient remedy has been enacted or if there is no public interest to continue. The office of the Commissioner has investigators available but are able to draw on the RCMP for their investigative capacities for their expertise if he believes there has been an infraction of the Criminal Code. His office has the statutory authority to spend the money necessary to enforce the Canada Elections Act. He then will forward it to the Director of Public Prosecutions to decide whether charges will be laid.
Civil
Bill C-2 "Clause 524" allows "an elector or candidate to make an application to a court contesting an election on the grounds that the elected candidate was not eligible or that irregularities, fraud, or corrupt or illegal practices had affected the result of the election". However, the deadline requirements are relatively tight (eight to fifteen days).
Legal proceedings and criminal charges
Former junior Conservative staff Michael Sona was "charged with having wilfully prevented or endeavoured to prevent an elector from voting at an election". Sona is the only Conservative to be charged with any crime related to any robocalls, and in August 2014, he was found guilty of one violation of the Elections Act. The trial judge concluded that it was unlikely that Sona acted alone in the commission of the offence. Justice Gary Hearn sentenced Sona to 9 months of imprisonment and 1 year of probation. He described Sona's actions as 'an affront to the electoral process'. The sentence is currently under appeal.
Conclusion of investigation
On April 24, 2014, Commissioner of Canada Elections Yves Cote announced that his investigation had determined that there was insufficient evidence to believe that an offence was committed and that full investigation would not be possible as the commissioner had no power to compel documents or testimony. The Elections Canada investigation has been criticized by lawyer Steven Shrybman as "fatally flawed". Similar criticisms have been made by others as well.
See also
In and Out scandal
Electoral fraud
List of Canadian political scandals
List of scandals with "-gate" suffix
References
41st Canadian Parliament
Conservative Party of Canada
Political scandals in Canada
2011 Canadian federal election
Voter suppression
Political history of Canada
|
8217592
|
https://en.wikipedia.org/wiki/University%20of%20Limerick%20Vikings
|
University of Limerick Vikings
|
The University of Limerick Vikings are the American football team from the University of Limerick in Limerick, Ireland. The team currently competes in the Irish American Football League. The Vikings have won three IAFL Shamrock Bowl titles – in 2007, 2008 and 2009.
The Vikings' all-time record is 48–28–3 (0.580).
History
1999–2006
Established in 1999, the team played mostly flag football until late 2001, when they joined the IAFL winter league.
In UL's first-ever game, they took the field on the road to the eventual Shamrock Bowl champion Dublin Rebels and were beaten 48–0. The Vikings lost their first four games, but on 2 December 2001, they recorded their first-ever win, 12–8, over the Dublin Dragons in Limerick, with touchdowns from Tommy Conneelly and Paddy "The Saint" Ryan.
In 2002, the Vikings won every game they played thanks to a powerful team of mostly American exchange students. As league champions, they progressed directly to the Shamrock Bowl. However, as most of the American students had returned home, UL was well beaten by the Carrickfergus Knights, 66–0.
The Vikings decided that for the long-term benefit of the team, they couldn't rely on exchange students as much as they had been doing. The 2003 and 2004 seasons were devoted to building a base of home-grown Irish players. Despite going winless during both of those seasons, the Vikings recruited the core of the future Shamrock Bowl-winning teams, including Liam Ryan and Kieran Coen.
In 2005, the much improved Vikings snapped their three-year, 13-game losing streak with a 26–22 victory over rival Cork Admirals, and narrowly missed the playoffs, finishing with a 3–5 record.
Buoyed by their promising 2005 campaign, the Vikings made the playoffs their goal in 2006. With the team becoming more and more popular around Limerick, the Vikings had another strong recruiting class and the team was made up of mostly Irish players, although they were helped by the arrival of four American exchange students – Chris Bassitt, Jeremiah Sexton, Alex Smith and Seamus Hogan.
The 2006 UL Vikings finished the season with a 5–2–1 record, led by their defence, which gave up only 6 points in five home games.
The Vikings made the postseason for the first time in four years. Aided by the return of former players Kieran Coen and Dan Levy, UL defeated the Carrickfergus Knights on the road to make the Shamrock Bowl for the second time in the team's short history. However, a very strong Dublin Rebels team upended the Vikings 44–12 to claim their fourth consecutive Shamrock Bowl victory.
Despite the defeat, the team had managed to turn a corner by making the Shamrock Bowl with a young, almost exclusively Irish team.
2007
The Vikings had their greatest season ever in 2007. Winning every game they played (the sole loss coming by way of a forfeit due to field unavailability against Cork) in dominant fashion – their smallest margin of victory being 16 points.
The Vikings league best defence allowed more than 6 points in a game only once, in a 36–20 road victory over the Cork Admirals, and the offence was equally as dominant, averaging almost 43 points a game and scoring at least four touchdowns in every game, led by an overpowering O-Line and strong running game.
The Vikings entered the playoffs as Shamrock Bowl favourites, but had to get past a 4th-seeded Belfast Bulls team in the semi-finals, eventually winning by a dominating 44–2 scoreline. This led to the first ever all-Munster Shamrock Bowl against the Cork Admirals, which was held at the UL Sports Grounds on 29 July. The Vikings won a close fought match by a margin of 22–14 courtesy of three rushing touchdowns from game MVP Seamus Hogan to claim their first-ever Shamrock Bowl title.
2008
The Vikings finished the 2008 regular season with a 7–1 record, winning their second consecutive Southern Division title. The sole loss came at home at the hands of fellow Shamrock Bowl finalists Dublin Rebels. The Vikings returned most of the starters from the 2007 season, including MVP Seamus Hogan, and added former Chicago Slaughter offensive lineman Jim Davis to their roster.
After a slow start offensively in their first two games, the Vikings decided to move Seamus Hogan back to running back and appointed JP Nerbun as their starting QB. Nerbun went on to lead the league in passing efficiency, throwing 15 touchdowns and no interceptions in four games as starter, while Hogan recorded at least one touchdown in every game of the season, except for the defeat against the Dublin Rebels, where he left the game injured after the first series.
The Vikings finished as the number two seeds, and after easily defeating the Belfast Trojans 42–8 in the semi-final, proceeded to their third consecutive Shamrock Bowl. The bowl took place on 10 August at CIT Stadium in Cork against the number one seeded Dublin Rebels. A rushing touchdown from MVP Adrian Garvey, and an interception return for a touchdown from Darragh 'Plum' O'Callaghan gave the Vikings a 14–3 lead going into half-time, and thanks to a blocked field goal by Glen Carr in the fourth quarter, the Vikings won their second Shamrock Bowl in two years, defeating the Rebels 14–12.
2009
The 2009 season saw the Vikings return the core of their team from 2008, but lost linemen Jim Davis and Kieran Coen to the Valencia Firebats of the Spanish League.
The Vikings once again relied upon power running and a tough, fast defence to make the playoffs for the fourth year in a row, but they once again fell to the Dublin Rebels, this time 12–7 at home.
The Vikings finished as the number two seed for the third year in a row, and met the physical Carrickfergus Knights at home in the semi-finals, where they welcomed back Davis and Coen, who had helped lead Valencia to victory in the Spanish Bowl. Leading 20–0 at half time, the game was abandoned shortly after the break when a Knights player was seriously injured, and the Vikings advanced to their fourth Shamrock Bowl in a row.
The Vikings met the Dublin Rebels in Belfast for Shamrock Bowl XXIII. In a close, physical game, the score was tied at 6–6 after four-quarters, which meant the Shamrock Bowl would go into overtime for the first time in the game's history.
The Rebels won the toss and elected to receive the ball, but two plays into the extra period, Rebels' QB Andy Dennehy was intercepted by Vikings' CB JP Nerbun to set up a game winning 30-yard field goal attempt. UL kicker Daniel Smith converted it successfully and the Vikings claimed their third Shamrock Bowl in three years.
2010
The Vikings continued the success of recent years by reaching the playoffs for the fifth successive year. Helped by the addition of rookies Shane Gleeson at centre and Sean Sheehy at corner back, the team was once again led by a strong running game and a physical defence on their way to a 6–1–1 record. Their only defeat once again came at the hands of perennial championship rivals, the Dublin Rebels.
In June 2010, the Vikings won their first international title, by winning the second EFAF Atlantic Cup, held in Dublin. This win, along with their consistent domestic success, elevated the Vikings into the EFAF Top 20 rankings for the first time in the team's history, debuting at No. 19.
The Vikings success in the Atlantic Cup resulted in them being named the IFAF Team of the Month for June 2010 – the first Irish team ever to win this award.
The Vikings proceeded to their fifth Shamrock Bowl in five years by beating the Carrickfergus Knights 20–0 in their Shamrock Bowl semi-final.
The Vikings failed to make it four Shamrock Bowl victories in a row as they lost in the Shamrock Bowl to the No. 1 seed Dublin Rebels, 15–0.
2011
In 2011, the Vikings claimed their second regular season league title, and first undefeated regular season, going 8–0. Although they were unbeaten on the field in 2007, because of a forfeit given up to Cork, the Vikings finished with a 7–1 record and the Dublin Rebels claimed the league crown. The Vikings came close to the kind of dominance seen in the 2007 season. Their only close regular season game was a 6–3 road victory over the Dublin Rebels. The offence averaged 36.8 points per game, while the defence gave up only 4.3 points per game in the four games they played. The last four games of the season were not contested, as forfeits by UCD, Cork and the Dublin Dragons (twice) gave the Vikings four default 30–0 wins.
In the playoffs, the Vikings defeated the Craigavon Cowboys in the Shamrock Bowl semi-final, and faced the Dublin Rebels at Morton Stadium in Shamrock Bowl XXV on 31 July. Despite leading the game 13–8 at half time through a Marc Ashworth TD run, and a TD catch by Breandán Curtin from Ashworth, the Vikings were defeated by a score of 14–13 thanks to a 4th quarter Sam Hodgins touchdown for the Rebels.
2012
In 2012, the Vikings dominated the regular season, they again went undefeated. The season opener was one the Vikings had looked forward to for 18 months against college team Trinity. The last time they came to Limerick they defeated the Vikings in triple over time and won the College Bowl. With running back James Twomey running through trinity defenders all day the points soon racked up, other scorers included Sean Goldrick and Adrian Garvey. The best play of the game a pick six for Veteran Liam Ryan who ran from 40 yards out he ran behind a wall of Vikings blocking, cutting to the left hand side of the pitch, the trinity quarter back was close to Ryan he turned to tackle the experienced safety but was to be met with the biggest hit of the day when veteran d-lineman/centre Shane Gleeson blocked the QB to allow Ryan to stroll into the endzone . The game finished up 55–8, the touchdown allowed came from the reputable Rob McDowell who has gone on to become the biggest nuisance to any team playing trinity.
After the perfect start to their season the Vikings played the Craigavon Cowboys 3 weeks later. A repeat of last year's semi-final same teams same place, the Vikings were rampant again in their second game scoring 43 unanswered points as the Vikings defence stepped it up in a shutout performance. Scores coming from receivers Twomey, Curtin and Goldrick thrown by QB's Ashworth and Garvey.
Game Three was the long trek from Limerick all the way up to old rivals the Carrickfergus Knights. The Vikings went there to make a statement and that they did defeating the Knights 55–13. The Knights points coming from Gary "Potter" McElkerky a player who has ended up with the ball in the Vikings end zone several times in recent years. Despite the scoreline in the first half the game was a lot closer than you would expect of a game so high in scoring, with just seconds left in the first half the knights went for a field goal if successful would leave the sides at 7–3 for the whistle. The Vikings experience in this department showed by not only blocking the points but Seamus Hogan scooped up the pig skin saw a ray of light and ran the length of the pitch to make the score 15–0 and make even more of an upward struggle for the knights after such a deflating play. The stand out player of this game was by far Craig Switzer, the previous years special teams player of the year put his skills to work with 3 picks all ran back for substantial yards.
Game Four the Vikings play the third ranked college team in the league, U.C.D in Belfield. Belfield holds a bit of history for the Vikings as it was here they defeated the Leylstad commanders to become the first Irish team to win the Atlantic cup. The Vikings rushed to a 21-point lead in the first quarter, however U.C.D impressed by having a great attitude and not letting their heads drop and battled it out and put more points on the Vikings than any other team in the regular season, 16. The U.C.D boys despite a brave stand couldn't handle the Vikings in the end and finished up with a respectable 38–16, which would turn out to be the Vikings narrowest regular season victory.
Game Five old Munster rivals meet in Limerick, The Cork Admirals @ U.L Vikings is always a game Coach O' Sullivan has pencilled in his diary. Despite a dismal season last year for the Cork team they had bounced back this season rejuvenated, recording impressive victories, including a 26–0 win over the Rhino's, second seed in the north. The Vikings went to work on Cork scoring 34 points in the first half, a ten-yard rushing touch down by 2008 and 2009 shamrock bowl M.V.P Adrian Garvey and a spectacular 45-yard touch down pass by the Marc Ashworth / Sean Goldrick unit. The Admirals just could not get the ball moving especially not with the intense pressure coming from the Viking front 4, made up of Alan O' Carroll, Glen Carr, Kieran Coen and this year's d-line addition Ian Cahill who has fitted in comfortably with the three league veterans. Other scores included a 6-yard toss form Ashworth to Curtin and on Craig Switzers first ever offensive play he scored a 75-yard touchdown sweep on his rivals. The second half of the game was a struggle for both teams as it was littered with flags due to the Vikings indiscipline and a defensive stand from the Admirals they were able to control the Vikings and keep them scoreless in the second half, making the second half finish the same as the first 34–0, pushing the Vikings 5–0 record.
Game Six as always the regular season game of all games. Possibly the toughest and deepest rivalry in the league, ever certainly of the last decade sporting 16 shamrock bowl appearances between them in the past ten years, with 5 appearances against each other at the big stage, the Rebels currently winning the ShamrockBowl shootout 3–2, they took the lead in last year's final when they narrowly defeated the Vikings to become champions taking the lead by one point in the fourth quarter thanks to a touchdown by Sam Hodgins... very similar in every sense to the Vikings dramatic 1 point victory over Leylstad thanks to a fourth-quarter touchdown by Adrian Garvey in 2010. While this game was no bowl it still had significant meaning. Both teams at this stage were undefeated at 5–0 and the winner was sure to go on and top their division to secure a home semi-final, the loser would be almost guaranteed to have to take the hard route to the semi's being forced to play another game and then face an away semi-final against most likely the Belfast Trojans (who also managed to go undefeated in the reg season in the northern division).
The first quarter went by 0–0 what looked to become another defensive battle that these two teams have taken part in so many times during their long 10-year war, this soon changed as James Twomey ran for 60 yards for a fantastic rushing touchdown; however, it was called back over a flag, deja vu of last year's regular season game where Twomey was called back on a 70-yard rushing TD against the same opponents. The man to break the deadlock was the new Vikings special teams captain Sean Goldrick (last year's rookie of the year) after he broke tackles and sprinted 45 yards for a TD after Garvey connected with him. The Rebels got the ball back and wanted to level the scores before the half driving down the Vikings pitch bending the Viking d to their limit until the usual dominating Rebels veteran quarterback Dennehy threw a pass that was intercepted by a player who has also been dominating the IAFL for years and years, Vikings captain Liam Ryan, who over the years has developed the skills to become a take balls out of the air that he has no right to. This stopped the Rebels drive and looked all set for the Vikes to go into the half with an 8–0 lead, with 3 seconds left on the clock of the first half, Marc Ashworth pitched the ball to Adrian Garvey, who ran 61 yards. Garvey had excellent blocking but still had a lot to do, running straight through two Rebels defenders.
The Vikings very aware that their 2-touchdown halftime lead was the same lead they had at half time in the bowl last year and were not prepared to throw this one away.
New addition Dayton Mcpherson and Veteran Brendan McCarthy put in some monster hits in the second half and were often seen in the backfield being a constant problem for the Rebels, all with the help of that destructive d line that were getting pressure on Dennehy all day long. It is no surprise that the Rebels had trouble on offence when the Limerick defence put in their best performance in recent history. The unsung heroes as usual were the Vikings offensive line creating gaps for the Vikings allowing them to keep the chains moving, Paul Keane also helped to keep the chains moving with a few crucial first downs. The sheer power and strength of Adrian Garvey proved to much for the rebels defence again in the second half as Garvey ran in two more touchdowns both from within the Rebels' redzone.
Game 7 The Vikings travelled to Dublin to face the Dragons, and win 61–0.
Game 8 The Vikings faced newcomers to the league Tullamore Phoenix, winning and securing top seed in the IAFL.
2013
In 2013, the Vikings entered a rebuilding year. After the heartbreak of previous seasons many veteran players retired from football leaving the Vikings with the task of re-inventing themselves. They competed in the newly formed SBC South and finished with a 6–2 record. For the second time in 3 years the Vikings season was hampered by forfeits and teams no fulfilling fixtures. As DCU left the league before the season the south was left with 4 teams. Then things got worse the Cork Admirals folded after just one game leaving the south with 3 teams and none of those teams getting the normal 8 games. The Vikings lost 2 of 3 fixtures with Trinity meaning they would qualify as the second seed in the south. The highlight of the regular season being a 13–12 victory over Trinity in Limerick.
The Vikings found themselves in unknown territory in the wild card spot and were nearly caught napping by a gutsy UCD team in their first ever playoff game. The Vikings turned to the ever reliable Adrian Garvey to score a last minute Touchdown which separated the teams. As with the whole season the Vikings struggled to find an identity on offence but their Defence was playing at an extremely high standard keeping their hopes of a trip to the Shamrock bowl alive. After this tough encounter the Vikings would face the Defending champion Belfast Trojans who themselves were undefeated in Football, domestic and European, in 2 years.
This game was part of a double header at the Garda RFC Westmanstown. The Vikings entering the game as huge underdogs for the first time in many years. Making matters worse the Vikings lost starting QB Marc Ashworth and Starting RB Ryan Meches to unforeseen circumstances leaving them with a 22-man squad facing the Champions. The game started positively for the Vikings on offence gathering some first downs and field position. The Defence which was the story of the day matched the champions in every aspect and looked a better outfit than the one that lost to Belfast in the Shamrock bowl the year before. As the first half came to a close the score was a measly 0–0 with both teams showing why they have been dominant in Irish football in recent years. The Vikings cam out in the second half hoping to get some movement on offence with their Defence continuing to be Dominant and impressive. The Vikings turned to players like ever present Kieran Coen to play both sides of the ball and he was the best player on the field on the day. With many other players such as Ian Cahill, Craig Switzer, Michael Guinane, Kieran Coen, Adrian Garvey and Sean Goldrick playing Offence, Defence and Special teams the game started to wear on the Vikings. 0–0 entering the 4th quarter in unprecedented 28-degree heat there was an air of inevitability about the game with the Vikings continually running 3 and outs on offence something had to give. With less than 10 minutes left and the Trojans creeping into Viking territory there was a sense that a big play needed to be made on Defence if they were going to have a shot of knocking off the Trojans. That chance came with a well read pass from the Trojans QB by Craig Switzer. The ball in his hands with 60 yards of clear field in front of the speedster nickel star of the Vikings and he took his eye off the ball and it fell on the turf. The crowd, the team and everyone else knew that was the chance and sure enough 3 plays later the Trojans constant Barrage finally broke the Vikings Defensive wall and ran in for a 20-yard score with 7 minutes left. The Trojans stopped the Vikings offence after some gutsy first downs by QB Paul Keane, RB/DL Ian Cahill and WR Sean Goldrick. The Trojans played the clock down to minutes left and with the game getting away from them the Vikings Defence gave up another score leaving it 14–0 final score.
The Vikings came into the game with great confidence internally but none by the wider league. They showed what it meant to be Vikings on that day player all phases and pushing the Undefeated Champions, who won the Bowl by a huge margin against the Dublin Rebels, to their limits. It was not enough and in the end a 22-man squad could not last against the huge numbers and freshness of the Belfast Trojans team. Many players felt it was one of the gutsiest Vikings performances in recent years but just not good enough. Excellent young players like Sean Goldrick, Ian Cahill, Paul Keane, Shane Gleeson and Eoin Whelan matured on the field and bode well for the Future of the team. Overall, the Vikings learned the hard way that you can't win if you don't score no matter how good your Defence is as was the story of their entire season and many seasons past. The future is bright for this new generation of Vikings and keep a close eye on 2014 which is sure to be a huge one for this team.
2014
The 2014 Season began early for the Vikings with an intervarsity championship planned for 17 November. New Head Coach Paul Gilhool and Defensive Coordinator Glen Carr worked to get their student players ready for the upcoming games. The Vikings would face UCD in a semi-final at 11.30 am with the winner then playing Trinity at 2.30 pm on the same day. The Vikings were unfortunate to lose the very talented upcoming player Dylan Quigley to injury just 10 days before the game with Team/Defensive Captain Ian Cahill picking up a significant injury on the same night. The Vikings with a largely Rookie squad and new players in almost every position played well against UCD winning 13–0 in a game Dominated by the Vikings defence, you can change the people but not the team. Some outstanding play by Eoin Whelan, Kevin Flaherty, Ray Burke, Brian Kelly and newly acquired hard hitting Spanish safety Alvaro "nobody suspects the Spanish inquisition" Martinez among others led the Defence and some tough running by the Vikings new RB Shane Gleeson and crafty new QB Alexandre Indjeyan. The Vikings then had only time to change their shirts before a showdown with Trinity for the championship.
The Vikings boosted by return of Captain Ian Cahill for the final felt it was time for them to win their first silverware since 2010. However, the Trinity team who had scouted the previous game and had fresh legs started quick and were 2 scores up within the first quarter. The Vikings rattled responded positively with some outstanding Defensive play from the entire squad Ian Cahill, Donogh Flannery, Pat Noonan, Brian Kelly, Rob Crimin, Lorcan Crean, Ray Burke, Craig Switzer, Kevin Flaherty, Bono and Alvaro. However, despite several turnovers the Vikings offence struggled and the 2 games started to take their toll on an impressive offensive line. The Vikings played out the game and ultimately the scores remained 14–0. The Vikings battled valiantly with their most impressive rookie class in memory which surely bode well for the coming season. Impressive displays by the entire team and toughness shown by the offence through their struggles showed positive signs for the Vikings going forward. The Vikings then regrouped and disbanded before pre-season training began again in mid-January. With some hard work on offence and continued effort on Defence the Vikings team looks like it's ready for big things n 2014.
Season By Season records
Note: W = Wins, L = Losses, T = Ties
UL Vikings Individual Awards
UL Clubs & Societies 'Club Individual of the Year'
UL Vikings 'Viking of the Year'
UL Vikings 'MVP'
UL Vikings 'Offensive Player of the Year'
UL Vikings 'Defensive Player of the Year'
UL Vikings 'Special Teams Player of the Year'
UL Vikings 'Rookie of the Year'
UL Vikings 'Most Improved Player'
UL Vikings 'Lineman of the Year'
References
External links
American football teams in the Republic of Ireland
Vik
University and college sports clubs in Ireland
1999 establishments in Ireland
American football teams established in 1999
Viking Age in popular culture
|
18833740
|
https://en.wikipedia.org/wiki/2008%20California%20Golden%20Bears%20football%20team
|
2008 California Golden Bears football team
|
The 2008 California Golden Bears football team represented the University of California, Berkeley in the 2008 NCAA Division I FBS football season. They played their home games at California Memorial Stadium in Berkeley, California and are coached by Jeff Tedford.
The Bear's 2008 campaign was marked with diminished expectations, as all of California's offensive stars at their skill positions (DeSean Jackson, Lavelle Hawkins, Robert Jordan, Justin Forsett and Craig Stevens) graduated or declared for the NFL Draft. Thus the Bears started the season unranked for the first time since 2003. Their 2008 season would confirm this ranking, as they would finish the season undefeated at home but would only win one game on the road. The Bears won their opening game at home against Michigan State 38–31 and eviscerated Washington State in Pullman 66–3, but fell to Maryland 35–27 in College Park. The Bears won two straight home games against Colorado State and Arizona State but fell in the desert to Arizona. Although the Bears still controlled their destiny in the Pac-10 after two more home wins against UCLA and Oregon, two close losses to Pac-10 champion contenders USC and Oregon State on the road put an end to those hopes. Cal reclaimed the Axe by beating Stanford 37–16 in the 111th Big Game and kept Washington's season winless with a 48–7 victory.
Cal finished the regular season 8–4 as Tedford claimed his seventh consecutive winning season for the Golden Bears and third unbeaten home record in five years. The team improved on its 2007 season record of 7–6 to 9–4 and spent most of the season unranked, breaking into the AP Top 25 three times only to get knocked out each time following a loss. The Bears accepted an invitation to take on the Miami Hurricanes at the 2008 Emerald Bowl, which they won 24–17.
Preseason
The aftermath of Cal's tumble from potentially being ranked in 2007 led Tedford to declare open competition on all positions. This included at quarterback, where Tedford had come under extreme criticism from the media and Golden Bears fans alike for his decision-making the previous year. Both Nate Longshore and Kevin Riley appeared to be at a standstill through fall practice. But in a surprise move, the younger and less experienced Riley was named the starter for the season opener. However, Tedford indicated that the quarterback competition was not over, and that Longshore would also see action against Michigan State (he would appear in the second quarter).
Cal's offseason also was noted by the Kevin Hart controversy, where the small town offensive linemen would claim he had been recruited by the Golden Bears, although the athletic department claimed never to be involved with him. Hart would later admit he made the whole thing up.
Schedule
Game summaries
Michigan State
The Bears had last played the Spartans in Michigan in 2002, defeating them 46–22 in Tedford's first year as head coach. The two teams had only played each other three times in all before their 2008 meeting, with the Spartans winning the other two contests.
Both teams were scoreless until a blocked Spartans punt resulted in a Bears touchdown in the first quarter. Cal scored again on a field goal by freshman kicker David Seawright in the second quarter. Michigan State responded when Otis Wiley intercepted a Nate Longshore pass and returned it for a touchdown, while Cal was able to counter with a touchdown run by Jahvid Best prior to the end of the first half.
The second half saw both teams score back and forth. The Spartans struck first with a touchdown run by Javon Ringer, followed by Cal QB Kevin Riley connecting with Cameron Morrah for a touchdown. Ringer made his second touchdown run of the game in the fourth quarter, while Riley made his second touchdown pass of the game to Will Ta'ufo'ou. After a Spartans field goal, freshman running back Shane Vereen scored on an 81-yard touchdown run that gave the Bears their final score of the game. The Spartans countered with a touchdown pass from Brian Hoyer to Mark Dell to get within 7 points and had a chance to tie the game with seconds left, but Hoyer threw four straight incompletions from midfield.
Longshore, who lost the starting quarterback job to Riley, threw for 62 yards with 2 interceptions. Riley threw for 202 yards with 2 touchdowns. The game marked the first time that two Cal running backs had completed over 100 yards rushing since the 2006 Holiday Bowl, with Best at 111 yards and Vereen at 101, respectively. Spartans quarterback Hoyer finished with 321 yards passing, including a touchdown and an interception. Ringer, who completed 1,447 yards rushing during the 2007 season, was held to 81 yards, which included 2 touchdowns.
Washington State
The Cougars hosted the Bears in Pullman, Washington for the first conference game of the season for both teams as well as first year Cougars head coach Paul Wulff. Cal scored early, with Jahvid Best breaking free for an 80-yard touchdown run on the Bears' first possession. This was followed by an interception by Syd'Quan Thompson deep in Washington State territory, setting up a touchdown pass from Kevin Riley to Sean Young. Shane Vereen made a 39-yard touchdown run on the next possession for the Bears' third touchdown of the first quarter. A Cougar field goal would prove to be their only score for the game.
The Cougars had another chance at scoring in the second quarter, but had a field goal blocked that linebacker Zack Follett was able to return for a 65-yard touchdown. Riley was able to run in for a touchdown from 27 yards out, while Thompson made an 89-yard interception that set up another Best touchdown.
After the half, Nate Longshore led the Bears in the third quarter. The Cougars were intercepted in the Cal red zone, setting up an 86-yard touchdown run by Best. This marked the first time that Cal had two runs of more than 80 yards in a single game, as well as in a single season.
Cal used its commanding lead in the fourth quarter to give more of its backup players some experience. Following a touchdown by sophomore running back Tracy Slocum, freshman quarterback Brock Mansion was able to take his first career snap. An interception of a Cougars pass in WSU territory gave Mansion the opportunity to make his first rushing touchdown for the final score of the game.
Cal produced 505 total yards of offense (114 passing and 391 rushing) and allowed only 167 total yards (110 passing and 57 rushing) to the Cougars, who committed four turnovers. The game marked the first time since 1921 and 1923 that the Bears had won back to back games at Pullman. It was the Cougars' worst loss since a 1976 loss to UCLA 62–3 and the first time that WSU opened the season with two losses since 1999. Best had exactly 200 yards rushing on 14 carries for three touchdowns, the most by a Cal player since Justin Forsett had 235 against New Mexico State in 2005. He also became the first player since J.J. Arrington to start the season with consecutive 100-yard rushing games. The win enabled the Bears to get back into the AP Top 25 at #23.
Maryland
Cal headed east for its second road game in a row in the first ever meeting between the Bears and the Terrapins with a noon kickoff. The Terrapins jumped out to an early lead and never relinquished it, with Da’Rel Scott scoring a rushing touchdown on their first possession. Kevin Riley was intercepted on the ensuing Cal possession, setting up another touchdown run by Scott. Terrapins quarterback Chris Turner threw a touchdown pass to open the second quarter. The Bears were limited to a pair of field goals in the first half, with a possible third one from 25 yards out bouncing off the left upright in the closing seconds of the second quarter. Maryland had only scored 21 points combined in their first two games.
In the third quarter, Cal recovered a Maryland fumble, but failed to score and turned the ball over on downs. Maryland extended its lead to 28–6 on a 28-yard touchdown strike from Turner to Darrius Heyward-Bey. Riley was sacked three times. Cal was shut out of the end zone until the fourth quarter, when Riley connected with Cameron Morrah. The Terrapins recovered the ensuing onside kick and was able to respond with a touchdown for their final score of the game. Riley threw two more touchdown passes to bring the Bears within 8 points, but Maryland recovered the ensuing onside kicks and Turner was able to end the game by taking three straight knees.
Jahvid Best, coming from back to back games with over 100 yards rushing, was held to 25 on ten carries, with the Bears producing only 38 net rushing yards. Riley passed for 423 yards on 58 attempts, a school record for the most pass attempts. Terrapins quarterback Turner passed for 156 yards and two touchdowns, while running backs Scott and Davin Meggett rushed for 87 and two touchdowns, and 82 yards and a touchdown, respectively. The Bears also gave up five sacks, the most since October 1, 2005 against Arizona. Humidity was cited as the biggest adjustment that Cal failed to make more so than the time change and Maryland's performance in its first two games. The loss brings the Bears' record to 3–7 in its last ten trips to the East Coast and also snapped a ten-game winning streak in the month of September.
Colorado State
Although Cal struggled on pass offense and Cal's two running backs both committed a fumble early on, the defense and special teams put Cal on the board early in the first half. A Rams punt was blocked and Bryant Nnabuife ran it in for a touchdown, his second of the season. In the same quarter Cal's Brett Johnson intercepted Colorado State's Billy Farris' pass for a 43-yard touchdown.
In the second quarter Riley threw an 11-yard pass to Nyan Boateng for the score after a pass interference call on Colorado State gave Cal a first down. The defense was able to shut out Colorado State for another quarter.
In the third quarter Riley was replaced with Nate Longshore who was unable to produce any offense although running backs Jahvid Best and Shane Vereen were consistently gaining first downs. However Cal's special teams struck again as Syd'Quan Thompson ran a punt return for a touchdown.
In the fourth quarter, Cal's offense finally clicked when Longshore hit Jeremy Ross for an 11-yard touchdown and Cameron Morrah for another 16-yard touchdown. The Rams avoided being shut out with a 1-yard touchdown run by John Mosure that followed a long pass by backup quarterback Klay Kubiak. The final score was 42–7.
In addition to the struggles on offense, Cal's Jahvid Best walked off the field after dislocating his elbow following a tackle. X-rays showed that there were no fractures and an MRI revealed no ligament damage. Cal's Rulon Davis left after half-time with an undisclosed foot injury.
Arizona State
The Bears resumed conference play at home against the Sun Devils following a week off. Nate Longshore started for the Bears after Jeff Tedford had him and Kevin Riley compete for the starting position during the week. Cal took an early lead with a field goal in the first quarter followed by a touchdown pass from Longshore to LaReylle Cunningham that resulted from a fumble on the Sun Devils' first possession. Longshore threw an interception in the closing minutes of the first quarter, but the Sun Devils were unable to capitalize on it. The Bears struck again in the second quarter with a 22-yard touchdown pass to Cameron Morrah, to which the Sun Devils responded to with a 30-yard touchdown pass from Rudy Carpenter to Kyle Williams.
Cal scored first in the second half, when Longshore connected with Nyan Boateng for a touchdown. Cal was able to block a field goal attempt by Arizona State, but was penalized for jumping on the line, resulting in a first down. This set up the Sun Devils' final score of the game on an 8-yard run by Keegan Herring. The Bears defense was able to shut out the Sun Devils in the fourth quarter, intercepting Carpenter for a second time and forcing a fumble that forced them to punt. A Sun Devils field goal attempt in the final minute of the quarter missed. Cal only made one first down in the fourth quarter and spent the rest of the time successfully running out the clock.
Longshore finished with 198 yards, including three touchdowns and an interception, moving him up to fifth place on the Cal career touchdown list with 46. Running back Shane Vereen, stepping in for an injured Jahvid Best, had 93 yards rushing. Tight end Cameron Morrah caught his fourth touchdown pass of the season, the most by a tight end since Garrett Cross in 2004. Carpenter finished with 165 yards passing, including one touchdown pass and two picks. He injured his ankle in the final minutes and had to leave the game on crutches. The loss marks the Sun Devils' first three-game losing streak since Dennis Erickson's tenure as head coach. The victory allowed the Bears to break into the Coaches' Poll at #22 and AP Poll at #25 following a bye week.
Arizona
The Bears put their new #25 ranking on the line against the Wildcats on the road, where they had lost in 2006, with Longshore getting his second start in a row for the season. Cal capitalized on a fumble by Arizona running back Nic Grigsby which set up a short pass from Longshore to Verran Tucker. The Wildcats responded in the second quarter with two touchdown runs in a row by freshman running back Keola Antolin of 20- and 11-yards, respectively. The Bears tied it up with a 67-yard by Jahvid Best, who played his first game since dislocating his left shoulder three weeks prior against Colorado State. Cal went ahead with an 18-yard touchdown reception by Cameron Morrah and a field goal to take a 24–14 lead at the half.
The Wildcats came storming back in the third quarter, starting with a 56-yard touchdown pass from Willie Tuitama to Mike Thomas. Antolin rushed for a touchdown for his third of the night, while Longshore was intercepted by Devin Ross less than a minute later for a 21-yard touchdown. Tuitama then hit Rob Gronkowski for a 35-yard touchdown and the final score of the game. By comparison, the Bears were only able to score on a lone field goal. Kevin Riley stepped in for Longshore during the fourth quarter but was unable to lead the Bears to a comeback, and both teams failed to score.
Best finished with 107 yards rushing, while Antolin ran for 149 yards, marking the first time that Cal had allowed a rusher to go for over 100 in the season. Longshore threw for 218 yards, including two touchdowns and one pick, while Riley threw for 97 yards and one interception. Tuitama threw for 225 yards, including two touchdowns and one interception, and was sacked four times. Wildcats receiver Mike Thomas had 104 receiving yards. The game marked the first time the Bears had allowed more than 40 points since UCLA had scored 47 at home on October 8, 2005.
UCLA
The Bruins led the series, 49–28–1, on the Golden Bears. Kevin Riley started for the Bears, his first since nearly a month before against Colorado State on September 27. The Bruins took their only lead of the game at the beginning of the second quarter by managing to block a punt attempt by Bryan Anger and recovering the ball in the end zone to go up 7–3. On the ensuing possession Jahvid Best was able to break free for 34-yard run, the only offensive touchdown in the first half for the Bears. Marcus Ezeff then intercepted a pass by Bruins quarterback Kevin Craft which he was able to return for a 69-yard touchdown. Both teams then traded field goals into the fourth quarter. After getting a stop on a fake Bruins punt attempt, which nearly converted a 4th and 23 with a 22-yard pass, Riley hit Nyan Boateng for a 53-yard touchdown. Michael Mohamed then intercepted a Craft pass for a 19-yard score. Riley threw his second touchdown pass of the game on a ten-yard strike to Cameron Morrah. UCLA got in the final score of the game when backup quarterback Chris Forcier threw a nine-yard pass to Dominique Johnson, which was set up by a kickoff return by wide receiver Terrence Austin for 81 yards.
The victory continued Cal's win streak against UCLA at Memorial Stadium, having not lost to the Bruins at home since 1998. The Bears held the Bruins to 16 yards rushing, while Jahvid Best ran for 115 and Shane Vereen had 99. Riley passed for 153 yards and two touchdowns, although he was sacked three times. For the Bruins, Craft passed for 206 yards and was picked off four times, two coming off tipped balls.
Oregon
The Bears hosted the Ducks on a rainy day at Memorial Stadium with Riley as the starter. Oregon capitalized on an interception at midfield on Cal's first possession with a 17-yard run by quarterback Jeremiah Masoli with the PAT missing. The Bears responded quickly with a 22-yard pass from Riley to Jeremy Ross on the ensuing possession. Jahvid Best was able to break free for a 50-yard run from the Cal 20-yard line, but fumbled the ball in Ducks territory. The Bears held the Ducks and got a safety when Oregon snapped the ball high and into the end zone on a punt attempt. Cal took advantage of the free kick to advance down the field, during which Riley sustained a concussion when he failed to slide while attempting to gain a first down and was sandwiched between three defenders. He did not return to the game and Nate Longshore stepped into the game.
Best had his second fumble of the game in the second quarter, but Sean Cattouse then intercepted Masoli to negate it. The Bears fumbled again on a rushing attempt by Shane Vereen but the Ducks were stopped cold on a fourth down conversion attempt in Cal territory. The only score of the quarter was set up by a 50-yard interception return by Worrell Williams, capped off by a 2-yard pass from Longshore to Nyan Boateng.
Both teams traded field goals in third quarter until the Ducks blitzed down the field from their own 45-yard line and scored with three plays in 33 seconds on a 17-yard run by running back Jeremiah Johnson for their final score of the game. In the fourth quarter, Ducks cornerback Jairus Bryd fumbled a punt which was recovered by the Bears, allowing Vereen to score on a 2-yard run to put the game away.
Ducks running back Jeremiah Johnson went over the century mark with a 117 yards rushing, including a touchdown, the second rusher to do so against the Bears. Quarterback Jeremiah Masoli himself had 97 rushing yards, more than double his 44 passing yards, including a touchdown run. Longshore finished with a 136 passing yards including one touchdown, while Best had 93 rushing yards. Verran Tucker was the Bears' leading receiver with 83 yards. The Bears' five turnovers were the most since a November 12, 2005 matchup against USC, while Longshore moved up to fourth place in career passing touchdowns with 49 total. The upset victory allowed the Bears to break into the BCS rankings at #21. The Bears also got into the AP Top 25 at #21, their highest ranking thus far for the season and the third time they had done so after two road losses at Maryland and Arizona, both unranked at the time.
USC
The Bears headed south to face USC at home, putting their highest ranking of the year to date on the line against the #7 Trojans. Longshore got the start for the Bears and played for the first half, throwing two interceptions that were negated by penalties against the USC defense. The Bears held the Trojans to a field goal in the first quarter before marching down the field to respond with one of their own in the second, their only score of the game. Trojans quarterback Mark Sanchez, on the ensuing possession, then led USC on a 70-yard drive capped off by a 19-yard touchdown pass to Patrick Turner. Although the pass appeared on replays to have touched the ground, it was not overturned. The Trojans led the Bears 10–3 at the end of the half.
Kevin Riley stepped in at quarterback in an attempt to bring the Bears back in the second half. He hit Shane Vereen in the end zone on the Bears' first possession of the third quarter on a 27-yard strike, but the play was negated because of an illegal receiver downfield penalty; he was then intercepted on a tipped pass. Both defenses were then able to keep each side from scoring into the fourth quarter. The Trojans were then able to sustain a drive downfield that ended with a 6-yard pass from Sanchez to Ronald Johnson to put the game away.
The Trojan defense held the Bears to 165 net yards, while its offense produced more than double with 411. Sanchez threw for 238 yards, including two touchdowns, while Longshore went for 79 and Riley threw for 59. The Trojans also outrushed the Bears, putting up 173 and holding the latter to only 27. Jahvid Best was held to only 30 rushing yards on 13 carries. The Trojans won their sixth straight game of the year and their fifth straight game against the Bears.
Oregon State
The Bears traveled north to Corvallis, Oregon for their final road game of the season against the #23 Beavers, who had not yet lost a home game. Jahvid Best took the ensuing kickoff 51 yards to help set up a 5-yard pass from starter Kevin Riley. The Beavers immediately responded when James Rodgers returned the ensuing kickoff 86 yards for a touchdown, the first kickoff return for a score in the Pac-10. Oregon State extended its lead by taking advantage of a 56-yard punt return by Sammie Stroughter to set up a 2-yard run by freshman running back Jacquizz Rodgers and would not relinquish it. Cal scored in the second quarter on a trick play when Riley threw a lateral to Jeremy Ross, who then threw a 30-yard forward pass to Nyan Boateng to make it 17–14 Oregon State at the half.
The Beavers extended their lead in the third quarter with a field goal and 18-yard touchdown run by James Rodgers. Best was able to break free for a 65-yard touchdown run to keep the Bears within a score at 27–21. The Bears had a chance in the final minute of the fourth quarter to make a comeback, but were pinned at their own 6-yard line on a punt and were set back at the 3-yard line by a penalty. Riley was then intercepted by Keenan Lewis for a 25-yard touchdown to seal the victory for the Beavers.
Beavers quarterback Lyle Moevao threw for 145 yards, including one interception and a sack, while Jacquizz Rodgers rushed for 144 yards with one touchdown. Riley threw for 117 yards, was sacked five times, and was picked off once. Best ran for 116 yards, with one touchdown. The Bears would finish the season 1–4 on the road, their sole win coming against Washington State.
Stanford
Cal hosted Stanford for the 111th Big Game. The Cardinal had won the Axe back the previous year, snapping a five-game losing streak, and came in looking to get their sixth win to become bowl-eligible for the first time since 2001.
The Bears were able to score a field goal on their first possession, set up by a 60-yard run by Jahvid Best. A Cardinal attempt to tie the game with a field goal missed. Cal started a drive late in the first quarter that was halted early in the second when Bo McNally intercepted Kevin Riley on the Stanford 24-yard line. The Cardinal in turn were able to march downfield and were stopped when Cal forced running back Toby Gerhart to fumble and recovered at the Cal 11-yard line. Riley then threw his first touchdown pass of the day, a 59-yard strike to Shane Vereen. Stanford was unable to get into the end zone in the closing seconds of the third quarter with Cal halting Gerhart at the one-yard line and had to settle for a field goal to make the score 10–3 at the half.
The Bears exploded in the third quarter with three touchdowns in just over four minutes. First, The Bears intercepted Tavita Pritchard on the Stanford 40-yard line, setting up a touchdown pass from Riley to Cameron Morrah. They scored again on their next possession on a pass from Riley to Sean Young who then lateraled to Best for a 14-yard score. Best then ran in from a score on Cal's next possession, which was set up by a 42-yard run. The Bears shut down the Cardinal offense, sacking Pritchard three times in addition to intercepting him once. In the fourth quarter, Cal's final score came on a 45-yard run by Best. The Cardinal put up their first points since the first quarter on a 34-yard pass from Pritchard to Doug Baldwin. They successfully recovered an onside kick to score again on a 10-yard run by Gerhart. Pritchard was intercepted on Stanford's next possession on the Cal 27-yard line and then again in the final minutes of the quarter to seal the victory for Cal, with the crowd rushing the field in celebration.
The loss prevented Stanford from becoming bowl-eligible since 2001, Tyrone Willingham's final year as head coach. Pritchard outpassed Riley, throwing for 306 yards and a touchdown, while Gerhart ran for 103. Riley threw for 101 yards, including three scores, while Best ran for a career-high 201 yards and scored three times, becoming the seventh consecutive 1,000-yard rusher under Tedford.
Washington
The Bears played their final regular season game at home against the winless Huskies in Tyrone Willingham's final game as Washington head coach.
Cal scored on its first possession when Jahvid Best was able to break free for a 60-yard touchdown run. On the following possession the Bears were able to march downfield but missed a 30-yard field goal attempt. However Cal linebacker Zack Follett was able to sack Huskies quarterback Taylor Bean and force a fumble, which the Bears recovered, setting up a field goal from 23 yards.
Following an interception by the Golden Bears, Nate Longshore stepped in for Kevin Riley in the second quarter for his final regular season game at Cal; Best scored with a two-yard touchdown run, followed a 20-yard run. Longshore threw a 6-yard touchdown pass to Cameron Morrah with nine seconds left in the quarter to make the score at halftime 31–0. The Bear defense caused three Husky turnovers in the quarter.
In the third quarter, Best rushed for his final touchdown of the game on an 84-yard run. Shane Vereen stepped in at running back to relieve Best, who had rushed for a school record of 311 yards, surpassing a 54-year-old record held by Jerry Drew for 283 yards. Vereen was then able to score on a two-yard run. The Huskies got in their sole score of the game on a drive that consumed more than six minutes and culminated in a two-yard run by Bean. Cal then put in its backup players to finish the game, managing to prevent the Huskies from scoring in the fourth quarter.
Best's record-setting 311-yard rushing game was the fourth best performance in the FBS for the 2008 season and the fifth 300-yard rushing game in Pac-10 history. He finished the regular season with 1,394 yards rushing as the Pac-10 rushing leader, surpassing Oregon State's Jacquizz Rodgers who did not play the previous week in the Civil War against Oregon on November 29 due to injury. Longshore' 50th touchdown pass moved him up to fourth overall in touchdown passes for the Golden Bears. The Bears ended the regular season with 23 interceptions, the most since 1953.
The Bears' victory made their record at home perfect at 7–0 and made the Huskies the first 0–12 team in Pac-10 conference history and the only team in the country to finish the 2008 season without a victory. Washington's last win had been against Cal in Seattle in 2007. The Bears had 549 total net yards as opposed to the Huskies' 200, and outrushed them 431 to 104, with net passing yards closer at 118 to 96, respectively.
Emerald Bowl
The Bears faced the Miami Hurricanes on December 27 in the Emerald Bowl at AT&T Park in San Francisco, California (just across the bay from Berkeley), marking the first appearance by either team in this bowl series. Longshore got the start over Riley for his final collegiate game. On the opposite side, Miami started freshman backup quarterback Jacory Harris after starter Robert Marve was suspended for academic reasons.
The Bears jumped out to an early 14–0 lead on two touchdown runs by Jahvid Best in the first quarter. However, the Hurricanes were able to score successive touchdowns on passes from Harris in the second and third quarters, while the Miami defense shut out the Cal offense in the second quarter and limited Cal's scoring in the third to a field goal. With the score tied at 17 apiece, late in the fourth quarter linebacker Zack Follett was able to force a fumble on Harris, which the Bears recovered. Longshore was able to connect with freshman tight end Anthony Miller for his 51st career touchdown pass and the go ahead score. Best earned Offensive MVP honors, while Follett was named the Defensive MVP.
Aftermath
Cameron Morrah decided to forgo his senior season and declared for the NFL draft. He was invited to the NFL Combine alongside Rulon Davis, Anthony Felder, Zack Follett, Alex Mack, and Worrell Williams.
Following the departure of offensive coordinator Frank Cignetti for Pittsburgh, he was replaced by Andy Ludwig, who helped guide the Utah Utes to a perfect 13–0 season as offensive coordinator. Ludwig had previously worked alongside Cal head coach Jeff Tedford at Oregon and Fresno State, becoming the fifth offensive coordinator at Cal in five years.
Players
Depth chart
These were the primary starters and backups through the 2008 season.
Mitchell Schwartz started all 13 games and was named a second-team Freshman All-American by College Football News, received the Bob Tessier Award as Cal's Most Improved Offensive Lineman, and received honorable mention Pac-10 All-Academic honors.
Roster
References
California
California Golden Bears football seasons
Redbox Bowl champion seasons
California Golden Bears football
|
4414948
|
https://en.wikipedia.org/wiki/YouOS
|
YouOS
|
YouOS was a web desktop and web integrated development environment, developed by Webshaka until June 2008.
From 2006 to 2008 YouOS replicated the desktop environment of a modern operating system on a webpage, using JavaScript to communicate with the remote server. This allowed users to save their current desktop state to return to later, much like the hibernation feature in many true operating systems, and for multiple users to collaborate using a single environment. YouOS featured built-in sharing of music, documents and other files. The software was in alpha stage, and was referred to as a "web operating system" by WebShaka.
An application programming interface and an IDE (integrated development environment) were in development.
Over 700 applications were created using this API.
In 2006, YouOS was listed on the 7th position of PC World's list of "The 20 Most Innovative Products of the Year".
YouOS was shut down on July 30, 2008 because the developers had not actively developed it since November 2006. They have since moved on to other projects.
The domain youos.com domain name was acquired by a German startup company, Dynacrowd, in May 2015. The project name YouOS now represents a mobile platform for hyperlocal interaction used to operate the German refugee assistance system AngelaApp.
Parent Company
Webshaka was a messaging company most notable for making YouOS. It was founded by Samuel Hsiung, Jeff Mullen, Srini Panguluri and Joseph Wong.
References
External links
YouOS web site
Web desktops
|
2003256
|
https://en.wikipedia.org/wiki/King%20Abdulaziz%20City%20for%20Science%20and%20Technology
|
King Abdulaziz City for Science and Technology
|
King Abdulaziz City for Science and Technology (KACST; ) in Riyadh, Saudi Arabia is an organization established in 1977 as the Saudi Arabian National Center for Science & Technology (SANCST); in 1985, it was renamed King Abdulaziz City for Science and Technology.
History
In 1977, the Saudi Arabian National Center for Science and Technology (SANCST) was established, with Prof. Rida M.S. Obaid being the president. This center was created as an independent scientific organization that is responsible for the promotion of science and technology in Saudi Arabia. However, the name was later changed to King Abdulaziz City for Science and Technology (KACST). In 1987, KACST has joined the International Council for Science (ICSU) as a National Member.
In 1984, Abdul Rahman Al-Athel was named as the President of the city. In 2007, Mohammed Ibrahim Al-Suwaiyel, who used to be the KACST vice president for research, became the president. HH Dr. Turki Al Saud is the KACST vice president.
Organization
Institutes
The research complex is divided into the following research institutes:
Atomic Energy Research Institute
Computer and Electronics Research Institute
Petroleum and Petrochemical Institute
Energy Research Institute
Resource and Development Institute
Astronomy and Geophysics Institute
Space Research Institute
Centers
KACST has many different research centers, including:
GIS Innovation Center
National Center for Nano Technology Research
The National Robotics and Intelligent Systems Center
The National Center for Water Research
The National Center of Mathematics & Physics
Technology Development Center
The National Center for Astronomy
The National Center for Biotechnology
The National Center for Agricultural Technologies
The National Centre Environmental Technology
The National Center for Radiation Protection
The National Center for Radioactive Waste Management
Center of Excellence for Wireless Applications - CEWA (Working with Intel)
Center of Excellence for Software Development (Working with IBM)
Saudi Lunar and Near-Earth Object Science Center (Working with NASA)
Center of Excellence for Space and Aeronautics (Working with Stanford University)
Center of Excellence for Wildlife Research (Working with the Saudi Wildlife Authority)
Center of Excellence for Nanotechnology (Working with IBM)
Center of Excellence for Nanotechnology Manufacturing (Working with Intel)
Center of Excellence for Green Nanotechnology (Working with UCLA)
Center of Excellence for Bionanotechnology (Working with Northwestern University)
Center of Excellence for Nanomedicines (Working with UCSD)
Center for Excellence in Biomedicine (Working with Brigham and Women's Hospital)
Media Center
Middle East Center for Energy Efficiency (Working with Intel)
Joint Center for Genomics (Working with Chinese Academy of Sciences)
Advanced Sensors & Electronics Defense (ASED) Center
Center for Complex Engineering System - CCES (Working with MIT)
Programs
KACST is now working in the following programs:
National Satellite Technology Program
National ECP Program
National Program for Advanced Materials and Building Systems
National Program for Automobile Technology
Aviation Technology National Program
Projects
The National Science, Technology and Innovation Plan
The National Science, Technology and Innovation Plan (NSTIP) is a collaboration between the King Abdulaziz City for Science and Technology and the Ministry of Economy and Planning. This program was approved by the Council of Ministers in 2002. This program has fifteen strategic technologies that will help the future development of Saudi Arabia.
These plans are: Water, Oil and Gas, Petrochemicals Technology, Nanotechnologies, Biotechnology, Information Technology, ECP (Electronics, Communications, Photonics), Space and Aeronautics Technology, Energy, Advanced Materials, Environment, Mathematics and Physics, Medical and Health, Agricultural Technology, Building and Construction
King Abdullah's Initiative for Arabic Content
is a project that aims to provide high-quality Arabic contents in all disciplines. To achieve this goal, KACST started to work with the local and international organizations. For example:
Nature Arabic Edition: KACST has collaborated with the Macmillan Publishers to translate Nature journal into Arabic. The print issues are freely available to qualified subscribers. Also, the contents of this journal will be available online for free.
Wiki Arabi (): This is another project initiated by King Abdullah's Initiative for Arabic Content. This project aims to improve the content of the Arabic Wikipedia by translating the high-quality articles from other languages of Wikipedia such as English, French and Hebrew Wikipedia. The first Wiki Arabi event was in 2010, where over 2000 articles were translated into Arabic. The second Wiki Arabi was in 2012.
Nuclear technology
In 1988, KACST starts planning to develop nuclear technology in Saudi Arabia. Therefore, KACST decided to open the Atomic Energy Research Institute (AERI). This Institute will help Saudi Arabia to develop the nuclear power along with King Abdullah City for Atomic and Renewable Energy. The AERI has four different departments: Radiation Protection Department, Industrial Applications, Nuclear Reactors and Safety, and a Materials Department
Scientific achievements
KACST's Space Research Institute has designed some satellites that are used in scientific purposes. Such as: SaudiSat 5A,5B, SaudiComSat-1, SaudiGeo-1 and the Geostationary Satellite SGS-1 ( 1/Hellas Sat 4) and Arabsat-6A which was recently launched on 4 February 2019.
In 2006, KACST signed a collaboration agreement with CERN to participate in the construction of LINAC4 project. KACST engineers constructed a warm prototype of it. This prototype was then qualified at CERN. And now, KACST is working build up a high-energy physics community to participate in future CERN programs.
In September 30, 2008, KACST funded the science team of Gravity Probe B, helping them to complete the project.
In 2012, KACST announced the first electrostatic accelerator in Saudi Arabia. This accelerator has been designed by the National Center of Mathematics and Physics.
In April 2013, KACST announced the creation of WaferCatalyst, which is a Multi-project Wafer (MPW) consolidation initiative, which aims to promote Integrated circuit design and related technologies in Saudi Arabia and surrounding regions.
Information Technology Unit (ITU)
Information Technology requirements for research center and city staff is fulfilled by the ITU section situated in building No. 1.
Internet proxy for Saudi Arabia
The King Abdulaziz City for Science and Technology operates the Internet backbone in Saudi Arabia as well as the local registry address space. According to RIPE, "all Saudi Arabia web traffic will come from [the] IP block" registered to KACST.
See also
Communication in Saudi Arabia
Censorship in Saudi Arabia
List of things named after Saudi Kings
References
External links
The National Science, Technology and Innovation Plan website
King Abdullah's Initiative for Arabic Content
KACST high resolution logo (text in black)
KACST high resolution logo (text in white)
GIS Innovation Center
1977 establishments in Saudi Arabia
Government agencies established in 1977
Science and technology in Saudi Arabia
Scientific organisations based in Saudi Arabia
Government agencies of Saudi Arabia
Organisations based in Riyadh
Members of the International Council for Science
Members of the International Science Council
Censorship in Saudi Arabia
|
415734
|
https://en.wikipedia.org/wiki/GraphCalc
|
GraphCalc
|
GraphCalc is an open-source computer program that runs in Microsoft Windows and Linux that provides the functionality of a graphing calculator.
GraphCalc includes many of the standard features of graphing calculators, but also includes some higher-end features:
High resolution
Graphing calculator screens have a resolution typically less than 120×90 pixels, whereas computer monitors typically display 1280x1024 pixels or more.
Speed
Modern computers are considerably faster than handheld graphing calculators
Three-dimensional graphing
While high-end graphing calculators can graph in 3-D, GraphCalc benefits from modern computers' memory, speed, and graphics acceleration (OpenGL)
GraphCalc was developed by Brendan Fields and Mike Arrison, computer science students at Bucknell University, before graduating in 2000. Mike continued the development briefly from 2001–2003, but has since abandoned the project. Other similar projects being maintained are KAlgebra and Cantor.
See also
NuCalc (also known as Graphing Calculator)
External links
GraphCalc Official website
SourceForge project page
KAlgebra official site
Cantor official site
Free plotting software
Free software programmed in C++
Plotting software
Science software for Windows
Science software for Linux
2000 software
Free educational software
|
47365548
|
https://en.wikipedia.org/wiki/FPT%20Group
|
FPT Group
|
FPT (FPT Group), former The Corporation for Financing and Promoting Technology (FPT for short), is the largest information technology service company in Vietnam with its core business focusing on the provision of ICT-related services. According to Vietnam Report 2021, FPT ranked as the 16th largest private enterprise in Vietnam. In 2021, FPT's revenue reached VND 35,657 billion, an increase of 19.5% compared to 2020; Pre-tax profit reached VND 6,335 billion, up 20.4% compared to 2020.
History
On September 13, 1988, the director of the National Institute of Technology Research signed a decision to establish The Food Processing Technology Company (FPT's original name), operating in the fields of drying technology, information technology and automation technology.
On October 27, 1990, the company was renamed The Corporation for Financing and Promoting Technology (FPT for short), specializing in information technology.
In 1998, FPT became one of the four leading Internet service providers in Vietnam to create a breakthrough in this field.
On September 8, 2006, the FPT University was founded under FPT, becoming the first licensed cooperate university. Key people of the university were Dr. Le Truong Tung - the first dean and Associate Professor Truong Gia Binh - the chairman of the board.
On October 24, 2006, FPT announced its decision to issue additional shares to two strategic investors, Texas Pacific Group (TPG) and Intel Capital. FPT received an investment of $36.5 million through TPG Ventures and Intel Capital.
On November 18, 2006, Microsoft and FPT signed a strategic alliance agreement.
On December 13, 2006, FPT stock was listed on the Ho Chi Minh City Stock Exchange (HOSE).
On December 19, 2008, FPT Corporation was approved to change its name from "The Corporation for Financing and Promoting Technology" to "FPT Corporation".
On December 24, 2008, FPT Corporation announced a decision to appoint Mr. Nguyen Thanh Nam as the CEO of FPT Group, replacing Mr. Truong Gia Binh. Mr. Nguyen Thanh Nam is a founding member of FPT Corporation, Chairman of FPT Software (FSOFT).
In February 2011, the board of directors of FPT Corporation issued a resolution appointing Mr. Truong Dinh Anh as general director to replace Mr. Nguyen Thanh Nam.
On July 31, 2013, the board of directors of FPT Corporation approved the appointment of Mr. Bui Quang Ngoc, Ph.D. in database, to replace Mr. Truong Gia Binh as FPT's general director. Mr. Bui Quang Ngoc is one of the founding members and currently vice chairman of FPT.
In 2014, FPT was the first IT company in Vietnam to acquire a foreign IT company, RWE IT Slovakia (a member of RWE, a European leading energy corporation).
In August 2017, FPT transferred 30% of its ownership in FPT Retail to Vina Capital and Dragon Capital, reducing its stake in FPT Retail to 55%.
In September 2017, FPT transferred 47% of its ownership in FPT Trading to Synnex Corporation (Taiwan), reducing its stake in FPT Trading to 48%.
In July 2018, FPT acquired 90% stake in Intellinet Consulting (Intellinet), one of the fastest growing technology consulting companies in the US.
In March 2019, FPT appointed Mr. Nguyen Van Khoa - Executive Vice President of FPT and CEO of FPT Information System - to take the position of FPT's CEO, replacing Mr. Bui Quang Ngoc at the end of his term.
Organizational structure
8 Subsidiaries:
FPT Software
FPT Information System
FPT Telecom
FPT Online
FPT Education
FPT Investment
FPT Smart Cloud
FPT Digital
4 Associates:
Synnex FPT
FPT Retail
FPT Securities
FPT Capital
Business sectors
Technology: Software development; System integration; IT services
Telecommunications: Telecom services; Digital content
Education: From K1-K12; Vocational school; Undergraduate education; Postgraduate education; International affiliate programs and Online training
Achievements
National level
Top 10 largest private enterprises in Vietnam
No. 1 in the field of system integration; IT services, online advertising in Vietnam
No. 2 in fixed broadband internet access services in Vietnam ( Vietnam ICT White Paper 2014 released by the Ministry of Information and Communications)
The first university in Vietnam to be awarded a 3-star ranking by the QS World University Rankings for three consecutive terms
International level
Top 100 Global Service Providers by IAOP
Top 300 Asian Enterprises by Nikkei
Top 130 Best Companies to Work for in Asia
References
External links
FPT corporate website
Companies listed on the Ho Chi Minh City Stock Exchange
Companies based in Hanoi
Information technology companies of Vietnam
|
24099998
|
https://en.wikipedia.org/wiki/Ingex
|
Ingex
|
Ingex is an open-source (GPL) suite of software for the digital capture of audio and video data, without the need for traditional audio or video tape or cassettes. Serial digital interface (SDI) capture is supported, as well as real-time transcoding (with MXF). Portions of the software suite also act as a network file server for media files, as well as archiving to LTO-3 data tape. Audio and video media files can also be stored on USB hard drives or Network Attached Storage. The software is heavily used by the BBC, and was developed by the BBC Research Laboratory.
Some of the early production projects which have used Ingex include a Foo Fighters music video, and the BBC television series Dragons' Den.
Features
The different software products in the suite support:
Multi-camera video capture in a studio environment
Video tape archive preservation
Acting as a server to Avid editing clients
Media Harmony is a module for Samba Virtual file system (VFS). This allows editing clients, such as Avid, to use low-cost commodity storage for video and media files.
Ingex Studio provides studio-style recoding, capture, transcode, and MXF wrapping for multiple cameras, also known as multi-camera tapeless recording. The software runs on commodity PC hardware and SDI IO cards. The media can then be edited by MXF-based editors, for example, Avid Media Composer.
Supported formats
Currently supported standard-definition (SD) codecs are:
Avid-compatible JPEG codec resolutions known as 2:1, 3:1, 10:1, 20:1, 15:1s, 10:1m, 4:1m
DVCPRO50 (50Mbit/s) and DV (25Mbit/s)
IMX 50/40/30 (50/40/30Mbit/s)
Uncompressed standard-definition video at 8 bits-per-sample and 10 bits-per-sample
Supported high-definition (HD) codecs are:
DNxHD (VC-3) at 120Mbit/s and 185Mbit/s
DVCPRO HD
Uncompressed high-definition video at 8 bits-per-sample
libMXF supports:
MXF
uncompressed video or audio, DV25/50, IMX, JPEG, DNxHD and DVCProHD files
writes MXF OP-Atom files which can be used directly in Avid Media Composer and related editors
MediaHarmony supports:
media_harmony - per-client .pmr and .mdb database files so there are no conflicts between Avid editors
mxf_harmony - on-the-fly unwrapping of MXF-wrapped DV essence so that a Final Cut Pro client can share the same DV media files as an Avid client
Ingex archive supports:
MXF OP-1A file container, containing audio, video, and timecode data (also known as OP-1A MXF)
LTO-3 data tape
Video SMPTE 384M uncompressed 4:2:2 video at 8 bits per sample in UYVY format
Audio SMPTE 382M uncompressed PCM audio at 48 kHz and 20 bits per sample
LTO barcode information
POSIX.1-2001 archive format (also known as pax Interchange format), a superset of the tar format which overcomes the 8 GiB limitation of tar format, to ensure future access to programmes
Metadata:
Advanced Authoring Format (AAF) is used for storing edition metadata.
Supported operating systems
libMXF: Microsoft Windows, Mac OS X, Linux
Ingex Studio: openSUSE Linux
See also
Comparison of video editing software
Video server
Video editing software
Photo slideshow software
Video scratching
Edit Decision List
References
External links
Project Pages:
ingex.sourceforge.net
Sourceforge Ingex Project Page
Whitepapers:
Improving workflow in practice for low-cost programme-making using MXF & AAF file formats
Tapeless and paperless: Automating the workflow in TV studio production
File-based Production: Making It Work In Practice
Case studies:
From the Open Source Observatory and Repository (OSOR), a project of the European Commission's IDABC project:
Low-cost high tech: BBC tries out Open Source-based tapeless recording
Low-cost high tech: BBC tries out Open Source-based tapeless recording, as ODT document
Low-cost high tech: BBC tries out Open Source-based tapeless recording, as PDF document
Broadcast engineering
Digital television
Film and video technology
Free video software
|
9161850
|
https://en.wikipedia.org/wiki/Joe%20Barry
|
Joe Barry
|
Joe Barry (born July 5, 1970) is an American football coach who is the defensive coordinator for the Green Bay Packers of the National Football League (NFL). He previously served as the assistant head coach and linebackers coach for the Los Angeles Rams from 2017 to 2020 and defensive coordinator for the Washington Redskins from 2015 to 2016 and the Detroit Lions from 2007 to 2008. Barry also previously served as an assistant coach for the San Diego Chargers, Tampa Bay Buccaneers and San Francisco 49ers. Barry is the son of former coach Mike Barry.
Early years
Barry played linebacker at the University of Michigan from 1989 to 1990 before transferring to the University of Southern California.
Coaching career
Early career
In 1994, Barry began his coaching career at the University of Southern California (USC), his alma mater, as a graduate assistant. In 1996, Barry joined Northern Arizona University as their linebackers coach and would serve in that role from 1996 to 1998 before being hired in the same capacity at University of Nevada, Las Vegas (UNLV) in 1999.
San Francisco 49ers
In 2000, Barry was hired by the San Francisco 49ers as a defensive quality control coach under defensive coordinator Jim Mora and head coach Steve Mariucci.
Tampa Bay Buccaneers
In 2001, Barry was hired by the Tampa Bay Buccaneers as their linebackers coach under defensive coordinator Monte Kiffin and head coach Tony Dungy. In 2002, Barry, along with Kiffin, were retained by the new head coach of the Buccaneers Jon Gruden. That season, the Buccaneers went to Super Bowl XXXVII and defeated the Oakland Raiders to win their first Super Bowl title.
Detroit Lions
In 2007, Barry was hired by the Detroit Lions as their defensive coordinator under head coach Rod Marinelli, who was coincidentally Barry's father-in-law.
At a press conference on December 21, 2008, following the Lions' 42–7 loss to the New Orleans Saints, Detroit News sports columnist Rob Parker addressed a question about Barry to Rod Marinelli, inquiring whether Marinelli wished that his daughter had "married a better defensive coordinator." (Barry was the Lions' defensive coordinator at the time.) The question was criticized as unprofessional and inappropriate. The next day, Parker wrote that the comment was "an attempt at humor" and not a malicious attack. Parker has not written for the Detroit News since, and has not attended any press conferences since the incident, including the one Marinelli gave following his dismissal as head coach of the Lions. On January 6, 2009, the Detroit News announced that Parker had resigned from the newspaper the previous week. Following the firing of Marinelli, Barry was not retained by the Lions.
Tampa Bay Buccaneers (second stint)
In 2009, Barry returned and was re-hired by the Tampa Bay Buccaneers as their linebackers coach under defensive coordinator Jim Bates and head coach Raheem Morris.
Jacksonville Jaguars & USC
On January 26, 2010, Barry was hired by the Jacksonville Jaguars and signed a contract to be their linebackers coach. That same day, it was announced that the Jaguars released Barry from his contract so he can join the University of Southern California (USC) as their linebackers coach.
San Diego Chargers
In 2012, Barry was hired by the San Diego Chargers as their linebackers coach under defensive coordinator John Pagano and head coach Norv Turner. In 2013, Barry was retained by new Chargers head coach Mike McCoy.
Washington Redskins
In 2015, Barry was hired by the Washington Redskins as their defensive coordinator under head coach Jay Gruden. Following the 2016 season, Barry was fired.
Los Angeles Rams
On January 14, 2017, Barry was hired by the Los Angeles Rams as their assistant head coach and linebackers coach under head coach Sean McVay.
Green Bay Packers
On February 8, 2021, Barry was hired by the Green Bay Packers as their defensive coordinator under head coach Matt LaFleur, replacing Mike Pettine. In his first year coordinating the unit, he developed veteran linebacker De'Vondre Campbell, who was signed as a free-agent for a $2 million contract, to First-Team All-Pro honors. His unit finished as the NFL's 9th ranked defense by yards allowed, despite missing star pass-rusher Za'Darius Smith and star cornerback Jaire Alexander for most of the season. During Week 11, his unit shut out Seahawks quarterback Russell Wilson for the first time in his career.
In their Divisional Round playoff game against the San Francisco 49ers, Barry and the Packers defense intercepted 49ers quarterback Jimmy Garoppolo once, while sacking him four times, limiting him to 3 points through 55 minutes as the Packers led by 7. However, the Packers lost 13–10 after their special teams unit allowed a blocked punt to be returned for a game-tying touchdown with 4:41 to play, the Packers offense was unable to produce on the following drive and had to punt with 2 minutes remaining, and the defense was unable to come up with a final stop, as the Packers lost 13–10.
Personal life
Barry is married to his wife, Chris Marinelli Barry, and they have four children together: daughters Camryn and Lauren and sons Sam and Nick. Through his marriage with Chris, Barry is the son-in-law to NFL coach and Las Vegas Raiders defensive line coach Rod Marinelli.
References
External links
Green Bay Packers profile
Los Angeles Rams profile
USC Trojans profile
1970 births
Living people
American football linebackers
USC Trojans football coaches
Tampa Bay Buccaneers coaches
Detroit Lions coaches
Los Angeles Rams coaches
San Diego Chargers coaches
Washington Redskins coaches
USC Trojans football players
National Football League defensive coordinators
San Francisco 49ers coaches
Green Bay Packers coaches
Sportspeople from Boulder, Colorado
People from Boulder, Colorado
|
12993409
|
https://en.wikipedia.org/wiki/DNS%20rebinding
|
DNS rebinding
|
DNS rebinding is a method of manipulating resolution of domain names that is commonly used as a form of computer attack. In this attack, a malicious web page causes visitors to run a client-side script that attacks machines elsewhere on the network. In theory, the same-origin policy prevents this from happening: client-side scripts are only allowed to access content on the same host that served the script. Comparing domain names is an essential part of enforcing this policy, so DNS rebinding circumvents this protection by abusing the Domain Name System (DNS).
This attack can be used to breach a private network by causing the victim's web browser to access computers at private IP addresses and return the results to the attacker. It can also be employed to use the victim machine for spamming, distributed denial-of-service attacks, or other malicious activities.
How DNS rebinding works
The attacker registers a domain (such as attacker.com) and delegates it to a DNS server that is under the attacker's control. The server is configured to respond with a very short time to live (TTL) record, preventing the DNS response from being cached. When the victim browses to the malicious domain, the attacker's DNS server first responds with the IP address of a server hosting the malicious client-side code. For instance, they could point the victim's browser to a website that contains malicious JavaScript or Flash scripts that are intended to execute on the victim's computer.
The malicious client-side code makes additional accesses to the original domain name (such as attacker.com). These are permitted by the same-origin policy. However, when the victim's browser runs the script it makes a new DNS request for the domain, and the attacker replies with a new IP address. For instance, they could reply with an internal IP address or the IP address of a target somewhere else on the Internet.
Protection
The following techniques attempt to prevent DNS rebinding attacks:
DNS servers in the chain can filter out private IP addresses and loopback IP addresses:
External public DNS servers (e.g. OpenDNS) can implement DNS filtering.
Local system administrators can configure the organization's local nameserver(s) to block the resolution of external names into internal IP addresses. (This has the downside of allowing an attacker to map the internal address ranges in use.)
A firewall (e.g. dnswall), in the gateway or in the local pc, can filter DNS replies that pass through it, discarding local addresses.
Web browsers can resist DNS rebinding:
Web browsers can implement DNS pinning: the IP address is locked to the value received in the first DNS response. This technique may block some legitimate uses of Dynamic DNS, and may not work against all attacks. However, it is important to fail-safe (stop rendering) if the IP address does change, because using an IP address past the TTL expiration can open the opposite vulnerability when the IP address has legitimately changed and the expired IP address may now be controlled by an attacker.
The NoScript extension for Firefox includes ABE, a firewall-like feature inside the browser which in its default configuration prevents attacks on the local network by preventing external webpages from accessing local IP addresses.
Web servers can reject HTTP requests with an unrecognized Host header.
See also
DNS hijacking
DNS spoofing
References
External links
Protecting Browsers from DNS Rebinding Attacks (2007)
DNS hardening update for Adobe Flash Player (2008)
Security Sun Alert 200041 for the Sun JVM (2008-09-04)
DNS Rebinding with Robert RSnake Hansen (2009)
Domain Name System
Internet security
Web security exploits
|
68056
|
https://en.wikipedia.org/wiki/DIVX
|
DIVX
|
DIVX (Digital Video Express) is a discontinued digital video format, an unsuccessful attempt to create an alternative to video rental in the United States.
Format
DIVX was a rental format variation on the DVD player in which a customer would buy a DIVX disc (similar to a DVD) for approximately US$4.50, which was watchable for up to 48 hours from its initial viewing. After this period, the disc could be viewed by paying a continuation fee to play it for two more days. Viewers who wanted to watch a disc an unlimited number of times could convert the disc to a "DIVX silver" disc for an additional fee. "DIVX gold" discs that could be played an unlimited number of times on any DIVX player were announced at the time of DIVX's introduction, but no DIVX gold titles were ever released.
Each DIVX disc was marked with a unique barcode in the burst cutting area that could be read by the player, and used to track the discs. The status of the discs was monitored through an account over a phone line. DIVX player owners had to set up an account with DIVX to which additional viewing fees could be charged. The player would call an account server over the phone line to charge for viewing fees similar to the way DirecTV and Dish Network satellite systems handle pay-per-view.
In addition to the normal Content Scramble System (CSS) encryption, DIVX discs used Triple DES encryption and an alternative channel modulation coding scheme, which prevented them from being read in standard DVD players. Most of the discs would be manufactured by United Kingdom-based Nimbus CD International.
DIVX players manufactured by Zenith Electronics (who would go bankrupt shortly before the launch of the format), Thomson Consumer Electronics (RCA and ProScan), and Matsushita Electric (Panasonic) started to become available in mid-1998. These players differed from regular DVD players with the addition of a security IC chip (powered by ARM RISC and manufactured by VLSI) that controlled the encode/decode of the digital content. Mail systems were included on some players as well. Because of widespread studio support, manufacturers anticipated that demand for the units would be high. Initially, the players were approximately twice as expensive as standard DVD players, but price reductions occurred within months of release.
History
Development and launch
DIVX was introduced on September 8, 1997 (after previously being made under the code name Zoom TV), with the format under development since 1995. The format was a partnership between Circuit City and entertainment law firm Ziffren, Brittenham, Branca & Fischer, with the former company investing $100 million into the latter firm. One advertiser attempted to sign with the company, but was unable to do so, which spurred a lawsuit between the two.
The product made a quiet showing at the Consumer Electronics Show in Las Vegas in early January 1998, but won the attention of 20th Century Fox which on February 20, 1998 signed a deal to release their titles on the format. After multiple delays, the initial trial of the DIVX format was run in the San Francisco, California and Richmond, Virginia areas starting on June 8, 1998. Initially, only a single Zenith player was available starting at $499, along with no more than 50 (but more than 19) titles. Very few players sold during this time period, with The Good Guys chain alleging that fewer than ten players were sold during this time period. A nationwide rollout began three months later, on September 21, again with only one Zenith player and 150 titles available in 190 stores in the western U.S.
At the format's launch, DIVX was sold primarily through the Circuit City, Good Guys, and Ultimate Electronics retailers. The format was promoted to consumers as an alternative to traditional video rental schemes with the promise of "No returns, no late fees." Though consumers could just discard a DIVX disc after the initial viewing period, several DIVX retailers maintained DIVX recycling bins on their premises. On September 22, 1998, a fourth retailer, Canadian Future Shop, signed a contract with DIVX to stock the format, although only in 23 stores in the U.S. only. Thomson's player, after multiple delays, arrived on October 3, 1998, followed by Panasonic's on December 10. The format made its overall national debut on October 12, 1998. A marketing push began that November for the 1998 holiday season, with more than $1 million going into the campaign. The fortunes of the format would seemingly turn for the better in mid-December 1998, when a shortage of DVD players occurred. In total, 87,000 players were sold during the final quarter of 1998, with 535,000 discs across 300 titles being sold, although fewer than 17,000 accounts for DIVX were created.
Opposition
Almost immediately after the format's reveal, a movement on the Internet was initiated against DIVX, particularly in home theater forums by existing owners of the then-still nascent DVD format. Broader groups of consumers had environmental concerns with the format, since under the advertised "no returns" model a disc would be discarded as waste once the initial user was done with it, rather than being reused as they were under the traditional rental model. Both companies that created the DVD format (Sony and Toshiba) also denounced DIVX, as did major studio distributor Warner Home Video (who was the first major American studio to distribute DVD) and the DVD Forum (a consortium of developers on the format who standardized DVDs). Titles in the DIVX catalog were released primarily in pan and scan format with limited special features, usually only a trailer (although a few widescreen titles did arrive on the format in early December 1998). This caused many home theater enthusiasts to become concerned that the success of DIVX would significantly diminish the release of films on the DVD format in the films' original aspect ratios and with supplementary material. Some early demos were also noted to have unique instances of artifacting on the discs that were not present on standard DVDs. Many people in various technology and entertainment communities were afraid that there would be DIVX exclusive releases, and that the then-fledgling DVD format would suffer as a result. DreamWorks, 20th Century Fox, and Paramount Pictures, for instance, initially released their films exclusively on the DIVX format (something that DIVX did not originally intend to happen), as did Disney, which released on both formats. DIVX featured stronger encryption technology than DVD (Triple DES instead of CSS) which many studios stated was a contributing factor in the decision to support DIVX. Others cited the higher price of DIVX-compatible DVD players and rental costs as their reason for opposing the format, with one declaring DIVX as "holding my VCR hostage". One online poll surveyed 786 people on the format, of which nearly 97% disapproved of the format's concept, and another poll in December 1998 reflected 86% disapproval even if the format were free – a testament to the fierce online backlash the format received. As early as December 1997, news outlets were already calling the format a failure for Circuit City.
In addition to the hostile Internet response, competitors such as Hollywood Video ran advertisements touting the benefits of "Open DVD" over DIVX, with one ad in the Los Angeles Times depicting a hand holding a telephone line with the caption: "Don't let anyone feed you the line." The terminology "Open DVD" had been used by DVD supporters and later Sony themselves; in response to DIVX's labeling of DVD as "Basic DVD" and DIVX/DVD players as "DIVX-enhanced". Other retailers, such as Best Buy, also had their concerns, most of them citing possible customer confusion and cumbersomeness with the two formats. Pay-per-view companies were also concerned with the format intruding on their business sector, namely with their objective of single-use rentals of a film being offered to the consumer.
However, early concerns of alleged or feared constant usage of the phone line proved to be somewhat exaggerated, as all players needed to do was verify its usage twice a month. Despite this, informational-freedom advocates were concerned that the players' "dial-home" ability could be used to spy on people's watching habits, as well as copyright and privacy concerns about its licensing of the media, with some alleging it violated fair-use laws entirely.
Allegations of anti-competitive vaporware, as well as concerns within the software industry prompted David Dranove of Northwestern University and Neil Gandal of Tel Aviv University and University of California, Berkeley, to conduct an empirical study designed to measure the effect of the DIVX announcement on the DVD market. This study suggests that the DIVX announcement slowed the adoption of DVD technology. According to Dranove and Gandal, the study suggests that the "general antitrust concern about vaporware seems justified".
Demise
Right after the launch of the format, Circuit City announced that despite a gain of 4.1% in net profit, huge expenses of launching that format (among other issues) massively undercut that profit. As early as September 1998, Circuit City was looking for partners to share their losses from the format's launch. Retailers such as Blockbuster Video did not carry the format at all. Not helping the format's defenders was suspicious activity of pro-DIVX sites, with one shutting down as quickly as it opened.
DIVX and Thomson teamed up in January 1999 to create another format made for high-definition video using existing DVD technology, predating the development of both Blu-ray and HD DVD by many years. The market share for DIVX players was 23% in January 1999, and by that March, around 419 titles were available in the DIVX format. However, sales for the format quickly fell off after the 1998 holiday season, with all three third-party retailers pulling out of DIVX sales by that point. In May, studio support for DIVX would start to be phased out with Paramount refusing to convert their titles to "Silver" discs (and then later stopping DIVX releases entirely), and Disney increasing their DVD activity. By the format's first anniversary, the future of the format was very grim - with only five DIVX-compatible players (and no DIVX-compatible computer drives), 478 titles, and only Circuit City selling DIVX discs.
The format was discontinued on June 16, 1999, because of the costs of introducing the format, as well as its very limited acceptance by the general public and retailers. At the end of the format's life, Circuit City announced a $114 million after-tax loss, and Variety estimated the total loss on the scheme was around $337 million. Over the next two years, the DIVX system was phased out. Customers could still view all their DIVX discs and were given a $100 refund for every player that was purchased before June 16, 1999. All discs that were unsold at the end of the summer of 1999 were destroyed. The program officially cut off access to accounts on July 7, 2001. The player's Security Module, which had an internal Real-Time Clock, ceased to allow DIVX functions after 30 days without a connection to the central system. Unsold players were liquidated in online auctions, but not before being modified to remove the DIVX Security Module. As a result, certain player models demonstrated lockups when DIVX menus were accessed.
On the company website to announce discontinuation of the product on June 16, 1999, it stated: "All DIVX-featured DVD players are fully functional DVD players and will continue to operate as such. All DIVX discs, including those previously purchased by consumers and those remaining in retailer inventories, can be viewed on registered players anytime between now and June 30, 2001. Subsequent viewings also will be available during that period. Discs can no longer be upgraded to unlimited viewing, known as DIVX Silver. Customers who have converted discs to DIVX Silver can continue viewing the discs until June 30, 2001, or can receive a full refund of the conversion price at their request". This meant no DIVX discs could play any content after June 30, 2001, rendering the medium worthless.
DIVX appeared as a "dishonorable mention" alongside PC World's list of "25 Worst Tech Products of All Time" in 2006.
List of films available on DIVX
101 Dalmatians (1996)
The Abyss
Air Bud: Golden Receiver
Affliction (1997)
Alice in Wonderland (1951)
Alien Resurrection
Antz
Apollo 13
Armageddon (1998)
Army of Darkness
At First Sight (1999)
A Thousand Acres
Babe
BASEketball (1998)
Beloved (1998)
Blown Away (1994)
The Blues Brothers
Born on the Fourth of July
Brassed Off
Brazil (1985)
The Breakfast Club
Brubaker
Bulworth
The Boxer (1997)
A Bug's Life
The Chamber (1996)
Chairman of the Board
Chasing Amy
A Civil Action
Con Air
Conan the Destroyer
Cop Land
Courage Under Fire
Crimson Tide (film)
The Crow (1994)
The Crow: City of Angels
Dante's Peak
Daylight (1996)
The Day of the Jackal
Death Becomes Her
Deep Impact
Deep Rising
Dirty Work (1998)
Disturbing Behavior
Dragnet (1987)
The Edge
Ed Wood
The Eiger Sanction
Enemy of the State
The End of Violence
Escape from L.A.
Ever After
Evita (1996)
Father of the Bride Part II
Fled
The Flintstones
For Richer or Poorer
The Full Monty
Gang Related
George of the Jungle
GoldenEye
The Ghost and the Darkness
G.I. Jane
Good Will Hunting
Hackers
Half-Baked
Halloween: H20
Hard Rain
Highlander: The Final Dimension
Holy Man
Hope Floats
The Horse Whisperer
Houseguest
The Hunt for Red October
The Impostors
Invasion of the Body Snatchers (1978)
The Jackal (1997)
Jane Austen's Mafia!
Judge Dredd
Kissing a Fool
Kiss the Girls (1997)
Liar Liar
A Life Less Ordinary
The Madness of King George
Mafia!
The Man in the Iron Mask (1998)
Mercury Rising
Mr. Magoo
Mrs. Doubtfire
MouseHunt
Mulholland Falls
Nothing to Lose (1997)
The Object of My Affection
One True Thing
Oscar and Lucinda
Patriot Games
Patch Adams
The Peacemaker (1997)
Phantoms
Pulp Fiction
Rapid Fire (1992)
Rising Sun
The River (1984)
The Rock
RocketMan
Rollerball (1975)
Ronin
Scream (1996)
Scream 2
The Shadow (1994)
Six Days Seven Nights
Sling Blade
Slums of Beverly Hills
Small Soldiers
Sneakers (1992)
Speed 2: Cruise Control
Spy Hard
Street Fighter (1994)
Star Trek: First Contact
Star Trek Generations
Strange Days
Supercop
That Thing You Do!
There's Something About Mary
The Thin Red Line (1998)
The Thing (1982)
Tomorrow Never Dies
Twelve Monkeys
Twilight (1998)
Ulee's Gold
Waking Ned Devine
A Walk in the Clouds
Welcome to Sarajevo
Wing Commander (canceled)
The X-Files
Young Frankenstein
See also
Planned obsolescence
Digital rights management
Flexplay (another disposable DVD format)
DVD-D (another disposable DVD format)
References
External links
Divx Owners Association, Archived on April 17, 2008.
Official Website, Archived on May 8, 1999.
Circuit City
Audiovisual introductions in 1997
Discontinued media formats
Digital rights management
Video storage
DVD
Audiovisual ephemera
|
33731726
|
https://en.wikipedia.org/wiki/Torpedo%20Data%20Computer
|
Torpedo Data Computer
|
The Torpedo Data Computer (TDC) was an early electromechanical analog computer used for torpedo fire-control on American submarines during World War II. Britain, Germany, and Japan also developed automated torpedo fire control equipment, but none were as advanced as the US Navy's TDC, as it was able to automatically track the target rather than simply offering an instantaneous firing solution. This unique capability of the TDC set the standard for submarine torpedo fire control during World War II.
Replacing the previously standard hand-held slide rule-type devices (known as the "banjo" and "is/was"), the TDC was designed to provide fire-control solutions for submarine torpedo firing against ships running on the surface (surface warships used a different computer).
The TDC was a rather bulky addition to the sub's conning tower and required two extra crewmen: one as an expert in its maintenance, the other as its actual operator. Despite these drawbacks, the use of the TDC was an important factor in the successful commerce raiding program conducted by American submarines during the Pacific campaign of World War II. Accounts of the American submarine campaign in the Pacific often cite the use of TDC. Some officers became highly skilled in its use, and the Navy set up a training school for its use.
Two upgraded World War II-era U.S. Navy fleet submarines ( and ) with their TDCs continue to serve with Taiwan's navy and U.S. Nautical Museum staff are assisting them with maintaining their equipment. The museum also has a fully restored and functioning TDC from , docked in San Francisco.
Background
History
The problem of aiming a torpedo has occupied military engineers since Robert Whitehead developed the modern torpedo in the 1860s. These early torpedoes ran at a preset depth on a straight course (consequently they are frequently referred to as "straight runners"). This was the state of the art in torpedo guidance until the development of the homing torpedo during the latter part of World War II. The vast majority of submarine torpedoes during World War II were straight running, and these continued in use for many years after World War II. In fact, two World War II-era straight running torpedoes — fired by the British nuclear-powered submarine — sank the ARA General Belgrano in 1982.
During World War I, computing a target intercept course for a torpedo was a manual process where the fire control party was aided by various slide rules (the U.S. examples were the Mark VIII Angle Solver (colloquially called the "banjo", for its shape), and the "Is/Was" circular sliderule (Nasmith Director), for predicting where a target will be based on where it is now and was) or mechanical calculator/sights. These were often "woefully inaccurate", which helps explain why torpedo spreads were advised.
During World War II, Germany, Japan, and the United States each developed analog computers to automate the process of computing the required torpedo course.
In 1932, the Bureau of Ordnance (BuOrd) initiated development of the TDC with Arma Corporation and Ford Instruments. This culminated in the "very complicated" Mark 1 in 1938. This was retrofitted into older boats, beginning with Dolphin and up through the newest Salmons.
The first submarine designed to use the TDC was , launched in 1940 with the Mark III, located in the conning tower. (This differed from earlier outfits.) It proved to be the best torpedo fire control system of World War II.
In 1943, the Torpedo Data Computer Mark IV was developed to support the Mark 18 torpedo.
Both the Mk III and Mk IV TDC were developed by Arma Corporation (now American Bosch Arma).
The problem of aiming a straight-running torpedo
A straight-running torpedo has a gyroscope-based control system that ensures that the torpedo will run a straight course. The torpedo can run on a course different from that of the submarine by adjusting a parameter called the gyro angle, which sets the course of the torpedo relative to the course of the submarine (see Figure 2). The primary role of the TDC is to determine the gyro angle setting required to ensure that the torpedo will strike the target.
Determining the gyro angle required the real-time solution of a complex trigonometric equation (see Equation 1 for a simplified example). The TDC provided a continuous solution to this equation using data updates from the submarine's navigation sensors and the TDC's target tracker. The TDC was also able to automatically update all torpedo gyro angle settings simultaneously with a fire control solution, which improved the accuracy over systems that required manual updating of the torpedo's course.
The TDC enables the submarine to launch the torpedo on a course different from that of the submarine, which is important tactically. Otherwise the submarine would need to be pointed at the projected intercept point in order to launch a torpedo. Requiring the entire vessel to be pointed in order to launch a torpedo would be time consuming, require precise submarine course control, and would needlessly complicate the torpedo firing process. The TDC with target tracking gives the submarine the ability to maneuver independently of the required target intercept course for the torpedo.
As is shown in Figure 2, in general, the torpedo does not actually move in a straight path immediately after launch and it does not instantly accelerate to full speed, which are referred to as torpedo ballistic characteristics. The ballistic characteristics are described by three parameters: reach, turning radius, and corrected torpedo speed. Also, the target bearing angle is different from the point of view of the periscope versus the point of view of the torpedo, which is referred to as torpedo tube parallax. These factors are a significant complication in the calculation of the gyro angle and the TDC must compensate for their effects.
Straight running torpedoes were usually launched in salvo (i.e. multiple launches in a short period of time) or a spread (i.e. multiple launches with slight angle offsets) to increase the probability of striking the target given the inaccuracies present in the measurement of angles, target range, target speed, torpedo track angle, and torpedo speed.
Salvos and spreads were also launched to strike tough targets multiple times to ensure their destruction. The TDC supported the firing of torpedo salvos by allowing short time offsets between firings and torpedo spreads by adding small angle offsets to each torpedo's gyro angle. Before the sinking of South Korea's ROKS Cheonan by North Korea in 2010, the last warship sunk by a submarine torpedo attack, the ARA General Belgrano in 1982, was struck by two torpedoes from a three torpedo spread.
