id
stringlengths 3
8
| url
stringlengths 32
207
| title
stringlengths 1
114
| text
stringlengths 93
492k
|
---|---|---|---|
25136083 | https://en.wikipedia.org/wiki/Affiliate%20tracking%20software | Affiliate tracking software | Affiliate Tracking Software is used to track the referral, endorsement or recommendation made by one person or company to buy products or services from another person or company. Tracking is necessary to manage and reward or compensate the participants of an affiliate marketing group of participants or affiliate networks. The original concept comes from Affinity marketing. The participants that agree to promote or be promoted are called "affiliates". Those that promote and recommend are called "marketers" and the ones that have the products or services that are promoted are called "advertisers".
The affiliate tracking software can be self-hosted or operate in a cloud. Regardless of that, trackers record page views and clicks of advertising material (banners, clicks, etc.), while also recording conversions, i.e. events that are deemed valuable by the marketers.
Several online businesses create affiliate networks to manage affiliates that promote their products and services. Affiliate platforms are companies that intermediate and manage both marketers and advertisers, operating as a broker.
The core of affiliate marketing software is tracking the various aspects of a given action, that are commonly categorised in eight types:
CPC (Cost per click)
CPA (Cost per acquisition)
CPM (Cost per impression)
CPS (Cost per sale)
CPI (Cost per install)
CPL (Cost Per Lead)
CPV (Cost Per Visitor)
CPO (Cost Per Order)
Tracking refers to user-client IP detection, browser detection, marketer's affiliate referral and advertiser's completed transaction.
The main feature of affiliate marketing software is consolidation of data that allows marketers and advertisers to perform various marketing optimization techniques.
Although affinity marketing refers to marketing to persons sharing the same interests, the derived affiliate networks is closely related to sales channels and sales campaigns paying sales commissions, the reason why a solid and reliable software is required to prevent fraud and provide security and privacy for the parties involved in the transactions.
Affiliate tracking and conversion attribution:
While affiliate tracking is a key component of any affiliate tracking software, it is usually closely tied to conversion attribution models such as "first click" or "last click" attribution. "In fact, regardless of your marketing activity, tracking a conversion has no real value unless you can attribute it to the traffic source, keyword and campaign that brought the user in the first place.
The attribution model applies a business rule that credits a tracked conversion to the first or last affiliate that referred the visitor to the merchant's website.
Affiliate tracking software have other features like:
Generating Tracking Codes: Tracking of all clicks and leads require a special unique URL which contains the affiliate id and perhaps the campaign number, that is parsed to the advertiser's site and then associated with a user cookie to identify landing page, visit date, expire date, user identification and related sales closing information. These tracking URLs are also called as tracking codes. The software can generate a code, token or shortened URL, or can track by affiliate name. However, on January 14 Google announced that it would stop supporting 3-rd party cookies in 2 years. It caused the rise in popularity of (cookie-less and direct tracking methods) as reliable and safe alternatives for 3-rd party cookies-based methods.
Tracking Time and Location: Tracking time and location of impression, click, lead and sale, usually gathered from user cookies, sent back from the advertiser's server site to the tracking software server for consolidation.
Tracking Source: Not just the location source, as previously cited, source also refers to web page originating the URL link (blog article for instance) and source type (banner, keyword, search, chatbot or other), that gives both marketers and advertisers the information to improve context and maximize click-through ratios (how many times are required to show a banner to have someone click on it) and sales conversion (how many clicks are required to have someone buy the referred product/service).
Tracking Affiliate: Identify volume and effectiveness. Volume in traffic and effectiveness is how successful the affiliate is in selling (or making money for the network).
Fraud Detection: The need of fraud detection has increased with the expansion of affiliate marketing industry and the availability of IP changing software, chatbots that can simulate clicks and purchases, and even hacking to inject data into the software database to inflate affiliate credits and ratios.
Tracking GEO, ISP, Browser, Device, OS, IP etc.
Server-side tracking: Because affiliate marketers refer visitors from their own website to a merchant website, and since cross domain tracking is blocked by browser tracking preventions, affiliate tracking software provide server to server tracking methods. Server to server tracking methods (also called Postback URL tracking) allow the affiliate tracking software to receive notifications when a conversion is being triggered by the merchant.
References
Affiliate marketing |
7310741 | https://en.wikipedia.org/wiki/Adilbek%20Zhaksybekov | Adilbek Zhaksybekov | Adilbek Ryskeldiuly Zhaqsybekov (, Ädılbek Ryskeldıūly Jaqsybekov) (born 26 July 1954) is current Head of the Executive Office of the President of the Republic of Kazakhstan. He served as the minister of defence from June 2009 to April 2014. He was the head of Kazakh President Nursultan Nazarbayev's administration. He served as the Mayor of Astana from 1997 to 2003 and from 2014 to 2016. Chairman of Governors of the Islamic Development Bank in 2003, and the Minister of Industry and Trade from 2003 to 2004.
While Information Minister, Zhaksybekov participated in a meeting held in Kyiv, Ukraine in 2004 in which a Common Economic Area was proposed for Kazakhstan, Ukraine, Belarus, and Russia.
On 4 April 2004, he gave a speech entitled "The Industrial Innovation Development Strategy of Kazakhstan, 2003–2015" in Washington, DC.
Kazakhstan and the World Trade Organization
Supachai Panitchpakdi, the Director-General of the World Trade Organization, met with Zhaksybekov and a government delegation in Geneva on 9–15 July to discuss Kazakh admission into the World Trade Organization. The Kazakh Foreign Ministry issued a press release about the talks on 17 July. Radio Free Europe reported that a WTO Secretariat offered to "provide technical and organizational help to prepare Kazakhstan for membership" as both Panitchpakdi and Zhaksybekov agreed that Kazakhstan "needs to make its economy more competitive before joining." The WTO credited the government for liberalizing its policy on foreign-trade and conforming to WTO accounting policies. The Kazakh Foreign Ministry was positive about Kazakhstan's prospects of becoming the second Central Asian state with membership in the WTO.
Cultural exchange with Russia
Zhaksybekov, who served as the mayor of Astana, met with Yuri Luzhkov, the mayor of Moscow, during the "Days of culture," held from 14–16 May, in 2002. The local government in Moscow sponsored ten events, including the presentation of a stone sculpture entitled "A Symbol of Friendship of Moscow and Astana."
Trade agreements
Agreement with Pakistan
Zhaksybekov and Abdul Hafeez Sheikh, the Pakistani Minister for Investment and Privatization, signed a trade agreement on 8 December 2003. According to Dawn, the agreement would "promote and protect bilateral trade and investment and enhance economic, scientific and technical cooperation" by creating "favourable conditions for investment by each others' investors for reciprocal promotion and protection of investments." The agreement prevented double taxation, and forbid "expropriat[ion], nationaliz[ation]," and "requisitioning" of each other's investments in their respective countries.
Agreement with Afghanistan
Sayeed Moustafa Khazi, Afghan's Trade Minister, and Zhaksybekov signed an Agreement on Trade and Economic Cooperation on 15 April 2004. President Nazarbayev and Afghan President Hamid Karzai signed an agreement on Treaty on Foundations of Relations and Cooperation earlier that day in Astana. The meeting was Karzai's first official visit to Kazakhstan. Nazarbayev told a news conference in Astana, "Kazakhstan is absolutely interested in developing trade, economic and political relations with Afghanistan, as well as in our joint fight against terrorism and drug trafficking." He continued by saying the entire world was eager to see peace and economic restoration in Afghanistan, and "we are in this coalition. We are grateful to President Karzai for inviting Kazakh bankers and businesspeople to come and work in Afghanistan. Today's visit of the Afghan President is historic, because we meet here for the first time since the statehood of Afghanistan has been restored and the documents we signed are a good foundation for further cooperation." The President continued by offering to provide Kazakh experts "ready to work in Afghanistan in geology, building roads and installations, helping with medical professional, and continue to assist in any way we can, because we are interested in stability in Afghanistan. We want to trade and to use Afghan territory to build links to the south." Karzai said, "I believe Kazakhstan is an example of a country that was given an opportunity and used it. We intend to continue working with Kazakhstan to develop transit potential and bilateral trade."
Information technology
On 26 March 2004, Zhaksybekov met with Information Minister Birzhan Kaneshev and Jean-Philippe Courtois, the Microsoft CEO for Europe, the Middle East and Africa, in Astana. They signed a memorandum of understanding outlining the development of information technology in Kazakhstan. Microsoft agreed to help the government create an internal network, an information technology sector, and Microsoft Office software in Kazakh. Courtois noted Microsoft and the government agreed to exchange information security knowledge. Zhaksybekov said the MOU would lead to future deals with other companies "involving big money."
Islamic Development Bank
The Islamic Development Bank, which Zhaksybekov chaired in 2003, agreed to lend the Kazakh government an additional USD $32 million in a meeting in September 2003. IRIN reported the money was lent for "upgrading water and postal systems and establishing a 'legal and humanitarian' university."
2007 political shakeup
Prime Minister Daniyal Akhmetov resigned on 8 January 2007. President Nazarbayev nominated Deputy Prime Minister Karim Masimov, Akhmetov's political rival, to succeed Akhmetov, on 9 January 2007. Nazarbayev's political party Nur Otan endorsed Massimov, but some analysts in Kazakhstan considered Zhaksybekov as a candidate. The Parliament convened on 10 January to which Massimov was confirmed as the Prime Minister.
Football official
He was the head of the Football Federation of Astana city from 2000, until being elected the president of the Football Federation of Kazakhstan on 28 August 2007
References
External links
Head of the Administration of Kazakhstan Prezident objections
1954 births
Ambassadors of Kazakhstan to Russia
Living people
Government ministers of Kazakhstan
Mayors of Nur-Sultan
Ministers of Defence of Kazakhstan |
851206 | https://en.wikipedia.org/wiki/World%20Computer%20Chess%20Championship | World Computer Chess Championship | World Computer Chess Championship (WCCC) is an event held periodically since 1974 where computer chess engines compete against each other. The event is organized by the International Computer Games Association. It is often held in conjunction with the Computer Olympiad, a collection of computer tournaments for other board games.
The WCCC is open to all types of computers including microprocessors, supercomputers, clusters, and dedicated chess hardware.
Championship results
In 2007, the reigning champion Junior declined to defend its title.
For the 2009 edition, the rules were changed to limit platforms to commodity hardware supporting at most eight cores, thereby excluding supercomputers and large clusters. Thereafter, a parallel Software Championship was held instead; unlimited hardware is still allowed in the championship proper.
World Chess Software Championship
From 2010 a new tournament was introduced and held at the same location and during the same period as the World Computer Chess Championship. The rules for the World Chess Software Championship state that competing programs must run on machines with identical hardware specifications. Time control is game in 45 minutes with 15 second increment.
Due to the requirement to be present on-site, play on a physical board, and strict rules of originality, many strong programs refrain from participating in the ICGA events. As the conditions of the software championship can easily be emulated by anyone with a high-end PC, there are now privately conducted tournaments, such as Top Chess Engine Championship, that have much broader attendance, as well as a larger number of games to reduce the influence of chance.
World Microcomputer Chess Championship
From 1980 to 2001, the ICCA/ICGA organized a separate cycle of championships limited to programs running on microprocessors. In the first three championships, the winners were dedicated chess computers, and then in 1984, Richard Lang's Psion program shared first place, running on an IBM PC under MS-DOS.
At the 14th WMCCC in Jakarta, the Israeli team Junior was denied entry to Indonesia and some other teams dropped out in protest.
The 16th WMCCC was the same as the 9th WCCC above.
See also
Chess engine
Computer chess
Computer Olympiad
World Computer Speed Chess Championship
North American Computer Chess Championship
Dutch open computer chess championship
Top Chess Engine Championship
References
All results of the WMCCC and WCCC on the official ICGA web site
External links
Official website of the ICGA
Kanazawa - WCCC 2010
Pamplona - WCCC 2009
Beijing - WCCC 2008
Amsterdam - WCCC 2007
Torino - WCCC 2006
Reykjavik - WCCC 2005
Computer
Computer chess competitions
Recurring events established in 1974 |
39562953 | https://en.wikipedia.org/wiki/Ninetology%20Black%20Pearl%20II | Ninetology Black Pearl II | The Ninetology Black Pearl II (I9400) is a smart mobile phone manufactured by Ninetology with dual SIM capabilities. It is a low-end smartphone, using a dual core (1.0 GHz) processor and runs on the Android Ice Cream Sandwich 4.0 Operating System.
The phone is offered sealed with a default SIM card from Malaysian telecommunications provider Digi.
History
Release
The Ninetology Black Pearl II I9400 was announced on December, 2012.
Feature
Hardware
The Ninetology Black Pearl II I9400 has a dimension of 129.0 mm (H) X 65.5 mm (W) X 10.3 mm (T) and weighs 139 grams. A dual core 1.0 GHz processor is used to power the device. It has a 4.0 inch capacitive IPS LCD screen display with a WVGA (244 ppi pixel density) resolution of 800 X 480, displaying up to 16M colors.
It possesses a 5.0-megapixel rear camera with face detection function, a LED flash feature and an autofocus function, as well as a VGA front-facing camera.
The main SIM card slot is visible once the back cover is removed and can be accessed by removing the battery pack.
The second SIM Card slot is located right below the main SIM card slot. The battery possesses a capacity of Li-Ion 1600 mAh.
Additional storage is available via a MicroSD card socket, which is certified to support up to 32 GB of additional storage.
Software
The Ninetology Black Pearl II I9400 is running on the Android Ice Cream Sandwich Operating System and is preloaded with a variety of applications:
Web: Native Android Browser
Social: Facebook, YouTube
Media: Camera, Gallery, FM Radio, Music Player, Video Player,
Personal Information Management: Calendar, Detail Contact Information
Utilities: Calculator, Alarm Clock, Google Maps, News and Weather Application, Voice Recorder
References
External links
http://www.ninetology.com/malaysia/products_smartphones_pearl_d2.html
Smartphones
Mobile phones introduced in 2012
Android (operating system) devices |
3112895 | https://en.wikipedia.org/wiki/Rocky%20Mountain%20BASIC | Rocky Mountain BASIC | Rocky Mountain BASIC (also RMB or RM-BASIC) is a dialect of the BASIC programming language created by Hewlett-Packard. It was especially popular for control of automatic test equipment using GPIB. It has several features which are or were unusual in BASIC dialects, such as event-driven operation, extensive external I/O support, complex number support, and matrix manipulation functions. Today, RMB is mainly used in environments where an investment in RMB software, hardware, or expertise already exists.
History and implementations
The origins of Rocky Mountain BASIC can be traced to Hewlett-Packard's facilities in Colorado. Since Colorado is located in the Rocky Mountains, this variation of BASIC was dubbed "Rocky Mountain BASIC", to differentiate it from the other BASIC dialects developed within the company. It is unclear if the Rocky Mountain BASIC name was original to HP or came from outside, but HP/Keysight use the term in their own documentation, as well as the more formal "HP BASIC" product name.
The HP 9830A, introduced in 1972, was the top of the 9800 line programmable calculator line, which was the first HP computer which fit on a desktop to have a BASIC interpreter in read-only memory (ROM). The interpreter could be extended with ROMs for features like mass storage, plotter graphics, string variables and matrix operations. It had a one-line LED panel for line editing, but was followed in the late 1970s by the faster HP 9835 and HP 9845 desktop computers with full screen CRT displays. These were amongst the first workstations aimed at scientists and engineers for both technical computing and instrumentation control. These were followed by the HP 9826 and HP 9836 computers, which were the leading models of the HP 9800 series of computers. All four of these computers ran versions of Rocky Mountain BASIC. These computers were often used as controllers for HP automatic test equipment, connected via the HP Instrument Bus, (HP-IB). HP wanted to provide a programming language that would be friendly to the engineers and scientists who used such test equipment. The BASIC programming language was chosen, as it was already intended to be easy for novices; knowledgeable users could also program them in assembly language or a version of Pascal.
Early implementations of RMB software on the HP 9000 platform were called "HP BASIC/WS". BASIC/WS ran stand-alone. It provided operating system (OS), integrated development environment (editor and debugger), and the language interpreter. Later, HP implemented RMB on top of the HP-UX operating system, and called it "BASIC/UX". BASIC/UX 300 ran on series 300 hardware and BASIC/UX 700 ran on series 700 hardware. BASIC/WS, BASIC/UX 300 and BASIC/UX 700 were last updated to fix Year 2000 date related issues.
As technology advanced, HP was able to embed RMB implementations directly in the test equipment. The capabilities of these embedded implementations varied. These implementations went by a variety of names, including "HP Instrument BASIC" and "Board Test BASIC" ("BT-BASIC").
HP produced an RMB implementation for Microsoft Windows called "HP Instrument BASIC for Windows"; however, it never enjoyed the success of their other RMB products.
Another company, TransEra of Orem, Utah, created a clone implementation of RMB, which they called "High Tech BASIC", or "HT BASIC" (now "HTBasic"), meant to run on IBM PC hardware. HP later licensed HT BASIC from TransEra Corporation, re-branded it, and sold it as "HP BASIC for Windows". It was unrelated to the HP-produced "HP Instrument BASIC for Windows". As of 2015, TransEra is still maintaining and updating HTBasic with fixes and new features - the current version is 10.0.3. Although HTBasic is fundamentally an interpreted language, a compiler is available.
Test & Measurement Systems, Inc., also known as TAMS, of Loveland, Colorado, acquired HP BASIC/WS and BASIC/UX 300 product responsibility in 1998. TAMS then sold and supported legacy versions of BASIC/WS and BASIC/UX . TAMS licensed BASIC/UX 700 from Agilent Technologies and ported RMB to both HP-UX 11i and Red Hat Enterprise Linux. The HP-UX 11i implementation was known as "BASIC for 11i" or "BASIC/UX 11i". The Red Hat Enterprise Linux version was known as "BASIC for Linux", "BASIC/LX" or "RMBLX". TAMS ceased operating on March 31, 2016.
HP retained BASIC/UX 700 (E2045C, BASIC for HP-UX 10.20) until spinning off their instrument division as Agilent Technologies. BASIC/UX 700 (on HP-UX 10.20) product responsibility went with Agilent Technologies, who eventually dropped support for it. Agilent referred customers to either TransEra for BASIC for Windows or to TAMS for BASIC/WS, BASIC/UX or BASIC for Linux.
See also
HP Time-Shared BASIC
References
www.agilent.com — Agilent site; search for "HP BASIC"
www.htbasic.com — HTBasic; RMB implementation for MS Windows (TransEra)
www.tamsinc.com — Test & Measurement Systems, Inc., a.k.a. TAMS; BASIC/WS, BASIC/UX, BASIC for Linux
www.prc68.com — Rack and Stack Systems; excellent history of early RMB systems
BASIC programming language
BASIC programming language family |
35862964 | https://en.wikipedia.org/wiki/Geomagic | Geomagic | Geomagic is the professional engineering software brand of 3D Systems. The brand began when Geomagic Inc., a software company based in Morrisville, North Carolina, was acquired by 3D Systems in February 2013 and combined with that company's other software businesses (namely Rapidform acquired by 3D Systems in October 2012 and Albre in July 2011). Geomagic was founded in 1997 by Ping Fu and Herbert Edelsbrunner.
Geomagic-branded software products are focused on computer-aided design, with an emphasis on 3D scanning and other non-traditional design methodologies, such as voxel-based modeling with haptic input. 3D Systems also markets 3D quality inspection software as well as 3D scanners under the Geomagic brand.
Geomagic Products
3D Scanning Systems
Geomagic Capture is an integrated system consisting of a blue LED structured-light 3D scanner and one of several pieces of application-specific software. The systems are marketed for use as scan-based design tools, wherein a physical object is 3D scanned and then converted into a 3D CAD model, or inspection tools, wherein a physical object is scanned and then dimensionally verified by comparing to a nominal 3D CAD model.
3D Design Software
Geomagic Design is a mechanical Computer-Aided Design software, with an emphasis on the design of mechanical systems and assemblies. Geomagic Freeform and Sculpt software are voxel-based modeling software packages, and are bundled with 3D Systems' Touch haptic devices which interface with the software to deliver force-feedback to the user. Geomagic Design X, Design Direct, Studio and Wrap are software products that offer different workflows for creating manufacturing-ready 3D models, including Solid modeling and NURBS surfacing.
3D Inspection and Metrology Software
Geomagic Qualify and Geomagic Verify focus on delivering measurement, comparison and reporting software tools for first-article and automated inspection processes. Data from point cloud and 3D scanners and Coordinate Measuring Machines (CMMs) can be used, as well as CAD data imported into the system.
See also
3D Systems
External links
3D Systems web site
Former Rapidform brand web site
Former Alibre brand web site
References
Software companies based in North Carolina
Manufacturing software
Computer-aided design
Software companies of the United States
zh:杰魔公司 |
521075 | https://en.wikipedia.org/wiki/List%20of%20minor%20planets | List of minor planets | The following is a list of numbered minor planets in ascending numerical order. With the exception of comets, minor planets are all small bodies in the Solar System, including asteroids, distant objects and dwarf planets. The catalog consists of hundreds of pages, each containing 1000 minor planets. Every year, the Minor Planet Center, which operates on behalf of the International Astronomical Union, publishes thousands of newly numbered minor planets in its Minor Planet Circulars (see index). , there are 612,011 numbered minor planets (secured discoveries) out of a total of 1,170,638 observed small Solar System bodies, with the remainder being unnumbered minor planets and comets.
The catalog's first object is , discovered by Giuseppe Piazzi in 1801, while its best-known entry is Pluto, listed as . The vast majority (97%) of minor planets are asteroids from the asteroid belt (the catalog uses a color code to indicate a body's dynamical classification). There are more than a thousand different minor-planet discoverers observing from a growing list of registered observatories. In terms of numbers, the most prolific discoverers are Spacewatch, LINEAR, MLS, NEAT and CSS. There are also 23,081 named minor planets mostly after people, places and figures from mythology and fiction, which account for only of all numbered catalog entries. and are currently the lowest-numbered unnamed and highest-numbered named minor planets, respectively.
It is expected that the upcoming survey by the Vera C. Rubin Observatory (LSST) will discover another 5 million minor planets during the next ten years—almost a tenfold increase from current numbers. While all main-belt asteroids with a diameter above 10 kilometers have already been discovered, there might be as many as 10 trillion 1-meter-sized asteroids or larger out to the orbit of Jupiter; and more than a trillion minor planets in the Kuiper belt of which hundreds are likely dwarf planets. For minor planets grouped by a particular aspect or property, see .
Description of partial lists
The list of minor planets consists of more than 600 partial lists, each containing 1000 minor planets grouped into 10 tables. The data is sourced from the Minor Planet Center (MPC) and expanded with data from the JPL SBDB (mean-diameter), Johnston's archive (sub-classification) and others (see detailed field descriptions below). For an overview of all existing partial lists, see .
The information given for a minor planet includes a permanent and provisional designation (), a citation that links to the meanings of minor planet names (only if named), the discovery date, location, and credited discoverers ( and ), a category with a more refined classification than the principal grouping represented by the background color (), a mean-diameter, sourced from JPL's SBDB or otherwise calculated estimates in italics (), and a reference (Ref) to the corresponding pages at MPC and JPL SBDB.
The MPC may credit one or several astronomers, a survey or similar program, or even the observatory site with the discovery. In the first column of the table, an existing stand-alone article is linked in boldface, while (self-)redirects are never linked. Discoverers, discovery site and category are only linked if they differ from the preceding catalog entry.
Example
|-bgcolor=#d6d6d6
| 189001 || 4889 P-L || — || 24 September 1960 || Palomar || PLS || — || align=right | 3.4 km ||
|-id=002 bgcolor=#fefefe
| 189002 || 6760 P-L || — || 24 September 1960 || Palomar || PLS || NYS || align=right data-sort-value="0.96" | 960 m ||
|-id=003 bgcolor=#d6d6d6
| 189003 || 3009 T-3 || — || 16 October 1977 || Palomar || PLS || — || align=right | 5.1 km ||
|-id=004 bgcolor=#C2FFFF
| 189004 Capys || 3184 T-3 || || 16 October 1977 || Palomar || PLS || L5 || align=right | 12 km ||
|-id=005 bgcolor=#E9E9E9
| 189005 || 5176 T-3 || — || 16 October 1977 || Palomar || PLS || — || align=right | 3.5 km ||
|}
The example above shows five catalog entries from one of the partial lists. All five asteroids were discovered at Palomar Observatory by the Palomar–Leiden survey (PLS). The MPC directly credits the survey's principal investigators, that is, the astronomers Cornelis van Houten, Ingrid van Houten-Groeneveld and Tom Gehrels. (This is the only instance where the list of minor planets diverges from the Discovery Circumstances in the official MPC list.) 189004 Capys, discovered on 16 October 1977, is the only named minor planet among these five. Its background color indicates that it is a Jupiter trojan (from the Trojan camp at Jupiter's ), estimated to be approximately 12 kilometers in diameter. All other objects are smaller asteroids from the inner (white), central (light-grey) and outer regions (dark grey) of the asteroid belt. The provisional designation for all objects is an uncommon survey designation.
Designation
After discovery, minor planets generally receive a provisional designation, e.g. , then a leading sequential number in parenthesis, e.g. , turning it into a permanent designation (numbered minor planet). Optionally, a name can be given, replacing the provisional part of the designation, e.g. . (On Wikipedia, named minor planets also drop their parenthesis.)
In modern times, a minor planet receives a sequential number only after it has been observed several times over at least 4 oppositions. Minor planets whose orbits are not (yet) precisely known are known by their provisional designation. This rule was not necessarily followed in earlier times, and some bodies received a number but subsequently became lost minor planets. The 2000 recovery of , which had been lost for nearly 89 years, eliminated the last numbered lost asteroid. Only after a number is assigned is the minor planet eligible to receive a name. Usually the discoverer has up to 10 years to pick a name; many minor planets now remain unnamed. Especially towards the end of the twentieth century, large-scale automated asteroid discovery programs such as LINEAR have increased the pace of discoveries so much that the vast majority of minor planets will most likely never receive names.
For these reasons, the sequence of numbers only approximately matches the timeline of discovery. In extreme cases, such as lost minor planets, there may be a considerable mismatch: for instance the high-numbered was originally discovered in 1937, but it was a lost until 2003. Only after it was rediscovered could its orbit be established and a number assigned.
Discoverers
The MPC credits more than 1000 professional and amateur astronomers as discoverers of minor planets. Many of them have discovered only a few minor planets or even just co-discovered a single one. Moreover, a discoverer does not need to be a human being. There are about 300 programs, surveys and observatories credited as discoverers. Among these, a small group of U.S. programs and surveys actually account for most of all discoveries made so far (see pie chart). As the total of numbered minor planets is growing by the tens of thousands every year, all statistical figures are constantly changing. In contrast to the Top 10 discoverers displayed in this articles, the MPC summarizes the total of discoveries somewhat differently, that is by a distinct group of discoverers. For example, bodies discovered in the Palomar–Leiden Survey are directly credited to the program's principal investigators.
Discovery site
Observatories, telescopes and surveys that report astrometric observations of small Solar System bodies to the Minor Planet Center receive a numeric or alphanumeric MPC code such as 675 for the Palomar Observatory, or G96 for the Mount Lemmon Survey. On numbering, the MPC may directly credit such an observatory or program as the discoverer of an object, rather than one or several astronomers.
Category
In this catalog, minor planets are classified into one of 8 principal orbital groups and highlighted with a distinct color. These are:
The vast majority of minor planets are evenly distributed between the inner-, central and outer parts of the asteroid belt, which are separated by the two Kirkwood gaps at 2.5 and 2.82 AU. Nearly 97.5% of all minor planets are main-belt asteroids (MBA), while Jupiter trojans, Mars-crossing and near-Earth asteroids each account for less than 1% of the overall population. Only a small number of distant minor planets, that is the centaurs and trans-Neptunian objects, have been numbered so far. In the partial lists, table column "category" further refines this principal grouping:
main-belt asteroids show their family membership based on the synthetic hierarchical clustering method by Nesvorný (2014),
resonant asteroids are displayed by their numerical ratio and include the Hildas (3:2), Cybeles (7:4), Thules (4:3) and Griquas (2:1), while the Jupiter trojans (1:1) display whether they belong to the Greek () or Trojan camp (),
Hungaria asteroids (H), are labelled in italics (H), when they are not members of the collisional family
near-Earth objects are divided into the Aten (ATE), Amor (AMO), Apollo (APO), and Atira (ATI) group, with some of them being potentially hazardous asteroids (PHA), and/or larger than one kilometer in diameter (+1km) as determined by the MPC.
trans-Neptunian objects are divided into dynamical subgroups including cubewanos (hot or cold), scattered disc objects, plutinos and other Neptunian resonances,
comet-like and/or retrograde objects with a TJupiter value below 2 are tagged with damocloid,
other unusual objects based on MPC's and Johnston's lists are labelled unusual,
binary and trinary minor planets with companions are tagged with "moon" and link to their corresponding entry in minor-planet moon,
objects with an exceptionally long or short rotation period are tagged with "slow" (period of 100+ hours) or "fast" (period of less than 2.2 hours) and link to their corresponding entry in List of slow rotators and List of fast rotators, respectively.
minor planets which also received a periodic-comet number (such as ) link to the List of numbered comets
(a) NEO-subgroups with number of members: Aten (238), Amor (1,226), Apollo (1,499) and Atira (7) asteroids.
(b) Including 30 unclassified bodies: ().
(c) This chart has been created using a classification scheme adopted from and with data provided by the JPL Small-Body Database.
Diameter
If available, a minor planet's mean diameter in meters (m) or kilometers (km) is taken from the NEOWISE mission of NASA's Wide-field Infrared Survey Explorer, which the Small-Body Database has also adopted. Mean diameters are rounded to two significant figures if smaller than 100 kilometers. Estimates are in italics and calculated from a magnitude-to-diameter conversion, using an assumed albedo derived from the body's orbital parameters or, if available, from a family-specific mean albedo (also see asteroid family table).
Main index
This is an overview of all existing partial lists of numbered minor planets (LoMP). Each table stands for 100,000 minor planets, each cell for a specific partial list of 1,000 sequentially numbered bodies. The data is sourced from the Minor Planet Center. For an introduction, see .
Numberings 1–100,000
Numberings 100,001–200,000
Numberings 200,001–300,000
Numberings 300,001–400,000
Numberings 400,001–500,000
Numberings 500,001–600,000
Numberings 600,001–700,000
Specific lists
The following are lists of minor planets by physical properties, orbital properties, or discovery circumstances:
List of exceptional asteroids (physical properties)
List of slow rotators (minor planets)
List of fast rotators (minor planets)
List of tumblers (small Solar System bodies)
List of instrument-resolved minor planets
List of Jupiter trojans (Greek camp)
List of Jupiter trojans (Trojan camp)
List of minor planets visited by spacecraft
List of minor planet moons
List of minor-planet groups
List of named minor planets (alphabetical)
List of named minor planets (numerical)
List of possible dwarf planets
List of centaurs (small Solar System bodies)
List of trans-Neptunian objects
List of unnumbered minor planets
List of unnumbered trans-Neptunian objects
Meanings of minor planet names
List of minor planets named after people
List of minor planets named after places
List of minor planets named after rivers
List of minor planets named after animals and plants
See also
Lists of astronomical objects
Binary asteroid
Dwarf planets
Kuiper belt (A major ring of bodies in the Solar System, around 30-60 AU and home to Pluto)
Minor-planet moon
Trans-Neptunian object
Other lists
List of comets
Notes
References
Further reading
Dictionary of Minor Planet Names, 5th ed.: Prepared on Behalf of Commission 20 Under the Auspices of the International Astronomical Union, Lutz D. Schmadel,
The Names of the Minor Planets, Paul Herget, 1968,
External links
How Many Solar System Bodies, Jet Propulsion Laboratory Small-Body Database
SBN Small Bodies Data Archive
JPL Minor Planet Database for physical and orbital data (of any Small Solar System Body or dwarf planet)
Minor Planet Center
Lists and plots: Minor Planets
MPC Discovery Circumstances (minor planets by number)
CNEOS, Center for Near-Earth Object Studies, NASA
PDS Asteroid Data Archive
Lists of small Solar System bodies |
15300335 | https://en.wikipedia.org/wiki/Speculative%20realism | Speculative realism | Speculative realism is a movement in contemporary Continental-inspired philosophy (also known as post-Continental philosophy) that defines itself loosely in its stance of metaphysical realism against its interpretation of the dominant forms of post-Kantian philosophy (or what it terms "correlationism").