To accurately compute the gyro angle for a torpedo in a general engagement scenario, the target course, speed, range, and bearing must be accurately known. During World War II, target course, range, and bearing estimates often had to be generated using periscope observations, which were highly subjective and error prone. The TDC was used to refine the estimates of the target's course, range, and bearing through a process of
estimating the target's course, speed, and range based on observations.
using the TDC to predict the target's position at a future time based on the estimates of the target's course, speed, and range.
comparing the predicted position against the actual position and correcting the estimated parameters as required to achieve agreement between the predictions and observation. Agreement between prediction and observation means that the target course, speed, and range estimates are accurate.
Estimating the target's course was generally considered the most difficult of the observation tasks. The accuracy of the result was highly dependent on the experience of the skipper. During combat, the actual course of the target was not usually determined but instead the skippers determined a related quantity called "angle on the bow." Angle on the bow is the angle formed by the target course and the line of sight to the submarine. Some skippers, like Richard O'Kane, practiced determining the angle on the bow by looking at IJN ship models mounted on a calibrated lazy Susan through an inverted binocular barrel.
To generate target position data versus time, the TDC needed to solve the equations of motion for the target relative to the submarine. The equations of motion are differential equations and the TDC used mechanical integrators to generate its solution.
The TDC needed to be positioned near other fire control equipment to minimize the amount of electromechanical interconnect. Because submarine space within the pressure hull was limited, the TDC needed to be as small as possible. On World War II submarines, the TDC and other fire control equipment was mounted in the conning tower, which was a very small space.
The packaging problem was severe and the performance of some early torpedo fire control equipment was hampered by the need to make it small. It had an array of handcranks, dials, and switches for data input and display. To generate a fire control solution, it required inputs on
submarine course and speed, which were read automatically from the submarine's gyrocompass and pitometer log
estimated target course, speed, and range information (obtained using data from the submarine's periscope, Target Bearing Transmitter (TBT), radar, and sonar)
torpedo type and speed (type was needed to deal with the different torpedo ballistics)
The TDC performed the trigonometric calculations required to compute a target intercept course for the torpedo. It also had an electromechanical interface to the torpedoes, allowing it to automatically set courses while torpedoes were still in their tubes, ready to be fired.
The TDC's target tracking capability was used by the fire control party to continuously update the fire control solution even while the submarine was maneuvering. The TDC's target tracking ability also allowed the submarine to accurately fire torpedoes even when the target was temporarily obscured by smoke or fog.
TDC functional description
Since the TDC actually performed two separate functions, generating target position estimates and computing torpedo firing angles, the TDC actually consisted of two types of analog computers:
Angle solver: This computer calculates the required gyro angle. The TDC had separate angle solvers for the forward and aft torpedo tubes.
Position keeper: This computer generates a continuously updated estimate of the target position based on earlier target position measurements.
Angle solver
The equations implemented in the angle solver can be found in the Torpedo Data Computer manual. The Submarine Torpedo Fire Control Manual discusses the calculations in a general sense and a greatly abbreviated form of that discussion is presented here.
The general torpedo fire control problem is illustrated in Figure 2. The problem is made more tractable if we assume:
The periscope is on the line formed by the torpedo running along its course
The target moves on a fixed course and speed
The torpedo moves on a fixed course and speed
As can be seen in Figure 2, these assumptions are not true in general because of the torpedo ballistic characteristics and torpedo tube parallax. Providing the details as to how to correct the torpedo gyro angle calculation for ballistics and parallax is complicated and beyond the scope of this article. Most discussions of gyro angle determination take the simpler approach of using Figure 3, which is called the torpedo fire control triangle. Figure 3 provides an accurate model for computing the gyro angle when the gyro angle is small, usually less than 30°.
The effects of parallax and ballistics are minimal for small gyro angle launches because the course deviations they cause are usually small enough to be ignorable. U.S. submarines during World War II preferred to fire their torpedoes at small gyro angles because the TDC's fire control solutions were most accurate for small angles.
The problem of computing the gyro angle setting is a trigonometry problem that is simplified by first considering the calculation of the deflection angle, which ignores torpedo ballistics and parallax.
For small gyro angles, . A direct application of the law of sines to Figure 3 produces Equation .
where
is the velocity of the target.
is the velocity of the torpedo.
is the angle of the target ship bow relative to the periscope line of sight.
is the angle of the torpedo course relative to the periscope line of sight.
Range plays no role in Equation , which is true as long as the three assumptions are met. In fact, Equation is the same equation solved by the mechanical sights of steerable torpedo tubes used on surface ships during World War I and World War II. Torpedo launches from steerable torpedo tubes meet the three stated assumptions well. However, an accurate torpedo launch from a submarine requires parallax and torpedo ballistic corrections when gyro angles are large. These corrections require knowing range accurately. When the target range was not known, torpedo launches requiring large gyro angles were not recommended.
Equation is frequently modified to substitute track angle for deflection angle (track angle is defined in Figure 2, ). This modification is illustrated with Equation .
where
is the angle between the target ship's course and the torpedo's course.
A number of publications state the optimum torpedo track angle as 110° for a Mk 14 (46 knot weapon). Figure 4 shows a plot of the deflection angle versus track angle when the gyro angle is 0° (i.e.., ). Optimum track angle is defined as the point of minimum deflection angle sensitivity to track angle errors for a given target speed. This minimum occurs at the points of zero slope on the curves in Figure 4 (these points are marked by small triangles).
The curves show the solutions of Equation for deflection angle as a function of target speed and track angle. Figure 4 confirms that 110° is the optimum track angle for a target, which would be a common ship speed.
Position keeper
As with the angle solver the equations implemented in the angle solver can be found in the Torpedo Data Computer manual. Similar functions were implemented in the rangekeepers for surface ship-based fire control systems. For a general discussion of the principles behind the position keeper, see Rangekeeper.
Notes and references
External links
USS Pampanito: Article on the Pampanito's TDC.
Torpedo Data Computer Mk IV
A. Ben Clymer: The mechanical analog Computers of Hannibal Ford and William Newell, IEEE Annals of the history of computing
US Torpedo History: Good description of operational use of the Mk 14, Mk 18, and Mk 23
Original Manual for the Torpedo Data Computer Mark 3
Discussion of the torpedo ballistic and parallax corrections used by the Imperial Japanese Navy
Description of German Torpedo Calculator T.Vh.Re.S3 developed by Siemens and used on German U-Boats during World War II
Submarine components
Military computers
Analog computers
Electro-mechanical computers
Fire-control computers of World War II
Military equipment introduced in the 1930s
|
70176096
|
https://en.wikipedia.org/wiki/1985%E2%80%9386%20Arkansas%E2%80%93Little%20Rock%20Trojans%20men%27s%20basketball%20team
|
1985–86 Arkansas–Little Rock Trojans men's basketball team
|
The 1985–86 Arkansas–Little Rock Trojans men's basketball team represented the University of Arkansas at Little Rock during the 1985–86 NCAA Division I men's basketball season. The Trojans, led by head coach Mike Newell, played their home games at Barton Coliseum and were members of the Trans America Athletic Conference. They finished the season with a record of 23–11, 12–2 in TAAC play. They won the 1986 TAAC Men's Basketball Tournament to earn an automatic bid in the 1986 NCAA Men's Division I Basketball Tournament. After knocking off No. 3 seed Notre Dame in the opening round, the Trojans lost to NC State, 80–66 in 2OT, in the round of 32.
With the NCAA Tournament’s expansion to 64 teams the year prior, Arkansas–Little Rock joined Cleveland State as the first No. 14 seeds to defeat a No. 3 seed. Cleveland State followed their opening round victory with another to become the first No. 14 seed to reach the Sweet Sixteen.
Roster
Schedule and results
|-
!colspan=9 style=| Regular season
|-
!colspan=9 style=| TAAC Tournament
|-
!colspan=9 style=| NCAA Tournament
Rankings
Awards and honors
Myron Jackson – TAAC Player of the Year
Mike Newell – TAAC Coach of the Year
References
Little Rock Trojans men's basketball seasons
Arkansas-Little Rock
Arkansas-Little Rock
Arkansas-Little Rock Trojans men's basketball team
Arkansas-Little Rock Trojans men's basketball team
|
15076
|
https://en.wikipedia.org/wiki/International%20Data%20Encryption%20Algorithm
|
International Data Encryption Algorithm
|
In cryptography, the International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a symmetric-key block cipher designed by James Massey of ETH Zurich and Xuejia Lai and was first described in 1991. The algorithm was intended as a replacement for the Data Encryption Standard (DES). IDEA is a minor revision of an earlier cipher Proposed Encryption Standard (PES).
The cipher was designed under a research contract with the Hasler Foundation, which became part of Ascom-Tech AG. The cipher was patented in a number of countries but was freely available for non-commercial use. The name "IDEA" is also a trademark. The last patents expired in 2012, and IDEA is now patent-free and thus completely free for all uses.
IDEA was used in Pretty Good Privacy (PGP) v2.0 and was incorporated after the original cipher used in v1.0, BassOmatic, was found to be insecure. IDEA is an optional algorithm in the OpenPGP standard.
Operation
IDEA operates on 64-bit blocks using a 128-bit key and consists of a series of 8 identical transformations (a round, see the illustration) and an output transformation (the half-round). The processes for encryption and decryption are similar. IDEA derives much of its security by interleaving operations from different groups — modular addition and multiplication, and bitwise eXclusive OR (XOR) — which are algebraically "incompatible" in some sense. In more detail, these operators, which all deal with 16-bit quantities, are:
Bitwise XOR (exclusive OR) (denoted with a blue circled plus ).
Addition modulo 216 (denoted with a green boxed plus ).
Multiplication modulo 216 + 1, where the all-zero word (0x0000) in inputs is interpreted as 216, and 216 in output is interpreted as the all-zero word (0x0000) (denoted by a red circled dot ).
After the 8 rounds comes a final “half-round”, the output transformation illustrated below (the swap of the middle two values cancels out the swap at the end of the last round, so that there is no net swap):
Structure
The overall structure of IDEA follows the Lai–Massey scheme. XOR is used for both subtraction and addition. IDEA uses a key-dependent half-round function. To work with 16-bit words (meaning 4 inputs instead of 2 for the 64-bit block size), IDEA uses the Lai–Massey scheme twice in parallel, with the two parallel round functions being interwoven with each other. To ensure sufficient diffusion, two of the sub-blocks are swapped after each round.
Key schedule
Each round uses 6 16-bit sub-keys, while the half-round uses 4, a total of 52 for 8.5 rounds. The first 8 sub-keys are extracted directly from the key, with K1 from the first round being the lower 16 bits; further groups of 8 keys are created by rotating the main key left 25 bits between each group of 8. This means that it is rotated less than once per round, on average, for a total of 6 rotations.
Decryption
Decryption works like encryption, but the order of the round keys is inverted, and the subkeys for the odd rounds are inversed. For instance, the values of subkeys K1–K4 are replaced by the inverse of K49–K52 for the respective group operation, K5 and K6 of each group should be replaced by K47 and K48 for decryption.
Security
The designers analysed IDEA to measure its strength against differential cryptanalysis and concluded that it is immune under certain assumptions. No successful linear or algebraic weaknesses have been reported. , the best attack applied to all keys could break IDEA reduced to 6 rounds (the full IDEA cipher uses 8.5 rounds). Note that a "break" is any attack that requires less than 2128 operations; the 6-round attack requires 264 known plaintexts and 2126.8 operations.
Bruce Schneier thought highly of IDEA in 1996, writing: "In my opinion, it is the best and most secure block algorithm available to the public at this time." (Applied Cryptography, 2nd ed.) However, by 1999 he was no longer recommending IDEA due to the availability of faster algorithms, some progress in its cryptanalysis, and the issue of patents.
In 2011 full 8.5-round IDEA was broken using a meet-in-the-middle attack. Independently in 2012, full 8.5-round IDEA was broken using a narrow-bicliques attack, with a reduction of cryptographic strength of about 2 bits, similar to the effect of the previous bicliques attack on AES; however, this attack does not threaten the security of IDEA in practice.
Weak keys
The very simple key schedule makes IDEA subject to a class of weak keys; some keys containing a large number of 0 bits produce weak encryption. These are of little concern in practice, being sufficiently rare that they are unnecessary to avoid explicitly when generating keys randomly. A simple fix was proposed: XORing each subkey with a 16-bit constant, such as 0x0DAE.
Larger classes of weak keys were found in 2002.
This is still of negligible probability to be a concern to a randomly chosen key, and some of the problems are fixed by the constant XOR proposed earlier, but the paper is not certain if all of them are. A more comprehensive redesign of the IDEA key schedule may be desirable.
Availability
A patent application for IDEA was first filed in Switzerland (CH A 1690/90) on May 18, 1990, then an international patent application was filed under the Patent Cooperation Treaty on May 16, 1991. Patents were eventually granted in Austria, France, Germany, Italy, the Netherlands, Spain, Sweden, Switzerland, the United Kingdom, (, filed May 16, 1991, issued June 22, 1994 and expired May 16, 2011), the United States (, issued May 25, 1993 and expired January 7, 2012) and Japan (JP 3225440) (expired May 16, 2011).
MediaCrypt AG is now offering a successor to IDEA and focuses on its new cipher (official release on May 2005) IDEA NXT, which was previously called FOX.
Literature
Hüseyin Demirci, Erkan Türe, Ali Aydin Selçuk, A New Meet in the Middle Attack on The IDEA Block Cipher, 10th Annual Workshop on Selected Areas in Cryptography, 2004.
Xuejia Lai and James L. Massey, A Proposal for a New Block Encryption Standard, EUROCRYPT 1990, pp. 389–404
Xuejia Lai and James L. Massey and S. Murphy, Markov ciphers and differential cryptanalysis, Advances in Cryptology — Eurocrypt '91, Springer-Verlag (1992), pp. 17–38.
References
External links
RSA FAQ on Block Ciphers
SCAN entry for IDEA
IDEA in 448 bytes of 80x86
IDEA Applet
Java source code
Block ciphers
Broken block ciphers
|
1146204
|
https://en.wikipedia.org/wiki/Linux%20on%20embedded%20systems
|
Linux on embedded systems
|
Operating systems based on the Linux kernel are used in embedded systems such as consumer electronics (i.e. set-top boxes, smart TVs, personal video recorders (PVRs), in-vehicle infotainment (IVI), networking equipment (such as routers, switches, wireless access points (WAPs) or wireless routers), machine control, industrial automation, navigation equipment, spacecraft flight software, and medical instruments in general).
Because of their versatility, operating systems based on the Linux kernel can be also found in mobile devices that are actually touchscreen-based embedded devices, such as smartphones and tablets, together with personal digital assistants (PDAs) and portable media players that also include a touchscreen. This is a challenge for most learners because their computer experience is mainly based on GUI (Graphical user interface) based interaction with the machine and high-level programming on the one hand and low-level programming of small microcontrollers on the other hand while the concept of command line interfaces is widely unknown.
History
The Linux kernel has been ported to a variety of CPUs which are not only primarily used as the processor of a desktop or server computer, but also ARC, ARM, AVR32, ETRAX CRIS, FR-V, H8300, IP7000, m68k, MIPS, mn10300, PowerPC, SuperH, and Xtensa processors. Linux is also used as an alternative to using a proprietary operating system and its associated toolchain.
Variants
The Embeddable Linux Kernel Subset is a Linux distribution that fits on a floppy disk for outdated or low resource hardware.
Devices coverage
Due to its low cost (freely available source code) and ease of customization, Linux has been shipped in many consumer devices. Devices covering PDAs (like the Sharp Zaurus family), TomTom GPS navigation devices, residential gateways like the Linksys WRT54G series or smartphones such as the Motorola exz series, Openmoko handsets, devices running Sailfish OS developed by Jolla like Jolla C and Intex Aqua Fish and the Nokia N900 and Nokia N9.
Android, a Linux-kernel-based operating system acquired and extended by Google and introduced in 2008, has become a highly competitive platform for smartphones and tablets. In July 2012, Android's smartphone market share in the United States was at 52%, reaching 82% worldwide in Q2 2015.
Communities
With the availability of consumer embedded devices, communities of users and developers were formed around these devices: replacement or enhancements of the Linux distribution shipped on the device has often been made possible thanks to availability of the source code and to the communities surrounding the devices. Due to the high number of devices, standardized build systems have appeared, including Yocto, OpenEmbedded, Buildroot, OpenWrt, and LTIB.
Platform usage
The advantages of embedded Linux over proprietary embedded operating systems include multiple suppliers for software, development and support; no royalties or licensing fees; a stable kernel; the ability to read, modify and redistribute the source code. The technical disadvantages include a comparatively large memory footprint (kernel and root filesystem); complexities of user mode and kernel mode memory access, and a complex device drivers framework.
Limitations
Not every embedded Linux distribution is required to or meets real-time requirements. This is particular relevant for safety critical applications and systems.
Projects to develop real-time and safety-critical support are Real-Time Linux (PREEMPT_RT) and ELISA (under Linux Foundation). Real Time Linux project aims mainlining the PREEMPT_RT-version.
See also
Articles:
Convergent Linux Platform
Linux range of use
Linux for mobile devices
Products/Distributions:
BusyBox
Debian – used on Raspberry Pi
Embeddable Linux Kernel Subset
Emdebian Grip
Familiar Linux
Google's Android well-known type of embedded Linux, e.g. on smartphones
Mobilinux
OpenMoko
OpenWrt
RTLinux
Tizen – embedded Linux for smartphones
Ubuntu - Core and Server, on RPi, x86, ARM
Vendors:
Access Co.
Canonical with Ubuntu Core and Ubuntu Server
LynuxWorks
Mentor Graphics
MontaVista Software
Wind River Systems
TimeSys
ENEA AB
SUSE
References
Further reading
See also
Preemption (computing)
Safety-critical system
External links
Embedded Linux course on youtube (Zedboard)
Embedded Linux mailist list archive
Embedded Debian Project (obsolete)
VxWorks to Embedded Linux: a Success Story
Embedded Linux Wiki: A centralized place for sharing Embedded Linux Knowledge
Embedded operating systems
|
2369189
|
https://en.wikipedia.org/wiki/Microsoft%20Forefront%20Threat%20Management%20Gateway
|
Microsoft Forefront Threat Management Gateway
|
Microsoft Forefront Threat Management Gateway (Forefront TMG), formerly known as Microsoft Internet Security and Acceleration Server (ISA Server), is a network router, firewall, antivirus program, VPN server and web cache from Microsoft Corporation. It runs on Windows Server and works by inspecting all network traffic that passes through it.
Features
Microsoft Forefront TMG offers a set of features which include:
Routing and remote access features: Microsoft Forefront TMG can act as a router, an Internet gateway, a virtual private network (VPN) server, a network address translation (NAT) server and a proxy server.
Security features: Microsoft Forefront TMG is a firewall which can inspect network traffic (including web content, secure web content and emails) and filter out malware, attempts to exploit security vulnerabilities and content that does not match a predefined security policy. In technical sense, Microsoft Forefront TMG offers application layer protection, stateful filtering, content filtering and anti-malware protection.
Network performance features: Microsoft Forefront TMG can also improve network performance: It can compress web traffic to improve communication speed. It also offers web caching: It can cache frequently-accessed web content so that users can access them faster from the local network cache. Microsoft Forefront TMG 2010 can also cache data received through Background Intelligent Transfer Service, such as updates of software published on Microsoft Update website.
History
Microsoft Proxy Server
The Microsoft Forefront Threat Management Gateway product line originated with Microsoft Proxy Server. Developed under the code-name "Catapult", Microsoft Proxy Server v1.0 was first launched in January 1997, and was designed to run on Windows NT 4.0. Microsoft Proxy Server v1.0 was a basic product designed to provide Internet Access for clients in a LAN Environment via TCP/IP. Support was also provided for IPX/SPX networks (primarily used in legacy Novell NetWare environments), through a WinSock translation/tunnelling client which allowed TCP/IP applications, such as web browsers, to operate transparently without any TCP/IP on the wire. Although well-integrated into Windows NT4, Microsoft Proxy Server v1.0 only had basic functionality, and came in only one edition. Extended support for Microsoft Proxy Server v1.0 ended on 31 March 2002.
Microsoft Proxy Server v2.0 was launched in December 1997, and included better NT Account Integration, improved packet filtering support, and support for a wider range of network protocols. Microsoft Proxy Server v2.0 exited the extended support phase and reached end of life on 31 December 2004.
ISA Server 2000
On 18 March 2001, Microsoft launched Microsoft Internet Security and Acceleration Server 2000 (ISA Server 2000). ISA Server 2000 introduced the Standard and Enterprise editions, with Enterprise-grade functionality such as High-Availability Clustering not included in the Standard Edition. ISA Server 2000 required Windows 2000 (any edition), and will also run on Windows Server 2003. In accordance with Microsoft's Support Lifecycle Policy, ISA Server 2000 was the first ISA Server product to use the 10-year support lifecycle with 5 years of Mainstream support and five years of Extended support. ISA Server 2000 reached End of Life on 12 April 2011.
ISA Server 2004
Microsoft Internet Security and Acceleration Server 2004 (ISA Server 2004) was released on 8 September 2004. ISA Server 2004 introduced multi-networking support, integrated virtual private networking configuration, extensible user and authentication models, application layer firewall support, Active Directory integration, SecureNAT, and improved reporting and management features. The rules based configuration was also considerably simplified over ISA Server 2000 version.
ISA Server 2004 Enterprise Edition included array support, integrated Network Load Balancing (NLB), and Cache Array Routing Protocol (CARP). One of the core capabilities of ISA Server 2004, dubbed Secure Server Publishing, was its ability to securely expose their internal servers to Internet. For example, some organizations use ISA Server 2004 to publish their Microsoft Exchange Server services such as Outlook Web Access (OWA), Outlook Mobile Access (OMA) or ActiveSync. Using the Forms-based Authentication (FBA) authentication type, ISA Server can be used to pre-authenticate web clients so that traffic from unauthenticated clients to published servers is not allowed.
ISA Server 2004 is available in two editions, Standard and Enterprise. Enterprise Edition contains features enabling policies to be configured on an array level, rather than on individual ISA Servers, and load-balancing across multiple ISA Servers. Each edition of ISA Server is licensed per processor. (The version included in Windows Small Business Server 2000/2003 Premium includes licensing for 2 processors.)
ISA Server 2004 runs on Windows Server 2003 Standard or Enterprise Edition. Appliance hardware containing Windows Server 2003 Appliance Edition and ISA Server Standard Edition is available from a variety of Microsoft Partners.
ISA Server 2006
Microsoft Internet Security and Acceleration Server 2006 (ISA Server 2006) was released on 17 October 2006. It is an updated version of ISA Server 2004, and retains all features from ISA Server 2004 except Message Screener.
ISA Server 2006 introduced new features including:
Support for Exchange Server 2007 (referred to as "Exchange 12" in the Microsoft ISA Server 2006 Evaluation Guide)
New configuration wizards for various tasks such as setting up a "site-to-site VPN connection", publishing SharePoint services, publishing websites, creating firewall rules.
Introduction of single sign-on for groups of published web sites.
Improvements to user authentication including the addition of LDAP Authentication support
Resistance to flood attacks, to protect the ISA server from being "unavailable, compromised, or unmanageable during a flooding attack."
Performance features such as BITS Caching, Web Publishing Load Balancing and HTTP compression.
ISA Server Appliance Edition
Microsoft also offered ISA Server 2006 Appliance Edition. It was designed to be pre-installed onto OEM hardware (server appliances) that are sold by hardware manufacturers as a stand-alone firewall type device. Along with Appliance Edition, ISA server 2006 Standard Edition and Enterprise Edition were available in preconfigured hardware.
Microsoft Forefront TMG MBE
Microsoft Forefront Threat Management Gateway Medium Business Edition (Forefront TMG MBE) is the next version of ISA Server which is also included with Windows Essential Business Server. This version only runs on the 64-bit edition of Windows Server 2008 and does not support Enterprise edition features such as array support or Enterprise policy. Mainstream support for Forefront TMG MBE ended on 12 November 2013.
Microsoft Forefront TMG 2010
Microsoft Forefront Threat Management Gateway 2010 (Forefront TMG 2010) was released on 17 November 2009. It is built on the foundation of ISA Server 2006 and provides enhanced web protection, native 64-bit support, support for Windows Server 2008 and Windows Server 2008 R2, malware protection and BITS caching. Service Pack 1 for this product was released on 23 June 2010. It includes several new features to support Windows Server 2008 R2 and SharePoint 2010 lines of products. Service Pack 2 for this product was released on 10 October 2011. On 9 September 2012 Microsoft announced no further development will take place on Forefront Threat Management Gateway 2010 and the product will no longer be available for purchase as of 1 December 2012. Mainstream support ceased on 14 April 2015 and extended support has ended on 14 April 2020.
See also
Microsoft Servers
Microsoft Forefront
Microsoft Forefront Unified Access Gateway
References
External links
TMG TechCenter
Forefront TMG (ISA Server) Product Team Blog
Richard Hicks' Forefront TMG Blog
Forefront Threat Management Gateway
Firewall software
Computer security software
Proxy servers
1997 software
Content-control software
|
38175469
|
https://en.wikipedia.org/wiki/Justo%20Gonzalo
|
Justo Gonzalo
|
Justo Gonzalo Rodríguez-Leal (Barcelona, Spain, March 2, 1910 – Madrid, Spain, September 28, 1986),
Spanish neuroscientist, after obtaining his bachelor's degree in medicine, he specialized in Austria and Germany (1933–35) with a grant from the Junta para Ampliación de Estudios e Investigaciones Científicas (Council for the Extension of Studies and Scientific Research), and subsequently carried out extensive research on human brain functions based largely on brain injuries from the Spanish Civil War (1936–39). He characterized what he called the central syndrome of the cortex (multisensory and bilateral disorder caused by a unilateral lesion in a parieto-occipital association area), which he interpreted based on physiological laws of nervous excitability and a model of brain dynamics where the cortex is conceived as a dynamic functional unit with specificity in gradation, providing a solution to the question of brain localization. He described and interpreted phenomena such as inverted perception and multisensory and motor facilitation, among others. By applying concepts of dynamic similarity, he formulated and proved potential allometric laws in the loss of functions and in the sensory organization. He belonged to the Spanish National Research Council (CSIC) from 1942 until his retirement, and he was lecturer of 21 PhD courses (1945-1966) on brain physiopathology at the Faculty of Medicine in the University of Madrid. He received awards from the CSIC (1941), the Royal Academy of Medicine (1950) and the Spanish Society of Psychology (1958).
His scientific contribution
His book Investigaciones sobre la nueva Dinámica Cerebral. La actividad cerebral en función de las condiciones dinámicas de la excitabilidad nerviosa
contains part of his fundamental contributions and is the first time that the term Brain Dynamics is used in the scientific literature to describe the organization of sensory functions. It consists of two volumes, the first one published in 1945 focused on visual functions and the second one published in 1950 dedicated to tactile functions and where concepts exposed in the first one are expanded. In this book the author exposes what he called central syndrome of the cortex, as a multisensory affection with bilateral symmetry, originated by a unilateral parieto-occipital cortical lesion in an associative area equidistant from the visual, tactile, and auditory projection areas.
The syndrome presents dynamic effects such as the multisensoriality and symmetrical bilaterality of the disorder, which also involves all functions from simple excitability to more complex functions. Another dynamic effect is the progressive loss of functions and a decomposition of some of them into partial reactions as the intensity of the stimulus decreases. This gives rise, for example, to tilted or even inverted vision, in which the image is perceived as increasingly tilted at the same time as it loses shape, color and size until it is almost inverted in the most acute case. This was the first exhaustive study of inverted or tilted vision (Gonzalo, 1945).
The author also observed inverted perception in touch (1950) and hearing (1952), for none of which there were precedents, and generalized the inversion process in the central syndrome to sensory systems of a spatial nature.
Gnosic or cognitive and complex functions are the first to be lost since they require greater brain excitation and, thus, greater brain integration. Thus, a continuity was established between elementary and higher sensory functions, based on the same physiological laws.
A dynamic phenomenon related to the previous one is the disappearance in part of some disorders by intensification of the stimulus or by temporal summation (iteration of the stimulus), or by the emerging capacity for facilitation, according to which the functions are recovered by the presence of another type of stimulus of the same or different modality (multisensory facilitation), or by motor activity such as muscular effort, of all of which there was no precedent of detailed studies. For example, tactile and auditory stimuli, and in particular muscular effort, improve perception, partly compensating for the deficit of nervous excitation due to the loss of nonspecific (or multispecific) neuronal mass caused by the lesion. For example, the visual field, which shows concentric reduction, increased up to 5 times in the most acute case, and the image recovered the correct orientation by means of an strong muscular contraction. This capacity is greater the larger the brain lesion and the lower the intensity of the original stimulus.
The author observed and studied other remarkable phenomena such as color delocalization, reversal in motion perception, the disorder by which the patient was able to read a text equally well upright or rotated 180 degrees without noticing any difference, and the disorder of allocentric orientation, among others.
His research filled the gap then existing between brain pathology and the physiology of the nervous system, since the phenomena observed were governed by the laws of nervous excitability, which was a radical change with respect to the concepts in use at that time.
Gonzalo found not only the cases described in his book but about 35 cases of central syndrome of varying intensity (Gonzalo, 1952). The author also analyzes in depth the famous Schneider case of Goldstein and Gelb (2018),
which he interprets according to the aforementioned syndrome.
He proposed a spiral development of the sensory field in the integrative brain process (Gonzalo, 1951, 1952) and introduced the idea of functional brain gradients across the cortex (Gonzalo, 1952). These gradients are functions in gradation that represent the density of specific sensory function at each point in the cortex, related to the density of specific neurons and their connections, taking a maximum value in the corresponding projection area and gradually decreasing throughout the cortex, with the end of the decline reaching other projection areas. The multiple types of cortical syndromes from first hand and other authors was interpreted according to the model of gradients, depending on the position and magnitude of the lesion, finding a continuous transition between the syndromes of the projection area and the central one.
Gonzalo later developed the concepts of dynamic similarity and allometry applied to the central syndrome, this being understood as the result of a change of scale in the nervous excitability of the cerebral system with respect to the normal case.
According to the principle of dynamic similarity, the change of scale in a system results in its different parts changing differently (allometrically). He then found allometric relationships, scaling power laws, between the different sensory functions. The gradual loss of these functions in the central syndrome was thus interpreted and formalized. These concepts, including that of gradients, were also applied to the language system. All this last research remained unpublished and is partially collected in Supplement II in the reprint of Gonzalo's work (Gonzalo, 2010) and in later works,
(see below the works of Gonzalo-Fonrodona and Porras in the section
'Works on Justo Gonzalo's research work').
Early years
Justo Gonzalo was born and lived in Barcelona, Spain; then spent several years in Valencia, Spain; returned to Barcelona, and finally moved to Madrid, Spain, to study medicine, obtaining his bachelor's degree there in 1933. During 1933-34, he carried out studies at the Nervenklinik (mental hospital) of Vienna University, on clinical neurology and animal testing with Hans Hoff, and also on brain cytoarchitecture with Otto Pötzl, at Constantin von Economo's laboratory. During 1934–35 he carried out research on brain pathology with Karl Kleist at the mental hospital of the Goethe University Frankfurt, granted a scholarship by the Junta para Ampliación de Estudios (Council for the Extension of Studies and Scientific Research). After returning to Madrid, he combined clinical neurology at the then called Hospital General de Madrid with brain anatomoclinical research at the Cajal Institute.
It was during this time that he wrote his first works (see section: Justo Gonzalo's published works).
Spanish Civil War and post-war period
After the outbreak of the Spanish Civil War (1936–39), he resumed the neurological activities at the Hospital General de Madrid and the brain anatomoclinical studies at the Cajal Institute until he practiced war medicine in the Republican front (1937). He was called in 1938 by Gonzalo Rodríguez Lafora, head of the Center for Brain Injuries at Neurological Military Hospital of Godella (Hospital Militar Neurológico de Godella) in Valencia, to work there as a neurologist,
where he stayed until the end of the war. During this period, he conducted detailed observations on numerous brain-injured subjects and performed, despite the extreme conditions, a fundamental part of his research.
Some selected cases were carefully study in the course of several years.
In the summer of 1938, he discovered, among other singular disorders, near-inverted vision in the war wounded man he termed case M, and in 1939 characterized what he called central syndrome of the cortex, which exhibited peculiar dynamic phenomena. The observations could not be understood until he uncovered the permeability developed by this type of patient to temporal summation and multisensory and motor facilitation.
The first results were presented in 1941 to the Spanish National Research Council in a 94-page report in Spanish entitled Investigaciones sobre Dinámica Cerebral. La dinámica en el sistema nervioso. Estructuras sensoriales por sincronización cerebral (Research on Brain Dynamics. Dynamics in the nervous system. Sensory structures by brain synchronization), which was awarded by this organism that same year. During the years 1942-44, established in Madrid and sponsored by the Cajal Institute, he obtained a more precise quantitative evaluation of the phenomena, in spite of the difficulties in obtaining the most indispensable experimental instruments.
In 1945, the Cajal Institute, now part of the Spanish National Research Council, published the first volume of his book on Brain Dynamics, mainly devoted to visual functions.
Apart from local references to the aforementioned volume at the time of its publication,
other references stand out, some of them international
despite the fact that the book was written in Spanish, being notorious, for example, the comment by Viembi in 1946 in the prestigious magazine edited by Buscaino:
or the commentary by Bender and Teuber (1948):
Also De Ajuriaguerra and Hécaen
refer in several pages to this research and emphasize (p. 279): "...let us also cite in Spanish the very important volume by J. Gonzalo" (translated from French). He also received in 1945-46 letters of praises from authors such as H. Piéron, Robert Bing, D. Katz, W. Köhler (the last two in connection with Gestalt theory), G. Rodríguez Lafora, C. Jiménez Díaz, J. Germain, etc.
From 1942 until his retirement, Justo Gonzalo was a full-time member of the Spanish National Research Council. From 1945 he taught PhD-level courses in brain pathophysiology at the University of Madrid, where he had a laboratory of brain physiopathology. In his PhD courses, he presented the results of his research in detail. It can be said that he worked alone in the scientific aspect, occasionally helped in other aspects by some former students, administrative personnel and always supported by his family, and since 1945 by his wife Ana María Fonrodona Masuet.
Subsequent years
In 1950, the second volume of the aforementioned book on Brain Dynamics was published, it was focused on tactile functions and to generalization of concepts introduced in the first volume. Justo Gonzalo describes in it his observation in 1946 of tactile inversion (of which there were no precedents) and its interpretation. Thus, the author generalized the inversion process in the aforementioned central syndrome to all sensory systems of spatial nature, corroborating it in the auditory system in 1946, as he refers to in his subsequent publication in 1952 (Gonzalo 1952). In 1950 he was awarded by the Spanish Royal Academy of Medicine.
In the works published in 1951 and 1952 (see section 'Justo Gonzalo's published works'), Gonzalo set forth the idea of spiral development of the sensory field, as well as the so-called functional cerebral gradients through the cortex (Gonzalo 1952), concepts that he had already described in detail in the PhD courses. In the publication of 1952 he includes about 20 cases of central syndromes of varying intensity.
In 1952 he carried out a search in all the Spanish territory of subjects with brain lesions. He selected about 100 out of near 3000. Most of them are Civil War wounded and he explores them in Madrid. He finds a total of 35 cases with the same type of central syndrome of varying intensity, as shown for example on p. 78 of Supplement II of the reprint Dinámica Cerebral of 2010.
In the PhD courses, which he taught with great vehemence and dedication, he also exposed the concepts of dynamic similarity and allometry applied to the aforementioned syndrome, this latter being understood as the result of a change of scale in the nervous excitability of the system with respect to that of the normal case.
He did not get to publish these concepts, which are partially collected in subsequent works.
Among the many private comments he received from students about the Ph.D. courses, the one with a reference is indicated,
as well as the comment that appears, in 1967, in a commemorative publication of the "Neurology Service of Nicolás Achúcarro":
In 1958 he was awarded by the Spanish Society of Psychology, and in this period there were many references to the book
The book went out of print and was never reprinted.
Reorganizations in the Faculty of Medicine in 1966 prevented him from continuing to teach the aforementioned PhD courses despite the great interest they aroused among students and the request by letter to the Dean of the Faculty of Medicine signed by several Professors such as Vice-Dean Botella Llusiá, Jiménez Díaz, Gilsanz, Ortz LLorca and Vara López.
With this, the associated brain pathophysiology laboratory disappeared.
During these years he had already made large and numerous graphs drawn by draughtsmen, for didactic purposes, and especially for the following publication announced as an extensive work. But this publication never came into being. The cause of this was the author's own way of being, extremely self-demanding and who could not conceive of partial communications except for PhD courses, also great administrative difficulties, and with the passage of time, health problems.
Last years
He further developed the concepts of similarity and allometry on the basis of the biological principles of development and growth, applying them to brain dynamics and extending this formalization to the auditory system and language, leading to what the author called a "neurophysics" of the cerebral cortex.
Part of such research is collected in Supplement II of the 2010 reprint of his book and in works by Gonzalo-Fonrodona and Porras (2007, 2009, 2011, 2013, 2014) (see section: `Works on Justo Gonzalo's research').
He also approached multiple and varied subjects of Biology, Philosophy, Physics and Cybernetics, establishing connections with his research of brain dynamics.
At this time, reference is also made to J. Gonzalo's brain dynamics.
even from a philosophical point of view,
awakening a special interest in the field of Cybernetics and Artificial Intelligence.
In 1976 he came into contact with physicists and engineers interested in cybernetic models of brain dynamics. In this context, in the doctoral thesis of the engineer A. Delgado
directed by the physicist J. Mira, several of Gonzalo's ideas and data are considered to be basic, together with those of Lashley and Luria, in the functional organization of nervous tissue in relation to behavior.
His research was interrupted only because of his decease in 1986.
Additional information
After the death of J. Gonzalo, work was carried out in the field of Artificial Intelligence in relation to the research of this author.
There are also historical references to his work
His works are also referenced in an historical
and neurological sense
(see also the section `Works on Justo Gonzalo's research work´`).
For example, worth mentioning is the comment: "Besides Santiago Ramon y Cajal, several authors can be considered founders of the Spanish Neuroscience and Neuropsychology such as Cubí, Simarro, Lafora, Gonzalo, Lorente de Nó". (Translated from Spanish).
Studies carried out in the 2000s have reported phenomena on tilted or inverted perception and multisensory integration that are similar to those described by Justo Gonzalo. Also, cortical modellings proposed are closely related to the model developed by Justo Gonzalo. Presentation and formalization of the work of J. Gonzalo in the current context is exposed in the works of Gonzalo-Fonrodona and Porras listed below in the section `Works on Justo Gonzalo's research work´.
In 2010, coinciding with the centennial of his birth, the Red Temática en Tecnologías de Computación Artificial/Natural (thematic network on artificial/natural computation technologies), together with the University of Santiago de Compostela, published a facsimile edition of the two volumes published in 1945 and 1950 respectively, plus several annexes; the contents of Annex II (Suplemento II) had never been published before. The whole, of about 1000 pages, is entitled Dinámica Cerebral (Open Access).
J. Gonzalo's library was donated to the Spanish National Research Council (CSIC), the neurobiology part being at the Cajal Institute where about 200 histological preparations made between 1930 and 1936 approximately were also donated.
Justo Gonzalo's published works
Gonzalo, J. (1933). «Los factores endógenos en la corea de Sydenham». Archivos de Neurobiología XIII(4,5,6): pp. 1–15. .
Gonzalo, J. (1934). «Contribución al estudio del esquizoide». Archivos de Neurobiología XIV(6): pp. 1–17. .
Gonzalo, J. (1934). «Los tipos de motilidad. Contribución a la sistemática del movimiento.» Archivos de Neurobiología XIV(1): pp: 1-23. .
Gonzalo, J. (1935). «Contestación al Dr. Nieto». Archivos de Neurobiología XV(3): pp. 417–421. .
Gonzalo, J. (1935). «Sobre la localización y fisiopatología del tálamo y del subtálamo». Archivos de Neurobiología XV(4): pp. 625–668.
Gonzalo, J. (1936). «Nuevos estudios talámicos. Síndrome talámico puro por degeneración secundaria». Archivos de Neurobiología. Marzo. pp. 111–129.
Kleist, V.K.; Gonzalo, J. (1938). «Über Thalamus und Subthalamussyndrome und die Störungen einzelner Thalamuskerne». Monastsschrift für Psychiatrie und Neurologie Sondeabdruck aus Band 99: pp. 87–130.
Gonzalo, J. (1945). Investigaciones sobre la nueva Dinámica Cerebral. La actividad cerebral en función de las condiciones dinámicas de la excitabilidad nerviosa. Volumen Primero: pp. 1–392. Madrid: Consejo Superior de Investigaciones Científicas, Inst. S. Ramón y Cajal. Included as Vol. 1 in the facsimile edition of 2010 Dinámica Cerebral, Open Access. English translation (2021), Open Access.
Gonzalo, J. (1950). Investigaciones sobre la nueva Dinámica Cerebral. La actividad cerebral en función de las condiciones dinámicas de la excitabilidad nerviosa. Volumen Segundo: pp. 393–827. Madrid: Consejo Superior de Investigaciones Científicas, Inst. S. Ramón y Cajal. Included as Vol. 2 in the facsimile edition of 2010 Dinámica Cerebral, Open Access.
Gonzalo, J. (1951). «La cerebración sensorial y el desarrollo espiral». Trabajos del Inst. Cajal de Investigaciones Biológicas XLIII: pp. 209–260.
Gonzalo, J. (1952) «Las funciones cerebrales humanas según nuevos datos y bases fisiológicas. Una introducción a los estudios de Dinámica Cerebral». Trabajos del Inst. Cajal de Investigaciones Biológicas XLIV: pp. 95–157. Included as 'Suplemento I' in the facsimile edition of 2010 Dinámica Cerebral, Open Access, English translation (2015), Open Access.
Gonzalo, J. (1994). Brain Dynamics According to Human Data and Physiological Bases. (Traducción resumida de la publicación de 1952). Edited by I. Gonzalo and A. Gonzalo, Madrid.
Gonzalo, J. (2010). Dinámica Cerebral, Open Access.
Gonzalo, J. (2021). English translation of Vol. 1 (1945): Brain dynamics: The brain activity according to the dynamic conditions of nervous excitability, Vol. 1. Open Access. Edited by I. Gonzalo. E-prints Complutense, Complutense University of Madrid.
Works on Justo Gonzalo's research work
Ballus, C. (1970). «La maniobra de refuerzo de J. Gonzalo y su objetivización por el test oscilométrico». Anuario de Psicología. Dep. Psicología, Univ. de Barcelona 2: pp. 19–28.
Gonzalo, I.; Gonzalo, A. (1996). «Functional gradients in cerebral dynamics: The J. Gonzalo theories of the sensorial cortex». In Moreno-Díaz, R.; Mira, J. (Eds.) Brain Processes, Theories and Models. An international conference in honor of W.S. McCulloch 25 years after his death. Cambridge, Massachusetts: The MIT Press. pp. 78–87.
Gonzalo, I. (1997). «Allometry in the J. Gonzalo's model of the sensorial cortex» . Lecture Notes in Computer Science (LNCS) 1240: pp. 169–177. https://doi.org/10.1007/BFb0032475
Gonzalo, I. (1999). «Spatial Inversion and Facilitation in the J. Gonzalo's Research of the Sensorial Cortex. Integrative Aspects». Lect. Not. Comp. Sci. (LNCS) 1606: pp. 94–103. https://doi.org/10.1007/BFb0098164
Gonzalo, I.; Porras, M.A. (2001). «Time-dispersive effects in the J. Gonzalo's research on cerebral dynamics». Lect. Not. Comp. Sci. (LNCS) 2084: pp. 150–157. https://doi:10.1007/3-540-45720-8_18
Gonzalo, I.; Porras, M.A. (2003). «Intersensorial summation as a nonlinear contribution to cerebral excitation». Lect. Not. Comp. Sci. (LNCS) 2686: pp. 94–101. https://doi:10.1007/3-540-44868-3_13
Arias, M.; Gonzalo, I. (2004). «La obra neurocientífica de Justo Gonzalo (1910-1986): el síndrome central y la metamorfopsia invertida». Neurología 19: pp. 429–433.
Barraquer Bordas, L. (2005). «La dinámica cerebral de Justo Gonzalo en la historia [`Brain dynamics' of Justo Gonzalo in history]». Neurología 20: pp. 169–173.
Gonzalo-Fonrodona, I. (2007). «Inverted or tilted perception disorder». Revista de Neurología 44(3): pp. 157–165.
Gonzalo-Fonrodona, I.; Porras, M.A. (2007). «Physiological Laws of Sensory Visual System in Relation to Scaling Power Laws in Biological Neural Networks». Lecture Notes in Computer Science (LNCS) 4527: pp. 96–102. https://doi.org/10.1007/978-3-540-73053-8_10
Gonzalo-Fonrodona, I. (2009). «Functional gradients through the cortex, multisensory integration and scaling laws in brain dynamics». Neurocomputing 72: pp. 831–838. https://doi.org/10.1016/j.neucom.2008.04.055
Gonzalo-Fonrodona, I.; Porras, M.A. (2009). «Scaling Power Laws in the Restoration of Perception with Increasing Stimulus in Deficitary Natural Neural Network» . Lecture Notes in Computer Science (LNCS) 5601: pp. 174–183. https://doi.org/10.1007/978-3-642-02264-7_19
Gonzalo-Fonrodona, I.; Porras, M.A. (2011). «Scaling Effects in Crossmodal Improvement of Visual Perception» . Lecture Notes in Computer Science (LNCS) 6687: pp. 267–274. https://doi.org/10.1007/978-3-642-21326-7_29
Gonzalo-Fonrodona, I. (2011). «Justo Gonzalo (1919-1986) y su investigación sobre dinámica cerebral». Rev. Historia de la Psicología 32: pp. 65–78. .
Gonzalo-Fonrodona, I.; Porras, M.A. (2013). «Scaling effects in crossmodal improvement of visual perception by motor system stimulus». Neurocomputing 114: pp. 76–79. https://doi.org/10.1016/j.neucom.2012.06.047
Gonzalo-Fonrodona, I.; Porras, M.A. (2013). «Deficitary nervous excitability and subjective contraction of time: Time-dispersive model». Lecture Notes in Computer Science (LNCS) 7930: pp. 368–375. https://doi.org/10.1007/978-3-642-38637-4_38
Gonzalo-Fonrodona, I.; Porras, M.A. (2014). «Nervous excitability dynamics in a multisensory síndrome and its similitude with normals. Scaling Laws», Open Access. In: Costa, A.; Villalba, E. (Eds.) Horizons in Neuroscience Vol. 13: Chap.10, pp. 161–189.
Gonzalo Fonrodona, I. (2015). «The pioneering research of justo Gonzalo (1910-1986) on brain dynamics». Open Access. (Includes English translation of the article Gonzalo, J. (1952) «Las funciones cerebrales humanas según nuevos datos y bases fisiológicas. Una introducción a los estudios de Dinámica Cerebral» Traba. Inst. Cajal Investig. Biológ. XLIII: pp. 209–260). E-prints Complutense, Universidad Complutense de Madrid (UCM).
García-Molina, A. (2015). «Justo Gonzalo’s groundbreaking contributions to the study of cerebral functional organisation». Neurosciences and History 3(2): pp. 61–67.
References
1910 births
1986 deaths
Spanish neurologists
Neurophysiologists
20th-century Spanish physicians
|
51841773
|
https://en.wikipedia.org/wiki/ConnectEd%20Initiative
|
ConnectEd Initiative
|
ConnectEd is a United States Federal Government Initiative that aims to increase internet connectivity and technology in all public schools to enhance learning. The ConnectEd initiative is funded through Title IV Part A of the Every Student Succeeds Act (ESSA), which designates specific monies for the effective use of technology in schools. The 2016 National Education Technology Plan aligns with ConnectEd as a published action plan to meet these goals of technology integration and connectivity.
The ConnectEd Initiative was announced by President Obama in June 2013 during a speech Mooresville, North Carolina as a plan to increase broadband Internet access in schools, to partner with private companies for affordable devices and innovation, and to redesign school curriculum to better meet the needs of the digital age. This initiative was a response to research done by Education SuperHighway, a nonprofit that evaluates school broadband speed, which showed that only 30% of school districts in the year 2013 had the Federal Communications Commission's minimum internet access goal of 100 Kilobits per second per student.
To meet ConnectEd's goals of upgrading connectivity, training teachers, and encouraging private sector innovation, The United States Department of Education and the Alliance for Excellent Education partnered and created a guide for implementation called the Future Ready Schools framework.
Rationale
Under the Obama administration, the Federal Communications Commission (FCC) created the National Broadband Plan (United States) (NBP) to increase economic competitiveness and foster in-demand digital social interaction access within the United States. This plan was a response to the growing digital divide by socioeconomic status. According to the American Community Survey in 2013, 90% of households that have at least one college-educated parent had internet access, compared to less than 50% of households that had at least one parent with less than a high school diploma had the internet. This lack of access to internet at home can impact ability to perform on assessments, complete online assignments, and apply for jobs. School districts with less resources also experience the digital divide. The 2013 EducationSuperHighway report stated school districts who are affluent were "twice as likely as moderate-income school districts and three times as likely as low-income school districts to meet the FCC's 100 kbps per student goal."
Timeline
Shortly after Obama's 2013 speech unrolling the ConnectEd initiative, over 1,000 educators signed a petition to expand internet access in schools in November 2013.
In November 2014, over 100 superintendents from the Digital Promise League of Innovation were invited to the White House by the Department of Education for the ConnectEd Superintendents Summit and pledge their commitment to enacting ConnectEd. The purpose of the summit was to share ideas about technology education and sign the Future Ready District Pledge. Any public school district can sign and commit to the Future Ready District Pledge to receive additional supports, guidance, and resources about how to transition into digital learning.
In order to achieve the goals of the ConnectEd Initiative, the Alliance for Excellent Education, McGraw-Hill Education, AT&T, and Metri Group collaborated to devise the Future Ready Framework to serve as a roadmap towards digital learning. This roadmap can be used by schools to transition into digital learning. The seven gears of the Framework include Curriculum, Instruction, and Assessment, Use of Space and Time, Robust Infrastructure, Data and Privacy, Community Partnerships, Personalized Learning, and Budget and Resources.
In April 2015, the ConnectEd Library Challenge was announced. This challenge urges public libraries to partner with local officials and school leaders so every child is able to own a library card. In conjunction with the ConnectEd Library Challenge, Obama also announced his e-Books Initiative in the same month. The e-Books Initiative calls for students ages 4–18 to access world-class digital library.
In November 2015, superintendents met at regional summits to create plans using the free interactive planning dashboard, which included a district technology assessment, job-embedded opportunities for personalized learning, and technology policies and practices. The final goal was to use the Framework to make an action plan to bring home to their districts for implementation.
Regional summits continued to be held in year 2016 with plans for regional summits to continue years into the future. Sample agendas [1] include creating plans for implementation at schools, creating a culture of "Future Ready Schools" within schools, districts, and communities, and share insights from current work.
President Obama announced the ConnectEd goal "to provide 99 percent of American students with access to next-generation broadband in their classrooms and libraries by 2018."
Funding
Funding for ConnectEd comes from the U.S. Government in conjunction with private companies such as Esri, Adobe Systems, Autodesk, and others who have provided up to $2 billion to give schools access to "devices, free software, teacher professional development, and home wireless connectivity." From 2014-2016, the Federal Communications Commission's E-Rate program has funded $2 billion to increase high-speed connectivity. The United States Department of Agriculture (USDA) also provides rural schools with an additional $10 million for distance learning. Districts who have signed the "Future Ready District Pledge" have the flexibility in Title I, II, and III funds through the Every Student Succeeds Act to spend towards meeting the ConnectEd goals.
Overview
Upgrading Connectivity
The ConnectEd initiative aims to increase internet connectivity in schools, including high-speed, wired or wireless internet, and broadband capabilities. Increasing bandwidth within schools is a priority of the ConnectEd initiative because as of 2016, 23% of schools do not have enough bandwidth to meet their digital learning needs. This lack of available, sufficient bandwidth has also been called The Connectivity Gap. Furthermore, MDR's State of K-12 Report in 2015 notes that 99% of school district's don’t have the bandwidth capabilities that will be crucial over the next five years.
In order to improve school connectivity, schools must meet three prerequisite goals: have access to fiber optic connections, have affordable bandwidth, and have classrooms capable of a robust Wi-Fi connection. The US Department of Education suggests that schools have of minimum connectivity speed of 100 Mbit/s with a speed of 1 Gbit/s per 1000 students. The Broadband Technology Opportunities Program (BTOP), funded through the American Recovery and Reinvestment Act of 2009, has aided in building technology infrastructure in underserved areas and rural communities throughout the United States; ConnectEd builds on these efforts, focusing especially on rural areas. President Barack Obama stated in speech in Durham, Oklahoma, "while high-speed Internet access is a given, is assumed for millions of Americans, it's still out of reach for too many people, especially in low income and rural communities." In order to encourage investment in rural broadband, Obama's Administration has also continue to support the FCC's Universal Service Fund (USF), which has invested over $25 billion in funding since 2008.
President Obama has asked the Federal Communications Commission (FCC) to leverage the existing E-Rate program and increase the current E-Rate funding cap, as well as use the expertise of the National Telecommunications and Information Administration (NTIA) to deliver this connectivity to states, districts, and schools.
Training Teachers
In order to improve student outcomes, the ConnectEd initiative pairs the Department of Education with states and school districts to create funding plans through Title II of the Elementary and Secondary Education Act for technology professional development. The goal of this professional development is to keep teachers on track with current technological demands. Title IV of the Elementary and Secondary Education Act funds also pay for professional development on computer-based assessmentcomputer-based assessments. In using computer-based assessments, teachers should be able to have more immediate feedback on student learning.
The U.S. Department of Education and the Office of Educational Technology created a Professional Learning Toolkit called Future Ready Schools: Empowering Educators Through Professional Learning to assess district readiness for technological change. This toolkit contains five steps to build capacity in educator practice with the hopes of increasing student outcomes. The first step in the toolkit recommends that school districts set up district leadership team and collect pre-existing technology plans. Schools districts must then devise S.M.A.R.T. goals (Specific, Measurable, Attainable, Realistic, Timely) focused on professional learning and refine them using the Professional Learning Strategies Self-Assessment Tool created by the Toolkit. Once refined, school districts can implement an action plan for professional learning. Finally, school districts assess the effectiveness of their professional learning plan for staff and students based on evidence such as satisfaction of participants, the knowledge they gain, and whether student outcomes increase or not.
With the support of the U.S. Department of Education, the Alliance for Excellent Education created the free, online Future Ready Schools Framework and the Future Ready Schools Interactive Planning Dashboard. District leadership teams use the Interactive Planning Dashboard to plan technology use and assess progress over time, whereas the Future Ready Schools Framework "provides the roadmap for a successful digital transformation." There are 7 Gears in the Future Ready Schools Framework:
Curriculum, Instruction, and Assessment
Personalized Professional Learning
Robust Infrastructure
Data and Privacy
Community Partnerships
Budget and Resources
Use of Space and Time"
These free, online tools are for teachers and district leaders to begin their path into becoming a Future Ready School as well as to continue professional development and to improve their current work in ConnectEd.
In addition to these professional development tools, in-person professional development through Future Ready Schools is available in regional summits. These regional summits are free of charge for district leadership teams.
Another avenue for districts to become "Future Ready Schools" is by garnering support from the International Center for Leadership in Education (which is a Future Ready Schools Coalition Partner). This group will help schools integrate technology and utilize digital learning in classroom through building a professional learning plans, supporting teachers in digital literacy, increasing 1:1 initiatives, and personalizing student learning.
Encouraging Private Sector Innovation
ConnectEd calls on the private sector to provide devices and/or professional development on technology use at a free or discounted rate for schools to be able to meet the ConnectEd initiative with little extra cost. The charge from ConnectEd is have quality devices in schools as well as price-competitive educational software. As such, private sectors are encouraged to supply devices and software for schools at free to low-cost, with choice of the local district educators for type of devices. These new technologies allow for students to be engaged in digital learning in the classroom.
EdX and Coursera have committed to provide free virtual professional development, with specifically EdX allowing free coursework from top universities available to educators.
"Participating hardware, software, wireless and professional development companies include:
Adobe Systems, has begun providing more than $300 million worth of free software to teachers and students, including Photoshop and Premiere Elements for creative projects; Presenter and Captivate to amplify e-learning; EchoSign for school workflow; and a range of teacher training resources
Apple Inc., has donated $100 million in iPads, MacBooks, and other products, along with content and professional development tools to enrich learning in disadvantaged U.S. schools
AT&T, has donated $100 million to give 50,000 middle and high school students in Title I districts free Internet connectivity for educational devices over their wireless network for three years
Autodesk, is making its 3D design program "Design the Future" available for free in every secondary school in the U.S. — more than $250 million in value
Coursera, which is providing no-cost online professional development at every school district over the next two years, including opportunities for teachers to earn Coursera's completion certificates that may be used for continuing education credits
edX, is providing all students with free access to online Advanced Placement-level courses offered through edX by partner institutions like UC Berkeley, MIT, and Georgetown in addition to more than 40 other courses and modules
Esri, is providing $1 billion worth of free access to ArcGIS Online Organization accounts – the same Geographic Information Systems mapping technology used by government and business – to every K-12 school in America to allow students to map and analyze data
Microsoft, has launched a substantial affordability program open to all U.S. public schools by deeply discounting the price of its Windows operating system, which will decrease the price of Windows-based devices
O'Reilly Media, which is partnering with Safari Books Online to make more than $100 million in educational content and tools available for free to every school in the U.S.
Prezi, is providing $100 million in Edu Pro licenses for high schools and all educators across America
The Sprint Corporation will provide one million high-school students who do not have the Internet at home with new digital devices paired with four years of mobile broadband connectivity. This commitment builds on the company's first ConnectED commitment, made in 2014, to connect 50,000 K-12 students nationwide with mobile broadband wireless service.
Verizon, which announced a multi-year program to support ConnectED through up to $100 million in cash and in-kind commitments"
Implications
The Federal Communications Commission (FCC) has committed to providing funding for the ConnectEd initiative. The government estimated that the cost of this initiative would fall between $4 and $6 billion, which would not be funded by tax dollars. However, this funding may come from a rise in the Universal Service Fund (USF), which the FCC has complete control in determining without congress approval. The USF may be increased on cell phone bills in order to pay for this initiative through the FCC's E-rate program.
The American Enterprise Institute has questioned whether the private company partners in the ConnectEd initiative are taking advantage of additional sales, market shares, or publicity rather than focusing on education policy. Through commitments to funding or providing discounts and/or free devices and software, companies are allowed free advertising as well as push for their products over others. As such, the private interests of these companies may overshadow the public interest of education.
Kathryn Drohman from the University of Washington Tacoma has questioned the sustainability of technology tools in schools since they can quickly become obsolete, can be costly to attain and maintain, can be implemented in a variety of ways by individual teachers.
Austan Goolsbee, Obama's first-term chief economic advisor conducted a study in California which showed that students showed in gains with more computer access. Additionally, a study of ninth graders conducted in 2014 in Portugal found that students who had more internet time had lower learning achievement scores.
The Consortium for School Networking (CoSN) has cited several challenges for school districts in meeting ConnectEd's goals: high costs, growth level capacity, reliability of network service, increased digital needs, infrastructure maintenance, wireless connectivity, and addressing off-campus device needs.
References
United States Department of Education
|
37482023
|
https://en.wikipedia.org/wiki/HusITa
|
HusITa
|
husITa (Human Services Information Technology Association) is an international virtual associationand a registered US non-profit organizationestablished with the mission of promoting the ethical and effective use of information technology in the human services. The main focus of husITa, and the claim to expertise of its associates, is situated at the intersection of three core domains: information technology, human services, and social development. husITa pursues its mission through international conferences, publications and research dissemination directed at technology applications and innovations that promote social well-being.
For much of its early history husITa operated as an informal international network of human service academics and practitioners. One of the outcomes of its first international conferencehusITa1 held in 1987 in Birmingham, Englandwas the establishment of a working group to determine the feasibility of an international body 'to highlight the importance of human service computing, to guide developments, and to foster international co-operation'.
The working group was composed of Hein de Graaf (Netherlands), Walter LaMendola (USA), Dick Schoech (USA), and Stuart Toole (UK). Initial projects identified by the working group included the development of research agendas, position papers, repositories of information, and promoting a second husITa conference in 1989. Bryan Glastonbury was later added to the group as secretary. The working group met in Colorado, Denver for three days in May 1988 and published a report on the issues that a husITa international organization would need to address.
Although the 1988 Denver meeting agreed its objectives, husITa wasn't formally established as an organization for another twelve years. The structure of the formal organization was later agreed to at Denver in 2000. The founding members at the Denver 2000 meeting were: Hein de Graaf, Walter LaMendola, Rob MacFadden, Jo Ann Regan, Jackie Rafferty, Jan Steyaert, Dick Schoech, Stuart Toole, and Victor Savtschenko.
In Colorado, local and state Human Service Departments have been providing adequate, quality, client care since the 1950s, with innovations in service programs, resources, and technology, the consistency and type of care is ever changing. In recent years, there has been a substantial shortage of human service programs as well as service professionals within small, rural towns within Colorado. These obstacles seem to be caused by a steadily increasing population of relocating residents, with El Paso County, Colorado (80 miles South of Denver) nearing the largest county population growth in the state of Colorado with roughly 12,526 new residents in the year 2017 alone. By expanding the use of technology to improve the way information and resources are both shared and managed, the barriers of providing accessible, cost effective, services directly and indirectly can be overcome.
Objectives
husITa's objectives (agreed by the 1988 Denver working group) are to:
Facilitate international cooperation in human service technology.
Collect and disseminate information on human service technology, including tackling the problems of language translation.
Provide technical assistance in human service technology and encourage the involvement of countries with a less developed human service IT infrastructure.
Stimulate international discussion on key human service technology issues and encourage position papers in areas such as security/privacy/confidentiality, curriculum content and teaching methods, and ethical issues in systems/software development and use.
Encourage publications about human service information technology.
Encourage international research efforts.
Encourage standards for making human service technology culturally independent.
Journal of Technology in Human Services
The Journal of Technology in Human Services is the official journal of husITa. Formerly known as Computers in Human Services it was launched in 1985 as a Haworth Press publication. Dick Schoech, a professor of social work at the University of Texas at Arlington, was its founding editor. The Journal of Technology in Human Services is a peer-reviewed, refereed journal now published by Taylor & Francis. Its scope includes the potential of information and communication technologies in mental health, developmental disability, welfare, addictions, education, and other human services. The current Editor-in-Chief is Dr. Lauri Goldkind (Associate Professor, Fordham University, USA), Dr. Mamello Thinyane (Principal Research Fellow, United Nations University Institute Macau, SAR), Associate Editor, and Dr. Amanda Taylor Beswick (Academic Non-Clinical, School of Social Sciences, Education and Social Work, Queens University Belfast) book review editor.
International conferences
husITa1: husITa's first international conference was held between in September 1987 in Birmingham, England.
husITa2: Computer Technology and Human Services in the 90s: Advancing Theory and Practice, June 1991 in New Brunswick, New Jersey.
husITa3: Information Technology and the Quality of Life and Services, June 1993 in Maastricht, the Netherlands. The same year saw the formation of a husITa Foundation in the Netherlands which continued until its disestablishment in 2003.
husITa4: Information Technology in the Human Services: Dreams and Realities, June 1996 in Lapland, Finland.
husITa5: Social Services in the Information Society: Closing the GAP, August–September 1999 in Budapest, Hungary.
husITa6: Technology and Human Services in a Multicultural Society, September 2001, in Charleston, South Carolina. However, the conference was cut short as a result of the terrorist attacks in the USA on 11 September 2001. A brief husITa board meeting was held, the by-laws were approved, and officers were elected.
husITa7: Digital Inclusion-Building a Digital Inclusive Society, August 2004 in Hong Kong, China. It had been delayed from its planned date of 2003 due to an outbreak of SARS.
husITa8: Information Technology and Diversity in Human Services: Promoting Strength Through Difference, August 2007 in Toronto, Canada.
husITa9: ICT as a Context for Human Services, June 2010 in Hong Kong, China. This event was held in conjunction with the 2010 Joint World Conference on Social Work and Social Development.
husITa14: Sustainable & Ethical use of Technology. July 9–12, Melbourne, Australia. Held in conjunction with the 2014 Joint World Conference on Social Work, Education, and Social Development.
husITa16: June 29th, 2016, Seoul, Korea. Held in conjunction with the 2016 Joint World Conference on Social Work, Education, and Social Development.
husITa18: July 4--7, Dublin, Ireland. Held in conjunction with the 2018 Joint World Conference on Social Work, Education, and Social Development.
Related human service technology initiatives
husITa was built on the activity of an international network of human service organizations, academics and practitioners in the USA, the UK and the Netherlands. The section below highlights some of the key organizations, people and events.
Early developments
In 1978, Gunther R. Geiss, aprofessor of social work at Adelphi University, New York, conducted a survey of US schools of social work. The survey sought to identify faculty members who had used computers in their administrative, teaching or research activities, or who had consulted or participated in the design and development of computer-based information systems. There were over 80 positive responses indicating a wide range of activities and levels of involvement. The survey initiated the development of a system to track and communicate with individuals with expertise in computers and human services.
Walter LaMendola, professor of social work at the University of Denver in Colorado, described an incident during a social work conference in 1979 suggesting early indications of the resistance of some social work professionals to computer use in the human services. This is a theme which has continued throughout the history of technology use in the human services and continues to the present day. Some aspects of this resistance can be considered as a well-founded concern about the ethical issues surrounding human service technology applications. However, other aspects of technology resistance seem to be a less rational form of Neo-Luddism.
Computer Use in Social Services Network (CUSSN)
Growing interest in the use of technology in the human services led a group of US human service technology specialists, meeting at a Council of Social Work Education conference in Louisville Kentucky in 1981, to form the Computer Use In Social Services Network (CUSSN). By the end of 1981 the network had over 350 members. The CUSSN newsletter continued in print until 1992 when it was merged with the first academic journal on human service technology Computers in Human Services.
In 1984 Gunther Geiss was sponsored by the Silberman Fund to organize the Wye Plantation Conference on Human Services Technology. Conference members developed pre-conference position papers via EYES: a centralized email system.
In 1985, CUSSN developed CUSSNet CUSSNet, a PC and FidoNet based networking system that automatically exchanged emails between members each night during off-peak telephone hours. FidoNet was a PC distributed email, bulletin board, and file sharing system that preceded the Internet. CUSSNet quickly developed nodes in major cities in the US, the UK, and the Netherlands.
The name husITa (Human Service Information Technology Applications) was coined in 1983 by Walter LaMendola and Brian Klepinger at the University of Denver.
The Human Service Microcomputer Conference was held in Seattle.
Computer Applications in Social Work (CASW)
In 1984 Stuart Toole formed Computer Applications in Social Work (CASW) in the UK to set up and run national conferences and to publish the CASW journal.
Based on the success of the first UK technology conferences, Stuart Toole, Walter LaMendola, and Brian Klepinger agreed to pursue an international conference in 1987: this conference was to become HUSITA's first international conference HUSITA1.
The CASW journal was later renamed New Technology in the Human Services in [when] and continued in publication under this title until it was closed in 2003.
In 1986 the second UK conference held on social welfare computing was held.
The Centre for Human Service Technology (CHST)
In 1985 Bryan Glastonbury, from the University of Southampton published Computers in Social Work, the first major academic text on technology and human services. In the same year the University of Southampton began publishing the journal New Technology in the Human Services under the editorship of Bryan Glastonbury. In the same year the University of Southampton established the Centre for Human Service Technology (CHST) with Jackie Rafferty as Director. In 2007, Jan Steyaert joined as adjunct research professor and together they edited a special issue of the British Journal of Social Work on social work in the digital age.
The Centre for Human Service Technology is based at the University of Southampton in England. CHST is an international, multi-disciplinary research center focused on influencing the appropriate use of technology in social work practice and education and researching its implementation and impact.
In July 1997 the CTI Centre for Human Services held a conference on Social Services and Learning Technology hosted by the Institute for Health and Community Services at the University of Bournemouth.
In 2003 the journal New Technology in Human Services ceased publication.
The European Network for Information Technology in Human Services (ENITH)
In 1986 Hein de Graaf, Director of the CREON foundation in the Netherlands, organised the first of a series of three-day gatherings. The CREON foundation was a Dutch foundation for computer research, expertise and support in field of the human services. The gatherings, called WELCOM, were designed to increase the knowledge and understanding of information technology in the Dutch human services. WELCOM1 was held in 1986 in Bussum with Walter LaMendola as the main international speaker. WELCOM2, a smaller Dutch-only conference, took place in 1987, again in Bussum. The next WELCOM event, WELCOM3: a combined conference and fair, was held jointly with HUSITA3 in Maastricht in 1993.
Following the success of HUSITA's first international conference held in Birmingham in 1987 the Dutch Ministry of Social Welfare, Health and Cultural Affairs organized an informal meeting of European experts in the field of Information Technology and Human Services. The meeting was one of the outcomes of a feasibility study carried out by the CREON foundation, concerning international cooperation in this field. A main conclusion of this feasibility study was that an international (European) network should be established for the exchange of products, ideas, expertise, experiences and skills with respect to the introduction and use of IT in the human services. As a first step in this approach the informal meeting of experts was organized. The European network of organizations was called ENITH (European Network Information Technology and Human services).
In 1992 an ENITH3 Expert Meeting on “IT Applications and the Quality of Life and Services” was held in The Netherlands.
In 1994, from September 21 to September 23 an ENITH4 conference was held in Berlin, Germany. Bernd kolleck chaired this conference.
In September 1995 a CAUSA5/ENITH5 conference on “The Impact of Information Technology on Social Policy,” was held in Eindhoven, The Netherlands. Jan Steyaert chaired this conference.
References
External links
Organizations established in 1987
Social work organizations in the United States
Technology organizations
|
18783747
|
https://en.wikipedia.org/wiki/The%20Muthoot%20Group
|
The Muthoot Group
|
The Muthoot Group is an Indian multinational conglomerate headquartered in Kochi, Kerala. It has interests in financial services, information technology, media, healthcare, education, power generation, infrastructure, plantations, precious metal, restaurant, and hospitality. Muthoot Group operates in 29 states in India, and has presence in Nepal, Sri Lanka, US, UK and UAE. The group manages assets of over $4.5 billion. It is owned and managed by the Muthoot family.
The group takes its name from the Muthoot Family based in Kerala. The company was set up by Muthoot Ninan Mathai in 1887 at Kozhencherry, a small town in the Kerala. It was then later taken over by his son M George Muthoot, who incorporated the finance division of the group, which was until then primarily involved in wholesale of grains and timber. The company is now managed by the third and fourth generation of its family members.
History
In 1939, M. George Muthoot created a partnership firm under the name of Muthoot M. George & Brothers (MMG). MMG was a chit fund based out of Kozhencherry. In 1971, the firm was renamed as Muthoot Bankers, and started to finance loans using gold jewellery as collateral. In 2001, the company was renamed to Muthoot Finance. Muthoot Finance falls under the category of systematically important non-banking financial company(NBFC) of the RBI guidelines.
The company has more than 4,500 branches spread across 29 states and union territories of India. Muthoot Finance, according to the IMaCS Research & Analytics Industry Reports [Gold Loans Market in India, 2009 and the 2010 update to the IMaCS Industry Report 2009], is the largest Gold Loan NBFC and has the largest network of branches for a gold loan NBFC in India. Muthoot Finance is also the highest-credit-rated gold loan company in India, with a credit rating of AA (CRISIL) and AA (ICRA) for its long-term debts and P1+ (CRISIL) & A1+ (ICRA) for its Short Term Debt Instruments.
Muthoot Finance has played an instrumental role in organizing and professionalizing gold collateralized loans in India, a concept which emphasizes mobilising household gold jewelry as a channel of credit to borrowers. The total gold holdings among individuals is estimated to be more than 20,000 tonnes.
In 2010, Muthoot Finance sold 4% of its shares in a private equity round to Barings Bank and Matrix Partners, raising . Later in 2011, Muthoot Finance publicly listed its shares on the two biggest stock exchanges in India National Stock Exchange of India and Bombay Stock Exchange. In terms of market capitalisation, Muthoot Finance Ltd is the second largest company in Kerala, first being Federal Bank.
Business sectors
Retail gold banking
Muthoot started offering loans backed by gold jewellery as collateral in 1971. As of 2009, it was the largest non-banking financial company issuing gold-backed loans.
Affordable housing finance
Incorporated in 2013, Muthoot Homefin (India) Limited is a Housing Finance company (HFC) registered with the National Housing Bank. The company has its Corporate Office in Mumbai, and operates primarily in the Western and Central states of India. In an effort to promote the Indian government's initiative of Housing for All, Muthoot Homefin operates primarily in the affordable housing segment, wherein the loans are below . Muthoot Homefin has a long-term credit rating of AA- (ICRA) and a short-term rating of P1+ (ICRA)
Other financial products
The securities brokerage business of the group is undertaken through the subsidiary Muthoot Securities. It operates over 65 business centres in Kerala, Tamil Nadu, Andhra Pradesh and Karnataka. The company offers Equity & Currency trading, Online trading, Portfolio Management Services, Depository services, Mutual funds, PAN card services and Market Research.
Muthoot Precious Metals Corporation (MPMC) was established in May 2006, the company sells coins & bars of 999 Pure 24 Carat gold and silver throughout India. They carry out the sales of these bars and coins through more than 4250 branches of Muthoot Finance. MPMC imports gold bullion from Switzerland and converts them into gold coins of smaller denominations so as to suit the investment requirements of people from different income groups.
The group provides wire transfer services through the branch network of Muthoot Finance since 2002. As of December 2012, there are 7 inward remittances that Muthoot Finance offers Western Union, Xpress Money, Instant Cash, Ez Remit, Transfast, MoneyGram, Global Money.
In 2013, the group also acquired a majority stake in an NBFC in Sri Lanka operating under the brand name of Asia Asset Finance Limited. Asia Asset Finance primarily provides loans to small businesses as well as Gold Loans. The group expanded its Gold Loan business to the UK, wherein it operates under the brand name Muthoot Finance UK. In 2014, the group also acquired a majority stake in a Microfinance company operating under the brand name Belstar Investments.
Incorporated in 1992, Muthoot Vehicle & Asset Finance is a public company engaged in providing vehicle loans. The company operates primarily in South India. The Reserve Bank of India classifies it as a Deposit taking Asset Finance Company.
The Wealth management services division of the group is associated with insurance ranging from life insurance to medical, ULIPs, etc. It was established in 2002. All operations are now run under the name of Muthoot Insurance Brokers Pvt. Ltd.
Information technology
Muthoot Systems and Technologies Pvt Ltd operating under the brand Emsyne, is the Information technology arm of the Muthoot Group, is headquartered in Cochin. The company has been operating for over the past 14 years in the IT sector. Their client list includes US companies such as ARC group, PA, Court Port LLC, SVM, JAL International. The company was established in 1993. It offers information technology services, product engineering, business process outsourcing services and consultancy services to local as well as global clients. The company has recently started its operations in US with a subsidiary in the Philadelphia region. Expansion into other regions of the US and The Middle East is planned.
Media
Muthoot Group operates Chennai Live 104.8 Fm that focuses on the growing demand for urban English music. Established in 2006, Chennai Live is the first talk radio station in India and is the leading English radio channel in Chennai.
Healthcare
Muthoot Hospitals became operational in 1988 and currently operates under the brandname of Muthoot Healthcare. The group operates a chain of multi-speciality hospitals and a network of specialty clinics and diagnostic centres. It also provides several community health programmes that fall under the healthcare division of Muthoot Group. The group operates a specialised Cancer Research Centre in Kozhencherry, 2 multi-speciality hospitals in Kozhencherry and Pathanamthitta as well as Diagnostic Centres spread across the state of Kerala.
Travel and hospitality
The group manages four luxury hotels operating under the brand name of Xandari, in Thekkady, Marari Beach, Fort Kochi and Alajuela, Costa Rica. In addition the group also operates Pampa Villa and Kayal Villa two boutique hotels in Kerala, as well as 10 Kettuvallam's in Kerala which operate under the brand 'Xandari River Escapes'. Xandari River Escapes has been given a five star rating by Trip Advisor.
The group provides tours and travel services through the brand Travel Jango (earlier known as Travel Smart). The services offered by this division include international and domestic air ticketing, tour packages, passport services, emigration and visa services, travel insurance, bus ticketing and foreign exchange.
Housing and infrastructure
Muthoot Housing & Infrastructure, formerly known as Muthoot Builders, was established in 1990. The infrastructure division has residential and commercial projects in South India.
Education
St George's School, New Delhi: It was founded in 1930. As of December 2012, the school has a staff strength of 130 teachers and student strength over 3000. The school operates under the Central Board of Secondary Education
Muthoot College of Allied Health Sciences, Kozhencherry: The institute was established in 2004 and offers major health courses like MLT, MIT etc.
Muthoot Institute of Science & Technology, Kochi: Commenced its first academic year in 2013.
The institute offers courses in all streams of engineering under the Dr. A P J Abdul Kalam Technological University. Paul George Global School, New Delhi: Commenced operations in 2015. The school is recognized by the Central Board of Secondary Education
Sanskara School, Infopark, Kochi: Commenced operations in 2016. The school operates under the Central Board of Secondary Education
Energy
The group formed a dedicated venture – Muthoot Alternate Energy Resources and started a Wind Energy Project in 1993 with wind farms located in Muppandhal village in Kanyakumari district, Tamil Nadu.
Agriculture
The Muthoot Group operates this division on a large scale. Established in 1939, The plantations grow cardamom, tea, coconut and rubber. The division also undertakes a number of eco-friendly initiatives.
Operations outside India
Muthoot Global is a part of Muthoot Group with presence in UAE, US and UK, currently dealing in Gold Loans, Money Transfer, Travel & Tourism and eCommerce. UAE operations commenced in 2002, UK operations started in 2007 and US in 2010. The group plans to diversify its foreign operations to Singapore, Germany and other GCC countries in future.
Muthoot Finserve USA Inc is based out of New Jersey, US. The company offers wire transfer services between US and India.
Muthoot Finance USA LTD is based out of New Jersey, US.
Muthoot Finance UK is based out of London, UK. It currently operates 6 branches within the Greater London area, and primarily provides financial services to the South Asian community.
Muthoot Global Money Transfers is based out of London, UK. The company provides wire transfer services between UK and India.
Xandari Resort & Spa is located in Alajuela, Costa Rica. It is a luxury hotel located within a 30-acre plantation 30 minutes of San José, Costa Rica
Asia Asset Finance is headquartered in Colombo, Sri Lanka. Muthoot Group acquired a majority stake in the company in 2012. Asia Asset Finance is engaged in equipment finance and gold loans.
Sports sponsorships
Delhi Daredevils IPL 2011–2013. The Muthoot Group has been the main sponsor of the team, with the branding on the t-shirt chest of the Jerseys.
Philanthropy
The Muthoot Group's corporate social responsibility efforts are directed towards proper sanitation, education, welfare of the lower income Group of the nation, health and technology and environmental awareness and conservation. The Muthoot Group's Charitable actions/events are all conducted by the Muthoot M George Foundation.
Environment research foundation
The Periyar Foundation set up by Muthoot Hotels is based in the town of Thekkady, near the Periyar National Park has undertaken several projects for the conservation of the national park including 'vasantha sena' and a research study along with the National Institute of Advance Studies for the conservation of 'Nocturnal Flying Squirrels'.
Partnership
The company has signed a partnership agreement with UST Global to expand its business into digital.
See also
Muthoot Family
M George Muthoot
M G George Muthoot
George Alexander Muthoot
References
Companies based in Kochi
Conglomerate companies of India
Financial services companies of India
Indian companies established in 1887
Financial services companies established in 1887
Companies based in Kerala
|
13225690
|
https://en.wikipedia.org/wiki/MAC-Forced%20Forwarding
|
MAC-Forced Forwarding
|
MAC-Forced Forwarding (MACFF) is used to control unwanted broadcast traffic and host-to-host communication. This is achieved by directing network traffic from hosts located on the same subnet but at different locations to an upstream gateway device. This provides security at Layer 2 since no traffic is able to pass directly between the hosts.
MACFF is suitable for Ethernet networks where a layer 2 bridging device, known as an Ethernet Access Node (EAN), connects Access Routers to their clients. MACFF is configured on the EANs.
MACFF is described in RFC 4562, MAC-Forced Forwarding: A Method for Subscriber Separation on an Ethernet Access Network.
Allied Telesis switches implement MACFF using DHCP snooping to maintain a database of the hosts that appear on each switch port. When a host tries to access the network through a switch port, DHCP snooping checks the host’s IP address against the database to ensure that the host is valid.
MACFF then uses DHCP snooping to check whether the host has a gateway Access Router. If it does, MACFF uses a form of Proxy ARP to reply to any ARP requests, giving the router's MAC address. This forces the host to send all traffic to the router, even traffic destined to a host in the same subnet as the source. The router receives the traffic and makes forwarding decisions based on a set of forwarding rules, typically a QoS policy or a set of filters.
References
Internet protocols
Internet Standards
|
69265237
|
https://en.wikipedia.org/wiki/Network%20Protocol%20Virtualization
|
Network Protocol Virtualization
|
Network Protocol Virtualization or Network Protocol Stack Virtualization is a concept of providing network connections as a service, without concerning application developer to decide the exact communication stack composition.
Concept
Network Protocol Virtualization (NPV) was firstly proposed by Heuschkel et. al. in 2015 as a rough sketch as part of a transition concept for network protocol stacks. The concept evolved and was published in a deployable state in 2018.
The key idea is to decouple applications from their communication stacks. Today the socket API requires application developer to compose the communication stack by hand by choosing between IPv4/IPv6 and UDP/TCP. NPV proposes the network protocol stack should be tailored to the observed network environment (e.g. link layer technology, or current network performance). Thus, the network stack should not be composed at development time, but at runtime and needs the possibility to be adapted if needed.
Additionally the decoupling relaxes the chains of the ISO OSI network layer model, and thus enables alternative concepts of communication stacks. Heuschkel et. al. proposes the concept of Application layer middleboxes as example to add additional layers to the communication stack to enrich the communication with useful services (e.g. HTTP optimizations)
The Figure illustrates the dataflow. Applications interface to the NPV software through some kind of API. Heuschkel et. al. proposed socket API equivalent replacements but envision more sophisticated interfaces for future applications. The application payload is assigned by a scheduler to one (of potentially many) communication stack to get processed to network packets, that get sent using networking hardware. A management component decide how communication stacks get composed and how the scheduling scheme should be. To support decisions a management interface is provided to integrate the management system in software-defined networking contexts.
NPV has been further investigated as a central element of LPWAN Internet of Things (IoT) scenarios. Specifically, the deployment of applications that are agnostic to the underlying transport, network, link and physical layers was explored by Rolando Herrero in 2020. In this context, NPV becomes a very successful and flexible tool to accomplish the deployment and management of constrained sensors, actuators and controllers in massive IoT access networks.
Implementations
Currently there is just one academic implementation available to demonstrate the concept. Heuschkel et. al. published this implementation as demonstrator in 2016.
The last iteration of this code is available under AGPLv3 on Github.
See also
Application virtualization
Hardware virtualization
Virtualization
References
External links
An introduction to Virtualization
MAKI
VirtualStack (NPV Prototype)
Computer science
|
67303095
|
https://en.wikipedia.org/wiki/Simple-As-Possible%20computer
|
Simple-As-Possible computer
|
The Simple-As-Possible (SAP) computer is a simplified computer architecture designed for educational purposes and described in the book Digital Computer Electronics by Albert Paul Malvino and Jerald A. Brown. The SAP architecture serves as an example in Digital Computer Electronics for building and analyzing complex logical systems with digital electronics.
Digital Computer Electronics successively develops three versions of this computer, designated as SAP-1, SAP-2, and SAP-3. Each of the last two build upon the immediate previous version by adding additional computational, flow of control, and input/output capabilities. SAP-2 and SAP-3 are fully Turing-complete.
The instruction set architecture (ISA) that the computer final version (SAP-3) is designed to implement is patterned after and upward compatible with the ISA of the Intel 8080/8085 microprocessor family. Therefore, the instructions implemented in the three SAP computer variations are, in each case, a subset of the 8080/8085 instructions.
Variant
Ben Eater's Design
YouTuber and former Khan Academy employee Ben Eater created a tutorial building an 8-bit Turing-complete SAP computer on breadboards from logical chips (7400-series) capable of running simple programs such as computing the Fibonacci sequence. Eater's design consists of the following modules:
An adjustable-speed (upper limitation of a few hundred Hertz) clock module that can be put into a "manual mode" to step through the clock cycles.
Three register modules (Register A, Register B, and the Instruction Register) that "store small amounts of data that the CPU is processing."
An arithmetic logic unit (ALU) capable of adding and subtracting 8-bit 2's complement integers from registers A and B. This module also has a flags register with two possible flags (Z and C). Z stands for "zero," and is activated if the ALU outputs zero. C stands for "carry," and is activated if the ALU produces a carry-out bit.
A RAM module capable of storing 16 bytes. This means that the RAM is 4-bit addressable. As Eater's website puts it, "this is by far its [the computer's] biggest limitation".
A 4-bit program counter that keeps track of the current processor instruction, corresponding to a 4-bit addressable RAM.
An output register that displays its content on four 7-segment displays, capable of displaying both unsigned and 2's complement signed integers. The 7-segment display outputs are controlled by EEPROMs, which are programmed using an Arduino microcontroller.
A bus that connects these components together. The components connect to the bus using tri-state buffers.
A "control logic" module that defines "the opcodes the processor recognizes and what happens when it executes each instruction," as well as enabling the computer to be Turing-complete. The CPU microcodes are programmed into EEPROMs using an Arduino microcontroller.
Ben Eater's design has inspired multiple other variants and improvements, primarily on Eater's Reddit forum. Some examples of improvements are:
An expanded RAM module capable of storing 256 bytes, utilizing the entire 8-bit address space. With the help of segmentation registers, the RAM module can be further expanded to a 16-bit address space, matching the standard for 8-bit computers.
A stack register that allows incrementing and decrementing the stack pointer.
References
External links
SAP-1 online simulator (in English, Spanish and Catalan)
Design and Implementation of a Simple-As-Possible 1 (SAP-1) Computer using an FPGA and VHDL
An implementation of Simple As Possible computer - SAP1, written in VHDL (in English and Portuguese)
Computer architecture
|
821858
|
https://en.wikipedia.org/wiki/Cksum
|
Cksum
|
cksum is a command in Unix and Unix-like operating systems that generates a checksum value for a file or stream of data. The cksum command reads each file given in its arguments, or standard input if no arguments are provided, and outputs the file's CRC-32 checksum and byte count.
The cksum command can be used to verify that files transferred by unreliable means arrived intact. However, the CRC checksum calculated by the cksum command is not cryptographically secure: While it guards against accidental corruption (it is unlikely that the corrupted data will have the same checksum as the intended data), it is not difficult for an attacker to deliberately corrupt the file in a specific way that its checksum is unchanged. Unix-like systems typically include other commands for cryptographically secure checksums, such as sha256sum.
The command is available as a separate package for Microsoft Windows as part of the UnxUtils collection of native Win32 ports of common GNU Unix-like utilities.
Interoperability
The standard cksum command, as found on most Unix-like operating systems (including Linux, *BSD, macOS, and Solaris) uses a CRC algorithm based on the ethernet standard frame check and is therefore interoperable between implementations. This is in contrast to the sum command, which is not as interoperable and not compatible with the CRC-32 calculation. On Tru64 operating systems, the cksum command returns a different CRC value, unless the environment variable CMD_ENV is set to xpg4.
Algorithm
cksum uses the generator polynomial 0x04C11DB7 and appends to the message its length in little endian representation. That length has null bytes trimmed on the right end.
Syntax
cksum [FILE]...
cksum [OPTION]
Usage example
$ cksum test.txt
4038471504 75 test.txt
where 4038471504 represents the checksum value and 75 represents the file size of test.txt.
See also
Cyclic redundancy check
GNU Core Utilities
sum
md5sum
References
External links
Checksum algorithms
Standard Unix programs
Unix SUS2008 utilities
|
31448
|
https://en.wikipedia.org/wiki/Traceroute
|
Traceroute
|
In computing, traceroute and tracert are computer network diagnostic commands for displaying possible routes (paths) and measuring transit delays of packets across an Internet Protocol (IP) network. The history of the route is recorded as the round-trip times of the packets received from each successive host (remote node) in the route (path); the sum of the mean times in each hop is a measure of the total time spent to establish the connection. Traceroute proceeds unless all (usually three) sent packets are lost more than twice; then the connection is lost and the route cannot be evaluated. Ping, on the other hand, only computes the final round-trip times from the destination point.
For Internet Protocol Version 6 (IPv6) the tool sometimes has the name traceroute6 and tracert6.
Implementations
The command traceroute is available on many modern operating systems. On Unix-like systems such as FreeBSD, macOS, and Linux it is available as a command line tool. Traceroute is also graphically accessible in macOS within the Network Utilities suite.
Microsoft Windows and ReactOS provide a program named tracert that performs the same route-tracing function. Windows NT-based operating systems also provide PathPing, with similar functionality. The ReactOS version was developed by Ged Murphy and is licensed under the GPL.
On Unix-like operating systems, traceroute sends, by default, a sequence of User Datagram Protocol (UDP) packets, with destination port numbers ranging from 33434 to 33534; the implementations of traceroute shipped with Linux, FreeBSD, NetBSD, OpenBSD, DragonFly BSD, and macOS include an option to use ICMP Echo Request packets (-I), or any arbitrary protocol (-P) such as UDP, TCP using TCP SYN packets, or ICMP.
On Windows, tracert sends ICMP Echo Request packets, rather than the UDP packets traceroute sends by default.
The time-to-live (TTL) value, also known as hop limit, is used in determining the intermediate routers being traversed towards the destination. Traceroute sends packets with TTL values that gradually increase from packet to packet, starting with TTL value of one. Routers decrement TTL values of packets by one when routing and discard packets whose TTL value has reached zero, returning the ICMP error message ICMP Time Exceeded. For the first set of packets, the first router receives the packet, decrements the TTL value and drops the packet because it then has TTL value zero. The router sends an ICMP Time Exceeded message back to the source. The next set of packets are given a TTL value of two, so the first router forwards the packets, but the second router drops them and replies with ICMP Time Exceeded. Proceeding in this way, traceroute uses the returned ICMP Time Exceeded messages to build a list of routers that packets traverse, until the destination is reached and returns an ICMP Destination Unreachable message if UDP packets are being used or an ICMP Echo Reply message if ICMP Echo messages are being used.
The timestamp values returned for each router along the path are the delay (latency) values, typically measured in milliseconds for each packet.
The sender expects a reply within a specified number of seconds. If a packet is not acknowledged within the expected interval, an asterisk is displayed. The Internet Protocol does not require packets to take the same route towards a particular destination, thus hosts listed might be hosts that other packets have traversed. If the host at hop #N does not reply, the hop is skipped in the output.
If a network has a firewall and operates both Windows and Unix-like systems, more than one protocol must be enabled inbound through the firewall for traceroute to work and receive replies.
Some traceroute implementations use TCP packets, such as tcptraceroute and layer four traceroute (lft). PathPing is a utility introduced with Windows NT that combines ping and traceroute functionality. MTR is an enhanced version of ICMP traceroute available for Unix-like and Windows systems. The various implementations of traceroute all rely on ICMP Time Exceeded (type 11) packets being sent to the source.
On Linux, tracepath is a utility similar to traceroute, with the primary difference of not requiring superuser privileges.