Speculative realism takes its name from a conference held at Goldsmiths College, University of London in April 2007. The conference was moderated by Alberto Toscano of Goldsmiths College, and featured presentations by Ray Brassier of American University of Beirut (then at Middlesex University), Iain Hamilton Grant of the University of the West of England, Graham Harman of the American University in Cairo, and Quentin Meillassoux of the École Normale Supérieure in Paris. Credit for the name "speculative realism" is generally ascribed to Brassier, though Meillassoux had already used the term "speculative materialism" to describe his own position.
A second conference, entitled "Speculative Realism/Speculative Materialism", took place at the UWE Bristol on Friday 24 April 2009, two years after the original event at Goldsmiths. The line-up consisted of Ray Brassier, Iain Hamilton Grant, Graham Harman, and (in place of Meillassoux, who was unable to attend) Alberto Toscano.
Critique of correlationism
While often in disagreement over basic philosophical issues, the speculative realist thinkers have a shared resistance to what they interpret as philosophies of human finitude inspired by the tradition of Immanuel Kant.
What unites the four core members of the movement is an attempt to overcome both "correlationism" and "philosophies of access". In After Finitude, Meillassoux defines correlationism as "the idea according to which we only ever have access to the correlation between thinking and being, and never to either term considered apart from the other." Philosophies of access are any of those philosophies which privilege the human being over other entities. Both ideas represent forms of anthropocentrism.
All four of the core thinkers within speculative realism work to overturn these forms of philosophy which privilege the human being, favouring distinct forms of realism against the dominant forms of idealism in much of contemporary Continental philosophy.
Variations
While sharing in the goal of overturning the dominant strands of post-Kantian thought in Continental philosophy, there are important differences separating the core members of the speculative realist movement and their followers.
Speculative materialism
In his critique of correlationism, Quentin Meillassoux (who uses the term speculative materialism to describe his position) finds two principles as the focus of Kant's philosophy. The first is the principle of correlation itself, which claims essentially that we can only know the correlate of Thought and Being; what lies outside that correlate is unknowable. The second is termed by Meillassoux the principle of factiality, which states that things could be otherwise than what they are. This principle is upheld by Kant in his defence of the thing-in-itself as unknowable but imaginable. We can imagine reality as being fundamentally different even if we never know such a reality. According to Meillassoux, the defence of both principles leads to "weak" correlationism (such as those of Kant and Husserl), while the rejection of the thing-in-itself leads to the "strong" correlationism of thinkers such as late Ludwig Wittgenstein and late Martin Heidegger, for whom it makes no sense to suppose that there is anything outside of the correlate of Thought and Being, and so the principle of factiality is eliminated in favour of a strengthened principle of correlation.
Meillassoux follows the opposite tactic in rejecting the principle of correlation for the sake of a bolstered principle of factiality in his post-Kantian return to Hume. By arguing in favour of such a principle, Meillassoux is led to reject the necessity not only of all physical laws of nature, but all logical laws except the Principle of Non-Contradiction (since eliminating this would undermine the Principle of Factiality which claims that things can always be otherwise than what they are). By rejecting the Principle of Sufficient Reason, there can be no justification for the necessity of physical laws, meaning that while the universe may be ordered in such and such a way, there is no reason it could not be otherwise. Meillassoux rejects the Kantian a priori in favour of a Humean a priori, claiming that the lesson to be learned from Hume on the subject of causality is that "the same cause may actually bring about 'a hundred different events' (and even many more)."
Object-oriented ontology
The central tenet of Graham Harman and Levi Bryant's object-oriented ontology (OOO) is that objects have been neglected in philosophy in favor of a "radical philosophy" that tries to "undermine" objects by saying that objects are the crusts to a deeper underlying reality, either in the form of monism or a perpetual flux, or those that try to "overmine" objects by saying that the idea of a whole object is a form of folk ontology. According to Harman, everything is an object, whether it be a mailbox, electromagnetic radiation, curved spacetime, the Commonwealth of Nations, or a propositional attitude; all things, whether physical or fictional, are equally objects. Sympathetic to panpsychism, Harman proposes a new philosophical discipline called "speculative psychology" dedicated to investigating the "cosmic layers of psyche" and "ferreting out the specific psychic reality of earthworms, dust, armies, chalk, and stone".
Harman defends a version of the Aristotelian notion of substance. Unlike Leibniz, for whom there were both substances and aggregates, Harman maintains that when objects combine, they create new objects. In this way, he defends an a priori metaphysics that claims that reality is made up only of objects and that there is no "bottom" to the series of objects. For Harman, an object is in itself an infinite recess, unknowable and inaccessible by any other thing. This leads to his account of what he terms "vicarious causality". Inspired by the occasionalists of medieval Islamic philosophy, Harman maintains that no two objects can ever interact save through the mediation of a "sensual vicar". There are two types of objects, then, for Harman: real objects and the sensual objects that allow for interaction. The former are the things of everyday life, while the latter are the caricatures that mediate interaction. For example, when fire burns cotton, Harman argues that the fire does not touch the essence of that cotton which is inexhaustible by any relation, but that the interaction is mediated by a caricature of the cotton which causes it to burn.
Transcendental materialism
Iain Hamilton Grant defends a position he calls transcendental materialism. He argues against what he terms "somatism", the philosophy and physics of bodies. In his Philosophies of Nature After Schelling, Grant tells a new history of philosophy from Plato onward based on the definition of matter. Aristotle distinguished between Form and Matter in such a way that Matter was invisible to philosophy, whereas Grant argues for a return to the Platonic Matter as not only the basic building blocks of reality, but the forces and powers that govern our reality. He traces this same argument to the post-Kantian German Idealists Johann Gottlieb Fichte and Friedrich Wilhelm Joseph Schelling, claiming that the distinction between Matter as substantive versus useful fiction persists to this day and that we should end our attempts to overturn Plato and instead attempt to overturn Kant and return to "speculative physics" in the Platonic tradition, that is, not a physics of bodies, but a "physics of the All".
Eugene Thacker has examined how the concept of "life itself" is both determined within regional philosophy and also how "life itself" comes to acquire metaphysical properties. His book After Life shows how the ontology of life operates by way of a split between "Life" and "the living," making possible a "metaphysical displacement" in which life is thought via another metaphysical term, such as time, form, or spirit: "Every ontology of life thinks of life in terms of something-other-than-life...that something-other-than-life is most often a metaphysical concept, such as time and temporality, form and causality, or spirit and immanence" Thacker traces this theme from Aristotle, to Scholasticism and mysticism/negative theology, to Spinoza and Kant, showing how this three-fold displacement is also alive in philosophy today (life as time in process philosophy and Deleuzianism, life as form in biopolitical thought, life as spirit in post-secular philosophies of religion). Thacker examines the relation of speculative realism to the ontology of life, arguing for a "vitalist correlation": "Let us say that a vitalist correlation is one that fails to conserve the correlationist dual necessity of the separation and inseparability of thought and object, self and world, and which does so based on some ontologized notion of 'life'.''. Ultimately Thacker argues for a skepticism regarding "life": "Life is not only a problem of philosophy, but a problem for philosophy."
Other thinkers have emerged within this group, united in their allegiance to what has been known as "process philosophy", rallying around such thinkers as Schelling, Bergson, Whitehead, and Deleuze, among others. A recent example is found in Steven Shaviro's book Without Criteria: Kant, Whitehead, Deleuze, and Aesthetics, which argues for a process-based approach that entails panpsychism as much as it does vitalism or animism. For Shaviro, it is Whitehead's philosophy of prehensions and nexus that offers the best combination of continental and analytical philosophy. Another recent example is found in Jane Bennett's book Vibrant Matter, which argues for a shift from human relations to things, to a "vibrant matter" that cuts across the living and non-living, human bodies and non-human bodies. Leon Niemoczynski, in his book Charles Sanders Peirce and a Religious Metaphysics of Nature, invokes what he calls "speculative naturalism" so as to argue that nature can afford lines of insight into its own infinitely productive "vibrant" ground, which he identifies as natura naturans.
Transcendental nihilism
In Nihil Unbound: Extinction and Enlightenment, Ray Brassier defends transcendental nihilism. He maintains that philosophy has avoided the traumatic idea of extinction, instead attempting to find meaning in a world conditioned by the very idea of its own annihilation. Thus Brassier critiques both the phenomenological and hermeneutic strands of continental philosophy as well as the vitality of thinkers like Gilles Deleuze, who work to ingrain meaning in the world and stave off the "threat" of nihilism. Instead, drawing on thinkers such as Alain Badiou, François Laruelle, Paul Churchland and Thomas Metzinger, Brassier defends a view of the world as inherently devoid of meaning. That is, rather than avoiding nihilism, Brassier embraces it as the truth of reality. Brassier concludes from his readings of Badiou and Laruelle that the universe is founded on the nothing, but also that philosophy is the "organon of extinction," that it is only because life is conditioned by its own extinction that there is thought at all. Brassier then defends a radically anti-correlationist philosophy proposing that Thought is conjoined not with Being, but with Non-Being.
Controversy about the term
In an interview with Kronos magazine published in March 2011, Ray Brassier denied that there is any such thing as a "speculative realist movement" and firmly distanced himself from those who continue to attach themselves to the brand name:
Publications
Speculative realism has close ties to the journal Collapse, which published the proceedings of the inaugural conference at Goldsmiths and has featured numerous other articles by 'speculative realist' thinkers; as has the academic journal Pli, which is edited and produced by members of the Graduate School of the Department of Philosophy at the University of Warwick. The journal Speculations, founded in 2010 published by Punctum books, regularly features articles related to Speculative Realism. Edinburgh University Press publishes a book series called Speculative Realism.
In 2013, Anarchist Developments in Cultural Studies journal published a special issue on the topic in relation to anarchism.
From 2019-2021, the De Gruyter Open Access journal, Open Philosophy, published three special issues on object-oriented ontology and its critics.
Internet presence
Speculative realism is notable for its fast expansion via the Internet in the form of blogs. Websites have formed as resources for essays, lectures, and planned future books by those within the speculative realist movement. Many other blogs, as well as podcasts, have emerged with original material on speculative realism or expanding on its themes and ideas.
See also
Kantian empiricism
New realism (contemporary philosophy)
Objectivity
Postanalytic philosophy
Speculative idealism
Transhumanism
Transcendental empiricism
Transcendental nominalism
Notable speculative realists
Ray Brassier
Levi Bryant
Manuel DeLanda
Tristan Garcia
Iain Hamilton Grant
Graham Harman
Adrian Johnston
Katerina Kolozova
Nick Land
Quentin Meillassoux
Reza Negarestani
Steven Shaviro
Nick Srnicek
Isabelle Stengers
Notes
Note Thanapong Jantanam
References
Graham Harman, Speculative Realism: An Introduction, John Wiley & Sons, 2018.
External links
Speculative Realism: An Epitome – a concise introduction to Speculative Realism.
Post-Continental Voices – an edited collection of interviews that contains interviews with speculative realists.
Collapse – a journal featuring contributions by "speculative realists"
Quentin Meillassoux in English at the Speculative Realism Conference – recording of Quentin Meillassoux's lecture in English at the inaugural Speculative Realism conference
Pierre-Alexandre Fradet and Tristan Garcia (eds.), issue "Réalisme spéculatif", in Spirale, No. 255, winter 2016 – introduction here
The Speculative Realism Pathfinder
2007 introductions
Continental philosophy
Metaphysical realism
Metaphysical theories |
23151046 | https://en.wikipedia.org/wiki/Anna%20Kournikova%20%28computer%20virus%29 | Anna Kournikova (computer virus) | Anna Kournikova (named Vbs.OnTheFly by its author, and also known as VBS/SST and VBS_Kalamar) was a computer virus that spread worldwide on the Internet in February 2001. The virus program was contained in an email attachment, purportedly an image of tennis player Anna Kournikova.
Background
The virus was created by 20-year-old Dutch student Jan de Wit, who used the pseudonym "OnTheFly", on 11 February 2001. It was designed to trick email users into clicking to open an email attachment ostensibly appearing to be an image of the professional tennis player Anna Kournikova, but instead hiding a malicious program. The virus arrived in an email with the subject line "Here you have, ;0)" and an attached file entitled AnnaKournikova.jpg.vbs. When opened in Microsoft Outlook, the file did not display a picture of Kournikova, but launched a viral VBScript program that forwarded itself to all contacts in the victim's address book.
De Wit created Anna Kournikova in a matter of hours using a simple online Visual Basic Worm Generator program written by an Argentinian programmer called [K]Alamar. "The young man had downloaded a program on Sunday, February 11, from the Internet and later the same day, around 3:00 p.m., set the virus loose in a newsgroup." The Anna Kournikova virus did not corrupt data on the infected computer, unlike the similar ILOVEYOU virus that struck a year earlier in 2000, yet infected the computers of millions of users and caused problems in email servers worldwide.
Conviction
David L. Smith (the author of the 1999 Melissa virus, who was in FBI custody at that time), assisted the FBI in tracking down De Wit's identity. De Wit turned himself in to the police in his hometown Sneek on 14 February 2001, after he posted a confession to a website and a newsgroup devoted to the tennis player (alt.binaries.anna-kournikova), dated 13 February. He admitted to the creation of the virus using a toolkit, and said that his motivations were to see whether the IT community had developed better system security in the aftermath of previous virus infections. He also attributed blame for the virus's rate of spreading on Kournikova's beauty, and blamed those who opened the email, writing: "it's their own fault they got infected."
A few days after the virus release, the mayor of Sneek, Sieboldt Hartkamp, made a tentative job offer to De Wit in the local administration's IT department, saying that the city should be proud to have produced such a talented young man.
De Wit was tried in Leeuwarden and was charged with spreading data into a computer network with the intention of causing damage, a crime that carried a maximum sentence of four years in prison and a fine of 100,000 guilders (then equivalent to US$41,300). His lawyers called for the dismissal of the charges against him, arguing that the virus caused minimal damage. The FBI submitted evidence to the Dutch court, suggesting that US$166,000 in damages had been caused by the virus. Denying any intent to cause damage, De Wit was sentenced to 150 hours of community service.
The 18-year-old Buenos Aires programmer who created the Worm Generator toolkit removed the application's files from his website later in February 2001. In an interview, he said that his friends had encouraged him to do so after hearing his pseudonym on television.
See also
Comparison of computer viruses
List of convicted computer criminals
Timeline of notable computer viruses and worms
References
Computer worms
Hacking in the 2000s
2001 in computing
Windows malware |
1415812 | https://en.wikipedia.org/wiki/File%20locking | File locking | File locking is a mechanism that restricts access to a computer file, or to a region of a file, by allowing only one user or process to modify or delete it at a specific time and to prevent reading of the file while it's being modified or deleted.
Systems implement locking to prevent the classic interceding update scenario, which is a typical example of a race condition, by enforcing the serialization of update processes to any given file. The following example illustrates the interceding update problem:
Process A reads a customer record from a file containing account information, including the customer's account balance and phone number.
Process B now reads the same record from the same file, so it has its own copy.
Process A changes the account balance in its copy of the customer record and writes the record back to the file.
Process B, which still has the original stale value for the account balance in its copy of the customer record, updates the account balance and writes the customer record back to the file.
Process B has now written its stale account-balance value to the file, causing the changes made by process A to be lost.
Most operating systems support the concept of record locking, which means that individual records within any given file may be locked, thereby increasing the number of concurrent update processes. Database maintenance uses file locking, whereby it can serialize access to the entire physical file underlying a database. Although this does prevent any other process from accessing the file, it can be more efficient than individually locking many regions in the file by removing the overhead of acquiring and releasing each lock.
Poor use of file locks, like any computer lock, can result in poor performance or in deadlocks. File locking may also refer to additional security applied by a computer user either by using Windows security, NTFS permissions or by installing a third party file locking software.
In mainframes
IBM pioneered file locking in 1963 for use in mainframe computers using OS/360, where it was termed "exclusive control".
In Microsoft Windows
Microsoft Windows uses three distinct mechanisms to manage access to shared files:
using share-access controls that allow applications to specify whole-file access-sharing for read, write, or delete
using byte-range locks to arbitrate read and write access to regions within a single file
by Windows file systems disallowing executing files from being opened for write or delete access
Windows inherits the semantics of share-access controls from the MS-DOS system, where sharing was introduced in MS-DOS 3.3 . Thus, an application must explicitly allow sharing when it opens a file; otherwise it has exclusive read, write, and delete access to the file until closed (other types of access, such as those to retrieve the attributes of a file are allowed.)
For a file opened with shared access, applications may then use byte-range locking to control access to specific regions of the file. Such byte-range locks specify a region of the file (offset and length) and the type of lock (shared or exclusive). Note that the region of the file being locked is not required to have data within the file, and applications sometimes exploit this ability to implement their functionality.
For applications that use the file read/write APIs in Windows, byte-range locks are enforced (also referred to as mandatory locks) by the file systems that execute within Windows. For applications that use the file mapping APIs in Windows, byte-range locks are not enforced (also referred to as advisory locks.) Byte-range locking may also have other side-effects on the Windows system. For example, the Windows file-sharing mechanism will typically disable client side caching of a file for all clients when byte-range locks are used by any client. The client will observe slower access because read and write operations must be sent to the server where the file is stored.
Improper error-handling in an application program can lead to a scenario where a file is locked (either using "share" access or with byte-range file locking) and cannot be accessed by other applications. If so, the user may be able to restore file access by manually terminating the malfunctioning program. This is typically done through the Task Manager utility.
The sharing mode (dwShareMode) parameter of the CreateFile function (used to open files) determines file-sharing. The sharing mode can be specified to allow sharing the file for read, write, or delete access, or any combination of these. Subsequent attempts to open the file must be compatible with all previously granted sharing-access to the file. When the file is closed, sharing-access restrictions are adjusted to remove the restrictions imposed by that specific file open.
Byte-range locking type is determined by the dwFlags parameter in the LockFileEx function used to lock a region of a file. The Windows API function LockFile can also be used and acquires an exclusive lock on the region of the file.
Any file containing an executable program file that is currently running on the computer system as a program (e.g. an EXE, COM, DLL, CPL or other binary program file format) is normally locked by the operating system itself, preventing any application from modifying or deleting it. Any attempt to do so will be denied with a sharing violation error, despite the fact that the program file is not opened by any application. However, some access is still allowed. For example, a running application file can be renamed or copied (read) even when executing.
Files are accessed by applications in Windows by using file handles. These file handles can be explored with the Process Explorer utility. This utility can also be used to force-close handles without needing to terminate the application holding them. This can cause an undefined behavior, since the program will receive an unexpected error when using the force-closed handle and may even operate on an unexpected file since the handle number may be recycled.
Microsoft Windows XP and Server 2003 editions have introduced volume snapshot (VSS) capability to NTFS, allowing open files to be accessed by backup software despite any exclusive locks. However, unless software is rewritten to specifically support this feature, the snapshot will be crash consistent only, while properly supported applications can assist the operating system in creating "transactionally consistent" snapshots. Other commercial software for accessing locked files under Windows include File Access Manager and Open File Manager. These work by installing their own drivers to access the files in kernel mode.
In Unix-like systems
Unix-like operating systems (including Linux and Apple's macOS) do not normally automatically lock open files. Several kinds of file-locking mechanisms are available in different flavors of Unix, and many operating systems support more than one kind for compatibility. The most common mechanism is . Two other such mechanisms are and , which may be separate or may be implemented atop fcntl. Although some types of locks can be configured to be mandatory, file locks under Unix are by default advisory. This means that cooperating processes may use locks to coordinate access to a file among themselves, but uncooperative processes are also free to ignore locks and access the file in any way they choose. In other words, file locks lock out other file lockers only, not I/O.
Two kinds of locks are offered: shared locks and exclusive locks. In the case of fcntl, different kinds of locks may be applied to different sections (byte ranges) of a file, or else to the whole file. Shared locks can be held by multiple processes at the same time, but an exclusive lock can only be held by one process, and cannot coexist with a shared lock. To acquire a shared lock, a process must wait until no processes hold any exclusive locks. To acquire an exclusive lock, a process must wait until no processes hold either kind of lock. Unlike locks created by fcntl, those created by flock are preserved across forks, making them useful in forking servers. It is therefore possible for more than one process to hold an exclusive lock on the same file, provided these processes share a filial relationship and the exclusive lock was initially created in a single process before being duplicated across a fork.
Shared locks are sometimes called "read locks" and exclusive locks are sometimes called "write locks". However, because locks on Unix are advisory, this isn't enforced. Thus it is possible for a database to have a concept of "shared writes" vs. "exclusive writes"; for example, changing a field in place may be permitted under shared access, whereas garbage-collecting and rewriting the database may require exclusive access.
File locks apply to the actual file, rather than the file name. This is important since Unix allows multiple names to refer to the same file. Together with non-mandatory locking, this leads to great flexibility in accessing files from multiple processes. On the other hand, the cooperative locking approach can lead to problems when a process writes to a file without obeying file locks set by other processes.
For this reason, some Unix-like operating systems also offer limited support for mandatory locking. On such systems, a file whose setgid bit is on but whose group execution bit is off when that file is opened will be subject to automatic mandatory locking if the underlying filesystem supports it. However, non-local NFS partitions tend to disregard this bit. If a file is subject to mandatory locking, attempts to read from a region that is locked with an exclusive lock, or to write to a region that is locked with a shared or exclusive lock, will block until the lock is released. This strategy first originated in System V, and can be seen today in the Solaris, HP-UX, and Linux operating systems. It is not part of POSIX, however, and BSD-derived operating systems such as FreeBSD, OpenBSD, NetBSD, and Apple's macOS do not support it. Linux also supports mandatory locking through the special -o mand parameter for file system mounting (), but this is rarely used.
Some Unix-like operating systems prevent attempts to open the executable file of a running program for writing; this is a third form of locking, separate from those provided by fcntl and flock.
Problems
More than one process can hold an exclusive flock on a given file if the exclusive lock was duplicated across a later fork. This simplifies coding for network servers and helps prevent race conditions, but can be confusing to the unaware.
Mandatory locks have no effect on the unlink system call. Consequently, certain programs may, effectively, circumvent mandatory locking. Stevens & Rago (2005) observed that the ed editor indeed did that.
Whether and how flock locks work on network filesystems, such as NFS, is implementation dependent. On BSD systems, flock calls on a file descriptor open to a file on an NFS-mounted partition are successful no-ops. On Linux prior to 2.6.12, flock calls on NFS files would act only locally. Kernel 2.6.12 and above implement flock calls on NFS files using POSIX byte-range locks. These locks will be visible to other NFS clients that implement fcntl-style POSIX locks, but invisible to those that do not.
Lock upgrades and downgrades release the old lock before applying the new lock. If an application downgrades an exclusive lock to a shared lock while another application is blocked waiting for an exclusive lock, the latter application may get the exclusive lock and lock the first application out. This means that lock downgrades can block, which may be counter-intuitive.
All fcntl locks associated with a file for a given process are removed when any file descriptor for that file is closed by that process, even if a lock was never requested for that file descriptor. Also, fcntl locks are not inherited by a child process. The fcntl close semantics are particularly troublesome for applications that call subroutine libraries that may access files. Neither of these "bugs" occurs using real flock-style locks.
Preservation of the lock status on open file descriptors passed to another process using a Unix domain socket is implementation dependent.
Buffered I/O problems
One source of lock failure occurs when buffered I/O has buffers assigned in the user's local workspace, rather than in an operating system buffer pool. fread and fwrite are commonly used to do buffered I/O, and once a section of a file is read, another attempt to read that same section will, most likely, obtain the data from the local buffer. The problem is another user attached to the same file has their own local buffers, and the same thing is happening for them. An fwrite of data obtained from the buffer by fread will not be obtaining the data from the file itself, and some other user could have changed it. Both could use flock for exclusive access, which prevents simultaneous writes, but since the reads are reading from the buffer and not the file itself, any data changed by user #1 can be lost by user #2 (over-written). The best solution to this problem is to use unbuffered I/O (read and write) with flock, which also means using lseek instead of fseek and ftell. Of course, you'll have to make adjustments for function parameters and results returned. Generally speaking, buffered I/O is unsafe when used with shared files.
In AmigaOS
In AmigaOS, a lock on a file (or directory) can be acquired using the Lock function (in the dos.library). A lock can be shared (other processes can read the file/directory, but can't modify or delete it), or exclusive so that only the process which successfully acquires the lock can access or modify the object. The lock is on the whole object and not part of it. The lock must be released with the UnLock function: unlike in Unix, the operating system does not implicitly unlock the object when the process terminates.
Lock files
Shell scripts and other programs often use a strategy similar to the use of file locking: creation of lock files, which are files whose contents are irrelevant (although often one will find the process identifier of the holder of the lock in the file) and whose sole purpose is to signal by their presence that some resource is locked. A lock file is often the best approach if the resource to be controlled is not a regular file at all, so using methods for locking files does not apply. For example, a lock file might govern access to a set of related resources, such as several different files, directories, a group of disk partitions, or selected access to higher level protocols like servers or database connections.
When using lock files, care must be taken to ensure that operations are atomic. To obtain a lock, the process must verify that the lock file does not exist and then create it, whilst preventing another process from creating it in the meantime. Various methods to do this include:
Using the lockfile command (a conditional semaphore-file creator distributed in the procmail package).
System calls that create a file, but fail if the file already exists. (System calls are available from languages such as C or C++, and shell scripts can make use of noclobber)
Using the mkdir command and checking the exit code for failure
Lock files are often named with a tilde (~) prefixed to the name of the file they are locking, or a duplicate of the full file name suffixed with .LCK . If they are locking a resource other than a file, they may be named more arbitrarily.
Certain Mozilla products (such as Firefox, Thunderbird, Sunbird) use this type of file resource lock mechanism (using a temporary file named "parent.lock".)
Unlocker software
An unlocker is a utility used to determine what process is locking a file, and displays a list of processes as well as choices on what to do with the process (kill task, unlock, etc.) along with a list of file options such as delete or rename. On some Unix-like systems, utilities such as fstat and lockf can be used to inspect the state of file locks by process, by filename, or both.
On Windows systems, if a file is locked, it's possible to schedule its moving or deletion to be performed on the next reboot. This approach is typically used by installers to replace locked system files.
Version control systems
In version control systems file locking is used to prevent two users changing the same file version in parallel and then when saving, the second user to overwrite what first user changed. This is implemented by marking locked files as read-only in the file system. A user wanting to change the file performs an unlock (also called checkout) operation, and until a check-in (store) operation is done, or the lock is reverted, nobody else is allowed to unlock the file.
See also
Readers–writer lock
References
External links
Everything you never wanted to know about file locking, a review of the Unix file locking options and their problems (dated December 13, 2010)
File-private POSIX locks, a LWN.net article on file locks supported on Linux that behave differently from POSIX locks regarding inheritance and behavior on close
Computer file systems |
39093 | https://en.wikipedia.org/wiki/OS-9 | OS-9 | OS-9 is a family of real-time, process-based, multitasking, multi-user operating systems, developed in the 1980s, originally by Microware Systems Corporation for the Motorola 6809 microprocessor. It was purchased by Radisys Corp in 2001, and was purchased again in 2013 by its current owner Microware LP.
The OS-9 family was popular for general-purpose computing and remains in use in commercial embedded systems and amongst hobbyists. Today, OS-9 is a product name used by both a Motorola 68000-series machine language OS and a portable (PowerPC, x86, ARM, MIPS, SH4, etc.) version written in C, originally known as OS-9000.
History
The first version ("OS-9 Level One"), which dates back to 1979–1980, was written in assembly language for the Motorola 6809 CPU, and all of its processes ran within the 64KB address space of the CPU without a memory management unit. It was developed as a supporting operating system for the BASIC09 project, contracted for by Motorola as part of the 6809 development. A later 6809 version ("Level Two") takes advantage of memory mapping hardware, supported up to 2 MB of memory (ca. 1980) in most implementations, and included a GUI on some platforms.
In 1983, OS-9/6809 was ported to Motorola 68000 assembly language and extended (called OS-9/68K); and a still later (1989) version was rewritten mostly in C for further portability. The portable version was initially called OS-9000 and was released for 80386 PC systems around 1989, then ported to PowerPC around 1995. These later versions lack the memory mapping facilities of OS-9/6809 Level Two simply because they do not need them. They used a single flat address space that all processes share; memory mapping hardware, if present, is mostly used to ensure that processes access only memory they have the right to access. The 680x0 and 80386 (and later) MPUs all directly support far more than of memory in any case.
As a consequence of early pervasive design decisions taking advantage of the easily used reentrant object code capabilities of the 6809 processor, programs intended for OS-9 are required to be reentrant; compilers produce reentrant code automatically and assemblers for OS-9 offer considerable support for it. OS-9 also uses position-independent code and data because the 6809 also supports it directly; compilers and assemblers support position independence. The OS-9 kernel loads programs (including shared code), and allocates data, wherever sufficient free space is available in the memory map. This allows the entire OS and all applications to be placed in ROM or Flash memory, and eases memory management requirements when programs are loaded into RAM and run. Programs, device drivers, and I/O managers under OS-9 are all 'modules' and can be dynamically loaded and unloaded (subject to link counts) as needed.
OS-9/6809 runs on Motorola EXORbus systems using the Motorola 6809, SS-50 Bus and SS-50C bus systems from companies such as SWTPC, Tano, Gimix, Midwest Scientific, and Smoke Signal Broadcasting, STD-bus 6809 systems from several suppliers, personal computers such as the Fujitsu FM-11, FM-8, FM-7 and FM-77, Hitachi MB-S1, and many others.
System Industries, a third-party provider of DEC compatible equipment, used a 68B09E processor running OS9 in its QIC (quarter-inch cartridge) tape backup controllers in VAX installations.
The best known hardware (due to its low price and broad distribution) was the TRS-80 Color Computer (CoCo) and the similar Dragon series. Even on the CoCo, a quite minimalist hardware platform, it was possible under OS-9/6809 Level One to have more than one interactive user running concurrently (for example, one on the console keyboard, another in the background, and perhaps a third interactively via a serial connection) as well as several other non-interactive processes. A second processor implementation for the BBC Micro was produced by Cumana. It included on-board RAM, SCSI hard disk interface and a MC68008 processor.
OS-9 was also ported to the Commodore SP-9000 or SuperPET, which had a 6809 in addition to the 6502 of the base 8032 model, as well as 64 KB more. The Toronto PET Users Group sponsored a HW/SW project which included a daughter board with an MMU as well as the OS-9 distribution disks. With two processors, 96 KB, a 25×80 screen and serial, parallel and IEEE-488 ports and many peripherals this was one of the most capable OS-9 systems available.
OS-9's multi-user and multi-tasking capabilities make it usable as a general-purpose interactive computer system. Many third-party interactive applications have been written for it, such as the Dynacalc spreadsheet, the VED text formatter, and the Stylograph and Screditor-3 WYSIWYG word processors. TSC's nroff emulating formatter was ported to OS-9 by MicroWay, as well.
In mid 1980s, OS-9 was selected for the CD-i operating system. Around the same time, Microsoft approached Microware for acquisition of the company primarily because it was attracted by CD-RTOS, the CD-i operating system. The negotiation failed and no deal was made; Microware decided to remain independent.
In late 1980s, Microware released OS-9000, a more portable version of the operating system. The vast majority of the operating system kernel was rewritten in C leaving a handful of hardware-dependent parts in assembly language. A few "more advanced features" were added such as tree-like kernel module name space. OS-9000 was initially ported to the Motorola 680x0 family CPUs, Intel 80386, and PowerPC. The OS-9000/680x0 was a marketing failure and withdrawn very quickly, probably because few customers wanted to try the fatter and slower operating system over the existing OS-9/680x0 proven record of stability. That the Motorola 680x0 family and VME board computer system vendors were nearing their end of life might have affected the unpopularity of OS-9000/680x0. Microware later started calling all of its operating systems — including what had been originally called OS-9000 — simply OS-9, and started shifting its business interest towards portable consumer device markets such as cellphones, car navigation, and multimedia.
In late 1980s and early 1990s, the Character Generators computers used in Broadcast Systems used OS-9 and OS-9000 extensively. The now defunct Pesa Electronica used OS-9 on their CGs such as CG 4722 and CG4733.
Name conflicts and court decisions
In 1999, nineteen years after the first release of OS-9, Apple Computer released Mac OS 9. Microware sued Apple that year for trademark infringement, although a judge ruled that there would be little chance for confusion between the two. Some Macintosh users who are unaware of Microware's lesser known OS-9 have posted to the comp.os.os9 newsgroup not realizing what OS-9 is.
In 2001, RadiSys purchased Microware to acquire the Intel IXP-1200 network processor resources. This acquisition infused Microware with capital and allowed Microware to continue OS-9 development and support.