Cisco's implementation of traceroute also uses a sequence of UDP datagrams, each with incrementing TTL values, to an invalid port number at the remote host; by default, UDP port 33434 is used. An extended version of this command (known as the extended traceroute command) can change the destination port number used by the UDP probe messages.
Usage
Most implementations include at least options to specify the number of queries to send per hop, time to wait for a response, the hop limit and port to use. Invoking traceroute with no specified options displays the list of available options, while man traceroute presents more details, including the displayed error flags. An example on Linux:
$ traceroute -w 3 -q 1 -m 16 example.com
traceroute to example.com (93.184.216.34), 16 hops max, 60 byte packets
1 *
2 *
...
15 *
16 *
In the example above, selected options are to wait for three seconds (instead of five), send out only one query to each hop (instead of three), limit the maximum number of hops to 16 before giving up (instead of 30), with example.com as the final host.
Traceroute can be used to help identify incorrect routing table definitions or firewalls that may be blocking ICMP traffic, A correct traceroute response does not guarantee connectivity for applications as a firewall may permit ICMP packets but not permit packets of other protocols.
Traceroute is also used by penetration testers to gather information about network infrastructure and IP address ranges around a given host.
It can also be used when downloading data, and if there are multiple mirrors available for the same piece of data, each mirror can be traced to get an idea of which mirror would be the fastest to use.
Origins
The traceroute manual page states that the original traceroute program was written by Van Jacobson in 1987 from a suggestion by Steve Deering, with particularly cogent suggestions or fixes from C. Philip Wood, Tim Seaver and Ken Adelman. The author of the ping program, Mike Muuss, states on his website that traceroute was written using kernel ICMP support that he had earlier coded to enable raw ICMP sockets when he first wrote the ping program.
Limitations
Traceroute limitations are well known and should be taken into account when using the tool. For example, traceroute does not discover paths at the router level, but at the interface level. Another limitation appears when routers do not respond to probes or when routers have a limit for ICMP responses. In the presence of traffic load balancing, traceroute may indicate a path that does not actually exist; to minimize this problem there is a traceroute modification called Paris-traceroute, which maintains the flow identifier of the probes to avoid load balancing.
See also
Looking Glass server
netsniff-ng a Linux networking toolkit with an autonomous system traceroute utility
References
Further reading
External links
: Traceroute using an IP Option Internet RFC
How traceroute works – InetDaemon
Tracert Windows XP Command-line reference
Network analyzers
Free network management software
|
27346267
|
https://en.wikipedia.org/wiki/SuperGamer
|
SuperGamer
|
SuperGamer is a Linux distribution for the x86 platform originally based on the PCLinuxOS distribution, and is currently based on VectorLinux. Focusing on gaming, it is designed to be run directly from a Live DVD.
Features
Available in several different flavours, SuperGamer claims to be the "world’s first Dual Layer Live DVD". The most recent version, SuperGamer Supreme 2.5, can be downloaded as a 7.9 gigabyte iso file, while some older versions can also be downloaded in smaller sizes. As well as offering a wide selection of Linux native free games and shareware versions of commercial games, it also includes a wide selection of video card drivers, including proprietary binary blob drivers from NVIDIA and ATI as well as a wide array of free software alternatives.
As well as online downloads which are offered as a freely available torrent or a direct download available for a $5.00 fee. Though primarily intended for use as a Live DVD system only, SuperGamer can be installed onto a hard-drive using an included installer. There must already be a properly formatted partition on the drive and the user must be aware of the system's root password, which by default is set to "root".
Included Games
The distribution included games like: SuperGamer Supreme 2.5, contains Enemy Territory: Quake Wars, Unreal Tournament 2004, Doom 3, Prey, Quake 4, Savage 2: A Tortured Soul, Postal 2, Wolfenstein: Enemy Territory, Penumbra: Black Plague, Sauerbraten, Urban Terror, IconquerU, TORCS, Tremulous, CodeRED: Alien Arena, TrueCombat:Elite, America's Army, Nexuiz, OpenArena, PlaneShift, Drop Team, Frets On Fire, Chromium B.S.U., Mad Bomber, X-Moto, BZFlag, Mega Mario, Glaxium, GL-117, Neverball, Neverputt, Super Tux, PlanetPenguin Racer, and X2: The Threat. Commercial games are included as shareware while free software and freeware ones are included in their entirety. While older version included games that were open source and demos, the newest release does not.
Competition
Although very few distributions target the same niche as SuperGamer, it does have competition from the Linux-Gamers project, which offers a similar Live gaming distribution. The two projects however do have slightly different goals and diverge in the games that they package.
See also
VectorLinux
Linux gaming
References
External links
SuperGamer archive
Slackware
Linux distributions
|
9102257
|
https://en.wikipedia.org/wiki/Sentry%20Firewall
|
Sentry Firewall
|
Sentry Firewall is a free open-source network firewall Linux distribution that was first published in 2001 and has been the subject of multiple magazine reviews. The distribution is particularly notable because it consists solely of a bootable CD-ROM that is designed to be used in a computer with no hard disk. Configuration information is retrieved at boot time by automatically searching on an attached floppy disk drive, USB flash memory drive, or another server on the local network willing to provide the configuration.
Overview
Sentry Firewall starts from CD-ROM and immediately constructs a RAM disk in the computer's memory. Before the system fully boots, a script searches for removable media containing a file called "sentry.conf". If that file is found, it may contain detailed instructions and a list of files to be copied from the removable media to the RAM disk before the system is finally allowed to boot.
The CD-ROM is pre-loaded with a variety of configurable network tools, including iptables.
Because the RAM disk is created each time the machine boots, it is possible to recover from any sort of problem simply by rebooting the machine. From a security perspective, this is compelling because the machine essentially becomes immune to viruses or file corruption - or at least the effects of either problem can't survive a reboot.
Configuration
While basic Linux familiarity is necessary to configure a basic set of files necessary to use the firewall, there exists Windows programs capable of creating the bulk of the configuration scripts based on interaction with a graphical user interface. Firewall Builder is one such example; this program also works with other firewall products unrelated to Sentry Firewall.
Current status
According to the project's maintainer, Sentry Firewall has not been updated since its January 2005 release.
External links
References
Firewall software
Gateway/routing/firewall distribution
Slackware
Discontinued Linux distributions
Linux distributions
|
7152372
|
https://en.wikipedia.org/wiki/Platte%20Bridge%20Railroad%20Tragedy
|
Platte Bridge Railroad Tragedy
|
The Platte Bridge Railroad Tragedy was a bushwhacker attack on the Hannibal and St. Joseph Railroad during the American Civil War on September 3, 1861, in which the train derailed on a bridge over the Platte River east of St. Joseph, Missouri, killing between 17 and 20 and injuring 100. The bridge crosses the river in Buchanan County, between Marion Township on the east, and Washington Township on the west.
Confederate partisans planned to burn the lower timbers of the 160-foot bridge across the river, leaving the top looking intact. At 11:15 p.m. on a moonless night, the westbound passenger train from Hannibal, Missouri, to St. Joseph started to cross the bridge. The supports cracked and gave way. The locomotive flipped, falling 30 feet into the shallow river and bringing with it the freight cars, baggage car, mail car and two passenger cars with 100 men, women and children. Bodies and the injured were taken to the Patee House near the St. Joseph depot. Union soldiers were ordered to track down and execute bushwhackers for their part in the incident.
Confederate Major General Sterling Price, who had been invading northern Missouri at the time, wrote Union commanding general Henry Wager Halleck to protest, stating the sabotage was "lawful and proper" according to the rules of warfare and that the captured men should be treated as prisoners of war. Halleck replied that the bushwhackers were "spies, marauders, robbers, incendiaries, guerrilla bands...in the garb of peaceful citizens" The bushwhackers were to also say that it was a military target because there were soldiers on it bound for Fort Leavenworth, Kansas. One of the soldiers killed was Barclay Coppock, a member of John Brown's raid on Harper's Ferry. The bushwackers were also to claim that it was an attempt to assassinate former Missouri Governor Robert Marcellus Stewart.
The most prominent of the bushwhackers sought by the Federal troops was Silas M. Gordon. Union troops were to burn Platte City, Missouri twice (in December 1861 and July 1864) in unsuccessful attempts to force the townspeople to surrender him (see the Burning of Platte City).
The railroad at the time was the first to cross the state of Missouri and it was used to deliver mail to and from the Pony Express terminus in St. Joseph, Missouri. Col. Ulysses S. Grant's first commission in the Civil War had been guarding the trains. In August he was promoted to brigadier general on a new assignment.
References
Missouri in the American Civil War
Buchanan County, Missouri
Derailments in the United States
Transportation disasters in Missouri
Railway accidents in 1861
Bridge disasters in the United States
Bridge disasters caused by warfare
Passenger rail transportation in Missouri
1861 in Missouri
Accidents and incidents involving Hannibal and St. Joseph Railroad
September 1861 events
|
1924628
|
https://en.wikipedia.org/wiki/Native%20Instruments
|
Native Instruments
|
Native Instruments is a German company that develops, manufactures, and supplies music software and hardware for music production, sound design, performance, and DJing. The company's corporate headquarters and main development facilities are located in Berlin, with additional offices in Los Angeles, Tokyo, London, Paris, and Shenzhen.
History
Native Instruments as a company was founded in 1999 in Berlin, Germany, where its headquarters are still located. Founders Stephan Schmitt and Volker Hinz began using the name Native Instruments in 1996, when they developed Generator, a modular synth software package (which would later form the foundations for their ongoing product, Reaktor).
Following the release of Generator, the company's employees expanded to include Bernd Roggendorf (later a founder of Ableton) and Daniel Haver, who later became Native Instruments' CEO.
In 1999, Native Instruments expanded their staff count and moved to their current building in Berlin's Kreuzberg district.
In 2000, the company began creating products for the DJ community, beginning with the first version of their Traktor software. In 2002, they expanded further to include software samplers, in the form of ongoing products Kontakt and Battery.
In September 2004, the company began a partnership with the DJ hardware manufacturing company Stanton Magnetics and with online music store Beatport. 2004 also saw the release of their guitar amplifier and effects pedal emulation software, Guitar Rig. In 2006, Native Instruments restructured into 3 divisions: instruments, DJ, and guitar.
In March 2017, Native Instruments acquired remix-licensing startup MetaPop.
In January 2020, a works council was elected that represents the employees of the Berlin office.
In January 2021, it was reported that private investment firm, Francisco Partners acquired a majority stake in Native Instruments.
Native Instruments now also has offices in Los Angeles, Tokyo, London, Paris, and Shenzhen.
Products
Software
Software produced by Native Instruments includes the following:
Reaktor: A visual programming environment based on modules and wires. Several of Native Instruments products were built using Reaktor, including Monark – NI's emulation of the Moog Model D. In addition to the company's own offerings, it also hosts a large collection of community creations on the Reaktor User Library.
Kontakt: A software sampler with support for users to program their own virtual instruments.
Guitar Rig: A modular software effect processor, focused on amplifier and effects pedal emulation for guitar.
Multiple software synthesizers, such as Massive (wavetable-based), Absynth (semi-modular), and FM8 (frequency-modulation-based).
Traktor: Digital DJ and vinyl emulation software.
Native instruments also produce a number of other sample libraries, virtual instruments and effects processing plug-ins, many of which function through the architecture of Reaktor or Kontakt. Some of these software items are also grouped together in their Komplete software bundle.
The company also develops the Native Kontrol Standard (NKS), a plug-in extension which allows integration with Kontrol and Maschine products (both hardware and software).
Hardware
Native instruments also produce music hardware, such as:
Maschine: A system with integrated software for creating drum beats.
Kontrol: A series of MIDI keyboards, XLR Audio Interfaces and DJ controllers with software instrument support.
References
External links
Software companies of Germany
Privately held companies of Germany
Companies established in 1996
Companies based in Berlin
Music in Berlin
|
1967286
|
https://en.wikipedia.org/wiki/List%20of%20cultural%20references%20in%20the%20Divine%20Comedy
|
List of cultural references in the Divine Comedy
|
The Divine Comedy by Dante Alighieri is a long allegorical poem in three parts (or canticas): the Inferno (Hell), Purgatorio (Purgatory), and Paradiso (Paradise), and 100 cantos, with the Inferno having 34, Purgatorio having 33, and Paradiso having 33 cantos. Set at Easter 1300, the poem describes the living poet's journey through hell, purgatory, and paradise.
Throughout the poem, Dante refers to people and events from Classical and Biblical history and mythology, the history of Christianity, and the Europe of the Medieval period up to and including his own day. A knowledge of at least the most important of these references can aid in understanding the poem fully.
For ease of reference, the cantica names are abbreviated to Inf., Purg., and Par. Roman numerals are used to identify cantos and Arabic numerals to identify lines. This means that Inf. X, 123 refers to line 123 in Canto X (or 10) of the Inferno and Par. XXV, 27 refers to line 27 in Canto XXV (or 25) of the Paradiso. The line numbers refer to the original Italian text.
Boldface links indicate that the word or phrase has an entry in the list. Following that link will present that entry.
A
Abbagliato: See Spendthrift Club.
Abel: Biblical second son of Adam and brother of Cain.
Raised by Jesus from Limbo into Paradise. Inf. IV, 56.
Abraham the Patriarch: Important biblical figure.
Raised by Jesus from Limbo into Paradise. Inf. IV, 58.
Absalom and Ahithophel: Absalom was the rebellious son of King David who was incited by Ahithophel, the king's councilor.
Bertran de Born compares his fomenting with the "malicious urgings" of Ahithophel. Inf. XXVIII, 136–138.
Achan: Ancient Israelite who stole from Jericho during Joshua's conquest. He was stoned to death for the theft. (Joshua 7:1–26)
Cited by souls on the terrace of the greedy as an example of greed. Purg. XX, 109–111.
Acheron: The mythological Greek underworld river over which Charon ferried souls of the newly dead into Hades.
The "melancholy shore" encountered. Inf. III, 71–78.
Formed from the tears of the statue of the Old Man of Crete. Inf. XIV, 94–116.
Achilles: The greatest Greek hero in the Trojan War. An account well known in the Middle Ages has him killed by Paris after having been lured with the promise of Priam's daughter Polyxena.
Found amongst the sexual sinners. Inf. V, 65.
Remembered by Virgil for having been educated by Chiron. Inf. XII, 71.
His abandonment of Deidamia and his only son, at the urging of Ulysses, to go to the war against Troy. Inf. XXVI, 61–62.
Statius identifies himself in Purgatory as the author of the Achilleid, an unfinished epic poem on the life of Achilles. Purg. XXI, 92.
Acre: Ancient city in Western Galilee, it was the last Christian possession in the Holy Land, finally lost in 1291. Inf. XXVII, 86.
"Ad vocem tanti senis" ("To the voice of such a great elder")
Latin line used to maintain the rhyme scheme with neighboring Latin quotations. Purg. XXX, 18.
Adam: According to the Bible, the first man created by God.
His "evil seed". Inf. III, 115–117.
Our "first parent", raised by Jesus from Limbo into Paradise. Inf. IV, 55.
Dante sees the tree in the Garden of Eden which caused the fall of Adam and Eve. (See Genesis 3.) Purg. XXXII, 37–39.
Adam of Brescia: See Master Adam.
"Adhaesit pavimento anima mea": ("My soul cleaveth unto the dust.") (Psalm 119:25; 118:25 in the Vulgate.)
Recited penitentially by prostrate souls on the terrace of greed in Purgatory. Purg. XIX, 73.
Aegina: A Greek island between Attica and Argolis in the Saronic Gulf. According to tradition it was named by its ruler Aeacus—son of Zeus and Aegina, daughter of the river-god Asopus—after his mother. In Ovid's Metamorphoses (VII, 501–660), Aeacus, tells of a terrible plague inflicted by a jealous Juno (Hera), killing everyone on the island but Aeacus; and how he begged Jupiter (Zeus) to give him back his people or take his life as well. Jupiter then turned the islands ants into a race of men called the Myrmidons, some of whom Achilles ultimately led to war against Troy.
"... all Aegina's people sick ... when the air was so infected ... received their health again through seed of ants.", compared with "the spirits languishing in scattered heaps" of the tenth Malebolge. Inf. XXIX, 58–65.
Aeneas: Hero of Virgil's epic poem Aeneid, his descent into hell is a primary source for Dante's own journey.
Son of Anchises, fled the fall of Troy. Inf. I, 74–75.
"Father of Sylvius", journey to Hades, founder of Rome. Inf. II, 13–27.
When Dante doubts he has the qualities for his great voyage, he tells Virgil "I am no Aeneas, no Paul". Inf. II, 32
Seen in Limbo. Inf. IV, 122.
"Rome's noble seed". Inf. XXVI. 60.
Founder of Gaeta. Inf. XXVI, 93.
Aeolus: Ruler of the winds in ancient Greek mythology. Purg. XXVIII, 21.
Aesop: A semi-legendary Greek fabulist of whom little reliable is known. A famous corpus of fables is traditionally assigned to him.
His fable of the Frog and the mouse is mentioned. Inf. XXIII, 4–6.
Africanus: Agnomen of Publius Cornelius Scipio Africanus (236–183 BCE), the Roman general who defeated the Carthaginian general Hannibal in the Second Punic War.
His triumphant reception in Rome mentioned. Purg. XXIX, 116.
Agathon: Greek poet of the 5th century BCE.
Resident of Limbo. Purg. XXII, 107.
Agapetus: Pope from 535 to 536.
In the Heaven of Mercury, the soul of the Emperor Justinian credits Agapetus with correcting him of heretical beliefs. Par. VI, 13–18.
Aglauros: Athenian princess who envied her sister's love affair with Hermes. When she attempted to block Hermes' access, he changed her to stone.
Her voice is heard in Purgatory on the terrace of the envious as a lesson in envy. Purg. XIV, 139.
Agnus Dei: Liturgical anthem addressed to Jesus as Lamb of God. Sung while the Eucharistic bread is being divided. It ends with "Dona nobis pacem." ("Grant us peace.")
Sung by souls in the terrace of the angry in Purgatory. Purg. XVI, 16–21.
Ahasuerus: Ancient King of Persia according to the Book of Esther. He married Esther, whose father was Mordecai. Haman, the prime minister, became enraged at Mordecai for refusing to bow in his presence. Haman then plotted a pogrom of the Jews in the kingdom. The plot was discovered, and Ahasuerus had Haman executed.
Dante has a vision of the execution as he departs the terrace of the angry in Purgatory. Purg. XVII, 25–30.
Ahithophel: See Absalom.
Cited as his own analogy by Bertran de Born. Inf. XXVIII, 137.
Alardo: See Tagliacozzo.
Alba: Town in Latium near Rome which founded the Latin League in the early years of Rome.
According to the soul of the Emperor Justinian, the eagle of Roman glory rested in Alba for three centuries. Par. VI, 37–39.
Albert I of Germany: Roman-German King (1298–1308) from the Habsburg family. He was King during the events of the Comedy.
Dante refers to him as German Albert ("Alberto tedesco") and condemns him for failing to come south and curb violent conflict in Italy. Purg. VI, 97–151.
Alberto da Casalodi: Guelph count of Brescia, he was Signore of Mantua during the feuding between Guelphs and Ghibellins. He was ousted in 1273 by his advisor Pinamonte dei Bonacolsi.
His foolishness ("la mattia da Casalodi") in trusting Pinamonte. Inf. XX, 95–96.
Alberto da Siena: See Griffolino of Arezzo.
Albertus Magnus (c. 1197–1280): Dominican friar, scholar, and teacher of Thomas Aquinas.
Standing to the right of Thomas Aquinas in the sphere of the Sun. Par. X, 98–99.
Alcmaeon: Son of Eriphyle, who presumed herself worthy to wear jewelry designed for the gods. Her presumption resulted in her husband's death. Alcmaeon murdered his mother in revenge.
Eriphyle is depicted on the pavement in Purgatory as an example of arrogance. Purg. XII, 50.
Beatrice cites Alcmaeon's act of murder as a moral failure. Par. IV, 100–105.
Tegghiaio Aldobrandi: Florentine son of the famous Aldobrando degli Adimari, he was podestà of Arezzo in 1256 and fought at the battle of Montaperti in 1260, where his warnings against attacking the Senese forces went unheeded, and the Florentines were annihilated.
One of a group of famous political Florentines, "who were so worthy ... whose minds bent toward the good", asked about by Dante of Ciacco. Inf. VI, 77–81.
One of a group of three Florentine sodomites who approach Dante, and are much esteemed by him (see Jacopo Rusticucci). Inf. XVI, 1–90.
Cryptically described as he, "la cui voce nel mondo sù dovria esser gradita" ("whose voice the world above should have valued"), probably an allusion to his councils at Montaperti. Inf. XVI, 40–42.
Alecto: see Erinyes.
Alexander the Great: King of Macedon (356–323 BCE) and the most successful military commander of ancient history
Probably the tyrant pointed out by Nessus. Inf. XII, 107.
Apocryphal story of his adventures in India provide a simile for the punishment of the violent against God in Inf. XIV, 31–36.
Ali: Cousin and son-in-law of Muhammad, and one of his first followers. Disputes over Ali's succession as leader of Islam led to the split of Islam into the sects of Sunni and Shi'a.
He "walks and weeps" in front of Muhammed. Inf. XXVIII, 31–33.
Amphiaraus: Mythical king of Argos and seer, who although he had foreseen his death, was persuaded to join the expedition of the Seven against Thebes. He was killed while fleeing from pursuers, when Zeus threw a thunderbolt, and the earth opened up and swallowed him.
The story of his death is told. Inf. XX, 31–39.
Anagni: ancient town in central Italy. Birthplace of Pope Boniface VIII.
In 1303, Philip IV of France invaded Italy and captured Boniface at Anagni. Purg. XX, 86.
Pope Anastasius II: Pope who Dante perhaps mistakenly identified with the emperor Anastasius I and thus condemned to hell as a heretic. Anastasius I was a supporter of Monophysitism, a heresy which denied the dual divine/human nature of Jesus.
Dante and Virgil take shelter behind Anastasius' tomb and discuss matters of theology. Inf XI, 4–111.
Anaxagoras (c. 500–428 BCE): Greek philosopher.
Encountered by Dante in Limbo. Inf. IV, 137.
Anchises: Father of Aeneas by Aphrodite. In the Aeneid he is shown as dying in Sicily.
Father of Aeneas. Inf. I, 74, Purg. XVIII, 137, Par. XIX, 132.
Loderingo Andalò (c. 1210–1293): Of a prominent Ghibelline family, he held many civic positions. In 1261 he founded the Knights of Saint Mary or Jovial Friars, a religious order recognized by Pope Clement IV. Its mission was to promote peace between warring municipal factions, but its members soon succumbed to self-interest. Together with Catalano dei Malavolti, he shared the position of governor of Florence. Loderingo is extolled for his fortitude in dying by his friend, the poet Guittone d'Arezzo.
Among the hypocrites. Inf. XXIII, 103–109.
Andrea de' Mozzi: Chaplain of the popes Alexander IV and Gregory IX, he was made bishop of Florence in 1287 and there remained until 1295, when he was moved to Vicenza, only to die shortly after.
One of a group of sodomites identified by Brunetto Latini to Dante. Brunetto (i.e. Dante) blasts him with particular harshness, calling him "tigna". Inf. XV, 110–114.
Angiolello di Carignano: See Malatestino.
Anglo-Scottish War: the state of endemic conflict between England and Scotland in which neither side could 'remain within their borders'.
cited by the Eagle of divine justice as a matter of shame for Christians, Par. XIX, 121–123.
Annas: The father-in-law of Caiaphas, he also is called High-Priest. He appears to have been president of the Sanhedrin before which Jesus is said to have been brought.
Among the hypocrites, he suffers the same punishment as Caiaphas. Inf. XXIII, 121–122.
Antaeus: Son of Neptune and Gaia. A giant whose invincible strength came from contact with the earth. Hercules killed him by lifting him from the earth and crushing him.
Lowers Dante and Virgil onto the surface of Cocytus. Inf. XXXI, 112–145.
Antigone and Ismene: Theban princesses and daughters of Oedipus and Jocasta who appear in several ancient plays.
Residents of Limbo. Purg. XXII, 110–111.
Antiochus IV Epiphanes (c. 215–163 BCE): Last powerful Seleucid king, he is famous principally for his war against the Maccabees.
Just as he "sold" the High Priesthood to Jason, Philip IV of France "sold" the papacy to Clement V. Inf. XIX, 86–87.
Apollo: Greek god of the sun, music and prophecy who led the Muses, the goddesses who inspired literature and arts.
Dante invokes Apollo to inspire and guide his writing at the opening of the Paradiso. Par. I, 13, Par. II, 8.
Apulia: A region in southeastern Italy bordering the Adriatic Sea in the east, the Ionian Sea to the southeast, and the Strait of Otranto and Gulf of Taranto in the south. In the Middle Ages, it referred to all of southern Italy. The barons of Apulia broke their promise to defend the strategic pass at Ceperano for Manfred, the son of Frederick II, and allowed Charles of Anjou to pass freely into Naples. Manfred was subsequently killed (1266) at the Battle of Benevento, a crucial blow to the Ghibelline cause.
Its "fateful land" as battleground, and Apulia's betrayal. Inf. XXVIII, 7–21.
Aquarius: The eleventh sign of the zodiac. When the sun is in Aquarius (between January 21 and February 21), the days start to visibly grow longer and day and night begin to approach equal length. Inf. XXIV, 1–3.
Thomas Aquinas: Dominican theologian considered to be one of the greatest scholars of the Church.
Dante claims that he was murdered by Charles of Anjou. Purg. XX, 69.
He introduces wise men in the sphere of the Sun. Par. X, 98–138.
He eulogises St. Francis. Par. XI, 37–117.
He condemns Dominicans who have strayed from the true Dominican charism. Par. XI, 124–139.
Arachne: In Greek mythology, a woman who challenged Athena to a contest of skill in weaving. Athena destroyed her work and converted the woman into a spider.
Depicted on the pavement in Purgatory as an example of arrogance. Purg. XII, 43.
Arcolano of Siena: A member of the Maconi family, he was a member of the notorious Sienese Spendthrift Club. He fought in the Battle of Pieve al Toppo in 1288, where according to Giovanni Boccaccio, he preferred to die in battle rather than live in poverty.
Probably "Lano", one of two spendthrifts (the other being Jacomo da Sant' Andrea) whose punishment consists of being hunted by female hounds. Inf. XIII, 115–129.
Arethusa: In Greek mythology she was a nymph daughter of Nereus. Running away from a suitor, Alpheus, she was transformed by Artemis into a fountain.
Her transformation, as described in Ovid's Metamophoses (V, 572–641), is compared to the fate of the thieves. Inf. XXV, 97–99.
Geryon's adornments, compared to her weavings. Inf. XVII, 14–18.
Filippo Argenti: A Black Guelph and member of the Adimari family, who were enemies of Dante. Inf. VIII, 31–66.
Argia: Ancient Theban woman, sister of Deipyle and wife of Polynices.
Resident of Limbo. Purg. XXII, 111.
Argus: Giant of ancient Greek mythology with multiple eyes.
Compared to the eyes on the four allegorical beasts in the Pageant of the Church Triumphant. Purg. XXIX, 94.
Ariadne: Daughter of Minos, king of Crete, who helped Theseus kill the Minotaur, the offspring of Ariadne's mother Pasiphaë and a bull.
Referred to as the sister of the Minotaur. Inf. XII, 20.
Aristotle: 4th-century BCE Greek philosopher whose writings were a major influence on medieval Christian scholastic philosophy and theology, particularly on the works of Thomas Aquinas.
As "il maestro di color che sanno" ("the master of those who know") he is among those encountered by Dante in Limbo. Inf. IV, 131.
His Nicomachean Ethics quoted by Virgil. Inf. XI, 79–84.
His Physics, referred to by Virgil. Inf. XI, 101–104.
Mentioned by Virgil as one "who would—if reason could—have been content". Purg. III, 43.
Argives: People of Argos, or more generally all Greeks Inf. XXVIII, 84.
Arles: City in the south of France and supposed location of the tombs of Charlemagne's soldiers who fell in the battle of Roncesvalles.
Simile for the tombs in the sixth circle. Inf. IX, 112.
Arno: River which runs through Florence.
Subject of a discourse on the vices of the people of Tuscany. Purg. XIV, 16–66.
Aruns: In Lucan's epic poem Pharsalia, he is the Etruscan seer who prophesies the Civil war, Caesar's victory over Pompey, and its ending in 48 BCE.
Seen among the seers. Dante mentions his cave, which he locates (erroneously) near Luni. Inf. XX, 46–51.
Asdente: See Mastro Benvenuto.
"Asperges me" ("Thou shalt sprinkle me"): Psalm 51:9 (Psalm 50:9 in the Vulgate Bible). Opening of the Asperges, a hymn sung during the sprinkling of a congregation with Holy Water. "Thou shalt sprinkle me with hyssop, and I shall be cleansed: thou shalt wash me, and I shall be made whiter than snow."
Dante hears the hymn when he is carried through the River Lethe. Purg. XXXI, 97–99.
Athamas: See Hera.
Athena: Greek Goddess of Wisdom. "Pallas" is a widely used epithet for her.
In Purgatory, she is depicted in a pavement carving casting Briareus from Olympus. Purg. XII, 31.
As the goddess of wisdom, she propels his metaphorical sailing ship in the heavens. Par. II, 8.
Athens: Major Greek city of antiquity.
Commended by Dante as an example of good government. Purg. VI, 139.
Attila the Hun (c. 406–453): King of the Huns, known in Western tradition as the "Scourge of God".
Pointed out by Nessus. Inf. XII, 133–134.
Confused by Dante with Totila who destroyed Florence in 542. Inf. XIII, 149.
Augustus (63 BCE – 14 CE): The Roman Emperor under whom Virgil found fame as a poet.
Called "the good Augustus" by Virgil. Inf. I, 71.
Augustus took charge of Virgil's physical and literary remains after his death. "My bones were buried by Octavian." Purg. VII, 6.
His triumphant chariot compared to the chariot in the Pageant of the Church Triumphant. Purg. XXIX, 116.
Aurora: Roman goddess of dawn
Used as a poetic reference to sunrise in Purgatory. Purg. II, 8.
Ave: "Ave gratia plena, Dominus tecum." (Hail, highly favored one, the Lord is with you.) Words addressed by the angel Gabriel to the Virgin Mary, announcing the birth of Jesus.
Words seen in a wall carving depicting the Annunciation. Purg. X, 40.
Ave Maria: Prayer to the Virgin Mary.
Sung by Piccarda in the Heaven of the Moon. Par. III, 122.
Averroes (1126–1198): Andalusian-Arab philosopher, physician, and famous commentator ("il gran comento") on Aristotle.
Encountered by Dante in Limbo. Inf. IV, 144.
Avicenna (980–1037): Persian physician, philosopher, and scientist. He wrote commentaries on Aristotle and Galen.
Encountered by Dante in Limbo. Inf. IV, 143.
Azzo VIII: Lord of Ferrara, Modena and Reggio from 1293 until his death in 1308. He was rumoured to have murdered his father Obizzo II d'Este.
The "figliastro" who killed Obizzo. Inf. XII, 112.
B
Bacchus: The Roman name of the Greek god Dionysus, protector of wine.
Born in the Thebes. Inf. XX, 59.
Barbarossa: Frederick I Barbarossa, Holy Roman Emperor (1155–1190). He captured Milan in his Italian campaign in 1154. Purg. XVIII, 119.
Barrators: Those who have committed the sin of barratry.
The barrators, are found in the fifth pouch in a lake of boiling pitch guarded by the Malebranche. Inf. XXI–XXII.
Barratry: The sin of selling or paying for offices or positions in the public service or officialdom (cf. simony).
One of the sins of ordinary fraud punished in the eighth circle. Inf. XXI, 60.
"Beati misericordes": "Blessed are the merciful." (Mat 5:7)
Heard by Dante as he passed upward out of the terrace of the envious. Purg. XV, 38.
"Beati mundo corde": "Blessed are the pure in heart." (Mat 5:8).
Sung by an angel before Dante passed upward out of the terrace of the lustful. Purg. XXVII, 8.
"Beati pacifici": "Blessed are peacemakers." (Mat 5:9)
Heard by Dante as he passed upward out of the terrace of the angry. Purg. XVII, 68–69.
"Beati pauperes spiritu": "Blessed are the poor in spirit." (Mat 5:3)
Heard by Dante as he passed upward out of the terrace of the prideful. Purg. XII, 110.
"Beati quorum tecta sunt peccata": "Blessed are they whose sins are covered." (Psalm 32:1; Psalm 31:1 in the Latin Vulgate.)
Sung by Matilda as she conversed with Dante in Terrestrial Paradise. Purg. XXIX, 1–3.
Baptist: See John the Baptist.
Beatrice (1266–1290): Dante's idealised childhood love, Beatrice Portinari. In the poem, she awaits the poet in Paradise, replaces Virgil as Dante's guide, and conducts him through the heavens. She symbolises Heavenly Wisdom.
The "worthier spirit" who Virgil says will act as Dante's guide in Paradise. Inf. I, 121–123.
Asks Virgil to rescue Dante and bring him on his journey. Inf. II, 53–74.
Asked by Lucia to help Dante. Inf. II, 103–114.
When Dante appears upset by Farinata's prophecy on his future exile, Virgil intervenes and explains to him that Beatrice, "quella il cui bell' occhio tutto vede" ("one whose gracious eyes see everything"), will eventually clarify all. Inf. X, 130–132.
Virgil, speaking with Chiron, alludes to Beatrice as she who has entrusted Dante to him. Inf. XII, 88.
Speaking with Brunetto Latini Dante alludes to her as the woman who shall fully explain the sense of Brunetto's prophecy regarding his exile from Florence. Inf. XV, 90.
Virgil uses the promise of meeting Beatrice to encourage Dante to enter the fire of Purgatory. Purg. XXVII, 36.
Dante meets Beatrice in Purgatory. Purg. XXX, 31.
Saint Bede: English monk, and scholar, whose best-known work, Historia ecclesiastica gentis Anglorum (The Ecclesiastical History of the English People) gained him the title "The father of English history".
Encountered in the Fourth Sphere of Heaven (The sun). Par. X, 130–131.
Belacqua: Personal acquaintance of Dante's, perhaps Duccio di Bonavia, a music instrument maker noted for his laziness.
Dante encounters him in Ante-Purgatory, waiting a lifetime because he waited to his deathbed to repent. Purg. IV, 106–135.
Belisarius: (c. 500–565) Roman general who served under the Emperor Justinian and regained much of Italy for the Empire.
Commended by the soul of Justinian in Heaven. Par. VI, 25–27.
"Benedictus qui venis" ("Blessed are you who come") Variation of "Benedictus qui venit" ("Blessed is he who comes"), sung in the Sanctus of the Latin Mass. The phrase comes from the Gospel of Mark (Mark 11:10), when the crowds welcome Jesus into Jerusalem.
Sung by angels in the Pageant of the Church Triumphant, welcoming Beatrice to the procession. Purg. XXX, 19.
Mastro Benvenuto: Nicknamed Asdente ("toothless"), he was a late 13th-century Parma shoemaker, famous for his prophecies against Frederick II. Dante also mentions him with contempt in his Convivio, as does Salimbene in his Cronica, though with a very different tone.
Among the soothsayers. Inf. XX, 118–120.
Gualdrada Berti: Daughter of Bellincione Berti dei Ravignani, from about 1180 wife to Guido the Elder of the great Guidi family, and grandmother of Guido Guerra. The 14th-century Florentine chronicler Giovanni Villani remembers her as a model of ancient Florentine virtue.
"The good Gualdrada". Inf. XVI, 37.
Bertran de Born (c. 1140 – c. 1215): French soldier and troubadour poet, and viscount of Hautefort, he fomented trouble between Henry II of England and his sons.
Among the sowers of discord, where he carries his severed head (although he died a natural death). Inf. XXVIII, 118–142.
"The lord of Hautefort." Inf. XXIX, 29.
Bonagiunta of Lucca: Tuscan poet. He uses the phrase "dolce stil novo" to describe the poetry of Dante, Guido Guinizelli, and Guido Cavalcanti. Purg. XXIV, 43–63.
Guido Bonatti: A prominent 13th-century astrologer, and a staunch Ghibelline, he is famous for having boasted of being responsible for the Senese victory at Montaperti in 1260.
Among the soothsayers. Inf. XX, 118.
Bonaventure: Franciscan theologian.
He eulogised St. Dominic. Par. XII, 31–105.
Buonconte: Son of military strategist Guido da Montefeltro, he helped expel the Guelph party from Arezzo in 1287. His army was defeated by Guelphs from Florence at the Battle of Campaldino in 1289. Dante fought for Florence in the battle. Buonconte's body was not found after the battle.
Dante encounters Buonconte waiting to enter Purgatory among the souls who died violent deaths and repented in the final moments. Purg. V, 85–125.
Pope Boniface VIII (c. 1235–1303): Elected in 1294 upon the abdication of Celestine V, whom he promptly imprisoned. He supported the Black Guelphs against Dante's party the White Guelphs (see Guelphs and Ghibellines). He was in conflict with the powerful Colonna family, who contested the legitimacy of Celestine's abdication, and thus Boniface's papacy. Wishing to capture the impregnable Colonna stronghold of Palestrina, he sought advice from Guido da Montefeltro, offering in advance papal absolution for any sin his advice might entail. He advised Boniface to promise the Colonnas amnesty, then break it. As a result, the Collonas surrendered the fortress and it was razed to the ground.
"One who tacks his sails". Inf. VI, 68.
Referred to ironically using one of the official papal titles "servo de' servi" (Servant of His servants"). Inf. XV, 112
Accused of avarice, deceit and violating the "lovely Lady" (the church). Inf. XIX, 52–57.
Pope Nicholas III prophesies his eternal damnation among the Simoniacs. Inf. XIX, 76–77.
The "highest priest—may he be damned!". Inf. XXVII, 70.
The "prince of the new Pharisees". Inf. XXVII, 85.
His feud with the Colonna family and the advice of Guido da Montefeltro. Inf. XXVII, 85–111.
Treatment at the hands of Philip IV of France compared to a new crucifixion of Jesus. Purg. XX, 85–93.
Guglielmo Borsiere, a pursemaker accused of sodomy (see Sodom), who made a joke that was the subject of the Decameron (i, 8).
A sodomite mentioned in the seventh circle, round 3 by Jacopo Rusticucci as having spoken to him and his companions of the moral decline of Florence, generating great anguish and inducing Rusticucci to ask Dante for corroboration. Inf. XVI 67–72.
Martin Bottario: A cooper of Lucca who held various positions in the government of his city. He died in 1300, the year of Dante's travel.
Probably the "elder of Saint Zita" who is plunged into a lake of boiling pitch with the other barrators by a Malebranche. Inf. XXI, 35–54.
Brennus: Gaulic king who invaded Rome and held the city for ransom in the 4th century BCE.
He was the last successful foreign invader of the city until the 5th century. Par. VI, 44.
Briareus: Son of Uranus and Gaia and one of the Hekatonkheires ("hundred-handed")
Bound in the Well of the Giants in Hell. Dante asks Virgil to point him out. Inf. XXXI, 97–105.
Depicted on the pavement in Purgatory being hurled from Olympus as an exemplar of arrogance. Purg. XII, 28.
Agnello Brunelleschi: From the noble Florentine Brunelleschi family, he sided first with the White Guelphs, then the Blacks. A famous thief, he was said to steal in disguise.
Among the thieves, he merges with Cianfa Donati to form a bigger serpent. Inf. XXV, 68.
Brutus, Lucius Junius: Traditionally viewed as the founder of the Roman Republic, because of his role in overthrowing Tarquin, the last Roman king.
Seen in Limbo. Inf. IV, 127.
Brutus, Marcus Junius (died 43 BCE): One of the assassins of Julius Caesar, with whom he had close ties. His betrayal of Caesar was famous ("Et tu Brute") and along with Cassius and Judas, was one of the three betrayer/suicides who, for those sins, were eternally chewed by one of the three mouths of Satan. Inf. XXXIV, 53–67.
Bulicame: Spring near Viterbo renowned for its reddish colour and sulphurous water. Part of its water was reserved for the use of prostitutes. Inf. XIV, 79–83.
C
Caccia d'Asciano: See Spendthrift Club.
Venedico and Ghisolabella Caccianemico: Venedico (c. 1228 – c. 1302) was head of the Guelph faction in Bologna, he was exiled three times for his relationship with the marquess of Ferrara, Obizzo II d'Este.
Found among the panders, he confesses that he prostituted his sister Ghisolabella to Obizzo. Inf. XVIII, 40–66.
Cacus: A mythological monster son of Hephaestus, he was killed by Heracles for stealing part of the cattle the hero had taken from Geryon. Dante, like other medieval writers, erroneously believes him to be a Centaur. According to Virgil he lived on the Aventine.
As guardian of the thieves he punishes Vanni Fucci. Inf. XXV, 17–33.
Cadmus: Mythical son of the Phoenician king Agenor and brother of Europa, and legendary founder of Thebes. Cadmus and his wife Harmonia are ultimately transformed into serpents. (See also Hera.)
His transformation in Ovid's Metamophoses (IV, 562–603) is compared to the fate of the thieves. Inf. XXV, 97–99.
Caecilius: Roman poet of the 2nd century BCE.
Resident of Limbo. Purg. XXII, 97.
Cahors: Town in France that was notorious for the high level of usury that took place there and became a synonym for that sin.
Mentioned as being punished in the last circle. Inf. XI, 50.
Cain: The son of Adam and brother of Abel. He murdered his brother out of envy.
A popular tradition identified the Moon's dark spots as the marks on Cain's face mentioned in Genesis 4:15. Inf. XX, 126, Par. II, 49–51.
The outermost ring of Cocytus, where the treacherous to kin are punished, is named Caïna. Inf. XXXII, 58.
He is an example of envy. His voice is heard on the terrace of the envious saying, "Everyone who finds me will slay me." (Gen 4:14) Purg. XIV, 133.
Caiaphas: The Jewish High Priest during the governorship of Pontius Pilate of the Roman province of Judea, who according to the Gospels had an important role in the crucifixion of Jesus.
Among the hypocrites, his punishment is to be crucified to the ground while the full rank of the sinners tramples him. Inf. XXIII, 110–120.
Calchas: Mythical Greek seer at the time of the Trojan war, who as augur at Aulis, determined the most propitious time for the Greek fleet to depart for Troy.
With Eurypylus, he "set the time to cut the cables". Inf. XX, 110–111.
Calliope: The Muse of epic poetry.
Invoked by Dante at the beginning of the Purgatorio. Purg. I, 9.
Camilla: Figure from Roman mythology and Virgil's Aeneid (VII, 803; XI), was the warrior-daughter of King Metabus of the Volsci, and ally of Turnus, king of the Rutuli, against Aeneas and the Trojans, and was killed in that war.
One of those who "died for Italy". Inf. I, 106–108.
Seen in Limbo. Inf. IV, 124.
Cangrande della Scala (1290–1329): Ghibelline ruler of Verona and most probable figure behind the image of the "hound" ("il Veltro"). Inf. I, 101–111.
Capaneus: In Greek mythology, in the war of the Seven against Thebes, he defied Zeus who then killed him with a thunderbolt in punishment.
Found amongst the violent against God. Inf. XIV, 46–72.
His pride is compared with that of Vanni Fucci. Inf. XXV, 15.
Capocchio: Burned at the stake for alchemy in 1293.
Among the "falsifiers" of metal (alchemists), sitting with Griffolino of Arezzo, propping each other up, as they frantically scratch at the scabs covering their bodies. Inf. XXIX, 73–99.
Agrees with Dante about the vanity of the Sienese, giving as examples four of the members of the Sienese Spendthrift Club, then identifies himself. Inf. XXIX, 124–139.
He is dragged, with his belly scraped along the ground, by the tusks of Schicchi. Inf. XXX, 28–30.
Caprona: Fortress on the Arno near Pisa, in 1289, it was besieged by a Tuscan Guelph army. The Ghibellines surrendered, and were allowed, under truce, to leave the castle, passing through (with trepidation) the enemy ranks. Caprona's fall along with the Guelph victory in the same year at Campaldino represented the final defeat of the Ghibellines. Dante's reference to Caprona in the Inferno, is used to infer that he took part in the siege.
Dante's fear for his safe passage through threatening devils, is compared to the fear of the surrendering soldiers at Caprona. Inf. XXI, 88–96.
Cardinal Virtues: The foundations of a moral life, attainable by all, regardless of religion. They include Prudence, Temperance, Justice, and Fortitude.
They appear symbolically as four stars visible from Purgatory. Purg. I, 37; VIII, 91.
Virgil defines Prudence as "the power that counsels and keeps the threshold of assent." Purg. XVIII, 62–63.
Casella: Florentine composer and singer (died before 1300) and friend of Dante's, who set at least one poem from Dante's Convivio to music. Purg. II.
Cassius: The most senior of Julius Caesar's assassins, Gaius Cassius Longinus was a Roman politician and soldier.
Along with Brutus and Judas, he was one of the three betrayer/suicides who, for those sins, were eternally chewed by one of the three mouths of Satan. Inf. XXXIV, 53–67.
Castel Sant'Angelo: A Papal castle in Rome with bridge attached. Inf. XVIII, 28–33.
Catalano dei Malavolti (c. 1210–1285): From a powerful Guelph family of Bologna, he was podestà in several towns, including Florence, and governor of his city. He was commander of the infantry in the Battle of Fossalta in 1249, when the Ghibellines suffered a crushing defeat. He later became a member of the Knights of St. Mary, founded by Loderingo degli Andalò.
Among the hypocrites. Inf. XXIII, 76–144.
Catiline: a Roman politician of the 1st century BCE who is best known for the "Catiline conspiracy", an attempt to overthrow the Roman Republic, and in particular the power of the aristocratic Senate.
Probably Pistoia's "seed", which Pistoia surpasses in "wickedness". Inf. XXV, 12.
Cato the Younger (95–46 BCE) : Politician and statesman in the late Roman Republic, and a Stoic.
His crossing of the Libyan desert in 47 BCE provides a simile for the hot sands of the seventh circle. Inf. XIV, 14–15.
The "patriarch" who resides at the base of Mount Purgatory and functions as gate-keeper for Purgatory. Purg. I, 31.
Cavalcante de' Cavalcanti: (died c. 1280) Father of Guido Cavalcanti, his shade appears to Dante, alongside the shade of Farinata degli Uberti. Inf. X 52–72.
Guido Cavalcanti (c. 1255–1300): First Florentine poet of Dolce Stil Novo, close friend of Dante and son of Cavalcante de' Cavalcanti. Inf. X, 56–63, Purg. XI, 97–98.
Francesco de' Cavalcanti: Nicknamed Guercio ("one-eyed" or "squinter"), he was murdered for unknown reasons by the inhabitants of the village of Gaville, near Florence. Reportedly his death started a bloody feud between his family and the villagers, leaving most of the inhabitants of Galville dead.
Among the thieves, as a "blazing little serpent", he attacks the soul of Buoso Donati, causing it to transform into a serpent, and himself to transform back into human form. Inf. XXV, 82–151.
Cecina: See Maremma.
Pope Celestine V: A hermit named Pietro da Morrone, he abdicated the Papacy in 1294 after only five months. His successor, Boniface VIII, immediately jailed him and two years later apparently murdered him.
Is perhaps the person whose shade Dante meets in the Ante-Inferno, where those who lived "sanza 'nfamia e sanza lodo" (without praise and blame) dwelt, and referred to as the one, "Che fece per viltate il gran rifiuto" (who made, through cowardice, the great refusal). Inf. III, 60.
Of whom Boniface says, "I possess the power to lock and unlock Heaven; for the keys my predecessor did not prise are two". 'Inf. XXVII, 105.
Centaurs: In Greek mythology, a race part Man and part horse, with a horse's body and a human head and torso.
Supervising the punishment of the violent. Their leader Chiron appoints one of their number, Nessus, to guide the poets. Inf. XII, 55–139.
The only one not with the violent is Cacus, who supervises the thieves. Inf. XXV, 28–30.
Cited as examples of gluttony in Purgatory by a voice hidden in a tree of temptation, because of their drunken behavior at the marriage feast of Hippodamia. Purg. XXIV, 121–123.
Ceperano: See Apulia.
Cerberus: In Greek mythology, he was the three-headed dog who guarded the gate to Hades. In the Aeneid, Virgil has the Sibyl throw a drugged honey cake into Cerberus' mouths; in the Inferno, Dante has Virgil throw dirt instead.
Encountered In the third circle. Inf. VI, 13–33.
Example of divine punishment. Inf. IX, 98.
Cesena: City on the Savio River during Dante's time, though free, its politics were controlled by Guido da Montefeltro's cousin Galasso da Montefeltro. Inf. XXVII, 52–54.
Charles the Lame: Son of Charles of Anjou and King of Naples (1285–1309)
Forced to marry off his daughters "like slaves" for political alliances. Purg. XX, 79–81.
Charles of Anjou (also Charles I of Sicily) (1227–1285): Son of Louis VIII of France, he was one of the most powerful rulers of his age and the undisputed head of the Guelph faction in Italy. His dream of building a Mediterranean Empire was wrecked by the Sicilian Vespers.
Dante probably alludes to the Byzantine money that it was believed Nicholas III had taken with the promise to hinder Charles' plans against Constantinople. Inf. XIX, 98–99.
Defeated Conradin at Tagliacozzo in 1268 and became King of Sicily. Purg. XX, 68.
According to Dante, responsible for the death of Thomas Aquinas. Purg. XX, 69.
Charles of Valois: (1270–1325) Second son of Philip III of France. Invaded Italy and took Florence in 1301, placing the Black Guelphs in power. Subsequently, Dante was exiled from Florence.
Compared to Judas. Purg. XX, 70–78.
Charybdis: In Greek mythology, a sea monster who swallows huge amounts of water three times a day and then spouts it back out again, forming an enormous whirlpool. Mentioned frequently by classical writers.
Used in a simile to describe the punishment of the greedy and prodigal in the fourth circle. Inf. VII, 22.
Charon: The mythological Greek figure who ferried souls of the newly dead into Hades over the underworld river Acheron. Inf. III, 82–129.
Chiron: Leader of the centaurs, legendary tutor of Achilles. Inf. XII, 65.
Ciacco ("pig"): Nickname, for a Florentine contemporary of Dante, perhaps well known as a glutton, and probably the same who appears in Boccaccio's Decameron (IX, 8).
Central figure of canto VI, he voices the first of many prophecies concerning Florence. Inf. VI, 37–99.
Ciampolo di Navarra: Utterly unknown to sources other than Dante, this Ciampolo (i.e. Jean Paul) appears to have been in the service of Theobald II, king of Navarre.
Among the barrators. Inf. XXII, 31–129.
Cicero, Marcus Tullius (c. 106 – c. 43 BCE): Roman statesman and author.
Encountered by Dante in Limbo. Inf. IV, 141.
Cimabue: Florentine painter (c. 1240–1302)
Mentioned in Purgatory as a famous painter. Purg. XI, 94.
Circe: Mythical daughter of Helios, god of the Sun, and sister of Aeetis, king of Colchis. She was an enchantress who lived near the Gulf of Gaeta, who turned the crew of Odysseus into pigs on their journey home from the Trojan war. But Odysseus, with the help of Hermes, forced her to release his men from her spell (Ovid, Met. XIV, 435–440). She fell in love with Odysseus and he stayed with her for another year and in some accounts, she had a son Telegonus with Odysseus, who was to accidentally kill him.
It is said, by Ulysses (Odysseus), that she "beguiled" him. Inf. XXVI, 90–92.
The people of Tuscany fall into vice, as if under her spell. Purg. XIV, 42.
Cirra: Town in ancient Greece near Parnassus. Par. I, 36.
Pope Clement V (1264–1314): Born in France as Bertran de Goth, he was made archbishop of Bordeaux by Pope Boniface VIII. He was elected pope in 1305 and was remarkable for his dissolution of the Templars and his de facto move of the Papal See from Rome to Avignon (See Avignon Papacy). He was thought to have negotiated with Philip IV of France for his papacy, becoming a puppet of the French monarchy.
"One uglier in deeds ... a lawless shepherd from the west", whose damnation among the Simoniacs is foretold by Pope Nicholas III. Inf. XIX, 79–87.
Cleopatra (69–30 BCE): Queen of Egypt, lover of Julius Caesar and Mark Antony. Like Dido, she "killed herself for love".
Found amongst the sexual sinners. Inf. V, 63.
Clio: The Muse of History.
Mentioned by Virgil as Statius' inspiration in writing the Thebaid. Purg. XXII, 58.
Clotho: The Fate who determines the lifespan of each mortal by measuring out thread and then cutting it.
Virgil cites her as the reason Dante is yet alive. Purg. XXI, 25–27.
Cluny: A Benedictine monastery founded in 909, in Burgundy. The elegant robes of the Cluniacs are described with irony in a letter of Saint Bernard, a Cistercian, to his nephew Robert, who had left the Cistercians to join the Cluniacs.
The "cloaks and cowls" of the hypocrites are compared to the Cluniac robes. Inf. XXIII, 61–63.
Cocytus: "The river of lamentation", in Greek mythology, it was the river on whose banks the dead who could not pay Charon wandered. It flowed into the river Acheron, across which lay Hades. In the Inferno it is a frozen lake forming the ninth circle and the bottom of Hell.
Formed from the tears of the statue of the Old Man of Crete. Inf. XIV, 94–120.
Is shut in by cold. Inf. XXXI, 121–122.
Described. Inf. XXXII, 22–39.
Frozen by flapping of the wings of Dis. Inf. XXXIV, 46–52.
Colchis: Ancient kingdom at the eastern end of the Black Sea. According to ancient Greek legend, Jason and the Argonauts sailed there in search of the Golden Fleece.
Dante compares the voyage to his journey through the heavens. Par. II, 16–18.
Conradin: (1252–1258) King of Sicily until 1258, when he was defeated and deposed by Charles of Anjou. Purg. XX, 68.
Constance (Constanza): Queen of Sicily in the 12th century and mother of Emperor Frederick II.
Dante accepts a story that Constance had taken monastic vows and was later forced to renounce them. She appears among the inconstant in the Heaven of the Moon. Par. III, 109–120.
Constantine the Great (272–337): The famous Roman Emperor who passed the Edict of Milan in 313 and converted to Christianity. According to medieval legend, Constantine was inflicted with leprosy because of his persecution of Christians, and in a dream was told to seek out Pope Silvester on Mount Soracte, who baptised and cured him. According to the forged document, the Donation of Constantine, Constantine gave to the Pope the power to rule over Rome and the Western Roman Empire, which Dante sees as the source of the corruption of the Papacy.
Blamed for "the dower that you bestowed upon the first rich father!", Inf. XIX, 115–117.
Guido da Montefeltro compares Silvester being sought by Constantine to cure his leprosy, with himself being sought by Boniface to "ease the fever of his arrogance". Inf. XXVII, 94–95.
In converting to Christianity, Constantine reversed the flight of the Roman Eagle. Par. VI, 1.
Cornelia Africana (c. 190–100 BCE): daughter of Scipio Africanus Major, and mother of Tiberius and Gaius Gracchus.
Encountered by Dante in Limbo. Inf. IV, 128.
Corneto: See Maremma.
Cronus: In Greek mythology, King of Crete during the Golden Age. He had several children by Rhea, but swallowed them at birth because he had learned from his parents Gaia and Uranus, that he was destined to be overthrown by a son. However, Rhea managed to save Zeus who eventually fulfilled that prophecy.
Under his rule, the world lived chastely". Inf. XIV, 96.
Rhea protects Zeus from him. Inf. XIV, 100–102
Crassus: Roman general who amassed the largest fortune in Roman history. He died in a battle with the Parthians. A story later circulated that the Parthians poured molten gold into his mouth.
Cited on the terrace of the greedy as an example of greed. "Tell us, Crassus, because you know: How does gold taste?" Purg. XX, 116–117.
Cunizza da Romano (1198–c. 1279): sister of Ezzelino III da Romano. Par. IX, 13–66.
Gaius Scribonius Curio: A distinguished orator, and supporter of Pompey the Great, he switched his support to Julius Caesar after Caesar paid his debts. Lucan (Phars I 270–290) has Curio urge Caesar persuasively, to quickly cross the Rubicon and invade Rome.
Among the sowers of discord, he is pointed out by Pier da Medincina, his tongue having been slit, "who once was so audacious in his talk!". Inf. XXVIII, 91–111.
Cyclops: Children of Uranus and Gaia, they were giants with a single eye in the middle of their forehead. In Roman mythology, they helped Vulcan make thunderbolts for Zeus.
The "others" who Zeus "may tire" making thunderbolts. Inf. XIV, 55.
Cytherea: Alternative name for Aphrodite or Venus, the goddess of love. Also, the planet Venus.
In his last night in Purgatory, Dante dreams as the planet is rising. Purg. XXVII, 94–96.
D
Daedalus: In Greek mythology, he was a legendary inventor and craftsman. He designed the Labyrinth, and fashioned wings for himself and his son Icarus, enabling them to fly.
Mentioned by Griffolino of Arezzo. Inf. XXIX, 116.
Daniel: Protagonist in the Book of Daniel of the Hebrew Bible. He and his companions fasted rather than incur ritual defilement when they ate in the court of the king of Babylon.
A voice in Purgatory cites Daniel as an example in the virtue of temperance. Purg. XXII, 146–147.
Dante compares Beatrice's solution of his mental doubts to Daniel's solution of Nebuchadnezzar's troubled dream in the biblical book of Daniel. Par. IV, 13–15.
Bonturo Dati (died 1324): Head of the popular faction in Lucca, he expelled his enemies in 1308 assuming the government of the city, boasting he would put an end to barratry. He is famous for provoking with his jeers in 1313 a war with Pisa, that has been remembered in Faida di Comune by Giosuè Carducci.
Sarcastically and ironically said that all Luccans but he are guilty of barratry. Inf. XXI, 41.
King David: Biblical king of the Jews. His counselor Ahithophel, incited David's son Absalom against him.
Raised by Jesus from Limbo into Paradise. Inf. IV, 58.
His son's rebellion, and the urgings of Ahithophel is compared by Bertran de Born to his own urgings of Prince Henry against his father Henry II of England. Inf. XXVIII, 134–138.
Appears depicted in a wall carving as the "humble psalmist," leading the procession of the Ark to Jerusalem. Purg. X, 64.
Decii: Three generations of men in a Patrician Roman family, who each answered the call to arms and died in battle.
Mentioned as exemplars of Roman virtue in the days of the Roman Republic. Par. VI, 47.
Deianira: Wife of Heracles, she was abducted by the centaur Nessus, but Heracles shot him with a poisoned arrow. She was tricked by the dying Nessus into believing that a love potion could be made from his blood, which she later gives to Heracles poisoning him. Inf. XII, 68.
Deidamia: Mythical daughter of Lycomedes, king of Scyros, she gave birth to Achilles' only son, Pyrrhus Neoptolemus, but died of grief when, because of the urgings of Odysseus (Ulysses), Achilles left her to go to the war against Troy.
Even dead she laments Achilles still. Inf. XXVI, 61–62.
Resident of Limbo. Purg. XXII, 113.
Deipyle: Ancient Greek wife of Tydeus and mother of Diomedes.
Resident of Limbo. Purg. XXII, 110.
"Delectasti": ("Quia delectasti me, Domine, in factura tua": "For thou hast given me, O Lord, a delight in thy doings.") Psalm 92:5 (91:5 in the Latin Vulgate)
Quoted by Matilda as the reason she smiled broadly at Dante in Terrestrial Paradise. Purg. XXVIII, 76–81.
Democritus (c. 460–370 BCE): Pre-Socratic Greek philosopher.
Encountered by Dante in Limbo, "che 'l mondo a caso pone" ("who ascribes the world to chance"). Inf. IV, 136.
"Deus, venerunt gentes": ("O God, the heathen have come.") Incipit of Psalm 79 (Psalm 78 in the Vulgate)
Chanted as a lamentation over the Church by the women representing the Three Theological Virtues and Cardinal Virtues. Purg. XXXIII, 1–6.
Diana: Greco-Roman goddess, known as the "virgin goddess."
Cited as an example of sexual abstinence by souls on the terrace of the lustful. Purg. XXV, 130–132.
Dido: Queen of Carthage. In Virgil's Aeneid, she becomes the lover of Aeneas despite a vow of eternal fidelity to her dead husband Sichaeus. Consequently, as "colei, che s' ancise amorosa" (she who killed herself from love"), Dante places her amongst the sexual sinners. Inf. V, 61–62.
Diogenes of Sinope (c. 412–323 BCE): Greek philosopher.
Encountered by Dante in Limbo. Inf. IV, 137.
Diomedes: Mythical king of Argus, he participated in the expedition against Troy, where his prowess is extolled in the Iliad. A great friend of Odysseus (Ulysses), he was his companion in many feats, most notably the theft of Troy's Palladium and the ruse of the Trojan Horse.
Among the advisors of fraud, he is punished with Ulysses for the sins they both committed at Troy. Inf. XXVI, 52–63.
Dionysius the Areopagite (fl. c. 50): Athenian judge who was converted to Christianity and became a bishop of Athens. As was common in the Middle Ages, Dante has confused him with Pseudo-Dionysius, the anonymous 5th-century author of Celestial Hierarchy.
Identified in the Heaven of the Sun by Thomas Aquinas. Par. X, 115–117.
Dionysius the Elder: Tyrant of Syracuse (405–367 BCE).
Pointed out by Nessus. Inf. XII, 107–108.
Pedanius Dioscorides (c. 40 – c. 90): Greek physician and author of a work on the medicinal properties of plants, hence Dante's description of him as "il buono accoglitor del quale"/"the good collector of the qualities".
Encountered by Dante in Limbo. Inf. IV, 139–140.
Dis: Another name for Pluto, the Roman god of the underworld, used by Dante as both the name of Satan and his realm.
First glimpse of the "crimson" city. Inf VIII, 67–75.
Dante refused entry. Inf VIII, 76–130.
The city dolente (of sorrowing). Inf IX, 32.
Entrance. Inf IX, 73–133.
Spoils taken from by Jesus. Inf. XII, 38–39.
Pointed out by Virgil. Inf. XXXIV, 20.
Fra Dolcino: In 1300 he headed the Apostolic Brothers, a reformist order which, inspired by the example of St. Francis renounced all worldly possessions. He and his followers were condemned as heretics by Clement V, and fled into the hills near Novara. Facing starvation they surrendered and Dolcino was burned at the stake in 1307.
Among the "sowers of dissension", Muhammad, says to Dante: "tell Fra Dolcino to provide himself with food, if he has no desire to join me here quickly". Inf. XXVIII, 22–63.
Saint Dominic: Founder of the Dominican Order.
He is eulogised by Bonaventure. Par. XII, 31–105.
Domitian: Roman Emperor (81–96). His religious policies resulted in persecution of Christians and Jews.
Statius relates how witnessing the persecution helped to convert him to Christianity. Purg. XXII, 82–87.
Buoso Donati: Of the noble Florentine Black Guelph Donati family, he was one of those who accepted the peace between the factions proposed by Cardinal Latino in 1280. He died around 1285.
Among the thieves, he is transformed into a serpent by Francesco de' Cavalcanti. Inf. XXV, 82–151.
His impersonation by Gianni Schicchi described. Inf. XXX, 43–45.
Cianfa Donati: Of the Donati family, he is known to have acted as advisor to the Capitano del popolo in 1281. In 1289 he is reported as already dead.
Among the thieves, he appears as a six-footed serpent, attacks and melds with Agnello Brunelleschi. Inf. XXV, 43–78.
Forese Donati (?–1296): A Florentine poet, friend of Dante, and relative of Dante's wife, Gemma Alighieri.
Among the gluttons, he predicts disaster for Florence and for his brother, Corso Donati. Purg. XXIII, 42 – XXIV, 99.
Notes that the prayers of his surviving wife Nella have greatly reduced his stay in Purgatory. Purg. XXIII, 76–93.
Piccarda Donati: Sister of Forese Donanti, already dead at the time setting of the Comedy.
In Purgatory, Dante asks Forese Donati where his dead sister is and learns that she is "in triumph." Purg. XXIV, 10–16.
Dragon
Allegorical representation of the Islamic conquests of Christian territory in the Pageant of Church History. Purg. XXXII, 130–135.
E
Eagle: Bird which appeared on the Standard of the Roman Legions and symbolized the authority of the empire.
An Eagle appears twice in the Pageant of Church History. It first represents the persecution of the early Church by the Roman Empire. Purg. XXXII, 109–117. Then it returns, representing connection of the Church and Empire starting with the Emperor Constantine I. Purg. XXXII, 124–129.
The administration of justice is dispensed in the form of an Eagle which appears in Par. XVIII and answers Dante in Par. XIX and Par. XX on the matter of whether any who are not Christian can be saved.
Ebro: River in Spain.
Used as a reference to the time of day. Dante considered it to be 6 hours ahead of Purgatory. Purg. XXVII, 2–3.
Ecce ancilla Dei: "Behold the handmaid of God." (In the original Vulgate: "Ecce ancilla Domini.") Response of the Virgin Mary to the angel Gabriel when he announced that she would be the mother of Jesus.
Words seen in a wall-carving depicting the Annunciation. It is a visual representation of humility. Purg. X, 44.
Electra: Mother of Dardanus founder of Troy and ancestor of Aeneas.
Seen in Limbo with "her many comrades". Inf. IV, 121–128.
Elijah and Elisha: Elijah was an Old Testament Biblical Prophet who ascends into heaven in a chariot of fire, and Elisha was his disciple and chosen successor who witnessed Elijah's ascent. Elisha curses some youths for ridiculing him, who are then eaten by bears (2 Kings 2:23–24; 11–12)
Elijah's fiery ascent, as witnessed by "he who was avenged by bears" (Elisha), is described. Inf. XXVI, 34–39.
Empedocles (c. 490 – c. 430 BCE): Greek Presocratic philosopher.
Encountered by Dante in Limbo. Inf. IV, 138.
England: see Anglo-Scottish War
Ephialtes: Son of Poseidon and Iphimedeia, Ephialtes was a giant who attempted to scale Mt. Olympus by piling mountains on each other.
Seen chained in the "Well of the Giants." Inf. XXXI, 82–111.
Epicurus was an Ancient Greek philosopher who was the founder of Epicureanism, one of the most popular schools of Hellenistic Philosophy, which had many followers among Florentine Guibellines. His teaching that the greatest pleasure is merely the absence of pain was viewed as heresy in Dante's day because this greatest good could be attained without reference to a god or an afterlife.
Epicurean heretics and their punishment. Inf. X.
Erard de Valéry: See Tagliacozzo.
Erichtho: According to a story in Lucan's Pharsalia, she was a sorceress sent to the underworld by Sextus Pompeius to divine the outcome of the upcoming battle of Pharsalia between his father, Pompey the Great, and Julius Caesar.
She sent Virgil to the innermost circle of hell not long after his death. Inf. IX, 22–29.
Erinyes: (also known as the Furies). In Greek mythology, they were Alecto, Megaera, and Tisiphone, three female personifications of vengeance.
They appear and threaten Dante with the head of the Medusa. Inf. IX, 34–72.
Erysichthon: Ancient King of Thessaly who cut down a grove of trees sacred to Demeter. Her revenge was to give him insatiable hunger which eventually caused him to consume his own flesh.
Seeing fasting souls in Purgatory on the terrace of the gluttonous, Dante is reminded of Erysichthon's story. Purg. XXIII, 25–27.
Eteocles and Polynices: Mythical sons of Oedipus and Jocasta, they succeeded their father as kings of Thebes. Eteocles' refusal to share the throne led to the war of the Seven against Thebes, in which the two brothers killed each other. Their enmity in life was such that Statius (Thebais XII, 429 ff.) says even the flames of their shared funeral pyre were divided.
The separateness of the flames of Ulysses and Diomedes are compared to their funeral flames. Inf. XXVI, 52–54.
Ethiopia: empire of the Abyssinian people situated on the Horn of Africa under the Solomonic dynasty (1270-1974).
the Eagle of Justice cites the people of Ethiopia, along with peoples of Persia and India, among examples of those naturally and blamelessly without knowledge of Christ who at the Day of Judgement will, nevertheless, be closer to Christ than many who call themselves Christian, Par. XIX, 109–111
Euclid (c. 365–275 BCE): Greek mathematician, now known as "the father of geometry".
Encountered by Dante in Limbo. Inf. IV, 142.
Eunoe: River originating in Terrestrial Paradise which shares a common source with the River Lethe. To drink from the Eunoe is to recall to memory all the good deeds of one's life after losing all memory in the River Lethe.
Not found in classical sources, the Eunoe is a creation of Dante. The word means "good knowledge" in Greek. Purg. XXXIII, 127–145.
Euripides: Greek playwright of the 5th century BCE.
Resident of Limbo. Purg. XXII, 106.
Euryalus: Friend of Nisus, he is a Roman mythological who appears in the Aeneid—one of those who "died for Italy". Inf. I, 106–108
Eurypylus: He was a member of the Greek army that conquered Troy. It is told that while the fleet was at Aulis he was sent to the Delphic Sibyl to ask for a favourable wind.
Seen among the seers, with Calchas, he "set the time to cut the cables". Inf. XX, 106–113.
Ezekiel: Jewish Prophet and author of a book of the Old Testament.
The four beasts of his vision (Ezekiel 1:1–28) appear as allegories of the four Gospels in the Pageant of the Church Triumphant. Purg. XXIX, 100–102.
Ezzelino da Romano III (1194–1259): Leader of the Ghibellines in Northern Italy, known for his cruelties against the citizens of Padua.
Pointed out by Nessus. Inf. XII, 109.
F
Fabii: Roman family of the Republican Age.
Cited as examples of dedication to the public life and to the glory of ancient Rome. Par. VI, 47.
Fabricius: Caius Fabricius, famous Roman hero of the 3rd century BCE. He is remembered for his frugality and his refusal to accept substantial bribes from Pyrrhus.
Cited by Hugh Capet, who is repenting on the terrace of the greedy, as an example of life without greed. Purg. XX, 25–27.
Falterona: Mountain in the Apennine Range
Mentioned as the source of the Arno River. Purg. XIV, 16.
Farinata degli Uberti (died 1264): Leader of the Florentine Ghibellines famous for his defeat of the Guelphs (Dante's faction), at the Battle of Montaperti in 1260, causing the Guelphs to be exiled from Florence, though he was able to argue successfully against the destruction of the city. Farinata was posthumously condemned as a heretic during the Franciscan inquisition of 1283. To make peace between the Black and White Guelphs, Cavalcante de' Cavalcanti, let his son Guido Cavalcanti, the future poet, marry Farinata's daughter.
One of a group of famous political Florentines, "who were so worthy ... whose minds bent toward the good", asked about by Dante of Ciacco. Inf. VI, 77–81.
Found among the Epicurean heretics. Inf. X, 22–51, 73–123.
Predicts Dante's difficulty in returning to Florence after his exile. Inf. X, 79–81.
Explains that the damned can see the future but not the present. Inf. X, 97–108.
Fiumicello: Tributary of Phlegethon. Inf. XIV, 77.
Fleur-de-lis: Flower symbolizing the French crown. Purg. XX, 86.
Florence: Dante's home city. He was exiled from Florence in 1302 and never returned. The Comedy was composed during the period of exile.
Condemned with angry sarcasm for its bad government. Purg. VI, 127–151.
Folquet de Marseilles (c. 1165–1231): Troubadour, then Cistercian monk, and later Bishop of Toulouse.
Pointed out by Cunizza da Romano. Par. IX, 37–42.
Speaks to Dante and points out Rahab. Par. IX, 67–142.
Rampino Foresi: See Vanni Fucci.
Forlì: City in Romagna. In 1282, under Guido da Montefeltro, it withstood a combined siege by French and Guelph forces, dealing the French a crushing defeat. After 1300 it was ruled by the Ordelaffi.
"The city that stood long trial". Inf. XXVI, 43–45.
Fortuna: In Dante's cosmology, a power created by god to "guide the destinies of man on earth" (H. Oelsner, P.H. Wicksteed and T. Okey The Divine Comedy of Dante Alighieri, Vol I, p. 79). Inf. VII, 61–96, XV, 91–96.
Fortuna major: figure formed by a combination of the last stars of Aquarius and the first of Pisces. Used by geomancers for divination.
Visible before dawn in Purgatory. Purg. XIX, 4.
Fox: Animal often used to symbolize deceit or cunning.
In the Pageant of Church History, a fox, representing the early Christian heresies, leaps into the Chariot which represents the Church. Purg. XXXII, 118–123.
Francesca da Rimini: See Paolo and Francesca.
Francesco d'Accorso: Eminent jurist of Bologna who taught law at the universities of Bologna and Oxford. Son of the great Florentine jurist Accorsio da Bagnolo, author of the Glossa Ordinaria on the Corpus Iuris Civilis.
One of a group of sodomites identified by Brunetto Latini to Dante. Inf. XV, 110.
Saint Francis of Assisi (1182–1226): Son of a wealthy merchant, he spurned his father's riches and founded the Franciscan Order, formally recognized by Pope Honorius III in 1223.
Arrives to bring Guido da Montefeltro into Heaven, but is forestalled. Inf. XXVII, 112–114.
Eulogised by Thomas Aquinas. Par. XI, 37–117.
Franco Bolognese: 14th-century manuscript illuminator.
Mentioned as the student of Oderisi of Gubbio.
Frederick II, Holy Roman Emperor: Was renowned for his Epicurean lifestyle, and alleged to have punished traitors by cloaking them in leaden capes and placing them into boiling cauldrons.
Among the Epicurean heretics. Inf. X, 119.
His capes compared to those of the hypocrites. Inf. XXIII, 66.
His government of Italy viewed favorably. Purg. XVI, 115–120.
Vanni Fucci: Nicknamed Bestia, for his brutality, he was the Illegitimate son of Fuccio de' Lazzari. He took part in the vicious struggles that divided his city Pistoia, siding with the Black Guelphs, repeatedly sacked the houses of his political enemies. In 1293, he stole the reliquary of San Jacopo from the sacristy of the Cathedral of Pistoia, for which crime the innocent Rampino Foresi was arrested and nearly executed, before the guilt of Fucci and his accomplices was discovered.
Among the thieves, like the mythical phoenix, he is burned to ashes and restored. Inf. XXIV, 97–118.
Refers to himself as a "mule" meaning "bastard" ("mul ch'i' fui"). Inf. XXIV, 125.
Prophesies the triumph in Florence of the Black Guelphs over the Whites. Inf. XXIV, 143–151.
Swears against God while performing an obscene gesture (a "fig", the insertion of a thumb between the first and second fingers of a closed fist). Inf. XXV, 1–18.
Furies: see Erinyes.
G
Gabriel: One of the Archangels of Christian tradition. He was the angel who announced the conception of Jesus to the Virgin Mary.
Beatrice tells Dante that Gabriel may be depicted in human form, but that this form is an accommodation to the limits of the human imagination. Par. IV, 47.
Galen (131–201): Ancient Greek physician.
Encountered by Dante in Limbo. Inf. IV, 143.
Ganymede: Young Trojan prince abducted by Zeus in the form of an eagle and carried to Olympus to serve as cupbearer in the court of the gods.
Dante compares himself to Ganymede when he dreams in his first night in Purgatory that he is carried by an eagle into the heavens. Purg. IX, 22–33.
Garisenda: A 160-foot leaning tower in Bologna built in the 12th century.
Comparable in size to the giant Antaeus. Inf. XXXI, 136.
Geomancer: interpreter of patterns formed by tossed handfuls of soil, rocks, or sand. Purg. XIX, 3.
Geri del Bello: A second cousin of Dante. Apparently he was killed by the Sacchetti family and avenged by the Alegheri in 1310, with the feud continuing until 1342.
Of whom Dante says "...a spirit born of my own blood ... his death by violence for which he still is not avenged". Inf, XXIX, 18–36.
Geryon: In Greek mythology, son of Chrysaor and Callirhoe, was a winged giant. The tenth labour of Herakles was to steal his cattle. In Medieval times, he was viewed as an example of treacherous deception, which may explain Dante's choice of him as an emblem of fraud.
Guardian of the eighth circle, summoned by Virgil, he is encountered in close association with the usurers. Inf. XVI, 106–136.
"La fiera con la coda aguzza, che passa i monti, e rompe i muri e l'armi!...colei che tutto 'l mondo appuzza!" ("The beast who bears the pointed tail, who crosses mountains, shatters weapons, walls!...the one whose stench fills all the worlds!"). Inf. XVII, 1–27.
Carries Virgil and Dante on his back. Inf. XVII, 79–136.
Sets down Virgil and Dante in the eighth circle. Inf. XVIII, 19–20.
Before Dante passes through the fire of Purgatory, Virgil reminds him that he was safe even while riding Geryon. Purg. XXVII, 23.
Gideon: Hero of ancient Israel. According to Judges 7:4–7, he selected the best warriors by the way they drank their water.
Cited as examples of temperance and gluttony by a voice hidden in a tree of temptation. Purg. XXIV, 124–126.
Giotto: Florentine painter. (1266/7–1337)
Mentioned in Purgatory as the most famous painter of the day. Purg. XI, 95.
Giovanni di Buiamonte dei Becchi: Florentine banker, he had held several important offices which earned him a knighthood.
The "sovereign cavalier", whose future damnation as a usurers is alluded to by Reginaldo Scrovegni. Inf. XVII, 72–73.
Glaucus: Ancient Greek mortal changed into an immortal sea god by eating magical reeds at the sea-shore.
Dante claims that he experiences a similar loss of mortality looking on Beatrice. Par. 1, 64–69.
Gloria in excelsis Deo: "Glory to God in the Highest." Opening of a canticle sung in morning prayer services and at the beginning of the Latin Mass.
Sung by souls in Purgatory when a soul becomes free to ascend into Paradise. Purg. XX, 136.
Fra Gomita: Chancellor of Nino Visconti and Governor of the giudicato of Gallura, in Sardinia—at the time a possession of Pisa. He accepted a bribe to let escape a group of Visconti's enemies who were in his custody. For this he was hanged.
Among the barrators with Michel Zanche, "a dir di Sardigna le lingue lor non si sentono stanche" ("their tongues are never too tired to speak of their Sardinia"). Inf. XXII, 81–90.
Gratian: 12th-century canon lawyer and Camaldolese monk.
Pointed out by Thomas Aquinas in the sphere of the Sun. Par. X, 104.
Pope Gregory: Gregory I "the Great" (590–604).
According to Medieval legend, when Pope Gregory prayed for the Emperor Trajan, the emperor was raised from the dead and converted to Christianity. Purg. X, 75.
Griffin: Legendary creature with the body of a lion and the head and wings of an eagle.
In the allegorical Pageant of the Church Triumphant, a griffin representing Christ draws a chariot representing the Church. Dante chose a griffin because its two noble natures (lion and eagle) correspond to the two natures (divine and human) of Christ. Purg. XXIX, 106–114.
Griffolino of Arezzo: He duped Alberto da Siena saying, that for money, he would teach him to fly. As a result, Griffolino was burned at the stake for heresy by the Bishop of Siena, who favored Alberto, who was perhaps the Bishop's illegitimate son.
Among the "falsifiers" of metal (alchemists), sitting with Capocchio, propping each other up, as they frantically scratch at the scabs covering their bodies. Inf. XXIX, 73–99.
He introduces himself. Inf. XXIX, 109–120.
Referred to as "the Aretine", he identifies Schicchi and Myrrha. Inf. XXX, 31–45.
Guelphs and Ghibellines: Factions supporting, respectively, the Papacy and the Holy Roman Empire in Italy during the 12th and 13th centuries. After the Guelphs finally defeated the Ghibellines in 1289 at Campaldino and Caprona, (Dante apparently fought for the Guelphs at both), they began to fight among themselves. By 1300, Dante's city, Florence, was "divided" between the Black Guelphs, who continued to support the Papacy, and White Guelphs, Dante's party. That year the Whites defeated the Blacks and forced them out of Florence, however, in 1302, the Blacks, with the help of Pope Boniface VIII, were victorious and the Whites, including Dante, were banished from Florence. Inf. VI, 60–72.
Florence the divided city. Inf. VI, 61.
White Guelphs, party of the woods. Inf. VI, 65.
Black Guelphs, prevail with help of Boniface. Inf. VI, 68–69.
Rivalry. Inf X.
Black and White Guelphs, one after the other, will "hunger" after Dante. Inf. XV, 71–72.
The expulsion of the White Guelphs from Florence is prophesied: "Fiorenza rinnova gente e modi". Inf. XXIV, 143–150.
Guido del Cassero: See Malatestino.
Guido Guerra (c. 1220–1272): Member of one of the greatest Tuscan families, he was one of the leaders of the Guelph faction in Florence, under whose banners he fought the disastrous battle of Montaperti in 1260. Exiled following the triumph of the Ghibellines, he returned to Florence in 1267 when the Guelphs retook control of the city.
One of a group of three Florentine sodomites who approach Dante, and are much esteemed by him (see Jacopo Rusticucci). Inf. XVI, 1–90.
"In sua vita fece col senno assai e con la spada" ("In his life he did much with the senses and the sword"). Inf. XVI, 37–39.
Guido Guinizelli: Italian poet (c. 1230–1276). Dante considered him the founder of his style of poetry (Dolce Stil Novo).
Dante meets him on the terrace of lustful. Purg. XXVI, 73–135.
Guido da Montefeltro (1223–1298): Renowned leader of the Ghibellines of Romagna. As ruler of Forlì, in 1282, he defeated a French force, which was besieging the city. In 1296 he retired from military life and entered the Franciscan order. Pope Boniface VIII, in 1297, asked his advice on how to capture Palestrina, the impegnable stronghold of the Colonna family, offering in advance papal absolution for any sin his advice might entail. He advised Boniface to promise the Colonnas amnesty, then break it. As a result, the Collonas surrendered the fortress and it was razed to the ground. Dante also mentions him in the Convivio, where he curiously extols his piety and sanctity.
Among the fraudulent counsellors. Inf. XXVII, 4–132.
He "made a bloody heap out of the French". Inf. XXVII, 43–45.
Guido da Polenta: The powerful aristocratic ruler of Ravenna and Cervia, the former town taken by him in 1275 and the latter shortly after. He was father of Francesca da Rimini, and grandfather of Guido Novello da Ravenna, who was to give Dante hospitality in his last years. The coat of arms of his family contained an eagle.
"The Eagle of Polenta". Inf. XXVII, 40–42.
Robert Guiscard (c. 1015–1085): One of the most remarkable of the Norman adventurers who conquered Southern Italy and Sicily. He was count (1057–1059) and then duke (1059–1085) of Apulia and Calabria after his brother Humphrey's death.
His warring in Apulia. Inf. XXVIII, 13–14.
Guittone: Italian poet of the generation before Dante. Purg. XXVI, 55, 124.
Guy de Montfort: Son of Simon de Montfort, 6th Earl of Leicester (1208–1265) who was leader of the baronial opposition to king Henry III of England. Simon was killed at the battle of Evesham and Guy revenged his death by killing the king's nephew, another Henry, in a church in Viterbo.
Pointed out by Nessus. Inf. XII, 118–120.
H
Hadrian V: Pope for 38 days in 1276.
Dante encounters him repenting for his greed in the terrace of the greedy. Purg. XIX, 88–145.
Hannibal: Ancient military leader of Carthage, who led an invasion of "Arabs" over the Alps into Italy in the Second Punic War in the late 3rd century BCE.
His defeat cited as a triumph of the early Roman Republic. Par. VI, 49–51.
Harpies: Monsters from Greek mythology with human female faces on the bodies of birds.
Tormentors of the suicides in the seventh circle, round 2. Their description is derived from Virgil (Aeneid iii, 209 on), which tells how they drove the Trojans from the Strophades. Inf. XII, 10–15 & 101.
Hector: The greatest Trojan warrior, in the Trojan War.
Seen in Limbo. Inf. IV, 121–128.
Hecuba: Wife of Priam king of Troy, mother of Hector, Paris, Polyxena and Polydorus. Captured after the fall of Troy, she went mad after seeing her daughter Polyxena, sacrificed on the tomb of Achilles and the corpse of her son Polydorus, murdered by Polymestor, King of Thrace (Euripides, Hecuba, Ovid Metamorphoses XIII, 429–575). According to Ovid she growled and barked like a mad dog.
Her "fury" at the deaths of Polyxena and Polydorus. Inf, XXX, 13–21.
Helen: Wife of the Spartan king Menelaus and lover of the Trojan Paris, her abduction caused the Trojan War.
Found amongst the sexual sinners. Inf. V, 64–65.
Helicon: Mountain in Boeotia sacred to the Muses. Purg. XXIX, 40.
Heliodorus: Minister to Seleucus IV, Hellenistic ruler of the Seleucid Empire. According to II Maccabees 3:21–28, he was sent to Jerusalem to plunder the treasury of the Temple, but was turned back by supernatural figures, including a man mounted on a horse.
Cited by souls on the terrace of the greedy as an example of greed. Purg. XX, 113.
Heliotrope stone: Also called bloodstone, is dark green with spots of red. In the Middle Ages the red spots were thought to be the blood of Jesus, and it was believed to have miraculous powers, including making its wearer invisible. Boccaccio writes about it in his Decameron (VIII, 3). Inf. XXIV, 93.
Hellespont: Narrow strait connecting the Black Sea with the Aegean Sea and separating Europe from Asia Minor. In Herodotus' account of the Persian Wars, Xerxes, king of the Persians, spanned the Hellespont with a bridge to invade Greece. When a storm destroyed the bridge, the king ordered his soldiers to flog the waters as punishment.
Dante compares the narrow Lethe River to the narrow Hellespont. Purg. XXVIII, 70–72.
The ancient towns of Abydos and Sestos were on the shores of the Hellespont. Purg. XXVIII, 74.
Henry of England (Arrigo d'Inghilterra): Henry III (1216–1272)
Dante sees him in the "Valley of the Princes," waiting as a late-repenter to enter Purgatory. Purg. VII, 130.
Heraclitus (c. 535 –c. 475 BCE): Greek Presocratic philosopher.
Encountered by Dante in Limbo. Inf. IV, 138.
Hera (Juno in Roman mythology): Greek goddess, she is the wife of Zeus (Jupiter). A jealous goddess, she often sought revenge against Zeus' many lovers. One of those was Semele, who was the daughter of Cadmus, King of Thebes and the mother of Dionysus by Zeus. One of Hera's many acts of revenge against Semele, was to cause Athamas, husband of Semele's sister Ino, to be driven mad. Mistaking Ino, holding their two infant sons Learchus and Melicertes, for a lioness and her cubs, he killed Learchus, and Ino still holding Melicertes jumped off a cliff into the sea. (Ovid, Metamorphoses IV, 416–542). Another lover of Zeus, and victim of Hera was Aegina, daughter of the river-god Asopus (see Aegina above).
Her revenge against "Aegina's people". Inf. XXIX, 58–65.
Her (Juno's) revenge against Semeles' "Theban family". Inf. XXX, 1–12.
Heracles (Latin: Hercules): Son of Zeus and Alcmene, he is probably the most famous Hero of Greek mythology. Of his many achievements, the most famous are the Twelve Labours.
His victory over Cacus. Inf. XXV, 29–33.
Ulysses recounts his passing the Pillars of Hercules at the Strait of Gibraltar, where "Hercules set up his boundary stones that men might heed and never reach beyond". Inf. XXVI, 108–109.
Hippocrates (c. 460–380 BCE): Ancient Greek physician, often called "the father of medicine.".
Encountered by Dante in Limbo. Inf. IV, 143.
Dante identifies St. Luke in the Pageant of the Church Triumphant as a disciple of Hippocrates. Ancient tradition holds that Luke was a physician. Purg. XXIX, 137.
Holofernes: According to the Book of Judith, an Assyrian general who invades Israel. He is killed by Judith, who seduces him in his tent.
Depicted on the pavement in Purgatory as an example of arrogance. Purg. XII, 59.
Homer: Greek poet credited with the authorship of the epic poems the Iliad, which tells the story of the Trojan War, and the Odyssey, which tells the story of the Greek hero Odysseus' adventures returning from that war.
Encountered in Limbo, leading, "as lord", the three Latin poets Horace, Ovid and Lucan. Inf. IV, 83–90.
"The lord of song incomparable who like an eagle soars above the rest." Inf. IV, 95–96.
The poets ask Dante "to join their ranks", Inf. IV, 100–102.
Dante and Virgil leave the company of the poets. Inf IV, 148.
Horace: Latin lyric poet.
One of a group of classical poets (see Homer) encountered in Limbo. Inf. IV, 89.
Hugh Capet: (c. 939–996) First King of the Franks and founder of the Capetian Dynasty.
Dante encounters him on the terrace of the greedy, where Hugh laments the greed of his successors to the French throne. Purg. XX, 34–123.
Hypsipyle: Queen of Lemnos, she was seduced and abandoned by Jason while en route to the Colchis with the Argonauts.
Pitied by Virgil for Jason's actions. Inf. XVIII, 88–95.
Resident of Limbo. Purg. XXII, 112.
I
Icarus: In Greek mythology, the son of the inventor Daedalus. They escaped from imprisonment in Crete using wings of feathers and wax invented by Daedalus. However, Icarus flew too near the sun, the wax melted, and he fell to his death.
Used as a simile for fear in Inf. XVII, 109–111.
Ilium: See Troy.
"In te, Domine, speravi" ("In Thee, o Lord, have I hoped"): Incipit of Psalm 31 in Latin (Psalm 30 in the Vulgate Bible)
First nine verses of the psalm sung by the angels when Dante meets Beatrice. Purg. XXX, 82–84.
"In exitu Isräel de Aegypto": ("When Israel came out of Egypt"): Latin incipit of Psalm 114 (Psalm 113 in the Vulgate Bible).
Sung by souls arriving in Purgatory. Purg. II, 46.
Indus River: major river of Asia which flows through present day Pakistan and India, with its source in the Tibetan Himalayas.
The eagle of justice takes the shores of the Indus to represent those regions of the world where news of Christ has never reached and so justice cannot condemn the people for living outwith baptism, Par. XIX, 70–76
Ino: See Hera.
Alessio Interminelli: Member of a White Guelph noble family of Lucca. He probably died in 1295.
Found among the flatterers. Inf. XVIII, 115–126.
Iphigenia: In Greek legend, daughter of Agamemnon and Clytemnestra. Her father intended to sacrifice her in order to placate the gods who withholding winds to carry the Greek fleet to Troy.
Beatrice cites the vow to sacrifice Iphigenia as an example of an injudicious vow that never should have been kept. Par. IV, 68–72.
Isaac: The biblical father of the patriarch Israel.
Raised by Jesus from Limbo into Paradise. Inf. IV, 59.
Isidore of Seville: Archbishop of Seville, and one of the great scholars of the early Middle Ages.
Encountered in the Fourth Sphere of Heaven (The sun). Par. X, 130–131.
Ismenus and Asopus: Rivers in Boeotia in Greece, where festivals for Dionysus were held. Purg. XVIII, 91.
Israel: One name given to the biblical patriarch Jacob.
Raised by Jesus from Limbo into Paradise. Inf. IV, 59.
J
Jacopo da Santo Andrea: Notorious spendthrift from Padua. He may have been executed by Ezzelino da Romano in 1239.
One of two spendthrifts (the other called "Lano" is probably Arcolano of Siena) whose punishment consists of being hunted by female hounds. Inf. XIII, 115–129.
Jason: Greek mythological hero who led the Argonauts to Colchis in search of the Golden Fleece.
Found among the Seducers, for his seduction and abandonment of Hypsipyle and Medea. Inf. XVIII, 83–99.
The Argonauts' voyage compared to a voyage into the mysteries of the heavens. Par. II, 16–18.
Jason: Brother of the High Priest of Israel Onias III, he succeeded his brother in c. 175 BCE. According to 2 Maccabees he obtained his office by bribing the Seleucid king Antiochus IV Epiphanes.
Pope Clement V is compared to him. Inf. XIX, 85–87.
Jephthah: Judge in ancient Israel who made a careless vow to offer up a sacrifice of thanksgiving for victory in battle and accidentally committed his daughter to that sacrifice. The story appears in Judges 11.
Beatrice cites Jephthah as an example of poor judgment. Par. IV, 64–68.
Jerusalem: Location of the Temple of Solomon and site of Jesus' crucifixion. Considered in the Middle Ages as the geographical center of the inhabited world.
Hell is located directly below Jerusalem. Inf. XXXIV, 112.
Purgatory is a mountain at the antipodes of Jerusalem. Inf. XXXIV, 118–126, Purg. IV, 67–71.
Jesus: Central figure of Christianity. According to Christian legend, in what is called the Harrowing of Hell, he descended into Hell after his death and rescued certain souls from Limbo.
Virgil describes witnessing his descent into Hell. Inf. IV, 52–63.
Took spoils from Dis in the Harrowing of Hell. Inf. XII, 38–39.
Unlike the souls being punished for simony, Jesus asked no gold from Saint Peter in exchange for his office. Inf. XIX, 90–93.
In his only appearance in the Comedy, he is seen in the form of a Griffin in the Pageant of the Church Triumphant. Purg. XXIX, 106–114.
Jocasta: Wife and mother of Oedipus, ancient king of Thebes. They had two sons, Polynices and Eteocles. Statius' Thebaid tells the story of the family conflict.
Mentioned as the subject of Statius' work. Purg. XXII, 55–57.
John the Baptist: The desert prophet, who baptised Jesus. He became the patron saint of Florence, displacing the Roman Mars, and his image was stamped on the cities gold coin, the florin.
In Florence, "the first patron gave way" to him. Inf. XIII, 143–144.
"The currency which bears" his seal. Inf. XXX, 74.
A voice in Purgatory on the terrace of the gluttonous cites John as an example in Temperance. Purg. XXII, 151–154.
John the Evangelist: The name used to refer to the author of the Gospel of John. He is also traditionally identified with John the Apostle and the author of the Book of Revelation.
Dante interprets a passage of John's Revelation (17:1–3) as a prophecy on the future corruption of the Roman Curia. Inf. XIX, 106–108.
John's vision (Rev. 4:6–11) of four beasts in the heavenly court draws from a vision of similar beasts by the prophet Ezekiel (Ezekiel 1:1–21). The beasts appear as allegories of the four Gospels in the Pageant of the Church Triumphant. Purg. XXIX, 103–105.
Jordan: River on the border of Israel.
Crossed by ancient Israelites led by Joshua after an older, less eager generation had died off. Mentioned as a lesson in sloth. Purg. XVIII, 133–135.
Jove: See Zeus.
Jubilee: The first Jubilee of the Roman Catholic church took place in 1300. Inf. XVIII, 28–33.
Judas Iscariot: Disciple who betrayed Jesus.
Virgil's visit to "Judas' circle". Inf. IX, 25–27.
"The transgressing soul" replaced by Saint Matthias. Inf. XIX 94–96.
Along with Brutus and Cassius, one of the three betrayer/suicides who, for those sins, were eternally chewed by one of the three mouths of Satan. Inf. XXXIV, 53–67
Julia : Daughter of Julius Caesar and wife of Pompey.
Encountered by Dante in Limbo. Inf. IV, 128.
Julius Caesar (100–44 BCE): The celebrated Roman dictator and military commander.
Virgil's remembers him (erroneously) as ruler of Rome at his birth. Inf. I, 70.
Encountered by Dante in Limbo, "armato con li occhi grifagni" ("falcon-eyed and fully armed"). Inf. IV, 123.
Advised by Curio to lead his army across the Rubicon, which is considered an act of war against the Roman Republic. Inf. XXVIII, 97–99.
Souls in the terrace of sloth cite his campaigns in France and Spain as an inspiring example of energy. Purg. XVIII, 101.
His rumored sexual relations with Bithynian King Nicomedes mentioned on the terrace of the lustful. Purg. XXVI, 77. (See Suetonius, The Lives of the Twelve Caesars, Julius Caesar, 49.)
His unlawful entry into Rome cited as the beginning of the Roman Empire which ultimately brought an imperial peace to the world. Par. VI, 55–87.
Juno: See Hera.
Justinian: Flavius Petrus Sabbatius Iustinianus, an emperor of Byzantium, known as "the last Roman emperor". A saintly man respected for his law reforms.
His "mending [Italy's] bridle". Purg. VI, 88–93.
Encountered in the Second Sphere: Mercury, as an unnamed "holy form [concealed] within his rays". Par. V, 115–139.
His discourse on the history of Rome. Par. VI, 1–111.
His description of the souls in Mercury. Par. VI, 112–142.
Juvenal: Decimus Iunius Iuvenalis, Roman poet of the 1st and 2nd centuries CE.
On arrival in Limbo, he informed Virgil about Statius' poetic accomplishments. Purg. XXII, 13–15.
K
"Kill! Kill!" ("Martira, martira!"): The martyrdom of St. Stephen by an angry mob. He died without anger as he was stoned to death. His last words were a prayer for forgiveness for his enemies. (Acts 7:58–60)
Seen in a vision by Dante as he enters the terrace of the angry in Purgatory. Purg. XV, 106–114.
L
"Labïa mëa, Domine": Abbreviation of "Domine, labia mea aperies; et os meum annunciabit laudem tuam." ("O Lord, open thou my lips, and my mouth shall proclaim thy praise.") (Psalm 51:15; Ps 50:15 in the Vulgate.) Verse recited at the beginning of the first monastic prayer office of the day.
Chanted in penitence by souls on the terrace of the gluttonous in Purgatory. Purg. XXIII, 10–12.
Lacedaemon: Also known as Sparta, a leading city in ancient Greece.
Dante commends Lacedaemon as an example of orderly government. Purg. VI, 139.
Lachesis: One of the three Fates in Greco-Roman mythology. With a measuring rod, she measures out the life-span of every mortal.
Mentioned with reference to death. Purg. XXV, 79.
Laertes: Mythical father of Odysseus (Ulysses), he was one of the Argonauts. In the Odyssey he takes part in the massacre of Penelope's suitors.
Not even Ulysses' love for his father (and wife and son) was enough to overrule his desire "to gain experience of the world and of the vices and the worth of men". Inf. XXVI, 94–99.
Lancelot: Central figure of the Arthurian legend. Reading tales of his amorous adventures led Paulo and Francesca astray.
Inf. V, 128.
Lano: See Arcolano of Siena.
Brunetto Latini: Famous Florentine Guelph politician and writer, friend and teacher of Dante until his death in 1294.
Encountered by Dante among the sodomites in the seventh circle. The meeting between Dante and Brunetto is one of the most important in the Inferno, as Brunetto is given the key role of prophesying the future exile of Dante. Dante extols his encyclopaedia, Li Livres dou Tresor, of which Dante has Brunetto say: "Sieti raccomandato il mio Tesoro, nel qual io vivo ancora". Inf. XV, 22–124.
Lateran Palace: The principle papal residence, from the beginning of the 4th century, until the beginning of Avignon Papacy, in 1305.
Used by Dante to allude to Boniface's warring against Christians, rather than "Jews" or "Saracens". Inf. XXVII, 86.
Latinus: The "Latian king" and one of a group of figures associated with the history of Troy, Virgil's Aeneid, and the history of Rome encountered by Dante in Limbo. Inf. IV, 121–128.
Lavinia: Daughter of Latinus and Amata and wife of Aeneas.
One of a group of figures associated with the history of Troy, Virgil's Aeneid, and the history of Rome encountered by Dante in Limbo. Inf. IV, 121–128; Par. VI, 3.
Dante has a vision of Lavinia mourning for her mother Amata, who committed suicide after inciting a war between the Latins and the Trojans. The vision comes as Dante departs the terrace of the angry in Purgatory. Purg. XVI, 34–39.
Lawrence: Deacon in the Church in Rome, martyred in 258. According to tradition, he was tied to a grate and burned to death.
Beatrice cites Lawrence as an example of a steadfast will. Par. IV, 83.
Leah: Sister to Rachel, first wife of Jacob, and mother of six of the tribes of ancient Israel. She was the less attractive of the two sisters, but Jacob was tricked into marrying her first. (Gen 29:16–25)
In a dream, Dante sees her gathering flowers. Purg. XXVII, 97–108.
Leander: Ancient Greek youth who carried on a love affair with Hero, a priestess of Aphrodite, who lived on the opposite shore of the Hellespont. Each night he would swim across the strait to be with her.
Dante compares the Lethe River to the Hellespont, and his desire for Matilda to that of Leander for Hero.
Learchus: See Hera.
Lethe: One of the rivers of Hades in Greek mythology. To drink its waters is to forget everything. In the Comedy, its source is in Terrestrial Paradise at the top of Purgatory. When it reaches the base of the mountain, it flows down a narrow passageway to the center of the earth.
Its location is asked about and given. Inf. XIV, 130–138.
Probably the little stream Dante hears at the center of the earth. Inf. XXXIV 130–132.
Guido Guinizelli tells Dante that even Lethe will not erase his memory of their conversation. Purg. XXVI, 106–108.
Dante arrives at its banks. Purg. XXVIII, 25.
Matilda explains that its source is miraculous because there is no rain in Terrestrial Paradise. Purg. XXVIII, 121–133.
Dante must repent of his infidelity to Beatrice before he is allowed to drink from the Lethe and forget the act. Purg. XXX, 142–145.
Matilda bears Dante through the Lethe. Purg. XXXI, 94–96.
Dante sees the source of the Lethe in Terrestrial Paradise. Purg. XXXIII, 123.
Levi: Son of Jacob and Leah and eponymous forebear of a tribe of ancient Israel. The tribe of Levi was responsible for duties of worship and did not receive a tribal homeland.
Dante refers to the clergy as "Levi's sons." Purg. XVI, 131.
Libra: Constellation of the zodiac. During the events of the Comedy, it would be highest in the sky at about 1 A.M.
Used to indicate the time of day. Purg. XXVII, 3.
Limbo: The first circle of Dante's Hell and the scene of Inf. IV. It is a kind of antechamber in which the souls of the good who died before Jesus spend eternity with no punishment other than the lack of the divine presence. In Dante's version, figures from Classical antiquity significantly outnumber those from the Old Testament.
Linus: Mythical son of Apollo who taught music to Orpheus.
Encountered by Dante in Limbo. Inf. IV, 141.
Livy (c. 59 BCE – 17 CE): The famous Roman historian author of the monumental Ab Urbe Condita, telling the history of Rome from the origins down to his own times.
The historian "who does not err". Inf. XXVIII, 12.
Lombards: Germanic tribe who invaded Italy in the 6th century BCE and established a kingdom in the northern part of the peninsula.
The conquering Lombards were Arian Christians in belief, where they came into conflict with the Catholic Church in Rome. Par. VI, 94–95.
Peter Lombard (c. 1090–1160): Theologian and Bishop; author of The Sentences, a famous medieval textbook of theology.
Pointed out by Thomas Aquinas in the sphere of the Sun. Par. X, 107.
Lucan (39–65): Latin poet, whose Pharsalia, an epic poem on the civil war between Julius Caesar and Pompey, is an important source for Dante. Like Seneca he was forced to commit suicide by Nero for his participation in the Pisonian conspiracy.
One of a group of classical poets (see Homer) encountered in Limbo. Inf. IV, 90.
The serpents in the Malebolge comes from his Pharsalia (IX, 710 ff). Inf. XXIV, 85–90.
His description in Pharsalia (IX, 761–804) of the deaths and "transformations" of Sabellus and Nasidiusis is compared with the transformations of the thieves and sinners in the Malebolge. Inf. XXV, 94–96.
Lucca: A Tuscan city of considerable importance in the Middle Ages; generally Guelph, it was traditionally an ally of Florence and an enemy of Pisa.
Dante, through the words of a devil, accuses its magistrates of being all corrupt: "torno...a quella terra, che n'è ben fornita: ogn'uom v'è barattier,...del no, per li denar, vi si fa ita" Inf. XXI, 39–42.
Lucia of Syracuse: (Saint Lucy) 4th-century martyr saint associated with light and those, like Dante, who suffered from poor eyesight. She symbolises Illuminating Grace in the poem.
Serves as an intermediary between the "gentle lady" (see Mary) and Beatrice. Inf. II, 97–108.
Lifts Dante in his sleep to the Gate of St. Peter in Purgatory. Purg. IX, 55.
Lucretia: Legendary woman in the history of the Roman Republic, whose rape by the son of king Tarquinius Superbus was revenged by Brutus when he overthrew the king.
Encountered by Dante in Limbo. Inf. IV, 128.
Cited as a reason for the end of Roman monarchy. Par. VI, 41.
Luke: Writer of the third Gospel. Luke includes a story of the resurrected Jesus quietly joining two disciples as they walked the road to Emmaus. (Luke 24:13–27)
When Statius joins Virgil and Dante as they walked in Purgatory, Dante compares the meeting to the event in Luke. Purg. XXI, 7–13.
Lycurgus: Ancient king of Nemea. According to Statius's Thebaid (V.499–730), Lycurgus received Hypsipyle and her two sons as refugees from Lemnos and put his own son in her care. When she accidentally permitted the Lycurgus' son to die of a snakebite, the enraged king wanted to kill her. Her two sons rushed to her side to protect her.
Mentioned by Dante. Purg. XXVI, 94–96.
M
Paolo Malatesta: See Paolo and Francesca.
Malatesta da Verucchio: Founder of the powerful Malatesta family, he and his son Malatestino, were Guelph rulers of Rimini from 1295, who killed the chief members of the rival Ghibelline family, the Parcitati, including their leader Montagna de' Parcitati. Malatesta had two other sons Giovanni, who married Guido da Polenta's daughter Francesca, and Paolo who became her lover (see Paolo and Francesca).
The old mastiff of Verucchio". Inf. XXVII, 46–48.
Malatestino: Son of Malatesta da Verrucchio, after his father's death in 1312, he became Signore of Rimini. He had two nobles of Fano, Guido del Cassero and Angiolello di Carignano, drowned, after he had summoned them to a parley at Cattolica.
The new mastiff of Verruchio. Inf. XXVII, 46–48.
The "foul tyrant" and "traitor who sees only with one eye", his betrayal of Guido and Angiolello. Inf. XXVIII, 76–90.
Malebolge ("evil-pouches"): The eighth circle of Dante's hell, it contains ten trenches wherein the ten types of "ordinary" fraud are punished.
Encountered. Inf. XVIII.
Described as a funnel consisting of concentric and progressively lower ditches. Inf. XXIV, 34–40.
Its "final cloister" filled with "lay brothers". Inf. XXIX, 40–42.
Malebranche ("evil-claws"): In the Inferno, it is the name of a group of demons in the fifth pouch of the Malebolge. They are led by Malacoda ("evil-tail"), who assigns ten of his demons to escort Dante: Alichino, Calcabrina, Cagnazzo ("big dog"), Barbariccia (leads the ten), Libicocco, Draghignazzo, Ciriatto, Graffiacane ("dog-scratcher") Farfarello and Rubicante. Another Malebranche is Scarmiglione.
Encountered. Inf. XXI, 29–XXIII, 56.
A demon is described plunging a barrator into a boiling lake of pitch and returning to Lucca "for more". Inf. XXI, 29–46.
Their using prongs to keep the sinner submerged is compared to cooking meat in a pot. Inf. XXI, 55–57.
Escort assigned. Inf. XXI 118–123.
Scarmiglione. Inf. XXI, 100–105.
Barbarariccia's remarkable trumpet. Inf. XXI, 136–XXII, 12.
The demons escort Dante, guarding the shore as they go. A sinner is dragged ashore, attacked by the demons and is questioned but escapes, and two demons fight and fall into the boiling pitch. Inf. XXII, 13–151.
Dante and Virgil escape their pursuit. Inf. XXIII 13–56.
Malacoda's lie is discovered. Inf. XXIII 140–141.
Manfred: King of Sicily from 1258 to 1266.
Encountered as an excommunicate in Purgatory, where he waits 30 years for each year of his excommunication. Purg. III, 112.
"Manibus, oh, date lilia plenis." ("O, give lilies by the handful."): Quotation from Virgil's Aeneid (VI.883).
Sung by angels in the Pageant of the Church Triumphant, welcoming Beatrice to the procession. Purg. XXX, 21.
Manto: Mythical daughter of Tiresias, from her father she inherited the power of prophecy.
Seen among the seers. Inf. XX, 52–57.
Virgil tells how Manto travelled until she arrived in the spot that was to be called after her Mantua. Inf. XX, 58–93.
The "daughter of Tiresias" is listed as a resident in Purgatory. Purg. XXII, 113.
Mantua: An important and ancient city in Lombardy. Its name is probably of Etruscan origin.
Birthplace of Virgil. Inf. I, 69.
Beatrice addresses Virgil as "courteous Mantuan spirit". Inf. II, 58.
Virgil tells Dante of the origin of the name of Mantua and about its foundation. Inf. XX, 58–99.
Sordello addresses Virgil as "Mantuan". Purg. VI, 74.
Marcia: Wife of Cato the younger.
Encountered by Dante in Limbo. Inf. IV, 128.
Permanently separated from her husband, who guards the entrance to Purgatory. Purg. I, 79.
Maremma: Area consisting of part of southern Tuscany (and partly coincident with the province of Grosseto) and some part of northern Latium (a bordering region of the province of Viterbo). in Dante's time it was a desolate marshland, plagued by malaria.
Identified as between Cecina and Corneto. Inf. XIII, 7–9.
Reputation for snakes. Inf. XXV, 19–20.
Sickness from July until September. Inf. XXIX, 46–48.
Mars: In Roman mythology, the god of war.
As ei per questo//sempre con l'arte sua la farà trista (he who with this art always will make it [Florence] sad) he is identified as the patron of Florence before John the Baptist. Inf. XIII, 143–144.
Depicted in a pavement carving in Purgatory casting Briareus from Olympus. Purg. XII, 31.
Marsyas: Ancient Greek who challenged Apollo to a contest of musical performance judged by the Muses. After Marsyas lost, Apollo flayed him to death.
Dante metaphorically asks Apollo to treat him like Marsyas, by removing his soul from the body in order to write about the heavens. Par. I, 19–21.
Charles Martel of Anjou (1271–1295): son of Charles II of Naples.
In the sphere of Venus, he discusses degeneracy among noble families, and denounces confusion of vocations. Par. VIII, 31–148.
His prophecy. Par. IX, 1–9.
Pope Martin IV: Pope from 1281 to 1285. According to Dante, he died after a gluttonous feast of eels and wine.
Dante sees him in the terrace of the gluttons, repenting of his excess. Purg. XXIV, 22–25.
Mary: The mother of Jesus.
Probably the "gentle lady", who takes pity on Dante and calls on Lucia to ask Beatrice to help him. Inf. II, 94–99.
Souls in Purgatory call on Mary to pray for them. Purg. XIII, 50.
Souls on the terrace of sloth quote her "haste" (Luke 1:39) as a spiritual lesson. Purg. XVIII, 99–100.
The soul of Hugh Capet on the terrace of greed cites her poverty as a spiritual lesson. Purg. XX, 19–24.
Called the "only bride the Holy Spirit has known" in reference to the Incarnation. Purg. XX, 97–98.
Her call for more wine at the marriage at Cana (John 2:3) was for decorum and not because she wanted more wine. Lesson in temperance heard spoken from the tree on the terrace of the gluttonous. Purg. XXII, 142–144.
Cited as an example in sexual abstinence by souls on the terrace of the lustful. Purg. XXV, 128.
Master Adam: Possibly an Englishman, who came to Bologna by way of Brescia. He was employed by the Guidi, counts of Romena, to counterfeit the Florentine florin. Stamped with the image of John the Baptist, the florin contained 24 karats of gold. His contained 21, for which crime he was burned at the stake in 1281.
Among the falsifiers, he points out two liars, Potiphar's wife and Sinon, with whom he exchanges insults. Inf. XXX, 49–129.
Matilda: Sole permanent resident of Terrestrial Paradise.
Dante encounters her gathering flowers on the banks of the River Lethe. Purg. XXVIII, 40.
Saint Matthias: After Judas' betrayal and suicide, he took his place as one of the twelve apostles (Acts of the Apostles I:23–26). Late legends state he was either crucified in Colchis or stoned by the Jews.
How he became an apostle is contrasted with the Simoniacs. Inf. XIX, 94–96.
Medea: Mythical daughter of Aeetes, king of Colchis, she helped Jason get the Golden Fleece, but was abandoned by him. She took revenge by killing their two children.
For her also is Jason punished. Inf. XVIII, 96.
Medusa (also known as the Gorgon): In Greek mythology, a female monster whose gaze could turn people to stone. See Erinyes.
Megaera: See Erinyes.
Meleager: Ancient Greek hero who died when his mother completed the burning of a stick. Purg. XXV, 22.
Melicertes: See Hera.
Metellus: Lucius Caecilius Metellus, tribune of the plebs 49 BCE, resisted Julius Caesar when he wanted to plunder the treasury.
Mentioned in connection with the Tarpeian Rock. Purg. IX, 138.
Michael: Archangel
Defeated Satan. Inf. VII 11–12.
Souls in Purgatory call on him to pray for them. Purg. XIII, 51.
Beatrice tells Dante that Michael may be depicted in human form, but that this form is an accommodation to the limits of the human imagination. Par. IV, 47.
Michal: daughter of King Saul and wife of King David.
Depicted as an example of arrogance in a wall carving in Purgatory. Purg. X, 68.
Midas: legendary Phrygian king who greedily asked that all he touched be turned to gold.
Cited by souls in the terrace of the greedy as an example of the tragedy of greed. Purg. XX, 103–105.
Minerva: Roman goddess of wisdom, equivalent to the Greek goddess Athena.
Minos: A semi-legendary king of Crete, son of Zeus and Europa. In The Divine Comedy, he sits at the entrance to the second circle in the Inferno, which is the beginning of Hell proper. Here, he judges the sins of each dead soul and assigns it to its rightful punishment by indicating the circle to which it must descend. He does this by circling his tail around his body the appropriate number of times.
Encountered by Dante. Inf. V, 4–24.
Sends suicides to their appointed punishments. Inf. XIII, 96.
Amphiaraus falls down to him. Inf. XX, 35–36.
He can also speak, to clarify the soul's location within the circle indicated by the wrapping of his tail. Inf. XXVII, 124–127.
Who "cannot mistake", condemns Griffolino of Arezzo to the tench pouch. Inf. XXIX, 118–120.
Virgil not bound by Minos because he resides in Limbo. Purg. I, 77.
Minotaur: In Greek mythology, a creature that was half man and half bull. It was held captive by King Minos of Crete, inside the Labyrinth, an elaborate maze designed by Daedalus. It was slain by Theseus.
Guards the seventh circle. Inf. XII, 11–27.
Miserere: ("Have mercy.") Incipit of Psalm 51 (Psalm 50 in the Vulgate Bible.) It is one of the Seven Penitential Psalms.
Chanted by souls waiting to enter Purgatory. Purg. V, 24.
"Modicum, et non videbitis me; et iterum, modicum, vos videbitis me." ("In a little while, you will not see me; and in a little while, you will see me again.") Spoken by Jesus to his disciples at the Last Supper. John 16:16.
Quoted by Beatrice before her departure with Dante into Paradise.
Mongibello: Sicialian name for Mount Etna, though to be Vulcan's furnace.
"The sooty forge". Inf. XIV, 56.
Mosca de' Lamberti: Ghibelline who in 1215 rekindled feuding with the Guelphs by urging the killing of the Guelph Buondelmonte dei Buondelmonte, for breaking a marriage engagement.
One of a group of famous political Florentines, "who were so worthy ... whose minds bent toward the good", asked about by Dante of Ciacco. Inf. VI, 77–81.
Found among the Sowers of Scandal and Schism in the eighth circle, Ninth Pouch. He was a "seed of evil for the Tuscans". Inf. XXVIII, 106–109.
Moses
Raised by Jesus from Limbo into Paradise. Inf. IV, 57.
Mucius: Gaius Mucius Scaevola, ancient Roman soldier from a noteworthy family. When captured by enemies, he held his right hand in a fire to show his steadfast willingness to give his life for Rome.
Mentioned by Beatrice as an example of a constant will in the face of adversity. Par. IV, 84.
Muhammad (c. 570–632): The founder of Islam.
Found among the "sowers of dissension", he points out his son-in-law Ali, and through Dante, warns Fra Dolcino. Inf. XXVIII, 22–63.
Muses: In Greek and Roman mythology, the inspiring goddesses of song, poetry and art. It was a standard literary device to invoke their aid when undertaking a difficult writing task.
Dante invokes them nine times in the Comedy. Inf. II, 7–9, Purg. I, 7, Purg. XXII, 58, Purg. XXIX, 37, Par. II, 8.
Myrrha: In Greek Mythology mother of Adonis, who in disguise committed incest with her father (Ovid, Metamorphoses, X, 298–502)
Among the falsifiers, "taking another's shape", she "loved her father past the limits of just love". Inf. XXX, 37–41.
N
Nasidius: See Sabellus and Nasidius.
Neptune: God of the sea. Inf. XXVIII, 83.
"Neque nubent": ("Nor do they marry.") (Mat 22:30)
Quoted by the penitent soul of Pope Hadrian V in Purgatory to show that worldly honors do not transfer there. Dante had done him reverence on learning his identity. Purg. XIX, 137.
Nessus: See Centaur.
Niccolò: See Spendthrift Club.
Nicholas: Saint and Bishop of Myra in the 4th century. One legend about Nicholas is that he rescued three young poor girls from a life of prostitution by a secret gift of dowries.
Cited by Hugh Capet, who is repenting the terrace of the greedy, as an example of generosity. Purg. XX, 31–33.
Pope Nicholas III (c. 1220–1280): Born Giovanni Gaetano Orsini from an eminent Roman family, he was made cardinal by Innocent IV and became pope in 1277, where he distinguished himself for his ability as a politician.
Punished among the Simoniacs for his nepotism. He prophesies to Dante the arrival in Hell of the popes Boniface VIII and Clement V. Inf. XIX, 31–120.
Nimrod: Great-grandson of Noah. According to Genesis, he was a "mighty hunter" and King of Shinar. Legends about him have him in charge of building the Tower of Babel.
Encountered chained in the "Well of the Giants," where he speaks only gibberish. Inf. XXXI, 58–81.
Depicted on the pavement in Purgatory as an exemplar of arrogance. He is shown at the foot of the Tower of Babel. Purg. XII, 34.
Mentioned by Adam as he explains the extinction of his own language occurring before Nimrod's aborted construction project. Par. XXVI, 124.
Nino de' Visconti: See Ugolino della Gherardesca.
Ninus: Mythical king of Assyria and eponymous founder of Nineveh, he was the husband of Semiramis.
Remembered as predecessor of Semiramis on the throne of Assyria. Inf. V, 59.
Niobe: Queen of Thebes, whose seven sons and seven daughters were killed by Apollo and Diana after Niobe boasted she was superior to their mother Latona.
Depicted in the pavement carvings in Purgatory as an example of arrogance. Purg. XII, 37.
Nisus: Son of Hyrtacus and friend of Aeneas and Euryalus. He was mentioned in Virgil's Aeneid. – One of those who "died for Italy". Inf. I, 106–108
Noah
Raised by Jesus from Limbo into Paradise. Inf. IV, 56.
O
Obizzo II d'Este: Marquess of Ferrara in 1264–1293 and a leading Guelph. Popular tradition had it that he was killed by his son, Azzo VIII.
Pointed out by Nessus. Inf. XII, 110–112.
The "marquis" for whom Venedico Caccianemico admits to have procured his sister Ghisolabella. Inf. XVIII, 55–57.
Octavian: see Augustus.
Oderisi of Gubbio: 13th-century manuscript illuminator. None of his works survive.
Encountered in Purgatory among the prideful. Purg. XI, 79.
Odysseus (Ulysses in Roman mythology): King of Ithaca, he was the son of Laertes, husband of Penelope and father of Telemachus. Known for his guile and resourcefulness, he is the hero of Homer's Odyssey, and a major character in the Iliad. During the Trojan War, with Diomedes, he stole the Palladium and conceived the trickery of the Trojan horse. He was famous for the twenty years it took him to return home from the war.
Among the advisors of fraud, he (Ulysses) is punished with Diomedes for the sins they both committed at Troy. Inf. XXVI, 52–63.
At Virgil's urging, he (Ulysses) speaks about his journey after leaving Circe. Inf. XXVI, 79–142.
Mentioned by the siren who tempts Dante in a dream. Purg. XIX, 22.
"Oh, my son, why have you done this to us?": Mary's speaks to her young son Jesus when he remained in Jerusalem without their knowledge or permission. (Luke 2:48)
Seen in a vision by Dante as an example of patience as he enters the terrace of the angry in Purgatory. Purg. XV, 89.
"OMO": Letters seen formed by the eyes and nose-bridge of an emaciated human face. "Homo" in Latin means "human," and in Italian the word is "Uomo."
Dante sees the letters in the faces of the fasting souls on the terrace of the gluttonous. Purg. XXIII, 31–33.
Sinibaldo degli Ordelaffi: Head of the noble Ordelaffi family and ruler of Forlì and the surrounding territory in Romagna from the end of the 13th century. His coat of arms contained a green lion.
Forlì "beneath green paws". Inf. XXVII 43–45.
Orestes: Son of Agamemnon and Clytemnestra. Orestes avenged his father's murder by killing his mother. He refused to let his friend Pylades take the blame for the act.
"I am Orestes" is heard by souls in the terrace of the envious as a lesson in generosity. Purg. XIII, 33.
Paulus Orosius (c. 385–420): Historian and theologian; associate of St. Augustine.
Not named, but called "that defender of the Christian days who helped Augustine by his history" by Thomas Aquinas in the sphere of the Sun. Par. X, 118–120.
Orpheus: Mythical Greek singer and poet who, like Dante, descended into the underworld.
Encountered by Dante in Limbo. Inf. IV, 140.
Ottokar II, King of Bohemia (1253–1278) and enemy of German King Rudolf I
Dante sees them side by side in the "Valley of the Princes." Both are late-repenters, waiting to enter Purgatory. Purg. VII, 97–100.
Ottaviano degli Ubaldini (c. 1210–1250): Cardinal and prominent Ghibelline who was the only supporter of their cause at the Papal Court at the time of the Battle of Montaperti (see Farinata).
Found among the Epicurean heretics. Inf. X, 120.
Ovid: Latin poet, whose Metamorphoses, is Dante's principle, mythological source.
One of a group of classical poets (see Homer) encountered in Limbo. Inf. IV, 90.
His descriptions of the transformations Cadmus and Arethusa in the Metamorphoses are compared to the transformations of the thieves. Inf. XXV, 97–99.
P
Maghinardo Pagani da Susinana: Signore of Faenza on the river Lamone, and Imola on the river Santerno. Ghibelline by birth, he was a Guelph in Florence. His coat of arms was a white lion on a blue field.
The "young lion of the white lair". Inf. XXVI, 49–51.
Pageant of Church History: Elaborate allegorical representation of the history of the Christian Church which Dante witnesses in Purgatory. Purg. XXXII & XXXIII.
The allegorical events involve the Chariot from the Pageant of the Church Triumphant and represent the troubles of the Church in its first 1300 years.
An eagle ("the Bird of Jove") attacks the Chariot (the Church), representing the persecutions of Christians by various Roman Emperors. Purg. XXXII, 109–117.
A malnourished Fox, representing the various early heresies of the Church, leaps onto the Chariot until it is chased away by "my Lady." Purg. XXXII, 118–123.
The Eagle returns and covers the chariot with its feathers, representing the alliance of Church and Roman Empire beginning with the Emperor Constantine I. Purg. XXXII, 124–129.
A dragon cuts the chariot in half with its tail and drags away half, representing the Islamic conquests during the early centuries of Islam. Purg. XXXII, 130–135.
The chariot is covered and choked with weeds, representing the institutional corruptions of the church and the confusion of temporal and spiritual authorities. Purg. XXXII, 136–141.
A harlot appears in the chariot, accompanied by an amorous giant. The harlot, an allusion to Revelation 17, represents the corrupted church, while the giant represents Philip IV of France, who removed the papacy from Rome to Avignon in France in 1307. Purg. XXXII, 142–160.
Pageant of the Church Triumphant: Elaborate allegorical representation of the Church Triumphant which Dante witnesses in Purgatory. Purg. XXIX & XXX.
The allegorical procession includes:
Seven large candelabras emitting rainbow smoke, representing the Seven Gifts of the Holy Spirit. Purg. XXIX, 43–60.
Twenty-four elders dressed in white, representing the 24 books of the Old Testament. Purg. XXIX, 82–87.
Four beasts with multiple wings and eyes (Lion, Ox, Eagle, & Angel), representing the four Gospels. Ancient tradition associates the four beasts seen in the visions of Ezekiel (Ezekiel 1:4–14) and John (Revelation 4:6–8) to the four Gospels. Purg. XXIX, 88–105.
A Griffin drawing a chariot, representing Christ leading the Church. Purg. XXIX, 106–114.
A group of three women dancing beside the right wheel, representing the Three Theological Virtues. Purg. XXIX, 121–129.
A group of four women dancing beside the left wheel, representing the Four Cardinal Virtues. Purg. XXIX, 130–132.
Saint Luke, dressed as a physician, and Saint Paul, bearing a sword. Purg. XXIX, 133–141.
The four authors of the "General Epistles." Finally, the author of the Apocalypse. Purg. XXIX, 142–144.
Palladium: A statue of Pallas Athena. Since it was believed that Troy could not be captured while it contained this statue, Odysseus (Ulysses) and Diomedes stole it during the Trojan War (Aeneid II, 228–240).
Its theft is one of the things for which Ulysses and Diomedes are punished. Inf. XXVI, 63.
Pallas: Legendary ancient Roman youth who bravely fought and died for the liberties of early Rome. His story is recounted in the Aeneid, Book X.
Cited by the soul of Emperor Justinian as the first example of the virtuous Roman. Par. VI, 34–36.
Paolo and Francesca: Brother and wife, respectively, of Giovanni Malatesta. The pair were lovers and reputedly killed by Giovanni. Francesca was the daughter of Guido da Polenta.
Found among the sexual sinners. Inf. V, 73–138.
Montagna de' Parcitati: Of the noble Parcitati family, he was head of the Ghibelline faction in Rimini until Malatesta da Verrucchio assumed control of the town in 1295. Montagna was first jailed and then treacherously murdered by Malatesta and his son Malatestino.
His abuse by the "mastiffs of Verruchio". Inf. XXVII, 47.
Paul: One of the apostles of Jesus.
Recalled by Dante as God's "Chosen Vessel" (Acts 9:15) for an ecstatic journey to the "third Heaven" (2 Corinthians 12:2–4). Inf. II, 28–32.
Appears bearing the "Sword of the Spirit" (Heb 4:12) in the Pageant of the Church Triumphant. Purg. XXIX, 139–141.
Paris: Trojan, son of Priam and Hecuba, brother of Hector, and abductor of Helen.
Found amongst the sexual sinners. Inf. V, 67.
Parnassus: Mountain in Greece near Delphi associated with Apollo and the Muses.
Statius "drank in the cave of Parnassus" as he learned poetry from reading Virgil. Purg. XXII, 65.
Dante asks Apollo to grant him inspiration from both peaks of Parnassus to undertake writing the Paradiso. Par. I, 16–18.
Pasiphaë: Wife of King Minos of Crete and mother of the Minotaur. According to Virgil's Eclogue VI, 45–60, she conceived by a bull while hiding inside a hollow wooden cow.
Cited penitentially by souls on the terrace of the lustful. Purg. XXVI, 41.
Paternoster: The "Lord's Prayer" taught by Jesus to his disciples.
Dante is asked to say the prayer when he returns home to assist the passage of souls in Purgatory. Purg. XXVI, 130–132.
Penelope: Faithful wife of Odysseus (Ulysses) king of Ithaca, refusing the many suitors who invaded her home, she waited twenty years for him to return home from the Trojan War.
Not even Ulysses' love for his wife (and son and father) was enough to overrule his desire "to gain experience of the world and of the vices and the worth of men". Inf. XXVI, 94–99.
Penthesilea: Queen of the Amazons, she fought on for Troy during the Trojan War.
Seen in Limbo. Inf. IV, 124.
Perillus: See Sicilian bull.
Pelorus: northeast promontory of Sicily.
Mentioned as severed from the Apennine Range. Purg. XIV, 32.
Persius: Aulus Persius Flaccus. Roman writer of the 1st century BCE
Resident of Limbo. Purg. XXII, 100.
Saint Peter: One of the apostles of Jesus, and first pope.
"la porta di San Pietro" ("the gateway of Saint Peter"). Inf. I, 133.
In contrast to the Simoniacs, he paid no gold, to become head of the church, nor did he ask for any from Saint Matthias to make him an apostle. Inf. XIX, 90–96.
Souls in Purgatory call on Peter to pray for them. Purg. XIII, 51.
Par XXIV, Dante's "Examination of Faith" by St. Peter; his presence first described by Beatrice: "And she: 'O eternal light of the great man/ To whom Our Lord entrusted the same keys/ Of wondrous gladness that he brought below'." (trans. by Cotter, ln. 34–36).
St. Peter's Pine Cone: A colossal bronze pine cone cast in the 1st or 2nd century CE in Rome. Originally located in the Campus Martius, it is now located in a courtyard in the Vatican Museum.
Dante compares it to the dimensions of Nimrod's head. Inf. XXXI, 59.
Phaëton: In Greek mythology, the son of Helios, the sun god. To prove his paternity, he asked his father to allow him to drive the chariot of the sun for one day. Unable to control the horses, Phaëton almost destroyed the earth, but was killed by Zeus.
Used as a simile for fear in Inf. XVII, 106–108.
Used as a reference to the sun. Purg. IV, 73.
Philip IV of France (1268–1314): King from 1285, his reign is memorable for many reasons. In particular he is famous for having shattered the temporal ambitions of the popes.
Probably an allusion to the accusation that Clement V had got his pontificate by promising to pay Philip. Inf. XIX, 87.
Phlegethon: "River of fire", in Greek mythology, one of the rivers of Hades.
Boiling river of blood. Inf. XII, 47–48.
Encountered and described. Inf. XIV, 76–90.
Formed from the tears of the statue of the Old Man of Crete. Inf. XIV, 94–116.
Identified as the "red stream boiling". Inf. XIV, 130–135.
Its deafening roar compared to the waterfall near the monastery of San Benedetto dell'Alpe. Inf. XVI, 91–110
Phlegra: In Greek mythology, the site of Zeus's defeat of the Giants (Gigantes) at the end of the Gigantomachy. Inf. XIV, 58.
Phlegyas: In Greek mythology he was the ferryman for the souls that cross the Styx. Inf. VIII, 10–24.
Phoenix: Mythical bird, which at the end of its life-cycle, burns itself to ashes, from which a reborn phoenix arises.
Its description here is derived from Ovid's Metamorphoses (XV, 392–407). Inf. XXIV, 107–111.
Pholus: A wise Centaur and friend of Herakles. Inf. XII 72.
Photinus, a deacon of Thessalonica. See Anastasius.
Pia de' Tolomei: A Sienese woman allegedly murdered by her husband, Paganello de' Pannocchieschi, who had her thrown from a window in Maremma.
She asks for Dante's prayers when he encounters her waiting to enter Purgatory among souls who died suddenly and unprepared. "Son Pia, Siena mi fé, disfecemi Maremma." ("I am Pia. Siena made me; Maremma unmade me.") Purg. V, 130–136.
Pia's story is the theme of an opera by Donizetti.
Dante Gabriel Rossetti painted Pia in 1868.
Piccarda: Sister of Dante's friend Forese Donati who failed to carry out her lifelong monastic vow.
In the sphere of the moon, she explains to Dante the varieties of blessedness among those in Paradise. Par. III, 34–120.
Pier da Medicina: Apparently a political intriguer in Romagna, of whom little is known. Early commentators say he sowed discord between the Malatesta and Polenta families.
Foretells the betrayal and doom of Guido and Angiolello, and points out Curio. Inf. XXVIII, 63–99.
Pier della Vigna (c. 1190–1249) Minister of Frederick II, Holy Roman Emperor. He fell from favour in 1249 and subsequently committed suicide.
Punished amongst the suicides in Inf. XIII, 28–108.
Pier Pettinaio: (1180–1289) Sienese comb-seller remembered for his piety and honesty. Siena established a festival in his memory.
Sapia, a woman among the envious in Purgatory, says that his prayers have assisted her. Purg. XIII, 128.
Pierides: Daughters of Pierus, king of ancient Macedon, who entered into a contest with the Muses.
Mentioned in Purgatory. Purg. I, 11.
Pilate: Roman governor of Judea, responsible for the crucifixion of Jesus.
Philip IV of France compared to Pilate in his humiliation of Pope Boniface VIII. Purg. XX, 91.
Pillars of Hercules: Name given to the promontories—the Rock of Gibraltar in Europe and Monte Hacho near Ceuta in Africa—that flank the entrance to the Strait of Gibraltar. According to legend, Heracles (Hercules), on his way to steal the cattle of Geryon split a mountain in half, thereby forming the Strait of Gibraltar and connecting the Atlantic Ocean to the Mediterranean. The pillars marked the western boundary of the classical world, beyond which it was unsafe to sail.
Ulysses describes sailing past these "boundary stones" to the see the world which "lies beyond the sun". Inf. XXVI 106–116.
Pinamonte dei Bonacolsi: An able and shrewd politician he took advantage of the fights between Guelphs and Ghibellins that were dividing Mantua to establish himself in 1273 as supreme ruler of the city, founding a Signoria that was kept by his family until 1328.
His deviousness in ousting Alberto da Casalodi. Inf. XX, 95–96.
Pisistratus: Athenian tyrant of the 6th century BCE. His wife angrily demanded the life of a young man seen publicly embracing their daughter. Pisistratus refused to succumb to anger and gives a mild reply.
Seen by Dante in a vision as he enters the terrace of the angry in Purgatory. Purg. XV, 94–105.
Pistoia: A Tuscan town which in Dante's time had lost much of its autonomy, becoming a sort of Florentine dependency.
Vanni Fucci prophesies the exile of the Black Guelphs from the town. Inf. XXIV, 143.
Invective against the town. Inf. XXV, 10–12.
Plato: Greek philosopher and teacher of Aristotle. In Dante's day, his writings were less influential than those of his student.
Encountered by Dante in Limbo. Inf. IV, 134.
Mentioned by Virgil as one "who would—if reason could—have been content". Purg. III, 43.
Beatrice corrects Dante's mistaken ideas about the eternal destiny of souls which he gathered from Plato's Timaeus. Par. IV, 29–63.
Plautus: Roman poet of the 2nd century BCE.
Resident of Limbo. Purg. XXII, 98.
Plutus: In Greek mythology, he was the personification of wealth. Dante almost certainly conflated him with Pluto, the Roman god of the Underworld. He is found in the fourth circle of Dante's hell, in which the greedy and prodigal are punished. Inf. VII, 1–15.
Pola: Italian seaport (now part of Croatia) famed for its Roman necropolis.
Simile for the tombs in the sixth circle. Inf. IX, 112.
Polycletus: Ancient Greek sculptor, famous for his realism.
Wall carvings in Purgatory compared to his work. Purg. X, 32.
Polydorus: See Hecuba.
Polymestor: Ancient king of Thrace. He killed Polydorus, young son of the Trojan King Priam, to steal the treasure that the boy possessed.
Cited by souls on the terrace of the greedy as an example of greed. Purg. XX, 115.
Polynices: See Eteocles
Polyxena: Trojan daughter of Priam and Hecuba. In some accounts, Achilles fell in love with her, and was killed while visiting her. At the demand of Achilles' ghost, Polyxena is sacrificed on Achilles' tomb.
With whom "Achilles finally met love—in his last battle". Inf. V, 65.
Her death helps drive Hecuba mad with fury. Inf. XXX, 16–18.
Pompey: Pompey "the Great" (106–48 BCE). Famous patrician Roman general.
Cited as a virtuous Roman in the days of the Roman Republic. Par. VI, 52.
Priam: King of Troy, husband of Hecuba, father of Hector and Paris.
King when Troy was brought down. Inf. XXX, 15.
Asked Sinion to tell the truth about the Trojan horse. Inf. XXX, 114.
Priscian: Eminent Latin grammarian active in 6th century who wrote the Institutiones grammaticae, extremely popular in the Middle Ages.
One of a group of sodomites identified by Brunetto Latini to Dante. Inf. XV, 109.
Proserpina: Roman goddess whose story is the myth of springtime. She was the daughter of Ceres and wife of Pluto, king of the underworld. In Greek mythology her name is Persephone.
"Queen of never-ending lamentation". Inf. IX, 44.
Moon goddess whose face is "kindled" once a month. Inf. X, 79.
When Dante sees Matilda gathering flowers in Terrestrial Paradise, he is reminded that Proserpina was doing the same when he was abducted by Pluto. Purg. XXVIII, 49–51.
Ptolemy (c. 85–165): Greek geographer, astronomer, and astrologer. His geocentric theory of the universe was the standard astronomical model of Dante's day.
Encountered by Dante in Limbo. Inf. IV, 142.
Puccio Sciancato: Of the noble Ghibelline Florentine Galigai family, he was exiled in 1268 after the Guelphs' triumph, but accepted the peace brokered in 1280 by Cardinal Latino to reconcile the factions. He was nicknamed Sciancato ("lame").
Among the thieves. Inf. XXV, 148–150.
Pygmalion: Ancient King of Tyre. He murdered his uncle and brother-in-law to obtain their wealth.
Remembered as an example of greed by souls in the terrace of the greedy. Purg. XX, 103–105.
Pyrrhus: Either Achilles's son Neoptolemus, killer of Priam and many other Trojans, or Pyrrhus of Epirus, could be intended, although the latter was praised by Dante in his Monarchy (II, ix, 8).
Pointed out by Nessus. Inf. XII, 135.
Pyrrhus of Epirus cited as an early enemy of Rome. Par. VI, 44.
Q
"Qui lugent": ("Who mourn") An abbreviation of "Beati qui lugent quoniam ipsi consolabuntur." ("Blessed are they who mourn, for they shall be comforted") (Mat 5:4; 5:5 in the Vulgate)
Spoken by an angel as Dante passes out of the terrace of the slothful. Purg. XIX, 50.
Quintius: Lucius Quinctius Cincinnatus (520–430 BCE). Ancient Roman noble who assumed dictatorial powers in a crisis and then promptly relinquished them to return to his farm. The city of Cincinnati, Ohio, is named in his honor.
Cited as an exemplar of ancient Roman virtue. Par. VI, 46–47.
R
Rachel: Sister to Leah, second wife of Jacob, and mother of two of the tribes of ancient Israel, including Joseph and Benjamin. She was the more attractive of the two sisters, but Jacob was tricked into marrying Leah first. (Gen 29:16–25) She symbolises the contemplative life in the Comedy.
Companion of Beatrice in Heaven. Inf. II, 102.
Raised by Jesus from Limbo into Paradise. Inf. IV, 60.
In a dream, Dante hears Leah mention her beautiful sister. Purg. XXVII, 103–108.
Rehoboam: King of ancient Israel. He was the son of Solomon and succeeded him on the throne. Because of his oppressive taxation, the northern tribes revolted and formed an independent kingdom.
Depicted on the pavement in Purgatory as example of arrogance. Purg. XII, 46.
"Rejoice, you who have overcome." ("Godi tu che vinci!"): A paraphrase combining "Rejoice and be exceeding glad," (Mat 5:12) with "To him that overcometh will I give to eat of the tree of life" (Rev 2:7).
Heard by Dante in Purgatory as he departs the terrace of the envious. Purg. XV, 39.
Rhea: See Cronus.
Rinier da Corneto and Rinier Pazzo: Highwaymen who lived in Dante's day. Pazzo was excommunicated by Pope Clement IV, in 1268
Pointed out by Nessus. Inf. XII, 137.
Richard of St. Victor: One of the most important 12th-century mystic theologicans. A Scot, he was prior of the famous Augustinian abbey of Saint-Victor in Paris from 1162 until his death in 1173. His writings on mystical contemplation won him the title "Magnus Contemplator", the great contemplator.
"He whose meditation made him more than man". Par. X, 130.
Rubaconte: Former name of the bridge now known as Ponte alle Grazie in Florence. Located at the foot of a hill.
Compared to the path of ascent in Purgatory. Purg. XII, 102.
Rudolf I, King of the Romans (1273–1291).
Dante sees him in the "Valley of the Princes," waiting to enter Purgatory. Rudolph is described as "he who neglected that which he ought to have done", perhaps a reference to his failure to come to Italy to be crowned Emperor by the Pope. Purg. VII, 91–96.
Ruggiere degli Ubaldini: See Ugolino della Gherardesca.
Jacopo Rusticucci: Florentine Guelph of Guido Cavalcanti's guild, active in politics and diplomacy.
One of a group of famous political Florentines, "who were so worthy ... whose minds bent toward the good", asked about by Dante of Ciacco. Inf. VI, 77–81.
One of a group of three Florentine sodomites who approach Dante, and are much esteemed by him. Inf. XVI, 1–90.
Blames his wife for his sin: '"e certo fu la fiera moglie più ch'altro mi nuoce". Inf. XVI, 43–45.
Questions Dante about Borsiere's reports of the moral decay of Florence, which have caused great anguish for him and his companions. Inf. XVI, 66–72.
Represents (with the other two sodomites) past civic virtue, providing an opportunity for Dante to rail against "La gente nuova e i sùbiti guadagni" ("newcomers and quick gains"), as the cause of Florentine decadence. Inf. XVI, 73–75.
S
Sabellus and Nasidius: Two soldiers of Cato's army in Lucan's poem Pharsalia (IX, 761–804), who are bitten by snakes, while marching in the Libyan Desert, after which their bodies "transform". Sabellus' transforms into a rotting formless mass; Nasidius' swells, then bursts.
Their cruel fate is compared to that of the thieves. Inf. XXV, 94–95.
Sabine Women: Young women abducted by Roman youths in the early days of Rome. Par. VI, 41.
Saladin: 12th-century Muslim leader renowned for his military prowess, generosity, and merciful attitude to his opponents during the Crusades.
Encountered by Dante in Limbo. Inf. IV, 129.
Salve Regina: Hymn to the Virgin Mary used in evening services. The song addresses Mary from "the vale of tears."
Sung at sunset by souls in waiting to enter Purgatory in the "Valley of the Princes." Purg. VII, 83.
Samaria: Region north of Jerusalem and west of the Jordan River. According to John 4:4–28, Jesus encountered a Samaritan woman at a well. Their dialogue is about spiritual thirst.
Dante's eagerness to learn the meaning of the earthquake in Purgatory is compared to spiritual thirst. Purg. XXI, 1–4.
Sardinia: Italian Island north of Tunisia and south of Corsica. In Dante's time it was plagued by malaria.
Sickness from July until September. Inf. XXIX, 46–48.
Sannella: (Simonetti della Sannella) Italian noble family, latter known as Simonetti, one of the ancient Florentine families from the time of Cacciaguida.
Mentioned together with other noble families, such as: Arca, Soldanier, Ardinghi, and Bostichi Par. XVI.
Sapphira: early Christian woman who died along with her husband after they confessed to withholding money promised to the Church. (Acts 5:1–11)
Cited as an example of greed by souls on the terrace of the greedy. Purg. XX, 112.
Satan: Biblical angel who embodies evil and is the greatest foe of God and mankind.
Encountered frozen in Cocytus at the center of the earth. Inf. XXXIV, 28–67
Depicted in a pavement carving falling from heaven as an exemplar of arrogance. Purg. XII, 25.
Saturn: Seventh and outermost planet in the geocentric planetary theory in Dante's day.
Known as the "cold planet," it and the moon draw heat away from the earth at night. Purg. XIX, 1–2.
Saul: First king of ancient Israel. He died by falling on his own sword after losing a battle at Gilboa.
Depicted on the pavement in Purgatory as an exemplar of arrogance. Purg. XII, 40.
Gianni Schicchi: Disguised as the Florentine Buoso Donati, who had just died, he dictated a new will, bequeathing to himself Donati's best mare.
With his tusks he drags off Capocchio, after which Griffolino of Arezzo tells of Schicchi's impersonation. Inf. XXX, 22–45.
Scipio: Roman general (236–183 BCE) who defeated Hannibal at the Battle of Zama.
The giant Antaeus lived in the valley where the battle of Zama was fought. Inf. XXXI, 115.
Cited as a hero of the Roman Republic. Par. VI, 52.
Scorpius: Constellation in the form of a Scorpion and sign of the Zodiac.
Dante sees stars at dawn "in the form of an animal that assails with its tail." Purg. IX, 5.
Scorpius is on the meridian line when Dante enters the terrace of the lustful. Hence is it 2 P.M. in Purgatory. Purg. XXV, 3.
Michael Scot (c. 1175–1234): Scottish mathematician, philosopher, alchemist and astrologer, honoured by popes and emperors, especially Frederick II, he developed a popular reputation as a magician and seer.
Damned among the soothsayers. Of him it is said "che veramente de le magiche frode seppe 'l gioco". Inf. XX, 115–117.
Scotland: see Anglo-Scottish War
Second Punic War: The second of the wars fought between Carthage and Rome (219–202). According to Livy, Hannibal sent to Carthage "a pile" of gold rings from the fingers of thousands of slaughtered Romans.
"The long war where massive mounds of rings were battle spoils". Inf. XXVIII, 10–12.
Semele: See Hera.
Semiramis: Legendary figure who was, in Dante's day, believed to have been sexually licentious after the death of her husband Ninus.
Found amongst the sexual sinners. Inf. V, 52–60.
Seneca, Lucius Annaeus (c. 4 BCE – 65 CE): Roman philosopher, statesman and dramatist, forced to commit suicide by Nero for his participation in the Pisonian conspiracy, called "morale" (moral), by Dante.
Encountered by Dante in Limbo. Inf. IV, 141.
Sennacherib: King of Assyria (705–681 BCE). His failed siege of Jerusalem is discussed in II Kings, which notes the army's destruction by a plague sent by God and his later assassination by his sons.
Depicted on the pavement in Purgatory as an example of arrogance. Purg. XII, 53.
Serchio: A river near Lucca.
Leisurely floating on ones back in this river is contrasted, by the Malebranche, with the different kind of swimming by the barrators in the lake of boiling pitch. Inf. XXI, 49.
Seven Deadly Sins: A list developed by Christian moralists of the principal vices. They include Pride (superbia), Greed (avaritia), Lust (luxuria), Envy (invidia), Gluttony (gula), Anger (ira), and Sloth (acedia).
Dante's Purgatory is structured in seven levels where souls are purged of these vices before entering Paradise. Virgil explains them in order of ascent.
Pride is "hope of excellence through the abasement of another." Purg. XVII, 115–117.
Envy is "love of misfortune" of another when the other excels. Purg. XVII, 118–120.
Anger is "seeking another's harm" after being injured by another. Purg. XVII, 121–123.
Sloth is love for the Good which is "slack." Purg. XVII, 130–132.
Greed, Gluttony & Lust are "excessive self-abandonment" (troppo s'abbandona) to the lesser goods of possessions, food & drink, and sexual desire. Purg. XVII, 136–139.
Sextus Pompeius: Son of Pompey the Great and opponent of Julius Caesar, portrayed by Lucan as a cruel pirate (Pharsalia VI, 420–422).
Pointed out by Nessus. Inf. XII, 135.
Shepherd: reference to the Pope as chief shepherd of the Christian flock.
Criticized for failure to distinguish spiritual and secular powers. He can "chew the cud" (has wisdom) but does not "have cleft hooves" (have both spiritual and temporal authorities). See Lev 11:3. Purg. XVI, 98–99. He also has "joined the sword to the shepherd's crook." Purg. XVI, 109–110.
Sichaeus: First husband of Dido and ruler of Tyre, he was murdered by Dido's brother.
It is remembered that Dido "ruppe fede al cener di Sicheo". Inf. V, 62.
Sicilian bull: A brazen figure of a bull used as an instrument of torture. The echoing screams of its victims, roasting inside, were thought to imitate the bellowing of a bull. It was created by Perillus for the tyrant Phalaris. Its creator was also its first victim.
It "would always bellow with its victims voice". Inf. XXVII, 7–12.
Silvester I: A saint, he was Pope from 314 to 335. In the Middle Ages, supported by a forged document called the "Donation of Constantine", it was believed that he had baptized Constantine and cured him of leprosy, and as a result, that he and his successors had been granted rule over Rome and the Western Roman Empire. For Dante, this event was the beginning of the ever-increasing worldly wealth and power of the papacy, and the corruption that went along with it.
"The first rich father!" Inf. XIX, 117.
Guido da Montefeltro compares Silvester being sought by Constantine to cure his leprosy, with himself being sought by Boniface to "ease the fever of his arrogance". Inf. XXVII, 94–95.
Simon Magus: The magician (or proto-Gnostic) of Samaria. In the Acts of the Apostles (8:9–24) he is rejected by the apostle Peter for trying to buy the ability to confer the Holy Spirit. From his name is derived the word Simony.
His followers "fornicate for gold and silver". Inf. XIX, 1–4.
Simonides: Greek poet of the 5th century BCE.
Resident of Limbo. Purg. XXII, 107.
Simony: Sin of selling or paying for offices or positions in the church hierarchy (cf. barratry).
One of the sins of ordinary fraud punished in the eighth circle. Inf. XI, 59.
Dante arrives in the 3rd Bolgia of the eighth circle where the Simoniacs are set upside-down in rock pits, with their exposed feet in flames. Inf. XIX, 1–117.
Sinon: In Virgil's Aeneid, he was a Greek warrior during the Trojan War, who, having pretended to change sides, convinced the Trojans to bring the Trojan Horse into Troy, thus allowing the Greek soldiers hidden within it to climb out after dark, open the gates to the city, and let in the Greek army, who then captured the city.
Among the falsifiers, he is one of two liars pointed out by Master Adam. inf. XXX 98.
Siren: Seductive chimera, half-woman and half-bird, who lures sailors to shipwreck on rocks with her singing.
Appears to Dante in a dream. Purg. XIX, 7–33.
Beatrice tell Dante that other women are sirens on his spiritual journey. Purg. XXXI, 44.
"Sitiunt": ("They thirst.") Abbreviation of "Beati qui esuriunt et sitiunt iustitiam quoniam ipsi saturabuntur." ("Blessed are those who hunger and thirst after righteousness, for they shall be satisfied.") One of the Beatitudes preached by Jesus in Matthew 5.
Heard by Dante as he departed the terrace of the greedy in Purgatory. Purg. XXII, 6.
Socrates: Greek philosopher.
Encountered by Dante in Limbo. Inf. IV, 134.
Reginaldo Scrovegni: One of the richest Paduan bankers. In expiation of his father's sin, his son Enrico commissioned the Cappella degli Scrovegni in 1300 that was frescoed by Giotto.
Among the usurers. Inf. XVII, 64–75.
Sodom: Biblical city, which during the Middle Ages, became associated in Christian thinking with the sin of homosexuality. Sodomy, like usury, was viewed as a sin against nature.
Used to locate the sodomites as being punished in the last ring of the seventh circle. Inf. XI, 50.
"Sodom and Gomorrah" is recited penitentially by one group on the terrace of the lustful. Purg. XXVI, 40.
Solomon: Biblical king; son of King David; proverbially the wisest of men.
Not named, but called "the high mind blessed to know to such great depths, no second ever rose who saw so much" by Thomas Aquinas in the sphere of the Sun. Par. X, 109–114.
Spendthrift Club (Brigata Spendereccia): A group of rich young Sienese nobles, devoted to squandering their fortunes on foolish extravagances and entertainments. Arcolano of Siena was a member.
Four of its members described by Capocchio: "Stricca", "Niccolò", "Caccia d'Asciano" and "Abbagliato". Inf. XXIX, 125–132.
Sordello: 13th-century Italian troubadour, born in Goito near Virgil's home town Mantua.
In Purgatory he personifies patriotic pride. Purg. VI, 74.
Statius: Publius Papinius Statius (c. 45 – c. 96). Roman poet of the Silver Age and author of the Silvae, the Achilleid and the Thebais.
Dante and Virgil encounter him in the level of Purgatory reserved for the avaricious, and he accompanies them on the rest of their trip through Purgatory. Purg. XXI–XXXIII.
In a story created by Dante, Statius tells how reading Virgil converted him to Christianity. There is no historical evidence that Statius was a Christian. Purg. XXII, 64–91.
Stricca: See Spendthrift Club.
Strophades: See Harpies.
Styx: One of the rivers encircling Hades in the Aeneid (VI, 187, 425).
Encountered and described. Inf. VII, 100–129.
Formed from the tears of the statue of the Old Man of Crete. Inf. XIV, 94–116.
"Summae Deus clementiae": ("God of highest mercy.") Latin monastic hymn sung on Saturday mornings. Its third verse calls on God to consume our loins with a fire of divine love.
Sung by souls on the terrace of the lustful in Purgatory. Purg. XXV, 121.
Swallow (Rondinella): Songbird. According to Ovid, Philomela, a princess from Athens, was raped by Tereus and then transformed into a songbird, generally identified as a nightingale.
Dante mentions the bird's song as a harbinger of dawn in Purgatory. Purg. IX, 14.
Sylvius: See Aeneas.
Syrinx: Mythological Greek nymph who, escaping her sexual defilement, fled to a river and was converted into a hollow reed which sang as the wind blew.
Alluded by Dante as the musical reason for his sleep in Paradise. Purg. XXXII, 66.
T
Tagliacozzo: Site of a defeat by Manfred's nephew Conradin, by Charles of Anjou, who, following the advice of his general Erard ("Alardo") de Valery, surprised Conradin, with the use of reserve troops.
"Where old Alardo conquered without weapons". Inf. XXVIII, 17–18.
Tarpeian Rock: cliff on the Capitoline Hill in Rome, where an ancient temple to Saturn was located.
Compared to the gate of Purgatory. Purg. IX, 135.
Tarquin: Last king of Rome, he was overthrown by Lucius Junius Brutus, considered the founder of the Republic.
Seen in Limbo. Inf. IV, 121–128.
Taurus: Zodiac constellation in the form of a bull.
When Dante enters the terrace of the lustful in Purgatory, Taurus is on the meridian line. Hence it is 2 P.M. in Purgatory. Purg. XXV, 3.
Te Deum laudamus: "We praise Thee, O God." Ancient Latin hymn sung in the morning monastic offices. Also sung in special occasions of celebration.
Heard by Dante as he enters Purgatory. Purg. IX, 141.
Te lucis ante: "To Thee before the close of day." Latin hymn sung at Compline, the final monastic prayer office of the day.
Souls in the "Valley of the Princes" sing the hymn at the end of the day. Purg. VIII, 13–17.
Telemachus: Son of Odysseus (Ulysses) and Penelope, he plays an important role in the Odyssey. In the lost Telegony he appears to have married Circe and been granted immortality.
Not even Ulysses' love for his son (and wife and father) was enough to overrule his desire "to gain experience of the world and of the vices and the worth of men". Inf. XXVI, 94–99.
Temple: reference to the Templars, a military order founded during the Crusades.
Forcibly dissolved in 1307 by Philip IV of France to obtain their vast wealth. Purg. XX, 91–93.
Terence: Publius Terentius Afer. Roman playwright of the 2nd century BCE.
Resident of Limbo. Purg. XXII, 97.
Terrestrial Paradise: According to the Comedy, Terrestrial Paradise is the Garden of Eden where the original man and woman first lived. (Gen 2 & 3) It is located at the top of the mountain of Purgatory. The events of Cantos XXVIII through XXXIII in the Purgatorio take place there.
Thebes: City of Ancient Greece.
Statius tells Dante and Virgil that he composed the Thebaid, an epic poem on the history of Thebes. "I sang of Thebes." Purg. XXI, 92.
Thaïs: A courtesan in Terence's Eunuchus. Perhaps misled by Cicero's commentary (De amicitia XXVI, 98), he places her among the flatterers.
Virgil contemptuously calls her "puttana" ("whore"). Inf. XVIII, 127–135.
Thales (c. 635–543 BCE): Greek philosopher.
Encountered by Dante in Limbo. Inf. IV, 137.
Thaumas: Greek sea god, whose daughter is Iris, the goddess of rainbows.
Statius comments that rainbows do not occur in Purgatory. Purg. XXI, 50–51.
Themis: Greek goddess of divine justice and one of the Oracles of Delphi.
Beatrice compares her own obscure oracles about the future to those of Themis or the Sphinx. Purg. XXXIII, 47.
Theobald V of Champagne (c. 1238–1270): The eldest son of Theobald IV of Champagne, on his death in 1253 he succeeded him as Count of Champagne and, as Theobald II, king of Navarre. He died childless in 1270.
The "good king Theobald" ("buon re Tebaldo"). Inf. XXII, 52.
Theological Virtues: Virtues granted to believers by God's grace. They include Faith, Hope and Love.
Symbolized by three stars visible from Purgatory. Purg. VIII, 93.
Symbolized by three women dancing at the right wheel of the chariot in the Pageant of the Church Triumphant. Purg. XXIX, 121–129.
Theseus: Legendary king of Athens who visited the underworld and, in the version used by Dante, was rescued by Herakles.
His name invoked by the Erinyes. Inf. XI, 54.
The "Duke of Athens" who killed the Minotaur. Inf. XII, 17.
Helped to defeat drunken Centaurs at Hippodamia's wedding feast. Purg. XXIV, 23.
Thetis: Noble ancient Greek woman. Wife of Peleus and mother of Achilles.
Resident of Limbo. Purg. XXII, 113.
Thisbe: In a tale by Ovid (Metamorphoses IV, 55–166), Thisbe and Pyramus are lovers in ancient Babylon separated by a wall.
Dante alludes to them when a wall of fire separates him from Beatrice. Purg. XXVII, 37–39.
Thymbraeus: An epithet of Apollo derived from the town Thymbra, where there was a temple dedicated to him.
In Purgatory, Thymbreaus (Apollo) is depicted on the pavement casting Briareus from Olympus. Purg. XII, 31.
Tiber: River which runs through Rome and empties into the Tyrrhenian Sea.
Souls bound for Purgatory wait on the seashore for the angelic ferry. Purg. II, 101.
Tigris and Euphrates: Rivers in the Middle East. According to Genesis 2, they had their origins in the Garden of Eden.
Dante compares these two rivers to the two rivers he sees in Terrestrial Paradise. Purg. XXXIII, 112.
Timaeus: A dialogue of Plato where the celestial source and destiny of the human soul are discussed.
Beatrice corrects Dante of mistaken ideas he drew from this dialogue. Par. IV, 22–63.
Tiresias: A mythical blind soothsayer who was transformed into a woman and then back into a man, seven years later. He has an important role in classical literature, including the Odyssey.
His double transformation is told. Inf. XX, 40–45.
Father of Manto. Inf. XX, 58, Purg. XXII, 113.
Tisiphone: see Erinyes.
Tithonus: Trojan lover of Eos, Titan of the Dawn.
Mentioned in reference to dawn in Purgatory. Purg. IX, 1.
Titus: Roman Emperor (79–81). As a general, he completed the campaign to put down a Jewish revolt and recapture Jerusalem in 70 CE. Par. VI, 92–93.
Statius tells Dante and Virgil that he was from the age of Titus. Purg. XXI, 82.
Tityas: Son of Gaia. Tityus was a giant killed by Zeus for attacking Leto.
Seen chained in the "Well of the Giants". Inf. XXXI, 124.
Tobit: Protagonist of the ancient Jewish book of the same name. Tobit is conducted on a journey by the Archangel Raphael.
Beatrice tells Dante that Raphael may have appeared in human form, but that this form is an accommodation to the limits of the human imagination. Par. IV, 48.
Tomyris: Queen of the Massagetae in the 6th century BCE. According to Herodotus, Cyrus the Great led a failed invasion of her lands. After his defeat and death in battle, Tomyris plunged his severed head into a wineskin filled with blood.
Cyrus' death is depicted on the pavement in Purgatory as an example of arrogance. Purg. XII, 56.
Torquatus: Titus Manlius Torquatus, Consul and Dictator in Rome during the 4th century, BCE.
Cited as an example of the noble Roman. Par. VI, 46.
Tours: City in France. Pope Martin IV was treasurer of the church there when he was elected pope in 1281.
Trajan: Roman Emperor (98–117) at the height of the Empire. According to Medieval legend, he was posthumously converted to Christianity by Pope Gregory the Great.
Appears depicted in a wall carving as an exemplar of humility, granting justice to a widow. Purg. X, 73–93.
Troy: Also called Ilium, the site of the Trojan War, described in Homer's Iliad, and the home of Aeneas. The Greeks were victorious by means of the wooden Trojan Horse, which the Greeks left as a "gift" for the Trojans. The Trojans brought the horse through the gates into their walled city, and the Greek soldiers who had hid inside the horse were able to open the gates and let in the rest of the Greek army.
Aeneas' escape. Inf. I, 73.
"That horse's fraud that caused a breach". Inf. XXVI, 58–60.
Trojan (meaning perhaps, through Aeneas, their Samnite descendants) wars in Apulia. Inf. XXVIII, 7–9.
The "pride of Troy ... dared all" but "was destroyed". Inf. XXX, 13–15.
Destruction of Troy depicted on the pavement in Purgatory as an example of arrogance. Purg. XII, 61.
Tullio/Tully: See Cicero.
Turnus: A chieftain of the Rutuli whose conflict with Aeneas is the subject of the second half of the Aeneid, at the end of which he was killed by Aeneas in single combat (Aeneid II, 919)—one of those who "died for Italy". Inf. I, 106–108.
Tristan: Hero of medieval French romance, he was a Cornish Knight of the Round Table, and adulterous lover of Isolde.
Found amongst the sexual sinners. Inf. V, 67.
Tuscany: region of Italy where Florence is located.
Typhon: Son of Tartarus and Gaia. Typhon was a giant with a hundred serpent heads.
Seen chained in the "Well of the Giants". Inf. XXXI, 124.
U
Ugolino della Gherardesca: Leader of one of two competing Guelph factions in Pisa. In 1288 he conspired with the Archbishop Ruggiere degli Ubaldini to oust the leader of the other faction, his grandson Nino de' Visconti. Ugolino was, in turn, betrayed by Ruggiere and imprisoned with several of his sons and grandsons. They all died of starvation in prison.
Found with Ruggiere amongst those damned for treason. Inf. XXXII, 124–XXXIII 90.
Ulysses: See Odysseus.
Usury: The practice of charging a fee for the use of money; viewed by the medieval church as a sin because it went contrary to the idea that wealth is based on natural increase, which was believed to be a gift from God.
Explained by Virgil to Dante. Inf. XI, 97–111.
The usurers are punished in the seventh circle Inf. XVII, 34–75.
Urania: The ancient Muse of Astronomy. She became the Muse of poets describing sacred themes.
Dante invokes her in Purg. XXIX, 41.
V
Varro: Either Publius Terentius Varro or Lucius Varius Rufus. Both were Roman writers of the 1st century BCE.
Resident of Limbo. Purg. XXII, 98.
Venerable Bede: See Saint Bede.
Venetian Arsenal: Shipyard and naval depot for Venice, built c. 1104, in Castello sestiere, it was one of the most important shipyards in Europe, and was instrumental in maintaining Venice as a great naval power.
Described. Inf. XXI, 7–15.
"Veni, sponsa, de Libano" ("Come with me from Lebanon, my spouse.") (Song of Solomon 4:8)
Sung by the elders representing the books of the Old Testament in the Pageant of the Church Triumphant. Purg. XXX, 10–12.
"Venite, benedicti Patris mei." ("Come, blessed of my Father.") (Mat 25:34)
Sung by an angel as Dante finishes the last purgation. Purg. XXVII, 58.
Venus: Roman goddess of love. In Greek mythology she was known as Aphrodite.
Dante compares the loving eyes of Matilda to those of Venus inspired by her son Cupid.
Vespers: Evening monastic prayer service. As a reference to a period of time, Vespers is 3 P.M. to 6 P.M.
Used to indicate the time of day. Purg. III, 25; XV, 6; XV, 139.
"Vinum non habent": "They have no wine." (John 2:3) Words spoken by Mary to Jesus at the wedding feast at Cana to prompt him to supply more wine for the feast.
Heard by souls in the terrace of the envious as a lesson in generosity. Purg. XIII, 29.
"Virum non cognosco": ("I have not known a man.") The Virgin Mary's response to the angel's announcement of the virgin birth of her son Jesus.
Recited penitentially by souls on the terrace of the lustful in Purgatory. Purg. XXV, 128.
Volto Santo ("Holy face") of Lucca: An early Byzantine crucifix made of very dark wood, greatly venerated as having been miraculously created.
Used by the Malebranche to mock the pitch-blackened face and body of one of the barrators (perhaps Bottario). Inf. XXI, 46–48.
Virgil (Publius Vergilius Maro) (70–19 BCE): Latin poet. He serves as Dante's guide through the Inferno and Purgatorio. In the absence of texts of Homer, the readers in the Middle Ages considered Virgil's Aeneid to be the great epic poem of the Classical world. In Dante's time, many believed that Virgil had predicted the arrival of Christianity in lines from his Eclogue IV: "at the boy's birth in whom/the iron shall cease, the golden race arise" (trans John Dryden). This made him doubly suited to his role as guide. He also symbolises Reason. Virgil accompanies Dante from Inf. I, 61 to Purg. XXX, 54.
Sudden appearance. Inf. I, 61–63
The "light and honor of all other poets" (Mandelbaum). Inf. I, 82
Dante's inspiration. Inf. I, 85–87
Offers to be Dante's guide. Inf. I, 112–114
In Purgatory, the poet Statius claims that Virgil's Aeneid was his poetic inspiration. It was my "mother" and my "nurse." Purg. XXI, 97–98.
In a story created by Dante, Statius relates how reading Virgil's Eclogue IV helped to convert him to Christianity. "Per te poeta fui, per te cristiano." ("Through you I became a poet; through you a Christian.") There is no evidence that Statius was a Christian. Purg. XXII, 64–93.
Departs from Dante without saying farewell. Purg. XXX, 49–54.
Vitaliano del Dente: Paduan banker, he was podestà of Vicenza in 1304 and of Padua in 1307.
His future damnation as a usurer is foretold by Reginaldo Scrovegni. Inf. XVII, 68–69.
Vulcan: In Roman mythology, blacksmith of the gods and, with the help of the Cyclops, maker of thunderbolts for Jove.
From whom Jove "took in wrath the keen-edged thunderbolt". Inf. XIV, 52–57.
W
Wenceslaus II of Bohemia (1278–1305).
Dantes sees him with his father Ottokar II in the "Valley of the Princes". He is a late-repenter waiting to enter Purgatory. Purg. VII, 102.
Z
Michel Zanche (died 1290): Governor of the giudicato of Logudoro, in Sardinia. He administered the province for King Enzo, son of the Emperor Frederick II. When Enzo was made prisoner in 1249, his wife divorced and married Zanche. The latter ruled Logudoro until 1290, when he was murdered by his son-in-law Branca Doria.
Among the barrators. Inf. XXII, 88–90.
Zion: Mountain in Jerusalem where Solomon's Temple was constructed.
Used as a metonym for Jerusalem. Purg. IV, 69, 75.
Zeno of Elea (c. 490 – c. 430 BCE): Greek presocratic philosopher.
Encountered by Dante in Limbo. Inf. IV, 138.
Zeus (also Jove or Jupiter): Chief god of Classical mythology.
Defied by Capaneus, he kills him with a thunderbolt Inf XIV, 43–75.
An Eagle ("the bird of Jove"), representing the Roman Empire, attacks the young Church in the Pageant of Church History. Purg. XXXII, 109–117.
Saint Zita (c. 1215–1272): Canonized in 1696, she is the Patron saint of all maids and domestics. In her city, Lucca, she was already, in life, an object of popular devotion and reputed a saint. In Dante's time, her fame had already made her a sort of patron saint of her city. The Elders of Saint Zita were ten citizens of Lucca who, along with the chief magistrate, were the rulers of the city.
An "elder of Saint Zita" (perhaps Bottario) is plunged into a lake of boiling pitch with the barrators. Inf. XXI, 35–54.
References
Dante.
The Divine Comedy of Dante Alighieri, Inferno, translated by Allen Mandelbaum (Bantam Classics 1982) .
The Divine Comedy of Dante Alighieri, bilingual edition with commentaries and notes, J. A. Carlyle, P.H. Wicksteed and T. Okey (translators), H. Oelsner (notes), Temple Classics, 3 vols. 1899–1901. Republished by Vintage (1955). .
The Divine Comedy of Dante Alighieri, translated by Henry F. Cary. The Harvard Classics. Vol. XX. (New York: P.F. Collier & Son, 1909–14). Also: Kessinger Publishing (2004). .
The Inferno, bilingual edition with commentaries and notes, translated by Robert Hollander and Jean Hollander (New York: Doubleday, 2000). .
The Divine Comedy of Dante, Henry Wadsworth Longfellow (translator), Kessinger Publishing (2004). . Inferno, Purgatory, Paradise.
Fay, Edward Allen. Concordance of the Divina Commedia (Cambridge, Massachusetts: Dante Society, 1888). .
Jacoff, Rachel (ed.). The Cambridge Companion to Dante (Cambridge: University, 1993). .
Lansing, R., The Dante Encyclopedia, Garland; 1 edition (2000). .
Ryan, Christopher. "The Theology of Dante" in Jacoff (1993), pp. 136–152.
Toynbee, Paget. Concise Dictionary of Proper Names and Notable Matters in the Works of Dante (Oxford: University, 1914). .
Bosco-Reggio, La Divina Commedia, Inferno (Milano, Le Monnier 1988).
Vittorio Sermonti, Inferno di Dante (Milano, Rizzoli 2001). .
Giovanni Andrea Scartazzini La Divina Commedia riveduta e commentata (1874–1890, 4 vols.).
Giovanni Andrea Scartazzini, Enciclopedia dantesca: dizionario critico e ragionato di quanto concerne la vita e le opere di Dante Alighieri (1896–1898, 2 vols.).
External links
Parker, Deborah World of Dante Website with searchable database of cultural references in the Divine Comedy.
Cultural references
References in literary works
Dante Alighieri
Italian literature-related lists
Cultural depictions of Adam and Eve
Cultural depictions of Abraham
Cultural depictions of Alexander the Great
Cultural depictions of Aristotle
Cultural depictions of Attila the Hun
Depictions of Augustus in literature
Cultural depictions of Averroes
Cultural depictions of Marcus Junius Brutus
Depictions of Julius Caesar in literature
Cultural depictions of Cain and Abel
Cultural depictions of Catiline
Cultural depictions of Cicero
Depictions of Cleopatra in literature
Cultural depictions of David
Cultural depictions of Dido
Cultural depictions of Diogenes
Cultural depictions of Domitian
Cultural depictions of Frederick I, Holy Roman Emperor
Cultural depictions of Francis of Assisi
Cultural depictions of Hannibal
Cultural depictions of Homer
Cultural depictions of Jesus
Cultural depictions of John the Baptist
Cultural depictions of Judas Iscariot
Cultural depictions of Justinian I
Cultural depictions of Mary, mother of Jesus
Cultural depictions of Moses
Cultural depictions of Muhammad
Cultural depictions of Nero
Cultural depictions of Noah
Cultural depictions of Pontius Pilate
Cultural depictions of Plato
Cultural depictions of Saladin
Cultural depictions of Seneca the Younger
Cultural depictions of Scipio Africanus
Cultural depictions of Socrates
Cultural depictions of Virgil
|
27916376
|
https://en.wikipedia.org/wiki/PassWindow
|
PassWindow
|
PassWindow is a technique of producing one-time passwords and facilitating transaction verification that is used as an online second-factor authentication method.
The system works by encoding digits into a segment matrix similar to the seven-segment matrices used in digital displays. The matrix is then divided into two component patterns that reveal the whole when superimposed.
Half of the pattern is printed on a transparent region of a plastic card, while the other is displayed on an electronic screen such as a computer monitor. These are referred to as the key pattern and challenge pattern, respectively.
Each key pattern is unique, and the challenge pattern can only be decoded by its corresponding printed key.
By varying the challenge pattern displayed on the screen, a series of digits can be communicated to the card holder without being visually revealed on the screen.
PassWindow is typically implemented such that an animated, perpetually looping sequence of challenge patterns is displayed, each encoding a single digit placed in a random location within the matrix.
A valid solution to this challenge then consists of a specified number of consecutively appearing digits.
Use in two-factor authentication
By printing a PassWindow key pattern on a piece of transparent media, such as a transparent section of a plastic card, a standard plastic ID-1 card can be used as physical token ( something you have) that can be used in a two-factor authentication system.
Generation of one-time passwords
Using the PassWindow system, a challenge pattern containing a string of digits and/or letters can be generated for a specific key pattern by an authentication server with knowledge of the shared secret (the user's key pattern).
The user decodes the sequence of digits from the pattern using their PassWindow key and sends this as a response to the server's challenge. The correct response confirms that the client has physical access to the token.
These digits are then used as a one-time password.
Mutual authentication
Mutual authentication or two-way authentication (sometimes written as 2WAY authentication) refers to two parties authenticating each other suitably. In technology terms, it refers to a client or user authenticating themselves to a server and that server authenticating itself to the user in such a way that both parties are assured of the others' identity. When describing online authentication processes, mutual authentication is often referred to as website-to-user authentication, or site-to-user authentication.
Passive mutual authentication with PassWindow
In the simplest case, the client verifies that the server from which they are receiving their challenge by confirming that the solution is intelligible when they superimpose their key over the challenge. An unintelligible or corrupted challenge alerts the user that they may not be connected to the server they intend.
Transaction verification
In addition, a known string of digits may be encoded into the challenge at the time of generation to provide additional server-to-client authentication to prevent the replay of stored challenges. Known as a verification code, examples include destination account numbers or transaction totals when used to secure online monetary transactions. This use is often referred to as transaction verification and forms the primary basis for PassWindow's exceptional resilience to Man-in-the-middle (MITM) and Man-in-the-browser (MITB) attacks.
History
Matt Walker, Australian, invented the original PassWindow concept after many years researching various online two-factor authentication systems. The high cost of many electronic token systems, as well as their inability to protect against an ever-increasing array of complex attacks, forced Matthew to completely rethink the way modern authentication is conducted.
During the intervening period, while the security world looked for ever more complex and high-tech solutions, which it was apparent were increasingly vulnerable to ever more complex and high tech attacks, Matthew decided to take the opposite approach and look for an authentication solution with pure simplicity at its core.
In the process, he discovered an entirely new secure method in online security.
Media appearances
PassWindow first appeared in the media in May 2009 as a 'Cheap solution for security' on account of its ability to securely produce one-time passwords without the need for electronics to be deployed to its end users.
PassWindow's inventor, Matthew Walker, appeared on the Australian television program The New Inventors in June 2009.
PassWindow has since appeared several times in the media, as well as being the subject of a white paper written by VEST corporation, France.
PassWindow has been selected as a finalist in The Wall Street Journal 2010 Asian Innovation Awards.
PassWindow has been featured in The Wall Street Journal as "A New Way to Outwit Internet Fraudsters".
References
External links
The official PassWindow website
A white paper analysis of the PassWindow method produced by Vest Corporation, France
An evaluation of hypothetical attacks against the PassWindow authentication method produced by M. Slyman, G. Nicolae, S. O'Neil, B. Van Der Merwe
Access control software
Computer access control
|
38262597
|
https://en.wikipedia.org/wiki/SRM%20Engine%20Suite
|
SRM Engine Suite
|
The SRM Engine Suite is an engineering software tool used for simulating fuels, combustion and exhaust gas emissions in internal combustion engine (IC engine) applications. It is used worldwide by leading IC engine development organisations and fuel companies. The software is developed, maintained and supported by CMCL Innovations, Cambridge, U.K.
Applications
The software has been applied to simulate almost all engine applications and all transportation fuel combinations with many examples published in numerous leading peer-reviewed journals, a brief summary of these articles is presented here.
Spark ignition combustion mode: Sub-models to simulate Direct Injection Spark Ignition engines for regular flame propagation events, PM and NOx exhaust gas emissions. Further analysis of knocking and irregular combustion events are facilitated through the implementation of user-defined or the chemical kinetic fuel models included with the tool.
CIDI (diesel) combustion mode: Sub-models for direct injection, turbulence and chemical kinetic enable the simulation of diesel combustion and emission analysis. Typical user projects have included combustion, PM and NOx simulation over a load-speed map, virtual engine optimization, comparison with 3D-CFD and injection strategy optimization.
Low temperature combustion mode: Known as HCCI or premixed CIDI combustion (PCCI, PPCI), ignition and flame propagation in low temperature combustion mode is more sensitive to fuel chemistry effects. By accounting for user defined or by applying the default chemical kinetic fuel models, users do benefit from enhanced predictive performance. Typical projects include identifying the operating and misfire limits for multiple fuel types.
Advanced fuels: To date the model has been applied to conventional diesel, gasoline, blends of gasoline and diesel, bio-fuels, hydrogen, natural gas, and ethanol-blended gasoline fuel applications.
Exhaust gas emissions: Through the implementation of detailed chemical kinetic in both the gas and solid particulate phases, all conventional automotive and non-road exhaust gas emissions are simulated in detail.
The model
The software is based on the stochastic reactor model (SRM), which is stated in terms of a weighted stochastic particle ensemble. SRM is particular useful in the context of engine modelling
as the dynamics of the particle ensemble includes detailed chemical kinetics whilst accounting for inhomogeneity in composition and temperature space arising from on-going fuel injection, heat transfer and turbulence mixing events. Through this coupling, heat release profiles and in particular the associated exhaust gas emissions (Particulates, NOx, Carbon monoxide, Unburned hydrocarbon etc.) can be predicted more accurately than if using the more conventional approaches of standard homogenous and multi-zone reactor methods.
Coupling with third party software tools
The software can be coupled as a plug-in into 1D engine cycle software tools, are capable of simulating the combustion and emissions during closed volume period of the cycle (combustion, TDC and negative valve overlap).
An advanced Application programming interface enables for the model to be coupled with a user-defined codes such as 3D-CFD or control software.
See also
Chemical kinetics
Internal combustion engine
Computational fluid dynamics
Kinetics
References
External links
Engines
Combustion
Computational science
Fluid dynamics
|
2125256
|
https://en.wikipedia.org/wiki/PaperClip
|
PaperClip
|
PaperClip is a word processor for the Commodore 64, 128 (native mode), and Atari 8-bit family published by Batteries Included in 1985. In the United Kingdom it was published by Ariolasoft.
Both the Atari and Commodore versions shared the PaperClip name, but had significant differences. The Commodore 64 version of PaperClip was written by Steve Douglas and was rewritten for the Atari personal computer by Steve Ahlstrom and Dan Moore. The Atari version is based upon the editor in the Action! programming language by Clinton Parker.
PaperClip is also the name given to the text editor ROM portion of the Commodore PET Execudesk office suite. The ROM was written by Steve Douglas as well.
Features
PaperClip does not use word wrap to display text on the screen, which Ahoy!s reviewer wrote was satisfactory for Commodore 64 users with 40-column displays but drew the ire of the reviewer for Whole Earth Software Catalog while highlighting OMNIWRITER's support for same. The Commodore 64 version provides an 80-column preview mode with text that was legible on a computer monitor, and supported a wide variety of Commodore and non-Commodore printers.
The software was supplied with a dongle, a hardware key used for copy protection that plugged into the DE-9 joystick port. A keyless version was also available. An EPROM was also used for copy protection on the Commodore PET. Other programs that used such a method just checked for a couple of specific bytes of data in the EPROM, and this check was easily bypassed by a small change to the code. PaperClip, however, placed all the user messages in the EPROM. Thus no EPROM, and no messages!
One unusual aspect of PaperClip is that the Control key functions more like on a hand-held calculator. You have to press and release the Control key, then press the key for the appropriate function.
Reception
Ahoy! wrote that "PaperClip is one of the most comprehensive word processing programs for the C-64", but noted the $125 list price.
Antic called PaperClip, "by far the best word processor ever available for the Atari." In the December 1986 shopper's guide, a staffer wrote, "We write and edit every word at Antic with PaperClip before transmitting the copy to our typesetter via modem."
References
1982 software
Word processors
Atari 8-bit family software
Commodore 64 software
Commodore 128 software
|
18625706
|
https://en.wikipedia.org/wiki/James%20Freney
|
James Freney
|
James Freney (1719–1788) was an Irish highwayman.
Early life
James Freney was a native of County Kilkenny, and from a respectable family who had been wealthy and powerful in the region since the 13th century, having their seat at Ballyreddy Castle. But during the 1650s they lost their lands and were reduced in status. His father, John Freney, was a servant working at the home of one Joseph Robbins at Ballyduff, Thomastown. In 1718 he married Robbins's housemaid, Alice Phelan, and their son James was born the following year at Alice's father's home at Inistioge.
He received a good education locally, including tuition in the Robbins household—and in 1742 moved to Waterford where he opened a pub with his wife Anne.
Criminal career
Unable to pay the exorbitant fees charged by the town corporation, the couple closed up their pub and moved back to Thomastown. Here, Freney fell in with the Kellymount highway gang, led by fellow Thomastown man John Reddy. Their colleagues would in time number Richard Dooling, John Anderson, Felix Donnelly, James Bolger, Michael Millea, John Reddy, George Roberts, Edmond Kenny, James Larrassy and a man called Hackett.
Proclaimed an outlaw in January 1748 (old calendar), Freney surrendered in April 1749. Joseph Robbins's brother, a lawyer, and Lord Carrick helped Freney work out a deal with the chief justices in which Freney would be allowed to emigrate. It is believed this deal was procured because the authorities feared executing him would make him a folk hero and lead to further disturbances.
The rest of the Kellymount band were not so lucky. Bolger, Kenny, Larrassy, Millea, Reddy, Hackett, Dooling and Roberts all went to the gallows. Reddy was imprisoned while Donnelly escaped to England but was eventually hanged in Kilkenny.
Later life
His autobiography, The Life and Adventures of Mr James Freney, was a huge success upon its publication in 1754. Thackeray, in reading the book, delighted in Freney's "noble naïveté and simplicity of the hero as he recounts his own adventures". Thackeray includes Freney in the novel The Luck of Barry Lyndon, where he has Barry encounter Freney on the highway. The incident appears also in the film Barry Lyndon (in the film, Barry refers to the man about to rob him as "Feeney"). Local landmarks named after him include Freney's Rock and Freney's Well, and he was the hero of The Ballad of the Bold Captain.
Death
It is not known where or how long he was abroad, if at all, but by 1776 he had settled at the port of New Ross and worked as a customs official, a post he held until his death in on 20 December 1788. He was buried in Inistioge.
Works
The Life and Adventures of James Freney, commonly called Captain Freney (Dublin: S. Powell 1754), 146pp.; Do., (Dublin: C.M. Warren 1861); reprinted as The Life and Adventures of James Freney, Together with an Account of the Actions of Several other Highwaymen ([n. pub]: 1900; 1981), 130pp.[Reproduction of original published in 1861 by C. M. Warren, Dublin ; from microfilm of original in National Library of Ireland. Label on title page reads : "This autobiography of James Freney, the legendary "Robinhood of Ireland", ...]; Frank McEvoy, ed., Life and Adventures of James Freney (Kilkenny: Hebron 1988), 84pp. ill. by David Holohan.
Sources
W. M. Thackeray [as ‘M. A. Titmarsh’], The Irish Sketch Book [first edn. 1842], ed. John A. Gamble (Belfast: Blackstaff 1985), pp. 163–79.