On 21 February 2013, Microware LP (a partnership formed by Freestation of Japan, Microsys Electronics of Germany and RTSI LLC of the USA) announced that they signed an Asset Purchase Agreement to buy the rights to the names Microware, OS-9 and all assets from RadiSys.
Technology
Modern and archaic design
OS-9 (especially the 68k version and thereafter) clearly distinguishes itself from the prior generation of embedded operating systems in many aspects.
Runs on 8-bit, 16-bit, and 32-bit CPUs.
Clear separation between user mode and supervisor (kernel) mode.
Dynamic use of individually and separately built software components (executable program images and kernel modules) rather than a statically linked single monolithic image.
Unix-like process name-space model (not memory model) and user shell program.
Clear separation between hardware independent (e.g. file managers) and hardware dependent (e.g. device drivers) layers.
When compared with more modern operating systems:
The kernel is written entirely in assembly language (OS-9/68K version only) and C (portable version to other architectures) using simple internal data structures, reducing flexibility and improvement scope while improving determinability required for real-time operating systems.
Performance was also affected for some operations, but assembly language helped with the speed issue.
Systems without a memory management unit (MMU) have no memory protection against illegal access, nor per-process memory protection, while systems with an MMU can have memory protection enabled. The module controlling the MMU can be included or omitted by the system integrator to enable or disable memory protection. This allows OS-9 to run on older systems which do not include an MMU.
Older versions of OS-9 do not support POSIX threads, while all OS-9 supported processors support POSIX threads.
No SMP support for multiple sockets, cores, or hardware threads in the same OS-9 instance (can run as a RTOS on one of the cores of dual core processors like Core Duo and Core 2 Duo, when Linux is running on the other core doing general purpose tasks).
Task scheduling
OS-9's real-time kernel allows multiple independent applications to execute simultaneously through task switching and inter-process communication facilities. All OS-9 programs run as processes containing at least one lightweight process (thread) but may contain an effectively unlimited number of threads. Within a process, these lightweight processes share memory, I/O paths, and other resources in accordance with the POSIX threads specification and API. OS-9 schedules the threads using a fixed-priority preemptive scheduling algorithm with round-robin scheduling within each priority. Time slicing is supported. The priority levels can be divided into a range that supports aging and a higher-priority range that uses strict priority scheduling. Each process can access any system resource by issuing the appropriate OS-9 service request. At every scheduling point, OS-9 compares the priority of the thread at the head of the active queue to the priority of the current thread. It context switches to the thread on the active queue if its priority is higher than the current processes' priority. Aging artificially increases the effective priority of threads in the active queue as time passes. At defined intervals, time slicing returns the current thread to the active queue behind other threads at the same priority.
Kernel modules
Kernel – Contains task switching, memory allocation, and most non-I/O calls
IOMAN – Handles I/O calls to various file managers and drivers.
File managers basic set:
SCF, Serial files (serial devices)
RBF, Random block (disk devices)
SBF, Sequential block (tape Devices)
NFM, NULL devices (USB and other devices)
MFM, Message
PCF, PC FAT files
PIPEMAN, Pipe manager
Modman - Memory module directories
SSM – System security (MMU handling)
Cache – Cache handling,
VectXXX – Vector / PIC handler
FPU – Floating point emulation
Align – Address alignment fault handler
Commands
The following list of commands is supported by the OS-9 shell.
Shell built-in commands
chd
chx
kill
w
wait
setenv
unsetenv
setpr
logout
profile
ex
-e
-ne
-p
-p=<str>
-np
-t
-nt
-v
-nv
-x
-nx
Utilities for operating system functions
attr
copy
date
deiniz
del
deldir
dsave
dump
echo
fixmod
free
ident
iniz
link
list
load
makdir
mdir
merge
mfree
pd
pr
printenv
procs
rename
save
shell
setime
sleep
tee
tmode
touch
unlink
System management utilities
backup
dcheck
devs
format
frestore
fsave
irqs
login
os9gen
tsmon
xmode
General utilities
binex
build
cfp
cmp
code
compress
count
edt
exbin
expand
grep
help
make
qsort
tr
umacs
Comparisons with Unix
OS-9's notion of processes and I/O paths is quite similar to that of Unix in nearly all respects, but there are some significant differences. Firstly, the file system is not a single tree, but instead is a forest with each tree corresponding to a device. Second, OS-9 does not have a Unix-style fork() system call—instead it has a system call which creates a process running a specified program, performing much the same function as a fork-exec or a spawn. Additionally, OS-9 processes keep track of two "current directories" rather than just one; the "current execution directory" is where it will by default look first to load programs to run (which is similar to the use of PATH environment variable under UNIX). The other is the current data directory.
Another difference is that in OS-9, grandparent directories can be indicated by repeating periods three or more times, without any intervening slashes (a feature also found in 4DOS/4OS2/4NT/TC). For example, ..../file in OS-9, is similar to ../../../file in Unix. But . and .., with just one or two periods, each work the same in both OS-9 and Unix.
OS-9 has had a modular design from the beginning, influenced by notions of the designers of the 6809 and how they expected software would be distributed in the future (see the three-part series of articles in January-March 1979 Byte by Terry Ritter, et al. of Motorola who designed the CPU).
The module structure requires more explanation: OS-9 keeps a "module directory", a memory-resident list of all modules that are in memory either by having been loaded, or by having been found in ROM during an initial scan at boot time. When one types a command to the OS-9 shell, it will look first in the current module directory for a module of the specified name and will use it (and increase its link count) if found, or it will look on disk for an appropriately named file if not. In OS-9/6809 and OS-9/68000, the module directory is flat, but OS-9000 made the module directory tree-structured. The OS-9000 shell looks in one's alternative module directory for a MODPATH environment variable, analogous to the PATH variable in all versions, indicating the sequence of module directories in which to look for pre-loaded modules.
Modules are not only used to hold programs, but can also be created on the fly to hold data, and are the way in which OS-9 supports shared memory.
OS-9/non-68000 supports POSIX threads. A single process can start any number of threads.
Status
OS-9 has faded from popular use, though Microware LP does still support it and it does run on modern architectures such as ARM and x86. The compiler provided, Ultra C/C++, supports C89, but supports neither C99 nor C++98. Ultra C++ does provide limited support for C++ templates. It is also supported by popular SSL/TLS libraries such as wolfSSL.
A Version of OS-9 running Steve Adams' G-Windows is present on semiconductor wafer scrubbers manufactured by Ontrak Systems / Lam Research. Thousands of these systems are in use today, however, the software running on them dates to 1999 when the last version was created to handle Y2K issues.
Versions of OS-9/68K ran on a wide variety of 68000 family platforms, including the Sharp X68000 in Japan, some personal computers intended by their designers as upgrades from the Color Computer (e.g., the 68070 and 68340-based MM/1, and on other computers from Frank Hogg Laboratories, PEP Modular Computers, and Delmar Co.) It was also ported to the Atari ST by Recc-o-ware in the early 1990s, and was distributed by Cumana in Europe. A port for 68000-based Apple Macintoshes distributed by Ultrascience exists. A port to the Amiga by Digby Tarvin is also purported to exist.
OS-9/68K is mandated by Caltrans to be used in the 2070-1B and 2070-1E controller cards, and so ends up being used to run many North American traffic signal control systems.
OS-9/68K is also found in some other embedded applications, including the Quanta Delta television broadcast character generator, still in production by ScanLine Technologies in Utah. While the user-level interface code on this system started at boot time, there was a hidden, undocumented keyboard sequence that would provide a user with a root shell prompt in a scroll window on the device's edit-channel monitor.
In the embedded market, where OS-9 has found application in such devices as the Fairlight CMI synthesizers, robotics, in-car navigation systems, and Philips' Compact Disc-Interactive (CD-i) industry standard.
The TRS-80 Color Computer (and clones) still has users and an annual conference in Chicago; as of 2018 the 27th Annual "Last" Chicago CoCoFEST was scheduled for 21-22 April 2018. A group of Canadian programmers rewrote OS-9/6809 Level II for the CoCo 3 (w/ address translation hardware) for efficiency, and to take advantage of the native mode of the Hitachi 6309. Today's serious CoCo users now typically have replaced the 68B09E in the CoCo 3 with an Hitachi 63B09E and run the rewrite, called NitrOS-9. The combination is surprisingly fast, considering that it runs on an expressly low cost, 8-bit computer system.
Gary Becker's CoCo3 FPGA is a synthesized TRS-80 Color Computer which runs NitrOS-9 on an Altera DE-1 development board. The core 6809 CPU was designed by John Kent and is currently running at 25 MHz.
OS-9000/80x86 can be run on PC-type machines built around the Intel x86 CPUs. OS-9000 has also been ported to the PowerPC, MIPS, some versions of Advanced RISC Machines' ARM processor, and some of the Hitachi SH family of processors.
The DigiCart/II Plus audio playback unit runs OS-9/68K. It is a solid state replacement for radio station style cart players. These units are used in radio and at places like Walt Disney World where they play park announcements.
German electronics manufacturer Eltec has been manufacturing the Eurocom-model CPU boards for industrial purposes since the late 1970s, starting with the 6802 and 6809 Eurocom-1 and Eurocom-2, and onwards with 68K, and derivative, CPU boards up to today. The modern boards can be delivered with a range of operating systems, amongst which is OS-9.
Omron used OS-9 in their NS series HMI panels. However, for their new NA series, Omron selected Windows Embedded Compact 7. Omron indicated that with OS-9 nearly all the drivers, for example for a USB stick, had to be written by Omron.
References
Further reading
External links
Microware LP
DTR - Access OS-9 Disk on PC
OS-9 Frequently Asked Questions List
Archive of OS-9 information and software, from RTSI LLC.
Repository for command line tools for manipulating 6809 OS-9 disk images, on SourceForge
Execution environment for OS-9 user-mode programs on Mac/Win/linux host OS
NitrOS-9 official website, on SourceForge
An OS-9 Port to the Thomson MO5, emulation (fr)
Running OS-9 on a TRS-80 Color Computer (CoCo)
comp.os.os9 newsgroup via Google groups web interface.
Official OS-9 Blog
A 6809 Emulator based on the SWTPC 6809 system that runs OS9 and UniFLEX as well as FLEX
XiBase9 (a GUI)
DragonWiki
Real-time operating systems
Embedded operating systems
TRS-80 Color Computer
ARM operating systems
X86 operating systems
PowerPC operating systems
Proprietary operating systems |
31434946 | https://en.wikipedia.org/wiki/Bobby%20Yazdani | Bobby Yazdani | Babak "Bobby" Yazdani (born 1963) is an Iranian-American entrepreneur and a venture capitalist.
Career
He is the founder of Saba Software and venture capital firms Cota Capital and Signatures Capital. Yazdani founded Saba in 1997 and took the company public in 2000. Yazdani grew Saba into a US$100+ million business, making Saba Software one of the fastest growing software companies in the world.
Yazdani began investing in 1989 and officially founded his investment firm, Signatures Capital, in 2006.
In 2014, Yazdani was ranked #1 out of 2000 angel investors in a report by CB Insights as having the most successful track record for investing in companies that received follow-on funding.
Saba Software
Yazdani started Saba in 1997. Saba Learning was the first product; since then, the product line has integrated and expanded into a unified suite of People Cloud Applications delivered as software-as-a-service. Under his leadership, Saba acquired THINQ Learning Solutions in May 2005, Centra Software in 2006 and Pedagogue Solutions and Comartis in June 2011.
Through his personal and Signatures Capital investments, Yazdani's portfolio includes Dropbox, Google, Uber, Bonobos, Bina, Salesforce.com, Monica + Andy, Klout, KISSmetrics, Qwiki, Webs.com, Masimo, Boticca, Clearspring, Atheer Labs, Nextbio, SoundHound, Adrise, and Blocks.
In 2014, Yazdani agreed to an SEC-negotiated 'clawback' of USD $2.5 million in earnings and bonuses to be reimbursed to Saba.
References
Living people
American technology chief executives
American people of Iranian descent
University of California, Berkeley alumni
1963 births
Place of birth missing (living people)
Businesspeople from San Francisco |
8727046 | https://en.wikipedia.org/wiki/Torrej%C3%B3n%20Air%20Base | Torrejón Air Base | Torrejón Air Base (Base Aérea de Torrejón de Ardoz) is both a major Spanish Air Force base and the co-located Madrid–Torrejón Airport, a secondary civilian airport for the city and metropolitan area of Madrid.
History
Torrejón Air Base was originally the home of the Spanish National Institute of Aeronautics, however following the Pact of Madrid of 26 September 1953, construction began at Torrejón on a new concrete runway to replace the existing grass airstrip and on a massive concrete apron and other necessary maintenance and shelter facilities to accommodate the largest United States Air Force bomber aircraft in the Strategic Air Command (SAC) inventory, with the base intended to support SAC Reflex missions. This was the longest runway in Europe until the construction of the Ulyanovsk Vostochny Airport in 1983, and is the ninth longest runway in Europe as of 1 June 2017.
USAF support activities began under the 7600th Air Base Group located in Madrid in July 1956, to support construction and base organizational functions. Torrejón Air Base opened officially on 1 June 1957 with SAC activating the 3970th Strategic Wing on 1 July 1957. The base hosting Sixteenth Air Force as well as SAC's 65th Air Division (Defense) where it cooperated with Spanish Air Force units in the Air Defense Direction Centers (ADDCs). The 65th Air Division directed base construction and the establishment of off-base housing and radar sites. The division's fighter squadrons flew air defense interceptions over Spanish airspace. The division also controlled the operations of numerous attached tactical fighter squadrons that were deployed to Spain for temporary duty (TDY). Assigned or attached units of the division participated in numerous exercises with the Spanish Air Defense Command, and in some instances, with the U.S. Sixth Fleet.
In addition to the command and control mission, Torrejón Air Base hosted SAC reflex operations. Reflex operations consisted of rotating B-47 Stratojet wings overseas for extended duty as part of a dispersal program. Another reason for establishing Reflex bases was the relatively short range of the B-47, unlike the intercontinental range of the B-36 Peacemaker and B-52 Stratofortress which could remain based permanently in the United States. Also, in this way SAC could spread out its potential as a Soviet target by placing its aircraft, weapons, and personnel on many more bases, with each bombardment wing having two additional installations to which it could disperse.
On 5 July 1958 the Air Defense Command's 497th Fighter-Interceptor Squadron arrived at Torrejón from Geiger AFB, Washington. It had an air defence role with North American F-86 Sabres. On 26 April 1960, the 497th FIS transitioned to the F-102 Delta Dagger and operated under SAC control until its transfer to the United States Air Forces in Europe (USAFE) 86th Air Division (Defense) at Ramstein Air Base West Germany on 1 July 1960. This transfer was made in order that all USAF fighter assets in Europe could be concentrated in one command. It operated F-102s until 3 June 1964, when it was reassigned to the 8th Tactical Fighter Wing at George AFB, California. Its F-102 aircraft were transferred to other USAFE 86th AD FIS squadrons.
Tactical operations
With the phaseout of the B-47 from SAC in the mid-1960s, the need for SAC European bases diminished. The Sixteenth Air Force was turned over to USAFE on 15 April 1966 and the strategic focus changed to tactical. Prior to 1966, Torrejón AB hosted TDY squadrons of tactical aircraft rotating from Continental U.S. Tactical Air Command (TAC) bases which would perform 30-day rotations to Aviano Air Base Italy and Incirlik Air Base, Turkey.
With the USAFE takeover of the base, TAC transferred the 401st Tactical Fighter Wing from England Air Force Base Louisiana to USAFE on a permanent basis to Torrejón on 27 April 1966, to perform host functions at the base and to support the rotational TDY duty to Italy and Turkey for NATO alerts.
The 401st TFW's initial operational squadrons at Torrejón were:
307th Tactical Fighter Squadron (1966–1971) (Tail Code: TJ)
353d Tactical Fighter Squadron (1966–1971) (Tail Code: TK)
613th Tactical Fighter Squadron (1966–1993) (Yellow/Black Tails, Tail Code: TL)
401st TFW squadrons flew the North American F-100D/FSuper Sabre.
Due to the demands of the Vietnam War, the 401st had deployed two of its three permanently assigned fighter squadrons (612th, 614th) to South Vietnamese bases (Phan Rang AB and Phu Cat AB). To provide the 401st a full operational capability at Torrejón, aircraft and personnel were transferred on a permanent basis to the 401st TFW from Homestead AFB, Florida (307th TFS) and Myrtle Beach AFB South Carolina (353d TFS).
As well as the USAFE tactical aircraft, SAC retained a presence at Torrejón with the 98th Strategic Wing flying KC-135 Stratotankers from the base. The 98th SW replaced the 3970th Strategic Wing on 25 June 1966. The 98th SW was inactivated at Lincoln Air Force Base Nebraska that same day with the closure of Lincoln AFB.
The 98th SW had no permanently assigned aircraft assigned, however CONUS-based SAC wings deployed aircraft to provide air refueling sup-port to meet the operational, alert, and exercise commitments of SAC, TAC, USAFE, and NATO in an area including the eastern Atlantic, most of Europe, North Africa and the Middle East.
Even though neither were assigned to the base, when a B-52 and a KC-135 crashed off the coast of Spain in the 1966 Palomares B-52 crash, Torrejón became the focal point for the search for the missing nuclear weapons.
Military Airlift Command (MAC) operated the 625th Military Airlift Support Squadron at Torrejón to function as a major terminal for MAC transatlantic flights.
In 1970 the 401st TFW upgraded to the McDonnell Douglas F-4E Phantom II. In September 1973, an equipment change to the F-4C model took place, then in 1979 to the F-4D.
As a result of the withdrawal of USAF forces in South Vietnam, on 15 July 1971 the 307th and 353rd TFS were returned to their home bases, and the 612th and 614th TFSs were assigned to Torrejón. Also in 1972, individual squadron tail codes were eliminated and "TJ" became the tail code for all 401st TFW aircraft.
On 31 December 1976 the 98th Strategic Wing was inactivated with its air refueling mission being taken over by the 306th Strategic Wing, based at Ramstein Air Base, West Germany.
The 401st transitioned to the new General Dynamics Block 15 F-16A/B Fighting Falcon beginning with the first aircraft deliveries on 5 February 1983. The wing reached full F-16 operational capability on 1 January 1985. The F-16A/B models were upgraded to the Block 30 F-16C/D beginning in late 1987, with all aircraft replaced by September 1988.
Operational squadrons were:
612th Tactical Fighter Squadron (blue tail stripe)
613th Tactical Fighter Squadron (yellow tail stripe)
614th Tactical Fighter Squadron (red tail stripe)
USAF withdrawal
As the time approached in 1987 for the renegotiation of the existing base agreement, which had entered into force in 1983 for a five-year period, pressures mounted for a reduction of the United States military presence in Spain. Communist political groups and elements of the Spanish Socialist Workers' Party (PSOE) had campaigned against the bases. Moreover, the base agreement had become a symbol of United States cooperation with Francoist Spain. It was important to many Spaniards to eliminate vestiges of this history by converting Spain's long-standing bilateral relations with the United States into a multilateral undertaking through NATO.
The outcome of the 1986 Spanish NATO membership referendum committed the Spanish government (then the Second González government) to negotiate the reduction of the United States military presence in Spain. Spain insisted that the F-16 aircraft be removed from Torrejón as a condition for renewal of the base agreement, and the Spanish government threatened to expel all United States forces in Spain if this demand were not accepted. The United States felt that even though Italy subsequently agreed to station the F-16 wing at Aviano Air Base, the cost of transfer would be high, and the unit would be in a more exposed position to Warsaw Pact forces.
In January 1988, Spain and the United States announced jointly that agreement had been reached in principle on a new base agreement with an initial term of eight years, essentially meeting the conditions demanded by Spain. The F-16s were to be removed from Torrejón within three years, by mid-1991. It was expected that this step would reduce the number of United States personnel in Spain by nearly one-half.
Implementation of this agreement was delayed by the 1990-91 crisis in Kuwait, when the 401st TFW was one of the first American fighter wings to respond, with the 612th TFS deploying to its wartime base at Incirlik, Turkey and the 614th TFS becoming the first US military unit to deploy to Qatar. Both squadrons flew a large number of operational missions during Operations Desert Shield and Storm.
After the 1991 cease-fire in Iraq, plans proceeded to close Torrejón Air Base. On 28 June, the 613th TFS was inactivated and its aircraft sent to Air National Guard squadrons in the United States. The 612th TFS inactivated on 1 October and the 614th TFS on 1 January 1992.
In accordance with the 1988 agreement, the USAF portion of the base was turned-over to the Spanish government on 21 May 1992, with the 401st Tactical Fighter Wing being transferred to Aviano Air Base, Italy without personnel or equipment.
Civilian use
In the mid-1990s Torrejón Air Base was opened to civilian traffic (mostly charter and executive traffic) and was given the name Madrid–Torrejón Airport. Prior to the completion of Barajas Terminal 4 it was used on several occasions to reduce congestion at the old overloaded Barajas terminals. Operated by AENA, in 2011 it handled 27,801 passengers and 11,489 flight operations. Beginning February 1, 2013, Torrejon-Madrid Airport was permanently closed to all civilian and general aviation traffic.
Current military use
Since its creation, Torrejon Air Base was also the base of a Spanish Air Force fighter wing, an aerial firefighting group and the flight test group of the Spanish Air Force (Ala 12 of the Spanish Air Force, the 54 Flight Test Group and the 43 Grupo dedicated to aerial firefighting). Currently the Ala 12 of the Spanish Air Force operates two squadrons equipped with the McDonnell Douglas F/A-18 Hornet, the 54 Flight Test Group operates with a very diverse range of airplanes and the 43 Grupo operates with Bombardier 415 and Canadair CL-215. In order to fill the space left by the withdrawal of USAF, the Spanish Air Force moved into Torrejon Air Base the following units that were not based there before: the 45 Grupo dedicated to VIP transport and the 47 Grupo dedicated to electronic warfare.
Based units
Flying and notable non-flying units based at Torrejón.
Spanish Air Force
Air Combat Command
Headquarters Air Combat Command
Command and Control System Headquarters
Central Command and Control Group
Aerospace Surveillance and Control System
Headquarters Aerospace Surveillance and Control System
Space Surveillance Operations Center
General Air Command
Wing 12
121 Squadron – C.15/CE.15 (EF-18A/B Hornet)
122 Squadron – C.15/CE.15 (EF-18A/B Hornet)
43 Air Force Group UME (Military Emergencies Unit – Search and Rescue & Forest Fires Unit)
431 Squadron – UD.13T (CL-215T) and UD.14 (CL-415)
432 Squadron – UD.13T (CL-215T) and UD.14 (CL-415)
45 Air Force Group (Royal, Government & VIP Transport)
451 Squadron – T.18 (Falcon 900) and T.22 (A310)
47 Joint Group of Air Forces (Reconnaissance, Electronic Warfare, Transport, In-flight Refuelling)
471 Squadron – T.17 (Boeing 707)
472 Squadron – T.12 (C-212 Aviocar) and TM.11 (Falcon 20)
Aeroevacuation Medical Unit
Armament and Experimentation Logistics Center – C.15/CE.15 (EF-18A/B Hornet), E.25 (C-101EB Aviojet) and T.12 (C-212 Aviocar)
Center for Aerospace Observation Systems – Helios
Deployment Support Air Medical Unit
Intendancy Logistics Center
Madrid Salvage Coordination Center (RCC Madrid)
School of Aeronautical Techniques
Transmission Group
Transmission Squadron No. 5
Personnel Command
Aerospace Medicine Instruction Center
Other
Air Operations Squadron No. 1 – Madrid
Operational Air Circulation Group
Military Emergency Unit
Space Surveillance Operations Center
Civil Guard
Civil Guard Air Service
European Union
European Union Satellite Center
Headquarters European Union Satellite Centre
NATO
NATO Communications and Information Agency
Communications and Information Systems Support Unit Torrejón
Supreme Headquarters Allied Powers Europe
Allied Air Command
Combined Air Operations Centre Torrejón
References
Donald, David (2004) Century Jets: USAF Frontline Fighters of the Cold War. AIRtime
Endicott, Judy G. (1999) Active Air Force wings as of 1 October 1995; USAF active flying, space, and missile squadrons as of 1 October 1995. Maxwell AFB, Alabama: Office of Air Force History. CD-ROM.
Fletcher, Harry R. (1989) Air Force Bases Volume II, Active Air Force Bases outside the United States of America on 17 September 1982. Maxwell AFB, Alabama: Office of Air Force History.
Menard, David W. (1998) Before Centuries: USAFE Fighters, 1948–1959. Howell Press Inc.
Menard, David W. (1993) USAF Plus Fifteen: A Photo History, 1947–1962. Schiffer Publishing, Ltd.
Ravenstein, Charles A. (1984). Air Force Combat Wings Lineage and Honors Histories 1947–1977. Maxwell AFB, Alabama: Office of Air Force History. .
Rogers, Brian (2005). United States Air Force Unit Designations Since 1978. Hinkley, England: Midland Publications. .
External links
USAAS-USAAC-USAAF-USAF Aircraft Serial Numbers—1908 to present
The Lucky Devils in the Gulf War
Unofficial Torrejon Air Base Website
Air force installations of Spain
Installations of the United States Air Force in Spain
Airports established in 1953
1953 establishments in Spain
Torrejón de Ardoz |
32643120 | https://en.wikipedia.org/wiki/Video%20game%20piracy | Video game piracy | Video game piracy is the unauthorized copying and distributing of video game software, and is a form of copyright infringement. It is often cited as a major problem that video game publishers face when distributing their products, due to the ease of being able to distribute games for free, via BitTorrenting or websites offering direct download links. Right holders generally attempt to counter piracy of their products by enforcing the Digital Millennium Copyright Act, though this has never been totally successful. Piracy directly compromises revenue, as evidenced by a 2011 UKIE report, detailing how video game piracy using modified consoles cost publishers at least £1.45 billion (approximately $2.3 billion) the previous year. UKIE also estimated that there was a 4:1 (2.3 * 4 = $9.2 billion) ratio of pirated copies to legitimate copies of games, with the aforementioned monetary figure only being drawn from a conservative 1:1 ratio. Digital distribution of pirated games has historically occurred on bulletin board systems (BBS), and more recently via decentralized peer-to-peer torrenting. In terms of physical distribution, Taiwan, China and Malaysia are known for major manufacturing and distribution centers for pirated game copies, while Hong Kong and Singapore are major importers.
History and culture
As the personal computer rose to prominence in the mid to late 1970s, so too did the tendency to copy video games onto floppy disks and cassette tapes, and share pirated copies by hand. Piracy networks can be traced back to the mid-1980s, with infrastructure changes resulting from the Bell System breakup serving as a major catalyst. Video game trading circles began to emerge in the years following, with networks of computers, connected via modem to long-distance telephone lines, transmitting the contents of floppy discs. These trading circles became colloquially known as the Warez scene, with the term "warez" being an informal bastardization of "software".
In the 1980s, crack intros began appearing on pirated games. Preceding the booting of the actual game, these windows would contain the monikers of those who created the pirated copy, along with any messages they wanted to add. Beginning as simple text, the presentation of these crack intros gradually grew more complex, with windows featuring GIFs, music, and colorful designs.
With the rise of bulletin board systems throughout the 1980s and into the 1990s, the sharing of pirated video games took a centralized form. By connecting personal computers to telephone modems, and dialing a number to a dedicated server, members of the Warez scene could share their copies of video games. Furthermore, because this system preceded the rise of the consumer-level internet, it could go relatively unnoticed. However, with the rise of peer-to-peer torrenting, and notably with the release of BitTorrent in 2001, this BBS format of video game piracy began to decline. Nowadays, torrenting pirated games remains the popular choice among those who engage in piracy. Efforts to thwart illegal torrenting have historically failed, because its decentralized nature makes it effectively impossible to totally dismantle.
Anti-piracy measures
The use of copy protection has been a commonplace throughout the history of video games. Early copy protection measures for video games included Lenslok, code wheels, and special instructions that would require the player to own the manual. Several early copy protection measures have been criticized for both their ineffectiveness at preventing piracy, and their inconvenience to the player. One of the most typical means of copy protection is to assign a serial key to each legitimate copy of the game, so that it can only be activated by entering the serial. However, this is often circumvented via software cracking, or through the use of a keygen.
More recent attempts to hinder piracy have included Digital rights management tools. A form of this is the sale of games on digital distribution platforms, such as the Epic Games Store, Blizzard's Battle.net, and Steam. Steam offers proprietary features such as accelerated downloads, cloud saves, automatic patching, and achievements that pirated copies do not have. The purpose of these features is to make piracy look less attractive, and to incentivize the legitimate purchase of games. Gabe Newell, creator of Steam, has stated that creating "service value" discourages piracy more than adding additional DRM. Some games, such as Grand Theft Auto IV, use DRM that negatively alters gameplay, if it detects that the game is an illegitimate copy. In GTA IV's case, it disables the brakes on cars and gives the camera an amplified drunk effect, making gameplay much harder, thus creating an incentive to legitimately purchase the game.
Sometimes, games require online authentication or have always-on DRM. A notable incident concerning always-on DRM took place in 2021, surrounding the Windows release of Crash Bandicoot 4: It's About Time. Without a constant internet connection, the game's DRM disallows any play at all, even in single-player, which naturally drew ire. However, the Warez scene cracked this DRM feature almost immediately. A cracked version of Crash Bandicoot 4, stripped of this DRM, began circulating online just one day after its official release.
Emulation and piracy
Historically, video game companies have blamed video game emulators for piracy, despite the fact that anyone can create their own legal ROM image from the original media. Concerning this demonization of emulators, video game historian Frank Cifaldi attributed it to the Connectix Virtual Game Station. Released in 1999, this commercial emulator enabled the play of Sony PlayStation games on Macintosh computers. However, it was easily cracked by hackers to play pirated ISO images of PlayStation games, leading to a lawsuit from Sony. Companies continued to fear that emulators would encourage piracy. This has created a long-running debate over emulation, since many out-of-print video games can only be played via ROM, making emulators the only replacement for defunct video game consoles. Additionally, modern remasters and remakes can significantly alter a game, sometimes in a manner that changes the entire gameplay experience. For example, Crash Bandicoot N-Sane Trilogy had a rewritten physics engine, requiring players to make more precise jumps. Such gameplay changes give importance to emulators, which may be able to run the original game.
Some companies still consider emulators copyright-infringing. In 2017, Atlus attempted to take down the Patreon page of a PlayStation 3 emulator, RPCS3, arguing that the ability to play Persona 5 on it made it illegal software. However, Patreon disagreed with the company's stance, and allowed the page to remain, as long as references to Persona 5 were removed. Furthermore, Nintendo has taken decisive action against the emulation of its games in recent years. In 2018, the company sued a handful of large ROM sites, forcing them to remove ROMs of their older console games, for what they called “brazen and mass-scale infringement of Nintendo’s intellectual property rites". The distribution of copied ROM files online is illegal, but this move by Nintendo was interpreted by the emulation scene as an attack on the emulation of older games. In November 2020, Nintendo issued a cease and desist order to The Big House, an annual Super Smash Bros tournament. The Big House ran SSB games on the Dolphin emulator, and it was the addition of the mod Slippi, which enabled online play, that caught Nintendo's attention.
Despite longstanding criticism of emulators in the game industry, companies themselves have used emulation to run commercial games. Nintendo operates the Virtual Console, which allows people to buy and play certain games via emulation. In 2017, the PlayStation 4 was found to contain a functioning internal PSP emulator. Hackers discovered that PaRappa the Rapper Remastered was actually the 2007 PSP version, running with upscaled textures. This emulator was later reverse-engineered and used to play other PSP games. Additionally, Microsoft's Xbox One console uses a proprietary emulator in order to play games released for the original Xbox, and the Xbox 360.
Console modding and piracy
Modded consoles have been cited as an avenue for video game piracy, both by allowing unauthorized copies to be played, and by circumventing DRM. Legal homebrew video games and backup copies can be played on modified systems, but the argument of piracy remains. A notable example of console modding is the original Microsoft Xbox, of which tutorials still exist to this day. By introducing softmod installation files via one of the four controller ports, players could overhaul the system UI, install and play games directly off the internal hard disc drive, and even play TV shows and movies on the console. Some softmods even re-enable online play on the original Xbox, despite the first incarnation of Xbox Live having shut down in 2010. A handful of hardmod techniques also exist for the original Xbox, enabling hardware additions and upgrades to non-stock components.