Samuel Carter Hall & Anna Maria Hall, Ireland: Its Scenery, Character, etc. 3 vols. (London: Hall, Virtue & Co. 1841-43), 8o.; reprinted as Hall's Ireland: Mr & Mrs Hall's Tour of 1840, ed. Michael Scott, 2 vols., London: Sphere 1984), 1984 edn. Vol. 2, p. 426.
Mary Campbell, review of Life and Adventures of James Freney, ed. Frank McEvoy (Kilkenny: Hebron 1988), in Books Ireland, No.159 (May 1992), pp. 96–97.
Oxford Companion to Irish History, edited S.J. Connolly, Oxford, 1999.
Niall Ó Ciosáin, ‘Freney, James (d. 1788)’, first published Sept 2004, 320 words, Oxford University Press.
1788 deaths
People from Thomastown
Irish highwaymen
Customs officers
Irish autobiographers
1719 births
18th-century Irish people
|
47674773
|
https://en.wikipedia.org/wiki/Unikernel
|
Unikernel
|
A unikernel is a specialised, single address space machine image constructed by using library operating systems. A developer selects, from a modular stack, the minimal set of libraries which correspond to the OS constructs required for the application to run. These libraries are then compiled with the application and configuration code to build sealed, fixed-purpose images (unikernels) which run directly on a hypervisor or hardware without an intervening OS such as Linux or Windows.
The first such systems were Exokernel and Nemesis in the late 1990s.
Design
In a library operating system, protection boundaries are pushed to the lowest hardware layers, resulting in:
a set of libraries that implement mechanisms such as those needed to drive hardware or talk network protocols;
a set of policies that enforce access control and isolation in the application layer.
The library OS architecture has several advantages and disadvantages compared with conventional OS designs. One of the advantages is that since there is only a single address space, there is no need for repeated privilege transitions to move data between user space and kernel space. Therefore, a library OS can provide improved performance by allowing direct access to hardware without having to transition between user mode and kernel mode (on a traditional kernel this transition consists of a single TRAP instruction and is not the same as a context switch). Performance gains may be realised by elimination of the need to copy data between user space and kernel space, although this is also possible with Zero-copy device drivers in traditional operating systems.
A disadvantage is that because there is no separation, trying to run multiple applications side by side in a library OS, but with strong resource isolation, can become complex. In addition, device drivers are required for the specific hardware the library OS runs on. Since hardware is rapidly changing this creates the burden of regularly rewriting drivers to remain up to date.
OS virtualization can overcome some of these drawbacks on commodity hardware. A modern hypervisor provides virtual machines with CPU time and strongly isolated virtual devices. A library OS running as a virtual machine only needs to implement drivers for these stable virtual hardware devices and can depend on the hypervisor to drive the real physical hardware. However, protocol libraries are still needed to replace the services of a traditional operating system. Creating these protocol libraries is where the bulk of the work lies when implementing a modern library OS. Additionally, reliance on a hypervisor may reintroduce performance overheads when switching between the unikernel and hypervisor, and when passing data to and from hypervisor virtual devices.
By reducing the amount of code deployed, unikernels necessarily reduce the likely attack surface and therefore have improved security properties.
An example unikernel-based messaging client has around 4% the size of the equivalent code bases using Linux.
Due to the nature of their construction, it is possible to perform whole-system optimisation across device drivers and application logic, thus improving on the specialisation. For example, off-the-shelf applications such as nginx, SQLite, and Redis running over a unikernel have shown a 1.7x-2.7x performance improvement.
Unikernels have been regularly shown to boot extremely quickly, in time to respond to incoming requests before the requests time-out.
Unikernels lend themselves to creating systems that follow the service-oriented or microservices software architectures.
The high degree of specialisation means that unikernels are unsuitable for the kind of general purpose, multi-user computing that traditional operating systems are used for. Adding additional functionality or altering a compiled unikernel is generally not possible and instead the approach is to compile and deploy a new unikernel with the desired changes.
See also
Microkernel
Container (virtualization)
Rump kernel
References
External links
History and business model; coverage of IncludeOS. (LWN.net)
Operating system kernels
|
27653709
|
https://en.wikipedia.org/wiki/Little%20Rock%20Trojans%20men%27s%20basketball
|
Little Rock Trojans men's basketball
|
The Little Rock Trojans men's basketball team (formerly branded as the Arkansas–Little Rock Trojans) represents the University of Arkansas at Little Rock in Little Rock, Arkansas, United States. The school's team currently competes in the Sun Belt Conference. They are led by first-year head coach Darrell Walker. They play their home games at the Jack Stephens Center.
Rebranding
On July 1, 2015, the Trojans officially announced they would no longer be branded as "Arkansas-Little Rock" or "UALR," but will be the Little Rock Trojans effective immediately.
Staff
The following are the staff members of the Little Rock Trojans men's basketball team:
Conference affiliations
1930–31 to 1978–79 – Independent (no team during the 1939–40 to 1940–41, 1944–45, and 1956–57 to 1960–61 seasons)
1979–80 to 1990–91 – Trans-America Athletic Conference (now known as the ASUN Conference)
1991–92 to 2021–22 – Sun Belt Conference
2022–23 to future – Ohio Valley Conference
Postseason results
NCAA Tournament results
The Trojans have appeared in the NCAA Tournament five times. Their combined record is 2–5.
NIT results
The Trojans have appeared in the National Invitation Tournament (NIT) three times. Their combined record is 3–4.
References
External links
|
2741545
|
https://en.wikipedia.org/wiki/MarkLogic
|
MarkLogic
|
MarkLogic Corporation is an American software business that develops and provides an enterprise NoSQL database, also named MarkLogic. The company was founded in 2001 and is based in San Carlos, California. MarkLogic is a privately held company with over 500 employees and was acquired by Vector Capital in October 2020. It has offices in the United States, Europe, Asia, and Australia.
The company claims to have over 1,000 customers, including Chevron, JPMorgan Chase, Erie Insurance Group, Johnson & Johnson, and the US Army. In addition, six of the top ten global banks are MarkLogic customers.
In 2016 Forrester Research ranked MarkLogic as one of the nine leading NoSQL database vendors in the market, and appeared in several Gartner Magic Quadrant reports for Operational Database Management Systems. In 2017, Gartner ranked MarkLogic as a 'Visionary' in the data warehouse market.
History
MarkLogic was first named Cerisent and was founded in 2001 by Christopher Lindblad,< who was the Chief Architect of the Ultraseek search engine at Infoseek, and Paul Pedersen, a professor of computer science at Cornell University and UCLA, and Frank R. Caufield, Founder of Darwin Ventures, to address shortcomings with existing search and data products. The product first focused on using XML document markup standard and XQuery as the query standard for accessing collections of documents up to hundreds of terabytes in size.
In 2009 IDC mentioned MarkLogic in a report as one of the top Innovative Information Access Companies with under $100 million in revenue.
In May 2012, Gary Bloom was appointed as Chief Executive Officer. He held senior positions at Symantec Corporation, Veritas Software, and Oracle.
Post-acquisition, the company named Jeffrey Cassale as its new CEO. The company continues to innovate and has recently released MarkLogic 10 and DataHub 5.
Funding
MarkLogic obtained its first financing of $6 million in 2002 led by Sequoia Capital, followed by a $12 million investment in June 2004, this time led by Lehman Brothers Venture Partners. The company received additional funding of $15 million in 2007 from its existing investors Sequoia and Lehman. The same investors put another $12.5 million into the company in 2009.
On 12 April 2013, MarkLogic received an additional $25 million in funding, led by Sequoia Capital and Tenaya Capital. On May 12, 2015, MarkLogic received an additional $102 million in funding, led by Wellington Management Company, with contributions from Arrowpoint Partners and existing backers, Sequoia Capital, Tenaya Capital, and Northgate Capital. This brought the company's total funding to $173 Million and gave MarkLogic a pre-money valuation of $1 billion.
NTT Data announced a strategic investment in MarkLogic on 31 May 2017.
Products
The MarkLogic product is considered a multi-model NoSQL database for its ability to store, manage, and search JSON and XML documents and semantic data (RDF triples).
Releases
2001—Cerisent XQE 1.0
2004—Cerisent XQE 2.0
2005—MarkLogic Server 3.0
2006—MarkLogic Server 3.1
2007—MarkLogic Server 3.2
2008—MarkLogic Server 4.0
2009—MarkLogic Server 4.1
2010—MarkLogic Server 4.2
2011—MarkLogic Server 5.0
2012—MarkLogic Server 6.0
2013—MarkLogic Server 7.0
2015—MarkLogic Server 8.0: Ability to store JSON data and process data using JavaScript.
2017—MarkLogic Server 9.0: Data integration across Relational and Non-Relational data.
2019—MarkLogic Server 10.0
Licensing and support
MarkLogic is proprietary software, available under a freeware developer software license or a commercial "Essential Enterprise" license. Licenses are available from MarkLogic or directly from cloud marketplaces such as Amazon Web Services and Microsoft Azure.
Technology
MarkLogic is a multi-model NoSQL database that has evolved from its XML database roots to also natively store JSON documents and RDF triples for its semantic data model. It uses a distributed architecture that can handle hundreds of billions of documents and hundreds of terabytes of data. MarkLogic maintains ACID consistency for transactions and has a Common Criteria certification security model, high availability and disaster recovery. It is designed to run on-premises within public or private cloud computing environments like Amazon Web Services.
MarkLogic's Enterprise NoSQL database platform is used in publishing, government, finance and other sectors, with hundreds of large-scale systems in production.
See also
Document database
Graph database
Multi-model database
NoSQL
Triple store
MongoDB
References
Further reading
Fowler, Adam. "NoSQL for Dummies". , 9781118905623.
Taylor, Allen. "Semantics for Dummies". .
Hunter, Jason. "Inside MarkLogic Server"
McCreary, Dan, and Ann Kelly. Making Sense of NoSQL. Manning Publications Co. August 2012. .
Zhang, Andy. Beginning MarkLogic with XQuery and MarkLogic Server. Champion Writers, Inc. 24 June 2009. .
NoSQL companies
Software companies based in California
Computer companies of the United States
Companies established in 2001
Companies based in San Carlos, California
Big data companies
Software companies of the United States
|
1754860
|
https://en.wikipedia.org/wiki/Francis%20Tuttle%20Technology%20Center
|
Francis Tuttle Technology Center
|
Francis Tuttle Technology Center is a public career and technology education center affiliated with the state of Oklahoma Department of Career and Technology Education. It was established in 1979 after the school boards of four school districts - Deer Creek, Edmond, Putnam City and Western Heights - passed a resolution to form Vocational Technical District 21. Since that time, the districts in Cashion and Crescent have also been added to District 21.
Francis Tuttle has a dual focus, serving both high school and adult students, and offers classes mornings, afternoons, and evenings. Francis Tuttle consists of three main campuses, Rockwell, Reno and Portland also known as the Bruce Gray Campus, located in North West Oklahoma City, Oklahoma. Additionally, Francis Tuttle maintains two additional campuses, the Melrose Site and Business Innovation Center, located in North West Oklahoma City and Edmond, respectively.
Beyond educational needs, the center provides other community services including a child development center, the "District 21" restaurant, full-service salons and multiple spaces available for hosting various private or public events.
Campuses
Rockwell Campus
The Rockwell Campus is the Francis Tuttle's first campus. The campus contains 6 buildings including Administration, Campus Center, Project Hope, Information Technology, and Transportation Technology.
Portland Campus
The Portland Campus also known as the Bruce Gray Campus contains 1 building. This campus contains Oklahoma's largest satellite dish (11 inch in diameter). The building was purchased in 1995 and formerly housed the Wall Street Journal's regional production facility.
Reno Campus
The Reno Campus contains 2 buildings. The campus opened in 2005 following an award-winning pace of construction.
Danforth Campus
The Danforth Campus is the newest campus, slated to open to students and the general public in the Fall of 2021. The campus will provide educational experiences and training focused around entrepreneurship, idea assessment and growth, problem solving collaboration, and forward-thinking and futurist thought. To these end, the campus will also feature a design thinking studio and product realization lab.
Other Locations
The Business Innovation center provides a new, purpose-built environment in which Francis Tuttle can offer programs and services to students more efficiently while The Melrose Program contains the Young Probationers Construction Trades Program
High schools
The Center allows sophomore, junior, and senior high school students from six school districts to attend for free, providing programs in Cosmetology Culinary Arts, Health Sciences, Information Technology, and Transportation Technology.
Adult / Workforce & Economic Development
Francis Tuttle offers career-specific business and industry training and consulting services. They are offered to local businesses at nominal or no-cost. The general public is offered short-term training for career enhancement or leisure activities. Additionally, a number of courses are offered for meet continuing education needs in various professions or for certification purposes, including real estate and insurance.
The Workforce & Economic Development team assists companies in developing customized training programs to fill business and economic need. Areas of specialization include Aerospace Technologies, Computer Training, Data Analytics, Industrial Maintenance/Industry 4.0, Leadership/Organizational Development, Industrial and Occupational Safety and Quality & Continuous Improvement. Launch Pad FT serves as a small-business incubator. Government bidding and contracting assistance is provided through the Francis Tuttle PTAC (Procurement Technical Assistance Center). FT 24/7 serves as the WED department's online and remote learning tool. The Advanced Manufacturing Center provides programs for cross-training professionals in areas such as precision machining, instrumentation and control, welding and automated manufacturing.
Academic oriented certificate programs are offered in construction, business management, insurance, hospitality, information technology, quality management, transportation, nursing and logistics. Other programs are offered in computer aided manufacturing and design, welding, automotive services, medical office technology and child care/education.
Namesake
The technology center is named after Dr. Francis Tuttle, former Director of the State Department of Vocational and Technical Education in Oklahoma. Dr. Tuttle was a member of the Oklahoma CareerTech Hall of Fame class of 1990.
Two former Francis Tuttle Tech superintendents, Bruce Gray and Kay Martin, have buildings named in their honor; the Bruce Gray Center located on the Portland Campus and the Kay Martin Center located on the Reno Campus.
References
External links
Official website
Education in Oklahoma City
Career and Technology Education in Oklahoma
OK Cooperative Alliance
|
8147836
|
https://en.wikipedia.org/wiki/Chess%20%28Northwestern%20University%29
|
Chess (Northwestern University)
|
Chess was a pioneering chess program from the 1970s, written by Larry Atkin, David Slate and Keith Gorlen at Northwestern University. Chess ran on Control Data Corporation's line of supercomputers. Work on the program began in 1968 while the authors were graduate students at the university. The first competitive version was Chess 2.0 which gradually evolved to Chess 3.6 and was rewritten as the 4.x series. It dominated the first computer chess tournaments, such as the World Computer Chess Championship and ACM's North American Computer Chess Championship. NWU Chess adopted several innovative or neglected techniques including bitboard data structures, iterative deepening, transposition tables, and an early form of forward pruning later called futility pruning. The 4.x versions were the first programs to abandon selective search in favor of full-width fixed-depth searching.
In 1976, Chess 4.5 won the Class B section of the Paul Masson American Class Championships, the first time a computer was successful in a human tournament. The performance rating was 1950.
In February 1977, Chess 4.6, the only computer entry, surprised observers by winning the 84th Minnesota Open against competitors just under Master level. It achieved a USCF rating close to or at Expert, higher than previous programs' Class C or D, by winning five games and losing none. Stenberg (rated 1969) became the second Class A player to lose to a computer in a tournament game, the first being Jola.
Because of its Minnesota victory, grandmaster Walter Browne invited Chess 4.6 on a CDC Cyber 176 to his simultaneous chess exhibition; to Browne and others' surprise, Chess 4.6 defeated the United States chess champion. Also in 1977, Chess 4.6 won the second World Computer Chess Championship in Toronto, ahead of 15 other programs including KAISSA; Chess 4 had finished in second place to KAISSA at the first tournament in 1974. The favorite to win the tournament, like all but one other entry Chess 4.6 ran on a computer located away from the tournament; despite losing 90 minutes to hardware failure at the start of its first match the program rapidly defeated its opponent in 27 moves, earlier than any other first-round match. Chess 4.6 was capable of defeating 99.5% of United States Chess Federation-rated players under tournament conditions, and was stronger in blitz chess.
In 1978, the improved Chess 4.7—which had by now achieved a 2030 rating after 31 tournament games—played against David Levy who, in 1968 had wagered that he would not be beaten by a computer within ten years. Whereas Chess 4.7 had beaten Levy under blitz conditions, the bet involved forty moves over a two-hour period, the computer's choices being relayed by telephone from Minnesota to the board. Levy won the bet convincingly, defeating Chess 4.7 in a six-game match by a score of 4.5-1.5, The computer scored a draw in game two after getting a completely winning position but being outplayed by Levy in the endgame, and a win in game four—the first computer victory against a human master—when Levy essayed the very sharp, dubious Latvian Gambit. Levy wrote, "I had proved that my 1968 assessment had been correct, but on the other hand my opponent in this match was very, very much stronger than I had thought possible when I started the bet." He observed that, "Now nothing would surprise me (very much)." International Master Edward Lasker stated in 1978, "My contention that computers cannot play like a master, I retract. They play absolutely alarmingly. I know, because I have lost games to 4.7."
The last revision of the program was Chess 4.9 in 1979. It won the 10th ACM North American Computer Chess Championship tournament in Detroit and played at the expert level (2100). David Slate, with William Blanchard of Vogelback Computing Center at Northwestern University, later wrote a new program in Fortran, originally dubbed "Chess 5.0", but later renamed Nuchess. It competed from 1980 to 1984 but was never the dominating force of its predecessor. Its best competitive result was a second place finish in the 1981 North American Computer Chess Championship. During the 1980's the software paradigm of chess dominance gave way to specialized chess hardware machines like Belle, HiTech, and Chiptest, and the Northwestern series of programs was retired from competition after 1984.
In 1978 and 1979, Atkin and Peter W. Frey published in BYTE a series on computer chess programming, including the Pascal source for Chess 0.5, a chess engine suitable for microcomputers.
Atkin, Slate, and Frey later wrote microcomputer chess, checkers, and Reversi programs for Odesta. Advertisements cited their Northwestern affiliation and authorship of Chess 4.7, "World Computer Chess Champion, 1977-1980".
References
"Chess Skill in Man and Machine", Chess 4.5 - The Northwestern University Chess Program, L. Atkin & D. Slate, pp. 82–118, Springer-Verlag, 1977 - devotes a chapter to the history and internals of Chess 4.5
reprinted in "Computer Chess Compendium", Chess 4.5 - The Northwestern University Chess Program, L. Atkin & D. Slate, pp. 80–103, Springer-Verlag, 1988,
External links
Source code for Chess 4.6 available at
Chess software
History of chess
Northwestern University
|
26956870
|
https://en.wikipedia.org/wiki/5025%20Mecisteus
|
5025 Mecisteus
|
5025 Mecisteus, provisional designation: , is a larger Jupiter trojan from the Greek camp, approximately in diameter. The unusual C/X-type Jovian asteroid is possibly a slow rotator with a rotation period of 250 hours. It was discovered on 5 October 1986 by Slovak astronomer Milan Antal at the Toruń Centre for Astronomy in Piwnice, Poland. In 2021, it was named from Greek mythology after the Greek hero Mecisteus who fought in the Trojan War.
Orbit and classification
Mecisteus is a Jupiter trojan which stays in a 1:1 orbital resonance with Jupiter. It is located in the leading Greek camp at its Lagrangian point, 60° ahead on its orbit .
It orbits the Sun at a distance of 4.8–5.6 AU once every 11 years and 10 months (4,331 days; semi-major axis of 5.2 AU). Its orbit has an eccentricity of 0.07 and an inclination of 11° with respect to the ecliptic. The body's observation arc begins with its official discovery observation at Piwnice in October 1986.
Numbering and naming
This minor planet was numbered by the Minor Planet Center on 19 January 1992 (). On 29 November 2021, IAU's Working Group Small Body Nomenclature it after Mecisteus, from Greek mythology. Mecisteus was an Achaean warrior during the Trojan War who was killed by the Trojan Polydamas.
Physical characteristics
Mecisteus is an unusual C-/X-type according to Pan-STARRS survey and the SDSS-based taxonomy, and has a V–I color index of 0.830.
Rotation period
In November 2009, Stefano Mottola at the Calar Alto Observatory observed Mecisteus in a photometric survey of 80 Jupiter trojans. The obtained lightcurve rendered a very long rotation period of hours with a brightness variation of in magnitude (). However, the Collaborative Asteroid Lightcurve Link (CALL) considers the result as incorrect. As of 2018, no secure period has been obtained.
Diameter and albedo
According to the surveys carried out by the Infrared Astronomical Satellite (IRAS) and the NEOWISE mission of NASA's Wide-field Infrared Survey Explorer, Mecisteus measures 39.84 and 57.83 kilometers in diameter with an albedo of 0.084 and 0.064, respectively. CALL agrees with the results obtained by IRAS, assumes an even lower albedo of 0.0404, and calculates a similar diameter of 57.56 kilometers.
References
External links
Asteroid Lightcurve Database (LCDB), query form (info )
Discovery Circumstances: Numbered Minor Planets (5001)-(10000) – Minor Planet Center
005025
Discoveries by Milan Antal
Minor planets named from Greek mythology
Named minor planets
19861005
|
58784429
|
https://en.wikipedia.org/wiki/Adolphe%20%281803%20privateer%20lugger%29
|
Adolphe (1803 privateer lugger)
|
Adolphe was a lugger launched at Dieppe in 1803. She made several cruises as a French privateer and captured numerous prizes until January 1807 when the British captured her.
Career
Adolphe was commissioned by shipowner Merlin-Dubreuil. From 19 November 1803 to 23 January 1804, her master was Philippe-Antoine Nicolaï. She was armed with 14 guns and had a crew of 40 men when she captured a ship that French records refer to as Amitié ("Friendship"). Friendship, Simcock, master, was carrying sheet copper and flour. She cam into Dieppe.
On 27 January, Jacques-Oudard "Bucaille" Fourmentin took command. He had a successful cruise, notably capturing Lisbon Packet and the 14-gun brig Marguerite. Lisbon Packet sold for 254,540 francs. Lisbon Packet, Jenkins, master, had been carrying tea, and Margaret had been carrying raisins and dying wood. Lisbon Packet came into Dieppe and Margaret came into Treport.
On 5 February 1804 Adolphe sent into Calais a British brig of 200 tons (bm), carrying sugar, tea, and gunpowder. Lloyd's List (LL) supposed that the vessel was Bassett, Purchar, master, which had been sailing from London to Falmouth.
On 12 December captured the French privateer lugger Raccrocheuse but the privateer lugger Adolphe escaped. Both were armed with fourteen 4-pounder guns and each had a crew of 56 men. Both were one day out from Saint-Valery-en-Caux.
Bucaille relinquished command of Adolphe on 16 April 1804. On 6 February 1805, his brother Nicolas Fourmentin took command of Adolphe in Boulogne and set out for a cruise. A report from France dated 10 February 1805 stated that she had captured the three-masted ship off the Isle of Wight. Royal George, of London, had a crew of ten and was carrying ivory, corn, flour, iron, tin, dye wood, and the like. Adolphe left her prize within three leagues of the French Coast. A report dated 14 February stated that Adolphe had taken into Boulogne a British ship carrying flour, dye wood, lead, tin plates, etc.
From February 1805 to February 1806 Adolphe made three cruises under Jacques-Oudard "Bucaille" Fourmentin. LL reported on 20 December that Adolphe had taken five prizes and that two had arrived at Le Tréport.
From February 1806 to some time in 1806, she cruised from Boulogne under Jean "Dejean" Fourmentin. French sources reported on 3 March 1806 that Etoile and Adolpe had sent William & Mathew into Calais. William & Mathew had been sailing from Sunderland to Sandwich when taken. The privateers Eglé, Espoir, Adolphe, and Brave cut out a number of prizes from a convoy of 80 vessels. Betsey, of 150 tons (bm), with her cargo of wine and fruit, and the sloop Happy Return, with "90 guns in ballast", arrived at Dieppe on 30 April. "Dejean" captured Eden, and shared with his brother Nicolas, on Voltigeur in the capture of Narraton and Endeavour.
In 1807 she was again under the command of "Bucaille", and then cruised from Dunkirk under the command of Jacques-François Leclerc.
Capture
On 26 January 1807, the armed defense ship captured Adolphe. Adolphe, under the command of Jacques Francis Leclerc, was armed with 14 guns and had a crew of 39 men. She had thrown two guns, 14 carriages, her boat and her ports overboard during the chase. She had sailed from the Dunkirk Roads on 21 January and two days later near Dogger Bank had captured Leith Packet, which was carrying a cargo of hemp from Tonningen to London. Lloyd's List reported that Leith Packet, Brooke, master, had been sailing from the Baltic and that her captor burnt her the day after capturing her.
The packet's master, five crew members, and three passengers were aboard Adolphe when Norfolk captured her. Norfolk took "Delpha" into Leith.
Legacy
The museum in Château de Dieppe has a model of Adolphe on display.
Notes, citations, and references
Notes
Citations
References
1803 ships
Privateer ships of France
Captured ships
|
471878
|
https://en.wikipedia.org/wiki/List%20of%20United%20States%20Navy%20aircraft%20squadrons
|
List of United States Navy aircraft squadrons
|
This is a list of active United States Navy aircraft squadrons. Deactivated or disestablished squadrons are listed in the List of Inactive United States Navy aircraft squadrons.
Navy aircraft squadrons are composed of several aircraft (from as few as about four to as many as about a dozen), the officers who fly them, the officers and sailors who maintain them and administrative support officers and sailors. Some of the units listed in this article are not technically "squadrons", but they all operate U.S. Navy aircraft in some capacity.
Squadrons and their history are listed in the Dictionary of American Naval Aviation Squadrons (DANAS).
Squadron organization
Active duty squadrons are typically Time commanded by a commander. Second in command is the executive officer (XO), also a commander. The XO typically assumes command of the squadron after approximately 15 months. There are typically four functional departments – Operations, Maintenance, Safety/NATOPS, and Administration – each led by a lieutenant commander functioning as the department head. Within the departments are divisions (each typically headed by a lieutenant) and branches (headed by a lieutenant, junior grade or a chief petty officer).
Reserve squadrons are also commanded by a commander, with another commander as the XO who will also assume command after approximately 15 months. However, reserve squadron demographics are typically older and more senior in rank than their active duty squadron counterparts. Department heads in reserve squadrons are typically senior lieutenant commanders, although some may be recently promoted commanders. Where this difference in maturity level becomes more apparent is at the division officer level. Since most officers in reserve squadrons previously served on active duty in the Regular Navy in a flying status for eight to ten or more years, they are typically already lieutenant commanders, or achieve that rank shortly after transferring to the Navy Reserve. As a result, lieutenants are a minority and lieutenants, junior grade, practically non-existent in reserve squadrons. As a result, divisions are typically headed by lieutenant commanders and branches by lieutenants, senior chief petty officers or chief petty officers.
Types of squadrons
Squadrons can be categorized in a number of ways: Active versus Navy Reserve, land-based versus sea-based, fixed wing versus rotary wing (helicopter) versus Unmanned aerial vehicle (UAV), and by mission. Unlike the USAF, US Army, and USMC, the US Navy does not refer to organizations such as maintenance (though US Navy aircraft squadrons do include their own organic maintenance departments), medical, administrative or other units as "squadrons". In the US Navy a squadron is a unit of aircraft, ships, submarines or boats. There are two exceptions: Tactical Air Control Squadrons (TACRON) consists of personnel specialized in the control of aircraft in support of amphibious operations; and the operating units of Naval Special Warfare Development Group colloquially known as "SEAL Team SIX", are called "squadrons" named by color (these squadrons are the organizational equivalent of a "regular" SEAL Team). This article concerns US Navy aircraft squadrons.
Active squadrons are those in the regular US Navy. Reserve squadrons are in the US Navy Reserve and are manned by a combination of full-time and part-time reservists. For the most part, there is no way to know by the squadron's name alone whether it is an active or reserve squadron. There are Reserve elements of many Active squadrons, and active duty personnel serving in many Reserve squadrons. In general, reserve squadrons share the same missions as their active counterparts, although there are Reserve missions (e.g., Adversary and Fleet Logistics Support) that have no Active counterpart.
At any one time, the US Navy has approximately 600 aircraft that are associated with particular ships. There are also several thousand additional Navy aircraft that are capable of shipboard operations, but are not associated with a ship. The Navy also has several hundred land-based aircraft that are not capable of shipboard operations.
Squadron designations
Navy aircraft squadrons can be properly referred to by designation or nickname. A squadron's designation describes its mission and therefore generally the type of aircraft it flies.
The Formal form designation (e.g., Strike Fighter Squadron EIGHT SIX) indicates the mission.
A subset of the formal form designation is a Navy acronym format in capital letters, e.g., STKFITRON EIGHT SIX
The abbreviated designation (e.g., VFA-86) also indicates the type and mission, as each of the letters has a meaning. In this case, "V" stands for fixed wing, "F" stands for fighter, and "A" stands for attack.
Nickname – e.g., "Sidewinders".
A single squadron can carry a number of designations through its existence. Chief Of Naval Operations Instruction (OPNAVINST) 5030.4G governs the squadron designation system. A squadron comes into existence when it is "established". Upon establishment it receives a designation, for example Patrol Squadron ONE or "VP-1". During the life of the squadron it may be "redesignated" one or more times, the Navy's oldest currently active squadron is VFA-14 and it has been redesignated 15 times since it was established in 1919. Over the history of U. S. Naval Aviation there have been many designations which have been used multiple times (re-used) resulting in multiple unrelated squadrons bearing the same designation at different times. A full description of the history and use of aircraft squadron designations along with the rules governing the lineages of U. S. Navy aircraft squadrons can be found at List of Inactive United States Navy aircraft squadrons.
Fixed Wing Squadrons
Navy fixed wing squadron designations start with the letter "V" because in 1920 with issuance of General Order 541, two overall types of aircraft were identified and assigned permanent letters; lighter than air types were identified by the letter Z and heavier than air types by the letter V. The use of letter abbreviations for squadrons was promulgated in the "Naval Aeronautic Organization for Fiscal Year 1923" which is the first known record associating the abbreviated Aircraft Class Designations (V-heavier than air, Z-lighter than air, and letters designating role) with abbreviated squadron designations. In 1948 the Navy established its first two operational helicopter squadrons designating them as Helicopter Utility Squadrons. It departed from the established "V" heavier than air and "Z" lighter than air system and instead gave them the designation "HU" (H-Helicopter, U-Utility). From that point on heavier than air squadrons which flew rotary wing aircraft were designated with the first letter of "H" while heavier than air squadrons flying fixed wing aircraft retained the original heavier than air "V" then associating the "V" only with fixed wing squadrons. There were two exceptions during the history of Naval Aviation that violated the rule, they were; the use of "RVAH" to denote Reconnaissance Attack Squadrons which operated the RA-5C Vigilante during the 1960s and 1970s and the use of "RVAW" from 1967 to 1983 to designate the Airborne Early Warning (VAW) Fleet Replacement Squadrons.
Electronic Attack (VAQ)
The VAQ designation was established in 1968 to designate "Tactical Electronic Warfare Squadron". On 30 March 1998 the name of the designation was changed to "Electronic Attack Squadron" and all VAQ squadrons then in existence were renamed from "Tactical Electronic Warfare Squadron-" to "Electronic Attack Squadron-".
Electronic Attack Squadrons consists of seven Boeing EA-18G Growlers with the exception of the Fleet Replacement Squadron which has more. The primary mission of the Growler is Electronic Attack (EA), also known as Suppression of Enemy Air Defenses (SEAD) in support of strike aircraft and ground troops by interrupting enemy electronic activity and obtaining tactical electronic intelligence within the combat area. Navy Electronic Attack squadrons carry the letters VAQ (V-fixed wing, A-attack, Q-electronic).
Most VAQ squadrons are carrier based, however a number are "expeditionary", deploying to overseas land bases. When not deployed (either on land or carrier), they are home-ported at NAS Whidbey Island, WA. The exception is VAQ-141, which is forward deployed to MCAS Iwakuni, Japan.
Note: The parenthetical (Second use) and (2nd) appended to some designations in the table below are not a part of the squadron designation system. They are added to indicate that the designation was used more than once during the history of U.S. Naval Aviation to designate a squadron and that these were the second use of that designation.
Airborne Command & Control (VAW)
The VAW designation was first created in July 1948 with the establishment of VAW-1 and VAW-2 to designate "Carrier Airborne Early Warning Squadron". It was in use for only one month as in August 1948 VAW-1 and VAW-2 were redesignated "Composite Squadron" VC-11 and VC-12. In 1948 the VAW designation was resurrected when VC-11 and VC-12 were redesignated VAW-11 and VAW-12. In 1967, VAW-11 and VAW-12 which were large land based squadrons that provided detachments of Airborne Early Warning aircraft to deploying Carrier Air Wings were redesignated as wings and each of their detachments were established as separate squadrons. Established from VAW-11 were RVAW-110 (a FRS), VAW-111, 112, 113, 114, 115, 116 and established from VAW-12 were RVAW-120 (a FRS), VAW-121, 122, 123. In 2019, the VAW designation was renamed from Carrier Airborne Early Warning Squadron to Airborne Command and Control squadron and all VAW squadrons were renamed “Airborne Command & Control Squadron XXX” while retaining the VAW designation.
Each Carrier Airborne Command and Control squadron consists of four E-2C or five E-2D Hawkeyes except for the Fleet Replacement Squadron which has more. Transition to the E-2D Hawkeye is in progress and should be complete by 2025. The Hawkeye's primary mission is to provide all-weather airborne early warning, airborne battle management and command and control (C2) functions for the carrier strike group and Joint Force Commander. Additional missions include surface surveillance coordination, air interdiction, offensive and defensive counter air control, close air support coordination, time critical strike coordination, search and rescue airborne coordination and communications relay. The E-2 Hawkeye and C-2 Greyhound are built on the same airframe and have many similar characteristics. For this reason, both aircraft are trained for in the same Fleet Replacement Squadron.
When not deployed, they are home-ported at either Naval Station Norfolk, VA or Naval Air Station Point Mugu, CA. The exception is VAW-125, which is forward deployed to MCAS Iwakuni, Japan.
Strike Fighter (VFA)
The VFA designation was created in 1980 to designate "Fighter Attack Squadron". The designation was assigned to squadrons equipped with the new F/A-18A Hornet fighter attack aircraft. In 1983 the designation was changed to "Strike Fighter Squadron" and all VFA squadrons in existence at the time were renamed from "Fighter Attack Squadron-___" to "Strike Fighter Squadron-___". An active component Strike Fighter Squadron consists of either ten or twelve F/A-18E single seat Super Hornets, twelve F/A-18F two seat Super Hornets or ten F-35C Lightning IIs. There is one reserve component VFA squadron equipped with the F/A-18C Hornet. Training squadrons (known as Fleet Replacement Squadrons) have many more aircraft. The Hornet and Super Hornet are all-weather aircraft used for attack and fighter missions. In fighter mode, they are used as a fighter escort and for fleet air defense; in attack mode, they are used for force projection, interdiction and close and deep air support. The Hornet and Super Hornet are also used for SEAD and the Super Hornet for aerial refueling.
The F-35C is a fifth-generation strike fighter that was originally planned to replace the F/A-18C Hornet, but expiring F/A-18C service life and delays in F-35C procurement forced the Navy to increase its buy of F/A-18E and F Super Hornets to replace F/A-18C Hornets while awaiting the arrival of the F-35C. The last active component F/A-18C Hornet squadron began its transition to the super hornet in February 2019, leaving only a single reserve component F/A-18C Hornet squadron. The first deployable squadron to transition to the F-35C was a Super Hornet squadron. Ultimately each Carrier Air Wing will be equipped with two Super Hornet squadrons and two F-35C squadrons.
VFA squadrons are home-ported at NAS Lemoore, CA or NAS Oceana, VA when not deployed, except for the squadrons of CVW-5 (which are forward deployed to MCAS Iwakuni, Japan).
Note: The parenthetical (1st), (2nd), (3rd) etc... appended to some designations in the lineage column of table below are not a part of the squadron designation system. They are added to indicate that the designation was used more than once during the history of U.S. Naval Aviation and which use of the designation is indicated. Absence indicates that the designation was used only once.
Fighter Squadron Composite (VFC)
The VFC designation was created in 1988 when two Fleet Composite (VC) squadrons which were dedicated adversary squadrons were redesignated to differentiate them from the remaining VC squadrons which fulfilled various miscellaneous or utility roles. In 2006 a third VFC squadron was established from what had become a permanent detachment of VFC-13. VFC squadrons provide adversary simulation for fleet squadrons. All VFC squadrons are Navy Reserve squadrons.
Two of the squadrons are based at NAS Fallon and NAS Key West to support fleet VFA squadron training at the extensive range complexes supported by those air stations. The third is based at NAS Oceana to support Strike Fighter Wing Atlantic squadron training.
Note: The parenthetical (2nd) and (3rd) appended to some designations in the lineage column of table below are not a part of the squadron designation system. They are added to indicate that the designation was used more than once during the history of U.S. Naval Aviation and which use of the designation is indicated. Absence indicates that the designation was used only once.
Patrol (VP), Patrol Squadron Special Unit (VPU), Unmanned Patrol (VUP)
The VP designation is one of the oldest in the U. S. Navy and is the oldest designation currently in use. It first appeared in 1922 to designate "Seaplane Patrol Squadron" and from 1924 it has designated "Patrol Squadron". In 1982 the VPU Patrol Squadron Special Unit designation was created. Maritime patrol aircraft are used primarily for reconnaissance, anti-surface warfare and anti-submarine warfare. Volume 2 of the Dictionary of American Naval Aviation Squadrons contains comprehensive histories over 150 patrol squadrons. Its Appendix 7 details the lineage of every VP, VPB, VP(H), and VP(AM) squadron from 1922 through the late 1990s.
In 2016 the first "Unmanned" Patrol Squadron (VUP) was established. VUP-19 operates the MQ-4C Triton unmanned air vehicle from an operations center located at NAS Jacksonville while its aircraft with aircraft maintenance personnel are deployed around the world as required. A second VUP squadron is programmed for establishment in 2018 with an operations center at NAS Whidbey Island.
When not deployed VP squadrons are home-ported at NAS Jacksonville, FL or NAS Whidbey Island, WA except for VPU-2 which is home-ported at MCAS Kaneohe Bay.
Note: The parenthetical (1st), (2nd), (3rd) and (First use), (Second use) etc... appended to some designations in the table below are not part of the squadron designation system. They are added to indicate that the designation was used more than once during the history of U.S. Naval Aviation and which use of the designation is indicated. Absence indicates that the designation was used only once.
Fleet Air Reconnaissance (VQ)
The VQ designation was created in 1955 to designate "Electronic Countermeasures Squadron" and did so though 1959. By 1960 the VQ squadrons, rather than simply jamming communications and electronic signals, had been equipped to collect them for intelligence purposes. In January 1960 this new role of the VQ squadrons was recognized by changing the VQ designation from "Electronic Countermeasures Squadron" to "Fleet Air Reconnaissance Squadron." Fleet Air Reconnaissance Squadron ONE is currently the Navy's only overt signals intelligence (SIGINT) and communications intelligence (COMINT) reconnaissance squadron. The 13 EP-3E aircraft in the Navy's inventory are based on the Orion P-3 airframe and provide fleet and theater commanders worldwide with near real-time tactical SIGINT and COMINT. With sensitive receivers and high-gain dish antennas, the EP-3E exploits a wide range of electronic emissions from deep within targeted territory.
Fleet Air Reconnaissance Squadrons THREE and FOUR carry the VQ designation, but they are not reconnaissance squadrons; they are airborne command and control, and communications relay squadrons which provide survivable, reliable, and endurable airborne command, control, and communications between the National Command Authority (NCA) and U.S. strategic and non-strategic forces. The squadrons' E-6B aircraft are dual-mission aircraft, capable of fulfilling both the airborne strategic command post mission equipped with an airborne launch control system (ALCS) which is capable of launching U.S. land based intercontinental ballistic missiles and fulfilling the TACAMO ("Take Charge and Move Out") mission which links the NCA with Navy ballistic missile submarine forces during times of crisis. The aircraft carries a very low frequency communication system with dual trailing wire antennae for that communications relay mission.
Fleet Air Reconnaissance Squadron SEVEN is the E-6B Fleet Replacement Squadron, providing initial and requalification training for pilots, aircrewmen, and maintainers. It operates E-6Bs on loan from VQ-3 and VQ-4, having returned a 737-600 it had previously operated on lease from Lauda Air.
Fleet Logistics Support (VR)
The VR designator was first established in 1942 to designated "Transport" or "Air Transport" or Fleet Logistic Air" squadrons. From 1958 to 1976, it designated "Fleet Tactical Support Squadron"; from 1976 to the present, it designates "Fleet Logistics Support Squadron". Today, all Fleet Logistics Support squadrons are U.S. Navy Reserve squadrons
Fleet Logistics Support Squadrons operate Navy Unique Fleet Essential Airlift (NUFEA) aircraft on a worldwide basis to provide responsive, flexible, and rapidly deployable air logistics support required to sustain combat operations from the sea. During peacetime, squadrons provide air logistics support for all Navy commands as well as provide continuous quality training for mobilization readiness. Fleet Logistics Support squadrons have no counterpart in the Regular Navy. They represent 100% of the Navy's medium and heavy intra-theater airlift, and operate year-round around the world, providing the critical link between deployed seagoing units and air mobility command logistics hubs. VR-1 provides dedicated airlift support to the Office of the Secretary of the Navy, Chief of Naval Operations and Commandant of the Marine Corps.
The Headquarters of the Fleet Logistics Support Wing is based at Naval Air Station Joint Reserve Base Fort Worth, TX, but the squadrons of the wing are based across the country from the east coast to Hawaii. In addition to the VR squadrons, the Fleet Logistics Support Wing also operates two "Executive Transport Detachments" based in Hawaii and Sigonella, Italy.
Note: The parenthetical (2nd), (3rd), or (second use), (third use), etc., appended to some designations in the table below are not part of the squadron designation system. They are added to indicate that the designation was used more than once during the history of U.S. Naval Aviation and which use of the designation is indicated. Absence indicates that the designation was used only once.
Fleet Logistics Support (VRC)
The VRC designation was established in 1960 to designate "Fleet Tactical Support Squadron". In 1976 the designation was changed to "Fleet Logistics Support Squadron."
There are two Fleet Logistic Support squadrons equipped with the C-2A Greyhound Carrier Onboard Delivery (COD) aircraft – one on each coast. VRC-30 is based at Naval Air Station North Island, VRC-40 is based at Naval Station Norfolk. These squadrons send two-plane detachments with each deploying Carrier Air Wing. The C-2A Greyhound, more commonly referred to as a "COD" (short for Carrier onboard delivery), is used to deliver high priority parts, supplies, people, and mail to/from the carrier and shore sites near the carrier operating area.
The E-2 Hawkeye and C-2 Greyhound are built on the same airframe and have many similar characteristics. For this reason, both aircraft are trained for in the same Fleet Replacement Squadron, VAW-120 (see VAW section).
Fleet Logistics Support Squadron 30 (VRC-30)
Fleet Logistics Support Squadron 40 (VRC-40)
Fleet Logistics Multi-Mission (VRM)
"The CMV-22B Osprey long-range tiltrotor aircraft is the US Navy’s future variant of MV-22B Osprey assault support aircraft developed by Bell Boeing for the US Marine Corps. The medium-lift variant will operate as a carrier on-board delivery (COD) aircraft to meet the logistics support requirements of the Joint Force Maritime Component Commander (JFMCC) during time-critical scenarios. It will replace Northrop Grumman-built C-2A Greyhound cargo aircraft that has been in service with the US Navy since the 1960s. The CMV-22B will be used by the US Navy for transportation of special warfare teams, mail and cargo from shore to its aircraft carriers, as well as for shore or sea-based combat search-and-rescue (CSAR) missions".
The development of the VRM designation and adoption of the CMV-22B demonstrates the Navy's intent to utilize the platform as a means of replacing the carrier-based C-2A Greyhound. This shift in direction has coincided with the formation of the Navy's first VRM squadron, the "Titans" of VRM-30 (The name of which was revived from the "Titans" of HSL-94).
Training (VT)
The VT designation was one of the original designations. It was established in 1921 to designate "Torpedo Plane Squadron". From 1922 to 1930 it designated "Torpedo & Bombing Squadron" and from 1930 to 1946 "Torpedo Squadron". In 1946 all remaining Torpedo Squadrons and Bombing Squadrons (VB) were redesignated "Attack Squadrons" (VA) and the VT designation was retired.
From 1927 to 1947 training squadrons were designated "VN". From 1947 to 1960 training units were not designated as squadrons, they were "units" or "groups" called Basic Training Groups (BTG), Advanced Training Units (ATU), Jet Transition Training Units (JTTU) or Multi Engine Training Groups (METG). On 1 May 1960 the VT designation was resurrected and existing flying training units were designated "Training Squadrons (VT)". There is no relationship between training squadrons designated VT in 1960 and the Torpedo or Torpedo and Bombing squadrons of the 1920s to 1940s.
There are two types of fixed wing training squadrons: Primary training squadrons train students in the first stage of flight training leading to selection to one of three advanced training pipelines for Aviators (Rotary Wing, Strike or Multi-Engine) or two advanced training pipelines for Flight Officers (Multi Crew or Strike). The advanced training squadrons conduct the final stage of flight training leading to "winging" of the new Naval Aviators and Naval Flight Officers in the Navy, Marine Corps, and Coast Guard. Training squadrons are organized differently than the Navy's operational squadrons as training squadrons do not own their own aircraft. All training aircraft are assigned to and maintained by the Training Air Wing to which the squadrons are assigned. The training squadrons are composed only of Instructors and Students, with all maintenance and support functions carried out by the Training Air Wing. Training aircraft are painted orange and white.
Air Test and Evaluation (VX), Scientific Development (VXS)
The VX designation was first used from 1927 to 1943 to designate "Experimental Squadron". It was again used beginning in 1946 when four "Experimental and Development" squadrons (VX-1 (still exists today), 2, 3 and 4) were established to develop and evaluate new equipment and methods. From 1946 to 1968 the designation was variously "Experimental and Development" squadron, "Operational Development" squadron, "Air Operational Development" squadron and "Air Development" squadron. In 1969 the designation changed to "Air Test and Evaluation" and it remains as such today.
Test and Evaluation squadrons test everything from basic aircraft flying qualities to advanced aerodynamics to weapons systems effectiveness. VX-20, VX-23, VX-30, VX-31 (as well as HX-21 (rotary wing squadron) and UX-24 (UAS squadron)) are developmental test and evaluation squadrons which conduct or support developmental test and evaluation of aircraft and weapons as part of the Naval Air Systems Command (NAVAIRSYSCOM) while VX-1 and VX-9 are operational test and evaluation squadrons which conduct operational test and evaluation of aircraft and weapons as part of the Operational Test and Evaluation Force (OPTEVFOR).
Other Fixed Wing Aircraft Units
Other than the Naval Flight Demonstration Squadron (NFDS) "Blue Angels", the organizations in the table below are not technically "squadrons", however they either have custody of and routinely fly Navy aircraft or they routinely fly aircraft on loan from fleet squadrons for advanced training of those fleet squadrons.
The U.S. Naval Test Pilot School operates various fixed and rotary wing aircraft to train and graduate test pilots and test engineers.
The Navy Fighter Weapons School, Carrier Airborne Early Warning Weapons School and the Airborne Electronic Attack Weapons School train selected U. S. Navy Naval Aviators and Naval Flight Officers (NFO) in instructional techniques and in advanced tactics in their respective aircraft, qualifying them for assignment to their respective wing weapons schools (Strike Fighter Weapons School Lant and Pac, Electronic Attack Weapons School and Airborne Command Control and Logistics School) where they provide advanced training for each wing's squadrons utilizing squadron aircraft.
Rotary Wing Squadrons
US Navy rotary wing squadron designations start with the letter H. The first use of the letter H to designate a helicopter squadron was in 1948 with the establishment of Helicopter Utility Squadrons (HU) ONE and TWO. Prior the creation of the HU designation, the two basic types of Navy squadrons were "heavier than air" squadrons designated with V as the first letter, and "lighter than air" squadrons designated with Z as the first letter. By 1961 the Navy had disestablished its last lighter than air squadrons leaving only the V and H designations. Since that time V has in practicality become the designation for "fixed wing squadron" and H for "rotary wing squadron." The Navy today uses helicopters primarily in the antisubmarine warfare, antisurface warfare, mine countermeasures, combat search and rescue, special operations, overwater search and rescue, and vertical replenishment roles.
Helicopter Mine Countermeasures (HM)
The HM designation was created in 1971 to designate "Helicopter Mine Countermeasures Squadron". HM Squadrons employ 28 total MH-53E Sea Dragon helicopters. The primary mission of the Sea Dragon is Airborne Mine Countermeasures (AMCM). The MH-53 can operate from aircraft carriers, large amphibious ships and the new expeditionary sea base and is capable of towing a variety of mine hunting/sweeping countermeasures systems.
The MH-53E Sea Dragon is also a capable heavy-lift asset, with three powerful turboshaft engines and a maximum take-off weight of . This gives the Sea Dragon the capability to carry an impressive amount of cargo, personnel or equipment over long distances. The Sea Dragon remains in service as the Navy's only heavy-lift helicopter and only proven mine countermeasure platform. While programmed to replace the USMC's CH-53E and not the Navy's MH-53E, the new Sikorsky CH-53K King Stallion, intended to start flying its evaluations in 2015, has an increased MTOW figure of some 84,700 lb (38,400 kg), some 14,950 lb (6,781 kg) heavier than the Sea Dragon.
The Navy's recently completed "Helicopter Master Plan" was a plan to reduce the number of type/model/series from eight down to two (MH-60R and MH-60S). It recognized that the replacement of the MH-53 in the mine countermeasures role was dependent on technology which has not yet matured. As a result, the MH-53E continues in service as the only helicopter capable now and in the near future of effectively conducting airborne mine countermeasures.
Note: The parenthetical (second use) and (2nd) in the table below are not a part of the squadron designation system. They are added to indicate that the designation was used more than once during the history of U. S. Naval Aviation and which use of the designation is indicated.
Helicopter Sea Combat (HSC)
The Helicopter Sea Combat (HSC) Designation was created in 2005 after the Helicopter Combat Support (HC) squadrons equipped with the H-46 Sea Knight had completed their transitions to the new multi-mission MH-60S Seahawk, and in anticipation of the upcoming transition of the Helicopter Antisubmarine (HS) squadrons from the SH-60F and HH-60H Seahawks to the new MH-60S which began in 2007. The ASW capabilities resident in the HS squadrons were lost in the transition but the new HSC squadrons combine the at sea logistics capability of the former Helicopter Combat Support (HC) squadrons with greatly upgraded Combat Search and Rescue, Naval Special Warfare Support and Anti-Surface Warfare capabilities of the former Helicopter Anti-submarine squadrons (HS).
The HSC squadrons which were formerly HS squadrons are carrier based and deploy as part of a Carrier Air Wing, while the HSC squadrons which were formerly HC squadrons or were newly established are land based "expeditionary" squadrons which supply detachments for deployment aboard ships other than aircraft carriers or for land based deployments as required. The squadrons are home-ported at NS Norfolk, NAS North Island and Anderson AFB, Guam with one squadron forward deployed to NAF Atsugi, Japan. Expeditionary HSC squadrons are capable of deploying mixed detachments of MH-60S and MQ-8B aircraft.
Note: The parenthetical (2nd) used in the lineage column of table below is not a part of the squadron designation system. It is added to indicate that the designation was used more than once during the history of U. S. Naval Aviation and which use of the designation is indicated.
Helicopter Maritime Strike (HSM)
The HSM designation was created in 2006 when the Fleet Replacement Squadron for the MH-60R Seahawk was redesignated from HSL. The new designation was created to reflect the MH-60Rs multi-mission capabilities which combined the area search capabilities of the SH-60B flown by the Helicopter Anti-Submarine Squadron Light (HSL) squadrons with the dipping sonar of the SH-60F flown by the carrier based Helicopter Anti-Submarine (HS) squadrons. The first operational fleet squadron to receive the MH-60 Romeo was HSM-71 in fiscal year 2008. With the transition of the HS squadrons to HSC squadrons without any ASW capability and the disestablishment of the last Air Antisubmarine (VS) squadrons, all ship based airborne ASW capabilities now reside in the new HSM squadrons.
From 2009 to 2015 all Helicopter Anti-Submarine Squadron Light (HSL) squadrons transitioned to the MH-60R and were redesignated Helicopter Maritime Strike (HSM) squadrons. Additionally, new HSM squadrons were established in order to provide an HSM squadron to each Carrier Air Wing and to provide "Expeditionary" squadrons to supply detachments of MH-60Rs to ships other than aircraft carriers. Expeditionary HSM squadrons are capable of deploying mixed detachments of MH-60R and MQ-8B aircraft.
HSM squadrons are home-ported at NAS North Island, NAS Jacksonville, NS Mayport and MCAS Kaneohe Bay with two squadrons forward deployed to NAF Atsugi Japan
Helicopter Training (HT)
The HT designation first appeared in May 1960 to designate Helicopter Training Squadron at the same time that the VT designation was resurrected to designate Training Squadron. In the early years of helicopter operations in the Navy, helicopter pilots were qualified fixed wing pilots who received transition training once they reported to a helicopter squadron. In 1950 a dedicated helicopter training unit was established and in 1960 that unit became the first HT squadron. As the demand for helicopter pilots increased over the decades, additional HT squadrons were established and today approximately 60% of the Student Naval Aviators from all services (Navy, Marine Corps and Coast Guard) are winged as helicopter pilots.
The Naval Air Training Command's Helicopter Training Squadrons provide advanced helicopter flight instruction to all Navy, US Marine Corps, and United States Coast Guard helicopter flight students as well as to international students from several allied nations. Student Naval Aviators are selected for helicopter training after completion of primary flight training in the T-6B in one of the VT squadrons. Students who successfully complete the program earn the right to wear the coveted "Wings of Gold." and proceed on to their selected aircraft's Fleet Replacement Squadron. Training squadrons are organized differently than the Navy's operational squadrons as training squadrons do not own their own aircraft. All training aircraft are assigned to and maintained by the Training Air Wing to which the squadrons are assigned. The training squadrons are composed only of Instructors and Students, with all maintenance and support functions carried out by the Training Air Wing.
Air Test and Evaluation (HX)
Test and Evaluation squadrons test everything from basic aircraft flying qualities to advanced aerodynamics to weapons systems effectiveness. HX-21 conducts developmental test and evaluation of rotary wing and tilt rotor aircraft and weapons as part of the Naval Air Systems Command (NAVAIRSYSCOM).
Other Rotary Wing Aircraft Units
The organizations in the table below are not technically "squadrons", however they either have custody of and routinely fly Navy aircraft or they routinely fly aircraft on loan from fleet squadrons for advanced training of those fleet squadrons. The Navy Rotary Wing Weapons School trains selected U. S. Navy Naval Aviators in instructional techniques and in advanced tactics for their respective aircraft, qualifying them for assignment to their respective wing weapons schools (Helicopter Sea Combat Weapons School Lant and Pac and Helicopter Maritime Strike Weapons School Lant and Pac) where they provide advanced training for each wing's squadrons utilizing squadron aircraft.
Unmanned Aerial Systems (UAS) Squadrons
The U.S. Navy operates a number of Unmanned Aerial Systems (UAS) utilizing different organizational constructs. The operational MQ-4 Triton is organized into "Unmanned Patrol Squadrons" (VUP) which operate alongside manned "Patrol Squadrons" (VP) utilizing the same administrative and operational command structures for both VP and VUP squadrons (VUP squadrons are listed in the "Fixed Wing Squadrons" section above). MQ-8 Fire Scouts are operated by HSM and HSC squadrons along with the squadrons' MH-60R (HSM) and MH-60S (HSC) aircraft. In April 2018 a new squadron type designation was created apart from the existing "V" for fixed wing squadron and "H" for rotary wing squadron when Air Test and Evaluation Squadron Twenty Four (UX-24) was programmed for establishment to develop unmanned aerial systems (UAS) for the U.S. Navy and Marine Corps. This action created a third squadron type designation of "U".
Air Test and Evaluation (UX)
Test and Evaluation squadrons test everything from basic aircraft flying qualities to advanced aerodynamics to weapons systems effectiveness. UX-24 conducts developmental test and evaluation of fixed wing and rotary wing unmanned aerial systems (UAS) as part of the Naval Air Systems Command (NAVAIRSYSCOM).
See also
List of United States Navy aircraft wings
Naval aviation
List of inactive United States Navy aircraft squadrons
Modern US Navy carrier air operations
List of United States Navy aircraft designations (pre-1962) / List of US Naval aircraft
United States Naval Aviator
Naval Flight Officer
United States Marine Corps Aviation
NATOPS
Notes
References
Aircraft squadrons list
Squadrons
Navy aircraft squadrons
Lists of flying squadrons
|
24772738
|
https://en.wikipedia.org/wiki/Harrison%20Mixbus
|
Harrison Mixbus
|
Harrison Mixbus is a digital audio workstation (DAW) available for Microsoft Windows, Mac OS X and Linux operating systems and version 1 was released in 2009.
Mixbus provides a modern DAW model incorporating a "traditional" analog mixing workflow. It includes built in proprietary analog modeled processing, based on Harrison's 32-series and MR-series analog music consoles.
Mixbus is based on Ardour, the open source DAW, but is sold and marketed commercially by Harrison Audio Consoles.
Features of Mixbus
Mixbus provides the features of Ardour, with additional functionality from proprietary DSP, replicating the workflow, signal path and sound of a Harrison console.
Each channel strip in Mixbus features analog modeled 3 band EQ (including a high pass filter), compression (with 3 compressor types), panning, and summing.
It includes 8 stereo mixbuses featuring tone controls, tape saturation, compression (including a sidechain compressor).
The master bus is similar to the mixbuses but has the additions of a limiter, a K14 meter for loudness monitoring and a stereo correlation meter.
Mixbus started out as an audio only workstation. In earlier versions, it also depended on the JACK audio server as its backend. Since version 3, Mixbus supports both audio and MIDI tracks and it no longer depends on JACK, although JACK can still be used as one of its audio backends.
See also
List of MIDI editors and sequencers
References
Audio editing software for Linux
Linux
Digital audio editors for Linux
Digital audio recording
Digital audio workstation software
Linux software
MacOS audio editors
|
10091731
|
https://en.wikipedia.org/wiki/Environment%20Modules%20%28software%29
|
Environment Modules (software)
|
The Environment Modules system is a tool to help users manage their Unix or Linux shell environment, by allowing groups of related environment-variable settings to be made or removed dynamically.
Modules has been around since the early 1990s and is used at some of the largest computer centers to deploy multiple versions of different software tools to users. The National Energy Research Scientific Computing Center (NERSC) reports that they use Environment Modules to manage nearly all software. Environment Modules is specified as a Baseline Configuration requirement of the DoD High Performance Computing Modernization Program (HPCMP) Project Baseline Configuration team for participating DoD Supercomputing Resource Centers (DSRCs).
modulefiles
The modules system is based on modulefiles, which specify groups of environment settings that need to be made together. Modulefiles can be installed in a central location for general use, or in a user directory for personal use. Environment Modules modulefiles are written in the Tcl (Tool Command Language) and are interpreted by the modulecmd program via the module user interface.
The key advantage of Environment Modules is that it is shell independent and supports all major shells such as bash, ksh, zsh, sh, tcsh, and csh. The second key advantage is that it allows to use multiple versions of the program or package from the same account by just loading proper module. Those two advantages were instrumental in making Environment Modules a part of most HPC cluster setups. It also inspired several alternative implementation such as lmod from University of Texas, which is written in Lua instead of TCL.
modulefiles are created on per application per version basis. They can be dynamically loaded, unloaded, or switched. Along with the capability of using multiple versions of the same software it also can be used to implement site policies regarding the access and use of applications.
default modulefiles directory
The default modules search path is in a hidden configuration file you can display with:
The directory used by some distributions (or any other directory) can be used after a build from source by modifying the file.
Add your own modules to the path
The module essentially performs these steps:
Use a version file within a hierarchical organization
The commands in this section require read/write/execute access to the /etc/modulefiles directory. The $HOME/privatemodules or another directory can be used instead along with "module use --append" or modification of the configuration file specifying the default modules search path.
The default modulefiles directory is empty initially. Copy the null module to the default modulefiles directory to have it shown by "module avail". The following uses the null and module-info modules to show use of a version file within a hierarchical organization and their effect on module avail and module show:
mkdir /etc/modulefiles/test
cp ${MODULESHOME}/modulefiles/null /etc/modulefiles/test/2.0
cp ${MODULESHOME}/modulefiles/module-info /etc/modulefiles/test/1.0
module avail
module show test
Set the first version as the default:
echo '#%Module' > /etc/modulefiles/test/.version
echo 'set ModulesVersion "1.0"' >> /etc/modulefiles/test/.version
module avail
module show test
module show test/2.0
Switch to the newer version as the default with:
rm /etc/modulefiles/test/.version
echo '#%Module' > /etc/modulefiles/test/.version
echo 'set ModulesVersion "2.0"' >> /etc/modulefiles/test/.version
module avail
module show test
After the above following a fresh install from source you would see:
$ module avail
-------------------- /usr/local/Modules/3.2.10/modulefiles ---------------------
dot module-git module-info modules null use.own
------------------------------- /etc/modulefiles -------------------------------
null test/1.0 test/2.0(default)
--------------------------- /home/user/privatemodules --------------------------
null
$ module show test
-------------------------------------------------------------------
/etc/modulefiles/test/2.0:
module-whatis does absolutely nothing
-------------------------------------------------------------------
$ module show test/1.0
-------------------------------------------------------------------
/etc/modulefiles/test/1.0:
module-whatis returns all various module-info values
+++ module-info +++++++++++++++++++++++++++++++
flags = 2
mode = display
name = test/1.0
specified = test/1.0
shell = bash
shelltype = sh
version = test/1.0
user = advanced
trace = 0
tracepat = -.*
symbols = *undef*
+++ info ++++++++++++++++++++++++++++++++++++++
hostname = localhost
level = 1
loaded null = 0
library = /usr/local/lib/tcl8.6
nameofexecutable =
sharedlibextension = .so
tclversion = 8.6
patchlevel = 8.6.1
+++++++++++++++++++++++++++++++++++++++++++++++
-------------------------------------------------------------------
Automatic modules initialization
Environment Modules on Scientific Linux, CentOS, and RHEL distributions in the environment-modules package include and scripts for the directory that make modules initialization part of the default shell initialization. One of the advantages of Environment Modules is a single modulefile that supports bash, ksh, zsh, sh as well as tcsh and csh shell users for environment setup and initialization. This makes managing complex environments a bit less complicated.
For a source build the automation for all users can be manually configured.
bash, ksh, zsh, sh automatic modules initialization
from the file in the 3.2.10 modules build directory.
trap "" 1 2 3
case "$0" in
-bash|bash|*/bash) . /usr/local/Modules/default/init/bash ;;
-ksh|ksh|*/ksh) . /usr/local/Modules/default/init/ksh ;;
-zsh|zsh|*/zsh) . /usr/local/Modules/default/init/zsh ;;
*) . /usr/local/Modules/default/init/sh ;; # default
esac
trap 1 2 3
Copy the file from the 3.2.10 modules build directory to the system initialization directory:
$ sudo cp etc/global/profile.modules /etc/profile.d/modules.sh
Add a version 3.2.10 symbolic link for the above generic addresses:
$ cd /usr/local/Modules
$ sudo ln -sT 3.2.10 default
tcsh, csh automatic modules initialization
A symbolic link to the file in the 3.2.10 modules build directory can enable automatic modules initialization for these users.
Installing on Linux
Installing Environment Modules on Linux using yum and rpm
On Scientific Linux, CentOS, and RHEL distributions Environment Modules is in the environment-modules package which can be installed with:
sudo yum install environment-modules
Once installed the package information can be viewed with:
rpm -qi environment-modules
rpm -ql environment-modules
Installing Environment Modules on Linux using apt and dpkg
On Ubuntu or systems using apt-get, Environment Modules can be installed with:
sudo apt-get install environment-modules
Once installed the package information can be viewed with:
dpkg -L environment-modules
Installing Environment Modules on Linux from source
Although installing from a Linux distributions repository using that distributions update manager is the easiest the software can be installed from source. Resolve dependencies is the most difficult task for an installation from source. The typical configure, make, install cycle can become painfully slow as each configure improvement reveals another dependency not available in your default environment. This section includes the steps to install the Environment Modules package on source including compiling the Tcl (Tool Command Language) from source as a dependency.
Installing Environment Modules
8.6.1 version of Tcl (Tool Command Language) built from /usr/local/src
Although the PCLinuxOS 64-bit repositories include Tcl (Tool Command Language) they do not include a development package with the configuration files required to build Environment Modules on Linux from source. Building Tcl from source will make the required files available.
Tcl Source: http://sourceforge.net/projects/tcl/files/Tcl/
Extract source after downloading
Configure, make, install
3.2.10 version of modules built from /usr/local/src
Extract source after downloading
Configure, make, install
See also
Tcl#As the Tool Command Language
Xsede Software Environments. The Extreme Science and Engineering Discovery Environment ― National Science Foundation
NICS Modules Description ― The National Institute for Computational Sciences at Oak Ridge National Laboratory ― Department of Energy
Lmod ― Lua-based module system
Spack ― Package Manager for HPC Software developed at Lawrence Livermore National Laboratory
References
External links
http://modules.sourceforge.net/ - home page for the Environment Modules project
John L. Furlani, Modules: Providing a Flexible User Environment Proceedings of the Fifth Large Installation Systems Administration Conference (LISA V), pp. 141–152, San Diego, CA, September 30 - October 3, 1991.
http://lmod.sourceforge.net - alternative implementation using LUA instead of Tcl
http://www.lysator.liu.se/cmod/ - alternative implementation using C only
PennState Environment Modules User Guide
Drag your design environment kicking and screaming into the '90s with Modules! - SNUB Boston 2001 - Erich Whitney, Axiowave Networks, Mark Sprague, ATI Research
Unix software
|
1006090
|
https://en.wikipedia.org/wiki/KW-26
|
KW-26
|
The TSEC/KW-26, code named ROMULUS, (in 1966 the machine based encryption system was not code-named "Romulus," rather the code-name was "Orion," at least in the US Army's variant) was an encryption system used by the U.S. Government and, later, by NATO countries. It was developed in the 1950s by the National Security Agency (NSA) to secure fixed teleprinter circuits that operated 24 hours a day. It used vacuum tubes and magnetic core logic, replacing older systems, like SIGABA and the British 5-UCO, that used rotors and electromechanical relays.
A KW-26 system (transmitter or receiver) contained over 800 cores and approximately 50 vacuum-tube driver circuits, occupying slightly more than one half of a standard 19-inch rack. Most of the space in the rack and most of the 1 kW input power were required for the special-purpose vacuum tube circuits needed to provide compatibility with multiple input and output circuit configurations. The military services' requirements for numerous modes and speeds significantly increased costs and delayed delivery. NSA says it is doubtful that more than three or four of the possible configurations were ever used.
The KW-26 used an NSA-developed encryption algorithm based on shift registers. The algorithm produced a continuous stream of bits that were xored with the five bit Baudot teleprinter code to produce ciphertext on the transmitting end and plaintext on the receiving end. In NSA terminology, this stream of bits is called the key. The information needed to initialize the algorithm, what most cryptographers today would call the key, NSA calls a cryptovariable. Typically each KW-26 was given a new cryptovariable once a day.
NSA designed a common fill device (CFD), for loading the cryptovariable. It used a Remington Rand (UNIVAC) format punched card (45 columns, round holes). The operator inserted the daily key card into the CFD and closed the door securely, locking the card in place. Decks of cards were created by NSA and sent by courier. The cards were strictly accounted for.
Because the KW-26 used a stream cipher, if the same key card was ever used twice, the encryption could be broken. To prevent re-use, the card was automatically cut in half upon reopening the CFD. As the units aged, the card reader contacts became less dependable, and operators resorted to various tricks, such as hitting the card reader cover with a screwdriver, to get them to work properly. Card readers were cleaned and the spring loading of the contacts checked as part of the routine maintenance of the device.
Because the KW-26 sent a continuous stream of bits, it offered traffic-flow security. Someone intercepting the ciphertext stream had no way to judge how many real messages were being sent, making traffic analysis impossible. One problem with the KW-26 was the need to keep the receiver and transmitter units synchronized. The crystal controlled clock in the KW-26 was capable of keeping both ends of the circuit in sync for many hours, even when physical contact was lost between the sending and receiving units. This capability made the KW-26 ideally suited for use on unreliable HF radio circuits. However, when the units did get out of sync, a new key card had to be inserted at each end. The benefit of traffic-flow security was lost each time new cards were inserted. In practice, operational protocol led to the cards being replaced more often than was desirable to maintain maximum security of the circuit. This was especially so on radio circuits, where operators often changed the cards many times each day in response to a loss of radio connectivity. In any case, it was necessary to change the cards at least once per day to prevent the cypher pattern from repeating.
Early KW-26 units protected the CRITICOMM network, used to protect communications circuits used to coordinate signals intelligence gathering. The initial production order for this application, awarded to Burroughs in 1957, was for 1500 units. Other services demanded KW-26's and some 14000 units were eventually built, beginning in the early 1960s, for the U.S. Navy, Army, Air Force, Defense Communications Agency, State Department and the CIA. It was provided to U.S. allies as well.
When the USS Pueblo was captured by North Korea in 1968, KW-26's were on board. In response, the NSA had modifications made to other units in the field, presumably changing the crypto algorithm in some way, perhaps by changing the shift register feedback taps. Starting in the mid-1980s, the KW-26 system was decommissioned by NSA, being replaced by the more advanced solid-state data encryptor, TSEC/KG-84.
See also
NSA encryption systems
External links
KW-26 history page
NSA brochure - Securing Record Communications: The TSEC/KW-26
National Security Agency encryption devices
|
20148343
|
https://en.wikipedia.org/wiki/Spotify
|
Spotify
|
Spotify (/ˈspɒtɪfaɪ/; Swedish: [ˈspɔ̂tːɪfaj]) is a Swedish audio streaming and media services provider founded on 23 April 2006 by Daniel Ek and Martin Lorentzon. It is one of the largest music streaming service providers with over 406 million monthly active users, including 180 million paying subscribers, as of December 2021. Spotify is listed (through a Luxembourg City-domiciled holding company, Spotify Technology S.A.) on the New York Stock Exchange in the form of American depositary receipts.
Spotify offers digital copyright restricted recorded music and podcasts, including more than 82 million songs, from record labels and media companies. As a freemium service, basic features are free with advertisements and limited control, while additional features, such as offline listening and commercial-free listening, are offered via paid subscriptions. Spotify is currently available in 180+ countries as of October 2021. Users can search for music based on artist, album, or genre, and can create, edit, and share playlists.
Spotify is available in most of Europe and the Americas, Oceania, with a total availability in 184 markets. The service is available on most modern devices including Windows, macOS, and Linux computers, iOS and Android smartphones and tablets, AI-enabled smart speakers such as Amazon Echo and Google Home, and digital media players like Roku.
Unlike physical or download sales, which pay artists a fixed price per song or album sold, Spotify pays royalties based on the number of artist streams as a proportion of total songs streamed. It distributes approximately 70% of its total revenue to rights holders (often record labels), who then pay artists based on individual agreements. According to Ben Sisario of The New York Times, approximately 13,000 out of seven million artists on Spotify generated $50,000 or more in payments in 2020.
History
Spotify was founded in 2006 in Stockholm, Sweden, by Daniel Ek, former CTO of Stardoll, and Martin Lorentzon, co-founder of Tradedoubler. According to Ek, the company's title was initially misheard from a name shouted by Lorentzon. Later they thought out an etymology of a combination of "spot" and "identify."
Early international launches
In February 2009, Spotify opened public registration for the free service tier in the United Kingdom. Registrations surged following the release of the mobile service, leading Spotify to halt registration for the free service in September, returning the UK to an invitation-only policy.
Spotify launched in the United States in July 2011 and offered a six-month, ad-supported trial period during which new users could listen to an unlimited amount of music for free. In January 2012, the free trial periods began to expire, and limited users to ten hours of streaming each month and five plays per song. In March, Spotify removed all limits on the free service tier indefinitely.
In April 2016, Ek and Lorentzon wrote an open letter to Swedish politicians demanding action in three areas that they claimed hindered the company's ability to recruit top talent as Spotify grows, including access to flexible housing, better education in the programming and development fields, and stock options. Ek and Lorentzon wrote that to continue competing in a global economy, politicians needed to respond with new policies, or else thousands of Spotify jobs would be moved from Sweden to the United States.
In February 2017, Spotify announced expansion of its United States operations in Lower Manhattan, New York City, at 4 World Trade Center, adding approximately 1,000 new jobs and retaining 832 existing positions. The company's US headquarters are located in New York City's Flatiron District.
On 14 November 2018, the company announced a total of 13 new markets in the MENA region, including the creation of a new Arabic hub and several playlists.
Other developments
Streaming records
In October 2015, "Thinking Out Loud" by Ed Sheeran became the first song to pass 500 million streams. A month later, Spotify announced that "Lean On" by Major Lazer and DJ Snake featuring MØ was its most-streamed song of all time with over 525 million streams worldwide. In April 2016, Rihanna overtook Justin Bieber to become the biggest artist on Spotify, with 31.3 million monthly active listeners. In May 2016, Rihanna was overtaken by Drake with 31.85 million total streams. In December 2016, Drake's just-under 36 million monthly listeners were overtaken by the Weeknd's 36.068 million. Later that month, Drake's song "One Dance" became the first song to hit one billion streams on Spotify. Upon its release in August 2017, the single "Look What You Made Me Do" by Taylor Swift earned over eight million streams within 24 hours, breaking the record for the most single-day streams for a track. On 19 June 2018, XXXTentacion's hit single "Sad!" broke Swift's single-day streaming record, amassing 10.4 million streams the day after he was fatally shot in Florida.
User growth
In March 2011, Spotify announced a customer base of 1 million paying subscribers across Europe, and by September 2011, the number of paying subscribers had doubled to two million. In August 2012, Time reported 15 million active users, four million being paying Spotify subscribers. User growth continued, reaching 20 million total active users, including five million paying customers globally and one million paying customers in the United States, in December 2012. By March 2013, the service had 24 million active users, six million being paying subscribers, which grew to 40 million users (including ten million paying) in May 2014, 60 million users (including 15 million paying) in December 2014, 75 million users (20 million paying) in June 2015, 30 million paying subscribers in March 2016, 40 million paying subscribers in September 2016, and 100 million total users in June 2016. In April 2020, Spotify reached 133 million premium users. In countries affected by the COVID-19 pandemic, Spotify registered a fall in users in late February, but it has seen a recovery.
Premium-exclusive albums
The Financial Times reported in March 2017 that, as part of its efforts to renegotiate new licensing deals with music labels, Spotify and major record labels had agreed that Spotify would restrict some newly released albums to its Premium tier, with Spotify receiving a reduction in royalty fees to do so. Select albums would be available only on the Premium tier for a period of time, before general release. The deal "may be months away from being finalized, but Spotify is said to have cleared this particular clause with major record labels". New reports in April confirmed that Spotify and Universal Music Group had reached an agreement to allow artists part of Universal to limit their new album releases to the Premium service tier for a maximum of two weeks. Spotify CEO Daniel Ek commented that "We know that not every album by every artist should be released the same way, and we've worked hard with UMG to develop a new, flexible release policy. Starting today, Universal artists can choose to release new albums on premium only for two weeks, offering subscribers an earlier chance to explore the complete creative work, while the singles are available across Spotify for all our listeners to enjoy". It was announced later in April that this type of agreement would be extended to indie artists signed to the Merlin Network agency.
Direct public offering
Spotify went public on the stock market in April 2018 using a direct public offering rather than an initial public offering. This approach is not intended to raise fresh capital, but to let investors get their returns. Morgan Stanley is the company's slated advisor on the matter.
After making its debut on the New York Stock Exchange on 3 April 2018, CNBC reported that Spotify opened at $165.90, more than 25% above its reference price of $132.
2020 hacking incident
On 3 July 2020, cybersecurity firm vpnMentor discovered a database containing 380 million individual records, including the logins and passwords of Spotify users. The database was thought to be evidence of an impending credential stuffing cyber attack targeting Spotify as it contained the credentials of up to 350,000 compromised user accounts. In response to the attack, Spotify issued a rolling reset of passwords for affected accounts in November 2020.
Acquisitions and exclusivity deals
In May 2013, Spotify acquired music discovery app Tunigo. In March 2014, they acquired The Echo Nest, a music intelligence company. In June 2015, Spotify announced they had acquired Seed Scientific, a data science consulting firm and analytics company. In a comment to TechCrunch, Spotify said that Seed Scientific's team would lead an Advanced Analytics unit within the company focused on developing data services. In January 2016, they acquired social and messaging startups Cord Project and Soundwave, followed in April 2016 by CrowdAlbum, a "startup that collects photos and videos of performances shared on social networks," and would "enhance the development of products that help artists understand, activate, and monetize their audiences". In November 2016, Spotify acquired Preact, a "cloud-based platform and service developed for companies that operate on subscription models which helps reduce churn and build up their subscriber numbers".
In March 2017, Spotify acquired Sonalytic, an audio detection startup, for an undisclosed amount of money. Spotify stated that Sonalytic would be used to improve the company's personalised playlists, better match songs with compositions, and improve the company's publishing data system. Spotify also acquired MightyTV later in March, an app connected to television streaming services, including Netflix and HBO Go, that recommends content to users. Spotify mainly uses MightyTV to improve its advertising efforts on the free tier of service. In April, they acquired Mediachain, a blockchain startup that had been developing a decentralized database system for managing attribution and other metadata for media. This was followed May with the acquisition of artificial intelligence startup Niland, which uses technology to improve personalisation and recommendation features for users. In November, Spotify acquired Soundtrap, an online music studio startup.
On 12 April 2018, Spotify acquired the music licensing platform Loudr. On 6 February 2019, Spotify acquired the podcast networks Gimlet Media and Anchor FM Inc., with the goal of establishing themselves as a leading figure in podcasting. On 26 March, Spotify announced they would acquire another podcast network, Parcast. On 12 September, Spotify acquired SoundBetter, a music production marketplace for people in the music industry to collaborate on projects, and distribute music tracks for licensing.
On 5 February 2020, Spotify announced its intent to acquire Bill Simmons' sports and pop culture blog and podcast network The Ringer for an undisclosed amount. On 19 May 2020, Spotify acquired exclusive rights to stream the popular podcast The Joe Rogan Experience beginning in September of that year, under an agreement valued at around US$100 million.
In November 2020, Spotify announced plans to acquire Megaphone from The Slate Group for . In March 2021, Spotify acquired app developer Betty Labs and their live social audio app, Locker Room, Locker Room was rebranded in June 2021 as Spotify Greenroom, and turned into a Clubhouse competitor. Also in June, Spotify acquired Podz, a podcast discovery startup. In November, Spotify acquired audiobook company Findaway, including its publishing imprint OrangeSky Audio.
Company partnerships
In January 2015, Sony announced PlayStation Music, a new music service with Spotify as its exclusive partner. PlayStation Music incorporates the Spotify service into Sony's PlayStation 3 and PlayStation 4 gaming consoles, and Sony Xperia mobile devices. The service launched on 30 March 2015. In March 2017, Spotify announced a partnership with the South by Southwest (SXSW) conference for 2017, presenting specific content in special playlists through an SXSW hub in Spotify's apps. The integration also enabled Spotify within the SXSW GO app to help users discover and explore artists performing at the conference. Two more partnerships were announced in March; one with WNYC Studios, and one with Waze. The WNYC Studios partnership brought various podcasts from WNYC to Spotify, including Note To Self, On the Media and Here's the Thing. Spotify also announced that the third season of WNYC Studios' 2 Dope Queens podcast would premiere with a two-week exclusivity period on the service on 21 March 2017. The Waze partnership allows Waze app users to view directions to destinations within the Spotify app and access their Spotify playlists through the Waze app.
In October, Microsoft announced that it would be ending its Groove Music streaming service by December, with all music from users transferring to Spotify as part of a new partnership. In December, Spotify and Tencent's music arm, Tencent Music Entertainment (TME), agreed to swap stakes and make an investment in each other's music businesses. As a result of this transaction, Spotify gained a 9% stake in TME with TME gaining a 7.5% stake in Spotify.
In February 2018, Spotify integrated with the gaming-oriented voice chat service Discord on desktop clients, allowing users to display their currently-playing song as a rich presence on their profile, and invite other users with Spotify Premium to group "listening parties". In April, Spotify announced a discounted entertainment bundle with video-on-demand provider Hulu, which included discounted rates for university students.
In May 2020, Spotify teamed up with ESPN and Netflix to curate podcasts around their Michael Jordan documentary The Last Dance, and in September, Spotify signed a deal with Chernin Entertainment to produce movies and TV shows.
Dispute with Apple
In July 2015, Spotify launched an email campaign to urge its App Store subscribers to cancel their subscriptions and start new ones through its website, bypassing the 30% transaction fee for in-app purchases required for iOS applications by technology company Apple Inc. A later update to the Spotify app on iOS was rejected by Apple, prompting Spotify's general counsel Horacio Gutierrez to write a letter to Apple's then-general counsel Bruce Sewell, stating: "This latest episode raises serious concerns under both U.S. and EU competition law. It continues a troubling pattern of behavior by Apple to exclude and diminish the competitiveness of Spotify on iOS and as a rival to Apple Music, particularly when seen against the backdrop of Apple's previous anticompetitive conduct aimed at Spotify … we cannot stand by as Apple uses the App Store approval process as a weapon to harm competitors."
Sewell responded to the letter: "We find it troubling that you are asking for exemptions to the rules we apply to all developers and are publicly resorting to rumors and half-truths about our service." He also elaborated that "Our guidelines apply equally to all app developers, whether they are game developers, e-book sellers, video-streaming services or digital music distributors; and regardless of whether or not they compete against Apple. We did not alter our behavior or our rules when we introduced our own music streaming service or when Spotify became a competitor". Furthermore, he stated that "There is nothing in Apple's conduct that 'amounts to a violation of applicable antitrust laws.' Far from it. ... I would be happy to facilitate an expeditious review and approval of your app as soon as you provide us with something that is compliant with the App Store's rules".
In the following months, Spotify joined several other companies in filing a letter with the European Union's antitrust body indirectly accusing Apple and Google of "abusing their 'privileged position' at the top of the market", by referring to "some" companies as having "transformed into 'gatekeepers' rather than 'gateways'". The complaint led to the European Union announcing that it would prepare an initiative by the end of 2017 for a possible law addressing unfair competition practices.
Spotify released the first version of its Apple Watch app in November 2018, allowing playback control of the iPhone via the watch. Users can also choose which devices to play music on via Bluetooth. In a further escalation of the dispute with Apple, on 13 March 2019, Spotify filed an antitrust complaint with the European Commission over unfair app store practices. Two days later, Apple responded, stating that the claim was misleading rhetoric and that Spotify wanted benefits of a free app without being a free app. Spotify responded with a statement calling Apple a monopolist and stated that they had only filed the complaint as Apple's actions hurt competition and consumers and clearly violated the law. It also said that Apple believed Spotify users on the app store were Apple's customers and not Spotify's.
Apple responded to Spotify's claims by counter-claiming that Spotify's market reach and user base would not have been possible without the Apple App Store platform. Additionally, Apple stated that they have attempted to work with Spotify to integrate the service better with Apple's products, such as Siri and Apple Watch. In 2019, under iOS 13, it became possible to play Spotify music using Siri commands.
Spotify was one of the first companies to support Epic Games in their lawsuit against Apple, which was filed after Epic also tried to bypass Apple's 30% fee for microtransactions in Fortnite. In September 2020, Spotify, Epic, and other companies founded The Coalition for App Fairness, which aims for better conditions for the inclusion of apps in app stores.
Dispute with Kakao Entertainment Corp.
On March 1, 2021 Spotify confirmed that its platform would no longer have access to music from artists represented by Kakao Entertainment. After talking it out and renewing the contracts between the two. Spotify later announced that they had reached an agreement with Kakao Entertainment, allowing their content to be available once again on the platform across the globe.
Business model
Spotify operates under a freemium business model (basic services are free, while additional features are offered via paid subscriptions). Spotify generates revenue by selling premium streaming subscriptions to users and advertising placements to third parties. Some of the premium options users may choose from include individual, duo, family, and student.
In December 2013, the company launched a new website, "Spotify for Artists, " explaining its business model and revenue data. Spotify gets its content from major record labels as well as independent artists and pays copyright holders royalties for streaming music. The company pays 70% of its total revenue to rights holders. Spotify for Artists states that the company does not have a fixed per-play rate; instead, it considers factors such as the user's home country and the individual artist's royalty rate. Rightsholders received an average per-play payout between $.000029 and $.0084.
Spotify offers an unlimited subscription package, close to the Open Music Model (OMM) estimated economic equilibrium for the recording industry. However, the incorporation of digital rights management (DRM) limitation diverges from the OMM and competitors such as iTunes Store and Amazon Music that have dropped DRM.
In 2013, Spotify revealed that it paid artists an average of $0.007 per stream. Music Week editor Tim Ingham commented that the figure was not as "alarming" as it appeared, writing: "Unlike buying a CD or download, streaming is not a one-off payment. Hundreds of millions of streams of tracks are happening every day, which quickly multiplies the potential revenues on offer – and is a constant long-term source of income for artists."
Accounts and subscriptions
As of November 2018, the two Spotify subscription types, all offering unlimited listening time, are:
In March 2014, Spotify introduced a new, discounted Premium subscription tier for students. Students in the United States enrolled in a university can pay half-price for a Premium subscription. In April 2017, the Students offer was expanded to 33 more countries.
Spotify introduced its Family subscription in October 2014, connecting up to five family members for a shared Premium subscription. Spotify Family was upgraded in May 2016, letting up to six people share a subscription and reducing the price. The Family subscription provides access to Spotify Kids.
In November 2018, Spotify announced it was opening up Spotify Connect to all of the users using its Free service, however, these changes still required products supporting Spotify Connect to support the latest software development kit.
In February 2021, Spotify announced their plans to introduce a HiFi subscription, to offer listening in high fidelity, lossless sound quality. The rollout for the HiFi tier is yet to be announced.
In August 2021, Spotify launched a test subscription tier called Spotify Plus. The subscription costs $0.99 and is supposed to be a combination of the free and premium tiers. Subscribers to this plan will still receive ads but will get the ability to listen to songs without shuffle mode and skip any number of tracks. The company reported that the tier conditions may change before its full launch.
Monetization
In 2008, just after launch, the company made a loss of 31.8 million Swedish kronor (US$4.4 million). In October 2010, Wired reported that Spotify was making more money for labels in Sweden than any other retailer "online or off". Years after growth and expansion, a November 2012 report suggested strong momentum for the company. In 2011, it reported a near US$60 million net loss from revenue of $244 million, while it was expected to generate a net loss of $40 million from revenue of $500 million in 2012. Another source of income was music purchases from within the app, however this service was removed in January 2013.
In May 2016, Spotify announced "Sponsored Playlists", a monetisation opportunity in which brands can specify the audiences they have in mind, with Spotify matching the marketer with suitable music in a playlist. That September, Spotify announced that it had paid a total of over $5 billion to the music industry. In June 2017, as part of renegotiated licenses with Universal Music Group and Merlin Network, Spotify's financial filings revealed its agreement to pay more than $2 billion in minimum payments over the next two years.
, Spotify was not yet a profitable company. Spotify's revenue for Q1 2020 amounted to €1.85 billion ($2 billion). A large part of this sum, €1.7 billion ($1.84 billion), came from Spotify Premium subscribers. Gross profit in the same quarter amounted to €472 million ($511 million), with an operating loss of €17 million ($18 million). Despite subscriber and podcasts growth, during Q2 of 2020, Spotify reported a loss of €356 million (€1.91 per share). The "deeper" loss came as a result of the company's tax debt to over one-third of its employees in Sweden.
Funding
In February 2010, Spotify received a small investment from Founders Fund, where board member Sean Parker was recruited to assist Spotify in "winning the labels over in the world's largest music market". In June 2011, Spotify secured $100 million of funding and planned to use this to support its US launch. The new round of funding valued the company at $1 billion. A Goldman Sachs-led round of funding closed in November 2012, raising around $100 million at a $3 billion valuation.
In April 2015, Spotify began another round of fundraising, with a report from The Wall Street Journal stating it was seeking $400 million, which would value the company at $8.4 billion. The financing was closed in June 2015, with Spotify raising $526 million, at a value of $8.53 billion. In January 2016, Spotify raised another $500 million through convertible bonds.
In March 2016, Spotify raised $1 billion in financing by debt plus a discount of 20% on shares once the initial public offering (IPO) of shares takes place. The company was, according to TechCrunch, planning to launch on the stock market in 2017, but in 2017 it was seen as planning on doing the IPO in 2018 in order to "build up a better balance sheet and work on shifting its business model to improve its margins".
Downloads
In March 2009, Spotify began offering music downloads in the United Kingdom, France, and Spain. Users could purchase tracks from Spotify, which partnered with 7digital to incorporate the feature. The ability to purchase and download music tracks via the app was removed on 4 January 2013.
Spotify for Artists
In November 2015, Spotify introduced a "Fan Insights" panel in limited beta form, letting artists and managers access data on monthly listeners, geographical data, demographic information, music preferences and more. In April 2017, the panel was upgraded to leave beta status, renamed as "Spotify for Artists", and opened to all artists and managers. Additional features include the ability to get "verified" status with a blue checkmark on an artist's profile, receiving artist support from Spotify, customising the profile page with photos and promoting a certain song as their "pick".
In September 2018, Spotify announced "Upload Beta," allowing artists to upload directly to the platform instead of going through a distributor or record label. The feature was rolled out to a small number of US-based artists by invitation only. Uploading was free and artists received 100% of the revenue from songs they uploaded; artists were able to control when their release went public. On 1 July 2019, Spotify deprecated the program and announced plans to stop accepting direct uploads by the end of that month and eventually remove all content uploaded in this manner.
Industry initiatives
In June 2017, Variety reported that Spotify would announce "Secret Genius," a new initiative aimed at highlighting songwriters and producers, and the effect those people have on the music industry and the artists' careers. The project, which would feature awards, "Songshops" songwriting workshops, curated playlists, and podcasts, is an effort to "shine a light on these people behind the scenes who play such a big role in some of the most important moments of our lives. When the general public hears a song, they automatically associate it with the artist who sings it, not the people behind the scenes who make it happen, so we thought the title Secret Genius was appropriate", Spotify'sformer Global Head of Creator Services Troy Carter told Variety the first awards ceremony would take place in late 2017, and was intended to honour "the top songwriters, producers and publishers in the industry as well as up-and-coming talent." Additionally, as part of "The Ambassador Program," 13 songwriters would each host a Songshop workshop, in which their peers would collaboratively attempt to create a hit song, with the first workshop taking place in Los Angeles in June 2017.
In October 2017, Spotify launched "Rise", a program aimed at promoting emerging artists. In February 2020, Spotify announced it would be featuring new songwriter pages and 'written by' playlists. This was aimed at giving fans a behind the scenes look at the process of some of their favorite songwriters. Initial pages added included Justin Trantor, Meghan Trainor, and Missy Elliott. Spotify thereafter announced it was planning to add more of these pages and playlists to highlight songwriters.
In January 2021, Spotify made a selection of audiobooks available on the platform as a test of developing a greater breadth of content for users. The addition of audiobooks to the service would create similar offerings to that of Amazon's Audible. In 2020, Spotify partnered with Wizarding World to release a series of recorded readings of Harry Potter and the Philosopher's Stone, by various stars of the franchise.
Stations by Spotify
On 31 January 2018, Spotify started testing a new Pandora-styled standalone app called Stations by Spotify for Australian Android users. It features 62 music channels, each devoted to a particular genre. Spotify itself has two channels named after its playlists that link directly to the users' profile: "Release Radar" and "Discover Weekly." The aim is to help users to listen to the music they want without information overload or spending time building their own playlists. At launch, the skipping feature was not featured to "reinforce the feel of radio," but it was quietly added later and with no limits. Songs can be "loved" but can't be "hated." If a song is "loved," a custom radio channel will be created based on it, and when there are at least 15 of these songs, a "My Favourites" channel is unlocked.
The standalone app has been made available to all iOS and Android users in the United States since 4 June 2019.
Platforms
Spotify has client software currently available for Windows, macOS, Android, iOS, iPadOS, PlayStation 4, PlayStation 5, Xbox One and Xbox Series X/S game consoles. Spotify also offers an official, although unsupported (developed as a "labour of love" by Spotify engineers; support is offered through the Spotify Community), version of Spotify for Linux clients. Spotify also offers a proprietary protocol known as "Spotify Connect", which lets users listen to music through a wide range of entertainment systems, including speakers, receivers, TVs, cars, and smartwatches. Spotify also has a web player (open.spotify.com). Unlike the apps, the web player does not have the ability to download music for offline listening. In June 2017, Spotify became available as an app through Windows Store.
Features
In Spotify's apps, music can be browsed or searched for via various parameters, such as artist, album, genre, playlist, or record label. Users can create, edit and share playlists, share tracks on social media, and make playlists with other users. Spotify provides access to over 70 million songs, 2.2 million podcasts and 4 billion playlists.
In November 2011, Spotify introduced a Spotify Apps service that made it possible for third-party developers to design applications that could be hosted within the Spotify computer software. The applications provided features such as synchronised lyrics, music reviews, and song recommendations. In June 2012, Soundrop became the first Spotify app to attract major funding, receiving $3 million from Spotify investor Northzone. However, after the June 2014 announcement of a Web API that allowed third-party developers to integrate Spotify content in their own web applications, the company discontinued its Spotify Apps platform in October, stating that its new development tools for the Spotify web player fulfilled many of the advantages of the former Spotify Apps service, but "would ensure the Spotify platform remained relevant and easy to develop on, as well as enabling you to build innovative and engaging music experiences".
In April 2012, Spotify introduced a "Spotify Play Button", an embeddable music player that can be added to blogs, websites, or social media profiles, that lets visitors listen to a specific song, playlist, or album without leaving the page. The following November, the company began rolling out a web player, with a similar design to its computer programs, but without the requirement of any installation.
In December 2012, Spotify introduced a "Follow" tab and a "Discover" tab, along with a "Collection" section. "Follow" lets users follow artists and friends to see what they are listening to, while "Discover" directs users to new releases as well as music, review, and concert recommendations based on listening history. Users can add tracks to a "Collection" section of the app, rather than adding them to a specific playlist. The features were announced by CEO Daniel Ek at a press conference, with Ek saying that a common user complaint about the service was that "Spotify is great when you know what music you want to listen to, but not when you don't".
In May 2015, Spotify announced a new "Home" start-page that could recommend music. The company also introduced "Spotify Running", a feature aimed at improving music while running with music matched to running tempo, and announced that podcasts and videos ("entertainment, news and clips") would be coming to Spotify, along with "Spotify Originals" content.
In December 2015, Spotify debuted Spotify Wrapped, a program that creates playlists based on each user's most listened-to songs from the year. Users then can view and save this playlist at the end of the year. While it continued to provide users with an end-of-the-year wrap up, the playlist feature was later removed.
In January 2016, Spotify and music annotation service Genius formed a partnership, bringing annotation information from Genius into infocards presented while songs are playing in Spotify. The functionality is limited to selected playlists and was only available on Spotify's iOS app at launch, being expanded to the Android app in April 2017. This feature was known as "Behind the Lyrics". As of November 2021, "Behind the Lyrics" has been replaced with auto-generated lyrics, as indicated on most songs.
In May 2017, Spotify introduced Spotify Codes for its mobile apps, a way for users to share specific artists, tracks, playlists or albums with other people. Users find the relevant content to share and press a "soundwave-style barcode" on the display. A camera icon in the apps' search fields lets other users point their device's camera at the code, which takes them to the same content.
In January 2019, Spotify introduced Car View for Android, allowing devices running Android to have a compact Now Playing screen when the device is connected to a car's Bluetooth. Also in January 2019, Spotify beta-tested its Canvas feature, where artists and/or labels can upload looping 3 to 8-second moving visuals to their tracks, replacing album covers in the "Now Playing" view; users have the option to turn off this feature. Canvas is only available for Spotify's iOS and Android mobile apps. Months later, Spotify tested its own version of stories (the sharing format popularized by social apps) known as "Storyline", and the focus is on allowing artists to share their own insights, inspiration, details about their creative process or other meanings behind the music.
In March 2021, Spotify announced an upcoming option for higher-resolution sound, Spotify Hi-Fi.
Playlists and discovery
In July 2015, Spotify launched Discover Weekly, a playlist generated weekly. Updated on Mondays, it provides users with music recommendations. In December 2015, Quartz reported that songs in Discover Weekly playlists had been streamed 1.7 billion times,.
In March 2016 Spotify launched six playlists branded as Fresh Finds, including the main playlist and Fire Emoji, Basement, Hiptronix, Six Strings, and Cyclone (hip-hop, electronic, pop, guitar-driven, and experimental music respectively). The playlists spotlight songs by lesser-known musicians and their songs.
In August 2016, Spotify launched Release Radar, a personalised playlist that allows users to stay up-to-date on new music released by the artists they listen to the most. It also helps users discover new music, by mixing in other artists' music. The playlist is updated every Friday, and is a maximum of two hours in length.
The RADAR program is Spotify's global artist program, exclusively designed to help emerging artists worldwide reach the next stage in their careers and strengthen their connection to listeners.
Spotify provides artists taking part in RADAR with resources and access to integrated marketing opportunities to help them boost their careers, in addition to expanded reach and exposure to 178 markets worldwide.
In September 2016, Spotify introduced Daily Mix, a series of (up to six) playlists that mixes the user's favourite tracks with new, recommended songs. New users can access Daily Mix after approximately two weeks of listening to music through Spotify. Daily Mixes were only available on the Android and iOS mobile apps at launch, but the feature was later expanded to Spotify's computer app in December 2016.
In 2017, Spotify introduced RapCaviar, a hip-hop playlist. Rap Caviar had 10.9 million followers by 2019, becoming one of Spotify's Top 5 playlists. RapCaviar was originally curated by Tuma Basa. It was relaunched by Carl Chery in 2019.
In July 2018, Spotify introduced a beta feature that gives artists, labels, and teams an easy way to submit unreleased music directly to Spotify's editorial team for playlist consideration.
In June 2019, Spotify launched a custom playlist titled "Your Daily Drive" that closely replicates the drive time format of many traditional radio stations. It combines short-form podcast news updates from The Wall Street Journal, NPR, and PRI with a mix of a user's favorite songs and artists interspersed with tracks the listener has yet to discover. "Your Daily Drive," which is found in a user's library under the "Made For You" section, updates throughout the day.
In May 2020, Spotify introduced the Group Session feature. This feature allows two or more Premium users in the same location to share control over the music that's being played. The Group Session feature was later expanded to allow any Premium user to join/participate in a Group Session, with a special link the host can send to participants.
In July 2021, Spotify launched the "What's New" feed, a section that collects all new releases and episodes from artists and podcasts that the user follows. The feature is represented by a bell icon on the app's main page and is available on iOS and Android.
In November 2021, Spotify launched the City and Local Pulse charts, aimed at representing the songs listened to in major cities around the world. The charts are available for 200 cities with the most listeners on Spotify.
Listening limitations
Spotify has experimented with different limitations to users' listening on the Free service tier.
In April 2011, Spotify announced via a blog post that they would drastically cut the amount of music that free members could access, effective 1 May 2011. The post stated that all free members would be limited to ten hours of music streaming per month, and in addition, individual tracks were limited to five plays. New users were exempt from these changes for six months. In March 2013, the five-play individual track limit was removed for users in the United Kingdom, and media reports stated that users in the United States, Australia, and New Zealand never had the limit in the first place.
In December 2013, CEO Daniel Ek announced that Android and iOS smartphone users with the free service tier could listen to music in Shuffle mode, a feature in which users can stream music by specific artists and playlists without being able to pick which songs to hear. Mobile listening previously was not allowed in Spotify Free accounts. Ek stated that "We're giving people the best free music experience in the history of the smartphone." This shuffle feature is not available on Android and iOS tablets, or computers.
In January 2014, Spotify removed all time limits for Free users on all platforms, including on computers, which previously had a 10-hour monthly listening limit after a 6-month grace period.
In April 2018, Spotify began to allow Free users to listen on-demand to whatever songs they want for an unlimited number of times, as long as the song is on one of the user's 15 personalized discovery playlists.
Before April 2020, all service users were limited to 10,000 songs in their library, after which they would receive an "Epic collection, friend" notification and would not be able to save more music to their library. Adding playlists at this point also arbitrarily removed older playlists from the users' library. Spotify later removed this limit.
Technical information
Spotify is proprietary and uses digital rights management (DRM) controls. Spotify's terms and conditions do not permit users to reverse-engineer the application.
Spotify allows users to add local audio files for music not in its catalog into the user's library through Spotify's desktop application, and then allows users to synchronize those music files to Spotify's mobile apps or other computers over the same Wi-Fi network as the primary computer by creating a Spotify playlist, and adding those local audio files to the playlist. Audio files must either be in the .mp3, .mp4 (.mp4 files that have video streams are not supported), or .m4p media formats. This feature is available only for Premium subscribers.
Spotify has a median playback latency of 265 ms (including local cache).
In April 2014, Spotify moved away from the peer-to-peer (P2P) system they had used to distribute music to users. Previously, a desktop user would listen to music from one of three sources: a cached file on the computer, one of Spotify's servers, or from other subscribers through the P2P system. P2P, a well-established Internet distribution system, served as an alternative that reduced Spotify's server resources and costs. However, Spotify ended the P2P setup in 2014, with Spotify's Alison Bonny telling TorrentFreak: "We're gradually phasing out the use of our desktop P2P technology which has helped our users enjoy their music both speedily and seamlessly. We're now at a stage where we can power music delivery through our growing number of servers and ensure our users continue to receive a best-in-class service."
Car Thing
Spotify first announced a voice-activated music-streaming gadget for cars in May 2019. Named the Car Thing, it represents the music-streaming service's first entry into hardware devices. In early 2020, as part of filings to the Federal Communications Commission (FCC), submitted images of the device that make it seem much more like a miniature infotainment screen. In April 2021, Spotify rolled out its own voice assistant with the hands-free wake word: "Hey Spotify". Using this, users can perform various actions such as pulling playlists, launching radio stations, playing or pausing songs. This voice-based virtual assistant may be intended more towards Spotify's own hardware such as its "Car Thing".
Geographic availability
Spotify is available in 184 countries. The company is incorporated in Luxembourg as Spotify Technology S.A, and is headquartered in Stockholm, Sweden, with offices in 17 different countries around the world.
Accolades
In September 2010, the World Economic Forum (WEF) announced the company as a Technology Pioneer for 2011.
Criticism
Spotify has attracted significant criticism since its 2006 launch. The primary point of criticism centres around what artists, music creators, and the media have described as "unsustainable" compensation. Unlike physical sales or legal downloads (both of which were the main medium of listening to music at the time), which pay artists a fixed amount per song or album sold, Spotify pays royalties based on their "market share": the number of streams for their songs as a proportion of total songs streamed on the service. Spotify distributes approximately 70% of its total revenue to rights-holders, who will then pay artists based on their individual agreements. Worldwide, 30,000 musicians have joined the organization UnionOfMusicians (UMAW). UMAW organized protests in 31 cities in March 2021 and its campaign #JusticeAtSpotify is demanding more transparency and a compensation of one cent per stream.
Spotify has been criticised by artists and producers including Thom Yorke and Taylor Swift, who have argued that Spotify does not fairly compensate musicians, and both withdrew their music from the service. Their catalogues returned to the service in 2017. While the streaming music industry in general faces the same critique about inadequate payments, Spotify, being the leading service, faces particular scrutiny due to its free service tier, allowing users to listen to music for free, though with advertisements between tracks. The free service tier has led to a variety of major album releases being delayed or withdrawn from the service. In response to the allegations about unfair compensation, Spotify claims that it is benefitting the industry by migrating users away from unauthorized copying and less monetised platforms to its free service tier, and then downgrades that service until they upgrade to paid accounts. A study has shown that record labels keep a high amount of the money earned from Spotify, and the CEO of Merlin Network, a representative body for over 10,000 independent labels, has also observed significant yearly growth rates in earnings from Spotify, while clarifying that Spotify pays labels, not artists. In 2017, as part of its efforts to renegotiate licence deals for an interest in going public, Spotify announced that artists would be able to make albums temporarily exclusive to paid subscribers if the albums are part of Universal Music Group or the Merlin Network.
In May 2018, Spotify attracted criticism for its "Hate Content & Hateful Conduct policy" that removed the music of R. Kelly and XXXTentacion from its editorial and algorithmic playlists because "When we look at promotion, we look at issues around hateful conduct, where you have an artist or another creator who has done something off-platform that is so particularly out of line with our values, egregious, in a way that it becomes something that we don't want to associate ourselves with." R. Kelly has faced accusations of sexual abuse, while XXXTentacion was on trial for domestic abuse in a case that did not reach a judgement before his death that June. This policy was revoked in June because the company deemed the original wording to be too "vague"; they stated that "Across all genres, our role is not to regulate artists. Therefore, we are moving away from implementing a policy around artist conduct". However, artists such as Gary Glitter and Lostprophets are still hidden from Spotify's radio stations.
According to some computer science and music experts, various music communities are often ignored or overlooked by music streaming services, such as Spotify. The most commonly perceived error is said to be caused by a lack of diverse scope within curation staff, including overlooking mainstay artists in large genres, potentially causing a categorical homogenization of musical styles; even impacting mainline artists like within hip hop with A Tribe Called Quest. This can potentially have a negative impact on heritage styles, amongst both popular and traditional genres of New Mexico music and folk music, and possibly hindering the growth of styles such as country rap and contemporary Christian music.
In 2016, Spotify was criticized for allegedly making certain artists' music harder to find than others as these artists would release their music to the rival streaming service Apple Music before releasing it to Spotify.
In March 2021, David Dayen argued in The American Prospect that musicians were in peril due to monopolies in streaming services like Spotify. Daniel Ek, co-founder and CEO of Spotify, discussed "what he called an artist-friendly streaming solution." He explained, "An extension of the internet radio craze of the early 2000s, Spotify would license content from record labels, and then support artists as people listened to their music." However, Dayen noted that such services draw revenue from advertisements, the promise of audience growth to investors, and data collection.
The Joe Rogan Experience
In 2020, Spotify received criticism from anti-misinformation groups when conspiracy theorist Alex Jones appeared on Joe Rogan's podcast, The Joe Rogan Experience. Spotify's employees raised concerns about Jones' appearance on the show. In 2021, Spotify removed 42 episodes of Rogan's podcast.
In January 2022, 270 scientists, physicians, professors, doctors, healthcare workers, veterinarians, a dentist, psychologists, physicians' assistants, medical students, an engineer and a podcast host wrote an open letter to Spotify expressing concern over "false and societally harmful assertions" on The Joe Rogan Experience and asked Spotify to "establish a clear and public policy to moderate misinformation on its platform". The 270 signatories objected to Rogan broadcasting COVID-19 misinformation, citing "a highly controversial" episode featuring guest Robert Malone (#1757). The episode has been criticized for "promoting baseless conspiracy theories", including "an unfounded theory that societal leaders have 'hypnotized' the public." The signatories assert: "Dr. Malone is one of two recent JRE guests who has compared pandemic policies to the Holocaust. These actions are not only objectionable and offensive, but also medically and culturally dangerous." The signatories also note that Malone was suspended from Twitter for spreading misinformation about COVID-19.
On 26 January 2022, Neil Young removed his music from Spotify after they refused to remove the podcast. Joni Mitchell subsequently removed her music in support of Young. Other artists and podcasters, such as Nils Lofgren, Brené Brown and Crosby, Stills, & Nash, also announced a boycott of Spotify. Prince Harry and Meghan, Duchess of Sussex, who signed a multi-year partnership with Spotify, said that since April 2021 they had been "expressing concerns" over COVID-19 misinformation on the platform.
Amid the controversy, as of 28 January 2022 Spotify's stock had fallen 12% week-on-week, a loss of $4 billion in market capitalization. By 30 January 2022, this number had grown to a loss of $6.7 billion in market value, a fall of 17% week-on-week, and a fall of 26% year-to-date. Spotify's stock fell by 13% after the company reported fourth-quarter earnings on February 2, 2022. Although Ek addressed the Rogan controversy during the earnings call, the loss in value was attributed to the company's guidance on Q1 user growth, which did not meet analyst expectations.
Spotify promised to add content advisories for anything containing discussions related to COVID-19 and posted additional rules. Rogan apologized for his role in the controversy, and defended his interviews with two controversial guests, Robert W. Malone and Peter A. McCullough, as "highly credentialed, very intelligent, very accomplished people, and they have an opinion that is different from the mainstream narrative". Rogan said he agreed with Spotify's plan to label episodes including COVID-19 discussions and would try to "have more experts with differing opinions, right after the controversial ones".
In February 2022, Spotify removed about 70 more episodes of The Joe Rogan Experience, reportedly at Rogan's own request. Musician India Arie shared a compilation of clips in which Rogan used the "n word" on the podcast, and a clip in which Rogan appears to liken being around black people with the film Planet of the Apes. Arie announced that she was also boycotting Spotify. Rogan posted an apology, saying it was "regretful and shameful", but said that the clips were "taken out of context". In a message to employees, Ek said: "While I strongly condemn what Joe has said and I agree with his decision to remove past episodes from our platform, I realize some will want more. And I want to make one point very clear — I do not believe that silencing Joe is the answer.”
See also
Comparison of music streaming services
List of podcast clients
Tech companies in the New York metropolitan area
List of most-streamed songs on Spotify
List of most-streamed artists on Spotify
List of most-followed artists on Spotify
References
Further reading
Maria Eriksson et al. (2019): Spotify Teardown: Inside the Black Box of Streaming Music, The MIT Press, .
External links
Companies listed on the New York Stock Exchange
Android (operating system) software
Windows Phone software
Windows software
Mass media companies established in 2008
Microsoft cloud services
IOS software
Jukebox-style media players
Online music database clients
Online music stores of Sweden
Software that uses Qt
Music streaming services
Symbian software
Swedish companies established in 2006
Android Auto software
Windows components
Universal Windows Platform apps
Microsoft websites
Windows media players
Xbox One software
Direct stock offerings
Companies based in Luxembourg City
Swedish brands
|
24102946
|
https://en.wikipedia.org/wiki/GLaDOS
|
GLaDOS
|
GLaDOS (Genetic Lifeform and Disk Operating System) is a fictional artificially superintelligent computer system from the video game series Portal. GLaDOS later appeared in The Lab and Lego Dimensions. The character was created by Erik Wolpaw and Kim Swift and voiced by Ellen McLain. GLaDOS is responsible for testing and maintenance in the Aperture Science Computer-Aided Enrichment Center in all titles. While GLaDOS initially appears in the first game to simply be a voice that guides the player, her words and actions become increasingly malicious as she makes her intentions clear. The second game, as well as the Valve-created comic Lab Rat, reveals that she was mistreated by the scientists and used a neurotoxin to kill the scientists in the laboratory before the events of Portal. She is apparently destroyed at the end of the first game but returns in the sequel, in which she is comically supplanted and temporarily stuck on a potato battery.
The inspiration for the character's creation extends from Wolpaw's use of a text-to-speech program while writing lines for the video game Psychonauts. Other game developers working on Psychonauts found the lines funnier as a result of the synthesized voice. GLaDOS was originally intended to be present solely in the first area of Portal; she was well received by other designers and her role was expanded as a result. Play testers were motivated to complete tests in the game due to her guidance. While the game was initially designed with other characters, they were later removed, leaving GLaDOS as the only character players encounter. The physical appearance of GLaDOS went through several designs, one of which featured a large disk below her. McLain imitated dialog read aloud by a speech synthesizer with her own voice, which was then processed to sound more robotic, and performed songs in character during the closing credits of both entries in the series. "Still Alive" became hugely successful, notably appearing in the Rock Band game series, and has been a popular song for YouTube users to cover.
GLaDOS received critical acclaim from critics and gamers alike, some of whom called her narcissistic, passive-aggressive, sinister, and witty. She is considered one of the greatest video game characters, particularly among those created in the 2000s. Universally praised for her contributions to the caliber of Portals narrative, GLaDOS received multiple awards for being the best new game character in 2007 from GameSpy, GamePro, and X-Play. A number of publications listed her as one of the all-time greatest video game villains, including IGN and Game Informer, both of which ranked her first. She has been the subject of significant critical analysis from both journalists and game developers, who have compared her to other villainous computer systems in fiction, including HAL 9000 from 2001: A Space Odyssey and SHODAN from System Shock.
Description
For much of Portal, GLaDOS serves solely as the narrator, guiding players through the test chambers. Her voice is robotic, but distinctly female. Over time, players learn that she is, in fact, leading the player-character Chell to her death. As Chell escapes her control, GLaDOS's announcements get increasingly personal and farcical. Her personality has been described as passive-aggressive, witty, narcissistic, and sinister. She has several system personality cores installed into her, partly to prevent her from killing anyone. At the climax of the game, Chell enters GLaDOS's chambers, where it is revealed that she's actually a complex artificial intelligence system composed of robotic parts hanging from a larger device. Once the player removes the first personality core, the morality core, GLaDOS's voice becomes less robotic and more sensual. Originally, GLaDOS was designed as an artificial intelligence and research assistant meant to aid Aperture Science in competing with the Black Mesa Research Facility on the creation of portal technology. Later proposed uses for GLaDOS included implementation as a fuel line ice inhibitor and disk operating system. GLaDOS is installed to serve as the Enrichment Center's central control computer, mounted in a large, sealed chamber alongside several control consoles and an incinerator, the latter being her eventual demise.
Wheatley, a personality core previously attached to GLaDOS at an indeterminate time, is introduced in Portal 2. He is revealed to be an "intelligence dampening sphere", designed to feed her a neverending stream of bad ideas and inhibit her intellectual and emotional development in order to maintain her compliance. Through Wheatley, it's understood by the player that GLaDOS was initially conditioned to perform tests through rewards in the form of euphoric sensations induced by their completion. Over time, however, as she became insensate to the effect, GLaDOS claims she became self-motivated, interested solely in "science". Upon being disconnected from the Aperture Science facility, GLaDOS treats Chell with more civility. The player then learns that GLaDOS's personality was inherited from that of Caroline, the personal assistant of Aperture Science CEO Cave Johnson, and is much warmer to Chell when under Caroline's influence.
Appearances
Portal
In Portal, GLaDOS is the only witness to the situation of the player character, Chell. The game begins with GLaDOS introducing Chell to the game's Enrichment Center and the physics of the portal gun. As Chell navigates through the Center, GLaDOS admits to having lied to Chell about her progress, as part of a supposed "test protocol". GLaDOS slowly becomes more sinister, and Chell's trust in GLaDOS is tested when the AI directs Chell into a testing area populated with live-fire turrets, a course designed for military androids. The AI claims that the regular test chamber is unavailable due to "mandatory scheduled maintenance". GLaDOS uses the lure of cake and grief counseling to encourage Chell to continue, but at the final testing area, as Chell prepares to receive the supposed cake, GLaDOS attempts to incinerate Chell in a fire pit. Once Chell escapes, GLaDOS attempts to reconcile with Chell, claiming the pit was a final test.
At the end of the game, after Chell moves through the bowels of the Enrichment Center, GLaDOS's chamber is reached, where the final encounter occurs. In this encounter Chell dislodges the various personality cores (each also voiced by McLain, with the exception of the final core, which is voiced in a guttural fashion by Mike Patton) and incinerates them. During the battle, it is revealed that before the events of Portal, GLaDOS released a neurotoxin into the Enrichment Center (revealed to occur on Take Your Daughter to Work Day in the sequel), which resulted in the surviving scientists installing a morality core to prevent further incidents. After the cores are incinerated, the room is sucked into a vortex leading to the surface and GLaDOS is destroyed.
Portal 2
In Portal 2, GLaDOS initially resumes her role as test monitor in a now-ruined facility after Chell and Wheatley inadvertently reactivate her. This time, she makes no attempt to hide her contempt and hatred for Chell; partly because Chell destroyed her, and partly because a backup system has forced her to relive her death over and over since her deactivation. Soon after she repairs the facility, Wheatley convinces Chell to perform a core transfer, putting him in charge of the facility in place of GLaDOS. At this point, he immediately becomes power-mad and puts GLaDOS into a potato battery before she tells him that he was originally 'designed to be a moron'. He then turns on Chell and slams the elevator they are in, sending both into the bowels of the facility. GLaDOS is kidnapped by a bird and later saved by Chell, who teams up with GLaDOS to escape from the facility. While they are escaping from the old testing facility, GLaDOS discovers that her personality originally came from an assistant to former Aperture CEO Cave Johnson named Caroline, who was later uploaded into the GLaDOS program (it is suggested that this might have been done against her will at Cave Johnson's urging). After surviving Wheatley's various attempts to murder them, the two manage to corrupt him enough to perform another core transfer (though the process is interrupted by Wheatley). After placing a portal on the moon, Chell and Wheatley get sucked out into space (still connected to the computer chassis), and GLaDOS regains control of the facility, severing Wheatley's connection (causing him to get sucked into deep space) but saving Chell. GLaDOS reveals she felt relief for her safety but realizes that Caroline lives in her through emotion and immediately deletes her, reverting GLaDOS to her old self. Nevertheless, she decides that it is in her best interest to let Chell go, as GLaDOS learned the easiest solution is usually the best one and felt that killing Chell was "too hard".
Other games
GLaDOS also appears in an expansion to tower defense game Defense Grid: The Awakening, entitled You Monster, where she tests the player's abilities in a Portal-themed set of levels.
In the crossover title Poker Night 2, GLaDOS appears as the dealer and is a part of an announcer pack for Valve's Dota 2.
The crossover-franchise game Lego Dimensions includes a significant amount of Portal content, including a Lego-constructed GLaDOS (voiced by McLain) as one of the main villains in the game's primary story. The heroes are forced through more Aperture tests (in which she accuses them of cheating through the usage of the keystones and their abilities) and eventually defeat GLaDOS by introducing her to HAL 9000 to distract her long enough to damage her. GLaDOS continues to appear in other areas through the main story, adding Portal-themed elements to other worlds and eventually aiding the heroes in defeating the primary antagonist, and on conclusion of the game, she sings a song during the credits, "You Wouldn't Know", again sung by McLain and written by Coulton. GLaDOS also acts as the primary antagonist in a bonus level bridging the events of Portal 2 with Lego Dimensions, wherein Chell and Wheatley (returned from space redeemed with anti-gravity abilities) defeat her by performing a core transfer using the Space Core.
GLaDOS leads the player in solving bridge-making puzzles within Aperture in Bridge Constructor Portal.
GLaDOS makes an appearance in Death Stranding, revealing themselves after completing the final companion cube crossover side quests.
The voice and likeness of GLaDOS makes an appearance in a Cyberpunk 2077 side quest: "Epistrophy: Coastview" as one of the split personalities that has taken over one of Delamain's cabs.
Development history
Before development of GLaDOS had begun, Erik Wolpaw was writing the script for the video game Psychonauts, where he went around the office, finding people to provide voices to the words until they could add the final voices to the game. Once he ran out of people, however, he began using a text-to-speech program. According to Wolpaw, people found the lines funnier than they were worth. He commented that "no amount of writing is funnier than this text-to-speech thing reading it." He became bitter about that, stating that he would leverage this and use it to his advantage.
Portal had been under development for about a year, at a state where there were only test chambers that the player moved between. Valve found from playtesting that while players had fun with the game's concept, they were left asking of where these puzzles were leading towards. The team worked to come up with some type of narrative, coming down to creating an antagonist that would guide the player in early part of the game but become the goal that the player would strive for by the end. The creation of GLaDOS to serve this purpose began with a discussion between the Valve team and Wolpaw on the narrative constraints they had to deal with. When they were designing the game, they found that they did not have enough time or staffing to use human characters, due to the amount of animation work and scene choreography involved.
A week later, to alleviate this problem, Wolpaw returned with sample dialogue made with a text-to-speech program, which was intended to be used as a series of messages relayed to the player in the relaxation vault, the first area of the game. The team liked the voice, describing it as "funny" and "sinister", so Wolpaw decided to add this voice to other test chambers, all the while trying to think of story elements. The developers noticed that play testers were more motivated by the voice because they became attached to it. As a result, the team decided to make GLaDOS the narrative voice of Portal. While designing GLaDOS, one of the rules that the writers had was that they would not make her seem like a computer, for example having her say, "Oh my nuts and bolts." While GLaDOS is physically a computer and speaks with a computerized voice, they intended her to speak to the player-character like a regular person.
GLaDOS's physical appearance went through several iterations when Valve had Jason Brashill help drive the visual creation of GLaDOS. Early designs used for her included a floating brain, a spider-like appearance, and an upside-down version of Sandro Botticelli's painting The Birth of Venus with the four personality cores around her body. Eventually, they settled on the design of the robotic figure hanging upside down. This was done to convey both a sense of raw mechanical power and femininity. A large disk with the four personality cores hanging from it was added to her design, when she was still just a sphere standing above it. However, the team found it to be too small, giving her a body and putting it below the disk. Another early design was when GLaDOS was only a cube, which was used for the removed laser battle mentioned below. The large chamber that the player-character encounters was the result of the team wanting to build a space that brought a great deal of attention to her.
GLaDOS was written with the intent of making her more understandable and empathetic to players, making her villainy more tragic. Kim Swift, team leader of Portal, described her growth in the game as her becoming more and more human. The two-hour total playtime for Portal allowed the writers enough time to let players get to know GLaDOS. Wolpaw commented that while GLaDOS did yell and fire rockets at the player, she fulfilled his desire for a villain who has not been "done to death". He described her as both supportive and funny, while also sad and scared. One of his intentions was for players to believe that they are "putting her through the wringer emotionally". The game was designed to have a clear beginning, middle, and end. Wolpaw stated that with each new part, GLaDOS's personality changed. She begins as a supportive, yet also increasingly sinister character, where she delivers exposition about the general Aperture mindset. However, once the player-character escapes, she begins to speak in first-person singular rather than first-person plural. She shows desperation due to her lack of control at this point, adding that more emotion begins to creep through her voice. After destroying the morality core, she becomes unhinged, featuring an almost human voice. This voice, described as sultry by Wolpaw, was originally to be used for turrets, but it did not work out. Because they liked it so much, they chose to use it for GLaDOS. Valve described GLaDOS's actions in Portal 2 as attempting to build a relationship with the player-character, and the only way to accomplish this is by testing her.
Voice design
In creating the voice for GLaDOS, voice actress Ellen McLain attempted to sound like a computer. This was accomplished by her emulating a computer-generated voice that the Valve team played for her and her adding emotion to lines when appropriate. While designing her voice, Swift commented that it was difficult to write some of the lines for GLaDOS, describing McLain as "super likable", and that they should write for that. She also performed the song "Still Alive", which features GLaDOS singing to the effect that she is still alive by the end of Portal. This song was written by Jonathan Coulton, who was approached by the team and asked if he would want to write a song for them. He later decided that it would be a good idea to do a song featuring one of the voices from the game that would tie up the story at the end. Swift stated that the team wanted the players to leave the game happy, leading to them implementing the song in the first place. Wolpaw and the other writers wrote down a list of things that would make people happy, which resulted in "Still Alive". In discussing the difficulties in singing the song as GLaDOS, McLain listed one of the difficulties as breathing, because computers do not need to breathe. As a result, she had to sing the phrases in one breath, while attempting to keep a clean, even tone. Swift commented in an interview that one of the focuses of developing the game was for players to hear GLaDOS and hear her song.
GLaDOS continues to be voiced by McLain in Portal 2, who worked with Valve every two weeks to record the majority of the dialogue for the game. The frequency of her voice sessions allowed Valve to experiment with GLaDOS's lines and how they came out within the final game. After finding that "Still Alive" was a large part of Portal success, Valve included more music in Portal 2, including further involvement from Coulton. Coulton wrote a new song for the game's ending credits, "Want You Gone", which is written from GLaDOS's viewpoint of wanting to rid herself of Chell. It is performed by McLain. The writers found they needed another character to play off of Portal 2 Cave Johnson during his recordings; instead of hiring a voice actor for a few lines, they economized by reusing McLain to play Caroline, Cave's assistant. This led naturally to providing a backstory for the creation of GLaDOS, who is revealed in-game to be Caroline who was put into GLaDOS. This later led the writers to develop a full story arc for GLaDOS where she would come to recall her past, learn from it to solve the dilemma and then subsequently delete it and reset herself. McLain wrote "GLaDOS' Song", her only composition, offering it to Valve for use in the game; it was not used, though she and Lowrie performed it for Vice.
Final battle
In designing the final 'encounter' with GLaDOS in Portal, one of the important aspects to it was giving the players a predisposition to the Weighted Companion Cube, an object that GLaDOS gives to the player-character and tells her to protect. This was accomplished by forcing the player to incinerate it, therein providing a tutorial for how to defeat the boss and a revenge angle. GLaDOS was originally designed to be a devious boss, citing one form where she would use a series of lasers, like those seen in James Bond films. However, it was determined that this twitch gameplay distracted players from GLaDOS, and was too different from the game's puzzle-solving gameplay. Additionally, it was difficult for players to detect when they were hit, so the developers switched the gameplay to feature rockets. This incarnation of the final boss was dubbed "Portal Kombat", which Swift describes as a "high intensity rocket battle". However, Wolpaw disliked it because no one was paying attention to what GLaDOS was saying. While it went over well with hardcore shooter fans, the people who liked the puzzle-focused gameplay were turned off by it. The third boss was a chase scene, with players pursuing GLaDOS down a corridor. Wolpaw sharply criticized the pacing, which caused the players to wander around until they found the corridor, at which point a series of pistons would spring out of the walls.
The developers came to the conclusion that complex battles would only serve to confuse players. One play tester helped them by pointing out the quality of the fire pit puzzle, a puzzle that has the player-character riding on a moving platform that is descending into flames, requiring players to find a way to survive. He stated that it was both dramatic and exciting, but also a difficult puzzle. Wolpaw stated that this made no sense, commenting that it was one of the easiest puzzles in the game. He added that the battle was a dramatic high-point, since it was being the first time GLaDOS directly tries to kill the player-character and the first time that players have to use the environment to their advantage. After learning about what fellow Valve developers had planned for the final boss battle in Half-Life 2: Episode Two, the Portal developers decided to implement a neurotoxin that would kill the player-character in six minutes. This made it easier on the writers, who only had to write six minutes of dialogue. As a result, they scaled the game back, intending to ensure that everyone was able to see the game to the very end.
In Portal 2
Erik Wolpaw and Jay Pinkerton were mainly responsible for the single player campaign's story, while Chet Faliszek focused on the lines for GLaDOS in the cooperative campaign. Portal 2 was originally not intended to feature GLaDOS or Chell, the player-character from Portal. However, the demand for all of these to be implemented into Portal 2 was great enough that they chose to do so. Originally, the character Cave Johnson was intended to be the antagonist instead and Portal 2 to be a prequel. Before implementing Chell, they considered introducing a new player-character who would at one point inadvertently reactivate GLaDOS. During play testing, Wolpaw found that there were two groups that were "at-odds": one group was excited to see GLaDOS return, while the other did not want to wake her up and questioned why players would want to do that. As such, the character Wheatley was introduced, who inadvertently wakes GLaDOS while trying to escape the facilities with Chell. Wheatley and GLaDOS served as a contrasts to each other; where GLaDOS has a more "computery-sounding" voice due to her intelligence, Wheatley "sounded perfectly human" due to his lack of it. Play testers were also bothered by the fact that the new protagonist was not recognized by GLaDOS when she awoke; as such, they changed the new character back into Chell. Wolpaw and the designers were not sure what to do with GLaDOS and were wary to do the same thing as the last game. They felt that she should "go someplace" and that since GLaDOS is "kind of likeable in the first game" and players "enjoy being with her", they would utilize Wheatley as an "other, external threat". In the early part of the game, GLaDOS introduces each chamber and congratulates the player on completing it; though they could have included intermediate dialog from GLaDOS while the player attempts to solve each chamber, they found this would be distracting to players and limited her presence in the game to only these points.
The developers considered having GLaDOS and Chell act as "buddy cops against a new threat", but felt that since Chell never talked, it would not work. He compared her transformation into a potato and having her power stripped away to the game Jenga: "You’re taking stuff off the bottom and seeing what happens." While she was in the potato form, the designers noticed a "very stark difference between this imperious, all-powerful GLaDOS talking to you, and this powerless GLaDOS talking to you on your gun". They found that play testers were not interested in her when she was powerless and insulting players and would question why they were "carting this person along". They decided to give her a personality shift and become Chell's "sidekick" on the basis that "she can’t just be needling you for a half hour". In order to keep players from feeling that they should want to abandon GLaDOS in her powerless form to prevent her from becoming powerful again, the designers made sure to give players reason to bring her with them. In considering the interaction between Chell and GLaDOS, Erik Johnson compared GLaDOS to "a jealous ex-girlfriend", noting "[Chell is] the only person she can have interaction with, but the problem is her only way of interacting with anyone is to test them". While they introduced new characters into the game, the focus of the story in Portal 2 remained the connection and interaction between Chell and GLaDOS, and focuses more on the fallout from Chell's destruction of GLaDOS from the first game.
The co-operative campaign contains a separate story between the two robotic characters and GLaDOS. The co-operative campaign includes additional dialog from GLaDOS; the original dialog Wolpaw wrote for GLaDOS was aimed to two women, Chell and a new character "Mel", with the assumption of "image issues", but this dialog remains in place even after the change of the co-op characters to robots. The dialog written for GLaDOS in the co-operative campaign is aimed to try to break the bond between the two robot characters. Valve considered initially to have separate lines for GLaDOS that would be given to each player individually, but found this to be a significant effort for minimal benefit. The writers also attempted adding GLaDOS lines that would make the players attempt to compete against each other, such as the awarding of meaningless points, but playtesters did not respond well to these lines.
The writers found they needed another character to play off of Cave during his recordings; instead of hiring a voice actor for a few lines, they economized by reusing McLain to play Caroline, Cave's assistant. This led naturally to providing a backstory for the creation of GLaDOS, who is revealed in-game to be based on Caroline's personality. This later led the writers to develop a full story arc for GLaDOS where she would come to recall her past, learn from it to solve the dilemma and then subsequently delete it and reset herself. The designers wanted to start GLaDOS's role in Portal 2 off with her being "incredibly upset at [Chell]". They felt however that this would "get old pretty quick" if they did not put her "into another space". They accomplished this through a combination of her anger with Wheatley and her conflict with her past life as Caroline. Through the course of the game's events, GLaDOS's personality shifts significantly; however, at the end, she resets her personality to her original personality, an action Wolpaw sums up as "explicitly reject[ing] it" and saying "You know what? Done." While they wanted to give players the sense that they had defeated GLaDOS, they felt that they should not have players fight her as a boss battle; as a result, they had her let Chell go due to the reasoning that Chell was too difficult for her to handle. Writer Jay Pinkerton stated that GLaDOS was an exemplification of a villain who can go from "genuinely tender" to "genuinely villainous" and that "she’s not just this moustache-twirling villain". He also stated that she has a "passive-aggressive nature" and will never "overtly attack, it’s always these subtle mind games". The designers also intended to make it vague whether or not GLaDOS was under the control of the machine that she was attached to. Wolpaw also called her "passive aggressive" as well as "mildly sarcastic" and compared her to The Sopranos character Livia Soprano.
Use in promotion
GLaDOS has been used several times for reveals in the Portal series. At E3 2008, GLaDOS's voice was utilized to reveal the Portal expansion Portal: Still Alive. She has also been used to show Portal 2 reveals; initially, a Blue screen of death image was used instead of a revelation of Portal 2, showing the typical text found in a blue screen of death, but with GLaDOS's name at the top. In the reveal of the PlayStation 3 version of Portal 2, GLaDOS's voice was used to introduce Gabe Newell, the co-founder of Valve at E3 2010, where he revealed Portal 2 for the PlayStation 3. Portal 2s release was preceded by a collection of video games in a collection called Potato Sack, which featured thirteen independently developed games. These games were all a part of an alternate reality, based on a cryptic narrative that suggested the awakening and relaunch of GLaDOS. Valve provided the developers access to their art assets to include Portal 2-themed content into them, and in some cases, McLain recorded new dialog specifically for these games. The alternate reality game ultimately led to "GLaDOS@Home", a distributed computing spoof, which prompted players to play the independently developed games to awaken GLaDOS ahead of schedule, effectively promoting the Steam release of Portal 2 about 10 hours earlier than the official time.
Cultural impact
GLaDOS's popularity has led to merchandise being produced by both Valve and fans; a T-shirt depicting GLaDOS, as well as other elements from Portal, was made available for purchase on Valve's store while a fan produced a voice pack for a navigation system which uses GLaDOS's voice. Another fan also modeled and 3d printed a lamp using GLaDOS as the base form, complete with an LED eye and movement control, other creators have also added voice control, a speaker system, and an output system used to turn on and off various items, such as a PC, VR headset, and Room lights. A cosmetics vendor called "Geek Chic Cosmetics" features several video game-themed makeups, including one based on GLaDOS.
The song "Still Alive" has garnered significant attention from fans and critics alike. It was released as a part of The Orange Box Official Soundtrack and appeared in other video games, including the Rock Band series and Left 4 Dead 2, the latter which was also released by Valve. The song has been performed in multiple venues by Jonathan Coulton which includes the Penny Arcade Expo in 2008, the Press Start -Symphony of Games- concert in 2009, and the Game Developers Conference in 2008. The song is popular for fans to perform covers of on YouTube.
Ellen McLain voices a computer AI in Guillermo del Toro's 2013 film Pacific Rim; her voice work is deliberately similar to GLaDOS, a Valve-approved nod to the character and Portal series. When announcing McLain's addition to the cast, del Toro stated that he is a "big fan of Valve" and highlighted Portal and Left 4 Dead as "instrumental family experiences" in his home. Del Toro contacted Newell directly to secure McLain's voice, with his daughter's influence on the call helping to finalize the deal.
McLain voiced GLaDOS for an episode of the IRrelevant Astronomy web series prepared by NASA employees working on the Spitzer Space Telescope.
McLain also voiced GLaDOS for Multiplay's Insomnia Gaming Festival 55, providing narration for the "World Famous Pub Quiz" alongside Kevan Brighting as the narrator of The Stanley Parable.
The game Death Stranding, paying homage to Valve Corporation, features a character GLaDOS, who only communicates via email. Death Stranding's GLaDOS provides side quests resulting in Valve-themed gear. Near the end of the game, GLaDOS confesses that it does not belong to the world of Death Stranding, and showed up there only to conduct experiments. Finally, GLaDOS returns to its own world.
McLain provides GLaDOS's voice as part of a side mission in Cyberpunk 2077 in which the player tracks down driverless taxis.
McLain reprised her role as GLaDOS for a GEICO commercial based on Portal, released in January 2022.
Reception and analysis
Paste Magazine's Jason Killingsworth listed GLaDOS as the sixth best new character of the decade; he wrote that she "may just be the most likable villain in video-game history" and that "we only killed her because we had to". An editor for GamesRadar also called her one of the best new characters of the decade. Guinness World Records Gamer's Edition also listed GLaDOS as second in their list of top 50 Villains.
Epic Games design director Cliff Bleszinski stated that he was motivated to complete test chambers in Portal. He also compared her to an ex-girlfriend who sent text messages that went from friendly, to aggressive, and finally to apologetic. GamesRadar's Justin Towell called her the third-most difficult game bad guy to kill due to Stockholm syndrome, a syndrome where hostages will bond with their captors. IGN editor Daemon Hatfield described GLaDOS as one of the most engaging characters to appear in a video game. Cinema Blend featured GLaDOS as the best character of 2007, stating that she "breathes life, emotion, and hilarity into the lab of Portal." GamesRadar praised Portal as having one of the best video game stories ever, citing GLaDOS as the primary reason for this. They stated that she had the most defined personality in gaming, adding that she "redefined passive-aggressive". Shoot 'em up expert Michael Molinari cited GLaDOS as an example of a quality boss, stating that her quality stems from her appearing throughout the game, providing motivation as well as a satisfying pay-off at the end of the game. Editor Randy Smith commented that the battle with GLaDOS was "easy", commenting that it was "fun and fluid" rather than "annoyingly insurmountable". However, he added that it had an "air of epicness". Whereas Smith found the battle easy, UGO Networks Chris Littler included GLaDOS in his list of the 50 "Hardest Freakin' Boss Battles". UGO.com listed GLaDOS as one of their favorite video game robots.
Awards
GLaDOS has won several awards in 2007 for her role in Portal. IGN editor Hilary Goldstein awarded her the "Best of the Worst Guiding Voices", commenting that it was between her and BioShock character Atlas. However, he gave the award to GLaDOS, citing her humor as the prime reason. GameSpy awarded her the "Best Character" award, stating that she came from the most unexpected place – a game that could have gotten by without a story. They added that during the final encounter, her mood swings provided some of the most memorable dialogue in video game history. X-Play similarly awarded her with the best new character award. GamePro awarded GLaDOS, referred to as "The Voice" in their article, the most memorable villain award, describing the decision as a surprise upset, considering either Frank Fontaine of BioShock or Saren of Mass Effect to win. GLaDOS has received other awards, including "best nemesis of 2007" from Primo Technology, best new character from GameSpot, and character of the year from Man!ac. Game Informer also highlighted GLaDOS in a 2010 retrospective list, "Thirty Characters Who Defined a Decade".
Villainy and humor
GLaDOS is frequently cited as both a quality villain and a quality computer character. IGN called her the greatest video game villain of all time, stating that while their time with her was short, she left a mark on players like no other villain has. They cited her uniqueness as being because no other players existed in the game. They also added she was more human than most video game villains. 1Up.com editor Scott Sharkey praised her as being the best insane video game computer. He stated that not only is she the best insane computer in video games, but in films and books as well. He explains his choice by citing her eagerness to kill the player-character, but not being overt about it until the end. He also cites her feminine voice and passive-aggressive manner for his decision. In another article, he mentions how he feels more sorry for her than any other enemy, describing her as a "digital version of the most passive-aggressive girlfriend ever". He adds that he can imagine it not being easy to be a super-intelligent computer trapped in a single building.
Crave editor Rich Trenholm also regarded her highly, listing her as the fifth best evil computer. PC World editor Spandas Lui listed GLaDOS as the second most "big-time, badass video game villain", citing her various non-sequitur one-liners and personality for her becoming one of the most memorable video game villains ever. Pittsburgh Live editor Jessica Severs described GLaDOS as having the most entertaining villainy due to her promises of cake and her encouragements such as "This next test is impossible." GameDaily listed her as the most horrific video game boss, describing her as "polite, passive-aggressive, and insanely sadistic". The review adds that while the game may be short, GLaDOS will "resonate with players long after players finish it". Game Informer considered GLaDOS the top defining video game character of the 2000s, taking the archetype of the sentient computer in "surprising new directions, at turns slyly comic and malevolent", and that she remains "one of the most fascinating characters in game history".
GLaDOS has received praise for her humor and wit. In his review of Portal, PC Gamer editor Tom Francis stated that he could hardly stop himself from laughing at GLaDOS's deranged writing. Similarly, GamesRadar editor Tom Francis described her as hysterical and being an aspect of Portal that gamers will love. Tom Francis called GLaDOS one of the most badass boss fights in video games, citing both the hilarity of the character, whom they describe as the funniest video game villain since the Purple Tentacle from Day of the Tentacle, as well as the memorable quotes. PC Zone UK listed her as the second-best conceived character in gaming, commenting that the memes related to the Weighted Companion Cube and "the cake is a lie" could distract people from GLaDOS's "perfectly-metered and lyrical voice". He described her as the "humorous, clinical, savage and poignant heart of Portal". In a piece in The Observer, game theorist and author of Fun Inc Tom Chatfield listed GLaDOS as one of the ten best video game characters of all time, describing her both as "gaming's funniest, freakiest female" and a "psychopathic artificial intelligence". The Observers Will Freeman wrote that GLaDOS "really is (in a rare case of living up to the hyperbole) one of the most fascinating characters in the history of the video game".
The Academy of Interactive Arts & Sciences praised Portal for its "hint of comedy", citing GLaDOS's "humorous and homicidal" personality. Writer Lou Kesten, in discussing humor in video games, cited GLaDOS as possibly being the first time he discovered that video games could make him laugh out loud. The New York Times editor Charles Herold praised GLaDOS, calling her comments "wildly funny". In an article titled "The GLaDOS Effect – Can Antagonists Rule the World?", Gamasutra publisher Simon Carless describes her as the one true memorable character from Portal. He states that she is the reason he keeps returning to play Portal, describing her as funny, unexpected, and beguiling. The Daily Telegraphs Tom Hoggins wrote that GLaDOS "became one of gaming’s most compelling villains" and that "it managed to get people attached to an inanimate cube. It had the best end credits song of all time. It was funny, smart, fresh and managed to feel like the plucky, accidental hero". GameSpy's Nathan Meunier wrote that "without inhuman antagonist GLaDOS spewing a laugh-inducing tirade of thinly veiled threats in her deadpan robotic drone as you progress deeper into the bowels of Aperture Science, Portal would have been a very different game".
GLaDOS's mocking of Chell was met with negative reception from Neal Stapel, an adoptive parent profiled by 1Up.com. He stated that "it literally pokes fun for not having parents", and stopped playing when he first heard the insult. He added that "it throws the ultimate question that that child is ever going to have for you... and it just throws it right in the living room." Kotaku's Michael McWhertor felt that while it was "awkward" for the parents, the fact that GLaDOS was trying to kill Chell would be more upsetting. He also pointed out that "morons and the overweight are also mocked by robots" in Portal 2. 1UP.com's Chris Pereira found the joke "harmless".
In Portal 2
GLaDOS's appearance in Portal 2 received critical acclaim. GameSpot's Chris Watters wrote that GLaDOS was a "complex character who evolves throughout these early levels" and that "before all is said and done, you'll once again come to cherish your relationship with that cruel AI". PALGNs Adam Ghiggino called Ellen McLain's portrayal of GLaDOS "hilariously blunt" due to her calling the player-character fat. He also wrote that GLaDOS has "a lot of emotion to [her] movement". The Guardians Nick Cowen wrote that GLaDOS was "by turns funny and monstrous". Computer and Video Game's Andy Robinson wrote that GLaDOS was "surely now deserving of entry into the Best Game Characters Ever club". He added that "GLaDOS' character progression is a joy to follow, as she progresses from bitter, to angry and eventually even finding a bit of heart". An editor for GameTrailers wrote that GLaDOS's "constant auto-tuned barbs are extremely well-written and voiced-helping lend some character to an otherwise spartan presentation".
GameZone's Ben PerLee wrote that GLaDOS was the "much brighter star of the franchise" compared to Chell due to her role in Portal. He also wrote "the player’s interaction with her is absolutely amazing to watch. She is as vindictive and bitchy as ever, coating pure unadulterated hatred with a veneer of cool science" and that "for fans of GLaDOS, her return from her unfortunate death in the previous Portal is fabulous, and her literal transformation within the game will shock, wow, and humor even jaded gamers tired of cake quotes". PC Gamers Dan Stapleton wrote that "evil robot GLaDOS is in top politely murderous form right from the moment she appears on screen" and that "Portals show-stealing monotone antagonist is challenged for the spotlight by Wheatley". He compared her to Cave Johnson, who has a similar "comically sociopathic approach to science". Giant Bomb's Ryan Davis wrote "it would be charitable to characterize GLaDOS as indignantly sociopathic, and her lust for punishing you for your past transgressions is riper than ever".
CNN's Larry Frum wrote that "GLaDOS' voice is dripping with sarcasm and malice even as her tone remains soothing and calm". PCMags Matthew Murray called her voice actor "irreplaceable" and called GLaDOS "saucy and strangely sympathetic". An editor for CBS News wrote that "the interactions between the player, GLaDOS and Wheatley are what give "Portal 2" its charm and provide much of the humor that keeps the game captivating puzzle after puzzle". The Globe and Mails Chad Sepieha listed the top five insults from GLaDOS in Portal 2, which included "Science has now validated your birth mother’s decision to abandon you on a doorstep." Rock Paper Shotgun's John Walker wrote that "Ellen McLain returns as GLaDOS, and is pushed so much further this time, hitting every single line with perfection". Game Informers Adam Biessener wrote that while Portal 2 was less quotable than its predecessor, "repeating GLaDOS lines stopped being funny a long time ago". He also wrote "I never once thought I'd place GLaDOS second on any list of Portal characters, but J.K. Simmons' character surpasses the malevolent AI even though she's as amusing as ever".
Comparison to other characters in fiction
GLaDOS has been compared to characters in fiction, including HAL 9000 from the film 2001: A Space Odyssey by LucasArts designer Noah Falstein. Falstein described her as the best AI he had ever encountered – "more convincingly psychotic than HAL, with a more emotionally engaging death than Floyd, and funnier than C-3PO and R2-D2."
The comparison was also made by other critics such as journalist Stephen Totilo and IGN's Cindy White. Totilo wrote that HAL was an influence on GLaDOS's "psychotic breakdown" seen near the end of the first Portal title. White wrote HAL and GLaDOS were similar due to both having "a calm, almost childlike, demeanor" which "hides nefarious intentions". She added that "the prospect of being shut down causes them to act out in deadly ways". GamesRadar editor Tyler Wilde stated that while the staff of GamesRadar loves GLaDOS, it makes no sense to insert a personality core into a robot. He suggested that the scientists either never read 2001: A Space Odyssey, or read it too much. Empire Online listed her as the 12th-best video game character of all time, describing her acts as "HAL-like conduct". Writer Stephen Totilo alluded the final battle with GLaDOS to the scene of David from 2001 disabling HAL, with both scenes involving de-evolving the respective characters.
MSNBC game reviewer Blake Snow compared The Sign Painter from World of Goo to GLaDOS, due to the mischievousness and unseen nature of the character. GamesRadar editor Mikel Reparaz compared GLaDOS to SHODAN from the System Shock series and stated that before GLaDOS broke their hearts, they had SHODAN. GamesRadar's Alan Bradley named GLaDOS as one of gaming's most "malicious machines". He called her a "sort of spiritual successor" to SHODAN. However, PC Zone UK commented that the comparisons between GLaDOS and SHODAN run dry; while Portal leaves everything to the players' imagination, System Shock 2 has a strongly defined storyline. They do, however, describe her breakdown as hysterical, desperate, and hilariously childish, calling it the most finely controlled breakdown since Patrick Bateman's in the book American Psycho. The Daily Telegraph editors Nick Cowen and Tom Hoggins listed her as the ninth-greatest video game villain, stating that she is as diabolical as a female AI can get, mentioning SHODAN as being inferior in this respect. Writer N'Gai Croal commented that the boss battle with GLaDOS is similar to the "Room 19" encounter with Andrew Ryan from BioShock, citing the same use of tactical language and techniques between the two. In the book Extra Lives: Why Video Games Matter, Infinity Ward developer Michael Boon mentioned GLaDOS and BioShock character Andrew Ryan while discussing believable non-playable characters. He commented that while shooting games in general feature enemies as bullet magnets, both Andrew Ryan and GLaDOS do not provide an opportunity for players to shoot them. However, he adds that both characters end up defeating themselves, but in different ways. He stated that she was "so entertaining", but also that he wanted to kill her. The book's author Tom Bissell stated that in addition to these similarities, both were well written, describing them as "funny, strange, cruel, and alive."
Character analysis
In his analysis of Portal, Daniel Johnson points out that "the larger chunk of Portals narrative exists in GLaDOS' dialogue", which tells "a metaphoric tale of a power struggle of identity roles within an institution". He discusses how the "backstage" of the institution is hinted at and gradually revealed through GLaDOS's slip-ups, from the momentary glitch during her initial instructions to the player ("the first flaw in the routine") to her ultimate abandonment of the formal language of the institution as she desperately pleads with the player to return to the testing area (the "front stage", where the institution's inner workings are supposedly hidden from view). Microsoft Game Studios developer Tom Abernathy, in discussing the importance of compelling characters in video games, praises Portal for giving its audience "room to do some imagination work" by inviting them to read between the lines to understand GLaDOS's motivations. His own interpretation is that GLaDOS is conflicted between her wants and needs, a conflict which ultimately "causes her to go crazy". Stephen Totilo notes the "artful way" in which GLaDOS's antagonistic character is slowly revealed and defined throughout Portal despite "little interactivity in how the story is told". Of his own reaction to that character development, he writes, "I wanted to hunt GLaDOS down, confront her for her lies, and break free of her clutches. I wanted this boss battle. I don't know if I ever have wanted a boss battle before." Newsweek editor N'Gai Croal describes her as a "maternal, mischievous, malevolent and finally murderous unreliable narrator".
Video game developer Nathan Frost describes Portal as an "exploration of a relationship with someone with narcissistic personality disorder". He adds that in order to fulfill her self-centered narcissistic desire to toy with someone, the player-character is trapped in the Enrichment Center, forced to do tricks for the computer. However, once the player-character becomes skilled enough to break the confines of the center, GLaDOS's secure amusement gives way to "histrionic, bipolar deportment". He describes this as a parallel to how a real-life narcissist might attempt to secure the admiration of another person by empowering them in some ways, but limiting them in others. He adds that this works out well for the narcissist until the other person learns to think and act for themselves. He concludes by saying that a part of Portals resonance comes from the fact that using the portal gun to escape the center is a "cogent metaphor for escaping an intimate relationship with someone diagnosably narcissistic". Grant Tavinor, author of The Art of Videogames, wrote that GLaDOS's actions and personality in Portal were "in the best of science fiction traditions" and describes her as "insincere, malfunctioning, and probably insane". Wendy Despain, author of Writing for Video Games Genres: from FPS to RPG used Portal as an example of a "modern classic" video game and "how they tell their stories". She called GLaDOS an "endlessly cheerful and clearly insane computer" and called her narrative "simple". Emily Short, creator of a female artificial intelligence character in the video game Galatea, speculates that in GLaDOS's final remarks to Chell ("No one likes you, you know"), "there is a hint that she’s talking about herself, not Chell; that she herself desires an emotional connection that she has never been able to achieve, because she also needs to survive, and all humans are a threat to her ... [She has] learned that the humans view her as potentially threatening and essentially disposable, and so she has to see them the same way."
Scott Rogers, author of the book Level Up!: The Guide to Great Video Game Design, uses GLaDOS as an example of a "tormentor" boss character, stating that she taunts and challenges the players, but does not directly confront or attack them. Video game developer Andrew Doull describes the "unreliable narrator" as a narrative staple from more traditional media, stating that GLaDOS is the best example of this staple in gaming. He cites a scene in Portal where GLaDOS tells the player-character that the current puzzle is unsolvable, which turns out to be false. However, he comments that "it is still incredible to see the number of people who fail to read the situation, and proceed calmly to their death" in the incinerator when ordered to do so by GLaDOS; he uses this example to support an argument that the "unreliable narrator" narrative technique might not transfer readily to the gaming medium.
Relationship to other characters
Associate Professor of English at the University of Wisconsin–Stevens Point G. Christopher Williams discussed the relationship between GLaDOS and Chell. In response to a quote by designer Erik Wolpaw that read "we wanted you to have this very intimate connection with this AI that changes and evolves over time, leading up to the point that you betray her and do the most intimate act you can do with someone—murdering them in cold blood", he at first noted that "on the face of it, this description of intimacy seems nonsensical", but also noted that "a changing and evolving relationship with someone in authority over you that eventually leads to betraying them by violating their rules—is one that is an altogether familiar one". He used the parent-child relationship as an example of this and cited a metaphor by psychologist Sigmund Freud which Williams said was about "murdering a parent in an effort to describe how children eventually would attempt to get out from under the wing of their parents". He wrote "nothing can be as intimate, perhaps, as loving someone enough to follow their rules and then needing to "kill them" in order to escape that "game," which makes this game feel like something more like a really familiar relationship". He called her "just one of many countless authorities that have explained to me the rules of a game, how to control myself, and then pushed me towards a particular goal of the computer’s design" and that "this is an experience that I have every time that I fire up my Xbox and describes the curiously intimate relationship between player and gaming system that emerges in single player gameplay". He further discussed that he had no idea that Chell's name was Chell or that she was a female because he recognized the character as himself. He wrote "I cared about GLaDOS only because she was the one directing me. Oh, and then I really cared about her because she wanted to kill me".
G. Christopher Williams also discussed the relationship between Wheatley and GLaDOS. His initial impression was that Wheatley, being an "utter moron" and attached to GLaDOS, was a political critique of the Presidency of George W. Bush. Namely, he thought that it would "be a way of paralleling the mythos surrounding the origins of the Bush-Cheney White House as an opportunity for the Republicans to regain control of the White House through a less intellectually apt figurehead and to thus control their domain through this weaker authority figure"; however, as he progressed, he saw nothing more to suggest that this was the intent. He added that the thought of this concept helped make him realize how Portal 2 "presents a fundamental conundrum that does exist surrounding competency and power". In contrast to this, he wrote that "an extremely smart leader can be about the most oppressive force in an organization has already been provided in abundance for anyone who has played the first Portal" and that "GLaDOS's "leadership" is the very definition of sadistic fascism". He also discussed the "lack of choice" for Chell, who is required to reinstate GLaDOS into her position to escape. He wrote that this lack of choice "manages to effectively maintain its position on the relationship between the everyman and systems of power".
Williams also discussed the relationship between Caroline, the form she held before she became GLaDOS, and Cave Johnson. He wrote that the relationship of Caroline and Johnson fulfilled the "adage that "behind every good man is a good woman", since he depends on Caroline to fulfill the role of executing his directives as well as providing comfort and support for the man in charge, himself". He added that "while Johnson warns his listeners jokingly that 'pretty as a postcard' Caroline is off limits because 'She's married. To Science,' he may as well be simply warning off potential suitors for personal reasons" and wrote that "he is the "science" that she has married herself to".
As a woman in video games
G. Christopher Williams wrote that the addition of an "intelligence dampening sphere" performed by scientists on GLaDOS before the events of Portal could represent the "response from men to what they perceive as the 'misbehavior' or 'irrational thinking' of women". He also wrote "the effort to 'dampen' intelligence becomes a rather literal manifestation of the labeling of women as 'dumb' or 'irrational' and the need to control such 'poor' behavior"; he also cited how Wheatley was given a masculine voice to "remind her that she is dumb and to curb her tendency towards 'misbehavior'". IGN wrote that she "bucked" all of the stereotypes of a woman in video games and "became one of the most memorable and well-loved characters ever conceived". GamesRadar's Joe McNeilly wrote that Portal seemed like a "feminist critique of the FPS genre, flawlessly executed from within the margins it assails". He called her a "maternal female construct" and that while she was programmed to react "empathetically" to the player, she is incapable of feeling emotion. As a result, he felt that she "comes to represent man's attempt to construct an idealized mother figure through the cold logic of science".
GameInformers Lix Lanier stated that no villain, male or female, has the charm of GLaDOS: "If she's not trying to kill Chell, she's likely belittling her with passive-aggressive comments that would make a sorority girl proud. Even with her robotic voice, it's clear that 'You look great by the way, very healthy' is no compliment." GamePros Chris Holt discussed GLaDOS as an icon of feminism, and wrote that as opposed to being an "archetypal villain", she is a "prototypical bound woman". He added that "A female protagonist murdering a female villainess (or vice versa) is not what is interesting to us as critics, but it's the idea that despite her seemingly robotic, unemotional and unstoppable nature, GLaDOS appears vulnerable, sympathetic, and even a victim herself". He wrote "GLaDOS has been augmented because of the danger she presents to a presumably misogynistic society" and that "by destroying these cores, Chell is stripping her of the layers that society has deemed necessary for her to wear" and making her "far more dangerous". He added that Chell and GLaDOS serve as opposing sides of femininity; where Chell is "dutiful and does every task assigned of her", GLaDOS is "aggressive and seemingly dangerous to the order of a male-dominated society". He also described Chell as a "domestic icon" while he described GLaDOS as a "progressive, intelligent working woman" and that by killing her, "Chell can be seen as the dutiful 'safe' woman conquering the 'dangerous' feminist". He also cited the use of poems by Emily Dickinson, whom he compares to GLaDOS in how both were reclusive and were essentially disembodied voices.
In discussing the lack of female heroes in video games, particularly in video games published by Activision, Gamasutra news director Leigh Alexander cited GLaDOS while arguing that the "females do not sell" notion is possibly false logic, stating that she was on the fast track to becoming one of gaming's most beloved characters. Gamasutra writers Leigh Alexander, Brandon Boyer, Simon Carless, and Christian Nutt listed GLaDOS as being the second-most affecting video game character, being the highest-ranked actual character because the most affecting video game character was the player. They attribute the overall quality of Portal to GLaDOS, stating that without her, Portal would not be nearly as quotable. They added that the relationship between GLaDOS and the player-character has been described as passive-aggressive, maternal, and a "feminist manifesto".
References
Anthropomorphic characters in video games
Artificial intelligence characters in video games
Female characters in video games
Female video game villains
Fictional computers
Fictional gynoids
Fictional artificial intelligences
Fictional mass murderers
Portal characters
Robot characters in video games
Video game bosses
Video game mascots
Video game sidekicks
Video game characters introduced in 2007
Fictional tubers
|
3473219
|
https://en.wikipedia.org/wiki/Email%20spoofing
|
Email spoofing
|
Email spoofing is the creation of email messages with a forged sender address.
The original transmission protocols used for email do not have built-in authentication methods: this deficiency allows spam and phishing emails to use spoofing in order to mislead the recipient. More recent countermeasures have made such spoofing from internet sources more difficult but not eliminated it; few internal networks have defences against a spoof email from a colleague's compromised computer on that network. Individuals and businesses deceived by spoof emails may suffer significant financial losses; businesses risk compound losses since email spoofing is one of the primary routes to embed ransomware.
Technical details
When a Simple Mail Transfer Protocol (SMTP) email is sent, the initial connection provides two pieces of address information:
MAIL FROM: - generally presented to the recipient as the Return-path: header but not normally visible to the end user, and by default no checks are done that the sending system is authorized to send on behalf of that address.
RCPT TO: - specifies which email address the email is delivered to, is not normally visible to the end user but may be present in the headers as part of the "Received:" header.
Together these are sometimes referred to as the "envelope" addressing – an analogy to a traditional paper envelope. Unless the receiving mail server signals that it has problems with either of these items, the sending system sends the "DATA" command, and typically sends several header items, including:
From: Joe Q Doe <[email protected]> - the address visible to the recipient; but again, by default no checks are done that the sending system is authorized to send on behalf of that address.
Reply-to: Jane Roe <[email protected]> - similarly not checked
and sometimes:
Sender: Jin Jo <[email protected]> - also not checked
The result is that the email recipient sees the email as having come from the address in the From: header. They may sometimes be able to find the MAIL FROM address, and if they reply to the email it will go to either the address presented in the From: or Reply-to: header, but none of these addresses are typically reliable, so automated bounce messages may generate backscatter.
Although email spoofing is effective in forging the email address, the IP address of the computer sending the mail can generally be identified from the "Received:" lines in the email header. In malicious cases however, this is likely to be the computer of an innocent third party infected by malware that is sending the email without the owner's knowledge.
Malicious use of spoofing
Phishing and business email compromise (see below) scams generally involve an element of email spoofing.
Email spoofing has been responsible for public incidents with serious business and financial consequences. This was the case in an October 2013 email to a news agency which was spoofed to look like it was from the Swedish company Fingerprint Cards. The email stated that Samsung offered to purchase the company. The news spread and the stock exchange rate surged by 50%.
Malware such as Klez and Sober among many more modern examples often search for email addresses within the computer they have infected, and they use those addresses both as targets for email, but also to create credible forged From fields in the emails that they send. This is to ensure that the emails are more likely to be opened. For example:
Alice is sent an infected email which she opens, running the worm code.
The worm code searches Alice's email address book and finds the addresses of Bob and Charlie.
From Alice's computer, the worm sends an infected email to Bob, but is forged to appear as if it was sent by Charlie.
In this case, even if Bob's system detects the incoming mail as containing malware, he sees the source as being Charlie, even though it really came from Alice's computer. Meanwhile, Alice may remain unaware that her computer has been infected, and Charlie does not know anything about it at all, unless he receives an error message from Bob.
How does email spoofing differ from spam and email phishing?
The main difference between spam and a spoofed message is that spammers don't edit email headers to pretend the email was sent from someone else. Both phishing and spoofing emails aim to trick someone to believe the message was sent from a legitimate sender. However, the main phishers' intent is to compromise user personal and financial information, while spoofing emails is just one of the ways they use to do so.
Legitimate use
In the early Internet, "legitimately spoofed" email was common. For example, a visiting user might use the local organization's SMTP server to send email from the user's foreign address. Since most servers were configured as "open relays", this was a common practice. As spam email became an annoying problem, these sorts of "legitimate" uses fell out of favor. An example of legitimate spoofing would be a scenario where a Customer relationship management system receives an email from a website, and in order to log the incoming email and create a profile for the email that is associated with a new contact, the system would be configured to use the 'sender' of the email to create the profile of the prospect with a name and email address of the sender. A dispatching website would be configured to spoof the outgoing email from the website, and dispatch the email in a way which makes it appear to arrive from the submitter with the submitter's information as sender name and email address. The system would then log it as configured.
When multiple software systems communicate with each other via email, spoofing may be required in order to facilitate such communication. In any scenario where an email address is set up to automatically forward incoming emails to a system which only accepts emails from the email forwarder, spoofing is required in order to facilitate this behavior. This is common between ticketing systems which communicate with other ticketing systems.
The effect on mail servers
Traditionally, mail servers could accept a mail item, then later send a Non-Delivery Report or "bounce" message if it couldn't be delivered or had been quarantined for any reason. These would be sent to the "MAIL FROM:" aka "Return Path" address. With the massive rise in forged addresses, best practice is now to not generate NDRs for detected spam, viruses etc. but to reject the email during the SMTP transaction. When mail administrators fail to take this approach, their systems are guilty of sending "backscatter" emails to innocent parties - in itself a form of spam - or being used to perform "Joe job" attacks.
Countermeasures
The SSL/TLS system used to encrypt server-to-server email traffic can also be used to enforce authentication, but in practice it is seldom used, and a range of other potential solutions have also failed to gain traction.
However a number of defensive systems are now widely used, including:
Sender Policy Framework (SPF) an email authentication method designed to detect forging sender addresses during the delivery of the email.
DomainKeys Identified Mail an email authentication method designed to detect forged sender addresses in email (email spoofing), a technique often used in phishing and email spam.
DMARC (Domain-based Message Authentication, Reporting and Conformance), an email authentication protocol. It is designed to give email domain owners the ability to protect their domain from unauthorized use, commonly known as email spoofing. The purpose and primary outcome of implementing DMARC is to protect a domain from being used in business email compromise attacks, phishing emails, email scams and other cyber threat activities.
To effectively stop forged email being delivered, the sending domains, their mail servers, and the receiving system all need to be configured correctly for these higher standards of authentication. Although their use is increasing, estimates vary widely as to what percentage of emails have no form of domain authentication: from 8.6% to "almost half". For this reason, receiving mail systems typically have a range of settings to configure how they treat poorly-configured domains or email.
Business email
Business email compromise attacks are a class of cyber crime that use email fraud to attack commercial, government and non-profit organizations to achieve a specific outcome which negatively impacts the target organization. Examples include invoice scams and spear phishing spoof attacks which are designed to gather data for other criminal activities. A business deceived by an email spoof can suffer additional financial, business continuity and reputational damage: fake emails are a favored route for ransomware that can stop operations unless a ransom is paid; consumer privacy breaches can also be enabled.
Typically an attack targets specific employee roles within an organization by sending a spoof email (or series of spoof emails) which fraudulently represent a senior colleague (CEO or similar) or a trusted customer. (This type of attack is known as spear phishing.) The email will issue instructions, such as approving payments or releasing client data. The emails often use social engineering to trick the victim into making money transfers to the bank account of the fraudster.
The worldwide financial impact is large. The United States's Federal Bureau of Investigation recorded $26 billion of US and international losses associated with BEC attacks between June 2016 and July 2019.
Incidents
Dublin Zoo lost €130,000 in a such a scam in 2017 - a total of €500,000 was taken, though most was recovered.
The Austrian aerospace firm FACC AG was defrauded of 42 million euros ($47 million) through an attack in February 2016 - and subsequently fired both the CFO and CEO.
Te Wananga o Aotearoa in New Zealand was defrauded of $120,000 (NZD).
The New Zealand Fire Service was scammed out of $52,000 in 2015.
Ubiquiti Networks lost $46.7 million through such a scam in 2015.
Save the Children USA was the victim of a $1 million cyberscam in 2017.
Australian organisations that reported business email compromise attacks on the Australian Competition and Consumer Commission suffered approximately $2,800,000 (AUD) in financial losses for the 2018 year.
In 2013, Evaldas Rimasauskas and his employees sent thousands of fraud emails to get access to companies email systems.
See also
that may be compromised
References
External links
Email
Internet terminology
Practical jokes
Spamming
Cybercrime
Confidence tricks
Organized crime activity
Social engineering (computer security)
Types of cyberattacks
Deception
Fraud
|
2901245
|
https://en.wikipedia.org/wiki/Research%20Unix
|
Research Unix
|
The term "Research Unix" refers to early versions of the Unix operating system for DEC PDP-7, PDP-11, VAX and Interdata 7/32 and 8/32 computers, developed in the Bell Labs Computing Sciences Research Center (CSRC).
History
The term Research Unix first appeared in the Bell System Technical Journal (Vol. 57, No. 6, Pt. 2 Jul/Aug 1978) to distinguish it from other versions internal to Bell Labs (such as PWB/UNIX and MERT) whose code-base had diverged from the primary CSRC version. However, that term was little-used until Version 8 Unix, but has been retroactively applied to earlier versions as well. Prior to V8, the operating system was most commonly called simply UNIX (in caps) or the UNIX Time-Sharing System.
AT&T licensed Version 5 to educational institutions, and Version 6 also to commercial sites. Schools paid $200 and others $20,000, discouraging most commercial use, but Version 6 was the most widely used version into the 1980s. Research Unix versions are often referred to by the edition of the manual that describes them, because early versions and the last few were never officially released outside of Bell Labs, and grew organically. So, the first Research Unix would be the First Edition, and the last the Tenth Edition. Another common way of referring to them is as "Version x Unix" or "Vx Unix", where x is the manual edition. All modern editions of Unix—excepting Unix-like implementations such as Coherent, Minix, and Linux—derive from the 7th Edition.
Starting with the 8th Edition, versions of Research Unix had a close relationship to BSD. This began by using 4.1cBSD as the basis for the 8th Edition. In a Usenet post from 2000, Dennis Ritchie described these later versions of Research Unix as being closer to BSD than they were to UNIX System V, which also included some BSD code:
Versions
Legacy
In 2002, Caldera International released Unix V1, V2, V3, V4, V5, V6, V7 on PDP-11 and Unix 32V on VAX as FOSS under a permissive BSD-like software license.
In 2017, Unix Heritage Society and Alcatel-Lucent USA Inc., on behalf of itself and Nokia Bell Laboratories, released V8, V9, and V10 under the condition that only non-commercial use was allowed, and that they would not assert copyright claims against such use.
See also
Ancient UNIX
History of Unix
Inferno - Another operating system from the same team
Lions' Commentary on UNIX 6th Edition, with Source Code
PWB/UNIX - A version of Unix for internal use at Bell Labs for production use
References
External links
UNIX Evolution (PostScript) by Ian F. Darwin and Geoffrey Collyer
Unix heritage - More links and source code for some Research Unix versions
The Evolution of the Unix Time-sharing System by Dennis M. Ritchie
The Restoration of Early UNIX Artifacts by Warren Toomey, School of IT, Bond University
Full Manual Pages documentation for Research Unix 8th Edition.
List of new features in Research Unix 9th Edition.
Bell Labs Unices
Computing platforms
Discontinued operating systems
Unix variants
|
63683133
|
https://en.wikipedia.org/wiki/COVIDSafe
|
COVIDSafe
|
COVIDSafe is a digital contact tracing app announced by the Australian Government on 14 April 2020 to help combat the ongoing COVID-19 pandemic. The app is based on the BlueTrace protocol, originally developed by the Singaporean Government, and was first released on 26 April 2020. The app is intended to augment traditional contact tracing by automatically tracking encounters between users and later allowing a state or territory health authority to warn a user they have come within with an infected person for 15 minutes or more.
History
COVIDSafe first began development in late March, shortly after the Morrison Government showed interest in Singapore's TraceTogether app. Development of the app was publicly announced on 14 April 2020, with plans to release it for Android and iOS within a fortnight. The app had a budget of over , of which went to Amazon Web Services (AWS) for hosting, development, and support. The announcement was immediately met with concerns over the privacy implications of the app and confusion over its distribution. For many, it was unclear if the app would be a feature of the existing Coronavirus Australia app or completely separate. Adding to the confusion, many news reports used images of Coronavirus Australia in their articles, and the COVIDSafe website linked to the Coronavirus Australia apps for a short time after release.
The app launched on 26 April 2020. However, there were early reports that some users had problems with the sign-up. For example, those who entered their phone number during sign-up received the following message: "Error verifying phone number. Please check your details and try again."
Within 24 hours of COVIDSafe's release it had been downloaded by over a million people, and within 48 hours more than two million. By the second week more than four million users had registered. Despite this, state and territory health authorities were not able to access data collected through the app as the health authority portal had not yet been completed.
Accompanying the release, Peter Dutton, Minister for Home Affairs, announced new legislation that would make it illegal to coerce one into submitting a contact report, even if a person had already registered with the app and tested positive for COVID-19. A determination, titled Biosecurity Determination 2020, was put in place, with the Privacy Amendment (Public Health Contact Information) Bill 2020 being later introduced on 6 May 2020 to codify it. The legislation further governs how data collected by the app will be stored, submitted and processed.
In early May 2020, the Senate Select Committee on COVID-19 held a public hearing on the app, focusing particularly on its effectiveness and privacy implications and the source code for the app was released publicly.
In mid May 2020, the Australian Chief Medical Officer announced that the app was fully functional. The next day it was reported that the app had reached 5.7 million downloads, approximately 23% of Australia's total population. On the 20th of May 2020, data was accessed for the first time following an outbreak at Kyabram Health in Victoria.
By mid June, over a month since the launch of the app, the app had yet to identify any contacts not already discovered through traditional contact tracing techniques, strengthening growing concerns over the efficacy of the app. Adding to this, some estimates put the likelihood of the app registering a random encounter at just ~4%. Concurrently, the Google/Apple exposure notification framework began rolling out to users, with the Italian Immuni being the first app to make use of it.
In late June, following a "second wave" in Victoria sparked by family gatherings, COVIDSafe data was accessed by contact tracers over 90 times. The app, again, was unable to identify undetected transmission. At the same time, a COVID-19 positive protester who attended the Melbourne Black Lives Matter rally on 6 June 2020 was criticised in the media for having not downloaded the app. Despite the identification of at least two further cases in attendance, to date no transmission has been found to originate from the protests.
On 20 July 2020, the government was criticised for contracting out part of the app's development and support to a company with ties to the Liberal Party. Mina Zaki, the wife of the CEO of Delv Pty Ltd, was a Liberal Party candidate for the federal seat of Canberra in the 2019 election. Delv was engaged after the initial release of the app to assist with development, and was also the primary developer of the Coronavirus Australia app.
In a 22 July 2020 Sky News interview, Minister for Government Services Stewart Robert blamed the failure of COVIDSafe on the unwillingness of Apple and Google to modify their existing, globally deployed, Exposure Notification framework (ENF) to work with the app. ENF is an alternative, entirely incompatible, digital contact tracing protocol considered to be more reliable at detecting contact traces than competing protocols. For the app to take advantage of the framework, either the framework or app would need to be almost completely rewritten.
On 1 August 2020, NSW Health announced the app had helped them trace new contacts. They accessed the app data on a coronavirus case and identified 544 additional people, two of whom tested positive to COVID-19. By late October, the app had identified a total of 17 new cases.
By 29 November 2020, the Digital Transformation Agency was reportedly considering incorporating VMWare's Herald protocol to improve performance and detection success rate.
On 19 December 2020, the Digital Transformation Agency announced the app had been updated to incorporate VMWare's Herald protocol, to improve app performance. The update reportedly helps address situations where communication between devices might fail, such as when the device is locked or the app is running in the background.
On 2 February 2021, the Digital Transformation Agency announced a new update enabling the app to display state and territory COVID-19 case statistics. The update reportedly allowed users to change their registration postcode from within the app, which previously required reinstallation.
It was announced on 26 February 2021 that the app had been updated to feature state and territory restrictions, as well as improving battery consumption on Android devices.
Because of the ongoing technical problems surrounding the COVIDSafe app, the Victorian government developed the Service Victoria QR Code app to augment tracing efforts within the state. Use of the app is mandatory for all Victorian businesses, organisations, clubs and events.
Similarly, every other state and territory in Australia has their own QR-code based solution:
On , NSW and Victorian health officials admitted to The Guardian that the data collected by the app had not been used a single time in 2021, despite the extensive outbreaks and lockdowns that year. In response to the poor performance of the app, Federal Labor Party politicians called for the app to be discontinued, while the Morrison Government began engaging with states to find a future use of the app.
Contact tracing
The app is built on the BlueTrace protocol originally developed by the Singaporean Government. A stated priority of the protocol was the preservation of privacy. In accordance with this, personal information is only collected once at the point of registration and subsequently used purely to contact potentially infected patients. Additionally, users are able to opt out at any time, clearing all personal information. The contact tracing mechanism is executed locally on an individuals's device using Bluetooth, storing all encounters in a contact history log chronicling contact for the past 21 days. Users in contact logs are identified using anonymous time-shifting "temporary IDs" issued by a central Department of Health (DoH) server. Consequently, a user's identity and contact patterns cannot be determined by anyone not authorised by the DoH. Furthermore, since temporary IDs change on a regular basis, malicious third parties cannot track users by observing log entries over time.
Once a user tests positive for infection, the DoH requests their contact log. If consent is given, the logs are transmitted to a central server where temporary IDs are matched with contact information. Health authorities are not able to access log entries about foreign users, so those entries are sent to the appropriate health authority to be processed domestically. Once a contact has been identified, the DoH contacts the individual.
Although the app is commonly described as only logging encounters longer than 15 minutes and closer than , the app actually indiscriminately logs most encounters. It is only once the health authority receives a contact log that it is filtered to encounters within those parameters.
Reporting centralisation
BlueTrace's employment of a centralised reporting architecture has created concerns over its privacy implications. Under a centralised report processing protocol, a user must upload their entire contact log to a health authority administered server, where the health authority is then responsible for matching the log entries to contact details, ascertaining potential contact, and ultimately warning users of potential contact. In contrast, the Exposure Notification framework and other decentralised reporting protocols, while still having a central reporting server, delegate the responsibility of processing logs to clients on the network. Instead of a client uploading their contact history, it uploads a number from which encounter tokens can be derived by individually. Clients then check these tokens against their local contact logs to determine if they have come in contact with an infected patient. Inherent in the fact the protocol never allows the government access to contact logs, this approach has major privacy benefits. However, this method also presents some issues, primarily the lack of human in the loop reporting, leading to a higher occurrence of false positives. Decentralised reporting protocols are also less mature than their centralised counterparts.
Protocol change to Exposure Notification
During the 6 May 2020 Senate Select Committee public hearing on COVID-19 and the COVIDSafe app, the Digital Transformation Agency (DTA) announced they were looking into transitioning the protocol from BlueTrace to the Google and Apple developed Exposure Notification framework (ENF). The change was proposed to resolve the outstanding issues related to performance of third-party protocols on iOS devices. Unlike BlueTrace, the Exposure Notification frameworks runs at the operating system level with special privileges not available to any third-party frameworks. The adoption of the framework is endorsed by multiple technology experts.
Transitioning from BlueTrace to ENF presented several issues, most notably that, as the app cannot run both protocols simultaneously, any protocol change would be a hard cut between versions. This would result in the app no longer functioning for any users who had not yet updated to the ENF version of the app. Additionally, the two protocols are almost completely incompatible, meaning the vast majority - all but the UI - of the COVIDSafe app would have to be redeveloped. Similarly, because of the change from a centralised reporting mechanism to a decentralised one, very little of the existing server software would be usable. The role of state and territory health authorities in the process would also change significantly, as they would no longer be responsible for determining and contacting encounters. This change would involve retraining health officials and penning new agreements with states and territories.
Up until at least 18 June 2020, the DTA was experimenting with ENF, however in an interview with The Project held on 28 June 2020, Deputy Chief Medical Officer Dr Nick Coatsworth stated COVIDSafe would "absolutely not" transition to ENF. He reasoned the government would never transition to any contact tracing solution without human-in-the-loop reporting, something that no decentralised protocol can support.
Issues
Issues on iOS
Versions 1.0 and 1.1 of COVIDSafe for iOS did not scan for other devices when the application was placed in the background, resulting in far fewer recorded contacts than was possible. This was later corrected in version 1.2. Additionally, until the 18 June 2020 update, a bug existed where locked iOS devices were unable to fetch new temporary IDs. Devices collected 24–48 hour pools of temporary IDs in advance, meaning a device could easily exhaust it's pool unless the phone was unlocked specifically when the app was scheduled to replenish the pool.
Additionally, all third-party digital contact tracing protocols experience degraded performance on iOS devices, particularly when the device is locked or the app is not in the foreground. This is a characteristic of the operating system, stemming from how iOS manages its battery life and resource priority. The Android app does not experience these issues because Android is more permissive with background services and the app can request the operating system to disable battery optimisation.
Country calling code restrictions
COVIDSafe requires an Australia mobile number to register, meaning foreigners in Australia need a local SIM card. Initially, residents of Norfolk Island, an external territory of Australia, were unable to register with the app as they used a different country code to mainland Australia, +672 instead of +61. The Australian government released an update resolving the issue on 18 June 2020.
Privacy concerns
Upon announcement, the app was immediately met with widespread criticism over the potential privacy implications of tracking users. While some criticism was attributed to poor communication, fears were further stoked when Prime Minister Scott Morrison and Deputy Chief Medical Officer Paul Kelly refused to rule out the possibility of making the app compulsory, with Morrison stating the next day it would not be mandatory to download the app. Additionally, several privacy watchdogs raised concerns over the data collected by the app, and the potential for the centralised reporting server to become a target for hackers. To address concerns, the Attorney General launched an investigation into the app to ensure it had proper privacy controls and was sufficiently secure. The Minister for Home Affairs, Peter Dutton, also announced special legislation to protect data collected through the app. The app was supposed to be open sourced to allow it to be audited and analysed by the public, however, this was delayed until a review by the Australian Signals Directorate had been completed. On 8 May 2020, the source code was released.
Issue was also taken with the fact the backend of the app runs on the Amazon Web Services (AWS) platform, meaning the US Government could potentially seize the data of Australian citizens. Data is currently stored within Australia in the AWS Sydney region data centre. In a public hearing on COVIDSafe, Randall Brugeaud, CEO of the Digital Transformation Agency, explained that the decision to use AWS over purely Australian owned cloud providers was done on the basis of familiarity, scalability, and resource availability within AWS. The AWS contract was also drawn from a whole of government arrangement.
Following the global rollout of the Google and Apple developed Exposure Notification Framework (ENF) in late June 2020, public concerns were raised that the government or the companies were tracking users without their knowledge or consent. These claims are false, as COVIDSafe and ENF are completely incompatible, and ENF is disabled until a compatible app is installed and explicit user consent is given. Even if a third party were to obtain the encounter log of a user, no persons could be identified without also holding the logs of other users the client has encountered.
Australia's Inspector-General of Intelligence and Security reported that several of Australia's intelligence and security agencies collected data from COVIDSafe in its first months of operation. The report does not state which specific agencies collected the data and whether or not it was decrypted.
In June 2021 the state government of Western Australia "was forced to introduce legislation" when Western Australian police used data collected by the COVID SafeWA app for purposes other than contact tracing. Police stated that their use of this data was lawful, and that they could not stop using this data in criminal investigations while lawful to do so. Police Commissioner Chris Dawson defended this by pointing out that the "terms and conditions stated data could be accessed for a lawful reason" and while he accepts "people don't always read fine print on insurance policies or whatever," their use of the data in these circumstances was lawful.
Attorney General privacy impact assessment
On 25 May 2020, the Attorney General report and subsequent response by the Department of Health was released, the following recommendations were made:
Release the Privacy Impact Assessment and the app source code
Major changes should be reviewed for privacy impact
A legislative framework put in place to protect the user
Certain screens be rearranged to better communicate information
Make clear what a user should do if they are pressured to reveal their contact logs, or are pressured into installing the app
Generalised collection of age
Gather consent from users both at registration, and at submission of contact logs
Create a specific privacy policy for the app
Make it easier to rectify personal information
Raise public awareness about the app and how it works
Development of training and scripts for health officials
Put in place contracts with state and territory health authorities
Allow users to register under a pseudonym
Seek independent review over security of the app
Review the contract with AWS
Ensure ICT contracts are properly documented
Investigate ways to reduce the number of digital handshakes
A special consent process for underage users
In the Department of Health's response, they agreed to all suggestions with exception to "rectification of personal information". Rather than building a process to do so, a user could uninstall and reinstall the app to change their personal information. A process to formally correct information was to be introduced later.
Independent analysis
On 29 May 2020, a group of independent security researchers including Troy Hunt, Kate Carruthers, Matthew Robbins, and Geoffrey Huntley released an informal report raising a number of issues discovered in the decompiled app. Their primary concerns were two flaws in the implementation of the protocol that could potentially allow malicious third parties to ascertain static identifiers for individual clients. Importantly, all issues raised in the report were related to incidental leaking of static identifiers during the encounter handshake. To date, no code has been found that intentionally tracks the user beyond the scope of contact tracing, nor code that transmits a user's encounter history to third parties without the explicit consent of the user. Additionally, despite the flaws discovered through their analysis, many prominent security researchers publicly endorse the app.
The first issue was located in , the class responsible for advertising to other BlueTrace clients. The bug occurred with a supposedly random, regularly changing three-byte string included in that was, in fact, static for the entire lifetime of an app instance. This string was included with all handshakes performed by the client. In OpenTrace this issue did not occur, as value changes every 180 seconds. While likely not enough entropy to identify individual clients, especially in a densely populated area, when used in combination with other static identifiers (such as the phone's model) it could have been used by malicious actors to determine the identity of users. This issue was addressed in the 13 May 2020 update.
The second issue was located in , the class responsible for managing BLE peripheral mode, where the cached read payload is incorrectly cleared. Although it functioned normally when a handshake succeeded, a remote client who broke the handshake would have received the same TempID for all future handshakes until one succeeded, regardless of time. This meant a malicious actor could always intentionally break the handshake and, for the lifetime of the app instance, the same TempID would always be returned to them. This issue was resolved in OpenTrace, yet was unfixed in COVIDSafe until the 2020-05-13 update.