Companies such as Nintendo have coordinated with law enforcement agencies to track down and seize modchips for their consoles, such as in the 2007 Operation Tangled Web. The same year, Nintendo also began a crackdown against merchants of R4 flash cartridges, which could be used to play pirated ROMs on the Nintendo DS. In 2009, the device was declared illegal to sell or import into Japan, among other countries. In 2018, a man was arrested in the United Kingdom, for allegedly running a Nintendo Switch modding operation out of his house. Furthermore, in 2020, two prominent members of the hacking group Team Xecuter were arrested and indicted by the Department of Justice. The indictment detailed their creation of modded consoles, which were "designed to be circumvention devices that had the purpose of allowing users to play pirated ROMs."
See also
Software piracy
References
Copyright infringement of software
Video game distribution |
58827771 | https://en.wikipedia.org/wiki/1998%20Troy%20State%20Trojans%20football%20team | 1998 Troy State Trojans football team | The 1998 Troy State Trojans football team represented Troy State University in the 1998 NCAA Division I-AA football season. The Trojans played their home games at Veterans Memorial Stadium in Troy, Alabama and competed in the Southland Conference.
Troy State finished the season ranked #11 in both the Coaches' Poll and the Sports Network Poll.
Schedule
References
Troy State
Troy Trojans football seasons
Troy State Trojans football |
5534052 | https://en.wikipedia.org/wiki/LinuxThreads | LinuxThreads | In the Linux operating system, LinuxThreads was a partial implementation of POSIX Threads introduced in 1996. The main developer of LinuxThreads was Xavier Leroy. It has been superseded by the Native POSIX Thread Library (NPTL).
LinuxThreads had a number of problems, mainly owing to the implementation, which used the clone system call to create a new process sharing the parent's address space. For example, threads had distinct process identifiers, causing problems for signal handling; LinuxThreads used the signals SIGUSR1 and SIGUSR2 for inter-thread coordination, meaning these signals could not be used by programs.
To improve the situation, two competing projects were started to develop a replacement; NGPT (Next Generation POSIX Threads) and NPTL. NPTL won out and is today shipped with the vast majority of Linux systems. , LinuxThreads may still be seen on production systems, particularly those using version 2.4 or lower of the Linux kernel, as NPTL requires facilities which were specifically added into the 2.6 version of the kernel for its use.
LinuxThreads was also ported to and used on FreeBSD.
References
External links
The LinuxThreads library, Xavier Leroy Home Page
Linux threading models compared: LinuxThreads and NPTL, IBM 2006
Threads (computing) |
40922551 | https://en.wikipedia.org/wiki/%C3%89n%C3%A9e%20et%20Lavinie%20%28Collasse%29 | Énée et Lavinie (Collasse) | Énée et Lavinie (Aeneas and Lavinia) is an opera by the French composer Pascal Collasse, first performed at the Académie Royale de Musique (the Paris Opéra) on 7 November 1690. It takes the form of a tragédie lyrique in a prologue and five acts.
The libretto, by Bernard Le Bovier de Fontenelle, is based on the later books of Virgil's Aeneid. A new setting by the composer Antoine Dauvergne appeared in 1758.
Roles
Synopsis
Aeneas, fleeing the destruction of Troy, has arrived in Latium in Italy. The King of Latium wants to marry his daughter Lavinia to Aeneas, but the Trojan has a rival in the local prince Turnus, who is favoured by the queen and the goddess Juno. Juno provokes Turnus to fight the Trojans. The king consults the oracle of his father, the god Faunus, who says that Lavinia must choose her husband for herself and then there will be peace. The ghost of Dido warns Lavinia not to trust her faithless lover Aeneas. The god Bacchus also inspires Lavinia with a hatred of the Trojans and she announces she will marry Turnus. Aeneas reproaches her for her choice and tells her he only abandoned Dido because the god Jupiter told him to. Lavinia admits she loathes Turnus and was only persuaded to marry him by a divine fury sent by Bacchus. Turnus arrives and Aeneas challenges him to single combat. Turnus accepts. The goddess Venus brings Aeneas special armour. Aeneas and Turnus fight (offstage) and Aeneas is victorious. Juno renounces her hatred for the Trojans and the opera ends with the wedding of Aeneas and Lavinia.
References
Notes
Sources
Félix Clément and Pierre Larousse Dictionnaire des Opéras, Paris, 1881
Libretto at "Livrets baroques"
Operas
Tragédies en musique
French-language operas
1690 operas
Operas by Pascal Collasse
Operas based on the Aeneid |
9298990 | https://en.wikipedia.org/wiki/ITCRA | ITCRA | The Information Technology Contract and Recruitment Association (ITCRA), incorporated on 8 December 1998 and based in Melbourne, Australia, is a group of CEOs in the IT contract and recruitment industry who gathered together to air their concerns with each other about the state of the industry.
Philosophy
Aiming to be the pre-eminent body in the IT contract and recruitment industry in Australia and New Zealand, setting the direction for the industry and influencing its standards and code of practice. ITCRA excels in representing its members' interests to government, employers and employees and in providing industry specific and cost efficient forums and programs.
Uppermost in their minds was the perception that a lack of professionalism was emerging that was generating an unfavourable image amongst client companies and contractors. They came to believe that the industry needed the sort of leadership that could only be provided by an industry specific body. They also believed that a code of ethics was needed to which industry CEOs committed their companies. Making the industry more efficient by the development of common form contracts, industry specific training programs for staff and contractors, recruitment forums and other projects in which they had a common interest were other joint activities that they wanted to pursue.
Since incorporation, the Association’s Code of Conduct has been published; its collateral has been produced; its full-time secretariat has been appointed and its membership has been significantly enlarged.
Objectives
The Association’s objectives are to:
Enhance and promote the information technology contract and recruitment industry
Establish a Code of Conduct consistent with good practice and sound business objectives
Promote the professionalism and image of the industry
Conduct training and educational activities for the industry
Provide an industry forum/lobby group for specialist IT recruitment and contract labour providers
References
External links
Official web site
Information technology organizations based in Oceania
Computer science-related professional associations
Organizations established in 1998 |
22597450 | https://en.wikipedia.org/wiki/ESoft | ESoft | eSoft was a Colorado-based company, that ceased operations in December 2013 and specializing in integrated security solutions including secure content management and unified threat management appliances. Privately held eSoft, based in the foothills of Broomfield, Colorado, has developed the award-winning InstaGate and ThreatWall security appliances, as well as modular software bundles called ThreatPaks that provide Email and Web security.
eSoft ceased operations in December, 2013. Some assets were acquired by Untangle, Inc.
Products
eSoft develops network security appliances such as Firewall/VPN gateways, unified threat management (UTM) devices, secure content management (SCM) devices, virtual appliances and other network security appliances. These appliances can be combined with software subscriptions to serve business purposes such as email or web filtering and security.
History
eSoft was founded by Philip L. Becker in 1984 and started out making and selling the TBBS (bulletin board system) initially targeted at RadioShack TRS-80 [CP/M] machines, but later ported to IBM-PC computers. Software companies like Microsoft relied on TBBS for their online technical support before the advent of the Internet. In 1993 eSoft created a product called the IPAD (Internet Protocol Adapter) in an effort to adapt to the Internet. The IPAD started as a gateway to TBBS using Internet Protocols like FTP and DNS. This evolved into an "internet in a box" solution giving ISPs and companies a point of presence on the Internet with a single appliance purchase.
In March 1998, eSoft went public on the Nasdaq Stock Exchange with the ticker symbol ESFT and by 1999 was trading at $40 per share riding the dot-com era enthusiasm with Linux-based companies. In January 1999, eSoft acquired Apexx Technology Inc., makers of a competing all-in-one appliance. eSoft rebranded its IPAD appliance as TEAM Internet. Following that acquisition, in July 1999 eSoft purchased Technologic, a maker of firewall security appliances, as a way to branch out into the security space. In November of that year, eSoft's stock more than doubled after a $3 million investment from Intel.
In February 2000, Gateway, Inc. announced a plan to invest $25 million in eSoft at a price of $19.51 per share, but after the first installment of $12.5 million, eSoft's falling share price caused Gateway to attempt renegotiate its investment. In September 2000, eSoft signed a deal that licensed its Redphish Linux-based security platform to 3Com. By January 2002, the dot-com bubble's burst had brought eSoft's stock down to levels that resulted in its delisting from the NASDAQ SmallCap market and the stock moved to Over The Counter exchanges.
In the meantime, eSoft announced new lines of products including the InstaGate all-in-one appliance, which today is called a Unified Threat Management (UTM) appliance, but at the time was one of the first turnkey solutions of its kind. eSoft also introduced its InstaGate Secure Content Management line of appliances, which didn't include firewall and VPN functionality, and was later rebranded as ThreatWall. eSoft's all-in-one approach was provided a la carte to the appliance as subscription-based "SoftPaks" for different bits of functionality. Functionality included technologies like Gateway Anti-Virus, which at the time was licensed from Sophos. The software subscription model was fairly new when eSoft started that approach and eSoft was able to patent the concept of managing software subscriptions that include a la carte options and 3rd party technologies (U.S. Patent No. 6,961,773 B2). In 2006, eSoft stirred up controversy on the web after bringing patent infringement suits against competitors Astaro Corporation, Barracuda Networks, Blue Coat, Fortinet and SonicWALL.
eSoft's appliances are targeted at small businesses and claim to make complex security easy to manage for small and medium businesses with small or non-existent IT staffs. It has consistently won a number of Best Buy and around 2005, eSoft started bringing various technologies in-house rather than reselling other products. The culmination of this strategy resulted in March, 2008 when eSoft announced its OEM program for its SiteFilter secure web filtering technology. A year later, in April 2009, eSoft announced the signing of its 15th partner. In September 2010, the SiteFilter web filtering technology of eSoft was spun out as a separate company, Zvelo, and eSoft was taken private.
References
External links
eSoft Webpage
eSoft's evolution: Broomfield company is finding growth in network security space, Alicia Wallace, Daily Camera
Companies based in Colorado |
621311 | https://en.wikipedia.org/wiki/Train%20simulator | Train simulator | A train simulator (also railroad simulator or railway simulator) is a computer based simulation of rail transport operations. They are generally large complicated software packages modeling a 3D virtual reality world implemented both as commercial trainers, and consumer computer game software with 'play modes' which lets the user interact by stepping inside the virtual world. Because of the near view modeling, often at speed, train simulator software is generally far more complicated and difficult software to write and implement than flight simulator programs.
Industrial train simulations
Like flight simulators, train simulators have been produced for railway training purposes. Driver simulators include those produced by:
Transurb Simulation, a Belgian-based company
FAAC (the training division of Arotech Corporation) in the United States
Ongakukan in Japan
EADS in Germany
Bentley Systems in the UK
Lander Simulation & Training Solutions, Spain
CORYS , a French company with offices in Grenoble, France and Jacksonville, FL, USA
Krauss-Maffei Wegmann GmbH & Co KG (KMW) http://www.kmweg.de/, a German company based in Munich
Oktal Sydac in Australia, France, India and the UK
SMART Simulation - part of the Neokon Baltija group from Lithuania with offices in the UK and Russia.
New York Air Brake, an American company based in Watertown, NY.
PS Technology, an American company based in Boulder, CO.
Signaller training simulators have been developed by Funkwerk in Germany, The Railway Engineering Company (TRE) in the UK, OpenTrack Railway Technology in Switzerland, and PS Technology in the US.
Types of train simulators
There are various types of train driving simulators that are adapted to varying training needs and can be combined to meet operators' training needs in the most efficient way.
Full-cabin simulators
Similarly to flight simulators, train simulators can be a replica of a full driving cabin, on a one-to-one scale. This type of simulator is opted for when a train operator needs an immersive training tool for particularly effective training sessions.
Intermediate, more compact simulators
Certain simulators can uphold a certain level of immersion while optimising the space of a training room. When a certain balance between immersion and scalability is needed, this type of simulator is chosen by instructors.
Portable simulators
When a train operator has various training centres, it is sometimes easier and more logical to invest in smaller simulators that can be transported from one centre to another. The company Transurb Simulation was the first to propose such a tool, which has now been adopted by many operators around the world and is becoming of a growing interest for smaller operators.
Consumer train simulation
There are two broad categories of train simulation video games: driving simulation and strategy simulation.
Driving simulation
Train driving simulation games usually allow a user to have a "driver's view" from the locomotive's cab and operate realistic cab controls such as throttle, brake valve, sand, horn and whistle, lights etc.
Train driving simulation software includes:
BVE Trainsim (originally Boso View Express) is a Japanese three-dimensional computer-based train simulator. It is notable for focusing on providing an accurate driving experience as viewed from inside the cab, rather than creating a network of other trains—There are no outside views, drivers can only look directly ahead, and other trains passed along the route are only displayed as stationary objects.<ref
name="hanstater"></ref>
Densha de Go!, a Japanese train simulation game series focused on driving, developed by Taito.
Diesel Railcar Simulator, a train simulator focusing on British Diesel Mechanical Railcars.
Microsoft Train Simulator (MSTS), with limited route building and difficult expansion capabilities.
Open Rails, an open source, freeware simulator that is backwards compatible with Microsoft Train Simulator content.
Rail Simulator, another extensively expandable and user orientated creation simulator with intuitive driving modes and editing tools. The main focus is on driving a train from the cab while performing a series of pre-determined tasks. Additional modes allow differing levels of control and interaction. Built by the company behind the original Microsoft Train Simulator software, and published by Electronic Arts.
Train Simulator (originally RailWorks), successor to Rail Simulator, the software was subject to a management buy out. Operating as Rail Simulator Developments Ltd, the software was rebranded, improved and adapted for the Steam online distribution system. Expanding on the capabilities of the original version, RailWorks went on to develop the concept of Downloadable Content (DLC) addons providing users with optional additional purchases. While the majority of DLC is sold as payware through Steam, many of the Microsoft Train Simulator developers also provide routes, trains and scenarios as freeware and payware. The software entered its current incarnation in 2012 when the company behind its development rebranded as Dovetail Games, and put the simulator through a similar program of reinvention. Continuing to be sold primarily though Steam, boxed versions are released annually each September, incrementing the title (TS2013/TS2014/TS2015). Each annual release encompasses a range of global enhancements that are distributed free to all users, and a range of purchasable routes and trains that make use of the new features as a demo to prospective customers.
Run8 V2, a primarily multiplayer train simulator focused on realistic North American freight operations.
Train Simulator series (a.k.a. Railfan)
Train Sim World
Trainz, an extensively expandable and user extendable (by scripts) simulator with intuitive GUI world modeling and asset creation facilities, an extensive freeware library of over 250,000 assets, and an attention to Train physics. The simulator offers 4 viewing modes, and for beginning drivers or learning a route, a control mode similar to that of a H.O. scale model train set.
The PC game 3D Ultra Lionel Traintown, amongst some others, give a different experience to driving, by being in a 3rd person omniscient perspective, controlling the trains from a bird's eye view.
Peripherals specifically designed for use with driving simulations include RailDriver by US manufacturer P.I. Engineering. RailDriver is a programmable desktop cab controller with throttle, brake lever and switches designed to work with Trainz, TrainMaster, Microsoft Train Simulator and Rail Simulator.
Strategy simulation
Railroad-themed strategy simulation video games are focused mostly on the economic part of the railroad industry rather than on technical detail. The A-Train series (1985 to present) is an early example. Chris Sawyer's Transport Tycoon (1994) was an influential game in this genre, spawning remakes such as Simutrans (1999 to present), OpenTTD (2004 to present) and Sawyer's own Locomotion (2004). Sid Meier designed two railroad simulations: Railroad Tycoon (1990) and Railroads! (2006). The Railroad Tycoon series itself inspired other rail games such as Rails Across America (2001).
Other genres
Some rail simulation games focus on railway signalling rather than economics. Examples include The Train Game (1983), SimSig (donationware) and Train Dispatcher
Design Your Own Railroad (1990) allows players to design railroads and play simulations on their designs.
JBSS BAHN (shareware) focuses on simulating a complex railroad lay out.
PC-Rail Software have nearly 90 different signalling simulations, mostly based on UK locations.
History
Train simulators are popular in Japan, where rail transport is the primary form of travel for most citizens. Train video games have been developed in Japan since the early 1980s, with Sega's arcade action game Super Locomotive (1982) being an early example, before more realistic train simulators emerged, such as Ongakukan's Train Simulator series (1995 debut) and Taito's Densha de Go series (1996 debut), as well as train business simulations such as the A-Train series (1985 debut).
One of the first commercially available train simulators was Southern Belle, released in 1985. The game simulated a journey of the Southern Belle steam passenger train from London Victoria to Brighton, while at the same time the player must comply with speed limits, not to go too fast on curves and keep to the schedule. It was followed with Evening Star in 1987.
While commercial trainers on mini-computer systems had a longer history, the first two mass-market English 'computer game' railway simulators, Microsoft Train Simulator and Trainz, arrived within a few months of one another in 2001 and could run on Intel 80386 microprocessor based systems.
Before that, already in 1996, the free BVE was aviable to the public. Later on, the Open BVE, a free and open source project, was developed and re-written from scratch.
Some, like the wide-market release, Microsoft Train Simulator (MSTS), are written and modeled for the user mainly interested in driving. Others, like MSTS's principle rival, Trainz, were aimed initially primarily at the rail enthusiast-hobbyist markets, supporting features making it possible to build a virtual railroad of one's dreams. Accordingly, for four years Trainz releases bundled a free copy of Gmax digital model building software on each CD-ROM, hosted an asset swap website (Trainz Exchange, later the Trainz Download Station), encouraged user participation and dialog with an active forum, and took pains to publish in-depth how-to model guidelines and specifications with its releases.
Several other later challengers as well as Trainz (with a series of upgrades) soon matched or eclipsed MSTS's driving experiences one way or another. Railsim, actually a successor using the MSTS game engine upped the challenge to the aging MSTS by adding much improved graphics, so Trainz did as well, but also added interactive industries and dynamic driving features such as product loading and unloading, load-sensitive physics modeling affecting driving and operating and user interface changes to improve user experience (UX), such as a free-camera mode allowing roaming away from the train cars, free and clear of the train being operated-while still controlling it. This latter makes particular sense given the dearth of an assistant on a walkie-talkie while operating a train during coupling operations or other position sensitive tasks such as loading and unloading. Railsim and a couple of others came and went out of business, and Railsim was reorganized as Rail Simulator with the software company that wrote MSTS as its core, while MSTS aged and never did get upgraded as Microsoft had once begun and announced. In the last few years, Rail Simulator has changed its name to Train Simulator.
As the world market has shaken out, Australian Trainz in 2014-2015 upgraded itself with Trainz: A New Era, still servicing the wider route builder and driving markets, but now matching the 64-bit computing and graphics of Train Simulator. In the same five-year period, train simulators have moved to pad computer and phone platforms.
See also
Flight simulator – contains reference to flight simulators
Strategy computer game
References
External links
2TRAIN Benchmarking Report on computer-based Railway Training in Europe
RailServe.com (Directory of train simulator sites)
Railpage Train Simulator Support Forums(Online Support Forum and Add-on downloads)
VR Reading Room: Hundreds of articles covering all train simulators
Metro Simulation
pagina Viajeros al Tren Add-on Soporte y foro en Español
Virtual reality
Video game terminology
Railroad games
1980s video games |
62154449 | https://en.wikipedia.org/wiki/Gary%20Bitter | Gary Bitter | Gary Bitter (born Susank, Kansas) is an American researcher, teacher, author and pioneer in educational technology. He is Professor of Educational Technology and past Executive Director of Technology Based Learning and Research at Arizona State University. He was a founding board member of the International Society for Technology in Education and served as its first elected president. He is the co-author of the National Technology Standards (NETS) which have been used extensively as a model for National and International Technology Standards.
Bitter's research has been focused educational technology, e-learning and how the use of technology impacts student performance. He has also done considerable work for developing applications for education, and technology-based curricula. He has published over 200 articles and books.
In 2000, the International Society for Technology in Education (ISTE) awarded Bitter the Paul Pair Lifetime Technology Achievement Award. In 2006, The National Council of Teachers of Mathematics (NCTM) awarded him the Mathematics Education Trust Lifetime Achievement Award for Distinguished Service to Mathematics Education.
Education
Bitter received a B.S. in Mathematics Education from Kansas State University in 1962 and an M.A. in Mathematics from Emporia State University in 1965. He then joined University of Denver where he completed his Ph.D. in Mathematics and Computer Science Education in 1970. His dissertation was entitled 'Computer Applications Related to Student Achievement'.
Career
Bitter joined Arizona State University in 1970 as an Assistant Professor of Education, becoming Associate Professor in 1973 and Full Professor in 1977. From 1984 to 1985, he was appointed as the Acting Director of the Arizona State University Computer Institute. He served on the University Senate from 1972 to 1975 and 2007 to 2015 and was Chair of the University Financial Affairs Committee 1974-1975 and served on the University Executive Board 1974-1975 and University Senate Personnel Committee Chair 2011 to 2012.
In 1989, Bitter chaired the committee that merged the International Council for Computers in Education and International Association for Computing Education (formerly Association of Education Data Systems), which resulted in the formation of International Society for Technology in Education (ISTE). He became the first elected president of ISTE in 1990. He was the co-director of the National Educational Technology Standards project at ISTE. The project, funded by NASA and USDE in the late 1990s, developed national standards for the use of technology in education.
Bitter has been published in numerous journals and written monthly columns for several magazines. Bitter has been on the Scientific Board of Computers in Human Behavior since 1995, and the Editorial Board of Journal of Research on Technology in Education since 1999. He was the Editor-in-Chief of the MacMillan Encyclopedia of Computers from 1990 to 1992, Executive Editor of Technology on Campus from 1988 to 1990, and Software Editor of Journal of Computers in Mathematics and Science Teaching from 1989 to 1993. He has been on the Editorial Board of the American Educational Research Journal (2003-2005), of Journal of Computers in Mathematics and Science Teaching (1981-1993), of Electronic Education (1984-1987). He wrote monthly columns for Educational Computer Magazine and Teacher Magazine in the early 1980s. He was Editor of the School Science and Mathematics from 1982-1988.
In 1980, Bitter founded the Microcomputers in Education Conference and served as its Director until 2000. He has been a consultant to many school districts as well as computer hardware and software companies.
Research and work
Bitter's research has been focused educational technology, e-learning, emerging technologies and how the use of technology impacts student performance. He has also done considerable work for developing applications for education, and technology-based curricula. He has published over 200 articles and books.
In the beginning of his career in the 1970s, Bitter's research was focused on how computers can help in calculus: the applications of computers in calculus and the use of hand-held calculators in mathematics. Towards the mid-1970s, he also conducted research on teaching and learning of the metric system.
As microcomputers began to make their way to educational institutions in the early 1980’s, Bitter conducted research on the use of microcomputers in education. Most of his work in this area dealt with training teachers to use computers and the right software and hardware for microcomputers to be used in schools. His research also focused on how teachers can be evaluated for computer literacy. Later he conducted research on how the computers can most effectively be introduced in institutions. In 1982, Bitter wrote an important classic series of articles entitled The Road to Computer Literacy that was published in five parts in Electronic Learning. This publication laid the groundwork for a computer literacy curriculum used by many K-12 schools nationally and internationally. Bitter lead a team to develop the Texas Instruments Super Speak & Math as well as providing input to the Texas Instruments Math Explorer Calculator (one of the first fraction calculators). He was the co-chair of the committee that developed the online Migrant Math standards for the United States (1971-1981).
In the 1990s, Bitter's research focus began moving towards long distance teaching and the use of interactive multimedia in education and professional development. He has developed many multimedia programs focused on training teachers including: ASU-NETS Digital Video Library (DVL), Math-ed-ology and Understanding Teaching. Some of his research in the 1990s focused on developing programs to increase technological capabilities of Hispanic women. In 1992, Bitter wrote a paper entitled Technology and minorities: A local program aimed at increasing technological capabilities of Hispanic women. That paper led to a research line to assist the Navajo, Havasupai, Salt River, Gila, and Hopi Indian reservations with mathematics and technology education. He developed the Hispanic Math Project for migrant students as well as The e-Learning Network to train poor or geographically isolated adults, via the Internet, for financially promising careers in computer networking and information technology. He developed the Hispanic Math Project, an interactive English-Spanish Mathematics program for elementary-middle school students.
Later, Bitter's research focused on the use of e-learning and video modules in education. In the mid-2000s, he began studying service-oriented computing and its applications in education. Bitter conducted a three-year study of the program, The Writing Road to Reading in 2006-2010.
In the early 2010s, Bitter's research began moving towards the use of mobile applications for education. He has developed several educational Android and iOS applications for Math Readiness, Algebra, Geometry, Data Analysis and Probability, Number Recognition and Math Coaching. In the 2010s, his research was focused on personalized, adaptive and augmented learning in the teaching and learning of mathematics. In 2014 he designed iOS and Android app Stress-Less TRE for author David Berceli.
Bitter's research and development work has been funded by numerous grants including several multimillion-dollar grants as well as several equipment grants from Cisco, Intel, Apple, IBM, Fund for the Improvement of Postsecondary Education (FIPSE), United States Department of Education and the National Science Foundation (NSF).
Awards and honors
1970-1979 - American Men and Women of Science
1975 - Community Leaders and Noteworthy Americans
1975, 1979, 1981, 1993 - Outstanding Children's Book, National Science Teachers Association
1976 - National Migrant Educator, Migrant Education News
1984 - International Educator, UNICEF
1985 - Outstanding Faculty Member, Arizona State University College of Education
1987 - Distinguished Alumnus, Emporia State University
1989 - Masters of Innovation, Zenith Data Systems
1989 - Outstanding Technology Educator of the Year, International Society for Technology in Education
1990 - Affirmative Action Administrator of the Year, Arizona State University – Educational Media and Computers
1990 - Lifetime Achievement Award, International Society for Technology in Education ISTE
1994 - Distinguished Alumnus Award, Kansas State University
2000 - Outstanding Service Award, Arizona State University – College of Education
2000 - Paul Pair Lifetime Technology Achievement Award, International Society for Technology in Education
2001 - Faculty Achievement Award, Arizona State University
2006 - NCTM Lifetime Achievement Award, National Council of Teachers of Mathematics
2016 - Distinguished Mathematics Alumnus Award, Kansas State University
Books
BASIC for Beginners (1970)
Computer Applications for Calculus (1972)
Exploring with Metrics (1975)
Teachers Handbook of Metric Activities (1977)
Exploring with Solar Energy (1978)
BASIC FIBEL (1980)
Activities Handbook for Teaching with the Hand-Held Calculator (1980)
Activities Handbook for Teaching with the Metric System (1981)
McGraw Hill Mathematics (Elementary Math Series, K-8) (1981)
Exploring with Computers (1981), (1983)
Microcomputer Applications for Calculus (1983)
Computers in Today's World (1984)
Computer Literacy: Awareness, Applications and Programming (1988)
Computacion: Fundamentos, Aplicaciones, Programacion (1988)
Mathematics Methods for Elementary and Middle School: A Comprehensive Approach (1989)
Microcomputers in Education Today (1989)
Understanding and Using Microsoft Works for Windows (1991)
Understanding and Using Microsoft Works on the Macintosh (1991)
Understanding and Using Microsoft Works on the IBM PC (1991)
West Computer Literacy System (1993)
Understanding and Using Claris Works (1993)
Quickstart ClarisWorks (1996)
Using the Explorer Plus Calculator (1998)
Working with Computers (1998)
National Educational Technology Standards for Students (1998)
Math•ed•ology (online) (1999)
National Educational Technology Standards: Connecting Curriculum and Technology (2000)
Mathematics Methods for Elementary and Middle School Teachers, 4th Ed. (2002)
Hispanic Mathematics (online) (2003)
Mathematics Methods for Elementary and Middle School Teachers, 7th Ed. (2002), (2004), (2005), (2008)
Understanding Teaching (online) (2004)
Using Technology in the Classroom, 6th Ed. (2002), (2005)
Using Technology in the Classroom Brief Edition. (2006)
Using Technology in the Classroom, 7th Ed. (2008)
Chinese Simplified Translation of Using Technology in the Classroom, 7th Ed. (2012)
ASU-NETS Digital Video Library (DVL) (2012)
References
Living people
Kansas State University alumni
Emporia State University alumni
University of Denver alumni
Arizona State University faculty
Year of birth missing (living people) |
5270829 | https://en.wikipedia.org/wiki/Password%20management | Password management | There are several forms of software used to help users or organizations better manage passwords:
Intended for use by a single user:
Password manager software is used by individuals to organize and encrypt many personal passwords using a single login. This often involves the use of an encryption key as well. Password managers are also referred to as password wallets.
Intended for use by a multiple users/groups of users:
Password synchronization software is used by organizations to arrange for different passwords, on different systems, to have the same value when they belong to the same person.
Self-service password reset software enables users who forgot their password or triggered an intruder lockout to authenticate using another mechanism and resolve their own problem, without calling an IT help desk.
Enterprise Single signon software monitors applications launched by a user and automatically populates login IDs and passwords.
Web single signon software intercepts user access to web applications and either inserts authentication information into the HTTP(S) stream or redirects the user to a separate page, where the user is authenticated and directed back to the original URL.
Privileged password management (used to secure access to shared, privileged accounts).
Privileged password management
Privileged password management is a type of password management used to secure the passwords for login IDs that have elevated security privileges. This is most often done by periodically changing every such password to a new, random value. Since users and automated software processes need these passwords to function, privileged password management systems must also store these passwords and provide various mechanisms to disclose these passwords in a secure and appropriate manner. Privileged password management is related to privileged identity management.
Examples of privileged passwords
There are three main types of privileged passwords. They are used to authenticate:
Local administrator accounts
On Unix and Linux systems, the root user is a privileged login account. On Windows, the equivalent is Administrator. On SQL databases, the equivalent is sa. In general, most operating systems, databases, applications and network devices include an administrative login, used to install software, configure the system, manage users, apply patches, etc. On some systems, different privileged functions are assigned to different users, which means that there are more privileged login accounts, but each of them is less powerful.
Service accounts
On the Windows operating system, service programs execute in the context of either system (very privileged but has no password) or of a user account. When services run as a non-system user, the service control manager must provide a login ID and password to run the service program so service accounts have passwords. On Unix and Linux systems, init and inetd can launch service programs as non-privileged users without knowing their passwords so services do not normally have passwords.
Connections by one application to another
Often, one application needs to be able to connect to another, to access a service. A common example of this pattern is when a web application must log into a database to retrieve some information. These inter-application connections normally require a login ID and password and this password.
Securing privileged passwords
A privileged password management system secures privileged passwords by:
Periodically changing each password to a new random value.
Storing these values.
Protecting the stored values (e.g., using encryption and replicated storage).
Providing mechanisms to disclose these passwords to various types of participants in the system:
IT administrators.
Programs that launch services (e.g., service control manager on Windows).
Applications that must connect to other applications.
Required infrastructure
A privileged password management system requires extensive infrastructure:
A mechanism to schedule password changes.
Connectors to various kinds of systems.
Mechanism to update various participants with new password values.
Extensive auditing.
Encrypted storage.
Authentication for parties that wish to retrieve password values.
Access controls and authorization to decide whether password disclosure is appropriate.
Replicated storage to ensure that hardware failure or a site disaster does not lead to loss of data.
See also
Password manager
List of password managers
Password fatigue
Security token
Smart card
Password authentication
Identity management |
19777897 | https://en.wikipedia.org/wiki/Nonviolent%20video%20game | Nonviolent video game | Nonviolent video games are video games characterized by little or no violence. As the term is vague, game designers, developers, and marketers that describe themselves as non-violent video game makers, as well as certain reviewers and members of the non-violent gaming community, often employ it to describe games with comparatively little or no violence. The definition has been applied flexibly to games in such purposive genres as the Christian video game. However, a number of games at the fringe of the "non-violence" label can only be viewed as objectively violent.
The purposes behind the development of the nonviolent genre are primarily reactionary in nature. As video quality and level of gaming technology have increased, the violent nature of some video games has gained worldwide attention from moral, political, gender, and medical/psychological quarters. The popularity of violent video games and increases in youth violence have led to much research into the degree to which video games may be blamed for societally negative behaviors. Despite the inconclusive nature of the scientific results, a number of groups have rejected violent video games as offensive and have promoted the development of non-violent alternatives. The existence of a market for such games has in turn led to the manufacture and distribution of a number of games specifically designed for the nonviolent gaming community. Video game reviewers have additionally identified a number of games belonging to traditionally violent gameplay genres as "nonviolent" in comparison to a typical game from the violent genre. Despite the fact that some of these games contain mild violence, many of them have entered the argot of nonviolent gamers as characteristic non-violent games.