Other issues more inherent to the protocol include the transmission of device model as part of the encounter payload, and issues where static device identifiers could be returned when running in GATT mode. Many of these are unfixable without redesigning the protocol, however they, like the other issues, pose no major privacy or security concerns to users.
Legislation
The Biosecurity Determination 2020, made with the authority of the Biosecurity Act 2015, governs how data collected by the COVIDSafe app is stored, submitted, and processed. Later a separate bill was introduced to codify this determination, the Privacy Amendment (Public Health Contact Information) Bill 2020. The determination and bill makes it illegal for anyone to access COVIDSafe app data without both the consent of the device owner and being an employee or contractor of a state or territory health authority. Collected data may be used only for the purpose of contact tracing or anonymous statistical analysis, and data also cannot be stored on servers residing outside Australia, nor can it be disclosed to persons outside Australia. Additionally, all data must be destroyed once the pandemic has concluded, overriding any other legislation requiring data to be retained for a certain period of time. The bill also ensures no entity may compel someone to install the app. Despite this there have been reports of multiple businesses attempting to require employees to use the app.
See also
COVID-19 apps
Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015
References
External links
Android app
iPhone app
GitHub
Senate Select Committee on COVID-19 Public Hearing on COVIDSafe, 2020-05-06 (YouTube)
COVIDSafe App Teardown & Panel Discussion
Government software
E-government in Australia
COVID-19 pandemic in Australia
Software associated with the COVID-19 pandemic
Android (operating system) software
IOS software
2020 establishments in Australia
Mass surveillance
Free medical software
COVID-19 contact tracing apps
|
201984
|
https://en.wikipedia.org/wiki/Combat%20Vehicle%2090
|
Combat Vehicle 90
|
The Combat Vehicle 90 (CV90; Sw. Stridsfordon 90, Strf90) is a family of Swedish tracked combat vehicles designed by Sweden's Defense Materiel Administration (Försvarets Materielverk, FMV), Hägglunds and Bofors during the mid-1980s to early 1990s, entering service in Sweden in the mid-1990s. The CV90 platform design has continuously evolved in steps from Mk0 to current MkIV with advances in technology and in response to changing battlefield requirements. The Swedish version of the main infantry fighting vehicle is fitted with a turret from Bofors that is equipped with a 40 mm Bofors autocannon. Export versions are fitted with Hägglunds E-series turrets, armed with either a 30 mm Mk44 or a 35 mm Bushmaster autocannon.
Developed specifically for the Nordic subarctic climate, the vehicle has very good mobility in snow and wetlands while carrying and supporting eight, later versions six, fully equipped dismounted soldiers. Other variants include Forward artillery observation, command and control, anti-aircraft, armoured recovery vehicle, electronic warfare and so forth. The CV90 and Hägglunds E-series turrets have been under continuous development with more than 4 million hours invested and are still produced with modern protection, armament and network enabled solutions. Currently, 1,280 vehicles in 15 variants are in service with seven user nations, four of which are NATO members, under BAE Systems Hägglunds AB.
History
During the Cold War, in 1983, the Swedish Army required vehicles with high mobility, air defence and anti-tank capability, high survivability and protection. The "Stridsfordon 90" project group was formed by representatives from the Swedish armed forces (Försvarsmakten), the FMV and Swedish industry, including Hägglunds and Bofors, which in 1985 finalized the design for a "unity-vehicle" that originated from an air force concept. In 1986, the prototypes for Strf 9040 and Strf 9025 were ordered. Five prototypes were constructed but, before delivery in 1988, the 9025-version was discontinued. These prototypes were tested during extensive trials for three years between 1988 and 1991, during which the prototypes for specialized variants (FOV, C&C and ARV) were ordered. The first deliveries started in 1994.
The CV90 has undergone four mark shifts to meet different customer requirements, focused on capability enhancements.
CV90 Mk 0
The first delivered CV90 was for Sweden. It was armed with the Bofors 40/L70 cannon in a 2-man turret. The vehicle had a conventional electrical system and was fitted for but not with appliqué armour systems. The Swedish Army ordered five variants of the CV90. The requirements expressed by the Swedish FMV on signature management were extremely challenging and led to a lot of new design features that have been inherited by all subsequent generations (Mk 0-III). FMV also prioritized the requirements to provide the best possible design to fulfil user needs. Furthermore, the CV90 was also built for high reliability and ease-of-maintenance using only standard on-board tools and conscripts to maintain and operate.
CV90 Mk I
The next variant of CV90 is known as the Mk I and was delivered to Norway. CV90 Mk I won the Norwegian competition for a new IFV against other contemporary IFVs, such as American Bradley, British Warrior and Austro-Spanish Pizarro/ULAN. The Mk I variant of the CV90 had a newly designed 2-man 30 mm turret evolved from the 25 mm turret. CV90 Mk I was the first IFV with a high hit probability performance during suppression fire modes, both while the vehicle is on the move and against air targets. The CV90 Mk I incorporated several improvements compared to the original Swedish CV90. Trials on mobility, reliability, lethality, fightability, ergonomics, durability and survivability were performed during the trials phase for these vehicles with good results for CV90 Mk I.
CV90 Mk II
The CV90 Mk I was the base for the next development step, CV90 Mk II. The CV90 Mk II was produced in three variants: CV9030 CH (Switzerland) IFV and COM, and CV9030 FIN (Finland) IFV. Both contracts were won in competition with other IFVs. The difference between the two variants is mainly the size of the hull. The Swiss variant is 100 mm higher over the front part of the hull and an additional 70 mm over the combat compartment at the rear. The principal difference between the Mk I and Mk II is that the Mk II was partly digitized and provided with built-in Health & Unit Monitoring System (HUMS) together with interactive manuals and instructions. The CV90 Mk II's standard armament is the Mk44 Bushmaster II autocannon.
CV90 Mk III
The Mk III variant of the CV90 is a further development of the CV90 Mk II. The areas that have undergone most development compared to Mk II are lethality, fightability, electronic architecture, survivability and mobility. The weapon system has been upgraded to a 35/50 mm Bushmaster III cannon with an integrated muzzle ammunition programmer and a number of different firing scenarios depending on target setup. The crew station design provides the gunner and commander with a continuous eye-on-target engagement feature (crew do not need to remove head from eye-piece to see and operate equipment).
The electronic architecture has been further upgraded for Mk III to be completely digitized. The mobility improvements, in the field of upgraded suspension and power to weight ratio, was performed to handle the increased gross vehicle weight. The improved survivability was mainly in the areas of mine protection and top attack. The horizontal protection has been designed in similar ways as to the other marks of CV90, i.e. appliqué systems. The first variant of the Mk III, the Mk III a, was delivered to The Netherlands and Denmark. The second, most modern Mk IIIb variant, was delivered to Norway.
CV90 Mk IV
The CV90 Mk IV is equipped with a new Scania engine up to 1000 horsepower and the latest upgraded X300 heavy-duty transmission. Its max weight has increased from 35 to 37 tons with space for two tons of additional payload without a decrease in vehicle agility. It features a new augmented reality system named iFighting. The iFighting concept fuses together data from different systems within the vehicle to filter through and prioritize the most critical information. This allows the crew to make quicker decisions to improve overall performance on the battlefield. The Mk IV generation will also be the first Western IFV with a qualified Active Protection System. It will be equipped with fourth generation electronic architecture supporting future technology adoption and growth.
Design
Various customer requirements have led to several variants of the CV90, where major differences are in survivability and electronic architecture. Higher protection has led to higher kerb weight; the vehicle's combat weight has risen from 23 to 35 tonnes. With increasingly more powerful diesel engines, the power-to-weight ratio has remained approximately the same. The track suspension system has seen upgrades in several stages.
The Mk III version has a digital electronic architecture with several different CAN-buses and digital networks, and is the first IFV incorporating an automatic Defensive Aid Suite which classifies threats and, in automatic mode, can fire smoke and/or the main gun to eliminate or evade targets, as well as instruct the driver on potential threats. At the Eurosatory 2010 exhibition, a version called Armadillo was presented. The Armadillo shown was an Armoured Personnel Carrier (APC) version. The basic chassis can be readily converted to ambulance, control vehicle or other turreted versions.
Protection
The CV9040's basic armour provides all-round protection against 14.5 mm armour-piercing rounds. Armour protection over the frontal arc is classified, but all models from CV9040B and later are said to be protected against 30 mm APFSDS. Some variants, including the CV9030N, can be fitted with MEXAS, a ceramic appliqué armor that provides protection against 30 mm APFSDS. This armour kit is intended to provide increased protection against Improvised explosive device, explosively formed penetrator and 30 mm caliber armour piercing rounds. All CV90s are fitted with a Spall liner, which covers the interior spaces and provides protection for the troops inside against shrapnel and anti-personnel artillery munitions.
The CV90 can be also fitted with cage armour, which provides protection against tandem-charge and shaped charge warheads. The CV90 is fitted with a nuclear, biological, and chemical (NBC) filtration system accompanied by a chemical detector and radiation detector systems. The CV90 also uses heat-absorbing filters to provide temporary protection against thermal imaging (TIS), image intensifier and infrared camera (IR). The CV 90 was designed to produce a very low and very compact structure to minimize radar and IR-signatures.
With every generation of CV90 there has been an increase in payload and corresponding protection levels. The inherent mine protection levels have risen substantially to presently defeat the heaviest (10 kg TNT) anti-tank mines.
In December 2016, BAE Systems received a contract from the Netherlands to test the Israel Military Industries (IMI) Iron Fist active protection system on their CV9035 vehicles. Iron Fist employs a multi-sensor early warning system using both infrared and radar sensors to deploy soft- and hard-kill countermeasures against anti-tank rockets and missiles. A decision for integration is to be made by early 2018.
Mobility
The CV90 Mk0 is powered by a DSI14 engine developed by Scania, which provides 550 horse power (HP) and it can reach speeds of per hour. The basic CV90 has a maximum road range of , but the latest generation can reach up to . The CV90 offers quieter movement for improved stealth, greater speed over good terrain, and higher ground clearance for protection against mines and improvised explosive devices.
BAE Systems is considering upgrading the CV90 with a hybrid-electric propulsion system as armies look to cut fuel expenses, due to environmental issues and fuel economy. A hybrid-electric drive could cut fuel consumption by 10 to 30 percent. The new system would also provide a power boost to move the vehicle. The hybrid-electric combines a standard diesel engine with a battery pack to provide extra power to propel the vehicle or provide additional electricity. BAE Systems Hägglunds uses the knowledge acquired through many years of hybrid-electric drive development for the military SEP vehicles and the ongoing civilian hybrid-electric projects for forest machines, airplane howlers and loaders.
In April 2015, BAE Systems fitted a CV90 with an active damping suspension system derived from Formula One racing cars. This technology calculates the vehicle's speed and anticipates the terrain ahead, then pressurizes the suspension at independent points to lift the chassis and keep the vehicle level. The suspension, which had been modified to suit a 38-ton armored vehicle rather than the racing car, reportedly increases speed by 30-40 percent on rough terrain, outrunning main battle tanks, decreases vehicle pitch acceleration by 40 percent, gives greater maneuverability and stability for on-the-move gunnery, and reduces crew fatigue and life-cycle costs.
Armament
The basic CV90 is fitted with a two-man turret armed with a 40 mm Bofors autocannon and a coaxial 7.62 mm machine gun. The CV90 also carries six 76-mm grenade launchers, which are arranged in two clusters of three launchers; the clusters are positioned on each side of the turret. The grenade launchers are intended for smoke grenades, but can also be loaded with a variety of combat grenades.
The CV90 export variants are fitted with a Hagglunds E-series turret, with more than 600 E30 and E35 turrets delivered. BAE Systems Australia Limited presented an offer for LAND 400 Phase 3 is the CV9035 with an E35 turret. It provides high commonality with BAE Systems’ LAND 400 Phase 2 CRV offer – the AMV35 – through its use of the same E35 turret system.
Sight
The CV90 is equipped with a UTAAS (Universal Tank and Anti-Aircraft Sight) from Saab. Daytime optical, thermal imaging System (TIS) and Generation III image intensification. The Norwegian IFV, C2, Recce, Mortar and Combat Engineer variants are delivered with the Kongsberg Protector Remote Weapon Station with 360 degrees day and night sights as well as hunter killer capability.
Production
Production of the CV 90 began in 1993, and as of 2014 over 1,200 vehicles had been ordered. In November 2000, Finland ordered 57 CV9030 vehicles. Total cost was €250 million (2008 value), or €4.42 million per vehicle. In June 2004, Finland made another purchase, bringing the overall quantity ordered to 102. This time, the cost was €2.92 million (2008 value) per vehicle. In December 2005, Denmark ordered 45 CV9035 vehicles for a cost of €188 million or €4.18 million per vehicle.
The Netherlands ordered 184 combat plus 8 instruction CV9035 vehicles for a cost of €749 million, or €3.9 million per vehicle. Norway initially bought 104 CV90s in the 1990s, buying new vehicles and upgrading the old ones in the 2010s. The Norwegian Army fields 164 CV90s, of which 74 are combat vehicles, 28 combat-engineering vehicles, 24 multi-purpose vehicles, 21 reconnaissance vehicles, 15 command vehicles, and two instruction vehicles. The upgrade of the Norwegian CV90s was estimated to cost around .
Research
In 2011, Hägglunds (now BAE Systems AB) demonstrated a version with an infrared camouflage called Adaptiv, consisting of thermoelectric plates capable of posing as many different objects, such as ordinary cars, stones, trees etc. to an enemy IR-viewfinder. It takes 1,500 plates to cover a CV90, at a cost of $100 per plate.
Variants
Domestic
The following versions were developed by Hägglund/Bofors in cooperation with FOA and FMV for Försvarsmakten as part of the Stridsfordon 90 (Strf 90)-family. Sweden originally planned for a mix of CV9040 and CV9025, tests of the 25 mm turret being carried out on an Ikv 91 chassis, but finally decided on the 40 mm version, due to the much higher versatility of the larger calibre.
Stridsfordon (Strf) 9040 (SB1A3): The original model carries eight soldiers and is equipped with a 40 mm Bofors autocannon. From November 1997, the gun was gyro-stabilized. Versions are referred to by the letters A, B or C depending on upgrades. All from A onwards remain in service.
Strf 9040 : Original production version with no gun stabilization and Lyran mortar. Incremental improvements were made during production; all have been upgraded to Strf9040A standard.
Strf 9040A: Strf 9040 upgraded with extensive chassis modifications and external gun stabilisation on turret front. It has more storage and better emergency exits, and the seats in the troop compartment were reduced to seven.
Strf 9040B: 9040A updated with improvements to armament (new fire control software, electric firing pin, fully stabilized gun with internal stabilisation and reserve sight with video camera for the gunner), improved suspension for better accuracy and crew comfort while moving, new instrumentation and new seatbelts.
Strf 9040B1: Strf9040B modified for international peacekeeping missions. It has a 3P ammunition programmer, climate control and anti-spall liner.
Strf 9040C: Upgraded version for crew training and international operations. As per 9040B1 with additional all-round armour, laser filtering in all periscopes and tropical grade air conditioning. Due to the bulk and weight of the modifications, only six soldiers can be carried.
Luftvärnskanonvagn (lvkv) 9040: Anti-air vehicle, fitted with PS-95 radar from Thomson CSF Harfang (now Thales Group) and a high elevation 40 mm autocannon capable of using programmable ammunition. It is connected to the national air defence net LuLIS. Three have been upgraded to C-standard. There is also a demonstrator, designated Lvkv 90-TD, fitted with infrared video targeting and a fully stabilized gun for firing on the move.
Strf 90120 / CV90120-T: Light tank demonstrator armed with CTG 120/L50 (Compact Tank Gun) developed by RUAG. The gun is 120mm smoothbore, calibre length 50, with a rate of fire of 12–14 rds/minute. 12 rounds are kept ready in the turret bustle, with a further 33 stowed in the hull rear.
Granatkastarpansarbandvagn (Grkpbv) 90: (Tracked Armoured Mortar Vehicle), producer name Mjölner: A CV 90 fitted with two 120 mm mortars. The 40 CV90 hulls for this project had already been purchased by 2003 and were originally intended to be equipped with the Patria Advanced Mortar System. For economic reasons, Genomförandegruppen recommended against it and the AMOS order was cancelled with the vehicles put in storage until BAE Systems AB received a contract in December 2016 to install Mjölner 120 mm mortars on the 40 CV90s to increase the indirect fire capability of mechanized battalions. The first units were scheduled to be delivered in January 2019 and all 40 vehicles will be delivered by 2020.
Stridsledningspansarbandvagn (Stripbv) 90 (Forward Command Vehicle): Used by the battalion and brigade commander for command and control. Two were upgraded to C-standard, but have been decommissioned as of 2011.
Eldledningspansarbandvagn (Epbv) 90''' (Forward Observation Vehicle): For directing artillery and mortar fire, a more advanced IR sensor was fitted; eight have been upgraded to C-standard.
Bärgningsbandvagn (Bgbv) 90, (Armoured Recovery Vehicle): Two 9-tonne winches provide a maximum capacity of 72 tonnes through 4-way pulleys. Three have been upgraded to C-standard, and at least one has been used in Afghanistan.
The command, forward observation and armoured recovery vehicles are armed only with a machine gun.
The following versions were not taken into Swedish army service.
Störpansarbandvagn (Störpbv) 90 (Electronic Warfare Vehicle): A 9040A had its turret replaced with a fixed housing containing retractable mast and a LEMUR weapons station. Planned in 2002, a single unit was produced before serial production was cancelled for economic reasons and as of 2013 the project is still on hold.
Stridsfordon 9040/56''': Prototype version of the CV 9040 equipped with the Bofors RB56 anti-tank missile. Issues with the sight alignment were unsolved and no units ordered.
Export versions
The export versions of CV90 is delivered with the combat proven BAE Systems Hägglunds E-series turrets with armament ranging from 30-120mm. The vast majority of the 600 turrets delivered are fitted with 30mm or 35mm guns.
CV9030
Export version with a 30 mm Bushmaster II autocannon. Adopted by Norway, Switzerland and Finland. Within BAE Systems Hägglunds, the original version of the Norwegian CV9030N is known as the CV90 MK I. The Finnish CV9030FIN and Swiss CV9030CH vehicles are known as the CV90 MK II. The CV90 MK II is also available as CV9030 COM – Command & Control Vehicle. The recently upgraded CV9030N infantry fighting, command & control and reconnaissance vehicles for Norway are known as CV90 MkIIIb, and this is the most advanced variant currently in service.
CV9035
Armed with a Bushmaster III 35/50 cannon. Adopted by the Netherlands as CV9035NL and Denmark as CV9035DK. Within BAE Systems Hägglunds, CV9035 is known as the CV90 MK III.
CV90105
Light tank equipped with 105 mm rifled tank gun/turret. Designed by Hägglunds (BAE Systems) and GIAT (Nexter). A newer version features the Cockerill XC-8 turret.
CV90120-T
Light tank equipped with a tank turret equipped with a smoothbore 120 mm gun. (RUAG 120 mm Compact Tank Gun)
CV90 CZ
Export variant designed in collaboration with VOP CZ marketed to the Czech Republic, manned turret variant.
CV90 CZr
Export variant designed in collaboration with VOP CZ marketed to the Czech Republic featuring a Kongsberg MCT-30 unmanned, remote controlled turret, a slightly raised hull and periscope system.
Armadillo
Armoured personnel carrier version built on a modular CV90 Mk III chassis. The CV90 Armadillo can be modified to become a personnel carrier, an ambulance, a command and control centre, a recovery vehicle and many other non-turreted variants at low cost due up to 80% commonality among variants. Currently, only the APC version has been built, with five delivered to Denmark for trials.
CV90RWS STING
Combat engineering variant built on CV90 Mk I chassis. This vehicle can be outfitted with either a mine plow or a mine roller, and it also has a robotic arm. 28 have been ordered by the Norwegian Army.
CV90RWS Multi BK
Mortar carrier variant built on a CV90 Mk I chassis. This vehicle is armed with a VingPos Mortar Weapon System outfitted with an 81mm L16A2 mortar. 24 have been ordered by the Norwegian Army.
CV90 MkIV
BAE-developed upgraded variant revealed in January 2018, marketed to the Czech Republic as well as existing customers as an upgrade package. Features include a Scania engine with up to 1000 horsepower, Perkins X300 transmission, and an increased payload of 2 tonnes. The system also includes BAE's iFighting computer system, which claims to enhance situational awareness, aid decision making, improve ergonomics, and enable autonomous support and remote operation.
CV9035NL MLU
On 13 January 2021, the Defence Materiel Organisation (DMO) of the Netherlands Armed Forces signed a contract with BAE Systems Hägglunds for a mid-life update of 128 CV90s of the Royal Netherlands Army, with an option for 19 further vehicles. The MLU project features a wide range of modernisations and improvements. The turret has been completely redesigned and will feature a new main gun installation, a mast-mounted 500mm extendable electro-optical sensor, Elbit Systems’ Iron Fist LD (Light Decoupled) active protection system, FN MAG general-purpose machine gun in an external pod and a twin missile launcher for Spike LRII anti-tank guided missiles. Furthermore, the CV90s will be equipped with rubber tracks, upgraded cooling, various cyber-security improvements and updated command and control infrastructure. Construction of the new turrets will be conducted by Dutch firm Van Halteren Defence.
Combat service
First use was by the Swedish UN forces in Liberia 2004, where 13 Stridsfordon 9040C were deployed.
Since production began in 1993, the CV90 had remained untested in combat until November 2007, when Norwegian Army CV90s from the 2nd Battalion saw heavy combat during Operation Harekate Yolo in Afghanistan. During the first week of November, Norwegian ISAF forces from the 2nd Battalion and Kystjegerkommandoen'' based in Mazar-e-Sharif, responded to a Taliban attack on Afghan National Army forces in the Ghowrmach district. Having been heavily outnumbered by the Taliban forces, the Norwegians used mortars and, in particular, CV90s, to suppress the attack. The operation left an unknown number of Taliban casualties, but Norwegian news sources say as many as 45 to 65 Taliban fighters may have been killed, and many more wounded.
The CV90 was later used extensively by ISAF forces of the Norwegian Army's Telemark Battalion in May 2008, when the battalion came under heavy machine gun and RPG fire from Taliban fighters during Operation Karez in Badghis Province. The attack left 13 Taliban fighters dead and an unknown number wounded. No allied casualties were reported. In January 2010, a Norwegian soldier was killed when a CV9030 hit a large IED in Ghowrmach, Afghanistan.
In February 2010, Denmark sent ten CV9035DKs to Afghanistan in order to bolster their contingent in Helmand Province. The Danish contingent had suffered numerous casualties since they began operations in the province in the autumn of 2006. The vehicles are from the Danish Royal Lifeguard Regiment, based in the Northern part of Seeland. They are working alongside MOWAG Piranha IIIC, MOWAG Eagle IV, M113 G3DK and Leopard 2A5DK vehicles, all contributed by Denmark, in the Helmand Province. By April 2010, two of the ten vehicles had been hit with IEDs, in both cases protecting the crew and passengers from personal injury. The vehicles lost two wheels and tracks, and were sent back to the manufacturer in Sweden for further investigation. On 7 August 2010, a CV9035DK hit an IED in Afghanistan, killing two soldiers and wounding another three. The explosion was so powerful that the vehicle was turned over.
Operators
Current operators
: 45 CV9035DK. 10 are upgraded to international operations.
: 44 CV9035NL purchased from the Netherlands in December 2014. Now referred as CV9035EE. First delivery took place in 2016. That same year, Estonia struck a deal with Norway to purchase an additional 35 surplus MK I hulls. Deliveries from the Netherlands completed on 1 April 2019.
: 102 CV9030FIN (57 first batch, 45 second batch). Unique in that they use a coaxial PKMT machine gun.
: 193 CV9035NL (initial order of 184 vehicles raised to 193). Deliveries completed in 2011. In December 2014, 44 CV9035NL were sold to Estonia.
: 164 (ordered) CV90 (all variants). 104 CV9030Ns were purchased in 1994. 17 of these were later upgraded with air-conditioning, additional mine protection, and rear-view cameras, and were designated CV9030NF1. In April 2012, the Norwegian Government proposed to upgrade all CV90s in the Norwegian Army's inventory, in addition to acquiring more vehicles. In June 2012, a deal was signed with BAE Systems Hägglunds and Kongsberg Defence & Aerospace for the acquisition of 144 new/upgraded vehicles, including 74 infantry fighting, 21 reconnaissance, 15 command, 16 engineering, 16 multi-role and two driver training vehicles. On February 18, 2021, it was announced that Norway had ordered another 12 combat engineering vehicles and 8 multi-role vehicles.
: 549 vehicles, including 42 CV9040C with additional armour.
: 186 CV9030CH
Potential operators
: The Czech Army is considering the CV90 as an option to replace the BMP-2 vehicle currently in service, but soon to be phased out. BAE Systems and VOP CZ first unveiled two Czech-specific export variants at the International Fair of Defence and Security Technology in Brno on 31 May 2017. In December 2018, the CV90 was shortlisted together with the Puma, ASCOD and Lynx.
: The CV90 is contending for the US Army's Next-Generation Combat Vehicle program.
Evaluation-only operators
: 1 CV9035 Mark III A combination of budget cuts and upgrades to the existing fleet of LAV IIIs have led the Canadian Army to cancel the procurement of light combat vehicles, where BAE Systems Hägglunds was offering its CV90.
Poland CV90120T on trials in 2007, later rebuilt into PL-01.
: competed with Scout SV as part of Future Rapid Effect System.
Specifications of variants (domestic)
See also
Lynx
ASCOD
Bionix
BMP-3
Dardo
K21
M2 Bradley
Puma
Type 89
Ajax
Makran
Tulpar (IFV)
References
External links
Combat Vehicle 90 in Army Technology
BAE Systems Hägglunds
SoldF.com – CV9040
Armada International 6/97-52 Information on the Norwegian IFV trials and changes found in the Norwegian CV9030
Danish CV9035 MkIII
Armoured personnel carriers of Sweden
Armoured fighting vehicles of the post–Cold War period
Tracked infantry fighting vehicles
Military vehicles introduced in the 1990s
|
10567064
|
https://en.wikipedia.org/wiki/Roundup%20%28issue%20tracker%29
|
Roundup (issue tracker)
|
Roundup is an open-source issue or bug tracking system featuring a command-line, web and e-mail interface. It is written in Python and designed to be highly customizable. Roundup was designed by Ka-Ping Yee for the Software Carpentry project and was developed from 2001-2016 under the direction of Richard Jones. Since then it has been developed by the Roundup community. It is currently the issue tracker for the Python programming language itself. It was once described as "like Bugzilla without the six years of training, or RT without that tedious MySQL rubbish."
Features
The standard configuration of Roundup features:
a web interface for viewing, editing and searching issues
a Mail gateway allowing creation and changing of issues
a database abstraction layer, currently supporting (among others) Python's built-in "anydbm" module, PostgreSQL, MySQL and SQLite
issue-specific "nosy lists", used for e-mail notifications and conversation (each issue effectively becoming a mini mailing list)
an authorization system, based on roles (of users), classes and objects
an interactive shell for backup and restore tasks and for manipulation of objects
Roundup supports several web backends. It can be run standalone, as a background daemon process, as a CGI script or as WSGI application.
Concepts
Roundup is customized by changing the contents of the tracker instance directory:
Database schema
The database schema is defined in a Python file in the tracker instance's root directory; it is
re-read whenever the server is started anew. When changes are found (e.g. new attributes), the tables of the underlying RDBS are altered accordingly.
Page templates
Roundup uses the Template Attribute Language (TAL) to create HTML or XHTML output. Version 1.5.0 adds experimental support for alternative template engines, such as Jinja2.
Templates are named after the classes in database. Roundup automatically chooses template based on class name requested from URL. Some templates are used for several classes, e.g. _generic.index.html, which allows (authorized) users to change the objects of all classes which lack an own index template.
When an "issue123" is requested, this designator is split in the issue class and the id "123". By default an "item" template is chosen: First, an issue.item.html template file is looked for; if it can't be found, _generic.item.html is used as a fallback option. If this is missing equally, an error occurs.
Detectors
Many Roundup functions, including some of the standard functionality, are implemented using so-called detectors, which are located in the "detectors" sub-directory of the tracker instance. They are Python subroutines which have access to the object to change (if already created) and the requested attribute changes.
Detectors are distinguished between auditors and reactors. Auditors are used primarily for several automatic changes (in the standard configuration, the assignedto user is automatically added to the nosy list of the issue), and to refuse un-allowed changes; reactors are executed thereafter and used e.g. for the e-mail notification feature, sending notification mails to all users interested in a certain issue when a comment is added to it.
Detectors are triggered whenever one of the actions
create
set (change of attributes)
retire
restore
is requested. They can be used to create an elaborated custom workflow.
Extensions
The instance subdirectory "extensions" can hold additional files which are needed for extended functionalities which can't (conveniently) be done with TAL; even totally new actions are possible.
Python modules which are used by both detectors and extensions can be put in the "lib" subdirectory
See also
Comparison of issue-tracking systems
References
External links
Bug and issue tracking software
Free project management software
Free software programmed in Python
Software using the MIT license
Web applications
Python (programming language) software
|
34594273
|
https://en.wikipedia.org/wiki/%28ISC%29%C2%B2
|
(ISC)²
|
The International Information System Security Certification Consortium, or (ISC)², is a non-profit organization which specializes in training and certifications for cybersecurity professionals. It has been described as the "world's largest IT security organization". The most widely known certification offered by (ISC)² is the Certified Information Systems Security Professional (CISSP) certification.
History
In the mid-1980s a need arose for a standardized and vendor-neutral certification program that provided structure and demonstrated competence in the field of IT security, and several professional societies recognized that certification programs attesting to the qualifications of information security personnel were desperately needed.
In June 1988, a conference was hosted by the National Institutes of Standards and Technology (NIST) and the Federal Information Systems Security Educators Association (FISSEA) at Idaho State University in Pocatello, Idaho to address the need for standardized curriculum for the burgeoning profession. Organizations in attendance included:
Canadian Information Processing Society (CIPS)
Computer Security Institute (CSI)
Data Processing Management Association Special Interest Group for Certified Professionals (DPMA SIG-CP)
Data Processing Management Association Special Interest Group for Computer Security (DPMA SIG-CS)
Idaho State University (ISU)
Information Systems Security Association (ISSA)
International Federation for Information Processing (IFIP)
During the conference, the question was raised why virtually every group represented, save NIST and ISU, was creating a professional certification. The conference participants agreed to form a consortium that would attempt to bring together the competing agendas of the various organizations. In November 1988, the Special Interest Group for Computer Security (SIG-CS), a member of the Data Processing Management Association (DPMA), brought together several organizations interested in this. The (ISC)² was formed in mid-1989 as a non-profit organization with this goal in mind [8].
By 1990, the first working committee to establish something called the Common Body of Knowledge (CBK) had been formed. The work done by that committee resulted in the first version of CBK being finalized by 1992, with the CISSP credential launched by 1994, followed by the SSCP credential in 2001, the CAP credential in 2005, and the CSSLP credential in 2008, the CCFP and HCISPP in 2013 and the CCSP in 2015.[9]
In 2001, (ISC)² established its Europe, Middle East and Africa regional office in London. In 2002, (ISC)² opened its Asia-Pacific regional office in Hong Kong. In 2015, (ISC)² introduced its North America regional office in Washington, D.C.
Since 2011, (ISC)² organizes the annual (ISC)² Security Congress conference. The 2019 conference will be the first international iteration of the event and will be held in Orlando, Florida.
Professional certifications
(ISC)² maintains what it calls a Common Body of Knowledge for information security for the following certifications:
Certified Information Systems Security Professional (CISSP), including:
Information Systems Security Architecture Professional (CISSP-ISSAP)
Information Systems Security Engineering Professional (CISSP-ISSEP)
Information Systems Security Management Professional (CISSP-ISSMP)
and including:
Certified Secure Software Lifecycle Professional (CSSLP)
Certified Authorization Professional (CAP)
Certified Cloud Security Professional (CCSP)
Systems Security Certified Practitioner (SSCP)
Health Care Information Security and Privacy Practitioner (HCISPP)
It is certified by ANSI that (ISC)² meets the requirements of ANSI/ISO/IEC Standard 17024, a personnel certification accreditation program. That accreditation covers the CISSP, SSCP, CISSP-ISSAP, CISSP-ISSEP, CISSP-ISSMP, CAP, and CSSLP certifications.
Continuous Professional Education
All (ISC)² certified professionals are required to earn Continuous Professional Education (CPE) credits on an annual basis in order to maintain their certifications. CPE credits can be obtained by attending industry events or conferences, writing articles/book reviews/books, etc.
Code of Ethics
All certified (ISC)² professionals are required to support the (ISC)² Code of Ethics. Violations of the code of ethics are each investigated by a peer review panel, within the potential of revoking the certification. (ISC)² (along with other security certification organizations) has been criticized for lack of education in the area of ethics.
See also
Certified Information Systems Security Professional
UK cyber security community
ISACA
References
External links
The (ISC)² website
ISC
Non-profit organizations based in Florida
Organizations established in 1988
Companies based in St. Petersburg, Florida
|
19369030
|
https://en.wikipedia.org/wiki/John%20Meredith%20%28folklorist%29
|
John Meredith (folklorist)
|
John Stanley Raymond Meredith OAM (17 January 1920 – 18 February 2001) was an Australian pioneer folklorist from Holbrook, New South Wales whose work influenced the Australian folk music revival of the 1950s, in particular as a founding member of the Australia's first bush band The Bushwhackers (unrelated to the contemporary band of similar name). He was awarded the Medal of the Order of Australia in 1986 for service to Australian folklore and music, and became a Member of the Order of Australia in 1992 for service to the Arts, particularly in the collection and preservation of Australian folklore.
Career
Early life
A pioneer collector of Australian folk music and song, John Meredith was born in Holbrook, New South Wales, to Bert and Ellen Meredith. Bert played the button (bush) accordion, often playing dance tunes for his family after dinner. Bert Meredith worked as a drover along the Darling and Murrumbidgee rivers in New South Wales and was often away. His father played the button accordion, an old and much patched Mezon Grand Organ model he probably learned to play whilst away droving and when he was at home he played the popular songs and dances of the Bush. He also played the mouth organ, using a tin pannikin as a resonator or playing the bones as he played on mouth organ. He died when John was only nine years old, but many of his tunes stayed in John's mind.
Ellen looked after John and six more on a small block in Holbrook and he remembers that she sang a little as she worked and she entertained the kids with readings from Australian books and magazines such as The Bulletin. Meredith took up the button accordion and at the age of fourteen, when Ellen promised him a brand new "Melba" model if he learnt how to play on his father's old and patched Mezon. He learned to play from the locals as well as learning some tunes from the gramophone. At seventeen or eighteen he began to assist with the playing at local dances and later would play for the entire evening if no other musician was available.
Meredith was educated at Holbrook Public School until the age of fourteen but was unable to complete the Intermediate Certificate as the family did not have the means to purchase the required school books. He developed an interest in Australian bush songs when he bought a copy of Banjo Paterson's Old Bush Songs. At the same time, he discovered photography. These three discoveries, music, bush songs and photographs were to become Meredith's lifetime passions.
He continued to develop his skills as a photographer and musician whilst working in Holbrook at a pharmacy. In 1944 Meredith moved to Melbourne and three years later decided to travel the east coast of Australia on his pushbike, picking up work where he could. During this time, Meredith travelled from Melbourne to Cairns and eventually settled in Sydney. In Sydney, Meredith joined the Eureka Youth League, the Communist Party, and the People's Choir. It was at this time that he began to seek out traditional Australian songs to include in the choir's repertoire.
In 1952 he was introduced to Jack Lee, an old man known as "Hoop-iron". "Hoop-iron" knew many of the old bush songs Meredith had been trying to find and Meredith started to record them. He soon discovered that he had uncovered an entire network of old singers and musicians who knew material that was assumed to have been lost from Australian culture. Meredith's long career as a folklore collector began. In the early 1950s Meredith formed Australia's first bush band The Bushwhackers (unrelated to the contemporary band of similar name). The band received much attention after performing in the very successful Sydney New Theatre production of the musical Reedy River, by Dick Diamond.
In 1954 Meredith became the secretary of the newly formed Australian Folklore Society and also assisted in the formation of the Bush Music Club in Sydney. During this time he spent every available weekend travelling throughout NSW collecting songs and dance tunes from some of Australia's finest traditional singers. In 1960 Meredith was the recipient of an Australian Literature Fund Grant for 500 pounds to publish a book based on his field work and recordings. He suffered a heart attack at this time and the book, Folk Songs of Australia, co-written by Hugh Anderson, did not appear until 1967. For the next ten years, Meredith continued to write about his work and published many more books about folk life in Australia.
The Bushwhackers and Reedy River
In 1952, Meredith formed the first Australian bush band with Jack Barrie and Brian Loughlin (misspelled Loughlan in some sources). Originally known as The Heathcote Bushwhackers, they were later simply known as The Bushwhackers. Meredith had begun to collect and record bush music and songs and the band aimed to perform this new repertoire to promote the folk music traditions of rural Australia. The band were unique in that they performed with traditional bush instruments. Meredith played the button (or bush) accordion or squeezebox, and the tin whistle. Barrie played the bush bass or tea chest bass and Loughlin played the lagerphone, also known as the Murrumbidgee River Rattler. Late in 1952 they gave their first performance at the Rivoli Hall in Hurstville. It was at this time that the name of the band was permanently changed to The Bushwhackers.
In December 1953 the band performed in the Sydney New Theatre amateur production of Reedy River, an Australian musical play written by Dick Diamond featuring bush and Australian folk music, some of which had been collected by Meredith. The success of Reedy River primarily inspired the Australian folk music revival of the 1950s. During that period, membership of the Bushwhackers expanded to include a number of the cast of the musical as well as others, eventually including Harry Kay, Alex (Alec) Hood, Cedric Grivas, Alan Scott and Chris Kempster. In 1954 Meredith was one of the founding members of the first club set up to cater to this interest, the Bush Music Club of Sydney.
The Bushwhackers disbanded in 1957. Various of its members continued to perform in bush bands such as "The Rambleers" and "The Galahs", while Meredith continued to collect field recordings of Australian traditional and folk music, as well as performing with "The Shearers" and the Bush Music Club's "Concert Party".
Later life
In 1981 Meredith re-discovered his love for collecting and photographing Australian bush singers and musicians, which he continued to do until his health failed him. The Meredith Collection is housed at the National Library of Australia and contains nearly 8,000 catalogued items including photos and material collected from over 700 performers. This included unpublished manuscripts such as 'Will Ogilvie – the Scottish jackaroo'.
In 2001, Meredith passed away in Albury, New South Wales. He never married. Meredith's biography More than a Life: John Meredith and the Fight for Australian Tradition was written by Keith McKenry and released in 2014.
Original works
Meredith also wrote unpublished ballad opera and rock opera. He wrote several plays, including The Wild Colonial Boy with Joan Clarke, first produced by Brisbane New Theatre in 1955, and How Many Miles from Gundagai performed by the Bushwhackers.
Song collecting
Some of the songs and music featured in the production of Reedy River had been collected by Meredith himself. He collected a wide variety of folk music, including Sally Sloane, a traditional singer with a large repertoire of songs many of which had not been collected previously. Meredith also collected songs by Duke Tritton, a poet and songwriter whose work reflected his experiences as a shearer and as an unemployed itinerant worker during the Great Depression. Both song books and non-fiction works on the folklore of Australia were published by Meredith over the course of his career.
Meredith continued to collect field recordings of traditional songs and music throughout his life. His recordings are housed in the Meredith Collection at the National Library of Australia.
Publications
Books
Bushwhacker Songs: Old and New Sydney: John Meredith, ca.1955
Songs From Lawson By Henry Lawson, edited by John Meredith. Woollomooloo, N.S.W.: Bush Music Club, 1956, 1957
Reedy River: The Songs from the Australian Musical Drama By Dick Diamond. Sydney: New Theatre, 1960
The Wild Colonial Boy: The Life and Times of Jack Donahoe 1808(?)-1830 Sydney, N.S.W.: Wentworth Press, 1960
Folk Songs of Australia and the Men and Women Who Sang Them By John Meredith and Hugh Anderson. Sydney: Ure Smith, ca.1967, 1968, 1973
Folk Songs of Australia and the Men and Women Who Sang Them By John Meredith and Hugh Anderson. Dee Why West, N.S.W.: Ure Smith, 1979
Frank, The Poet: The Life and Works of Francis MacNamara By John Meredith and Rex Whalan. Melbourne: Red Rooster, 1979
Ned Kelly After A Century of Acrimony By John Meredith and Bill Scott. Sydney: Lansdowne Press, 1980
The Coo-ee March: Gilgandra-Sydney 1915 Dubbo, N.S.W.: Macquarie Publications, 1981
The Donahoe Ballads Ascot Vale, Vic.: Red Rooster Press, ca.1982
The Wild Colonial Boy: Bushranger Jack Donahoe, 1806–1830 Ascot Vale, Vic.: Red Rooster Press, 1982
Duke of the Outback: The Adventures of "A Shearer Named Tritton" Vale, Vic.: Red Rooster Press, 1983
Learn To Talk Old Jack Lang: A Handbook of Australian Rhyming Slang By John Meredith, drawings by George Sprod. Kenthurst, N.S.W.: Kangaroo Press, 1984
Folk Songs of Australia and the Men and Women Who Sang Them By John Meredith and Hugh Anderson. Kensington, N.S.W: New South Wales University Press, 1985–1987
The Householders' Compendium Shepparton, Vic.: Night Owl, 1986
The Coo-ee March: Gilgandra-Sydney, 1915 Kenthurst, N.S.W.: Kangaroo Press, 1986
King of the Dance Hall: The Story of Fifty Years of Ballroom Music with Frank Bourke and the White Rose Orchestra Kenthurst, N.S.W.: Kangaroo Press, c1986
Folk Songs of Australia and the Men and Women Who Sang Them: Volume 2 By John Meredith, Roger Covell and Patricia Brown. Kensington, N.S.W.: New South Wales University Press, 1987
Gallant Peter Clark Woden, A.C.T.: Popinjay, 1988
The Last Kooradgie: Moyengully, Chief Man of the Gundungurra People Kenthurst, N.S.W.: Kangaroo Press, 1989
Breaker's Mate : Will Ogilvie in Australia, of Scottish-Australian poet and bush balladeer Will H. Ogilvie (1869–1963), compiled and edited by John Meredith. Kenthurst, N.S.W.: Kangaroo Press, ca.1996
Other works
Meredith also authored a large number of magazine articles (full list unavailable) plus numerous original photographs, audio recordings and some film segments. A list of over 1,000 items deposited at the National Library of Australia with author = "Meredith, John, 1920-2001" can be generated here. Several of his film clips have been since made available by the National Library of Australia/National Film and Sound Archive of Australia via YouTube (see "External Links").
References
External links
John Meredith, Austlit (15 September 2006). Retrieved 18 September 2008.
John Meredith National Library of Australia Retrieved 18 September 2008.
Chris & Virginia Woodland Collection - Photos of John Meredith The Bush Music Club (5 August 2017). Retrieved 2 November 2019.
John Meredith interviewed by Philip Ashton talking about his lifetime of collecting dances and tunes (no associated details, probably late 1980s); performs "Jack's Waltz" on accordion at end.
John Meredith folklore films on YouTube: Real Folk: Part 1 (1987) and Real Folk: Part 2, provided by the National Film and Sound Archive of Australia (NFSA).
John Meredith recording Carrie Milliner in 1993 - copy on YouTube. Carrie sings two songs, Barbara Allen and Bonnie Moon.
Ebb Wren sings "The Forbes Flood" filmed by John Meredith - copy on YouTube.
John Meredith recording Lenny Cook - copy on YouTube. Len sings two songs from the Australian tradition - Jacksons and Batlow Creek. Filmed and uploaded by Rob Willis.
The Bobbins of Nulliga recorded by John Meredith - copy on YouTube
The Man from Cookamidgera: Songs and Music of Colin Charleton (1990) recorded by John Meredith - copy on YouTube. Filmed by Rob Willis.
The Dawsons of Swamp Rd, Franklin, Tasmania recorded and filmed by John Meredith - copy on YouTube.
1920 births
2001 deaths
20th-century Australian non-fiction writers
Australian folklorists
|
5220650
|
https://en.wikipedia.org/wiki/Centralized%20computing
|
Centralized computing
|
Centralized computing is computing done at a central location, using terminals that are attached to a central computer. The computer itself may control all the peripherals directly (if they are physically connected to the central computer), or they may be attached via a terminal server. Alternatively, if the terminals have the capability, they may be able to connect to the central computer over the network. The terminals may be text terminals or thin clients, for example.
It offers greater security over decentralized systems because all of the processing is controlled in a central location. In addition, if one terminal breaks down, the user can simply go to another terminal and log in again, and all of their files will still be accessible. Depending on the system, they may even be able to resume their session from the point they were at before, as if nothing had happened.
This type of arrangement does have some disadvantages. The central computer performs the computing functions and controls the remote terminals. This type of system relies totally on the central computer. Should the central computer crash, the entire system will "go down" (i.e. will be unavailable).
Another disadvantage is that central computing relies heavily on the quality of administration and resources provided to its users. Should the central computer be inadequately supported by any means (e.g. size of home directories, problems regarding administration), then your usage will suffer greatly. The reverse situation, however, (i.e., a system supported better than your needs) is one of the key advantages to centralized computing.
History
The very first computers did not have separate terminals as such; their primitive input/output devices were built in. However, soon it was found to be extremely useful for multiple people to be able to use a computer at the same time, for reasons of cost – early computers were very expensive, both to produce and maintain, and occupied large amounts of floor space. The idea of centralized computing was born. Early text terminals used electro-mechanical teletypewriters, but these were replaced by cathode ray tube displays (as found in 20th century televisions and computers). The text terminal model dominated computing from the 1960s until the rise to dominance of home computers and personal computers in the 1980s.
Contemporary status
As of 2007, centralized computing is now coming back into fashion – to a certain extent. Cloud computing has had an important role in the return of centralized computing. Thin clients have been used for many years by businesses to reduce total cost of ownership, while web applications are becoming more popular because they can potentially be used on many types of computing device without any need for software installation. Already, however, there are signs that the pendulum is swinging back again, away from pure centralization, as thin client devices become more like diskless workstations due to increased computing power, and web applications start to do more processing on the client side, with technologies such as AJAX and rich clients.
In addition, mainframes are still being used for some mission-critical applications, such as payroll, or for processing day-to-day account transactions in banks. These mainframes will typically be accessed either using terminal emulators (real terminal devices are not used much any more) or via modern front-ends such as web applications – or (in the case of automated access) protocols such as web services protocols.
Diskless node model
Some organizations use a diskless node model partway between centralized computing and conventional desktop computing, in which some applications (such as web browsers) are run locally, while other applications (such as critical business systems) are run on the terminal server. One way to implement this is simply by running remote desktop software on a standard desktop computer.
Hosted computing model
A relatively new method of centralized computing, hosted computing, solves many of the problems associated with traditional distributed computing systems. By centralizing processing and storage on powerful server hardware located in a data center, rather than in a local office, it relieves organizations of the many responsibilities in owning and maintaining an information technology system. These services are typically delivered on a subscription basis by an application service provider (ASP).
See also
Computer terminal
Decentralized computing
Linux Terminal Server Project
Multiseat
Terminal Services
Thin client
Time sharing
Zero client
References
Cloud computing
Centralized, Decentralized, & Distributed Networks Explained
|
3004023
|
https://en.wikipedia.org/wiki/Shlomi%20Dolev
|
Shlomi Dolev
|
Shlomi Dolev (, born December 5, 1958) is a Rita Altura Trust Chair Professor in Computer Science at Ben-Gurion University of the Negev (BGU) and the head of the BGU Negev Hi-Tech Faculty Startup Accelerator.
Biography
Shlomi Dolev received B.Sc. in Civil Engineering and B.A. in Computer Science in 1984 and 1985, and his M.Sc. and D.Sc. in computer science in 1990 and 1992 from the Technion Israel Institute of Technology. From 1992 to 1995 he was at Texas A&M University as a visiting research specialist.
Academic career
In 1995 Dolev joined the Department of Mathematics and Computer Science at BGU. He was the founder and first department head of the Computer Science Department, established in 2000. After 15 years, the department was ranked among the first 150 best departments in the world.
He is the author of Self-Stabilization published by MIT Press in 2000. From 2011 to 2014, Dolev served as Dean of the Natural Sciences Faculty. From 2010 he has served for six years, as the Head of the Inter University Computation Center of Israel.
He is a co-founder, board member and CSO of Secret Double Octopus. He is also a co-founder of Secret Sky (SecretSkyDB) Ltd. In 2015 Dolev was appointed head of the steering committee on computer science studies of the Israeli Ministry of Education.
Dolev together with Yuval Elovici and Ehud Gudes established the Telekom Innovation Laboratories at Ben-Gurion University. Dolev was instrumental in establishing the IBM Cyber Security Center of Excellence (CCoE) in Collaboration with Ben-Gurion University of the Negev, and JVP Cyber Labs. Several agencies and companies support his research including ISF, NSF, IBM (faculty awards), Verisign, EMC, Intel, Orange France, Deutsche Telekom, US Airforce and the European Union in the sum of several millions of dollars.
Dolev was a visiting professor at MIT, Paris 11, Paris 6 and DIMACS. He served in more than a hundred program committees, chairing two leading conferences in distributed computing, DISC 2006, and PODC 2014. Recently Prof. Dolev established and chaired the International Symposium on Cyber Security Cryptography and Machine Learning.
Dolev serves as an Associate Editor of the IEEE Transactions on Computers and PeerJ.
Dolev became a fellow of the European Alliance for Innovation in 2019, (EAI), and in 2020 became IEEE fellow.
Research work
Dolev turned a workshop on self-stabilization (Austin, 1989) into a series of events on the subject.
Dolev's MA thesis, under the supervision of Shlomo Moran and Amos Israeli resulted in the most cited paper on self-stabilization, following the pioneering paper of Dijkstra introducing the concept of fair composition of self-stabilizing systems. Dolev's contribution to the investigation of self-stabilization spans several decades of research and publications, including research on randomized self-stabilizing algorithms, He has researched Super Stabilizing algorithms that react gracefully to dynamic changes while preserving the automatic recovery property offered by self-stabilizing systems. Dolev also introduced with co-authors, the concepts of, Silent Stabilization, Local stabilization, Practically Stabilizing, Self-stabilizing and Self-organizing, Transient Failure Detectors and yielding Labeling Schemes. He also presented the first silent self-stabilizing depth first search distributed algorithm.
Another research interest is mobile ad-hoc networks, including the use of messages random walks, GeoQuarum and virtual infrastructure, where mobile devices currently populating a geographic region implement virtual automata for the region, yielding a fixed infrastructure.
Dolev's research in cryptography and cyber security research contributions include the introduction of the xor-trees and buses, secret sharing communication and the accumulating automata and secret shared random-access machine, which evolved to patents and establishment of start-ups.
Research on optical computing and complexity complements Dolev's cryptographic research, searching for the use of computation gaps, and provable hard on average instances. Dolev initiated a series of four optical supercomputing workshops and several journal special issues (e.g., Optical High-Performance Computing—JOSA A and Applied Optics and Optical SuperComputing). Published several papers including a commentary in the Nature photonics journal, a nature communication contribution on reversible computing and a patent.
Dolev has also contributed to research in Complex Networks, Hash Function Data Structures, Brain Science, Real-time Computation, Compression, Game Theory, Erasure Correcting, Transactional Memory, Error Correcting Computations, Verification, Machine Learning, Nanotechnology and Cache replacement policy.
References
External links
Shlomi Dolev's home page at the Ben-Gurion University.
Living people
Israeli computer scientists
Theoretical computer scientists
Researchers in distributed computing
1958 births
|
620746
|
https://en.wikipedia.org/wiki/Interface%20%28computing%29
|
Interface (computing)
|
In computing, an interface is a shared boundary across which two or more separate components of a computer system exchange information. The exchange can be between software, computer hardware, peripheral devices, humans, and combinations of these. Some computer hardware devices, such as a touchscreen, can both send and receive data through the interface, while others such as a mouse or microphone may only provide an interface to send data to a given system.
Hardware interfaces
Hardware interfaces exist in many components, such as the various buses, storage devices, other I/O devices, etc. A hardware interface is described by the mechanical, electrical, and logical signals at the interface and the protocol for sequencing them (sometimes called signaling). A standard interface, such as SCSI, decouples the design and introduction of computing hardware, such as I/O devices, from the design and introduction of other components of a computing system, thereby allowing users and manufacturers great flexibility in the implementation of computing systems. Hardware interfaces can be parallel with several electrical connections carrying parts of the data simultaneously or serial where data are sent one bit at a time.
Software interfaces
A software interface may refer to a wide range of different types of interface at different "levels": an operating system may interface with pieces of hardware. Applications or programs running on the operating system may need to interact via data streams, filters, and pipelines; and in object oriented programs, objects within an application may need to interact via methods.
In practice
A key principle of design is to prohibit access to all resources by default, allowing access only through well-defined entry points, i.e., interfaces. Software interfaces provide access to computer resources (such as memory, CPU, storage, etc.) of the underlying computer system; direct access (i.e., not through well-designed interfaces) to such resources by software can have major ramifications—sometimes disastrous ones—for functionality and stability.
Interfaces between software components can provide constants, data types, types of procedures, exception specifications, and method signatures. Sometimes, public variables are also defined as part of an interface.
The interface of a software module A is deliberately defined separately from the implementation of that module. The latter contains the actual code of the procedures and methods described in the interface, as well as other "private" variables, procedures, etc. Another software module B, for example the client to A, that interacts with A is forced to do so only through the published interface. One practical advantage of this arrangement is that replacing the implementation of A with another implementation of the same interface should not cause B to fail—how A internally meets the requirements of the interface is not relevant to B, which is only concerned with the specifications of the interface. (See also Liskov substitution principle.)
In object-oriented languages
In some object-oriented languages, especially those without full multiple inheritance, the term interface is used to define an abstract type that contains no data but defines behaviours as method signatures. A class having code and data for all the methods corresponding to that interface and declaring so is said to implement that interface. Furthermore, even in single-inheritance-languages, one can implement multiple interfaces, and hence can be of different types at the same time.
An interface is thus a type definition; anywhere an object can be exchanged (for example, in a function or method call) the type of the object to be exchanged can be defined in terms of one of its implemented interfaces or base-classes rather than specifying the specific class. This approach means that any class that implements that interface can be used. For example, a dummy implementation may be used to allow development to progress before the final implementation is available. In another case, a fake or mock implementation may be substituted during testing. Such stub implementations are replaced by real code later in the development process.
Usually a method defined in an interface contains no code and thus cannot itself be called; it must be implemented by non-abstract code to be run when it is invoked. An interface called "Stack" might define two methods: push() and pop(). It can be implemented in different ways, for example, FastStack and GenericStack—the first being fast, working with a data structure of fixed size, and the second using a data structure that can be resized, but at the cost of somewhat lower speed.
Though interfaces can contain many methods they may contain only one or even none at all. For example, the Java language defines the interface that has the single method; various implementations are used for different purposes, including , , , , and . Marker interfaces like contain no methods at all and serve to provide run-time information to generic processing using Reflection.
Programming to the interface
The use of interfaces allows for a programming style called programming to the interface. The idea behind this approach is to base programming logic on the interfaces of the objects used, rather than on internal implementation details. Programming to the interface reduces dependency on implementation specifics and makes code more reusable.
Pushing this idea to the extreme, inversion of control leaves the context to inject the code with the specific implementations of the interface that will be used to perform the work.
User interfaces
A user interface is a point of interaction between a computer and humans; it includes any number of modalities of interaction (such as graphics, sound, position, movement, etc.) where data is transferred between the user and the computer system.
See also
Abstraction inversion
Application binary interface
Application programming interface
Business Interoperability Interface
Computer bus
Hard disk drive interface
Implementation (computer science)
Implementation inheritance
Interoperability
Inheritance semantics
Modular programming
Software componentry
Virtual inheritance
References
Object-oriented programming
Programming constructs
|
11701576
|
https://en.wikipedia.org/wiki/Frankish%20mythology
|
Frankish mythology
|
Frankish mythology comprises the mythology of the Germanic tribal confederation of the Franks, from its roots in polytheistic Germanic paganism through the inclusion of Greco-Roman components in the Early Middle Ages.
This mythology flourished among the Franks until the conversion of the Merovingian king Clovis I to Nicene Christianity (c. 500), though there were many Frankish Christians before that. After that, their paganism was gradually replaced by the process of Christianisation, but there were still pagans in the late 7th century.
Pre-Christian traditions
The majority of pagan Frankish beliefs may share similarities with that of other Germanic peoples. If so, then it may be possible to reconstruct the basic elements of Frankish traditional religion.
The migration era religion of the Franks likely shared many of its characteristics with the other varieties of Germanic paganism, such as placing altars in forest glens, on hilltops, or beside lakes and rivers, and consecration of woods. Generally, Germanic gods were associated with local cult centres and their sacred character and power were associated with specific regions, outside of which they were neither worshipped nor feared.
Other deities were known and feared and shared by cultures and tribes, although in different names and variations. Of the latter, the Franks may have had one omnipotent god Allfadir ("All Father"), thought to have lived in a sacred grove. Germanic peoples may have gathered where they believed him to live, and sacrificed a human life to him.
Variants of the phrase All Father (like Allfadir) usually refer to Wuotan (Woden, Óðinn/Odin), and the Franks probably believed in Wuoton as "chief" of blessings, whom the first historian Tacitus called "Mercurius", and his consort Freia, as well as Donar (Thor), god of thunder, and Zio (Tyr), whom Tacitus called "Mars". According to Herbert Schutz, most of their gods were "worldly", possessing form and having concrete relation to earthly objects, in contradistinction to the transcendent God of Christianity. Tacitus also mentioned a goddess Nerthus being worshipped by the Germanic people, in whom Perry thinks the Franks may have shared a belief. With the Germanic groups along the North Sea the Franks shared a special dedication to the worship of Yngvi, synonym to Freyr, whose cult can still be discerned in the time of Clovis.
In contrast to many other Germanic tribes, no Merovingians claimed to be descended from Wodan.
Some rich Frankish graves were surrounded by horse burials, such as Childeric's grave.
Symbolism of cattle
The bulls that pulled the cart were taken as special animals, and according to Salian law the theft of those animals would impose a high sanction. Eduardo Fabbro has speculated that the Germanic goddess Nerthus (who rode in a chariot drawn by cows) mentioned by Tacitus, was the origin of the Merovingian conception of Merovech, after whom their dynasty would be named. The Merovingian kings riding through the country on an oxcart could then be an imaginative reenactment the blessing journey of their divine ancestor. In the grave of Childeric I (died 481) was found the head of a bull, craftily made out of gold. This may have represented the symbol of a very old fertility ritual, that centred on the worship of the cow. According to Fabbro, the Frankish pantheon expressed a variation of the Germanic structure that was especially devoted to fertility gods.
However, a more likely explanation is that the Merovingian ox-cart went back to the Late-Roman tradition of governors riding through the province to dispense justice in the company of angariae, or ox wagons belonging to the imperial post. The bull in Childeric's grave was probably an insignificant object imported from elsewhere, and belongs to a wide artistic usage of bulls in pre-historic European art.
Foundation myth
The Frankish mythology that has survived in primary sources is comparable to that of the Aeneas myth of in Roman mythology, but altered to suit Germanic tastes. Like many Germanic peoples, the Franks told a founding myth to explain their connection with peoples of classical history. In the case of the Franks, these people were the Sicambri and the Trojans. An anonymous work of 727 called Liber Historiae Francorum states that following the fall of Troy, 12,000 Trojans led by their kings Priam and Antenor moved through the Sea of Azov and up the Tanais (Don) river and settled in Pannonia, where they founded a city called "Sicambria". After altercations with the Alans and Emperor Valentinian (late 4th century AD), who renamed them Franks, they moved to the Rhine.
These stories have obvious difficulties if taken as fact. Historians, including eyewitnesses like Caesar, have given us accounts that places the Sicambri firmly at the delta of the Rhine and archaeologists have confirmed ongoing settlement of peoples. The Franks also appear close to the Rhine earlier than the 4th century. Frankish historian Fredegar, who also has the Franks originate in Troy but, under an eponymous king named Francio, lets them move straight to the Rhine without mentioning the Sicambri. For these reasons, current scholars think that this myth was not prevalent, certainly not historical: for example, J. M. Wallace-Hadrill states that "this legend is quite without historical substance". Ian Wood says that "these tales are obviously no more than legend" and "in fact there is no reason to believe that the Franks were involved in any long-distance migration".
In Roman and Merovingian times, panegyrics played an important role in the transmission of culture. A common panegyrical device was the use of archaic names for contemporary things. Romans were often called "Trojans" and Franks were called "Sicambri". A notable example related by the sixth-century historian Gregory of Tours states that the Merovingian Frankish leader Clovis I, on the occasion of his baptism into the Catholic faith, was referred to as a Sicamber by Remigius, the officiating bishop of Rheims. At the crucial moment of Clovis' baptism, Remigius declared, "Bend your head, Sicamber. Honour what you have burnt. Burn what you have honoured." It is likely that in this way a link between the Sicambri and the Franks was being invoked. Further examples of Salians being called Sicambri can be found in the Panegyrici Latini, the Life of King Sigismund, the Life of King Dagobert, and other sources.
Sacral kingship
Before Clovis converted to Catholic Christianity, pagan Frankish rulers probably maintained their elevated positions by their "charisma"; their legitimacy and "right to rule" may have been based on their supposed divine descent as well as their financial and military successes. The concept of "charisma" has been controversial.
Fredegar tells a story of the Frankish king Chlodio taking a summer bath with his wife when she was attacked by some sort of sea beast, which Fredegar described as bestea Neptuni Quinotauri similis, ("the beast of Neptune that looks like a Quinotaur"). Because of the attack, it was unknown if Merovech, the legendary founder of the Merovingian dynasty was conceived of Chlodio or the sea beast.
In later centuries, divine kingship myths would flourish in the legends of Charlemagne (768–814) as a divinely-appointed Christian king. He was the central character in the Frankish mythology of the epics known as the Matter of France. The Charlemagne Cycle epics, particularly the first, known as Geste du Roi ("Songs of the King"), concern a King's role as champion of Christianity. From the Matter of France, sprang some mythological stories and characters adapted through Europe, such as the knights Lancelot and Gawain.
Notes
References
Primary
Pseudo-Fredegar. Historia, in Monumenta Germaniae Historica, Scriptores Rerum Merovingicarum, Tomus II. Hannover: 1888.
Gregory of Tours. The History of the Franks. Lewis Thorpe, trans. Penguin Group. .
Publius Cornelius Tacitus. Germania.
Secondary
Daly, William M. "Clovis: How Barbaric, How Pagan?" Speculum, vol. 69, no. 3 (July 1994), pp. 619–664.
Fabbro, Eduardo. "Germanic Paganism among the Early Salian Franks." The Journal of Germanic Mythology and Folklore. Volume 1, Issue 4, August 2006.
Murray, Archibald Callander, and Goffart, Walter A. After Rome's Fall: Narrators and Sources of Early Medieval History. Toronto: University of Toronto Press, 1998.
Nelson, Janet L. "Royal Saints and Early Medieval Kingship." Studies in Church History, 10 (1973), pp. 39–44. Reprinted in Politics and Ritual in Early Medieval Europe. Janet L. Nelson, ed. London: Hambledon Press, 1986. pp. 69–74. .
Perry, Walter Copland. The Franks, from Their First Appearance in History to the Death of King Pepin. Longman, Brown, Green: 1857.
Prummel, W., and van der Sanden, W. A. B. "Runderhoorns uit de Drentse venen." Nieuwe Drentse Volksalmanak, 112. 1995. pp. 84–131.
Prummel, W., and van der Sanden, W. A. B. "Een oeroshoren uit het Drostendiep bij Dalen." Nieuwe Drentse Volksalmanak, 119. 2002. pp. 217–221.
Raemakers, Daan. De Spiegel van Swifterbant. Groningen: 2006.
Schutz, Herbert. The Germanic Realms in Pre-Carolingian Central Europe, 400–750. American University Studies, Series IX: History, Vol. 196. New York: Peter Lang, 2000.
Tessier, Georges. Le Baptême de Clovis. Paris: Gallimard, 1964.
Wallace-Hadrill, J. M. The Long-Haired Kings. London: Butler & Tanner Ltd, 1962.
Wood, Ian. The Merovingian Kingdoms, 450-751 AD. 1994.
Germanic mythology
Mythology
French mythology
|
27958349
|
https://en.wikipedia.org/wiki/Archon%20Information%20Systems
|
Archon Information Systems
|
Archon Information Systems, L.L.C. (“Archon”) is a Delaware corporation that provides technology and collection services to government clients.
The focus of Archon's services is the collection and management of delinquent ad valorem taxes, which are local governments' major source of revenue. Software development is the core of Archon’s business model, and utilizes the test-driven development design method. The company's best-known software products are the CivicSource brand of proprietary software, including CivicSource Administrator (for management of property taxes) and CivicSource Auctioneer (for conducting Internet-based tax and foreclosure sales). Archon's first major client, the City of New Orleans, used the company's software and services to host multiple online tax sales. The first of these was the first online tax sale in the Gulf South region, and the first tax sale held in New Orleans, Louisiana, after Hurricane Katrina. New Orleans netted increased revenue in property tax collection over previous sales to date.
History
With corporate headquarters in New Orleans, Louisiana, Archon has representatives in states across the U.S. focused on outreach to local governments. Archon was founded in January 2008 by three professionals native to New Orleans, Louisiana. Bryan P. Barrios, chief executive officer, had been working in the legal field, specifically with local tax collections, for 12 years with a law firms in the City of New Orleans at Archon's formation. Barrios has drafted several pieces of legislation for both New Orleans and for the Louisiana State Legislature relative to the area of municipal tax collections, including the provision pertaining to online tax sales in Archon's home state.
Also at the time of formation, Chief Operations Officer Beau L. Button and Chief Technology Officer William D. Sossamon had been working in technology for over 12 years, and had worked on technology projects and contracts with multiple Fortune 500 companies before creating Archon. In 2012, both were named Top Young Entrepreneurs to Watch in New Orleans by Under30CEO.
Archon software and services has been behind multiple online tax sales throughout the State of Louisiana. These were first of its kind in the region, and the first tax sales of any kind post-Katrina. Archon services also facilitated all the statutory requirements relative to tax sale notifications, certificates and filings. The pre-tax sale collection efforts driven by Archon technology resulted in more timely collections and an increase in revenue for all of its tax sale clients.
The company has approximately 53 employees in its New Orleans headquarters.
Products
Archon develops its own software titles and offers a range of products and services; Archon also works with clients to custom-develop software.
CivicSource Software Suite
The CivicSource proprietary software suite consists of three primary components (CivicSource Administrator, CivicSource Auctioneer and CivicSource Services) that consolidate every aspect of tax management, tax collection or tax sale. The suite provides governments the ability to search, view and edit taxable properties and owners, provides for digital management of documents associated with the delinquent properties, and provides a platform for online disposition of tax liens, tax deeds, adjudicated and foreclosed properties.
Corporate
Archon's headquarters are located in the Central Business District of Downtown New Orleans, on the 17th floor of the New Orleans Exchange Centre.
Notes
External links
, the company's official website
CivicSource
2008 establishments in Louisiana
Companies based in New Orleans
Financial services companies established in 2008
Downtown New Orleans
Online companies of the United States
|
5943072
|
https://en.wikipedia.org/wiki/Survivor%20Series%20%281989%29
|
Survivor Series (1989)
|
The 1989 Survivor Series was the third annual Survivor Series professional wrestling pay-per-view (PPV) event produced by the World Wrestling Federation (WWF, now WWE). It took place on Thanksgiving Day on November 23, 1989, at the Rosemont Horizon in the Chicago suburb of Rosemont, Illinois. This was the first Survivor Series event in which the teams bore explicit names and consisted of four (instead of five) members.
The main event was a four-on-four Survivor Series match in which The Ultimate Warriors (The Ultimate Warrior, The Rockers (Shawn Michaels and Marty Jannetty), and Jim Neidhart) defeated The Heenan Family (Bobby Heenan, The Colossal Connection (André the Giant and Haku) and Arn Anderson).
Production
Background
Survivor Series is an annual gimmick pay-per-view (PPV), produced every November by the World Wrestling Federation (WWF, now WWE) since 1987. In what has become the second longest running pay-per-view event in history (behind WWE's WrestleMania), it is one of the promotion's original four pay-per-views, along with WrestleMania, Royal Rumble, and SummerSlam, which were dubbed the "Big Four". Like the previous two years, the third event in the Survivor Series chronology only featured Survivor Series matches, which are tag team elimination matches. While those two previous events had included three matches that pitted teams of five wrestlers against each other and one that pitted five tag teams against each other, all five of the Survivor Series matches at the 1989 event were teams of four wrestlers against each other. It was scheduled to be held on Thanksgiving Day on November 23, 1989, at the Rosemont Horizon in the Chicago suburb of Rosemont, Illinois.
Storylines
The card included matches that resulted from scripted storylines, where wrestlers portrayed heroes, villains, or less distinguishable characters in scripted events that built tension and culminated in a wrestling match or series of matches. Results were predetermined by WWF's writers, with storylines produced on their weekly television shows.
A major feud heading into Survivor Series was between The Ultimate Warriors (WWF Intercontinental Heavyweight Champion Ultimate Warrior and The Rockers (Shawn Michaels and Marty Jannetty) and Jim Neidhart vs. The Heenan Family, The Colossal Connection (André the Giant and Haku) and The Brain Busters (Arn Anderson and Tully Blanchard). Bobby Heenan was a very popular heel manager, who led many heel wrestlers to championship victories in the WWF and his clients feuded with all babyface wrestlers. Ultimate Warrior had been placed in a feud with Heenan's client Rick Rude which began at Royal Rumble when Warrior won by fan reaction over Rude in a posedown. Rude followed by attacking him. They feuded with each other until the summer of the year, in which they exchanged the Intercontinental Heavyweight Championship with each other. The Rockers were in a feud with Brain Busters, that had also begun since the beginning of the year. The feud began on January 30, 1989 edition of Prime Time Wrestling where The Brain Busters faced The Rockers. In the match, The Brain Busters narrowly defeated the Rockers as Anderson held down Marty Jannetty's leg as Blanchard pinned him. The Rockers and The Brain Busters faced each other in a rematch on March 11 Saturday Night's Main Event XX which resulted in a double countout. They were added to the main event of Survivor Series in opposing teams.
Dusty Rhodes began a feud with Big Boss Man in mid-1989, when Rhodes came to the aid of a preliminary wrestler during the July 22nd episode of WWF Superstars of Wrestling (taped June 28), stealing the Big Boss Man's nightstick and handcuffs in the process. Later in the same episode of WWF Superstars of Wrestling, Rhodes was a guest on The Brother Love Show, where he proclaimed that "no one was afraid of the Boss Man anymore." Rhodes captained the Dream Team, while the Big Boss Man captained The Enforcers. Akeem, one half of The Twin Towers, defeated Brutus Beefcake in a King of the Ring tournament qualifying match on October 14, leading to a feud between Beefcake and Akeem. Beefcake joined Dusty's Dream Team while Akeem was scheduled to be a member of Enforcers. Tito Santana and Rick Martel, former Strike Force teammates had been feuding with each other since WrestleMania V, where Martel turned heel by abandoning Santana during their match against Brain Busters (Arn Anderson and Tully Blanchard). At SummerSlam, Martel and The Fabulous Rougeaus (Jacques and Raymond Rougeau) defeated Santana and The Rockers (Shawn Michaels and Marty Jannetty). Martel became a member of The Enforcers while Santana was added to The Dream Team. The Honky Tonk Man and The Red Rooster wrestled a series of house show matches in the fall of 1989, with Honky winning most of these encounters. Honky was added to The Enforcers, while the Red Rooster joined The Dream Team.
Randy Savage turned heel in early 1989, breaking up The Mega Powers. He defeated Jim Duggan later that same year to win the title of "King of Wrestling", beginning a feud between Duggan and himself. Greg Valentine and Ronnie Garvin had been feuding since a match on December 30, 1988 in Madison Square Garden (MSG) which Valentine won by grabbing the tights for leverage. On April 22, 1989 episode of Superstars, Garvin defeated Valentine in a match. On the following edition of Superstars, they both faced each other in a retirement match in which the loser could not wrestle anymore in WWF. Valentine won the match, sending Garvin into retirement. Garvin became a referee for the WWF. During this time, he punched several wrestlers who physically provoked him, including Valentine in the course of his match against Jimmy Snuka, and he was suspended after the match. Valentine was also involved in a feud with Hercules, which culminated at SummerSlam where Valentine defeated Hercules by pinning him using the ropes for leverage. Garvin was the guest ring announcer for the match, and not only did he verbally mock Valentine during the introduction, but he also announced Hercules as the winner by disqualification. Valentine was so furious that he demanded Garvin be reinstated as a professional wrestler, and his request was accepted. Garvin and Hercules were included as members of 4x4s at Survivor Series, and Valentine was added as a member of King's Court. Dino Bravo was involved in a feud with Bret Hart. At Royal Rumble, Jim Duggan, Hart and Jim Neidhart defeated Bravo and The Fabulous Rougeaus in a two out of three falls match, so Bravo became a member of King's Court at Survivor Series and Hart became a member of 4x4s.
Hulk Hogan starred in the WWF-financed professional-wrestling movie No Holds Barred as the protagonist, Rip. Tommy Lister Jr. portrayed Rip's arch rival Zeus in the movie, who is defeated by Rip. It turned out into a rivalry that took place in the WWF. Lister was billed as Zeus, who wanted to take revenge of the movie from Hogan in real-life. He debuted on May 27, 1989 Saturday Night's Main Event XXI before Hogan's WWF World Heavyweight Championship title defense against Big Boss Man in a steel cage. Boss Man's manager Slick introduced him. Zeus attacked Hogan during Hogan's entrance. The feud culminated at SummerSlam where Hogan and Brutus Beefcake defeated Randy Savage and Zeus. Zeus was scheduled to become a part of Million $ Team against Hogan's Hulkamaniacs team at Survivor Series. At WrestleMania V, Ted DiBiase attempted to steal Jake Roberts' snake Damien during Roberts' match against André the Giant beginning a rivalry between Roberts and DiBiase. Roberts defeated DiBiase's manager Virgil on Superstars but after the match, DiBiase injured him and sidelined him for months. Roberts returned in late 1989 and signed to become a part of Hogan's Hulkamaniacs team against DiBiase's Million $ Team. Demolition (Ax and Smash) were pushed as a heel tag team in the WWF in 1988 under the tutelage of Mr. Fuji. A stronger and powerful babyface tag team The Powers of Pain (The Warlord and The Barbarian) debuted in the summer of 1988 and challenged Demolition for the WWF Tag Team Championship. At Survivor Series, Fuji caused Demolition to get eliminated in a Survivor Series match resulting in a double turn as Powers of Pain turned heels and Demolition turned babyfaces. At WrestleMania V, Demolition defeated Powers of Pain and Mr. Fuji in a handicap match to retain the tag titles, culminating in Demolition joining Hulkamaniacs at Survivor Series and Powers of Pain joining Million $ Team in Survivor Series.
At SummerSlam, Roddy Piper interfered in Rick Rude's WWF Intercontinental Heavyweight Championship title defense against Ultimate Warrior and distracted Rude, causing Rude to lose the title to Warrior. This led to Rude and Piper captaining teams against each other at Survivor Series. Rude's team was dubbed "Rude Brood," and Piper's team was dubbed "Roddy's Rowdies". Jimmy Snuka became a part of Rowdy's Rowdies and Mr. Perfect became a part of Rude Brood. The Bushwhackers (Bushwhacker Butch and Bushwhacker Luke) feuded with The Fabulous Rougeaus (Jacques Rougeau and Raymond Rougeau) in early 1989. This led to their WrestleMania V encounter where Bushwhackers won, leading to Bushwhackers joining Roddy's Rowdies and Rougeaus joining Rude Brood.
Event
Before the event aired live on pay-per-view, Boris Zhukov defeated Paul Roma in a dark match. The opening included superstars expressing what they were thankful for, followed by a rundown of the card narrated by Vince McMahon. The first Survivor Series match was between The Dream Team (Dusty Rhodes, Brutus Beefcake, The Red Rooster and Tito Santana) and The Enforcers (Big Boss Man, Bad News Brown, Rick Martel and The Honky Tonk Man). Originally, Boss Man's tag team The Twin Towers partner Akeem was scheduled to be a part of The Enforcers but was replaced by Brown. Rick Martel and Tito Santana, two former Strike Force partners and current rivals began the match. Martel pinned Santana with a roll-up, eliminating Santana, leaving Dream Team with three members. Sapphire made another appearance in the audience, after appearing the previous week on TV cheering on Dusty Rhodes in a match against Akeem. Like the previous year, Bad News Brown walked out on his team after arguing with team captain Big Boss Man and getting counted out. Both teams continued with three members each until Brutus Beefcake pinned Honky Tonk Man after a high knee, eliminating Honky and leaving Enforcers with only two members – Boss Man and Martel. Martel entered but failed to eliminate Beefcake. Instead, Beefcake pinned Martel with a roll-up, eliminating him and leaving Enforcers' captain Boss Man as the remaining member. He managed to pin Red Rooster after a Boss Man Slam. He fought the opposing Dream Team's captain Dusty Rhodes. The two captains had a battle with each other, which Rhodes won after he pinned Boss Man with a flying crossbody. Dream Team won with Rhodes and Beefcake as the survivors.
The second Survivor Series match was between The King's Court (Randy Savage, Canadian Earthquake, Dino Bravo and Greg Valentine) and 4x4s (Jim Duggan, Bret Hart, Ronnie Garvin and Hercules). Canadian Earthquake was a replacement for The Widowmaker, after Windham left the company in October due to his family’s involvement in a counterfeit scandal. Hercules and Earthquake began the match. Earthquake hit Hercules an Earthquake Splash and pinned Hercules to eliminate him, leaving 4x4s with three members. Greg Valentine came next against the team captain of the 4x4s, Jim Duggan. Duggan used his bigger size on Valentine and hit him with a three-point stance charging clothesline and pinned Valentine to eliminate him, leaving King's Court with three members too. Dino Bravo brawled with Ronnie Garvin. Bravo hit Garvin a side slam and pinned Garvin to eliminate him, leaving 4x4s with two members – Duggan and Bret Hart. Hart used his high-flying ability but fell victim to a Savage Elbow by opposing team King's Court captain Randy Savage. Savage followed by pinning Hart and eliminating him, leaving 4x4s with their captain Duggan. Duggan was able to fend himself against King's Court, who were all three. However, Savage's valet Queen Sherri interfered which distracted Duggan. Duggan went to the outside to chase her and got counted out. King's Court won the match with Savage, Earthquake, and Bravo as the survivors. After the match, Duggan grabbed his 2x4 and attacked Savage, Earthquake and Bravo with it.
The main event was a third Survivor Series match between The Hulkamaniacs (WWF World Heavyweight Champion Hulk Hogan, WWF Tag Team Champions Demolition (Ax and Smash) and Jake Roberts and Million Dollar Team Ted DiBiase, Powers of Pain (The Warlord and The Barbarian) and Zeus. Zeus shoved the referee at the 3:21 minute mark, so he was disqualified and got eliminated, leaving Million Dollar Team with three members. Ax and Warlord battled each other. Ax dominated Warlord until Powers of Pain's manager Mr. Fuji distracted him. Warlord took advantage and pinned Ax to eliminate him, leaving Hulkamaniacs with three members to even the score. Ax's Demolition partner Smash entered the match and battled it out with Warlord's Powers of Pain partner Barbarian. Smash tried to take revenge of Ax's elimination from Barbarian but was pinned after a flying clothesline, getting eliminated and leaving Hulkamaniacs with two members – Jake Roberts and Hulk Hogan. Warlord and Barbarian double-teamed Hogan, so they were disqualified and eliminated, leaving Million Dollar Team's captain Ted DiBiase as the only member remaining in the match. Roberts got the upper hand on DiBiase until DiBiase's manager Virgil distracted Roberts. With his feet on the ropes for leverage, DiBiase pinned and eliminated Roberts. It all came down to the team captains, with Hogan hitting a leg drop on DiBiase, pinning him to win the match and become the sole survivor for his team.
The fourth Survivor Series match was between The Rude Brood (Rick Rude, Mr. Perfect and The Fabulous Rougeaus (Jacques and Raymond Rougeau) and Roddy's Rowdies (Roddy Piper, Jimmy Snuka and The Bushwhackers (Bushwhacker Butch and Bushwhacker Luke). The high-flying Jimmy Snuka and Jacques Rougeau began the match with Snuka eliminating Jacques with a Superfly Splash, leaving The Rude Brood with three members. Jacques' brother and Fabulous Rougeaus partner Raymond battled opposing team captain Roddy Piper. Piper hit Raymond with a piledriver and pinned Raymond to eliminate him, leaving Rude Brood with only two members – Mr. Perfect and team captain Rick Rude. Perfect had been pushed as an undefeated wrestler since joining WWF in 1988. He pinned Bushwhacker Butch with a roll-up to eliminate him, leaving Rowdy's Rowdies with three members. Butch's Bushwhackers partner Bushwhacker Luke battled Rude, but unluckily was hit with a Rude Awakening and got pinned, getting eliminated and leaving Rowdy's Rowdies with two members. With both teams down to two members captains Rude and Piper battled each other until both were counted-out, leaving only Perfect from The Rude Brood and Snuka from Roddy's Rowdies. Snuka used his high-flying techniques on Perfect but was unable to pin him. Perfect hit Snuka a Perfectplex to win the match and become the sole survivor for The Rude Brood.
The fifth Survivor Series match was between The Ultimate Warriors (WWF Intercontinental Heavyweight Champion The Ultimate Warrior, The Rockers (Shawn Michaels and Marty Jannetty) and Jim Neidhart) and The Heenan Family (manager Bobby Heenan, The Colossal Connection (André the Giant and Haku) and Arn Anderson). Arn Anderson's Brain Busters partner Tully Blanchard was originally scheduled to be a part of The Heenan Family but was fired from the WWF on the day of the pay-per-view for failing a drug test. He was replaced by Bobby Heenan. At first, only Neidhart, Jannetty and Michaels were introduced for the face team, and as soon as the Rockers entered the ring, Neidhart attacked Heenan while Michaels and Jannetty went after Anderson and Haku. André went after the faces, attacking at will until Warrior ran out, jumped into the ring and, after sending him reeling with a series of clotheslines, knocked André to the floor. André was counted out at the 26-second mark, giving the Warrior's team a quick 4-3 advantage. Later, Neidhart and Anderson were brawling when, after Anderson was knocked to the floor, Haku snuck up from behind and struck Neidhart with a thrust kick to score the pin. Anderson and Haku used a series of double-team moves to wear down Janetty, and eventually, Heenan was tagged in to score the easy pin and give the Heenan Family a 3-2 edge. After Haku missed with a flying crossbody, Michaels used a crossbody of his own to pin Haku. At this point, Anderson began showing signs of frustration with Heenan but was still able to eliminate Michaels after hitting him with a Spinebuster. Anderson held a short-lived advantage over Warrior, but the beginning of the end for the heels came when Warrior whipped Anderson into Heenan (who was standing on the apron), knocking the latter to the floor. Warrior pinned Anderson after hitting him with a gorilla press drop–big splash combination. As Heenan began regaining his senses and arguing with Anderson, thinking him to be walking out on the match, Warrior snuck around ringside and snuck up on Heenan, who realized what had happened. Warrior grabbed Heenan, whipped him across the ring and after knocking him down with a shoulder tackle, hit him with a big splash to score the pin and become the sole survivor for his team. Warrior, after briefly posing in the ring with his Intercontinental Heavyweight Championship belt, knocked down a groggy Heenan in the aisle, shortly before the pay-per-view signed off.
Aftermath
The main event confrontation between Hulk Hogan and Zeus was set up for a special late-December pay-per-view event called No Holds Barred: The Match/The Movie, in which actor Tommy Lister – in his "Zeus" character – was paired with Randy Savage (his tag-team partner from SummerSlam 1989) and Hogan and Brutus "the Barber" Beefcake were reunited for a special tag team steel cage match, which Hogan and Beefcake won.
The Ultimate Warrior was successful in the WWF's mid-card division in 1989, so his match at Survivor Series was run last to give the event a Warrior-themed ending, although Hogan's match was promoted as the main event contest. The biggest match of Warrior's career was at WrestleMania VI where he defeated Hulk Hogan to win the WWF World Heavyweight Championship in a title vs. title match in which Warrior's WWF Intercontinental Heavyweight Championship was also on the line.
André the Giant and Haku had teamed together occasionally prior to the 1989 Survivor Series as members of the Heenan Family, but this was their first high-profile match as a tag team. After Survivor Series, the two formally formed a tag team known as The Colossal Connection, in part to fill a void in the Heenan Family left by the imminent departure of Anderson and Blanchard, but also to prolong the ailing Andre's career – the effects of his real-life acromegaly were starting to take their toll – by including him in a team in which the younger, healthy Haku would handle most of the wrestling. On December 13, 1989, André and Haku would win the WWF Tag Team Championship by defeating Demolition at a television taping in Huntsville, Alabama, and would hold on to the titles until Demolition gained revenge at WrestleMania VI, defeating The Colossal Connection and setting in motion André's face turn in what was the final WWF match of his career.
Results
Survivor Series elimination matches
Other on-screen personnel
References
External links
Official 1989 Survivor Series website
1989
Professional wrestling in the Chicago metropolitan area
1989 in Illinois
Events in Rosemont, Illinois
1989 WWF pay-per-view events
November 1989 events in the United States
|
15197219
|
https://en.wikipedia.org/wiki/Debbugs
|
Debbugs
|
Debbugs is the software powering the Debian project's issue tracking system. Uniquely it doesn't have any form of web-interface to edit bug reports all modification is done through email. Debbugs was mainly written by Ian Jackson, former Debian project leader.
Debbugs consists of a set of scripts which maintain a database of problem reports. The scripts have been parameterised so that they can be used for other projects besides Debian. The system runs on Unix-like operating systems such as Unix and Linux. Most of the source code is written in Perl. It is free software, licensed under the GNU General Public License.
It is strongly recommended that people use the reportbug program when reporting bugs in Debian.
History
Debbugs started as a rudimentary issue tracking system in 1994. The software was generalized starting from 1997 but was only officially released as Debbugs 1 in January 1999.
Soon after the GNOME project abandoned Debbugs, the KDE project also switched to Bugzilla in 2002.
Deployments
The oldest and largest deployment of Debbugs is the Debian project's. , the Debian debbugs instance had handled over 890,000 bug reports.
The GNU Project has deployed a public instance of debbugs that can be used by GNU software or GNU Savannah-hosted free software.
Integration
Ubuntu's Launchpad recognizes and integrates with Debian's debbugs instance.
See also
References
External links
Debian bug tracking system
Debbugs source code
Debian wiki's page on Debian's issue tracking system, with a good part of information on Debbugs in general
Debian bug report logs as they shown in November 1995, reflecting an early state of Debbugs
Bug and issue tracking software
Debian
Free software programmed in Perl
Perl software
|
2647181
|
https://en.wikipedia.org/wiki/Round-robin%20DNS
|
Round-robin DNS
|
Round-robin DNS is a technique of load distribution, load balancing, or fault-tolerance provisioning multiple, redundant Internet Protocol service hosts, e.g., Web server, FTP servers, by managing the Domain Name System's (DNS) responses to address requests from client computers according to an appropriate statistical model.
In its simplest implementation, round-robin DNS works by responding to DNS requests not only with a single potential IP address, but with a list of potential IP addresses corresponding to several servers that host identical services. The order in which IP addresses from the list are returned is the basis for the term round robin. With each DNS response, the IP address sequence in the list is permuted. Traditionally, IP clients initially attempt connections with the first address returned from a DNS query, so that on different connection attempts, clients would receive service from different providers, thus distributing the overall load among servers.
Some resolvers attempt to re-order the list to give priority to numerically "closer" networks. This behaviour was standardized during the definition of IPv6, and has been blamed for defeating round-robin load-balancing. Some desktop clients do try alternate addresses after a connection timeout of up to 30 seconds.
Round-robin DNS is often used to load balance requests among a number of Web servers. For example, a company has one domain name and three identical copies of the same web site residing on three servers with three IP addresses. The DNS server will be set up so that domain name has multiple A records, one for each IP address. When one user accesses the home page it will be sent to the first IP address. The second user who accesses the home page will be sent to the next IP address, and the third user will be sent to the third IP address. In each case, once the IP address is given out, it goes to the end of the list. The fourth user, therefore, will be sent to the first IP address, and so forth.
A round-robin DNS name is, on rare occasions, referred to as a "rotor" due to the rotation among alternative A records.
Drawbacks
Although easy to implement, round-robin DNS has a number of drawbacks, such as those arising from record caching in the DNS hierarchy itself, as well as client-side address caching and reuse, the combination of which can be difficult to manage. Round-robin DNS should not solely be relied upon for service availability. If a service at one of the addresses in the list fails, the DNS will continue to hand out that address and clients will still attempt to reach the inoperable service.
Round-robin DNS may not be the best choice for load balancing on its own, since it merely alternates the order of the address records each time a name server is queried. Because it does not take transaction time, server load, and network congestion into consideration, it works best for services with a large number of uniformly distributed connections to servers of equivalent capacity. Otherwise, it just does load distribution.
Methods exist to overcome such limitations. For example, modified DNS servers (such as lbnamed) can routinely poll mirrored servers for availability and load factor. If a server does not reply as required, the server can be temporarily removed from the DNS pool, until it reports that it is once again operating within specs.
References
Domain Name System
Internet terminology
Fault-tolerant computer systems
Load balancing (computing)
|
19788423
|
https://en.wikipedia.org/wiki/Overture%20%28software%29
|
Overture (software)
|
Overture is a music notation (scorewriter) program for Windows and Macintosh platforms, published and developed by Sonic Scores. Visually, the Overture scoring interface resembles Encore, an earlier notation program, on which the same author had previously worked. While Overture is primarily a scorewriter program, its graphic interface also has the ability to allow editing the score's MIDI audio playback data in the manner of sequencer and digital audio workstation (DAW) software. Additionally, it has the ability to play film video footage synchronized to the score playback, and to insert precise time markers into the score.
Overture was the first scorewriter to feature full Virtual Studio Technology (VST) hosting, allowing audio playback of the score with virtual instruments, controlled by the program's mixing-desk style interface. The software also enables graphical editing of all MIDI audio playback data for every individual note, either on the score itself, or via a scrolling view in the style of a DAW. This scrolling MIDI data view can be displayed as a piano roll view or on musical staff lines.
Editing and note entry
Note entry
In Overture, input of note data can be done by any of several methods: via an onscreen virtual piano keyboard; via the computer keyboard; directly onto the staves with the mouse; or with a MIDI keyboard. MIDI keyboard note entry may be done by playing pitches singly ("step entry") or by real-time recording. For keyboard or mouse step entry, note lengths are selected from a palette or via the numeric keys (for example, pressing 4 selects quarter notes, pressing 8 selects eighth notes). Computer keyboard note entry in Overture 5 is performed by typing the letter name of the musical pitches (optionally followed by the Enter key, depending on user settings), followed by the letter "o" or "O" if an octave change upwards or downwards, respectively, is required.
Editing
Most notational symbols can be repositioned by dragging them with the mouse. Most other editing of notational symbols is performed by selecting the symbols using the mouse, and selecting the appropriate editing command from a menu or by clicking on a palette. MIDI data such as note durations and loudness (note velocities) are edited in a piano roll graphical view, which includes a bar graph allowing editing of the parameters such as velocity, of individual notes. Alternatively, MIDI durations and loudness can be edited on the score itself.
Overture 5 and higher supports editing and page navigation, such as pinch-to-zoom, using one's fingers or a stylus on touch screens.
Background and Development
In the early 1990s, the music notation software market was dominated by the Finale program, published by Coda. It was capable of handling large, complicated scores and non-traditional notation. However, its immense power and flexibility came at the expense of a "complex user interface".
Other notation programs with different interfaces were eventually developed, including Encore, which Williams had previously worked on. Encore featured the ability to add notes by simply selecting the note value on a palette and placing it in the required position on a staff; most notational elements could also be selected with the mouse, but unlike Finale, at the time, Encore was unable to handle many unconventional notation elements.
In 1994, Professor Alan Belkin of the University of Montreal published a study of notation software available at the time (dominated by programs for Macintosh). Among other things, it described the advantages and disadvantages of the mouse- and keyboard-driven approaches to notation-interface design, which he exemplified referring to Encore and Finale, respectively, and other software packages.
When Overture was developed, the developer aimed to retain Encore's previous user-friendly interface design, but included the ability to notate elements regarded as complex at that time. These included adjustable engraver spacings between elements, non-standard notehead shapes, varying numbers of staff lines, guitar fingering charts, and tablature notation. Each line of drums staves could be user-mapped to different percussion instruments It was also the first music scorewriter software that gave users control over all MIDI playback data such as note velocity, pitch bend and duration.
As in another of Williams' previous projects, the music sequencer program Master Tracks Pro, Overture includes a scrolling "piano roll" MIDI-editing view where notes could be moved and changed with the mouse. Later versions have the ability to view the piano roll alongside either a visual piano keyboard, or treble and bass staves.
When first released in 1994, Overture always showed the score in a fully editable WYSIWYG page view, in which all notational elements could be entered or edited. This contrasted with Finale, in which, at the time, the user had to select between a large number of editing modes before performing different types of edits. Later versions of Overture also introduced a scrolling linear view, which enabled editing of both notational elements and playback data. Most previous notation programs either lacked an editable WYSIWYG page view, or switched between a scrolling linear view used for editing; and a page view used for print previews with limited editing functions only, as in Finale at the time.
As of 2017, Overture supports synchronized film/video playback, and plugins such as Garritan instrument libraries.
In 2018, Sonic Scores announced the release of the Amadeus Symphonic Orchestra sampled instrument library, accessible in Overture using the Kontakt instrument library interface. The Amadeus instrument library contains a large number of sampled instruments, playing with different articulations.
As at June 2021, Overture is in version 5.6.3-3. Sonic Scores generally releases multiple updates each year, with the current version as the main download at the Sonic Scores website, listed with past updates, although not every previous update is publicly available. Updates often include improvements suggested by the user community.
Publisher
Overture has been continuously maintained by the developer since it was first released. It was originally published by Opcode Systems, which produced MIDI sequencing and digital audio software. After Opcode ceased product development in 1999, having been bought out by Gibson Brands, Overture found a new publisher, Cakewalk. Cakewalk published the software from 1999 to 2001. In 2001, Williams' own company, GenieSoft – now known as Sonic Scores – purchased Overture from Cakewalk. Greg Hendershott, CEO of Cakewalk at the time, announced, "The fact that GenieSoft founder Don Williams is the original developer of these products is great news for those customers. He's committed to continuing customer support and product enhancements." GenieSoft later changed its name to Sonic Scores, and has published and developed Overture since 2001.
Sonic Scores also markets Score Writer, a less expensive version of Overture with reduced features. In addition, Sonic Scores is known as the publisher of the Amadeus Symphonic Orchestra sampled instrument library, which is compatible with many scorewriter programs.
Demonstration versions of Overture and Score Writer are available at the Sonic Scores website. The demonstration versions are fully functional for a 30 day trial period, after which, saving and printing are disabled. Site licences are also sold.
Website, support and user community
Support from the developer and the user community is provided via a support forum area on the website. Version release information on each update and beta versions are also available via the forum.
Reviews
Reviewers of Overture have generally highlighted the software's logical user interface and ease of use, although some reviewers have found version 5 less intuitive.
In 1996, Marc Battier reviewed version 1.2 of the program for the Leonardo Music Journal, writing, "...Overture has found its place among the highly regarded common music notation software for the Macintosh." Battier points out that Overture is set apart by its ability to edit MIDI playback data whilst retaining a full set of notational tools, "It is less usual to see notation programs that have substantial MIDI control implementation... Overture has clearly inherited a number of features from its older cousin, the well-known sequencer Vision... One can use the program as a MIDI sequencer while retaining full capability of editing data with a comprehensive music notation set of tools." While Battier felt a weakness was that, at the time, Overture lacked a function to create user-drawn graphics, he points out that these can be imported. He praised the ability to create custom MIDI drum maps, and Overture's tool palettes, which can be put out of the way of the score workspace.
In 1997, Ross Whitney reviewed version 2 of the software in the Music Library Association's journal, Notes. Praising Overture's design, he wrote, "Built on a solid base of experience and insight... the program can hardly be considered immature. Its design is essentially intuitive, efficient and flexible." He adds that "Overture accommodates virtually every standard notational practice of Western music used by educators, professional composers, arrangers and copyists."
In 2012, Chad Criswell, of MusicEdMagic, reviewed Overture version 4, writing, "The Overture music notation system is another in a long line of lesser known but well designed music writing programs... the Overture system provides most of the same functionality and capabilities as Finale or Sibelius but does so in a lighter, somewhat easier to use package."
Criswell observes how changing noteheads, and adding articulations and markings, while cumbersome in some software, is easy in Overture. He writes, "One of the more helpful things I discovered right off the bat in Overture is that they put the options for changing the appearance of music note heads, articulations, and other markings right up front in easy to use pull down menus.... Overture makes it very easy."
However, Criswell also notes that Overture version 4 "...is good but not perfect", pointing out that it lacked instrument parts which are dynamically linked to the master score. (Version 5, released in 2016, allows viewing, layout editing and printing of individual parts directly within the master document.)
In 2019, Ana Marculescu, of the Romanian tech-news site, Softpedia, reviewed version 5. Marculescu describes Overture as "an advanced software application designed for helping composers, music educators and students create complex tabulator scores." Marculescu was somewhat overwhelmed by the interface of version 5, "The layout cannot be described as highly intuitive as it may look a bit overwhelming at a first glance." Marculescu sums up, "All in all, Overture includes a comprehensive suite of editing tools and symbols palettes that can be used by professional musicians in order to compose music."
Score Writer
Score Writer is a program also available from Sonic Scores. It has the same scoring interface as Overture, but with a lower price and without graphic MIDI data view and many of the advanced features available in Overture. Score Writer is marketed as a simple package for people new to notation and composition, and easily allows the creation of small to medium ensemble scores of up to 20 tracks/instruments, and lead sheets with guitar frames. In Score Writer, the score page view zooming is limited to small, medium and large sizes in WYSIWYG page layout view only.
Among the more advanced features of Overture which are not included in Score Writer are: cross-staff and feathered beaming; graphic view MIDI editing (although MIDI data can be edited on-score); automatic and customised guitar tablature; video playback and SMPTE time code insertion into the score; compatibility with VST and the Amadeus Symphonic Orchestra instrument library; custom engraver spacing; ability to hide individual staves; and ossia staves.
Compatibility
When first released, Overture ran only on Mac OS computers, with a Windows version being added in a later release. Overture versions from 3 onwards have been released for both Windows and Mac OS. The software is 64-bit native, and is compatible with MacOS 11 (Big Sur). Overture 5 requires Windows 7 or later, or MacOS 10.9 or later.
As of 2021, the Overture interface operates in English, French, Chinese, Norwegian and Spanish.
Overture is compatible with VST and Kontakt player libraries.
In addition to its own file format, (.ove and .ovex), Overture can read and write the industry standard Music XML (.musicxml and .mxl) files for sharing scores with other music scoring programs. It can read Score Writer (.scwx) files, and can open, play and edit MIDI audio data files (.mid) as scores.
See also
List of music software
References
External links
Overture 5 Introduction video on YouTube.
Video of Overture 5.2 playing a string quartet
Review of Overture by Chad Criswell of MusicEdMagic
Scorewriters
|
22168004
|
https://en.wikipedia.org/wiki/Information%20Warfare%20Monitor
|
Information Warfare Monitor
|
The Information Warfare Monitor (IWM) was an advanced research activity tracking the emergence of cyberspace as a strategic domain. Created in 2003, it closed in January 2012. It was a public-private venture between two Canadian institutions: The SecDev Group, an operational think tank based in Ottawa (Canada), and the Citizen Lab at the Munk School of Global Affairs, University of Toronto. The Principal Investigators and co-founders of the Information Warfare Monitor are Rafal Rohozinski (The Secdev Group) and Ronald Deibert (Citizen Lab). The Information Warfare Monitor is part of the Citizen Lab’s network of advanced research projects, which include the OpenNet Initiative, the Fusion Methodology Centre, and PsiLab.
It was an independent research effort and its stated mission was to build and broaden the evidence base available to scholars, policy makers, and others.
The research of the Information Warfare Monitor was supported by the Canada Centre for Global Security Studies (University of Toronto), a grant from the John D. and Catherine T. MacArthur Foundation, in-kind and staff contributions from the SecDev Group, and a donation of software from Palantir Technologies Inc.
History
The Information Warfare Monitor was founded in 2003 by Rafal Rohozinski (Advanced Network Research Group, Cambridge University) and Ronald Deibert (Citizen Lab, Munk School of Global Affairs, University of Toronto), as a sister project to the Open Net Initiative of which Deibert and Rohozinski are principal investigators along with John Palfrey (Berkman Center for Internet and Society, Harvard University) and Jonathan Zittrain (Oxford Internet Institute).
Between 2003 and 2008, IWM carried out a number of studies, including monitoring the status of the Iraqi Internet during the 2003 invasion, the 2006 Israel-Hezbollah war, the 2008 Russian Georgian war, and the January 2009 Israeli operations in Gaza.
The Information Warfare Monitor was also an organizing partner for two Russia-NATO workshops examining information warfare and cyber terrorism.
The Information Warfare Monitor (IWM) project closed in January 2012, having conducted advanced research activity tracking the emergence of cyberspace as a strategic domain.
Activities
The Information Warfare Monitor engages in three primary activities
Case studies - The Information Warfare Monitor designs and carries out active case study research. These are self-generated activities consistent with the IWM's mission. It employs a rigorous and multidisciplinary approach to all case studies blending qualitative, technical, and quantitative methods. As a general rule, its investigations consist of at least two components:
Field-based investigations - The IWM engages in qualitative research among affected target audiences and employ techniques that include interviews, long-term in situ interaction with partners, and extensive technical data collection involving system monitoring, network reconnaissance, and interrogation. Its field-based teams are supported by senior analysts and regional specialists, including social scientists, computer security professionals, policy experts, and linguists, who provide additional contextual support and substantive back-up.
Technical scouting and laboratory analysis - Data collected in the field is analyzed using a variety of advanced data fusion and visualization methods. Leads developed on the basis of infield activities are pursued through “technical scouting,” including computer network investigations, and the resulting data and analysis is shared with infield teams and partners for verification and for generating additional entry points for follow-on investigations.
Open source trend analysis - The IWM collects open source information from the press and other sources tracking global trends in cyberspace. These are published on its public website.
Analytical workshops and outreach - The IWM works closely with academia, human rights organizations, and the defense and intelligence community. It publishes reports, and occasionally conducts joint workshops. Its work is independent, and not subject to government classification, Its goal is to encourage vigorous debate around critical policy issues. This includes engaging in ethical and legal considerations of information operations, computer network attacks, and computer network exploitation, including the targeted use of Trojans and malware, denial of service attacks, and content filtering.
Publications
Breaching Trust: An analysis of surveillance and security practices on China’s TOM-Skype platform (2008)
In 2008, the Information Warfare Monitor discovered a surveillance network being operated by Skype and its Chinese Partner, TOM Online, which insecurely and routinely collected, logged, and captured millions of records (including personal information and contact details for any text chat and/or voice calls placed to TOM-Skype users, including those from the Skype platform).
Tracking GhostNet: Investigating a Cyber Espionage Network (2009)
In 2009, after a 10-month investigation, the Information Warfare Monitor discovered and named GhostNet, a suspected cyber-espionage operation, based mainly in the People's Republic of China, which has infiltrated at least 1,295 computers in 103 countries. 30% of these computers were high-value targets, including ministries of foreign affairs, embassies, international organizations, news media, and NGOs.
Shadows in the Cloud: Investigating Cyber Espionage 2.0 (2010)
In their 2010 follow-up report, Shadows in the Cloud: Investigating Cyber Espionage 2.0, the Information Warfare Monitor documented a complex ecosystem of cyber espionage that systematically targeted and compromised computer systems in India, the Offices of the Dalai Lama, the United Nations, and several other countries. The investigation recovered a large quantity of stolen documents – including sensitive and classified materials – belonging to government, business, academic, and other computer network systems and other politically sensitive targets.
Koobface: Inside a Crimeware Network (2010)
Having discovered archived copies of the Koobface botnet's infrastructure on a well-known Koobface command and control server, Information Warfare Monitor researchers documented the inner workings of Koobface in their 2010 report, Koobface: Inside a Crimeware Network. Researchers discovered that in just one year, Koobface generated over US$2million in profits.
See also
Citizen Lab
Ronald Deibert
GhostNet
Open Net Initiative
Psiphon
References
External links
The Secdev Group
Electronic warfare
|
105407
|
https://en.wikipedia.org/wiki/Rod%20Stewart
|
Rod Stewart
|
Sir Roderick David Stewart (born 10 January 1945) is a British rock and pop singer, songwriter, and record producer. Born and raised in London, he is of Scottish and English ancestry. With his distinctive raspy singing voice, Stewart is one of the best-selling music artists of all time, having sold over 250 million records worldwide. He has had 10 number-one albums and 31 top ten singles in the UK, 6 of which reached number one. Stewart has had 16 top ten singles in the US, with four reaching number one on the Billboard Hot 100. He was knighted in the 2016 Birthday Honours for services to music and charity.
Stewart's music career began in 1962 when he took up busking with a harmonica. In 1963, he joined The Dimensions as harmonica player and vocalist. In 1964, Stewart joined Long John Baldry and the All Stars before moving to the Jeff Beck Group in 1967. Joining Faces in 1969, he also maintained a solo career releasing his debut album that same year. Stewart's early albums were a fusion of rock, folk music, soul music, and R&B. His third album, 1971's Every Picture Tells a Story, was his breakthrough, topping the charts in the UK, US, Canada and Australia, as did its ballad "Maggie May". His 1972 follow-up album, Never a Dull Moment, also reached number one in the UK and Australia, while going top three in the US and Canada. Its single, "You Wear It Well", topped the chart in the UK and was a moderate hit elsewhere.
After Stewart had a handful more UK top ten hits, the Faces broke up in 1975. Stewart's next few singles were ballads with "Sailing", off the 1975 UK and Australian number-one album, Atlantic Crossing, becoming a hit in the UK and the Netherlands (number one), Germany (number four) and other countries, but barely charting in North America. A Night on the Town (1976), his fifth straight chart-topper in the UK, began a three-album run of going number one or top three in North America, the UK and Australia with each release. That album's "Tonight's the Night (Gonna Be Alright)" spent almost two months at number one in the US and Canada, and made the top five in other countries. Foot Loose & Fancy Free (1977) contained the major hit "You're in My Heart (The Final Acclaim)" as well as the rocker "Hot Legs". Blondes Have More Fun (1978) and its disco-tinged "Da Ya Think I'm Sexy" both went to number one in Canada, Australia and the US, with "Da Ya Think I'm Sexy" also hitting number one in the UK and the top ten in other countries. Stewart's albums regularly hit the upper rungs of the charts in the Netherlands throughout the 70s and in Sweden from 1975 onward.
After a disco and new wave period in the late 1970s and early 1980s, Stewart's music turned to a soft rock/middle-of-the-road style, with most of his albums reaching the top ten in the UK, Germany and Sweden, but faring less well in the US. The single "Rhythm of My Heart" was a top five hit in the UK, US and other countries, with its source album, 1991's Vagabond Heart, becoming, at number ten in the US and number two in the UK, his highest-charting album in a decade. In 1993, he collaborated with Bryan Adams and Sting on the power ballad "All for Love", which went to number one in many countries. In the early 2000s, he released a series of successful albums interpreting the Great American Songbook. In 2008, Billboard magazine ranked him the 17th most successful artist on the "Billboard Hot 100 All-Time Top Artists". A Grammy and Brit Award recipient, he was voted at No. 33 in Q Magazines list of the Top 100 Greatest Singers of all time As a solo artist, Stewart was inducted into the US Rock and Roll Hall of Fame in 1994, the UK Music Hall of Fame in 2006, and he was inducted a second time into the US Rock and Roll Hall of Fame in 2012 as a member of Faces.
Early life
Roderick David Stewart was born at 507 Archway Road, Highgate, North London, on 10 January 1945, the youngest of five children of Robert Joseph Stewart (26 December 1904–1990) and Elsie Rebecca Gilbart (14 December 1905–1996). His father was Scottish and had been a master builder in Leith, Edinburgh, while Elsie was English and had grown up in Upper Holloway in North London. Married in 1928, the couple had two sons and two daughters while living in Scotland, and then they moved to Highgate.
Stewart was born at home during World War II, eight years after his nearest sibling. The family was neither affluent nor poor; Stewart was spoiled as the youngest, and has called his childhood "fantastically happy". He had an undistinguished record at Highgate Primary School and failed the eleven plus exam. He then attended the William Grimshaw Secondary Modern School (later Fortismere School), Muswell Hill. When his father retired from the building trade he bought a newsagent's shop on the Archway Road and the family lived over the shop. Stewart's main hobby was railway modelling.
The family was mostly focused on football; Stewart's father had played in a local amateur team and managed some teams as well, and one of Stewart's earliest memories was of the pictures of Scottish players such as George Young and Gordon Smith that his brothers had on the wall. Stewart was the most talented footballer in the family and was a supporter of Arsenal F.C. at the time. Combining natural athleticism with near-reckless aggression, he became captain of the school football team and played for Middlesex Schoolboys as centre-half.
The family were also great fans of the singer Al Jolson and would sing and play his hits. Stewart collected his records and saw his films, read books about him, and was influenced by his performing style and attitude towards his audience. His introduction to rock and roll was hearing Little Richard's 1956 hit "The Girl Can't Help It", and seeing Bill Haley & His Comets in concert. His father bought him a guitar in January 1959; the first song he learned was the folk tune "It Takes a Worried Man to Sing a Worried Song"; the first record he bought was Eddie Cochran's "C'mon Everybody". In 1960, he joined a skiffle group with schoolfriends called the Kool Kats, playing Lonnie Donegan and Chas McDevitt hits.
Stewart left school at age 15 and worked briefly as a silk screen printer. Spurred on by his father, his ambition was to become a professional footballer. In summer 1960, he went for trials at Brentford F.C., a Third Division club at the time. Contrary to some longstanding accounts, Stewart states in his 2012 autobiography that he was never signed to the club and that the club never called him back after his trials. In any case, regarding possible career options, Stewart concluded, "Well, a musician's life is a lot easier and I can also get drunk and make music, and I can't do that and play football. I plumped for music ... They're the only two things I can do actually: play football and sing."
His parents are buried on the eastern side of Highgate Cemetery, on the main north–south path, opposite the grave of Malcolm McLaren.
Music career
1961–1963: Early work and The Dimensions
Stewart worked in the family shop and as a newspaper delivery boy. He then worked briefly as a labourer for Highgate Cemetery, which became another part of his biographical lore. He worked in a North Finchley funeral parlour and as a fence erector and sign writer. In 1961 he went to Denmark Street with The Raiders and got a singing audition with well-known record producer Joe Meek, but Meek stopped the session with a rude sound. Stewart began listening to British and American topical folk artists such as Ewan MacColl, Alex Campbell, Woody Guthrie, Ramblin' Jack Elliott, and especially Derroll Adams and the debut album of Bob Dylan.
Stewart became attracted to beatnik attitudes and left-wing politics, living for a while in a beatnik houseboat at Shoreham-by-Sea. He was an active supporter of the Campaign for Nuclear Disarmament at this time, joining the annual Aldermaston Marches from 1961 to 1963 and being arrested on three occasions when he took part in sit-ins at Trafalgar Square and Whitehall for the cause. He also used the marches as a way to meet and bed girls. In 1962 he had his first serious relationship, with London art student Suzannah Boffey (a friend of future model and actress Chrissie Shrimpton); he moved to a bed-sit in Muswell Hill to be near her. She became pregnant, but neither Rod nor his family wanted him to enter marriage; the baby girl was given up for adoption and Rod and Suzannah's relationship ended.
In 1962, Stewart began hanging around folk singer Wizz Jones, busking at Leicester Square and other London spots. Stewart took up playing the then-fashionable harmonica. On several trips over the next 18 months Jones and Stewart took their act to Brighton and then to Paris, sleeping under bridges over the River Seine, and then finally to Barcelona. Eventually, this resulted in Stewart being rounded up and deported from Spain for vagrancy during 1963. At this time, Stewart, who had been at William Grimshaw School with three of their members, was briefly considered as singer for the embryonic Kinks.
In 1963, Stewart adopted the Mod lifestyle and look, and began fashioning the spiky rooster hairstyle that would become his trademark. (It was made possible with sugar water or large amounts of his sisters' hair lacquer, backcombing, and his hands holding it in place to protect it from the winds of the Highgate Underground station.) Disillusioned by rock and roll, he saw Otis Redding perform in concert and began listening to Sam Cooke records; he became fascinated by rhythm and blues and soul music.
After returning to London, Stewart joined a rhythm and blues group, the Dimensions, in October 1963 as a harmonica player and part-time vocalist. It was his first professional job as a musician, although Stewart was still living at home and working in his brother's painting and picture frame shop. A somewhat more established singer from Birmingham, Jimmy Powell, then hired the group a few weeks later, and it became known as Jimmy Powell & the Five Dimensions, with Stewart being relegated to harmonica player. The group performed weekly at the famed Studio 51 club on Great Newport Street in London, where The Rolling Stones often headlined; this was Stewart's entrée into the thriving London R & B scene, and his harmonica playing improved in part from watching Mick Jagger on stage. Relations soon broke down between Powell and Stewart over roles within the group and Stewart departed. Contrary to popular legend, during this time Stewart likely did not play harmonica on Millie Small's 1964 hit "My Boy Lollipop". That was probably Peter Hogman of the Dimensions, although Powell has also claimed credit. Powell did record and release a single during this period, though Stewart did not appear on it.
1964–1967: Steampacket and "Rod the Mod" image
In January 1964, while Stewart was waiting at Twickenham railway station after having seen Long John Baldry and the All Stars at Eel Pie Island, Baldry heard him playing "Smokestack Lightnin'" on his harmonica, and invited him to sit in with the group; when Baldry discovered Stewart was a singer as well, he offered him a job for £35 a week, after securing the approval of Stewart's mother. Quitting his day job at the age of nineteen, Stewart gradually overcame his shyness and nerves and became a visible enough part of the act that he was sometimes added to the billing as "Rod the Mod" Stewart, the nickname coming from his dandyish style of grooming and dress. Baldry touted Stewart's abilities to Melody Maker magazine and the group enjoyed a weekly residence at London's fabled Marquee Club. In June 1964, Stewart made his recording début (without label credit) on "Up Above My Head", the B-side to a Baldry and Hoochie Coochie Men single. While still with Baldry, Stewart embarked on a simultaneous solo career. He made some demo recordings, was scouted by Decca Records at the Marquee Club, and signed to a solo contract in August 1964. He appeared on several regional television shows around the country and recorded his first single in September 1964.
Turning down Decca's recommended material as too commercial, Stewart insisted that the experienced session musicians he was given, including John Paul Jones, learn a couple of Sonny Boy Williamson songs he had just heard. The resulting single, "Good Morning Little Schoolgirl", was recorded and released in October 1964; despite Stewart performing it on the popular television show Ready Steady Go!, it failed to enter the charts. Also in October Stewart left the Hoochie Coochie Men after having a row with Baldry.
Stewart played some dates on his own in late 1964 and early 1965, sometimes backed by the Southampton R & B outfit The Soul Agents. The Hoochie Coochie Men broke up, Baldry and Stewart patched up their differences (and indeed became lifelong friends), and legendary impresario Giorgio Gomelsky put together Steampacket, which featured Baldry, Stewart, Brian Auger, Julie Driscoll, Micky Waller, Vic Briggs and Ricky Fenson; their first appearance was in support of The Rolling Stones in July 1965. The group was conceived as a white soul revue, analogous to The Ike & Tina Turner Revue, with multiple vocalists and styles ranging from jazz to R & B to blues. Steampacket toured with the Stones and The Walker Brothers that summer, ending in the London Palladium; seeing the audience react to the Stones gave Stewart his first exposure to crowd hysteria. Stewart, who had been included in the group upon Baldry's insistence, ended up with most of the male vocal parts. Steampacket was unable to enter the studio to record any material due to its members all belonging to different labels and managers, although Gomelsky did record one of their Marquee Club rehearsals.
Stewart's "Rod the Mod" image gained wider visibility in November 1965, when he was the subject of a 30-minute Rediffusion, London television documentary titled "An Easter with Rod" that portrayed the Mod scene. His parallel solo career attempts continued on EMI's Columbia label with the November 1965 release of "The Day Will Come", a more heavily arranged pop attempt, and the April 1966 release of his take on Sam Cooke's "Shake", with the Brian Auger Trinity. Both failed commercially and neither gained positive notices. Stewart had spent the better part of two years listening mostly to Cooke; he later said, "I didn't sound like anybody at all ... but I knew I sounded a bit like Sam Cooke, so I listened to Sam Cooke." This recording solidified that singer's position as Stewart's idol and most enduring influence; he called it a "crossing of the water."
Stewart departed from Steampacket in March 1966, with Stewart saying he had been sacked and Auger saying he had quit. Stewart then joined a somewhat similar outfit, Shotgun Express, in May 1966 as co-lead vocalist with Beryl Marsden. The other members included Mick Fleetwood and Peter Green (who would go on to form Fleetwood Mac), and Peter Bardens. Shotgun Express released one unsuccessful single in October 1966, the orchestra-heavy "I Could Feel The Whole World Turn Round", before disbanding. Stewart later disparaged Shotgun Express as a poor imitation of Steampacket, and said "I was still getting this terrible feeling of doing other people's music. I think you can only start finding yourself when you write your own material." By now, Stewart had bounced around without achieving much success, with little to distinguish himself among other aspiring London singers other than the emerging rasp in his voice.
1967–1969: Jeff Beck Group period
Guitarist Jeff Beck recruited Stewart for his new post-Yardbirds venture, and in February 1967, Stewart joined the Jeff Beck Group as vocalist and sometime songwriter. This would become the big break of his early career. There he first played with Ronnie Wood whom he had first met in a London pub in 1964; the two soon became fast friends. During its first year, the group experienced frequent changes of drummers and conflicts involving manager Mickie Most wanting to reduce Stewart's role; they toured the UK, and released a couple of singles that featured Stewart on their B-sides. Stewart's sputtering solo career also continued, with the March 1968 release of non-hit "Little Miss Understood" on Immediate Records.
The Jeff Beck Group toured Western Europe in spring 1968, recorded, and were nearly destitute; then assistant manager Peter Grant booked them on a six-week tour of the United States starting in June 1968 with the Fillmore East in New York. Stewart, on his first trip to America, suffered terrible stage fright during the opening show and hid behind the amplifier banks while singing; only a quick shot of brandy brought him out front. Nevertheless, the show and the tour were a big success, with Robert Shelton of The New York Times calling the group exciting and praising "the interaction of Mr. Beck's wild and visionary guitar against the hoarse and insistent shouting of Rod Stewart," and New Musical Express reporting that the group was receiving standing ovations and pulling receipts equal to those of Jimi Hendrix and The Doors.
In August 1968, their first album Truth was released; by October it had risen to number 15 on the US albums chart but failed to chart in the UK. The album featured Beck's masterly guitar technique and manipulated sounds as Stewart's dramatic vocalising tackled the group's varied repertoire of blues, folk, rock, and proto-heavy metal. Stewart also co-wrote three of the songs, and credited the record for helping to develop his vocal abilities and the sandpaper quality in his voice. The group toured America again at the end of the year to a strong reception, then suffered from more personnel upheaval (something that would continue throughout Beck's career). In July 1969, Stewart left, following his friend Wood's departure. Stewart later recalled: "It was a great band to sing with but I couldn't take all the aggravation and unfriendliness that developed.... In the two and a half years I was with Beck I never once looked him in the eye – I always looked at his shirt or something like that."
The group's second album, Beck-Ola, was released in June 1969 in the US and September 1969 in the UK, bracketing the time the group was dissolving; it also made number 15 in the US albums chart and placed to number 39 in the UK albums chart. During his time with the group, Stewart initially felt overmatched by Beck's presence, and his style was still developing; but later Stewart felt the two developed a strong musical, if not personal, rapport. Much of Stewart's sense of phrasing was developed during his time with the Jeff Beck Group. Beck sought to form a new supergroup with Carmine Appice and Tim Bogert (of the similarly just-breaking-up Vanilla Fudge) joining him and Stewart, but Stewart had other plans.
1969–1975: Solo career established and Faces albums
Mercury Records A&R man Lou Reizner had seen Stewart perform with Beck, and on 8 October 1968 signed him to a solo contract; but contractual complexities delayed Stewart's recording for him until July 1969. Meanwhile, in May 1969, guitarist and singer Steve Marriott left English band The Small Faces. Ron Wood replaced him as guitarist in June and on 18 October 1969, Stewart followed his friend and became the band's new singer. The two joined existing members Ronnie Lane, Ian McLagan, and Kenney Jones, who soon decided to call the new line-up Faces.
An Old Raincoat Won't Ever Let You Down became Stewart's first solo album in 1969 (it was known as The Rod Stewart Album in the US). It established the template for his solo sound: a heartfelt mixture of folk, rock, and country blues, inclusive of a British working-class sensibility, with both original material ("Cindy's Lament" and the title song) and cover versions (Ewan MacColl's "Dirty Old Town" and Mike d'Abo's "Handbags and Gladrags"). The backing band on the album included Wood, Waller and McLagan, plus Keith Emerson and guitarists Martin Pugh (of Steamhammer, and later Armageddon and 7th Order) and Martin Quittenton (also from Steamhammer).
Faces released their début album First Step in early 1970 with a rock and roll style similar to the Rolling Stones. While the album did better in the UK than in the US, the Faces quickly earned a strong live following. Stewart released his second album, Gasoline Alley that autumn. Stewart's approach was similar to his first album and mandolin was introduced into the sound. He then launched a US tour with the Faces. Stewart sang guest vocals for the Australian group Python Lee Jackson on "In a Broken Dream", recorded in April 1969 but not released until 1970. His payment was a set of seat covers for his car. It was re-released in 1972 to become a worldwide hit.
Stewart's 1971 solo album Every Picture Tells a Story made him a household name when the B-side of his minor hit "Reason to Believe", "Maggie May", (co-written with Martin Quittenton) started receiving radio play. The album and the single occupied the number one chart position simultaneously in the UK, US, Canada and Australia, a chart first, in September. Maggie May topped the single chart for five weeks in the US, and the UK and four weeks in Australia. Set off by a striking mandolin part (by Ray Jackson of Lindisfarne), "Maggie May" was also named in The Rock and Roll Hall of Fame's 500 Songs that Shaped Rock and Roll, one of three songs by him to appear on that list. The rest of the album was equally strong, with "Mandolin Wind" again showcasing that instrument; "(I Know) I'm Losing You" adding hard-edged soul to the mix; and "Tomorrow Is a Long Time", a cover of a Bob Dylan song. But the ultimate manifestation of the early Stewart solo style was the Stewart-Wood-penned "Every Picture Tells a Story" itself: powered by Mick Waller's drumming, Pete Sears's piano and Wood's guitar work in a largely acoustic arrangement; it is a song relating to the picaresque adventures of the singer.
The second Faces album, Long Player, was released in early 1971 and enjoyed greater chart success than First Step. Faces also got their only US Top 40 hit with "Stay With Me" from their third album A Nod Is as Good as a Wink...To a Blind Horse released in late 1971. This album reached the Top 10 on both sides of the Atlantic on the back of the success of Every Picture Tells A Story. Steve Jones from The Sex Pistols regarded the Faces highly and named them as a main influence on the British punk rock movement.
The Faces toured extensively in 1972 with growing tension in the band over Stewart's solo career enjoying more success than the band's. Stewart released Never a Dull Moment in the same year. Repeating the Every Picture formula, for the most part, it reached number two on the US album charts and number one in the UK, and enjoyed further good notices from reviewers. "You Wear It Well" was a hit single that reached number 13 in the US and went to number one in the UK, while "Twisting the Night Away" made explicit Stewart's debt to Sam Cooke.
For the body of his early solo work Stewart earned tremendous critical praise. Rolling Stone'''s 1980 Illustrated History of Rock & Roll includes this in its Stewart entry:
Rarely has a singer had as full and unique a talent as Rod Stewart; rarely has anyone betrayed his talent so completely. Once the most compassionate presence in music, he has become a bilious self-parody – and sells more records than ever [... A] writer who offered profound lyricism and fabulous self-deprecating humour, teller of tall tales and honest heartbreaker, he had an unmatched eye for the tiny details around which lives turn, shatter, and reform [...] and a voice to make those details indelible. [... His solo albums] were defined by two special qualities: warmth, which was redemptive, and modesty, which was liberating. If ever any rocker chose the role of everyman and lived up to it, it was Rod Stewart.
The Faces released their final album Ooh La La, which reached number one in the UK and number 21 in the US in 1973. During the recording of the album, the rift between Stewart and the rest of the Faces grew further, as (according to Ian McLagan), Stewart didn't participate until two weeks into the sessions, "and then complained that some songs were in the wrong key for him. So we recorded them again and waited a week for him to come back. We cut the track for 'Ooh La La' three times before he eventually passed on it, leaving it for Woody to sing. [...] The week the album came out he did all he could to scuttle it and told anyone who would listen how useless it was." The band toured Australasia, Japan, Europe and the UK in 1974 to support the album and the single "Pool Hall Richard".
In late 1974, Stewart released his Smiler album. In Britain, it reached number one, and the single "Farewell" number seven, but only number 13 on the Billboard pop album charts and the single "Mine for Me" only number 91 on the Billboard pop singles charts. It was his last original album for Mercury Records. After the release of the double album compilation The Best of Rod Stewart he switched to Warner Bros. Records and remained with them throughout the vast majority of his career (Faces were signed to Warner Bros., and Stewart's solo releases in the UK appeared on the Riva label until 1981). In 1975, Faces toured the US twice (with Ronnie Wood joining The Rolling Stones' US tour in between). With Ronnie Wood having released his second solo album in 1975 and also having joined the Rolling Stones (first as a temporary replacement for the departing Mick Taylor, and later as a permanent member), as well as Stewart's own burgeoning solo career, it became impossible to maintain the Faces' as a viable band, so the Faces broke up at the end of the year.
1975–1988: Height of fame and critical reaction
In 1975, Stewart moved to Los Angeles. He released the Atlantic Crossing album for his new record company, using producer Tom Dowd and a different sound based on the Muscle Shoals Rhythm Section. Atlantic Crossing marked both a return to form and a return to the Top 10 of the Billboard album charts. The first single, a cover of the Sutherland Brothers song "Sailing", was a number-one hit in the UK, charted high in other European countries and in Australia, but only reached the Top 60 of the US and Canadian charts. The single returned to the UK Top 10 a year later when used as the theme music for a BBC documentary series about . Having been a hit twice over, "Sailing" became, and remains, Stewart's biggest-selling single in the UK. His Holland-Dozier-Holland cover "This Old Heart of Mine" was also a Top 100 hit in 1976. In 1976 Stewart covered The Beatles' song "Get Back" for the musical documentary All This and World War II.
Later in 1976, Stewart topped the US Billboard Hot 100 for eight weeks and the Australian ARIA chart with the ballad "Tonight's the Night", with an accompanying music video featuring actress Britt Ekland. It came from the A Night on the Town album, which went to number two on the Billboard album charts and was Stewart's first album to go platinum. By explicitly marking the album as having a "fast side" and a "slow side", Stewart continued the trend started by Atlantic Crossing. "The First Cut Is the Deepest", a cover of a Cat Stevens song, went number one in the UK in 1977, and top 30 in the US. "The Killing of Georgie (Part 1 and 2)", about the murder of a gay man, was also a Top 40 hit for Stewart during 1977.Foot Loose & Fancy Free (1977) featured Stewart's own band, the original Rod Stewart Group that featured Carmine Appice, Phil Chen, Jim Cregan, Billy Peek, Gary Grainger and John Jarvis. It continued Stewart's run of chart success, reaching number two. "You're in My Heart" was the hit single, reaching number four in the US.
"Hot Legs" achieved a lot of radio airplay as did the confessional "I Was Only Joking". In appearance, Stewart's look had evolved to include a glam element, including make-up and spandex clothes. Stewart scored another UK number one and US number one single with "Da Ya Think I'm Sexy?", which was a crossover hit reaching number five on the Billboard black charts due to its disco sound. This was the lead single from 1978's Blondes Have More Fun, which went to number one on the Billboard album charts and sold 3 million albums.
A focal point of criticisms about this period was his biggest-selling 1978 disco hit "Da Ya Think I'm Sexy?", which was atypical of his earlier output, and disparaged by critics. In interviews, Stewart, while admitting his accompanying look had become "tarty", has defended the lyrics by pointing out that the song is a third-person narrative slice-of-life portrayal, not unlike those in his earlier work, and that it is not about him. The song's refrain was identical to Brazilian Jorge Ben Jor's earlier "Taj Mahal" and a lawsuit ensued. Stewart donated his royalties from "Da Ya Think I'm Sexy?" to UNICEF, and he performed it with his band at the Music for UNICEF Concert at the United Nations General Assembly in 1979.
Stewart moved to a more new wave direction in 1980 by releasing the album Foolish Behaviour. The album produced one hit single, "Passion", which reached No. 5 on the US Billboard Charts. In August 1981, MTV was launched in the US with several of Stewart's videos in heavy rotation. Later in 1981, Stewart added further elements of new wave and synthpop to his sound for the Tonight I'm Yours album. The title song reached No. 20 in the US, while "Young Turks" reached the Top 5 with the album going platinum. On 18 December 1981, Stewart played the Los Angeles Forum, along with Kim Carnes and Tina Turner, in a concert broadcast worldwide via satellite.
Stewart was criticised for breaking a widely observed cultural boycott of apartheid South Africa by performing at the Sun City resort complex in Bophuthatswana as part of his Body Wishes (1983) and Camouflage (1984) tours.
Stewart had four US Top 10 singles between 1982 and 1988; "Young Turks" (No. 5, carrying over from 1981 into 1982), "Some Guys Have All the Luck" (No. 10, 1984), "Infatuation" (No. 6, 1984) and "Love Touch" (No. 6, 1986, a Holly Knight/Mike Chapman collaboration). "Baby Jane" reached No. 14 in 1983, but went to No. 1 in the UK, his final chart-topping single there to date. The corresponding Camouflage album went gold in the UK, and the single "Infatuation" (which featured his old friend Jeff Beck on the guitar) received considerable play on MTV. The second single "Some Guys Have All The Luck" reached No. 15 in the UK and No. 10 in the US.
A reunion with Jeff Beck produced a successful take on Curtis Mayfield's "People Get Ready", but an attempt to tour together fell apart after a few dates. In the UK, "Every Beat of My Heart" reached number two in 1986. In January 1985, Stewart performed to a large audience at the Rock in Rio festival in Rio de Janeiro.
1988–1994: Out of Order Tour, Vagabond Heart and Rock and Roll Hall of Fame
In 1988, Stewart returned with Out of Order, produced by Duran Duran's Andy Taylor and by Bernard Edwards of Chic. "Lost in You", "Forever Young", "Crazy About Her", and "My Heart Can't Tell You No" from that album were all top 15 hits on the Billboard Hot 100 and mainstream rock charts, with the latter even reaching the Top Five. "Forever Young" was an unconscious revision of Bob Dylan's song of the same name; the artists reached an agreement about sharing royalties. The song reached No. 12 in the US. In September 1988, Stewart performed "Forever Young" at the 1988 MTV Video Music Awards at the Universal Amphitheatre in Los Angeles, and in 1989 he received a Grammy Award nomination for Best Male Rock Vocal Performance for the song.
In January 1989, Stewart set out on the South American leg of the Out of Order Tour playing to sell-out audiences throughout Americas. There were 80,000 people at his show at Corregidora Stadium, Querétaro, México (9 April), and 50,000 at Jalisco Stadium, Guadalajara, Jalisco (12 April). In Buenos Aires, the audience at the River Plate Stadium, which seats 70,000+, was at over 90,000, with several thousand outside the stadium. Firehoses were sprayed on the crowd to avoid heat prostration.
Stewart's version of the Tom Waits song "Downtown Train" went to number three on the Billboard Hot 100 in 1990. This song was taken from a four-CD compilation set called Storyteller – The Complete Anthology: 1964–1990.
Released in 1991, the Vagabond Heart album continued Stewart's renewal and inspiration. The lead single "It Takes Two" with Tina Turner, was released in 1990 in advance of the full album's release, and reached number five on the UK charts, but did not chart in the US. The follow-up songs from Vagabond Heart both reached the Billboard Hot 100 in 1991, with "Rhythm of My Heart" peaking at No. 5 and "The Motown Song" peaking at No. 10.
At the 1993 Brit Awards in London, Stewart picked up the prize for Outstanding Contribution to Music. Stewart brought back the Faces on stage for an impromptu reunion. In 1993, Stewart recorded "All For Love" with Sting and Bryan Adams for the soundtrack to the movie The Three Musketeers; the single reached number one in the US and number two in the UK. Also in 1993, he reunited with Ronnie Wood to record an MTV Unplugged special that included "Handbags and Gladrags", "Cut Across Shorty", and four selections from Every Picture Tells a Story. The show featured an acoustic version of Van Morrison's "Have I Told You Lately", which topped the Billboard adult contemporary chart and No. 5 on the Billboard Hot 100. A rendition of "Reason to Believe" also garnered considerable airplay. The resulting Unplugged...and Seated album reached number two on the Billboard 200 album charts.
Stewart was inducted into the Rock and Roll Hall of Fame in 1994, presented by Jeff Beck. On 31 December 1994, Stewart played in front of 3.5 million people on Copacabana beach in Rio, and made it into the Guinness Book of World Records for staging the largest free rock concert attendance in history.
1995–2001: New ventures and record labels
By the early 1990s, Stewart had mostly abandoned creating his own material, saying that he was not a natural songwriter and that the tepid response to his recent efforts was not rewarding. In 1995, Stewart released A Spanner in the Works containing a single written by Tom Petty, "Leave Virginia Alone", which reached the Top 10 of the adult contemporary charts. The latter half of the 1990s was not as commercially successful though the 1996 album If We Fall in Love Tonight reached number 8 in the UK, and went gold and hit No. 19 on the Billboard album chart.When We Were the New Boys, his final album on the Warner Bros. label released in 1998, contained versions of songs by Britpop acts such as Oasis and Primal Scream, and reached number two on the UK album charts. That same year, he recorded the song "Faith of the Heart", written by Diane Warren, for the film Patch Adams. In 2000, Stewart left Warner Bros. and moved to Atlantic Records, another division of Warner Music Group. In 2001, he released Human. The single "I Can't Deny It" went Top 40 in the UK and Top 20 in the adult contemporary. Stewart then signed to Clive Davis' new J Records label. The Story So Far: The Very Best of Rod Stewart, a greatest hits album compiled from his time at Warner Bros., is certified four times platinum in the UK with over 1.2 million copies sold, and reached number one in 2001 in Belgium and France.
2002–2010: The Great American Songbook series and Soulbook
In June 2002, Stewart performed "Handbags and Gladrags" at the Party at the Palace held at Buckingham Palace Garden, a concert which celebrated the Golden Jubilee of Elizabeth II and featured stars from five decades of music.
By 2002, Stewart had sold over 100 million records during his career. While growing up, he heard in his home classic songs written by songwriters such as Cole Porter, Gus Kahn and George and Ira Gershwin. Stewart joined others who had recorded the classic songs. He concentrated on singing 1930s and 1940s pop standards from the Great American Songbook with great popular success. These albums have been released on Clive Davis's J Records label and have seen Stewart enjoy album sales equal to the 1970s.
The first album from the songbook series, It Had to Be You: the Great American Songbook, reached number four on the US album chart, number eight in the UK and number ten in Canada when released in late 2002. The track "These Foolish Things" (which is actually a British, not American, song) reached number 13 on the Billboard adult contemporary chart, and "They Can't Take That Away From Me" went Top 20.
The second series album, As Time Goes By: the Great American Songbook 2, reached number two in the US, number four in the UK and number one in Canada. "Bewitched, Bothered and Bewildered", a duet with Cher, went Top 20 on the US adult contemporary charts. "Time After Time" was another Top 30 track on the US adult contemporary charts. A musical called Tonight's The Night, featuring many of Stewart's songs, opened 7 November 2003 at London's Victoria Palace Theatre. It is written and directed by Ben Elton, who previously created a similar production, We Will Rock You, with music by Queen. The musical tells about a "Faustian pact between Detroit gas station mechanic Stu Clutterbuck and Satan."
In 2004, Stewart reunited with Ronnie Wood for concerts of Faces material. A Rod Stewart and the Faces best of album, Changing Faces, reached the Top 20 of the UK album charts. Five Guys Walk into a Bar..., a Faces box set compilation, was released. In late 2004, Stardust: the Great American Songbook 3, the third album in Stewart's songbook series, was released. It was his first US number one album in 25 years, selling over 200,000 albums in its first week. It also debuted at number one in Canada, number three in the UK and Top 10 in Australia. His version of Louis Armstrong's "What a Wonderful World", featuring Stevie Wonder, made the Top 20 of the world adult charts. He also recorded a duet with Dolly Parton for the album – "Baby, It's Cold Outside". Stewart won his first ever Grammy Award for this album.
2005 saw the release of the fourth songbook album, Thanks for the Memory: The Great American Songbook 4; it included duets with Diana Ross and Elton John. Within weeks of its release, the CD made it to number two on the Top 200 list. In late 2006, Stewart made his return to rock music and his new approach to country music with the release of Still the Same... Great Rock Classics of Our Time, a new album featuring rock and southern rock milestones from the last four decades, including a cover of Creedence Clearwater Revival's "Have You Ever Seen the Rain?", which was released as the first single. The album debuted at number one on the Billboard charts with 184,000 copies in its first week. The number one début was helped by a concert in New York City that was on MSN Music and an appearance on Dancing with the Stars. He performed tracks from his new album live from the Nokia Theater on 9 October. Control Room broadcast the event Live on MSN and in 117 cinemas across the country via National CineMedia. In November 2006, Stewart was inducted into the UK Music Hall of Fame.
On 1 July 2007, Stewart performed at the Concert for Diana held at Wembley Stadium, London, an event which celebrated the life of Princess Diana almost 10 years after her death.Diana concert a 'perfect tribute' BBC News. Retrieved 12 April 2012 He performed "Sailing", "Baby Jane" and "Maggie May". On 12 December, he performed for the first time at the Royal Variety Performance at the London Coliseum in front of HRH Prince of Wales and The Duchess of Cornwall, singing another Cat Stevens number, "Father and Son", and Bonnie Tyler's song "It's a Heartache". On 22 December 2006, Stewart hosted the 8th Annual A Home for the Holidays special on CBS at 8:00 pm (PST).
On 20 May 2009, Stewart performed "Maggie May" on the grand finale of American Idol season 8. On 2, July 2009 Stewart performed his only UK date that year at Home Park, Plymouth. On 29 September 2009 a 4-CD, 65-track compilation entitled Rod Stewart Sessions 1971–1998 was released; it is composed of previously unreleased tracks and outtakes from the bulk of his career. Stewart has also mentioned plans for a compilation of covers of soul classics, the possible release of another edition of the Great American Songbook album and a country covers album.
On 17 October 2009, Stewart released the studio album Soulbook which was composed of covers of soul and Motown songs. On 14 November 2009, Stewart recorded a TV program in the UK for ITV that was screened on 5 December 2009. The music in the programme featured tracks from his new album and some old favourites. On 14 January 2010, Rhino records released Stewart's Once in a Blue Moon, a "lost album" originally recorded in 1992, featuring ten cover songs including the Rolling Stones' "Ruby Tuesday", Bob Dylan's "The Groom's Still Waiting at the Altar" and Stevie Nicks' "Stand Back", as well as Tom Waits' "Tom Traubert's Blues". On 19 October 2010, Stewart released another edition of his Great American Songbook series titled Fly Me to the Moon...The Great American Songbook Volume V on J Records.
2011–2012: Christmas album and autobiography
In 2011, Stewart performed with Stevie Nicks on their Heart & Soul Tour. Starting on 20 March in Fort Lauderdale, Florida, the tour visited arena concerts in North America – with performances in New York, Toronto, Los Angeles, Philadelphia, Chicago, Detroit, Tampa and Montreal, among others.
Stewart headlined the Sunday show at the 2011 Hard Rock Calling Festival on 26 June in London's Hyde Park. Stewart signed on to a two-year residency at the Colosseum at Caesars Palace, Las Vegas, commencing on 24 August. Performing his greatest hits, the residency also saw him perform selected tracks from his upcoming, untitled blues album.
On 7 June 2012, it Stewart signed a recording agreement with Universal Music Group. Stewart released his first Christmas album, titled Merry Christmas, Baby, on the Verve Music Group label (a division of Universal Music Group) on 30 October 2012. The album was produced by David Foster and contained several duets, as well as an original song written by Stewart, Foster and Amy Foster called "Red-Suited Super Man". According to IFPI, Merry Christmas, Baby was the seventh best-selling album worldwide in 2012. In October 2012, Stewart's autobiography titled Rod: The Autobiography was released (exact dates vary worldwide).
In November 2012, Stewart performed "Auld Lang Syne" from his Christmas album and his hit "Sailing" at the Royal Albert Hall for the Royal British Legion Festival of Remembrance, which was attended by Queen Elizabeth II. Later that month, Stewart again performed at the Royal Albert Hall in front of the Queen during the 100th Royal Variety Performance, singing "When You Wish upon a Star". On 26 November, Stewart's recording of "Let It Snow! Let It Snow! Let It Snow!" reached the top of the Billboard Adult Contemporary Chart. Stewart has had the number one song on this chart three times previously, the last being in 1993 with "Have I Told You Lately", giving him the second-largest hiatus between number ones in the history of the chart. The song remained in the No. 1 spot for a total of five weeks, tying it for the longest-leading holiday title in the chart's 51-year history. On 10 December 2012, Stewart was a guest singer on Michael Bublé's television Home for the Holidays Christmas special. Stewart was the tenth best-selling artist in Canada in the year 2012 according to year-end sales data from Nielsen Soundscan Canada. In February 2013, Stewart was nominated for a Canadian Juno Award in the International Album of the Year category for his album Merry Christmas, Baby.
2013–2015: Return to songwriting – Time and Another Country
In May 2013, Stewart released Time, a rock album of his own original material. It marked a return to songwriting after what Stewart termed "a dark period of twenty years"; he said that writing his autobiography gave him the impetus to write music again. The album entered the UK Albums Chart at number 1, setting a new British record for the longest gap between chart-topping albums by an artist. Stewart's last No. 1 on the chart had been Greatest Hits Volume 1 in 1979 and his last studio album to top the chart was 1976's A Night on the Town.
In September 2013, Stewart presented his friend Elton John with the first Brits Icon award in a special show at the London Palladium, recognising John's "lasting impact" on UK culture. Stewart quipped that John was "the second-best rock singer ever", before the two performed a duet on stage.
A new studio album, Another Country, was released on 23 October 2015. The video for the first single "Love Is" is available on his Vevo account.
2016–present: Continuing to record – Blood Red Roses and The Tears of Hercules
Stewart recorded vocals with Joe Walsh on the Frankie Miller album Frankie Miller's Double Take, which was released on 30 September 2016. He sang his cover of the Beatles' "Sgt. Pepper's Lonely Hearts Club Band" as Sgt. Pepper for Beat Bugs episode 17b, which debuted 18 November 2016 on Netflix. At the same, Stewart was quoted responding to John Lennon's 1980 assertion that Stewart's hit "The Killing of Georgie (Part 1 and 2)" plagiarised his song "Don't Let Me Down", declaring to The Guardian: "It does sound like it, [...] Nothing wrong with a good steal!".
On 28 September 2018, Stewart released his 30th studio album, Blood Red Roses, on Republic Records. He duets with Welsh singer Bonnie Tyler on the track "Battle of the Sexes" from her 2019 studio album, Between the Earth and the Stars. Stewart collaborated with the Royal Philharmonic Orchestra for the release of You're in My Heart in November 2019. The album contains new versions of the hit songs "Maggie May", and "It Takes Two" with Robbie Williams.
On 22 November 2019, Stewart released You're in My Heart: Rod Stewart with the Royal Philharmonic Orchestra, produced by Trevor Horn. The album contains vocal tracks from UK number one hits "Sailing", "I Don't Want To Talk About It" and "The First Cut is the Deepest" with new arrangements performed by the Royal Philharmonic Orchestra, as well as 1971 chart toppers in both the UK and US "Maggie May" and "Reasons to Believe". The release of You're In My Heart coincided with Stewart's biggest-ever UK stadium tour throughout November and December 2019, a continuation of his successful summer stadium tour. You're In My Heart also included "Stop Loving Her Today", a new song, as well as a new recording of 'It Takes Two' featuring Robbie Williams. You're in My Heart topped the UK Albums Chart, staying in the #1 position for three weeks and making it his tenth Number 1 album. Stewart released his 31st studio album The Tears of Hercules in November 2021. Stewart is only the fifth British act in UK chart history with 10 or more number-one albums, and BPI Certified – Gold.
Personal life
In May 2000, Stewart was diagnosed with thyroid cancer, for which he underwent surgery in the same month. It had been previously reported he suffered from a benign vocal cord nodule. Besides being a major health scare, the resulting surgery also threatened his voice, and he had to re-learn how to sing. Since then he has been active in raising funds for The City of Hope Foundation charity to find cures for all forms of cancer, especially those affecting children. In September 2019, Stewart revealed that he was diagnosed with prostate cancer in 2017, and has been given the all-clear after treatment.
Before returning to the UK, Stewart played for his LA Exiles team made up of mostly English expatriates plus a few celebrities, including Billy Duffy of The Cult, in a senior soccer league in Palos Verdes, California.
Despite his father being a supporter of Hibernian, Stewart is a supporter of Celtic, which he mentions in "You're in My Heart". He supports the Scotland national team and follows Manchester United as his English side, and he explains his love affair with both Celtic and Manchester United in Frank Worrall's book, Celtic United. Stewart clarifies this more in his 2012 book (pp 163–64), Rod: The Autobiography, mentioning he "only had an attachment to Manchester United in the 1970s, but that was because they had so many great Scottish players in the 1970s, including Denis Law ... When I did eventually click with a team, it was Celtic". He presented Celtic with the trophy after they won the 2015 Scottish League Cup Final.
Stewart is a model railway enthusiast. His HO scale layout in his Los Angeles home is modelled after the New York Central and the Pennsylvania Railroads during the 1940s. Called the Three Rivers City, the layout was featured in the cover story of the December 2007, December 2010, February 2014, and June 2017 issues of Model Railroader magazine. In the 2007 article, Stewart said that it meant more to him to be in a model railroad magazine than a music magazine. The layout, which has a mainline run of , uses code 70 flextrack and a Digital Command Control (DCC) system made by Digitrax. Stewart has a second, smaller layout at his UK home, based on Britain's East Coast Main Line. In a sidebar to the 2014 Model Railroader article, Stewart confirmed (in an anecdote about his having unwittingly mixed red scenery texturing material into a "turf" mix he used around the bases of buildings) that he is colour-blind.
A car collector, Stewart owns one of the 400 Ferrari Enzos. In 1982, Stewart was car-jacked on Los Angeles' Sunset Boulevard while he was parking his $50,000 Porsche. The car was subsequently recovered.
In September 2002, Stewart's son, Sean, was sentenced to three months in jail for attacking a man outside a restaurant in Los Angeles. Sean Stewart was also required to pay compensation and to attend anger management, drug and alcohol treatment courses.
Rod Stewart was appointed Commander of the Order of the British Empire (CBE) in the 2007 New Year Honours for services to music. At his investiture in July 2007, at Buckingham Palace, Stewart commented: "It's a marvellous occasion. We're the only country in the world to honour the common man." He was knighted in the 2016 Birthday Honours for "services to music and charity".
Stewart was estimated to have a fortune of £215 million in the Sunday Times Rich List of 2021, making him the 12th wealthiest person in the British music industry. He lives with his wife in the Grade II listed Durrington House, a £4.65 million property in Essex.
Relationships and family
Stewart is known for his liaisons with women and has eight children, by five mothers:
In reference to his divorces, Stewart was once quoted as saying, "Instead of getting married again, I'm going to find a woman I don't like and just give her a house."
In January 2020, Stewart and his 39-year-old son, Sean, were arrested and Stewart was charged with alleged assault following an incident at a Florida hotel. He was due to appear in court on 5 February. Stewart's defence lawyer Guy Fronstin, told Judge August Bonavita in October 2020 that he had been in contact with the prosecutors and the case is unlikely to reach the trial stage.
Awards and recognition
Brit Award for Outstanding Contribution to Music, 1993.
Received a Legend Award from the World Music Awards, 1993.
Inducted into the Rock and Roll Hall of Fame, 1994 (as a solo artist.)
Received the first ever Diamond Award from the World Music Awards for over 100 million records sold worldwide, 2001.
Grammy Award for Best Traditional Pop Vocal Album, 2005, Stardust ... The Great American Songbook Volume III.
On 11 October 2005, Stewart received a star on the Hollywood Walk of Fame for his contributions to the music industry, located at 6801 Hollywood Boulevard.
Inducted into the UK Music Hall of Fame, 2006.
According to Stewart, soul singer James Brown called him music's "best white soul singer" in September 2006.
Awarded CBE in the 2007 New Year Honours.
Appointed Knight Bachelor in the 2016 Birthday Honours.
Received the ASCAP Founders Award in 2011.
Inducted into the Rock and Roll Hall of Fame, 2012 (as a member of Faces).
To date, Stewart has received seven various Canadian Juno Award nominations.
Goldene Europa 1991 Best International Singer
Ivor Novello Awards 1999 Lifetime Achievement Award
List of bands
During his career, Rod Stewart has been a member of a number of groups including:
Jimmy Powell and the Five Dimensions (1963)
The Hoochie Coochie Men (19641965)
Steampacket (19651966)
Soul Agents (19651966)
Shotgun Express (1966)
The Jeff Beck Group (19671969)
Faces (19691975)
Discography
Studio albums
An Old Raincoat Won't Ever Let You Down (1969)
Gasoline Alley (1970)
Every Picture Tells a Story (1971)
Never a Dull Moment (1972)
Smiler (1974)
Atlantic Crossing (1975)
A Night on the Town (1976)
Foot Loose & Fancy Free (1977)
Blondes Have More Fun (1978)
Foolish Behaviour (1980)
Tonight I'm Yours (1981)
Body Wishes (1983)
Camouflage (1984)
Every Beat of My Heart (1986)
Out of Order (1988)
Vagabond Heart (1991)
A Spanner in the Works (1995)
When We Were the New Boys (1998)
Human (2001)
It Had to Be You: The Great American Songbook (2002)
As Time Goes By: The Great American Songbook, Volume II (2003)
Stardust: The Great American Songbook, Volume III (2004)
Thanks for the Memory: The Great American Songbook, Volume IV (2005)
Still the Same... Great Rock Classics of Our Time (2006)
Soulbook (2009)
Once in a Blue Moon: The Lost Album (2010)
Fly Me to the Moon... The Great American Songbook Volume V (2010)
Merry Christmas, Baby (2012)
Time (2013)
Another Country (2015)
Blood Red Roses (2018)
The Tears of Hercules'' (2021)
Tours
Foot Loose & Fancy Free Tour (1977)
Blondes 'Ave More Fun Tour (1978–1979)
Foolish Behaviour Tour (1980–1981)
Worth Leavin' Home For Tour (1981–1982)
Body Wishes Tour (1983)
Camouflage Tour (1984–1985)
Every Beat of My Heart Tour (1986)
Out of Order Tour (1988–1989)
Vagabond Heart Tour (1991–1992)
A Night to Remember Tour (1993–1994)
A Spanner in the Works Tour (1995–1996)
All Rod, All Night, All the Hits Tour (1998–1999)
Human Tour (2001)
Live in Concert Tour (2002)
From Maggie May to the Great American Songbook Tour (2004)
Tour (2005)
Rockin' in the Round Tour (2007)
Rocks His Greatest Hits Tour (2008–2009)
One Rockin' Night Tour (2009)
Soulbook Tour (2010)
Heart & Soul Tour (2011–2012) with Stevie Nicks
Live the Life Tour (2013)
The Voice, The Guitar, The Songs Tour (2014) with Santana
The Hits Tour (2014–2015)
Hits Tour 2015 (2015)
Hits Tour 2016 (2016)
From Gasoline Alley to Another Country: Hits 2016 (2016)
Summer Tour 2017 (with Cyndi Lauper) (2017)
Summer Tour 2018 (with Cyndi Lauper) (2018)
Blood Red Roses Tour (2019)
Rod Stewart The Hits 2020 (2020)
Rod Stewart The Hits (2021–)
Residency show
Rod Stewart: The Hits (2011–)
See also
Crooner
Coronet Apartments
List of artists who reached number one in the United States
List of artists who reached number one on the US dance chart
List of number-one dance hits (United States)
List of number-one hits (United States)
Notes
References
Bibliography
External links
BBC Derby profile
BBC: Sir Rod Stewart reveals his epic model railway city
Five audio interview clips from 1981
Q magazine's "100 Greatest Singers" list
1945 births
Living people
20th-century British male singers
21st-century British male singers
Anglo-Scots
Atlantic Records artists
Brit Award winners
British autobiographers
British blues singers
British buskers
British expatriates in the United States
British people of Scottish descent
British pop singers
British record producers
British rhythm and blues boom musicians
British rock singers
British male singer-songwriters
British soft rock musicians
British tenors
Capitol Records artists
Commanders of the Order of the British Empire
Faces (band) members
Grammy Award winners
Immediate Records artists
J Records artists
Knights Bachelor
Mercury Records artists
Musicians from Essex
People from Epping
People from Highgate
Singers awarded knighthoods
Singers from London
Universal Music Group artists
Vertigo Records artists
Warner Records artists
World Music Awards winners
Rail transport modellers
The Jeff Beck Group members
Steampacket members
Shotgun Express members
|
323392
|
https://en.wikipedia.org/wiki/Theoretical%20computer%20science
|
Theoretical computer science
|
Theoretical computer science (TCS) is a subset of general computer science and mathematics that focuses on mathematical aspects of computer science such as the theory of computation, lambda calculus, and type theory.
It is difficult to circumscribe the theoretical areas precisely. The ACM's Special Interest Group on Algorithms and Computation Theory (SIGACT) provides the following description:
History
While logical inference and mathematical proof had existed previously, in 1931 Kurt Gödel proved with his incompleteness theorem that there are fundamental limitations on what statements could be proved or disproved.
These developments have led to the modern study of logic and computability, and indeed the field of theoretical computer science as a whole. Information theory was added to the field with a 1948 mathematical theory of communication by Claude Shannon. In the same decade, Donald Hebb introduced a mathematical model of learning in the brain. With mounting biological data supporting this hypothesis with some modification, the fields of neural networks and parallel distributed processing were established. In 1971, Stephen Cook and, working independently, Leonid Levin, proved that there exist practically relevant problems that are NP-complete – a landmark result in computational complexity theory.
With the development of quantum mechanics in the beginning of the 20th century came the concept that mathematical operations could be performed on an entire particle wavefunction. In other words, one could compute functions on multiple states simultaneously. This led to the concept of a quantum computer in the latter half of the 20th century that took off in the 1990s when Peter Shor showed that such methods could be used to factor large numbers in polynomial time, which, if implemented, would render some modern public key cryptography algorithms like RSA_(cryptosystem) insecure.
Modern theoretical computer science research is based on these basic developments, but includes many other mathematical and interdisciplinary problems that have been posed, as shown below:
Topics
Algorithms
An algorithm is a step-by-step procedure for calculations. Algorithms are used for calculation, data processing, and automated reasoning.
An algorithm is an effective method expressed as a finite list of well-defined instructions for calculating a function. Starting from an initial state and initial input (perhaps empty), the instructions describe a computation that, when executed, proceeds through a finite number of well-defined successive states, eventually producing "output" and terminating at a final ending state. The transition from one state to the next is not necessarily deterministic; some algorithms, known as randomized algorithms, incorporate random input.
Automata theory
Automata theory is the study of abstract machines and automata, as well as the computational problems that can be solved using them. It is a theory in theoretical computer science, under discrete mathematics (a section of mathematics and also of computer science). Automata comes from the Greek word αὐτόματα meaning "self-acting".
Automata Theory is the study of self-operating virtual machines to help in the logical understanding of input and output process, without or with intermediate stage(s) of computation (or any function/process).
Coding theory
Coding theory is the study of the properties of codes and their fitness for a specific application. Codes are used for data compression, cryptography, error-correction and more recently also for network coding. Codes are studied by various scientific disciplines—such as information theory, electrical engineering, mathematics, and computer science—for the purpose of designing efficient and reliable data transmission methods. This typically involves the removal of redundancy and the correction (or detection) of errors in the transmitted data.
Computational biology
Computational biology involves the development and application of data-analytical and theoretical methods, mathematical modeling and computational simulation techniques to the study of biological, behavioral, and social systems. The field is broadly defined and includes foundations in computer science, applied mathematics, animation, statistics, biochemistry, chemistry, biophysics, molecular biology, genetics, genomics, ecology, evolution, anatomy, neuroscience, and visualization.
Computational biology is different from biological computation, which is a subfield of computer science and computer engineering using bioengineering and biology to build computers, but is similar to bioinformatics, which is an interdisciplinary science using computers to store and process biological data.
Computational complexity theory
Computational complexity theory is a branch of the theory of computation that focuses on classifying computational problems according to their inherent difficulty, and relating those classes to each other. A computational problem is understood to be a task that is in principle amenable to being solved by a computer, which is equivalent to stating that the problem may be solved by mechanical application of mathematical steps, such as an algorithm.
A problem is regarded as inherently difficult if its solution requires significant resources, whatever the algorithm used. The theory formalizes this intuition, by introducing mathematical models of computation to study these problems and quantifying the amount of resources needed to solve them, such as time and storage. Other complexity measures are also used, such as the amount of communication (used in communication complexity), the number of gates in a circuit (used in circuit complexity) and the number of processors (used in parallel computing). One of the roles of computational complexity theory is to determine the practical limits on what computers can and cannot do.
Computational geometry
Computational geometry is a branch of computer science devoted to the study of algorithms that can be stated in terms of geometry. Some purely geometrical problems arise out of the study of computational geometric algorithms, and such problems are also considered to be part of computational geometry. While modern computational geometry is a recent development, it is one of the oldest fields of computing with history stretching back to antiquity. An ancient precursor is the Sanskrit treatise Shulba Sutras, or "Rules of the Chord", that is a book of algorithms written in 800 BCE. The book prescribes step-by-step procedures for constructing geometric objects like altars using a peg and chord.
The main impetus for the development of computational geometry as a discipline was progress in computer graphics and computer-aided design and manufacturing (CAD/CAM), but many problems in computational geometry are classical in nature, and may come from mathematical visualization.
Other important applications of computational geometry include robotics (motion planning and visibility problems), geographic information systems (GIS) (geometrical location and search, route planning), integrated circuit design (IC geometry design and verification), computer-aided engineering (CAE) (mesh generation), computer vision (3D reconstruction).
Computational learning theory
Theoretical results in machine learning mainly deal with a type of inductive learning called supervised learning. In supervised learning, an algorithm is given samples that are labeled in some
useful way. For example, the samples might be descriptions of mushrooms, and the labels could be whether or not the mushrooms are edible. The algorithm takes these previously labeled samples and
uses them to induce a classifier. This classifier is a function that assigns labels to samples including the samples that have never been previously seen by the algorithm. The goal of the supervised learning algorithm is to optimize some measure of performance such as minimizing the number of mistakes made on new samples.
Computational number theory
Computational number theory, also known as algorithmic number theory, is the study of algorithms for performing number theoretic computations. The best known problem in the field is integer factorization.
Cryptography
Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and that are related to various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation. Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.
Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in practice by any adversary. It is theoretically possible to break such a system, but it is infeasible to do so by any known practical means. These schemes are therefore termed computationally secure; theoretical advances, e.g., improvements in integer factorization algorithms, and faster computing technology require these solutions to be continually adapted. There exist information-theoretically secure schemes that cannot be broken even with unlimited computing power—an example is the one-time pad—but these schemes are more difficult to implement than the best theoretically breakable but computationally secure mechanisms.
Data structures
A data structure is a particular way of organizing data in a computer so that it can be used efficiently.
Different kinds of data structures are suited to different kinds of applications, and some are highly specialized to specific tasks. For example, databases use B-tree indexes for small percentages of data retrieval and compilers and databases use dynamic hash tables as look up tables.
Data structures provide a means to manage large amounts of data efficiently for uses such as large databases and internet indexing services. Usually, efficient data structures are key to designing efficient algorithms. Some formal design methods and programming languages emphasize data structures, rather than algorithms, as the key organizing factor in software design. Storing and retrieving can be carried out on data stored in both main memory and in secondary memory.
Distributed computation
Distributed computing studies distributed systems. A distributed system is a software system in which components located on networked computers communicate and coordinate their actions by passing messages. The components interact with each other in order to achieve a common goal. Three significant characteristics of distributed systems are: concurrency of components, lack of a global clock, and independent failure of components. Examples of distributed systems vary from SOA-based systems to massively multiplayer online games to peer-to-peer applications, and blockchain networks like Bitcoin.
A computer program that runs in a distributed system is called a distributed program, and distributed programming is the process of writing such programs. There are many alternatives for the message passing mechanism, including RPC-like connectors and message queues. An important goal and challenge of distributed systems is location transparency.
Information-based complexity
Information-based complexity (IBC) studies optimal algorithms and computational complexity for continuous problems. IBC has studied continuous problems as path integration, partial differential equations, systems of ordinary differential equations, nonlinear equations, integral equations, fixed points, and very-high-dimensional integration.
Formal methods
Formal methods are a particular kind of mathematics based techniques for the specification, development and verification of software and hardware systems. The use of formal methods for software and hardware design is motivated by the expectation that, as in other engineering disciplines, performing appropriate mathematical analysis can contribute to the reliability and robustness of a design.
Formal methods are best described as the application of a fairly broad variety of theoretical computer science fundamentals, in particular logic calculi, formal languages, automata theory, and program semantics, but also type systems and algebraic data types to problems in software and hardware specification and verification.
Information theory
Information theory is a branch of applied mathematics, electrical engineering, and computer science involving the quantification of information. Information theory was developed by Claude E. Shannon to find fundamental limits on signal processing operations such as compressing data and on reliably storing and communicating data. Since its inception it has broadened to find applications in many other areas, including statistical inference, natural language processing, cryptography, neurobiology, the evolution and function of molecular codes, model selection in statistics, thermal physics, quantum computing, linguistics, plagiarism detection, pattern recognition, anomaly detection and other forms of data analysis.
Applications of fundamental topics of information theory include lossless data compression (e.g. ZIP files), lossy data compression (e.g. MP3s and JPEGs), and channel coding (e.g. for Digital Subscriber Line (DSL)). The field is at the intersection of mathematics, statistics, computer science, physics, neurobiology, and electrical engineering. Its impact has been crucial to the success of the Voyager missions to deep space, the invention of the compact disc, the feasibility of mobile phones, the development of the Internet, the study of linguistics and of human perception, the understanding of black holes, and numerous other fields. Important sub-fields of information theory are source coding, channel coding, algorithmic complexity theory, algorithmic information theory, information-theoretic security, and measures of information.
Machine learning
Machine learning is a scientific discipline that deals with the construction and study of algorithms that can learn from data. Such algorithms operate by building a model based on inputs and using that to make predictions or decisions, rather than following only explicitly programmed instructions.
Machine learning can be considered a subfield of computer science and statistics. It has strong ties to artificial intelligence and optimization, which deliver methods, theory and application domains to the field. Machine learning is employed in a range of computing tasks where designing and programming explicit, rule-based algorithms is infeasible. Example applications include spam filtering, optical character recognition (OCR), search engines and computer vision. Machine learning is sometimes conflated with data mining, although that focuses more on exploratory data analysis. Machine learning and pattern recognition "can be viewed as two facets of
the same field."
Parallel computation
Parallel computing is a form of computation in which many calculations are carried out simultaneously, operating on the principle that large problems can often be divided into smaller ones, which are then solved "in parallel". There are several different forms of parallel computing: bit-level, instruction level, data, and task parallelism. Parallelism has been employed for many years, mainly in high-performance computing, but interest in it has grown lately due to the physical constraints preventing frequency scaling. As power consumption (and consequently heat generation) by computers has become a concern in recent years, parallel computing has become the dominant paradigm in computer architecture, mainly in the form of multi-core processors.
Parallel computer programs are more difficult to write than sequential ones, because concurrency introduces several new classes of potential software bugs, of which race conditions are the most common. Communication and synchronization between the different subtasks are typically some of the greatest obstacles to getting good parallel program performance.
The maximum possible speed-up of a single program as a result of parallelization is known as Amdahl's law.
Program semantics
In programming language theory, semantics is the field concerned with the rigorous mathematical study of the meaning of programming languages. It does so by evaluating the meaning of syntactically legal strings defined by a specific programming language, showing the computation involved. In such a case that the evaluation would be of syntactically illegal strings, the result would be non-computation. Semantics describes the processes a computer follows when executing a program in that specific language. This can be shown by describing the relationship between the input and output of a program, or an explanation of how the program will execute on a certain platform, hence creating a model of computation.
Quantum computation
A quantum computer is a computation system that makes direct use of quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data. Quantum computers are different from digital computers based on transistors. Whereas digital computers require data to be encoded into binary digits (bits), each of which is always in one of two definite states (0 or 1), quantum computation uses qubits (quantum bits), which can be in superpositions of states. A theoretical model is the quantum Turing machine, also known as the universal quantum computer. Quantum computers share theoretical similarities with non-deterministic and probabilistic computers; one example is the ability to be in more than one state simultaneously. The field of quantum computing was first introduced by Yuri Manin in 1980 and Richard Feynman in 1982. A quantum computer with spins as quantum bits was also formulated for use as a quantum space–time in 1968.
, quantum computing is still in its infancy but experiments have been carried out in which quantum computational operations were executed on a very small number of qubits. Both practical and theoretical research continues, and many national governments and military funding agencies support quantum computing research to develop quantum computers for both civilian and national security purposes, such as cryptanalysis.
Symbolic computation
Computer algebra, also called symbolic computation or algebraic computation is a scientific area that refers to the study and development of algorithms and software for manipulating mathematical expressions and other mathematical objects. Although, properly speaking, computer algebra should be a subfield of scientific computing, they are generally considered as distinct fields because scientific computing is usually based on numerical computation with approximate floating point numbers, while symbolic computation emphasizes exact computation with expressions containing variables that have not any given value and are thus manipulated as symbols (therefore the name of symbolic computation).
Software applications that perform symbolic calculations are called computer algebra systems, with the term system alluding to the complexity of the main applications that include, at least, a method to represent mathematical data in a computer, a user programming language (usually different from the language used for the implementation), a dedicated memory manager, a user interface for the input/output of mathematical expressions, a large set of routines to perform usual operations, like simplification of expressions, differentiation using chain rule, polynomial factorization, indefinite integration, etc.
Very-large-scale integration
Very-large-scale integration (VLSI) is the process of creating an integrated circuit (IC) by combining thousands of transistors into a single chip. VLSI began in the 1970s when complex semiconductor and communication technologies were being developed. The microprocessor is a VLSI device. Before the introduction of VLSI technology most ICs had a limited set of functions they could perform. An electronic circuit might consist of a CPU, ROM, RAM and other glue logic. VLSI allows IC makers to add all of these circuits into one chip.
Organizations
European Association for Theoretical Computer Science
SIGACT
Simons Institute for the Theory of Computing
Journals and newsletters
“Discrete Mathematics and Theoretical Computer Science”
Information and Computation
Theory of Computing (open access journal)
Formal Aspects of Computing
Journal of the ACM
SIAM Journal on Computing (SICOMP)
SIGACT News
Theoretical Computer Science
Theory of Computing Systems
International Journal of Foundations of Computer Science
Chicago Journal of Theoretical Computer Science (open access journal)
Foundations and Trends in Theoretical Computer Science
Journal of Automata, Languages and Combinatorics
Acta Informatica
Fundamenta Informaticae
ACM Transactions on Computation Theory
Computational Complexity
Journal of Complexity
ACM Transactions on Algorithms
Information Processing Letters
Open Computer Science (open access journal)
Conferences
Annual ACM Symposium on Theory of Computing (STOC)
Annual IEEE Symposium on Foundations of Computer Science (FOCS)
Innovations in Theoretical Computer Science (ITCS)
Mathematical Foundations of Computer Science (MFCS)
International Computer Science Symposium in Russia (CSR)
ACM–SIAM Symposium on Discrete Algorithms (SODA)
IEEE Symposium on Logic in Computer Science (LICS)
Computational Complexity Conference (CCC)
International Colloquium on Automata, Languages and Programming (ICALP)
Annual Symposium on Computational Geometry (SoCG)
ACM Symposium on Principles of Distributed Computing (PODC)
ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)
Annual Conference on Learning Theory (COLT)
Symposium on Theoretical Aspects of Computer Science (STACS)
European Symposium on Algorithms (ESA)
Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX)
Workshop on Randomization and Computation (RANDOM)
International Symposium on Algorithms and Computation (ISAAC)
International Symposium on Fundamentals of Computation Theory (FCT)
International Workshop on Graph-Theoretic Concepts in Computer Science (WG)
See also
Formal science
Unsolved problems in computer science
List of important publications in theoretical computer science
Notes
Further reading
Martin Davis, Ron Sigal, Elaine J. Weyuker, Computability, complexity, and languages: fundamentals of theoretical computer science, 2nd ed., Academic Press, 1994, . Covers theory of computation, but also program semantics and quantification theory. Aimed at graduate students.
External links
SIGACT directory of additional theory links
Theory Matters Wiki Theoretical Computer Science (TCS) Advocacy Wiki
List of academic conferences in the area of theoretical computer science at confsearch
Theoretical Computer Science - StackExchange, a Question and Answer site for researchers in theoretical computer science
Computer Science Animated
Theory of computation @ Massachusetts Institute of Technology
Formal sciences
|
1488945
|
https://en.wikipedia.org/wiki/Nero%20AG
|
Nero AG
|
Nero AG (known as Ahead Software AG until 2005) is a German computer software company that is especially well known for its CD/DVD/BD burning suite, Nero Burning ROM, and is currently the global market leader for this recording software. The company's main product is Nero 2019, a piece of software that comprises burning, file conversion, media management, and video editing functions and is updated on an annual basis.
History
Richard Lesser founded the company as Ahead Software GmbH in 1995. The company changed its name (and legal form) to Ahead Software AG in 2001 and again to Nero AG in 2005.
The Nero Group includes foreign subsidiaries in Glendale, California, United States (Nero Inc., founded in 2001), in Yokohama, Japan (Nero K.K., founded in 2004), and Hangzhou, China (Nero Ltd., founded in 2007). The USA and Japan operations are sales offices, while the Chinese subsidiary operates exclusively to provide internal development services for the company.
In May 2007, it was announced that the Luxembourg-based firm Agrippina International SàrL owned more than 25% of Nero AG shares.
In 2009, the company established two additional subsidiaries in Germany: Nero Development and Services GmbH and Nero EMEA Sales GmbH.
In 2014, the company moved the operations and headquarters of Nero AG, as well as of the two group companies Nero Development and Services GmbH and Nero EMEA Sales GmbH, to Karlsruhe.
Products
From its beginnings selling a single software application for burning, the company says it has become a "leader in digital media technologies" that now sells a wide range of products. Nero sells its products directly as well as via hardware manufacturers that bundle them on PCs, hard disks, camcorders and other devices. Other companies also use Nero multimedia codecs, SDKs and programming interfaces.
In 2008, Nero expanded its product range for the first time beyond the well-known burning software. With Nero Move it, users were able to transfer photos, videos, and music from one device to another or to online communities like YouTube, Myspace, and the company's own multimedia community My Nero. With the Nero 9 multimedia suite, they could create, rip, burn, edit, save, and upload their music, video, and photo files. In June 2009, the company launched its Nero BackitUp & Burn product, which saved, burned, and restored data and helped protect users' digital content. The company extended the product with additional functions in the years following its launch and gave the user navigation around the various program elements a more unified look and feel.
As a product, Nero evolved from a pure burning program (Nero Burning ROM) to a multimedia software package. The software includes programs:
for burning and packet writing (Nero Burning ROM)
for ripping and converting multimedia content (Nero Recode)
for displaying, managing, and streaming photos and multimedia content (Nero MediaHome) and
for creating, editing, and transcoding video content and for burning video content to video discs with menus (Nero Video)
Along with Nero, Nero AG also developed SecurDiscs process, as well as the MPEG-4 compression technique Nero Digital together with Ateme corporation.
The backup solution Nero BackItUp, which was initially included in the Nero suite of programs, was spun off in 2012 and is now available together with cloud-based storage as a subscription model. Android, iOS and Windows Phone apps are available for Nero BackItUp.
Along with BackItUp, Nero provides additional applications for mobile devices. These include NeroKwik for managing photo files, Nero AirBurn for burning files wirelessly, Nero MediaHome Receiver for streaming media from a PC to mobile devices, and Nero MediaHome WiFi Sync for wireless data synchronization.
Since the release of Version 11, Nero Cover Designer (for creating covers), Nero WaveEditor (for editing music files) and Nero SoundTrax (for mixing and digitalizing music tracks) are no longer included in the suite but can be downloaded free of charge from the company's website.
Some of the products in the suite can also be downloaded separately. These include Nero Burning ROM and Nero Video.
Nero has also launched a number of free mobile Nero Suite companions apps for iOS and Android like Nero AirBurn, Nero Streaming Player. The latest app is Nero KnowHow app a digital learning guide for users, available for iOS, Windows 10 and Android.
References
External links
Nero AG official website
Nero AG´s My Nero Community
Software companies of Germany
Companies established in 1995
Companies based in Baden-Württemberg
Companies based in Karlsruhe
German brands
|
2421561
|
https://en.wikipedia.org/wiki/Firewall%20%28film%29
|
Firewall (film)
|
Firewall is a 2006 action thriller film directed by Richard Loncraine and written by Joe Forte. The film stars Harrison Ford as a banker who is forced by criminals, led by Paul Bettany, to help them steal $100 million. Firewall received negative reviews from critics with criticism for its plot and editing, with some comparing it unfavorably to James Bond. It grossed almost $83 million at the box office.
Plot
Jack Stanfield is chief of security of Landrock Pacific Bank in downtown Seattle. He is visited by a collection agency, claiming he owes $95,000 to their online gambling site. Believing the incident is due to an identity theft, Jack entrusts a colleague Harry Romano to take care of the claim. He goes out for a drink with Harry who introduces him to Bill Cox, a potential partner. After they leave, Cox follows Jack into his car and forces him to drive home at gunpoint. At home, Jack finds his wife Beth and two children unharmed, but under surveillance by Cox's henchmen.
The next morning, Jack is given instruction to transfer $10,000 each from the bank's 10,000 largest depositors – $100 million total – to Cox's bank account. Cox rigs Jack with a camera and microphone to make sure he cannot ask for help without them knowing.
At Landrock Bank, Cox visits Jack, reintroducing himself as Bill Redmond, a potential partner. Cox asks Jack to give him a tour of the bank's security system. On the way back home, Jack attempts to bribe a henchman to betray Cox, but Cox kills the henchman. At home, Jack attempts an escape with his family, but his attempt is foiled. In retaliation, Cox gives Jack's son Andy a cookie containing nut products, sending him into an anaphylactic shock. Cox withholds the treatment (an EpiPen), until Jack acquiesces to their plan.
The next day, Cox forces Jack to fire his secretary Janet, fearing that she is growing suspicious. Jack initiates a wire transfer to send the money to Cox's offshore accounts. Before leaving, Jack uses an employee's camera phone to take a picture of the account information on the screen. Cox then begins covering his tracks. He forces Jack to delete security data and surveillance tapes, and use a virus to cripple the building's system into disarray. Returning home, Jack finds the house empty except for Liam, one of Cox's men.
Realizing Cox has no intention of letting him live, Jack kills Liam with a heavy glass blender. He calls Harry, but his colleague doesn't answer. Jack goes to Harry's house to inquire about Cox. However, Cox kills Harry with a gun he had earlier confiscated from Jack. Beth, held at gunpoint, leaves a message suggesting an affair on Harry's answering machine. This implicates Jack in Harry's death. In addition, the $95,000 debt will be considered motive for Jack embezzling the bank's money.
Jack turns to Janet, she helps him retrieve the phone with the picture of Cox's account information. Jack hacks into Cox's Cayman Island accounts and transfers the money away. He calls Cox using Liam's phone and they arrange to free his family in exchange for returning the money. During the conversation, Jack hears the family dog in the background, and realizes he can locate his family by the GPS tracking unit in the dog's collar. The signal leads him to an abandoned house. He tells Janet to call the police and approaches the house.
When one of his henchmen, Vel, takes pity on the family, Cox kills him. Jack's daughter Sarah runs out of the house. Another henchman, Pim, chases after her, but Jack rams him with Janet's car, which hits an RV that explodes, killing Pim and destroying the car. Cox takes Beth and Andy to the upper floor. Jack enters the house and engages Cox in a final showdown. Their fight eventually leads them into a ditch Cox had dug for Jack's family. Cox temporarily gains the upper hand, but Jack impales Cox with a pickaxe, killing Cox and saving his family. Jack reconciles with them before they all start to head back home.
Cast
Harrison Ford as Jack Stanfield, chief of security of Landrock Pacific Bank.
Paul Bettany as Bill Cox, a businessman who holds Jack and his family hostage and forces Jack to transfer $100 million from the bank he works at to his offshore accounts.
Virginia Madsen as Beth Stanfield, Jack's wife
Mary Lynn Rajskub as Janet Stone, Jack's secretary
Robert Patrick as Gary Mitchell, Jack's colleague
Jimmy Bennett as Andy Stanfield, Jack and Beth's youngest child brother
Carly Schroeder as Sarah Stanfield, Jack and Beth's eldest child daughter
Robert Forster as Harry Romano, Jack's colleague who introduces him to Bill Cox
Alan Arkin as Arlin Forester, Jack and Harry's employer.
Vincent Gale as Willy, one of Cox's henchmen
Kett Turton as Vel, one of Cox's henchmen who has compassion for Jack's family
Nikolaj Coster-Waldau as Liam, one of Cox's henchmen
Vince Vieluf as Pim, Cox's most sadistic henchman
Matthew Currie Holmes as Bobby, Landrock Pacific Bank employee
Beverley Breuer as Sandra
Ty Olsson as Airport traffic cop
Reception
Box office
Firewall opened theatrically on February 10, 2006 in 2,840 venues, earning $13,635,463 in its opening weekend, ranking fourth in the domestic box office. The film ended its run fourteen weeks later, on May 18, 2006, having grossed $48,751,189 in the United States and Canada, and $34,000,000 internationally for a worldwide total of $82,751,189. The film was released in the United Kingdom on March 31, 2006, and opened on #7.
Critical reception
The film received largely negative reviews from critics. On review aggregator website Rotten Tomatoes, the film has an 18% rating based on 158 reviews, with an average rating of 4.5/10. The site's consensus states: "Harrison Ford's rote performance brings little to this uninspired techno heist film whose formulaic plot is befuddled with tedious and improbable twists." Metacritic reports a 45 out of 100 rating based on 38 critics, indicating "mixed or average reviews". Audiences polled by CinemaScore gave the film an average grade of "B+" on an A+ to F scale.
Awards
Home media
Firewall was released on DVD and HD DVD on June 6, 2006 and opened at #2 at the sales chart of DVDs, grossing $10.8 million off 596,000 units. As per the latest figures, 1,286,600 units have been sold translating to $21.1 million in revenue.
See also
List of American films of 2006
List of films featuring home invasions
List of films featuring surveillance
Tiger kidnapping
References
External links
2006 films
American films
Australian films
English-language films
2006 action thriller films
2006 crime thriller films
American action thriller films
Australian action thriller films
American crime thriller films
Australian crime thriller films
Films scored by Alexandre Desplat
Films about computing
Films about extortion
Films about families
Films about kidnapping
Films directed by Richard Loncraine
Films produced by Armyan Bernstein
Films set in Seattle
Films shot in Vancouver
Techno-thriller films
Beacon Pictures films
Village Roadshow Pictures films
Warner Bros. films
Films produced by Basil Iwanyk
Thunder Road Films films
|
24758295
|
https://en.wikipedia.org/wiki/MoSync
|
MoSync
|
MoSync is a discontinued free and open-source software development kit (SDK) for mobile applications. It is integrated with the Eclipse development environment. The framework produces native mobile applications for multiple platforms using C/C++, HTML5 scripting and any combination thereof. The target group for MoSync are both web developers looking to enter the mobile space, as well as the ordinary PC/Mac desktop developer with knowledge in C/C++ development.
MoSync was developed by the Swedish software company MoSync AB (formerly Mobile Sorcery AB). The first version of the product was launched in early 2005 with support for the Java ME platform. Support for several other mobile development platforms has been added since. MoSync AB filed for bankruptcy in July 2013.
MoSync applications are written in the C and C++ programming languages, or in combination with HTML5 and JavaScript. From this code base, MoSync can build application packages for hundreds of different mobile devices on a wide range of mobile operating systems. MoSync currently supports versions of Android 2.x-4.x, iOS, Windows Mobile Classic, Windows Phone, Symbian S60, Java Mobile and the Moblin platform.
Support for iOS, Android and Moblin was announced on 19th Feb 2010 during Mobile World Congress 2010 in Barcelona.
Native UI
The MoSync platform can access parts of the native UI system on Android and iOS devices since version 2.5, and Windows Phone devices since version 3.0. The MoSync NativeUI API has widgets for embedding webpages and OpenGL ES views in applications and all the UI widgets are handled from the same code base on both Android and iOS. It is also possible to run emulators from other SDKs, such as Android and iOS emulators ensuring that elements native to each OS has the right look ´n feel in their respective environments.
Wormhole technology
Introduced in MoSync SDK 2.7 Pyramid is a technology called Wormhole, which creates a hook which connects javascript calls to MoSync's underlying C APIs, thereby allowing the developer to the functionality of the webview. Currently this functionality is available for Android, Windows Phone, and iOS, while other platforms could be added in future versions, due to the cross-platform nature of the MoSync SDK.
See also
Multiple phone web-based application framework
Mobile app development
References
External links
Official Website (Archived)
Mobile Apps Design
Mobile App Development
Hiring Mobile App Developers
Integrated development environments
Mobile software development
Software development kits
Software using the Apache license
Free mobile software
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.