Video game violence and attendant controversies
Controversies surrounding the negative influences of video games are nearly as old as the medium itself. In 1964, Marshall McLuhan, a noted media theorist, suggested in his book, Understanding Media: The Extensions of Man, that "[t]he games people play reveal a great deal about them. " This was built upon in the early 1980s in an anti-video-game crusade spearheaded by the former Long Island PTA president, Ronnie Lamm, who spoke about her cause on the MacNeil/Lehrer NewsHour in December 1982. The same year, Surgeon General, C. Everett Koop, had suggested that games had no merit and offered little in the way of anything constructive to young people. Despite early general claims of the negative effects of video games, however, effects of these concerns were relatively minor prior to the early 1990s.
Discussion of the impact of violence in video games came as early as 1976's Death Race arcade game (a game with black and white graphics which involved running over screaming zombies). In the 1980s titles such as Exidy's Chiller (1986), Namco's Splatterhouse (1987) and Midway's NARC (1988) raised concerns about video game violence in the arcade. Home games such as Palace's Barbarian (1987) featured the ability to decapitate opponents. It was not until graphic capabilities increased and a wave of new ultra-violent titles were released in the early 1990s that the mainstream news began to pay significant attention to the phenomenon. In 1992, with Midway's release of the first Mortal Kombat video game, and then in 1993 with id's Doom, genuine controversy was first ignited as the wide and growing popularity of violent video games came into direct conflict with the moral and religious ethics of concerned citizens. Protests and game-bannings followed the publicizing of these conflicts, and controversies would erupt periodically throughout the 1990s with the releases of such games as Dreamweb (1992), Wolfenstein 3D (1992), Mortal Kombat II (1993), Phantasmagoria (1995), Duke Nukem 3D (1996), Blood (1997), Grand Theft Auto (1997), Carmageddon (1997), Postal (1997), Mortal Kombat 3 (1997), Carmageddon II: Carpocalypse Now (1998), Blood II: The Chosen (1998), Grand Theft Auto 2 (1999), and Requiem: Avenging Angel (1999) among others.
In April 1999, the fears of the media and violence-watch groups were legitimated in their eyes as investigations into the lives of Eric Harris and Dylan Klebold, the shooters in the Columbine High School massacre, revealed that they had been fans of the video game, Doom, and had even created levels for it today dubbed "the Harris levels". A great deal of discussion of violence in video games followed this event with strong arguments made on both sides, and research into the phenomenon which had begun during the 1980s received renewed support and interest.
In December 2001, Surgeon General David Satcher, led a study on violence in youth and determined that while the impact of video games on violent behavior has yet to be determined, "findings suggest that media violence has a relatively small impact on violence," and that "meta-analysis [had demonstrated that] the overall effect size for both randomized and correlational studies was small for physical aggression and moderate for aggressive thinking."
Despite this, the controversies and debate have persisted, and this has been the catalyst for the emergence of the non-violent video game genre. Non-violent video games are defined in the negative by a Modus tollendo ponens disjunctive argument. In other words, in order to recognize a non-violent game, an identifier must recognize the violent game as a distinct class. This has led to a degree of ambiguity in the term as it relies upon a definition of violence which for different identifiers may mean different things. In general, violence may be placed into at least three distinct categories:
Totally non-violent games – Games in which absolutely no violence occurs. This category contains games characterized by lack of the death of characters, lack of sudden noise or movement, and often lack of traditional conflict. (e.g., Below the Root or Sudoku Gridmaster)
Games in which the player acts non-violently – Games where violence occurs to the character-player as a result of environmental hazards or enemies but the character-player's reaction is to run away or otherwise distance himself from the violence.
Games with environmental hazards only – Games lacking enemies, but containing a potentially violent environment (E.g. Alleyway, or Roller Coaster)
Games with enemies – Games with violent enemies which the player-character must avoid (E.g. the Eggerland series)
Games in which the player acts non-violently to other sentient beings – Games where a player acts violently against robots or other non-living non-sentient enemies (E.g. Descent)
Education
The majority of these games have not been scientifically tested to see whether children learn the skills the games claim to teach.In another study performed in Chile, educational video games were put into some first and second grade classrooms. Children who had the games in their classroom showed more progress in math, reading comprehension, and spelling than the children who did not use games in their classrooms.
Research
The history of video game development shares approximate contemporaneity with media violence research in general. In the early 1960, studies were conducted on the effects of violence in cartoons, and throughout the 1970s and 1980s a number of studies were conducted on how televised violence influenced viewers (especially younger viewers). The focus of many of these studies was on the effects of exposure of children to violence, and these studies frequently employed the social learning theory framework developed by Albert Bandura to explore violent behavioral modeling.
With advancements in video technology and the rise of video games containing graphic violence in the late 1980s and early 1990s, media violence research shifted to a great degree from televised violence to video game violence. Although under current debate, a number of researchers have claimed that violent games may cause more intense feelings of aggression than nonviolent games, and may trigger feelings of anger and hostility. Theoretical explanations for these types of effects have been explained in myriad theories including social cognitive theory, excitation transfer theory, priming effect and the General Aggression Model. However recent scholarship has suggested that social cognitive theories of aggression are outdated and should be retired.
One difference between video games and television which nearly all media violence studies recognize is that video games are primarily interactive while television is primarily passive in nature. Video game players identify with the character they control in the video games and there have been suggestions that the interactivity available in violent video games narrows the gap between the theory and practice of youth violence in a manner that goes beyond the effects of televised violence. Acknowledgment of the fact that, for better or worse, video games are likely to remain a part of modern society has led to a brace of comparative studies between violent games and non-violent games. As technology has advanced, such studies have adapted to include the effects of violent games and non-violent games in new media methods such as immersive virtual reality simulations.
Results have varied, with some research indicating correlation between violence in video games and violence in players of the games, and other research indicating minimal if any relationship. Despite the lack of solid conclusion on the issue, the suggestion that violent games cause youth violence together with the clear popularity of violent video game genres such as the first-person shooter have led some game designers to publish non-violent alternatives.
Lawsuits and legislation
As research supporting the view that video game violence leads to youth violence has been produced, there have been a number of lawsuits initiated by victims to gain compensation for loss alleged to have been caused by video-game-related violence. Similarly, in the US Congress and the legislatures of states and other countries, a number of legislative actions have been taken to mandate rating systems and to curb the distribution of violent video games. At times, individual games considered too violent have been censored or banned in such countries as Australia, Greece, etc.
In 1997, Christian conservative activist and (now former) attorney Jack Thompson brought suit against Atari, Nintendo, Sega, and Sony Computer Entertainment on behalf of the victims of Heath High School shooting in James v. Meow Media. The suit was dismissed in 2000, absolving the companies of responsibility for the shooter's actions based on a lack of remedy under Kentucky tort law. In 2002, the Sixth Circuit Court of Appeals upheld the dismissal, and in 2003, the U.S. Supreme Court denied certiorari, refusing to review the case because it was not dismissed on 1st Amendment grounds.
In 2000, the County Council for St. Louis, Missouri enacted Ordinance 20,193 that barred minors from purchasing, renting, or playing violent video games deemed to contain any visual depiction or representation of realistic injury to a human or a "human-like being" that appealed to minors' "morbid interest in violence." This ordinance was challenged in 2001 by the Interactive Digital Software Association (IDSA) as violative of freedom of expression as guaranteed by the first amendment. The IDSA cited the 7th Circuit case of American Amusement Machine Association v. Kendrick as precedent suggesting that video game content was a form of freedom of expression, however in 2002 the Eastern District Court of Missouri ultimately issued the controversial ruling that "video games are not a form of expression protected by the First Amendment" in Interactive Digital Software Association v. St. Louis County.
In the aftermath of the Columbine High School massacre, a $5 billion lawsuit was filed in 2001 against a number of video game companies and id Software, the makers of the purportedly violent video game, Doom by victims of the tragedy. Also named in the suit were Acclaim Entertainment, Activision, Capcom, Eidos Interactive, GT Interactive Software, Interplay Entertainment, Nintendo, Sony Computer Entertainment, Square Co., Midway Games, Apogee Software, Atari Corporation, Meow Media, and Sega. Violent video games mentioned by name included Doom, Quake, Redneck Rampage, and Duke Nukem. The suit was dismissed by Judge Babcock in March 2002 in a ruling suggesting that a decision against the game makers would have a chilling effect on free speech. Babcock noted that "it is manifest that there is social utility in expressive and imaginative forms of entertainment, even if they contain violence."
In 2003, Washington State enacted a statute banning the sale or rental to minors of video games containing "aggressive conflict in which the player kill, injures, or otherwise causes physical harm to a human form in the game who is depicted by dress or other recognizable symbols as a public law enforcement officer." In 2004, this statute was subsequently declared an unconstitutional violation of the first amendment right to free speech in the Federal District Court case of Video Software Dealers Ass'n v. Maleng.
In 2005, Jack Thompson brought suit against Sony Computer Entertainment and Grand Theft Auto in representation of the victims of the Devin Moore shooting incident. On 7 November 2005, Thompson withdrew from Strickland v. Sony, stating, "It was my idea [to leave the case]." He was quick to mention that the case would probably do well with or without his presence. This decision followed scrutiny from Judge James Moore, however Thompson claimed he received no pressure to withdraw. At the same time, Judge James Moore had taken the motion to revoke Thompson's license under advisement. Jack Thompson appeared in court to defend his pro hac vice right to practice law in Alabama, following accusations that he violated legal ethics. Shortly thereafter, the case was dismissed and Thompson's license was revoked following a denial of his pro hac vice standing by Judge Moore who noted that "Mr. Thompson's actions before this Court suggest that he is unable to conduct himself in a manner befitting practice in this state." In March 2006, the Alabama Supreme Court upheld Judge Moore's ruling against the dismissal of the case.
In 2005, California State Senator, Leland Yee introduced California Assembly Bills 1792 & 1793 which barred ultra-violent video games and mandated the application of ESRB ratings for video games. Yee, a former child psychologist has publicly criticized such games as Grand Theft Auto: San Andreas and Manhunt 2, and opposes the U.S. Army's Global Gaming League. Both of these bills were passed by the assembly and signed by Gov. Arnold Schwarzenegger in October 2005. By December 2005, both bills had been struck down in court by Judge Ronald Whyte as unconstitutional, thereby preventing either from going into effect on 1 January 2006. Similar bills were subsequently filed in such states as Michigan and Illinois, but to date all have been ruled to be unconstitutional.
In 2005, in reaction to such controversial games as Grand Theft Auto: San Andreas, Senator Hillary Clinton along with Senators Joe Lieberman and Evan Bayh, introduced the Family Entertainment Protection Act (S.2126), intended to protect children from inappropriate content found in video games by imposing a federal mandate for inclusion of ESRB ratings. All three senators have actively sought restrictions on video game content with Sen. Lieberman denouncing the violence contained in video games and attempting to regulate sales of violent video games to minors, arguing that games should have to be labeled based upon age-appropriateness. Regarding Grand Theft Auto, Lieberman has stated, "The player is rewarded for attacking a woman, pushing her to the ground, kicking her repeatedly and then ultimately killing her, shooting her over and over again. I call on the entertainment companies—they've got a right to do that, but they have a responsibility not to do it if we want to raise the next generation of our sons to treat women with respect."
In June 2006, the Louisiana case of Entertainment Software Association v. Foti struck down a state statute that sought to bar minors from purchasing video games with violent content. The statute was declared an unconstitutional violation of the 1st Amendment. Amici filing briefs included Jack Thompson.
On 27 September 2006, Senator Sam Brownback (R-KS) introduced the United States Truth in Video Game Rating Act (S.3935). The act would require the ESRB to have access to the full content of and hands-on time with the games it was to rate, rather than simply relying on the video demonstrations submitted by developers and publishers. Two days later, Congressman Fred Upton introduced the Video Game Decency Act (H.R.6120) to the House.
Degrees of violence
Video game rating boards exist in a number of countries, typically placing restrictions (suggested or under force of law) for content that is violent or sexual in nature. About 5% of games fall into a category rated "mature" and recommended to those 17 years old and older. Those games account for about a quarter of all video game sales. Gamers seeking violence find themselves increasingly age restricted as identified violence level increases. This means that non-violent games, which are the least restricted, are available to all players at any age. This moral or legislative public policy against violence has the indirect effect of encouraging players of all ages and especially younger players to play non-violent games, however it also produces something of a forbidden fruit effect. For this and other reasons, the effectiveness of rating systems such as the ESRB to actually curb violent gameplay in youth gaming has been characterized as futile.
Table of violence ratings
Gender perspective
A number of studies have been conducted specifically analyzing the differences between male and female preference in video game styles. Studies have vacillated between findings that the gender effect on violence preference in games is significant and insignificant,<ref name=nash>Nash, Nora M. OSF. VVG's – Violent Video Games – Are Your Students Tuned In To A VVG World? . 2004.</ref> however no firm conclusions have been achieved to date. The number of studies in this field has blossomed contemporaneously with greater gender studies, and a degree of tension exists in the field between the traditional stereotype of violence as a male-dominant characteristic and the realities of the marketing data for violent games.
In 2008, an example of such studies was funded by the Office of Juvenile Justice and Delinquency Prevention, U.S. Department of Justice to the Center for Mental Health and Media. These studies were released in the book, Grand Theft Childhood, wherein it was found that among girls, nine of the "top ten [most popular video games] were nonviolent games such as Mario titles, Dance Dance Revolution or simulation games" compared to a majority of violent games in the top ten favorites of boys. Ultimately, the conclusion reached in Grand Theft Childhood was that "focusing on such easy but minor targets as violent video games causes parents, social activists and public-policy makers to ignore the much more powerful and significant causes of youth violence that have already been well established, including a range of [non-gender-linked] social, behavioral, economic, biological and mental-health factors." This conclusion supports Surgeon General Satcher's 2001 study (supra).
Despite this conclusion, general awareness of the issue together with traditional stereotyping has led a number of game developers and designers to create non-violent video games specifically for female audiences. Advertisement placement and other marketing techniques have in the past targeted women as more receptive to non-violent video game genres such as life simulation games, strategy games, or puzzle video games. Although these genres often contain certain degrees of violence, they lack the emphasis on graphic violence characterized for instance by the first-person shooter genre.
Religious perspective
Criticism for the violent aspects of video game culture has come from a number of anti-violence groups, and perhaps the most vocal of these are the numerous religious opposition groups. The moral codes of nearly all major religions contain prohibitions against murder and violence in general. In some cases this prohibition even extends to aggression, wrath, and anger. Violent video games, while merely vicarious in nature, have been the focus of religious disapproval or outrage in various circles. Notable anti-violent-video-game crusader, former attorney Jack Thompson is a self proclaimed Christian conservative, and his legal actions against violent video games have been intimately linked to his religious views. As groups like the fundamentalist Christian population have increased in number of adherents, new marketing opportunities have developed contemporaneously. Several religion-centric games forums such as GameSpot's "Religion and Philosophy" forum have developed within the greater gaming community in reaction to this growing niche.
Christian games
There has been a rapid increase in Christian video games since the 2000s, however as Christian games have striven to compete with their more popular secular progenitors, there has been an increasing number of games released that blur the lines between Christian and non-Christian values. Jack Thompson, for instance, has publicly decried such Christian games as Left Behind: Eternal Forces, stating "It's absurd, ... you can be the Christians blowing away the infidels, and if that doesn't hit your hot button, you can be the Antichrist blowing away all the Christians." (The game reviewers IGN, Ars Technica and GameSpy have disagreed that "Left Behind: Eternal Forces" is overtly violent.Ars Technica: Left Behind: Eternal Forces) Similarly, James Dobson, PhD., founder of the Focus on the Family group, has advised parents in relation to video games to "avoid the violent ones altogether.
Although Christian games have been around since Sparrow Records' Music Machine for the Atari 2600, there have been few genres as unassailably violent as that of the first-person shooter (FPS). The majority of games that have been banned for violence have been FPS games, and for this reason, Christian games in the FPS genre have struggled to overcome the blurring effects of the violence inherent to the genre. Games such as Revelation 7 and Xibalba, for instance, have attempted to avoid claims of violence by using "off the wall" absurdist humor with enemies such as flying, bat-winged clown heads (modeled after the biblical Jezebel) that shoot rays out of their nose, or alien Nazis (a mocking reference to Raëlian religious beliefs) Other Christian FPS games such as Eternal War have avoided the issue by expressing the view that justified violence is morally acceptable.
Some of these games, despite containing objectively violent content, have been affirmatively labeled "non-violent video games" by marketers and faith-based non-violent gaming communities. In direct response to the Columbine High School massacre (alleged to have been caused by the shooters' obsession with the game, Doom), Rev. Ralph Bagley began production on Catechumen, a Christian first-person game produced by N'Lightening Software involving holy swords instead of guns. In Catechumen, the player fights inhuman demons using holy armament. When "sent back" the demons produce no blood or gore, and for this reason it has been described as a non-violent game. The intent of Catechumen, according to Rev. Bagley, is "to build the genre of Christian gaming. People are tired of having these violent, demonic games dictating to their kids." Among Christian FPS games, a lack of gore has often been used as the minimum standard for non-violence. Christian game reviewers have at times characterized non-Christian games such as Portal and Narbacular Drop as comparatively non-violent games despite their lack of a Christian focus.
An example of a notable Christian video game organization is the Christian Game Developers Foundation, focusing on family-friendly gameplay and Biblical principles. Another well known Christian video game creator and distributor is Wisdom Tree which is best known for its unlicensed Christian video games on the Nintendo Entertainment System.
Hindu games
In 2006, Escapist magazine reported that a Hindu first-person shooter entitled My Hindu Shooter was in the works. In My Hindu Shooter, a game based on the Unreal Engine, the player employs the Vedic abilities of astrology, Ayurvedic healing, breathing (meditation), herbalism, Gandharva Veda music, architecture (which let you purify demonic areas) and yagyas (rituals). Gameplay involved acquisition of the siddhis of clairvoyance, levitation, invisibility, shrinking and strength, and the ultimate goal of the game was to achieve pure consciousness by removing karma through completion of quests and cleansing the six chakras in ascending order.My Hindu Shooter Gaygamer.com review. 15 October 2006. The only way to actually win the game is to complete it without harming or killing any other living creature. Despite the violence-free requirements of the main character, however, a player could die and be reincarnated in a number of different forms like a human, a pig, a dog, or a worm.Varney, Allen My Escapist Articles . The Great Games Experiment. 19 August 2008. Whatever form you came back as would limit the way in which you could interact with other characters in the game. Like the majority of games that have been labeled non-violent, violence in the game that is applied to the character rather than that the character applies is not considered to make the game a violent game.
Buddhist games
According to Buddhist morality, the first of the Five Precepts of Śīla is a personal rule of not killing. This moral guideline extends to human as well as non-human life.
There are five conditions to violate the first precept:
The being must be alive.
There must be the knowledge that it is a sentient living being.
There must be an intention to cause death.
An act must be done to cause death.
There must be death, as the result of the said act.
As the first precept requires an actual living being to be killed to be considered as violated, Buddhists can still enjoy video games with violence because there is no real being that is dying or being hurt. The fuller extent of the first precept is to maintain a harmless attitude towards all. The main problem is the mind, which is the main focus of Buddhism. Violent video games tend to create ill-will and tension, thus it is not conducive for meditation practice. Other than that, the action of the mind also creates kamma (action) which will bear its fruit when the conditions are right.
Although primarily browser games, a number of stand-alone video games eschewing violence, such as the 2007 Thai game Ethics Game have been created that promote the Five Precepts and Buddhism generally. The Buddhist concept of dharma has been emphasized in a number of Buddhist games as a reaction to perceptions of the adharmic state of modern games. The concept of zen has also influenced a number of nonviolent video games such as Zen of Sudoku, and The Game Factory's Zenses series.
Jewish games
While the earliest games to feature a Jewish main character (the Wolfenstein series' William "B.J." Blazkowicz) are characterized by militant anti-Nazism, a number of non-violent Jewish games (such as the Avner series by Torah Educational Software (TES)) primarily aimed at younger audiences has emerged with the intention of promoting Jewish religious concepts related to the Torah. One notable non-violent game that explores Jewish themes is The Shivah, a puzzle-adventure game featuring a non-violent battle between Rabbis that takes the form of an insult swordfight.
Muslim games
Despite notoriety in the Western press for controversial violent games such as Under Ash, and Under Siege, Muslim developer Afkar Media has also produced at least one non-violent game entitled Road Block Buster. In Road Block Buster the hero must "jump[] around [] doing tricks to soldiers ... [attempt] to get over any barrier or road block implanted by Israeli Defense forces without using violence, [and] earn respect by helping surrounded people whom can't get through the separation walls."
Sikh games
Exceptionally rare, the few Sikh games (e.g. Sikh Game) in existence are primarily browser-based. Sarbloh Warriors was developed by Taranjit Singh as a game revolving around Sikh. It was planned for it to contain mild violence. In 2006, Singh complained that the game was unfairly stereotyped and that BBC misrepresented the game as "anti-muslim". The game was never released.
Bahá'í games
In January 2007, artist Chris Nelson produced a non-violent art game called The Seven Valleys which he exhibited during the ACSW conference at the University of Ballarat. Based on the Unreal Tournament engine, The Seven Valleys was designed with the intention of "illustrat[ing] the unillustratable, and 'subvert[ing]' the image of violent video games in the process." Nelson was interviewed by ABC Radio on the subject in February of the same month.
Taoist games
Video game publisher, Destineer's non-violent puzzle video game, WordJong for the Nintendo DS has been considered a Taoist puzzle game.
Religion neutral games
Non-profit organization Heartseed set out to produce several non-violent games, drawing inspiration from a claimed agreement between several religions under the sign of nonviolence: "Christianity, Hinduism, Islam, Buddhism, Taoism, Judaism and others, – because throughout all of them can be found a common thread of decency meant to propel us toward spiritual enlightenment". This project seems to have been discontinued.
Types of non-violent video games
Non-violent video games as a genre are characterized as a genre by purpose. Unlike genres described by style of gameplay, non-violent video games span a wide number of gameplay genres. Defined in the negative, the purpose of non-violent games is to provide the player with an experience that lacks violence. Many traditional gameplay genres naturally lack violence and application of the term "non-violent video games" to titles that fall under these categories raises no questions regarding accuracy. For game developers and designers who self-identify as non-violent video game makers, however, the challenge has been to expand the concepts of non-violence into such traditionally violent gameplay genres as action games, role-playing games, strategy games, and the first-person shooter.
Emergent and more recent gameplay genres such as music video games are for the most part naturally non-violent. Purposive video game genres such as educational games also are primarily non-violent in nature. Other electronic game genres like audio games are also most frequently non-violent. The indisputably non-violent nature of these games are often considered self-evident by members of both the non-violent gaming community and the gaming community at large. As such they are often not explicitly identified as such. Typically, explicit identification is applied counterintuitively to titles where there might otherwise be a question concerning non-violence. This has led such categorization to be viewed with mistrust, hostility, and mockery by those who fail to recognize the comparative nature of the definition or who disagree fundamentally with the underlying purpose of the genre.
Traditionally non-violent games
Among traditionally non-violent games are included maze games, adventure games, life simulation games, construction and management simulation games, visual novels, and some vehicle simulation games, among others. These games are generally less frequently described as non-violent due to the self-evident nature of the descriptive term. Prior to the development of games specifically designed for non-violence, non-violent gamers were limited to these traditionally non-violent genres, however a number of games even under the traditionally non-violent umbrella may be considered arguably violent. Minesweeper, for instance, is an abstraction of a scenario that often leads to a patently violent result.
Other common traditionally non-violent genres include adventure games, puzzle games, music video games, programming games, party games, visual novels, and traditional games.
Examples of traditionally non-violent games include:Sudoku Gridmaster – A totally non-violent game wherein the player must assign the mathematically appropriate number to the corresponding blank in a grid.Roller Coaster – A game featuring a non-violent main-character wherein the player must navigate a dangerous amusement park to collect pieces of money.Alleyway – A game with only environmental hazards featuring a non-violent main-character wherein the player must break blocks (mild violence) with a ball while avoiding the floor of the level.
The Eggerland series – A series with enemies featuring a non-violent main-character wherein the player must solve block-sliding puzzles in order to secure a key and unlock the door to the next room.Robots – A game lacking violence to sentient beings wherein a player must either bomb malfunctioning robots or conserve bombs by stepping strategically in order to induce the robots to crash into one another.
Non-violent action games
Action games have typically been among the most violent of video games genres with the liberal employment of enemies to thwart the actions of the player-character, and an emphasis on killing these enemies to neutralize them. As action games have developed they have become progressively more violent over the years as advances in graphic capabilities allowed for more realistic enemies and death sequences. Nevertheless, some companies like Nintendo have tended to shy away from this kind of realism in favor of cartoon and fantasy violence, a concept also implicated in the increase of youth violence by media violence researchers. This has created a spectrum of violence in action games. Non-violent video game proponents have labeled a number of games containing comparatively low-level violence as non-violent as well as games such as the anti-violent serious game, Food Force.
Studies have also shown that there are tangible benefits to violence in action games such as increased ability to process visual information quickly and accurately. This has led to support for the development of action games that are non-violent which will allow players to retain the positive visual processing benefits without the negatives associated with violence.
Examples of non-violent action games include:Journey – Multi-awarded Game of the Year,IGN Game of the Year 2012.Game Developers Choice Awards, 2012 Game of the Year. 27 March 2013. Journey is a game where you as a non-violent player meet and travel with a second anonymous player on a journey to a mountaintop.Seiklus – A totally non-violent game wherein the player traverses a natural landscape as a small person in order to get to the end.Sunday Funday – A game featuring a non-violent main-character wherein the player avoids bullies, clowns, and businessmen in order to skateboard to Sunday school.Knytt – A game with only environmental hazards featuring a non-violent main-character wherein the player must guide a small creature through a series of caverns and mountains containing pitfalls and hazards in order to get to the end.Marble Madness – A game with enemies featuring a non-violentSubrahmanyam & Greenfield. 1994. main-character wherein the player must navigate his way through a marble maze while enemy marbles and other enemies attempt to knock him off or otherwise destroy him.Barbie – A game lacking violence to sentient beings wherein Barbie must rescue Ken by defeating a host of shopping-mall-related machines gone haywire.Barney's Hide and Seek – A game lacking violence to any living creature; the player must find children and missing objects. The game is also educational and teaches young children about safety lessons.Crash Dummy Vs The Evil D-TroitCrash Dummy vs. the evil D-Troit. StrategyInformer. 11 October 2006.Treasure Quest – a puzzle/action gameKnytt StoriesSteer Madness – a vegetarian-themed game endorsed by PETA
Non-violent first person shooters
The application of the term "non-violent" to genres such as the first-person shooter (FPS), that many players consider inherently or definitionally violent, has at times generated vociferous arguments that the concept is inconceivable and at best oxymoronic. This argument typically derives from a strict definition of violence as "extreme, destructive, or uncontrollable force especially of natural events; intensity of feeling or expression, " a definition by which the vast majority of video games may be described as violent. Despite arguments to the contrary, however, such characterizations have been employed as a marketing tool by makers and distributors of non-violent video games, and the degree of popularity enjoyed by games so described may be attributed to the comparative violence of other more violent members of the supergenre.
Non-violent first-person shooter developers have expressed the notion that it is the challenge of making a non-violent game in a violent genre that motivates them in part. Rarely, FPS games such as Garry's Mod and Portal that have been developed without the specific intent of non-violence have been identified by reviewers and the non-violent gaming community as non-violent FPSes.Thorisson, Hrafn, Th. Puzzling with Portals. ThinkArtificial.org. 10 October 2007.Fletcher, Andrew. Portal – Review. 25 October 2007.Carless, Simon. GameSetPlaying: What Games Are Grabbing Your Attention? 28 October 2007.Silfer, Kyle. Emerge Remerge Demerge. Feature Archive. V.17 No.21. 22–28 May 2008. Such characterizations have led to the concern that parents may allow their children to play these games, not realizing that there are still some elements of violence including violent deaths. Further ambiguities arise when determining whether a game is a first-person shooter, as in certain games such as Narbacular Drop, the player doesn't shoot anything at all, but merely clicks walls with the cursor. Similarly, in games such as realMyst, the player merely interacts with the environment by touching things in the first-person and the term "shooter" is seen to be objectively inaccurate. Despite this, non-violent first-person games have often been characterized oxymoronically as shooters because of all comparable genres, these games are most closely similar to the FPS and often employ engines designed for the FPS genre.
Often modeled upon violent FPS games, non-violent FPSes such as Chex Quest or the newer Sherlock Holmes games, may bear striking resemblance to the violent game whose engine they are using. Developers of such games often have done little to change the game other than replacing violent or scary imagery and recasting the storyline to describe "zorching", "slobbing", or otherwise non-lethally incapacitating enemies. Examples of simple changes intended to reduce violence for non-violent FPSes include the alteration of the red shroud from the death-sequence in Doom to become the green shroud from the slime-sequence in Chex Quest or the removal of the red shroud from the death-sequence in Half-Life 2 for the deaths in Portal. At times, similarities between violent progenitors and their non-violent descendants have proved strong enough that the non-violent developers have cast their game as a spoof of the violent version. This is apparent in Chex Quest. Off-beat and absurdist humor have been employed in a number of games order to tone down the serious content by makers of non-violent FPSes.
One subgenre of the FPS that typically is not characterized as non-violent despite the fact that gameplay revolves to a great degree around avoidance of battle, is that of stealth games. Although much of the gameplay characteristic to stealth games accords closely with the requirements of the non-violent genre, stealth games most frequently simply delay chaotic violence to focus instead upon controlled precision violence. When stealth and violence are both present as options, stealth is often presented as the superior option for being morally superior or requiring greater skill.
Examples of non-violent FPSes include:H.U.R.L. – A game featuring a non-violent main-character wherein the player must navigate a playing-field avoiding enemies as they attempt to "slob" him with trash.Narbacular Drop – A game with only environmental hazards featuring a non-violent main-character wherein the player must navigate her way out of a dungeon filled with hazards.Chex Quest – A game with enemies featuring a non-violent main-character wherein the player must rescue his fellow cereal-pieces by "zorching" hordes of flemoids back to their home planet with various zorch guns. Instead of the player's face bleeding, the Chex piece becomes progressively more covered in slime.Descent – A game lacking violence to sentient beings wherein the player, in a ship, rescues human miners trapped in mines guarded by malfunctioning mining robots. The player has to navigate maze-like mines in order to save the hostages and shutdown the malfunctioning mine.Postal 2 – Though Postal 2 is renowned for its impressive levels of graphic violence, gore and irreverent humour, it is possible to complete the game without harming a single person. For players who choose such a route, the game will praise them as "Jesus" at the end of the final screen.Plants vs. Zombies: Garden Warfare – A recent FPS, rated E10+ by the ESRB, where instead of "kill" there is "vanquish".
Chex Quest 2 – The sequel of the original Chex Quest, featuring the same premise of non-violent action.
ElebitsSchommer, D. Elebits – Is It For You? 24 December 2006. – A Wii-based first-person hide-and-seek game
Extreme Paintbrawl A non-lethal paintball FPS
Foreign GroundForeign Ground . Nordic Serious Games. 3 December 2003. – A military game made by the Swedish Defence University, created only for corporate training environments.
Greg Hastings Tournament Paintball – A non-lethal paintball FPS
Greg Hastings Tournament Paintball MAX'DCunningham, James. Weekly Report, 8/24. 24 October 2005. – A non-lethal paintball FPS
Ken's LabyrinthNintendo to pioneer new game genre. Gameblitz.com. 8 November 2000. – a non-violent Wolfenstein clone
Laser ArenaLaser Arena Demo VGPro.com summary. 2008. – non-violent arena-style laser tag FPS
Nerf Arena Blast – A non-lethal Nerf FPS
NRA Gun ClubGun Club (PS2). GameSpy review. 2008.NRA Gun Club [PS2] . Yahoo! Games review. 6 September 2006. – A first-person target-shooting game
Super 3D Noah's Ark – A non-violent Christian video game
Nanashi no Game – non-violent survival horror first-person game from Japan
Non-violent role-playing games
Though infrequently regarded as explicitly violent, role-playing video games (RPGs) have traditionally focused on the adventures of a party of travelers as they spend days and months leveling-up to fight greater and greater foes. Fighting in these games is highly stylized and often turn-based, however the actions of the player-characters and the enemies that attack them are distinctly violent. There have been some attempts made to reduce this violence by rendering it in cartoonish format as in some members of the Final Fantasy series or by recasting the enemies' deaths as "fainting," "sleeping," or becoming "stunned" as in the Pokémon series, however neither of these series has been explicitly labeled non-violent.
One rare example of an RPG that was designed as a non-violent video game is Spiritual Warfare, a game with enemies featuring a non-violent main-character wherein the player wanders about converting the denizens of his town to Christianity while fending off the attacks of wild animals with holy food. Another example is A Tale in the Desert, an MMORPG based on economic development.
Secular examples include Capcom's Ace Attorney seriesSavino, Candace. DS Fanboy Review: Apollo Justice: Ace Attorney. 28 February 2008. and Victor's Story of Seasons series – a simulation/RPG game. Additionally, such RPGs as Ultima IV: Quest of the Avatar, Planescape: Torment, and Deus Ex have all been identified as containing certain modes of play that are mostly non-violent. This concept is also explored in the higher difficulty levels of the Thief series.
In 2015 the fan-funded indie RPG Undertale allowed players to choose whether or not to use violent methods, in a story that includes both explicit and subtextual commentary on the nature of violence in videogames.
Non-violent strategy games
As with role-playing games, strategy games have traditionally focused on the development and expansion of a group as they defend themselves from the attacks of enemies. Strategy games tend not to be explicitly described as violent, however they nearly universally contain violent content in the form of battles, wars, and other skirmishes. Additionally, strategy games tend to more often strive for realistic scenarios and depictions of the battles that result. Counteracting this violence, however, is the fact that strategy games tend to be set at a distant third party perspective and as such the violence of the battles tends to be minute and highly stylized.
For the most part, non-violent groups have not explored this genre of violent game. Gender-marketers have designed strategy games for both male and female audiences, however gender-linked treatment of violence has not occurred in this genre and as such, male- and female-oriented strategy games tend to contain equal degrees of violence. Christian developers have made various attempts at the genre including Left Behind: Eternal Forces in which the player attempts to convert as many civilians in an apocalyptic future as possible by raising their spirit level and shielding them from the corrupting influences of rock-and-roll music and general secularism. The game has been criticized by such anti-violent video game personalities as former attorney Jack Thompson for strategy involving the slaying of infidels and non-believers, and for the ability of players engaged in multi-play modes to play as the Antichrist on the side of the Forces of Satan.
Secular non-violent video game designers have emerged from the serious games movement and include such anti-violence titles as PeaceMaker, a game where the player tries to foster peace between Israelis and Palestinians, and A Force More Powerful, a nonviolence-themed game designed by Steve York, a documentary filmmaker and director of Bringing Down a Dictator, a non-violent resistance film featuring Ivan Marovic, a resistance leader against Slobodan Milošević who was instrumental in bringing him down in 2000.Krotoski, Aleks. Serious game: resolving conflict with non-violent means. The Guardian. 8 May 2006. Though these games are anti-violent, however, failure on the part of the player leads to violence. Thus the goal of the game is merely shifted to active violence-prevention while the degree of violence used to challenge the player remains consistent with violent strategy games.
Some examples of relatively nonviolent strategy games include:M.U.L.E.E.T.: Cosmic GardenOutpost Kaloki X – a strategy/simulation gameMudcraftNon-violent sports games and non-violent vehicle simulations
According to the Funk and Buchman method for classifying video games, there are six categories into which games may be divided:
general entertainment (no fighting or destruction)
educational (learning or problem solving)
fantasy violence (cartoon characters that must fight or destroy things, and risk being killed, in order to achieve a goal)
human violence (like fantasy violence, but with human rather than cartoon characters)
nonviolent sports (no fighting or destruction)
sports violence (fighting or destruction involved)
The separation of violent and nonviolent sports here illustrates a phenomenon also recognizable in the vehicle simulation game genre. With both sport and vehicle simulation games, gameplay has traditionally been highly bipolar with nearly as many violent titles as non-violent. Just as there are non-violent and violent sports games, so too are there flight and combat flight simulators, space flight and space combat simulators, and racing games and vehicular combat games. Distinction of games as violent or non-violent here serves a purely practical purpose as gameplay may differ considerably beyond the merely aesthetic.
Such sports as Ping-pong, golf, and billiards, have in the past been identified as nonviolent. A common example of a nonviolent game that has been employed in a number of studies and government committee reports is NBA Jam: Tournament Edition.Cantor, Joanne. The Psychological Effects of Media Violence on Children and Adolescents. 2003.Computer Games and Australians Today . Australian Commonwealth, State and Territory Ministers. 1999.
An example of a notable non-violent sports game company is Kush Games.
See alsoA Modest Video Game Proposal''
Christian video games
Nonviolence
References
Nonviolence
Video game censorship
Video game genres
Self-censorship
Violence in video games |
56274995 | https://en.wikipedia.org/wiki/List%20of%20Escadres%20of%20the%20French%20Air%20and%20Space%20Force | List of Escadres of the French Air and Space Force | This is a list of Escadres (Wings) of the French Air and Space Force.
Escadres (wings) are commanded by a Lieutenant-colonel or Colonel, known as the "Chief de corps". The term Escadre replaced "regiment" in 1932. Until 1994, it meant a unit composed of several squadron-sized units (Escadron/Squadron or Groups), generally equipped with the same type of equipment, or at least the same type of mission (e.g. fighter, reconnaissance, bombing, transport) as well as wing maintenance and support units or sub-units.
Between 1993-1995, under the « Armées 2000 » reorganisation, the Escadre (wing) level of command was withdrawn from use. In 2014 it was reintroduced, with additions.
Former and active French Air Force escadrilles (squadrons) form the following former and active Escadres, as of June 14, 2015, ():
Active Escadres
The list of active Escadres as of 2018 includes:
Strategic Air Forces Command
4th Fighter Wing (), recreated on August 26, 2015 at BA113 Saint-Dizier – Robinson Air Base, operates Dassault Rafale fighters in the nuclear strike role
31st Aerial Refueling and Strategic Transport Wing (), created on August 27, 2014 at BA125 Istres-Le Tubé Air Base, operates Boeing C-135FR/KC-135R Stratotanker in process of conversion to Airbus A330 MRTT
Air Forces Command
Fighter Aviation Air Force Brigade ( (BAAC))
2nd Fighter Wing (), recreated on September 3, 2015 at BA116 Luxeuil-Saint Sauveur Air Base, operates Dassault Mirage 2000-5F air defence fighters
3rd Fighter Wing (), recreated on September 5, 2014 at BA133 Nancy – Ochey Air Base, operates Dassault Mirage 2000D fighter-bombers
8th Fighter Wing (), recreated on August 25, 2015 at BA120 Cazaux Air Base, operates Dassault Alpha Jet in the advanced jet and tactical training roles
30th Fighter Wing (), recreated on September 3, 2015 at BA118 Mont-de-Marsan Air Base, operates Dassault Rafale fighters in the tactical fighter and operational evaluation roles
Support and Projection Air Force Brigade ( (BAAP))
61st Transport Wing (), recreated on September 1, 2015 at BA123 Orléans – Bricy Air Base, operates Airbus A400M Atlas tactical transport aircraft
62nd Transport Wing (), recreated on September 5, 2017 at BA123 Orléans – Bricy Air Base, operates Lockheed C/KC-130H/J Hercules tactical transport, aerial refueling and special operations aircraft
64th Transport Wing (), recreated on August 27, 2015 at BA105 Évreux-Fauville Air Base, operates Aérospatiale C-160NG/Gabriel Transall tactical transport and EW aircraft
Airspace Control Air Force Brigade ( (BACE))
36th Airborne Command and Control Wing (), created on September 3, 2014 at BA702 Avord Air Base, operates Boeing E-3F Sentry AEW&C aircraft
Surface-to-Air Air Defence Wing - 1st Anti-Aircraft Artillery Regiment (), created on September 3, 2014 at BA702 Avord Air Base, operates SAMP/T in the air defence and ballistic missile defence role
Aviation Maneuver Support Air Force Brigade ( (BAAMA))
Deployable Command and Control Air Force Wing (), created on August 27, 2015 at BA105 Évreux-Fauville Air Base, operates ground-based Command and control C4I systems
Former Escadres
Escadres de Bombardement/ Bombardment Escadres
90e Escadre de Bombardement ()
91e Escadre de Bombardement ()
92e Escadre de Bombardement ()
93e Escadre de Bombardement ()
94e Escadre de Bombardement ()
Escadres de Chasse/Hunter Squadron
1re Escadre de Chasse ()
5e Escadre de Chasse ()
6e Escadre de Chasse ()
7e Escadre de Chasse ()
9e Escadre de Chasse ()
10e Escadre de Chasse ()
11e Escadre de Chasse ()
12e Escadre de Chasse ()
13e Escadre de Chasse ()
20e Escadre de Chasse ()
21e Escadre de Chasse ()
Escadre de Missiles/ Missiles Escadres
95e Escadre de Missiles Stratégiques ()
Escadres de Reconnaissance/ Reconnaissance Escadres
33e Escadre de Reconnaissance ()
Escadres de Transport/ Transport Escadre
62e Escadre de Transport ()
63e Escadre de Transport ()
65e Escadre de Transport ()
Escadres d'Hélicoptères/ Helicopter Escadres
22e Escadre d'Hélicoptères ()
23e Escadre d'Hélicoptères ()
See also
Major (France)
Chief of Staff of the French Air Force
Strategic Air Forces
History of the Armée de l'Air (1909–42)
History of the Armée de l'Air in the colonies (1939–62)
List of French Air and Space Force aircraft squadrons
List of French Air and Space Force bases
References
External links
Escadrons de chasse de l'Armée de l'air
Military units and formations of the French Air and Space Force |
1117392 | https://en.wikipedia.org/wiki/Exit%20status | Exit status | The exit status of a process in computer programming is a small number passed from a child process (or callee) to a parent process (or caller) when it has finished executing a specific procedure or delegated task. In DOS, this may be referred to as an errorlevel.
When computer programs are executed, the operating system creates an abstract entity called a process in which the book-keeping for that program is maintained. In multitasking operating systems such as Unix or Linux, new processes can be created by active processes. The process that spawns another is called a parent process, while those created are child processes. Child processes run concurrently with the parent process. The technique of spawning child processes is used to delegate some work to a child process when there is no reason to stop the execution of the parent. When the child finishes executing, it exits by calling the exit system call. This system call facilitates passing the exit status code back to the parent, which can retrieve this value using the wait system call.
Semantics
The parent and the child can have an understanding about the meaning of the exit statuses. For example, it is common programming practice for a child process to return (exit with) zero to the parent signifying success. Apart from this return value from the child, other information like how the process exited, either normally or by a signal may also be available to the parent process.
The specific set of codes returned is unique to the program that sets it. Typically it indicates success or failure. The value of the code returned by the function or program may indicate a specific cause of failure. On many systems, the higher the value, the more severe the cause of the error. Alternatively, each bit may indicate a different condition, which are then evaluated by the or operator together to give the final value; for example, fsck does this.
Sometimes, if the codes are designed with this purpose in mind, they can be used directly as a branch index upon return to the initiating program to avoid additional tests.
AmigaOS
In AmigaOS, MorphOS and AROS, four levels are defined:
OK 0
WARN 5
ERROR 10
FAILURE 20
Shell and scripts
Shell scripts typically execute commands and capture their exit statuses.
For the shell’s purposes, a command which exits with a zero exit status has succeeded. A nonzero exit status indicates failure. This seemingly counter-intuitive scheme is used so there is one well-defined way to indicate success and a variety of ways to indicate various failure modes. When a command is terminated by a signal whose number is N, a shell sets the variable $? to a value greater than 128. Most shells use 128+N, while ksh93 uses 256+N.
If a command is not found, the shell should return a status of 127. If a command is found but is not executable, the return status should be 126. Note that this is not the case for all shells.
If a command fails because of an error during expansion or redirection, the exit status is greater than zero.
C language
The C programming language allows programs exiting or returning from the main function to signal success or failure by returning an integer, or returning the macros EXIT_SUCCESS and EXIT_FAILURE. On Unix-like systems these are equal to 0 and 1 respectively. A C program may also use the exit() function specifying the integer status or exit macro as the first parameter.
The return value from main is passed to the exit function, which for values zero, EXIT_SUCCESS or EXIT_FAILURE may translate it to “an implementation defined form” of successful termination or unsuccessful termination.
Apart from zero and the macros EXIT_SUCCESS and EXIT_FAILURE, the C standard does not define the meaning of return codes. Rules for the use of return codes vary on different platforms (see the platform-specific sections).
DOS
In DOS terminology, an errorlevel is an integer exit code returned by an executable program or subroutine. Errorlevels typically range from 0 to 255. In DOS there are only 256 error codes available, but DR DOS 6.0 and higher support 16-bit error codes at least in CONFIG.SYS. With 4DOS and DR-DOS COMMAND.COM, exit codes (in batchjobs) can be set by EXIT n and (in CONFIG.SYS) through ERROR=n.
Exit statuses are often captured by batch programs through IF ERRORLEVEL commands. Multiuser DOS supports a reserved environment variable %ERRORLVL% which gets automatically updated on return from applications. COMMAND.COM under DR-DOS 7.02 and higher supports a similar pseudo-environment variable %ERRORLVL% as well as %ERRORLEVEL%. In CONFIG.SYS, DR DOS 6.0 and higher supports ONERROR to test the load status and return code of device drivers and the exit code of programs.
Java
In Java, any method can call System.exit(int status), unless a security manager does not permit it. This will terminate the currently running Java Virtual Machine. "The argument serves as a status code; by convention, a nonzero status code indicates abnormal termination."
OpenVMS
In OpenVMS, success is indicated by odd values and failure by even values.
The value is a 32 bit integer with sub-fields: control bits, facility number, message number and severity. Severity values are divided between success (Success, Informational) and failure (Warning, Error, Fatal).
POSIX
In Unix and other POSIX-compatible systems, the parent process can retrieve the exit status of a child process using the wait() family of system calls defined in wait.h. Of these, the waitid() call retrieves the full 32-bit exit status, but the older wait() and waitpid() calls retrieve only the least significant 8 bits of the exit status.
The wait() and waitpid() interfaces set a status value of type int packed as a bitfield with various types of child termination information. If the child terminated by exiting (as determined by the WIFEXITED() macro; the usual alternative being that it died from an uncaught signal), SUS specifies that the low-order 8 bits of the exit status can be retrieved from the status value using the WEXITSTATUS() macro.
In the waitid() system call (added with SUSv1), the child exit status and other information are no longer in a bitfield but in the structure of type siginfo_t.
POSIX-compatible systems typically use a convention of zero for success and nonzero for error. Some conventions have developed as to the relative meanings of various error codes; for example GNU recommend that codes with the high bit set be reserved for serious errors.
BSD-derived OS's have defined an extensive set of preferred interpretations: Meanings for 15 status codes 64 through 78 are defined in sysexits.h. These historically derive from sendmail and other message transfer agents, but they have since found use in many other programs.
For portability reasons, glibc defines the macros EXIT_SUCCESS and EXIT_FAILURE. The Advanced Bash-Scripting Guide and /usr/include/sysexits.h have some information on the meaning of non-0 exit status codes.
Windows
Windows uses 32-bit unsigned integers as exit codes, although the command interpreter treats them as signed. If a process fails initialization, a Windows system error code may be returned.
Exit codes are directly referenced, for example, by the command line interpreter CMD.exe in the errorlevel terminology inherited from DOS. .NET Framework processes and the Windows PowerShell refer to it as the ExitCode property of the Process object.
See also
Error code
Return statement
true and false (commands)
References
Process (computing) |
33815515 | https://en.wikipedia.org/wiki/Rod%20Humenuik | Rod Humenuik | John "Rod" Humenuik (born June 17, 1938) is an American former gridiron football player and coach. He served as the head football coach at California State University, Northridge from 1971 to 1972 and Principia College in Elsah, Illinois from 1998 to 2002, compiling a career college football record of 10–12.
Humenuik attended Los Angeles High School in Los Angeles, where was named an All-City tackle in 1954. He began his college football career at Pierce College in Los Angeles, earning All-Western State Conference laurels and honorable mention on All-American Junior College team in 1955. Humenuik transferred to the University of Southern California, earning letters for the USC Trojans football team in 1956 and 1957. The then played professionally with the Winnipeg Blue Bombers in the Canadian Football League (CFL).
Humenuik began his coaching career in 1963 when he was hired as line coach at La Habra High School in La Habra, California. He served in the same role at Long Beach Polytechnic High School in Long Beach, California the following year before moving to Fullerton College in 1965, once again serving as line coach. Humenuik returned to USC in 1966 as an assistant coach under John McKay.
Head coaching record
References
1938 births
Living people
American football tackles
American players of Canadian football
Cal State Northridge Matadors football coaches
Cleveland Browns coaches
Detroit Fury coaches
Frankfurt Galaxy coaches
Fullerton Hornets football coaches
Kansas State Wildcats football coaches
London Monarchs coaches
National Football League offensive coordinators
New England Patriots coaches
New York Jets coaches
Pierce Brahmas football players
Principia Panthers football coaches
Toronto Argonauts coaches
USC Trojans football coaches
California State University, Northridge faculty
Principia College faculty
USC Trojans football players
Winnipeg Blue Bombers players
High school football coaches in California
Los Angeles High School alumni
Coaches of American football from California
Players of American football from Los Angeles
Players of American football from Detroit
Players of Canadian football from Los Angeles
Sportspeople from Detroit
Sports coaches from Los Angeles |
31440066 | https://en.wikipedia.org/wiki/Implied%20Spaces | Implied Spaces | Implied Spaces is a 2008 space opera novel by American author Walter Jon Williams. It explores themes of transhumanism, artificial intelligence and ontology.
Setting
Implied Spaces takes place approximately 1,500 to 2,000 years in the future. Humanity has entered a period of technological singularity fueled by a series of massive supercomputers orbiting the sun (Dyson Sphere). These computers act as giant solar collectors and computational machine for running human society. While humanity numbers in the hundreds of billions, only perhaps a few million live in the solar system. Some have gone on slower than light journeys to establish colonies around other stars, such as Alpha Centauri, Tau Ceti, and Epsilon Eridani, a colony lost after a stellar event known as "The Big Belch".
Most humans live in artificially created pocket universes. These universes are connected to our own via wormholes maintained on the dark side of the eleven supercomputers orbiting the sun. These artificial universes can be designed to cater to individual populaces and some have different physical laws than our universe. These pocket universes include the technologically advanced world of Topaz, the medieval fantasy themed world of Midgarth, the hunter gatherer world Olduvia, and the aquatic paradise of Hawaiki, among many others.
Various advancements in biotechnology have effectively rendered mankind immortal. Humans no longer age normally, and even death has been overcome by means of resurrection facilities which will download a backed up copy of a personality and memories into a reformed body. Genetic manipulation has allowed people to obtain designer bodies with different, even nonhuman, features.
The sole dark spot seems to be the long dormant fear of an episode from the distant past: the Control Alt Delete War. In this first truly worldwide war, a revolutionary political faction known as the Seraphim used a bio-engineered virus to attack humanity. Rather than killing its victims, this virus rewrote their brains so that they were loyal to the Seraphim. As other groups discovered this new weapon they re-engineered it for their own purposes, including one version of the virus which created "zombies", people with an uncontrollable violent rage toward others. While this technology was ultimately suppressed and all but the oldest humans seem to have put it behind them, it remains as a black spot on an otherwise perfect society.
Plot
The plot begins with a man named Aristide, adventuring in the world of Midgarth. Midgarth was created as a medieval fantasy world and has physical laws which prevent artificial electrical charges or chemical reactions which occur fast enough to create a gun. Through genetic engineering it has been populated with various fantasy races such as orcs and trolls. Aristide is the current nom de guerre of Pablo Monagas Perez, one of the most important figures in human society. Over a thousand years ago Perez had been part of the team which created artificial intelligence, thus launching humanity along its path to paradise.
Accompanied by his cat Bitsy, who is really an avatar of the supercomputer Endora, he is now dedicated to studying the "implied spaces" of the human constructed pocket universes: the places which were created as the byproduct of desired features. While working in Midgarth, Aristide learns of a series of particularly successful bandits preying on a local trade route. They are apparently led by a band of mysterious priests and kidnap their victims, who are never seen again.
Aristide and a group of travelers confront these bandits. During the confrontation, Aristide discovers that the priests who lead the bandits are able to create wormholes which transport their opponents to an unknown location. Worried by the advanced technology that these priests have, he takes some of their remains to his friend and former lover Daljit to be analyzed. When it is determined that the priests were in fact "pod people", illegal artificial lifeforms, they become worried that someone is engaged in a plot to bring down civilization.
Aristide and Daljit conclude that the priests were abducting people in order to reprogram then to serve the priests' unknown masters. Checking records they discover that there has been a rash of unsolved disappearances in the archipelago universe Hawaiki. Aristide travels there where he encounters agents of the conspiracy and narrowly misses being kidnapped, although he loses Bitsy in the process. Returning to his home universe Topaz he informs the authorities, including his friend the Prime Minister, who begin an investigation. They determine that whoever is behind this must have corrupted one of the supercomputers, a terrifying prospect to people whose entire civilization is built around those machines.
It is eventually discovered that the rogue AI is Cortland, a surprising choice given that Cortland is one of the most eccentric AIs whose interests run mostly towards ontology. Before they can act on this information their opponent reveals himself. He calls himself Vindex and closes down access to the universes based on Cortland. At the same time he launches a viral zombie plague at Topaz. Aristide is forced to kill Daljit when she becomes infected with the virus and attacks him but she is soon resurrected and along with some others who perished in the plague dedicates herself to the war effort.
Aristide also dedicates himself to the war effort, volunteering to lead part of the coordinated assault against Cortland. Before the assault happens, however, he realizes that Vindex has sabotaged the resurrection machinery. All the people killed in the zombie plague have been resurrected as loyal followers of Vindex, a kind of fifth column. Before he can report his discovery he is killed by Daljit and resurrected as a loyal follower of Vindex himself. However, before he can betray Topaz the problem is discovered by the authorities who incapacitate the victims and reverse Vindex's conditioning.
Aristide goes on to lead an assault on Cortland and watches as all his men are killed. He alone survives and is brought face to face with Vindex. There, the villain reveals his identity. He is in fact Pablo Monagas Perez. His personality had been calved off centuries before to lead the human expedition to Epsilon Eridani. He relates to Aristide the story of how he and a version of Daljit had gone with millions of others to colonize Epsilon Eridani, creating a new world and a supercomputer orbiting the sun.
Along this trip, Pablo and Daljit had fallen deeply in love and Daljit had become more and more interested in exploring the origins of the universe. In doing so she discovered that our universe is, in fact, an artificial construct, just like the pocket universes that humanity created but on a much larger scale. However, before she can fully explore the implications of this shocking discovery Epsilon Eridani undergoes a stellar expansion which is labeled by those in the Sol system as "The Big Belch". This expansion destroys the Epsilon Eridani's orbital supercomputer and fries the day side of the artificially constructed world orbiting it.
Hundreds of millions die in the conflagration. Only those on the night side of the planet, such as Pablo, are able to survive and only by hiding in deep bunkers. Most of the survivors opt to head back to Sol, life around Epsilon Eridani no longer being possible, but their ship mysteriously vanishes along the way. Pablo remains to search for Daljit, who he hopes survived. She did not but he becomes obsessed with her work and with the idea of punishing the creators of this universe, whom he calls The Inept, for all the suffering of humanity. Returning to the Sol system, he contacts Cortland, whose interest in ontology allows Pablo to convince the computer to aid him. Pablo explains that he is not attempting to destroy human civilization, but rather to take it over so that everyone will work towards his goal: using a wormhole to travel back to the origins of the universe and punish its creators.
Aristide derides Pablo's plan as madness and is able to escape with the help of Bitsy, who has been living with Pablo since she disappeared. Aristide returns to Topaz where he informs the leadership of Vindex's plans. Before they can pursue any other action the supercomputer Aloysius is destroyed by a mass driver which Vindex had created in the kuiper belt.
As the other supercomputers adjust their orbits in order to stay out of the line of fire, the authorities desperately attempt to come up with a plan to defeat Vindex. One person comes up with the idea of creating their own mass drivers within pocket universes. These would have the advantage of being undetectable to Vindex until they were actually fired.
Aristide then comes up with the idea of creating a massive pocket universe, dubbed an "overpocket" which will encompass the inner solar system, thus cutting Vindex off from his mass driver in the kuiper belt. With the overpocket deployed, the other supercomputers unleash their own mass drivers against Vindex and Cortland, destroying them. The book concludes with Aristide concluding that Vindex's idea of using a wormhole to travel to the beginning of time is a worthy one and that he might attempt to do it with willing allies.
Publication information
Published by Night Shade Books, 1st edition, 2008. .
References
2008 American novels
2008 in the United States
Alpha Centauri in fiction
Novels about artificial intelligence
Fiction set around Epsilon Eridani
Space opera novels
Artificial intelligence in fiction
Fiction set around Tau Ceti
Fiction about consciousness transfer
Fiction about immortality
Fiction about the Solar System
Transhumanism in fiction
Nanotechnology in fiction |
4382559 | https://en.wikipedia.org/wiki/Energy%20Sciences%20Network | Energy Sciences Network | The Energy Sciences Network (ESnet) is a high-speed computer network serving United States Department of Energy (DOE) scientists and their collaborators worldwide. It is managed by staff at the Lawrence Berkeley National Laboratory.
More than 40 DOE Office of Science labs and research sites are directly connected to this network. The ESnet network also connects to more than 140 other research and commercial networks, allowing DOE researchers to collaborate with scientists around the world.
Overview
The Energy Sciences Network (ESnet) is the Office of Science’s high-performance network user facility, delivering highly-reliable data transport capabilities optimized for the requirements of large-scale science. In essence, ESnet is the circulatory system that enables the DOE science mission. ESnet is stewarded by the Advanced Scientific Computing Research Program, and managed and operated by the Scientific Networking Division at Lawrence Berkeley National Laboratory.
ESnet interconnects the DOE’s national laboratory system, dozens of other DOE sites, and ~200 research and commercial networks around the world—enabling tens of thousands of scientists at DOE laboratories and academic institutions across the country to transfer vast data streams and access remote research resources in real-time. ESnet exists to provide the specialized networking infrastructure and services required by the national laboratories, large science collaborations, and the DOE research community. ESnet provides the high-bandwidth, reliable connections that enable many thousands of the nation’s scientists to collaborate on some of the world's most important scientific challenges including energy, bioscience, materials, and the origins of the universe.
ESnet was formed in 1986, combining the operations of earlier DOE networking projects known as HEPnet (for high-energy physics) and MFEnet (for magnetic fusion energy research). While growing within the terrestrial US over the years, in December 2014, ESnet deployed three 100 Gbit/s links and one 40 Gbit/s connection between the United States and Europe to enhance collaborative research.
From 1990 to 2019, ESnet's average traffic has grown by a factor of 10 every 47 months.
By 2005, the core network used packet over SONET links at 10 Gbit/s. In 2009, ESnet received $62 million in American Research and Recovery Act (ARRA) funding from the Department of Energy Office (DOE)of Science to invest in its next-generation infrastructure to provide the necessary support for research discovery in this new era of data-intensive science. After three years of planning and deployment, ESnet5 – ESnet’s fifth generation network – launched in November 2012. The new network provided an immediate tenfold increase in bandwidth to DOE research sites at the same cost as providing 10G connections – with the ability to now scale to 44 times the current capacity. ESnet is currently working on its next-generation upgrade named ESnet6.
Current Network Configuration (ESnet 5)
In October 2011, ESnet rolled out its 100 Gbit/s backbone network, known internally as ESnet 5. The network is the world’s fastest science network, serving the entire DOE national laboratory system, its supercomputing centers, and its major scientific instruments at speeds 10 times faster than ESnet’s previous generation network.
ESnet partnered with Internet2, the network that connects America’s universities and research institutions, to deploy its 100 Gbit/s network over a new, highly-scalable optical infrastructure that the two organizations share for the benefit of their respective communities.
The project was funded in 2009 by $62 million in American Recovery and Reinvestment Act funds. Call the Advanced Networking Initiative, the Gbit/s network was a project to handle the expanding data needs between DOE supercomputing facilities.In December 2014, ESnet extended its reach by deploying four new high-speed transatlantic links, giving researchers at America’s national laboratories and universities ultra-fast access to scientific data from the Large Hadron Collider (LHC) and other research sites in Europe. ESnet’s transatlantic extension delivers a total capacity of 340 gigabits per second (Gbit/s), and serve dozens of scientific collaborations. To maximize the resiliency of the new infrastructure, ESnet equipment in Europe will be interconnected by dedicated 100 Gbit/s links from the pan-European networking organization GÉANT. The new trans-Atlantic links build on the success of the US LHCNet, a collaboration between Caltech and CERN, led by Harvey Newman of Caltech.
ESnet6
The scientific community is facing a growing challenge: dramatically increasing data volumes. Telescopes are scanning the universe with greater precision. Supercomputers are simulating scientific phenomena at higher resolutions. Sensors and detectors are gathering experimental results with greater sensitivity and speed. ESnet’s next-generation network, ESnet6, is designed to help the DOE research community navigate this “data deluge” by giving them more bandwidth, greater flexibility, and faster data transfer capabilities.
With a projected early finish in 2023, ESnet6 will feature an entirely new software-driven network design that enhances the ability to rapidly invent, test, and deploy new innovations. The design includes:
State-of-the-art optical, core and service edge equipment deployed on ESnet’s dedicated fiber optic cable backbone
A scalable switching core architecture coupled with a programmable services edge to facilitate high-speed data movement
100 to 400 Gbit/s optical channels, with up to eight times the potential capacity compared to ESnet5
Services that monitor and measure the network 24/7/365 to ensure it is operating at peak performance, and
Advanced cybersecurity capabilities to protect the network, assist its connected sites, and defend its devices in the event of a cyberattack.
ESnet6 represents a transformational change in network capacity, resiliency, and flexibility that will bring tangible benefits to the DOE mission, including exascale. As the top science data network in the world, ESnet will continue supporting effective collaborations and consistent access to data, computing, and experiments, thus contributing significantly to U.S. competitiveness.
Research and Development
ESnet research and development programs have included:
Software Defined Networking: ESnet has developed ENOS, the ESnet Network Operating system is a prototype next-generation architecture for handling data-intensive science workflows. The concept of a “network operating system,” a software layer that enables applications to get information about the network and to program it to meet it's needs, has been discussed academically for awhile but now appears feasible with the wide adoption of the Software-Defined Networking (SDN) paradigm. The ENOS approach will enable ESnet to build better application-engaged scientific networks and provide the interfaces, data and programmability for applications or science virtual organizations to better orchestrate their multi-site complex big data projects and optimize their use of storage, compute and cloud resources.
Science DMZ: A network design pattern for securely routing large datasets around institutional firewall developed by ESnet and the National Energy Research Scientific Computing Center. Typically, located at the network perimeter, a DMZ has its own security policy and is specifically dedicated to external-facing high-performance science services – exchanging data with the outside world. With support from the National Science Foundation, more than 100 universities across the country have deployed Science DMZs.
400 Gbit/s network: In 2015, ESnet and the National Energy Research Scientific Computing Center (NERSC) have built a 400 gigabit-per-second super-channel, the first-ever 400G production link to be deployed by a national research and education network. The connection provided critical support for NERSC’s 6,000 users as the facility moved from its previous location in Oakland, Calif. to the main campus of Lawrence Berkeley National Laboratory in Berkeley, Calif. The team also set up a 400 Gbit/s research testbed for assessing new tools and technologies without interfering with production data traffic.
OSCARS: The On Demand Secure Circuits and Reservation System software developed at ESnet, and now open-sourced to the community, creates multi-domain, virtual circuits guaranteeing end-to-end data transfer performance on the network. OSCARS was recognized with an R&D 100 Award in 2013.
perfSONAR: A test and measurement framework that provides end-to-end monitoring of multi-domain network performance. ESnet is a key member of the international perfSONAR collaboration, along with GÉANT, Indiana University and Internet2. As of 2016, perfSONAR had more than 1,600 installations.
Awards and honors for ESnet
Secretary of Energy Achievement Award: In May 2015, Energy Secretary Ernest Moniz recognized ESnet staff members with a DOE Secretarial Honor Award for their development of OSCARS, the On-demand Secure Circuits and Reservation System. The Secretarial Honor Awards are the department's highest form of non-monetary employee recognition. Individual and team awardees are selected by the Secretary of Energy.
CENIC Innovations in Networking Award: The Corporation for Education Network Initiatives in California (CENIC) named ESnet as a recipient of the 2015 Innovations in Networking Award for High-Performance Research Applications for their 100-Gigabit Software-Defined Networking (100G SDN) Testbed.
InformationWeek’s Top 10 Government IT Innovators: For the second time in four years, ESnet was named one of the year’s top government IT innovators by InformationWeek Government magazine. The magazine cited ESnet for its new 100 gigabit-per-second nationwide network funded as the Advanced Networking Initiative and launched into full production in November 2012.
Fierce Innovators: Fierce Government, a publication covering the U.S. government, named the ESnet5 Deployment Team, charged with rolling out the 100-Gigabit-per-second national network that entered production in November, to the first annual "Fierce 15" list of the top federal employees and teams who have done particularly innovative things.
Internet2 IDEA Awards: Two ESnet projects received IDEA (Internet2 Driving Exemplary Applications) awards in Internet2’s 2011 annual competition for innovative network applications that have had the most positive impact and potential for adoption within the research and education community. Internet2 recognized OSCARS (On-Demand Secure Circuits and Advance Reservation System), developed by the ESnet team led by Chin Guok, including Evangelos Chaniotakis, Andrew Lake, Eric Pouyoul and Mary Thompson. Contributing partners included Internet2, USC ISI and DANTE. ESnet’s MAVEN (Monitoring and Visualization of Energy consumed by Networks) proof of concept application was also recognized with an IDEA award in the student category.
InformationWeek’s Top 10 Government IT Innovators: ESnet was honored as one of Top 10 Government IT Innovators in 2009 by InformationWeek for the development and deployment of On-Demand Secure Circuits and Reservation System (OSCARS).
Excellence.Gov Award: ESnet was honored with a 2009 Excellence.Gov award for its achievements in leveraging technology. The Excellence.Gov awards are sponsored by the Industry Advisory Council’s (IAC) Collaboration and Transformation Shared Interest Group and recognize the federal government’s best information technology (IT) projects.
References
External links
"Energy Sciences Portal"
United States Department of Energy
Academic computer network organizations
Lawrence Berkeley National Laboratory
Laboratories in California |
54667051 | https://en.wikipedia.org/wiki/Lyndsey%20Scott | Lyndsey Scott | Lyndsey Scott is an American model, software developer, and actress. She was the first African American model to sign an exclusive runway contract with Calvin Klein. Between modeling assignments for prestigious fashion houses like Gucci, Prada, and Victoria's Secret, she writes mobile apps for iOS devices. She has been credited for challenging the stereotypes about models and computer programmers, and for inspiring young women to code.
Early life
Lyndsey Scott grew up in West Orange, New Jersey, as the eldest of four children. Her father founded a home healthcare company after having been a programmer for the National Security Agency. She practiced martial arts since the age of nine, and earned a black belt in Taekwondo.
Scott endured bullying and taunting while growing up. She says she was the only black person in her first three years at Newark Academy, her New Jersey preparatory high school, and so thin – at and – that she said she was called a "monster". She says peers would invite then uninvite her from parties, and tell her she couldn't sit with them in the dining room. "It got so bad in high school I couldn't even look people in the face. I would hide out in school so I wouldn't have to eat lunch in the cafeteria or see people in between classes."
Scott attended Amherst College, where she studied theatre, economics, and physics, before taking computer science. She also ran and did high jump for the Amherst track and field team, earning All-America status for the 400 meter dash. She graduated Amherst College in 2006 with a joint degree in theatre and computer science.
Modeling
After college, Scott was more interested in acting than computer science, and began pursuing auditions in New York City. Her body had changed in college, partly due to taking weight-gain supplements, and she says she "started looking more like a model". So, with the encouragement of friends, she applied for modeling work, but was turned down by every agency she approached for two years; her parents urged her to take up computer science jobs.
Scott had, however, put her picture on the website Models.com, and in 2008 she was contacted by Click Model Management of New York City. Elle Girl featured her in a video about the day of a fashion model, including some of her Click new model training. She was then 24, which was considered old for a model. The agency asked her to trim five years from her age, and for her first few years modeling she claimed to have been born in 1990.
Even with an agency contract, Scott wasn't immediately successful. In early 2009 Scott's work was handing out flyers on a street corner when she got a call from fashion house Calvin Klein. During New York Fashion Week, she became the first black model to sign an exclusive runway contract with Calvin Klein. Bethann Hardison said that no model in recent history had made such an impact.
Other prestigious modeling jobs followed: in her first years as a model, she modeled for Vera Wang, DKNY, Baby Phat, Fendi, Gucci, Louis Vuitton, and the 2009 Victoria's Secret Fashion Show, and appeared in the magazines Italian Elle, Teen Vogue, and W. Style.com listed her as a top 10 newcomer. In the 2010 fall NYFW, she was the only black model walking runways for Prada. She also changed agencies to Elite Model Management, which was more accepting of her actual age.
In December 2013, Scott responded to a question on Quora, the question and answer website, about "What does it feel like to go from physically unattractive to attractive?". She wrote about being awkward and bullied in high school, then getting model looks after college, and the advantages and problems that came with that, while still programming in taped glasses at home. Her answer was reprinted in Slate, Business Insider, and PopSugar.
Until that time, Scott had kept her programming separate from her modeling. That Quora post drew attention to her programming skills; from then on, she was covered as the model with a secret identity as a coder. Others credited her with disproving the stereotypes that fashion models had no brains, and computer programmers were pasty-faced geeks. The fashion magazine Harper's Bazaar combined her passions by asking her to report on the Apple Worldwide Developers Conference, and Maria Shriver asked her to detail her favorite mobile apps for NBC News.
Computer programming
Scott started programming at the age of 12, by writing games for her TI-89 graphing calculator and sharing them with friends in middle school. She learned the Java and C++ programming languages and the MIPS architecture at Amherst College, but taught herself the skills she used for writing her own applications in Python, Objective C, and iOS. She says that though she enjoyed programming in college, she went into acting and modeling professionally because she never saw herself spending her life around other computer programmers; after graduating, most of her programming was done alone. By 2017, she considered herself primarily a programmer.
Scott is also passionate about educating others to program, especially young women. She maintains a profile on Stack Overflow, a website where users gain reputation for providing answers about computer programming. In early 2014, she was one of the top 2% of users with over 2,000 reputation points and more than 38,000 profile views. She was the top ranked user for iOS questions on the site for one month in 2015. As of August 2019, she has over 31,000 reputation points with over 400 answers to user questions and is in the top 1% of users on the platform.
She is the author of multiple iOS programming tutorials on RayWenderlich.com, was a representative for Code.org's second Hour of Code learning initiative, made a video teaching programming with Disney's Frozen characters, and is a mentor at Girls Who Code, an organization teaching programming to teenage girls. She has given talks on programming at schools in Harlem and NYU, and mentored Girl Scouts in programming in Los Angeles.
Her combination of modeling and coding is seen as inspirational to young women: she was named to the Elle "Inspire 100" list in 2014, and the AskMen "Top 99 Outstanding Women 2015" list, which called her "an inspiration for scores of young girls". She was a keynote speaker for the Harvard Undergraduate Women in Business in 2014, and a presenter for the Ford Freedom Awards in 2015.
Applications
Scott's earliest iOS mobile apps were written on her own, for Standable, Inc., the company she founded in 2011. Scott's first published app was Educate! in support of a non-profit also called Educate!, supporting young Ugandan scholars, and founded by two Amherst students. Her second was iPort, intended to help models organize their career portfolio digitally. Scott says she developed it because it was something she personally needed, as her paper portfolio books were heavy and falling apart. Her third, in 2014, was The Matchmaker, a social network that would alert a user physically near another user compatible in love, friendship, or business. Code Made Cool, released in conjunction with Scott's 2014 appearance on the cover of Asos magazine, was an iPhone app that taught girls programming via drag and drop in fantasy scenarios with animated pictures of Ryan Gosling. Squarify converts rectangular images or videos to squares for easy Instagram usage.
Later apps were written for other companies. She developed beautifulBook for Firebloom Media; it displays classic literature in stylish fonts and backgrounds. The app imDown (written for the company of the same name in 2016), which later became Tallscreen, allows users to film and share vertical videos of up to a minute in length. Ryse Up is a multimedia application to connect established and emerging musical artists, produced by the company of the same name for which Scott was a senior engineer for the 1.0 version of the mobile app. All were Apple mobile applications available on the App Store, though iPort, The Matchmaker, imDown, and Code Made Cool were no longer available as of 2017.
Lyndsey currently works as the lead iOS software engineer at the NGO fundraiser Rallybound, where she builds iOS fundraising apps for various non-profit organizations including Susan G. Komen Foundation, AIDS Walk, and Cystic Fibrosis Foundation.
Personal life
Early in her modeling career, Scott lived on Roosevelt Island in New York City; she said that compared to downtown Manhattan, her apartment was bigger for less money, and she could be involved in the community. By 2017, she lived in Beverly Hills, California. In 2016, she was sued by an unhappy renter who leased her Roosevelt Island apartment through Airbnb, and said that the apartment was dilapidated and the area unsafe; Scott said the posted photos, descriptions and reviews were verifiable and accurate. The case was dismissed.
Scott's father died of leukemia in early 2017.
References
External links
Lyndsey Scott official site
Apps by Lyndsey Scott
African-American female models
American female models
African-American models
African-American women engineers
African-American engineers
American women engineers
American computer programmers
Female models from New Jersey
Place of birth missing (living people)
Living people
People from West Orange, New Jersey
Engineers from New Jersey
21st-century women engineers
Year of birth missing (living people)
African-American computer scientists
American women computer scientists
American computer scientists
21st-century African-American people
21st-century African-American women |
54029924 | https://en.wikipedia.org/wiki/EternalBlue | EternalBlue | EternalBlue is a cyberattack exploit developed by the U.S. National Security Agency (NSA). It was leaked by the Shadow Brokers hacker group on April 14, 2017, one month after Microsoft released patches for the vulnerability.
On May 12, 2017, the worldwide WannaCry ransomware used this exploit to attack unpatched computers. On June 27, 2017, the exploit was again used to help carry out the 2017 NotPetya cyberattack on more unpatched computers.
The exploit was also reported to have been used since March 2016 by the Chinese hacking group Buckeye (APT3), after they likely found and re-purposed the tool, as well as reported to have been used as part of the Retefe banking trojan since at least September 5, 2017.
EternalBlue was among the several exploits used, in conjunction with the DoublePulsar backdoor implant tool.
Details
EternalBlue exploits a vulnerability in Microsoft's implementation of the Server Message Block (SMB) protocol. This vulnerability is denoted by entry in the Common Vulnerabilities and Exposures (CVE) catalog. The vulnerability exists because the SMB version 1 (SMBv1) server in various versions of Microsoft Windows mishandles specially crafted packets from remote attackers, allowing them to remotely execute code on the target computer.
The NSA did not alert Microsoft about the vulnerabilities, and held on to it for more than five years before the breach forced its hand. The agency then warned Microsoft after learning about EternalBlue's possible theft, allowing the company to prepare a software patch issued in March 2017, after delaying its regular release of security patches in February 2017. On Tuesday, March 14, 2017, Microsoft issued security bulletin MS17-010, which detailed the flaw and announced that patches had been released for all Windows versions that were currently supported at that time, these being Windows Vista, Windows 7, Windows 8.1, Windows 10, Windows Server 2008, Windows Server 2012, and Windows Server 2016.
Many Windows users had not installed the patches when, two months later on May 12, 2017, the WannaCry ransomware attack used the EternalBlue vulnerability to spread itself. The next day (May 13, 2017), Microsoft released emergency security patches for the unsupported Windows XP, Windows 8, and Windows Server 2003.
In February 2018, EternalBlue was ported to all Windows operating systems since Windows 2000 by RiskSense security researcher Sean Dillon. EternalChampion and EternalRomance, two other exploits originally developed by the NSA and leaked by The Shadow Brokers, were also ported at the same event. They were made available as open sourced Metasploit modules.
At the end of 2018, millions of systems were still vulnerable to EternalBlue. This has led to millions of dollars in damages due primarily to ransomware worms. Following the massive impact of WannaCry, both NotPetya and BadRabbit caused over $1 billion worth of damages in over 65 countries, using EternalBlue as either an initial compromise vector or as a method of lateral movement.
In May 2019, the city of Baltimore struggled with a cyberattack by digital extortionists; the attack froze thousands of computers, shut down email and disrupted real estate sales, water bills, health alerts and many other services. Nicole Perlroth, writing for the New York Times, initially attributed this attack to EternalBlue; in a memoir published in February 2021, Perlroth clarified that EternalBlue had not been responsible for the Baltimore cyberattack, while criticizing others for pointing out "the technical detail that in this particular case, the ransomware attack had not spread with EternalBlue".
Since 2012, four Baltimore City chief information officers have been fired or have resigned; two left while under investigation. Some security researchers said that the responsibility for the Baltimore breach lay with the city for not updating their computers. Security consultant Rob Graham wrote in a tweet: "If an organization has substantial numbers of Windows machines that have gone 2 years without patches, then that’s squarely the fault of the organization, not EternalBlue."
Responsibility
According to Microsoft, it was the United States's NSA that was responsible because of its controversial strategy of not disclosing but stockpiling vulnerabilities. The strategy prevented Microsoft from knowing of (and subsequently patching) this bug, and presumably other hidden bugs.
EternalRocks
EternalRocks or MicroBotMassiveNet is a computer worm that infects Microsoft Windows. It uses seven exploits developed by the NSA. Comparatively, the WannaCry ransomware program that infected 230,000 computers in May 2017 only uses two NSA exploits, making researchers believe EternalRocks to be significantly more dangerous. The worm was discovered via a honeypot.
Infection
EternalRocks first installs Tor, a private network that conceals Internet activity, to access its hidden servers. After a brief 24 hour "incubation period", the server then responds to the malware request by downloading and self-replicating on the "host" machine.
The malware even names itself WannaCry to avoid detection from security researchers. Unlike WannaCry, EternalRocks does not possess a kill switch and is not ransomware.
See also
BlueKeep (security vulnerability) – A similar vulnerability
Petya (malware)
References
Further reading
External links
Microsoft Security Bulletin MS17-010
Microsoft Update Catalog entries for EternalBlue patches
Entry in CVE catalog
Computer security exploits
National Security Agency
Windows communication and services |
50802537 | https://en.wikipedia.org/wiki/Ernst%20Mayr%20%28computer%20scientist%29 | Ernst Mayr (computer scientist) | Ernst Wilhelm Mayr (born May 18, 1950) is a German computer scientist and mathematician. He received the Gottfried Wilhelm Leibniz Prize in 1997 awarded for his contributions to theoretical computer science.
Mayr's research in computer science covers algorithms and complexity theory. He also explores symbolic mathematics/computer algebra and methods in bioinformatics. His principal interests lie in describing and modeling parallel and distributed programs and systems, the design and analysis of efficient parallel algorithms and programming paradigms, the design of algorithm solutions for scheduling and load balancing problems and investigation of their complexity theory. He also explores polynomial ideals and their complexity and algorithms as well as algorithms for searching and analyzing extensive bioinformatic data.
After studying mathematics at Technical University of Munich with a scholarship from the Maximilianeum foundation and computer science at Massachusetts Institute of Technology in Cambridge, Mayr did his doctorate at Technical University of Munich in 1980. In 1982, he became assistant professor of computer science at Stanford University, where he also participated in the Presidential Young Investigator Program. In 1988, he was appointed to the Chair of Theoretical Computer Science at Goethe University Frankfurt. Mayr has held the Chair of Efficient Algorithms at Technical University of Munich since 1993 where he also served as the dean of his faculty from 2000 to 2003. In 1997 he co-founded the annual international conference Computer Algebra in Scientific Computing with Vladimir P. Gerdt and served as a general chair from 1998 to 2013.
References
External links
Ernst W. Mayr Personal webpage
Curriculum vitae and publications (PDF) (116 kB)
Gottfried Wilhelm Leibniz Prize winners
Stanford University faculty
20th-century German mathematicians
Living people
1950 births
21st-century German mathematicians |
31598237 | https://en.wikipedia.org/wiki/X-Originating-IP | X-Originating-IP | The X-Originating-IP (not to be confused with X-Forwarded-For) email header field is a de facto standard for identifying the originating IP address of a client connecting to a mail service's HTTP frontend. When clients connect directly to a mail server, its address is already known to the server, but web frontends act as a proxy which internally connect to the mail server. This header can therefore serve to identify the original sender address despite the frontend.
Format
The general format of the field is:
X-Originating-IP: [198.51.100.1]
Origins
In 1999 Hotmail included an X-Originating-IP email header field that shows the IP address of the sender. As of December 2012, Hotmail removed this header field, replacing it with X-EIP (meaning encoded IP) with the stated goal of protecting users' privacy.
See also
Internet privacy
List of proxy software
X-Forwarded-For
References
Anonymity
Email
IP addresses |
8418 | https://en.wikipedia.org/wiki/Dartmouth%20College | Dartmouth College | Dartmouth College (; ) is a private Ivy League research university in Hanover, New Hampshire, United States. Established in 1769 by Eleazar Wheelock, it is the ninth-oldest institution of higher education in the United States and one of the nine colonial colleges chartered before the American Revolution. Although founded to educate Native Americans in Christian theology and the English way of life, Dartmouth primarily trained Congregationalist ministers during its early history before it gradually secularized, emerging at the turn of the 20th century from relative obscurity into national prominence.
Following a liberal arts curriculum, the university provides undergraduate instruction in 40 academic departments and interdisciplinary programs, including 57 majors in the humanities, social sciences, natural sciences, and engineering, and enables students to design specialized concentrations or engage in dual degree programs. Dartmouth comprises five constituent schools: the original undergraduate college, the Geisel School of Medicine, the Thayer School of Engineering, the Tuck School of Business, and the Guarini School of Graduate and Advanced Studies. The university also has affiliations with the Dartmouth–Hitchcock Medical Center, the Rockefeller Center for Public Policy and Social Sciences, and the Hopkins Center for the Arts. With a student enrollment of about 6,600, Dartmouth is the smallest university in the Ivy League. Undergraduate admissions are highly selective with an acceptance rate of 6.17% for the class of 2025.
Situated on a terrace above the Connecticut River, Dartmouth's main campus is in the rural Upper Valley region of New England. The university functions on a quarter system, operating year-round on four ten-week academic terms. Dartmouth is known for its undergraduate focus, strong Greek culture, and wide array of enduring campus traditions. Its 34 varsity sports teams compete intercollegiately in the Ivy League conference of the NCAA Division I.
Dartmouth is consistently cited as a leading university for undergraduate teaching by U.S. News & World Report. In 2021, the Carnegie Classification of Institutions of Higher Education listed Dartmouth as the only majority-undergraduate, arts-and-sciences focused, doctoral university in the country that has "some graduate coexistence" and "very high research activity".
The university has many prominent alumni, including 170 members of the U.S. Senate and the U.S. House of Representatives, 24 U.S. governors, 10 billionaire alumni, 8 U.S. Cabinet secretaries, 3 Nobel Prize laureates, 2 U.S. Supreme Court justices, and a U.S. vice president. Other notable alumni include 79 Rhodes Scholars, 26 Marshall Scholarship recipients, and 14 Pulitzer Prize winners. Dartmouth alumni also include many CEOs and founders of Fortune 500 corporations, high-ranking U.S. diplomats, academic scholars, literary and media figures, professional athletes, and Olympic medalists.
History
Dartmouth was founded by Eleazar Wheelock, a Yale graduate and Congregational minister from Columbia, Connecticut, who had sought to establish a school to train Native Americans as Christian missionaries. Wheelock's ostensible inspiration for such an establishment resulted from his relationship with Mohegan Indian Samson Occom. Occom became an ordained minister after studying under Wheelock from 1743 to 1747, and later moved to Long Island to preach to the Montauks.
Wheelock founded Moor's Indian Charity School in 1755. The Charity School proved somewhat successful, but additional funding was necessary to continue school's operations, and Wheelock sought the help of friends to raise money. The first major donation to the school was given by John Phillips in 1762, who would go on to found Phillips Exeter Academy. Occom, accompanied by the Reverend Nathaniel Whitaker, traveled to England in 1766 to raise money from churches. With these funds, they established a trust to help Wheelock. The head of the trust was a Methodist named William Legge, 2nd Earl of Dartmouth.
Although the fund provided Wheelock ample financial support for the Charity School, Wheelock initially had trouble recruiting Indians to the institution, primarily because its location was far from tribal territories. In seeking to expand the school into a college, Wheelock relocated it to Hanover, in the Province of New Hampshire. The move from Connecticut followed a lengthy and sometimes frustrating effort to find resources and secure a charter. The Royal Governor of New Hampshire, John Wentworth, provided the land upon which Dartmouth would be built and on December 13, 1769, issued a royal charter in the name of King George III establishing the College. That charter created a college "for the education and instruction of Youth of the Indian Tribes in this Land in reading, writing & all parts of Learning which shall appear necessary and expedient for civilizing & christianizing Children of Pagans as well as in all liberal Arts and Sciences and also of English Youth and any others". The reference to educating Native American youth was included to connect Dartmouth to the Charity School and enable the use of the Charity School's unspent trust funds. Named for William Legge, 2nd Earl of Dartmouth—an important supporter of Eleazar Wheelock's earlier efforts but who, in fact, opposed creation of the College and never donated to it—Dartmouth is the nation's ninth oldest college and the last institution of higher learning established under Colonial rule. The College granted its first degrees in 1771.
Given the limited success of the Charity School, however, Wheelock intended his new college as one primarily for whites. Occom, disappointed with Wheelock's departure from the school's original goal of Indian Christianization, went on to form his own community of New England Indians called Brothertown Indians in New York.
In 1819, Dartmouth College was the subject of the historic Dartmouth College case, which challenged New Hampshire's 1816 attempt to amend the college' charter to make the school a public university. An institution called Dartmouth University occupied the college buildings and began operating in Hanover in 1817, though the college continued teaching classes in rented rooms nearby. Daniel Webster, an alumnus of the class of 1801, presented the College's case to the Supreme Court, which found the amendment of Dartmouth's charter to be an illegal impairment of a contract by the state and reversed New Hampshire's takeover of the college. Webster concluded his peroration with the famous words: "It is, Sir, as I have said, a small college. And yet there are those who love it."
Dartmouth taught its first African-American students in 1775 and 1808. By the end of the Civil War, 20 black men had attended the college or its medical school. and Dartmouth "was recognized in the African-American community as a place where a man of color could go to get educated". One of them, Jonathan C. Gibbs, served as Secretary of State and Superintendent of Public Instruction for the state of Florida.
In 1866, the New Hampshire College of Agriculture and the Mechanic Arts was incorporated in Hanover, in connection with Dartmouth College. The institution was officially associated with Dartmouth and was directed by Dartmouth's president. The new college was moved to Durham, New Hampshire, in 1891, and later became known as the University of New Hampshire.
Dartmouth emerged onto the national academic stage at the turn of the 20th century. Prior to this period, the college had clung to traditional methods of instruction and was relatively poorly funded. Under President William Jewett Tucker (1893–1909), Dartmouth underwent a major revitalization of facilities, faculty, and the student body, following large endowments such as the $10,000 given by Dartmouth alumnus and law professor John Ordronaux. 20 new structures replaced antiquated buildings, while the student body and faculty both expanded threefold. Tucker is often credited for having "refounded Dartmouth" and bringing it into national prestige. Presidents Ernest Fox Nichols (1909–16) and Ernest Martin Hopkins (1916–45) continued Tucker's trend of modernization, further improving campus facilities and introducing selective admissions in the 1920s. In 1945, Hopkins was subject to no small amount of controversy, as he openly admitted to Dartmouth's practice of using racial quotas to deny Jews entry into the university. John Sloan Dickey, serving as president from 1945 until 1970, strongly emphasized the liberal arts, particularly public policy and international relations. During World War II, Dartmouth was one of 131 colleges and universities nationally that took part in the V-12 Navy College Training Program which offered students a path to a navy commission.
In 1970, longtime professor of mathematics and computer science John George Kemeny became president of Dartmouth. Kemeny oversaw several major changes at the college. Dartmouth, which had been a men's institution, began admitting women as full-time students and undergraduate degree candidates in 1972 amid much controversy. At about the same time, the college adopted its "Dartmouth Plan" of academic scheduling, permitting the student body to increase in size within the existing facilities. In 1988, Dartmouth's alma mater song's lyrics changed from "Men of Dartmouth" to "Dear old Dartmouth".
During the 1990s, the college saw a major academic overhaul under President James O. Freedman and a controversial (and ultimately unsuccessful) 1999 initiative to encourage the school's single-sex Greek houses to go coed. The first decade of the 21st century saw the commencement of the $1.5 billion Campaign for the Dartmouth Experience, the largest capital fundraising campaign in the college's history, which surpassed $1 billion in 2008. The mid- and late first decade of the 21st century have also seen extensive campus construction, with the erection of two new housing complexes, full renovation of two dormitories, and a forthcoming dining hall, life sciences center, and visual arts center. In 2004, Booz Allen Hamilton selected Dartmouth College as a model of institutional endurance "whose record of endurance has had implications and benefits for all American organizations, both academic and commercial", citing Dartmouth College v. Woodward and Dartmouth's successful self-reinvention in the late 19th century.
Since the election of a number of petition-nominated trustees to the Board of Trustees starting in 2004, the role of alumni in Dartmouth governance has been the subject of ongoing conflict. President James Wright announced his retirement in February 2008 and was replaced by Harvard University professor and physician Jim Yong Kim on July 1, 2009.
In May 2010 Dartmouth joined the Matariki Network of Universities (MNU) together with Durham University (UK), Queen's University (Canada), University of Otago (New Zealand), University of Tübingen (Germany), University of Western Australia (Australia) and Uppsala University (Sweden).
In early August 2019, Dartmouth College agreed to pay nine current and former students a total of $14 million to settle a class-action lawsuit alleging they were sexually harassed by three former neuroscience professors.
In 2019, Dartmouth College was elected to the Association of American Universities (AAU).
Academics
Dartmouth, a liberal arts institution, offers a four-year Bachelor of Arts and ABET-accredited Bachelor of Engineering degree to undergraduate students. The college has 39 academic departments offering 56 major programs, while students are free to design special majors or engage in dual majors. For the graduating class of 2017, the most popular majors were economics, government, computer science, engineering sciences, and history. The Government Department, whose prominent professors include Stephen Brooks, Richard Ned Lebow, and William Wohlforth, was ranked the top solely undergraduate political science program in the world by researchers at the London School of Economics in 2003. The Economics Department, whose prominent professors include David Blanchflower and Andrew Samwick, also holds the distinction as the top-ranked bachelor's-only economics program in the world.
In order to graduate, a student must complete 35 total courses, eight to ten of which are typically part of a chosen major program. Other requirements for graduation include the completion of ten "distributive requirements" in a variety of academic fields, proficiency in a foreign language, and completion of a writing class and first-year seminar in writing. Many departments offer honors programs requiring students seeking that distinction to engage in "independent, sustained work", culminating in the production of a thesis. In addition to the courses offered in Hanover, Dartmouth offers 57 different off-campus programs, including Foreign Study Programs, Language Study Abroad programs, and Exchange Programs.
Through the Graduate Studies program, Dartmouth grants doctorate and master's degrees in 19 Arts & Sciences graduate programs. Although the first graduate degree, a PhD in classics, was awarded in 1885, many of the current PhD programs have only existed since the 1960s. Furthermore, Dartmouth is home to three professional schools: the Geisel School of Medicine (established 1797), Thayer School of Engineering (1867)—which also serves as the undergraduate department of engineering sciences—and Tuck School of Business (1900). With these professional schools and graduate programs, conventional American usage would accord Dartmouth the label of "Dartmouth University"; however, because of historical and nostalgic reasons (such as Dartmouth College v. Woodward), the school uses the name "Dartmouth College" to refer to the entire institution.
Dartmouth employs a total of 607 tenured or tenure-track faculty members, including the highest proportion of female tenured professors among the Ivy League universities. Faculty members have been at the forefront of such major academic developments as the Dartmouth Workshop, the Dartmouth Time Sharing System, Dartmouth BASIC, and Dartmouth ALGOL 30. In 2005, sponsored project awards to Dartmouth faculty research amounted to $169 million.
Dartmouth serves as the host institution of the University Press of New England, a university press founded in 1970 that is supported by a consortium of schools that also includes Brandeis University, the University of New Hampshire, Northeastern University, Tufts University and the University of Vermont.
Rankings
Dartmouth was ranked tied for 13th among undergraduate programs at national universities by U.S. News & World Report in its 2021 rankings. U.S. News also ranked the school 2nd best for veterans, tied for 5th best in undergraduate teaching, and 9th for "best value" at national universities in 2020. Dartmouth's undergraduate teaching was previously ranked 1st by U.S. News for five years in a row (2009–2013). Dartmouth College is accredited by the New England Commission of Higher Education.
In Forbes 2019 rankings of 650 universities, liberal arts colleges and service academies, Dartmouth ranked 10th overall and 10th in research universities. In the Forbes 2018 "grateful graduate" rankings, Dartmouth came in first for the second year in a row.
The 2021 Academic Ranking of World Universities ranked Dartmouth among the 90–110th best universities in the nation. However, this specific ranking has drawn criticism from scholars for not adequately adjusting for the size of an institution, which leads to larger institutions ranking above smaller ones like Dartmouth. Dartmouth's small size and its undergraduate focus also disadvantage its ranking in other international rankings because ranking formulas favor institutions with a large number of graduate students.
The 2006 Carnegie Foundation classification listed Dartmouth as the only "majority-undergraduate", "arts-and-sciences focus[ed]", "research university" in the country that also had "some graduate coexistence" and "very high research activity".
Admissions
Undergraduate admission to Dartmouth College is characterized by the Carnegie Foundation and U.S. News & World Report as "most selective". The Princeton Review, in its 2018 edition, gave the university an admissions selectivity rating of 98 out of 99.
For the freshman class entering Fall 2020, Dartmouth received 21,394 applications of which 1,881 were accepted for an 8.8% admissions rate. Of those admitted students who reported class rank, 96% ranked in the top decile of their class. The admitted students' academic profile showed an all-time high SAT average score of 1501, while the average composite ACT score remained at 33.
Additionally, for the 2016–2017 academic year, Dartmouth received 685 transfer applications of which 5.1% were accepted, with an average SAT composite score of 1490, average composite ACT score of 34, and average college GPA of about 3.85. Dartmouth meets 100% of students' demonstrated financial need in order to attend the College, and currently admits all students, including internationals, on a need-blind basis.
Financial aid
Dartmouth guarantees to meet 100% of the demonstrated need of every admitted student who applies for financial aid at the time of admission. Dartmouth is one of six American universities to practice universal need-blind admissions. This means that all applicants, including U.S. permanent residents, undocumented students in the U.S., and international students, are admitted to the college without regard to their financial circumstances. At Dartmouth, free tuition is provided for students from families with total incomes of $125,000 or less and possessing typical assets. In 2015, $88.8 million in need-based scholarships were awarded to Dartmouth students.
The median family income of Dartmouth students is $200,400, with 58% of students coming from the top 10% highest-earning families and 14% from the bottom 60%.
The Dartmouth Plan
Dartmouth functions on a quarter system, operating year-round on four ten-week academic terms. The Dartmouth Plan (or simply "D-Plan") is an academic scheduling system that permits the customization of each student's academic year. All undergraduates are required to be in residence for the fall, winter, and spring terms of their freshman and senior years, as well as the summer term of their sophomore year. However, students may petition to alter this plan so that they may be off during their freshman, senior, or sophomore summer terms. During all terms, students are permitted to choose between studying on-campus, studying at an off-campus program, or taking a term off for vacation, outside internships, or research projects. The typical course load is three classes per term, and students will generally enroll in classes for 12 total terms over the course of their academic career.
The D-Plan was instituted in the early 1970s at the same time that Dartmouth began accepting female undergraduates. It was initially devised as a plan to increase the enrollment without enlarging campus accommodations, and has been described as "a way to put 4,000 students into 3,000 beds". Although new dormitories have been built since, the number of students has also increased and the D-Plan remains in effect. It was modified in the 1980s in an attempt to reduce the problems of lack of social and academic continuity.
Board of Trustees
Dartmouth is governed by a Board of Trustees comprising the college president (ex officio), the state governor (ex officio), 13 trustees nominated and elected by the board (called "charter trustees"), and eight trustees nominated by alumni and elected by the board ("alumni trustees"). The nominees for alumni trustee are determined by a poll of the members of the Association of Alumni of Dartmouth College, selecting from among names put forward by the Alumni Council or by alumni petition.
Although the board elected its members from the two sources of nominees in equal proportions between 1891 and 2007, the board decided in 2007 to add several new members, all charter trustees. In the controversy that followed the decision, the Association of Alumni filed a lawsuit, although it later withdrew the action. In 2008, the Board added five new charter trustees.
Campus
Dartmouth College is situated in the rural town of Hanover, New Hampshire, located in the Upper Valley along the Connecticut River in New England. Its campus is centered on a "Green", a former field of pine trees cleared in 1771. Dartmouth is the largest private landowner of the town of Hanover, and its total landholdings and facilities are worth an estimated $434 million. In addition to its campus in Hanover, Dartmouth owns of Mount Moosilauke in the White Mountains and a tract of land in northern New Hampshire known as the Second College Grant.
Dartmouth's campus buildings vary in age from Wentworth and Thornton Halls of the 1820s (the oldest surviving buildings constructed by the college) to new dormitories and mathematics facilities completed in 2006. Most of Dartmouth's buildings are designed in the Georgian colonial architecture style, a theme which has been preserved in recent architectural additions. The College has actively sought to reduce carbon emissions and energy usage on campus, earning it the grade of A- from the Sustainable Endowments Institute on its College Sustainability Report Card 2008.
A notable feature of the Dartmouth campus is its many trees which (despite Dutch elm disease) include some 200 American elms. The campus also has the largest Kentucky coffeetree in New Hampshire, at 91 ft tall.
Academic facilities
The college's creative and performing arts facility is the Hopkins Center for the Arts ("the Hop"). Opened in 1962, the Hop houses the College's drama, music, film, and studio arts departments, as well as a woodshop, pottery studio, and jewelry studio which are open for use by students and faculty. The building was designed by the famed architect Wallace Harrison, who would later design the similar-looking façade of Manhattan's Metropolitan Opera House at Lincoln Center. Its facilities include two theaters and one 900-seat auditorium. The Hop is also the location of all student mailboxes ("Hinman boxes") and the Courtyard Café dining facility. The Hop is connected to the Hood Museum of Art, arguably North America's oldest museum in continuous operation, and the Loew Auditorium, where films are screened.
In addition to its 19 graduate programs in the arts and sciences, Dartmouth is home to three separate graduate schools. The Geisel School of Medicine is located in a complex on the north side of campus and includes laboratories, classrooms, offices, and a biomedical library. The Dartmouth–Hitchcock Medical Center, located several miles to the south in Lebanon, New Hampshire, contains a 396-bed teaching hospital for the Medical School. The Thayer School of Engineering and the Tuck School of Business are both located at the end of Tuck Mall, west of the center of campus and near the Connecticut River. The Thayer School comprises two buildings; Tuck has seven academic and administrative buildings, as well as several common areas. The two graduate schools share a library, the Feldberg Business & Engineering Library. In December 2018, Dartmouth began a major expansion of the west end by breaking ground on the $200 million Center for Engineering and Computer Science. The Center will house the Computer Science department and Magnuson Center for Entrepreneurship. In October 2019, construction began on the Irving Institute of Energy and Society. Both are scheduled to be completed by fall 2021.
Dartmouth's libraries are all part of the collective Dartmouth College Library, which comprises 2.48 million volumes and 6 million total resources, including videos, maps, sound recordings, and photographs. Its specialized libraries include the Biomedical Libraries, Evans Map Room, Feldberg Business & Engineering Library, Jones Media Center, Rauner Special Collections Library, and Sherman Art Library. Baker-Berry Library is the main library at Dartmouth, consisting of a merger of the Baker Memorial Library (opened 1928) and the Berry Library (completed 2002). Located on the northern side of the Green, Baker's tower is an iconic symbol of the College.
Athletic facilities
Dartmouth's original sports field was the Green, where students played cricket and old division football during the 19th century. Today, two of Dartmouth's athletic facilities are located in the southeast corner of campus. The center of athletic life is the Alumni Gymnasium, which includes the Karl Michael Competition Pool and the Spaulding Pool, a state of the art fitness center, a weight room, and a 1/13th-mile (123 m) indoor track. Attached to Alumni Gymnasium is the Berry Sports Center, which contains basketball and volleyball courts (Leede Arena), as well as the Kresge Fitness Center. Behind the Alumni Gymnasium is Memorial Field, a 15,600-seat stadium overlooking Dartmouth's football field and track. The nearby Thompson Arena, designed by Italian engineer Pier Luigi Nervi and constructed in 1975, houses Dartmouth's ice rink. Also visible from Memorial Field is the Nathaniel Leverone Fieldhouse, home to the indoor track. The new softball field, Dartmouth Softball Park, was constructed in 2012, sharing parking facilities with Thompson arena and replacing Sachem Field, located over a mile from campus, as the primary softball facility.
Dartmouth's other athletic facilities in Hanover include the Friends of Dartmouth Rowing Boathouse and the old rowing house storage facility (both located along the Connecticut River), the Hanover Country Club, Dartmouth's oldest remaining athletic facility (established in 1899), and the Corey Ford Rugby Clubhouse. The college also maintains the Dartmouth Skiway, a skiing facility located over two mountains near the Hanover campus in Lyme Center, New Hampshire, that serves as the winter practice grounds for the Dartmouth ski team, which is a perennial contender for the NCAA Division I championship.
Dartmouth's close association and involvement in the development of the downhill skiing industry is featured in the 2010 book Passion for Skiing as well as the 2013 documentary based on the book Passion for Snow.
Residential housing and student life facilities
Beginning in the fall term of 2016, Dartmouth placed all undergraduate students in one of six House communities, similar to residential colleges, including Allen House, East Wheelock House, North Park House, School House, South House, and West House, alongside independent Living Learning Communities. Dartmouth used to have nine residential communities located throughout campus, instead of ungrouped dormitories or residential colleges. The dormitories varied in design from modern to traditional Georgian styles, and room arrangements range from singles to quads and apartment suites. Since 2006, the college has guaranteed housing for students during their freshman and sophomore years. More than 3,000 students elect to live in housing provided by college.
Campus meals are served by Dartmouth Dining Services, which operates 11 dining establishments around campus. Four of them are located at the center of campus in the Class of 1953 Commons, formerly Thayer Dining Hall.
The Collis Center is the center of student life and programming, serving as what would be generically termed the "student union" or "campus center". It contains a café, study space, common areas, and a number of administrative departments, including the Academic Skills Center. Robinson Hall, next door to both Collis and Thayer, contains the offices of a number of student organizations including the Dartmouth Outing Club and The Dartmouth daily newspaper.
Residential House communities of Dartmouth College
Student life
In 2006, The Princeton Review ranked Dartmouth third in its "Quality of Life" category, and sixth for having the "Happiest Students". Athletics and participation in the Greek system are the most popular campus activities. In all, Dartmouth offers more than 350 organizations, teams, and sports. The school is also home to a variety of longstanding traditions and celebrations and has a loyal alumni network; Dartmouth ranked #2 in "The Princeton Review" in 2006 for Best Alumni Network.
Student safety
In 2014, Dartmouth College was the third highest in the nation in "total of reports of rape" on their main campus, with 42 reports of rape. The Washington Post attributed the high number of rape reports to the fact that a growing number of sexual assault victims feel comfortable enough to report sexual assaults that would have gone unreported in previous years. In 2015, the Huffington Post reported that Dartmouth College had the highest rate of bystander intervention of any college surveyed, with 57.7% of Dartmouth students reporting that they would take some sort of action if they saw someone acting in a "sexually violent or harassing manner", compared to 45.5% of students nationally.
Dartmouth fraternities have an extensive history of hazing and alcohol abuse, leading to police raids and accusations of sexual harassment.
Student groups
Dartmouth's more than 200 student organizations and clubs cover a wide range of interests. In 2007, the college hosted eight academic groups, 17 cultural groups, two honor societies, 30 "issue-oriented" groups, 25 performing groups, 12 pre-professional groups, 20 publications, and 11 recreational groups. Notable student groups include the nation's largest and oldest collegiate outdoors club, the Dartmouth Outing Club, which includes the nationally recognized Big Green Bus; the campus's oldest a cappella group, The Dartmouth Aires; the controversial conservative newspaper The Dartmouth Review; and The Dartmouth, arguably the nation's oldest university newspaper. The Dartmouth describes itself as "America's Oldest College Newspaper, Founded 1799".
Partially because of Dartmouth's rural, isolated location, the Greek system dating from the 1840s is one of the most popular social outlets for students. Dartmouth is home to 32 recognized Greek houses: 17 fraternities, 12 sororities, and three coeducational organizations. In 2007, roughly 70% of eligible students belonged to a Greek organization; since 1987, students have not been permitted to join Greek organizations until their sophomore year. Dartmouth College was among the first institutions of higher education to desegregate fraternity houses in the 1950s, and was involved in the movement to create coeducational Greek houses in the 1970s. In the early first decade of the 21st century, campus-wide debate focused on a Board of Trustees recommendation that Greek organizations become "substantially coeducational"; this attempt to change the Greek system eventually failed.
Dartmouth also has a number of secret societies, which are student- and alumni-led organizations often focused on preserving the history of the college and initiating service projects. Most prominent among them is the Sphinx society, housed in a prominent Egyptian tomb-like building near the center of campus. The Sphinx has been the subject of numerous rumors as to its facilities, practices, and membership.
The college has an additional classification of social/residential organizations known as undergraduate societies.
Athletics
Approximately 20% of students participate in a varsity sport, and nearly 80% participate in some form of club, varsity, intramural, or other athletics. In 2021, Dartmouth College fielded 33 intercollegiate varsity teams: 15 for men, 17 for women, and coeducational sailing and equestrian programs. Dartmouth's athletic teams compete in the NCAA Division I eight-member Ivy League conference; some teams also participate in the Eastern College Athletic Conference (ECAC). As is mandatory for the members of the Ivy League, Dartmouth College does not offer athletic scholarships. In addition to the traditional American team sports (football, basketball, baseball, and ice hockey), Dartmouth competes at the varsity level in many other sports including track and field, softball, squash, sailing, tennis, rowing, soccer, skiing, and lacrosse.
The college also offers 26 club and intramural sports such as fencing, rugby, water polo, figure skating, boxing, volleyball, ultimate frisbee, and cricket, leading to a 75% participation rate in athletics among the undergraduate student body. The Dartmouth Fencing Team, despite being entirely self-coached, won the USACFC club national championship in 2014. The Dartmouth Men's Rugby Team, founded in 1951, has been ranked among the best collegiate teams in that sport, winning for example the Ivy Rugby Conference every year between 2008 and 2020. The figure skating team won the national championship five straight times from 2004 through 2008. In addition to the academic requirements for graduation, Dartmouth requires every undergraduate to complete a swim and three terms of physical education.
Native Americans at Dartmouth
The charter of Dartmouth College, granted to Wheelock in 1769, proclaims that the institution was created "for the education and instruction of Youth of the Indian Tribes in this Land in reading, writing and all parts of Learning ... as well as in all liberal Arts and Sciences; and also of English Youth and any others". However, Wheelock primarily intended the college to educate white youth, and the few Native students that attended Dartmouth experienced much difficulty in an institution ostensibly dedicated to their education. The funds for the Charity School for Native Americans that preceded Dartmouth College were raised primarily by the efforts of a Mohegan named Samson Occom, and at least some of those funds were used to help found the college.
The college graduated only 19 Native Americans during its first 200 years. In 1970, the college established Native American academic and social programs as part of a "new dedication to increasing Native American enrollment". Since then, Dartmouth has graduated over 700 Native American students from over 200 different tribes, more than the other seven Ivy League universities combined.
Traditions
Dartmouth is well known for its fierce school spirit and many traditions. The college functions on a quarter system, and one weekend each term is set aside as a traditional celebratory event, known on campus as "big weekends" or "party weekends". In the fall term, Homecoming (officially called Dartmouth Night) is marked by a bonfire on the Green constructed by the freshman class. Winter term is celebrated by Winter Carnival, a tradition started in 1911 by the Dartmouth Outing Club to promote winter sports. This tradition is the oldest in the United States, and subsequently went on to catch on at other New England colleges. In the spring, Green Key is a weekend mostly devoted to campus parties and celebration.
The summer term was formerly marked by Tubestock, an unofficial tradition in which the students used wooden rafts and inner tubes to float on the Connecticut River. Begun in 1986, Tubestock was ended in 2006 by town ordinance. The Class of 2008, during their summer term on campus in 2006, replaced the defunct Tubestock with Fieldstock. This new celebration includes a barbecue, live music, and the revival of the 1970s and 1980s tradition of racing homemade chariots around the Green. Unlike Tubestock, Fieldstock is funded and supported by the College.
Another longstanding tradition is four-day, student-run Dartmouth Outing Club trips for incoming freshmen, begun in 1935. Each trip concludes at the Moosilauke Ravine Lodge. In 2011, over 96% of freshmen elected to participate.
Insignia and other representations
Motto and song
Dartmouth's motto, chosen by Eleazar Wheelock, is Vox clamantis in deserto. The Latin motto is literally translated as "The voice of one crying in the wilderness", but is more often rendered as "A voice crying out in the wilderness". The phrase appears five times in the Bible and is a reference to the college's location on what was once the frontier of European settlement. Richard Hovey's "Men of Dartmouth" was elected as the best of Dartmouth's songs in 1896, and became the school's official song in 1926. The song was retitled to "Alma Mater" in the 1980s when its lyrics were changed to refer to women as well as men.
Seal
Dartmouth's 1769 royal charter required the creation of a seal for use on official documents and diplomas. The college's founder, Eleazar Wheelock, designed a seal for his college bearing a striking resemblance to the seal of the Society for the Propagation of the Gospel, a missionary society founded in London in 1701, in order to maintain the illusion that his college was more for mission work than for higher education. Engraved by a Boston silversmith, the seal was ready by commencement of 1773. The trustees officially accepted the seal on August 25, 1773, describing it as:
On October 28, 1926, the trustees affirmed the charter's reservation of the seal for official corporate documents alone. The College Publications Committee commissioned noted typographer William Addison Dwiggins to create a line drawing version of the seal in 1940 that saw widespread use. Dwiggins' design was modified during 1957 to change the date from "1770" to "1769", to accord with the date of the college charter. The trustees commissioned a new set of dies with a date of "1769" to replace the old dies, now badly worn after almost two hundred years of use. The 1957 design continues to be used under trademark number 2305032.
Shield
On October 28, 1926, the trustees approved a "Dartmouth College Shield" for general use. Artist and engraver W. Parke Johnson designed this emblem on the basis of the shield that is depicted at the center of the original seal. This design does not survive. On June 9, 1944, the trustees approved another coat of arms based on the shield part of the seal, this one by Canadian artist and designer Thoreau MacDonald. That design was used widely and, like Dwiggins' seal, had its date changed from "1770" to "1769" around 1958. That version continues to be used under trademark registration number 3112676 and others.
College designer John Scotford made a stylized version of the shield during the 1960s, but it did not see the success of MacDonald's design. The shield appears to have been used as the basis of the shield of Dartmouth Medical School, and it has been reproduced in sizes as small as 20 micrometers across. The design has appeared on Rudolph Ruzicka's Bicentennial Medal (Philadelphia Mint, 1969) and elsewhere.
Nickname, symbol, and mascot
Dartmouth has never had an official mascot. The nickname "The Big Green", originating in the 1860s, is based on students' adoption of a shade of forest green ("Dartmouth Green") as the school's official color in 1866. Beginning in the 1920s, the Dartmouth College athletic teams were known by their unofficial nickname "the Indians", a moniker that probably originated among sports journalists. This unofficial mascot and team name was used until the early 1970s, when its use came under criticism. In 1974, the Trustees declared the "use of the [Indian] symbol in any form to be inconsistent with present institutional and academic objectives of the College in advancing Native American education". Some alumni and students, as well as the conservative student newspaper, The Dartmouth Review, have sought to return the Indian symbol to prominence, but never succeeded in doing so.
Various student initiatives have been undertaken to adopt a mascot, but none has become "official". One proposal devised by the college humor magazine the Dartmouth Jack-O-Lantern was Keggy the Keg, an anthropomorphic beer keg who makes occasional appearances at college sporting events. Despite student enthusiasm for Keggy, the mascot has received approval from only the student government. In November 2006, student government attempted to revive the "Dartmoose" as a potential replacement amid renewed controversy surrounding the former unofficial Indian mascot.
Alumni
Dartmouth's alumni are known for their devotion to the college. Most start by giving to the Senior Class Gift. According to a 2008 article in The Wall Street Journal based on data from payscale.com, Dartmouth graduates also earn higher median salaries at least 10 years after graduation than alumni of any other American university surveyed.
By 2008, Dartmouth had graduated 238 classes of students, and had over 60,000 living alumni in a variety of fields. Finance, consulting, and technology have consistently been the most popular industries to enter for students. Top employers of new graduates include Goldman Sachs, Morgan Stanley, McKinsey & Company, Bain & Company, Amazon, Microsoft, Google, and Teach for America. The most common graduate and professional schools for Dartmouth undergraduates include other members of the Ivy Plus, Icahn School of Medicine, NYU, Oxford, and Cambridge.
Nelson A. Rockefeller, 41st Vice President of the United States and 49th Governor of New York, graduated cum laude from Dartmouth with a degree in economics in 1930. Over 164 Dartmouth graduates have served in the United States Senate and United States House of Representatives, such as Massachusetts statesman Daniel Webster. Cabinet members of American presidents include Attorney General Amos T. Akerman, Secretary of Defense James V. Forrestal, Secretary of Labor Robert Reich, Secretary of the Treasury Henry Paulson, and Secretary of the Treasury Timothy Geithner. C. Everett Koop was the Surgeon General of the United States under President Ronald Reagan. Two Dartmouth alumni have served as justices on the Supreme Court of the United States: Salmon P. Chase and Levi Woodbury. Eugene Norman Veasey (class of 1954) served as the Chief Justice of Delaware. The 46th Governor of Pennsylvania, Tom Wolf; the 42nd Governor of Illinois, businessman Bruce Rauner; and the 31st governor and current senator from North Dakota, John Hoeven (R), are also Dartmouth alumni. Ernesto de la Guardia, class of 1925, was president of the Republic of Panama.
In literature and journalism, Dartmouth has produced 13 Pulitzer Prize winners: Thomas M. Burton, Richard Eberhart, Dan Fagin, Paul Gigot, Frank Gilroy, Jake Hooker, Nigel Jaquiss, Joseph Rago, Martin J. Sherwin, David K. Shipler, David Shribman, Justin Harvey Smith and Robert Frost. Frost, who received four Pulitzer Prizes for Poetry in his lifetime, attended but did not graduate from Dartmouth; he is, however, the only person to have received two honorary degrees from Dartmouth.
Other authors and media personalities include CNN Chief White House correspondent and Anchor Jake Tapper, novelist and founding editor of The Believer Heidi Julavits, "Dean of rock critics" Robert Christgau, National Book Award winners Louise Erdrich and Phil Klay, novelist/screenwriter Budd Schulberg, political commentator Dinesh D'Souza, radio talk show host Laura Ingraham, commentator Mort Kondracke, and journalist James Panero. Norman Maclean, professor at the University of Chicago and author of A River Runs Through It and Other Stories, graduated from Dartmouth in 1924. Theodor Geisel, better known as children's author Dr. Seuss, was a member of the class of 1925.
In the area of religion and theology, Dartmouth alumni include priests and ministers Ebenezer Porter, Jonathan Clarkson Gibbs, Caleb Sprague Henry, Arthur Whipple Jenks, Solomon Spalding, and Joseph Tracy; and rabbis Marshall Meyer, Arnold Resnicoff, and David E. Stern. Hyrum Smith, brother of Mormon Prophet Joseph Smith, attended the college in his teens. He was Patriarch of the LDS Church.
Dartmouth alumni in academia include Stuart Kauffman and Jeffrey Weeks, both recipients of MacArthur Fellowships (commonly called "genius grants"). Dartmouth has also graduated three Nobel Prize winners: Owen Chamberlain (Physics, 1959), K. Barry Sharpless (Chemistry, 2001), and George Davis Snell (Physiology or Medicine, 1980). Educators include founder and first president of Bates College Oren Burbank Cheney (1839); the current chancellor of the University of California, San Diego, Marye Anne Fox (PhD. in Chemistry, 1974); founding president of Vassar College Milo Parker Jewett; founder and first president of Kenyon College Philander Chase; first professor of Wabash College Caleb Mills; president of Union College Charles Augustus Aiken. Nine of Dartmouth's 17 presidents were alumni of the college.
Dartmouth alumni serving as CEOs or company presidents and executives include Charles Alfred Pillsbury, founder of the Pillsbury Company and patriarch of the Pillsbury family, Sandy Alderson (San Diego Padres), John Donahoe (eBay), Louis V. Gerstner, Jr. (IBM), Charles E. Haldeman (Putnam Investments), Donald J. Hall Sr. (Hallmark Cards), Douglas Hodge (CEO of PIMCO accused of fraud), Jeffrey R. Immelt (General Electric), Gail Koziara Boudreaux (United Health Care), Grant Tinker (NBC), and Brian Goldner (Hasbro).
In film, entertainment, and television, Dartmouth is represented by David Benioff, co-creator, showrunner, and writer of Game of Thrones; Shonda Rhimes, creator of Grey's Anatomy, Private Practice and Scandal; Budd Schulberg, Academy Award-winning screenwriter of On the Waterfront; Michael Phillips, who won the Academy Award for best picture as co-producer of The Sting; Rachel Dratch, a former cast member of Saturday Night Live; Chris Meledandri, executive producer of Ice Age, Horton Hears a Who!, and Despicable Me; writer and director duo Phil Lord and Chris Miller; and the title character of Mister Rogers' Neighborhood, Fred Rogers. Other notable film and television figures include Sarah Wayne Callies (Prison Break), Emmy Award winner Michael Moriarty, Andrew Shue of Melrose Place, Aisha Tyler of Friends and 24, Connie Britton of Spin City and Friday Night Lights, Mindy Kaling of The Office and The Mindy Project, David Harbour of Stranger Things, and Michelle Khare of HBO Max's Karma.
A number of Dartmouth alumni have found success in professional sports. In baseball, Dartmouth alumni include All-Star and three-time Gold Glove winner and manager Brad Ausmus, All-Star reliever Mike Remlinger, and pitcher Kyle Hendricks. Professional football players include Miami Dolphins quarterback Jay Fiedler, linebacker Reggie Williams, three-time Pro Bowler Nick Lowery, quarterback Jeff Kemp, and Tennessee Titans tight end Casey Cramer, plus Miami Dolphins defensive coordinator Matt Burke. Dartmouth has also produced a number of Olympic competitors. Adam Nelson won the silver medal in the shot put in the 2000 Sydney Olympics and the gold medal at the 2004 Athens Olympics to go along with his gold medal in the 2005 World Championships in Athletics in Helsinki. Kristin King and Sarah Parsons were members of the United States' 2006 bronze medal-winning ice hockey team. Cherie Piper, Gillian Apps, and Katie Weatherston were among Canada's ice hockey gold medalists in 2006.
Dick Durrance and Tim Caldwell competed for the United States in skiing in the 1936 and 1976 Winter Olympics, respectively. Arthur Shaw, Earl Thomson, Edwin Myers, Marc Wright, Adam Nelson, Gerry Ashworth, and Vilhjálmur Einarsson have all won medals in track and field events. Former heavyweight rower Dominic Seiterle is a member of the Canadian national rowing team and won a gold medal at the 2008 Summer Olympics in the men's 8+ event.
In popular culture
Dartmouth College has appeared in or been referenced by a number of popular media. Some of the most prominent include:
The 1978 comedy film National Lampoon's Animal House, was co-written by Chris Miller '63 and is based loosely on a series of stories he wrote about his fraternity days at Dartmouth. In a CNN interview, John Landis said the movie was "based on Chris Miller's real fraternity at Dartmouth", Alpha Delta Phi.
Dartmouth's Winter Carnival tradition was the subject of the 1939 film Winter Carnival starring Ann Sheridan and written by Budd Schulberg '36 and F. Scott Fitzgerald.
In the 1969 crime novel The Godfather, by Mario Puzo, Michael Corleone attended Dartmouth College, where he met his future second wife, Kay Adams.
In the 1968 film, The Thomas Crown Affair, Steve McQueen plays a thrill-seeking millionaire Dartmouth alumnus whose hobby is bank robbery.
The fictional character, Stephen T. Colbert, is a member of the Dartmouth Class of 1986.
References
Further reading
Behrens, Richard K., "From the Connecticut Valley to the West Coast: The Role of Dartmouth College in the Building of the Nation," Historical New Hampshire, 63 (Spring 2009), 45–68.
(Read and download public domain copy via Google Books .)
Listen, Look, Likeness: examining the portraits of Félix de la Concha 2009 ArtsEditor.com article
External links
Dartmouth Athletics website
1769 establishments in the Thirteen Colonies
Colonial colleges
Educational institutions established in 1769
Universities and colleges in Grafton County, New Hampshire
Private universities and colleges in New Hampshire
Tribal colleges and universities
Antebellum educational institutions that admitted African Americans
Buildings and structures in Hanover, New Hampshire |
14767837 | https://en.wikipedia.org/wiki/Marcos%20Galv%C3%A3o | Marcos Galvão | Marcos Galvão (born 23 June 1981) is a Brazilian professional mixed martial artist currently competing in the Featherweight division of the Professional Fighters League. A professional competitor since 2003, Galvão peaked at a global ranking of No. 2 among Bantamweights in August 2007 and has also formerly competed for the WEC, Shooto, Jungle Fight, and Bellator, where he is the former Bantamweight World Champion. Galvao's nickname "Louro" means "blonde" in Portuguese, because he often dyes his hair this color.
Background
Marcos Galvão was born and raised in the city of Manaus located in the state of Amazonas, Brazil. Marcos began practicing Judo when he was 11 years old before transitioning into Brazilian Jiu-Jitsu shortly after, training under Master Nonato Machado until moving to Rio de Janeiro at the age of 13. It was in Rio de Janeiro where Lôro started training heavily in Mixed Martial Arts and where he received his black belt in Brazilian Jiu-Jitsu from the hands of Nova União founder André Pederneiras who would be his coach for the most part of his career. It was under Dedé's guidance that Lôro started making a mark in the sports lower ranks, earning a few very important titles in the blue, purple and brown belt divisions, including an impressive world title at brown belt at the age of 16, being one of the youngest competitors to ever win the competition at the brown belt level. In 2003 Marcos was awarded his black belt, and shortly after he started pursuing a career in mixed martial arts. After a good start fighting in organizations like Shooto and traveling to Japan where he amounted wins that carried him to the WEC (considered at the time, the prime organization for MMA lighter weight competitors), Galvão hit a rough slope, and lost two fights in a row at the WEC. That was when his good friend Vítor Ribeiro invited Galvão to come to New York and start training with him, Lôro gladly accepted the offer and moved to the United States, where he trained full-time at Long Island MMA and also Church Street Boxing Gym with striking coach Jason Strout. Lôro thrived in this new environment that coupled with his determination, and dedication to the sport, earned him a Bellator Bantamweight Tournament win, after a few Grappler's Quest and NAGA competitions and wins, plus wins in Washington Combat and the New Jersey based organization Ring of Combat, where he won the Featherweight championship title. After a few hurdles in his career, injuries, including facing-off against one of his teammates, and deciding to change teams due to training difficulties, Lôro defeated Joe Warren and earned the Bellator Bantamweight title.
Mixed martial arts career
Shooto
Galvao made his professional debut in 2003 for the Japanese Shooto organization, where he competed primarily, compiling a record of 6-1 before being signed by the WEC.
WEC
Galvão made his WEC and U.S. debut at WEC 31 against Brian Bowles. Galvão lost the fight via KO in the second round, and then took a fight outside of the WEC before returning to the promotion. He returned to suffer another KO loss, this time to Damacio Page at WEC 39.
Shooto Title Fight
Following a loss in his WEC debut to Bowles, Galvão returned to Japan to challenge the undefeated Shooto Bantamweight Champion Masakatsu Ueda. The fight ended in a draw, resulting in Ueda retaining the title.
Bellator MMA
Galvão was a part of the main event for Bellator 41 against Joe Warren, the Bellator Featherweight Champion. The fight was contested at a Catchweight of 137 lbs. In the fight Galvão negated a majority of Warren's offense for the first two rounds by showing strong takedown defense, taking down Warren multiple times, taking Warren's back, and executing good knees from the clinch. In the third round he was taken down by Warren and controlled throughout the round. At the end of the fight, Bellator color commentator, Jimmy Smith, believed Galvão won the fight 29-28. Along with Smith, many top MMA sites, (MMAJunkie, Sherdog, MMAFighting, MMASpot), all believed that Galvão won the fight by 29-28. It was then announced that Warren had won the fight via unanimous decision (30-27, 29-28, 29-28).
During an MMAJunkie radio interview with Bellator CEO, Bjorn Rebney, Rebney confirmed that Galvão will take part in the Bellator Season Five Bantamweight Tournament. Galvao fought former WEC Bantamweight Champion Chase Beebe in a quarterfinal match-up on 24 September 2011 and won via split decision. In the semifinals, Galvão lost a very close fight against Cuban Alexis Vila at Bellator 55, losing by split decision (29-28, 29-28, 27-30). Though Galvao lost the fight, he still received his win bonus.
Galvão returned for the Bellator Season Six Bantamweight Tournament. He won his quarterfinal and semifinal fights against Ed West and Travis Marx respectively before reaching the finals. It was there that he scored a second round TKO against Luis Nogueira to win the tournament.
His next fight was against his good friend and teammate Eduardo Dantas for the Bellator Bantamweight Championship. He lost via knockout in the second round.
In his next bout for the promotion, Galvão faced Tom McKenna at Bellator 108. Galvão defeated McKenna in the second round due to strikes.
Galvão then faced Thomas Vasquez at Bellator 118 on 2 May 2014. Galvão used takedowns and ground-and-pound to defeat Vasquez via unanimous decision.
Galvão challenged Joe Warren for the Bellator Bantamweight Championship in a rematch on 27 March 2015 at Bellator 135. He won the fight via verbal submission in the second round after Warren screamed out in pain causing the referee to stop the fight. This marked the first submission win of Galvão's career and avenged his previous loss to Warren.
Galvão was scheduled to face former teammate Eduardo Dantas in a rematch for the Bellator Bantamweight Championship title at Bellator 150, but the match was scrapped following a last-minute illness suffered by Galvao. Prior, the rematch was expected to take place at Bellator 144, however, this was cancelled, after an injury to Dantas. The rematch eventually took place on 17 June 2016 at Bellator 156. Galvão lost the match by unanimous decision.
Following the loss of his title, Galvão defeated L.C. Davis via split decision at Bellator 166 on 2 December 2016.
Moving up to the featherweight division, Galvão faced Emmanuel Sanchez at Bellator 175 on 31 March 2017. He lost the fight via unanimous decision.
Again fighting at featherweight, Galvão returned at Bellator 189 on 1 December 2017 against UFC veteran, Sam Sicilia. He lost the fight via unanimous decision.
Galvao's Bellator contract expired in February 2018 and he is now a free agent.
Championships and accomplishments
Bellator MMA
Bellator Bantamweight World Championship (One time)
Bellator Season Six Bantamweight Tournament Winner
MMAJunkie.com
2015 March Submission of the Month vs. Joe Warren
Mixed martial arts record
|-
|Loss
|align=center|18–12–1
|Elvis Silva
| Decision (unanimous)
| Shooto Brazil 91
|
|align=center|3
|align=center|5:00
|Rio de Janeiro, Brazil
|
|-
|Loss
|align=center|18–11–1
|Max Coga
| TKO (punches)
| PFL 4
|
|align=center|3
|align=center|2:19
|Uniondale, New York, United States
|
|-
|Loss
|align=center|18–10–1
|Nazareno Malegarie
| Decision (Unanimous)
| PFL 1
|
|align=center|3
|align=center|5:00
|New York City, New York, United States
|
|-
|Loss
|align=center|18–9–1
|Sam Sicilia
|Decision (unanimous)
|Bellator 189
|
|align=center|3
|align=center|5:00
|Thackerville, Oklahoma, United States
|
|-
|Loss
|align=center| 18–8–1
|Emmanuel Sanchez
| Decision (unanimous)
|Bellator 175
|
|align=center|3
|align=center|5:00
|Rosemont, Illinois, United States
|
|-
|Win
|align=center| 18–7–1
|LC Davis
| Decision (split)
|Bellator 166
|
|align=center|3
|align=center|5:00
|Thackerville, Oklahoma, United States
|
|-
|Loss
|align=center| 17–7–1
|Eduardo Dantas
| Decision (unanimous)
|Bellator 156
|
|align=center|5
|align=center|5:00
|Fresno, California, United States
|
|-
|Win
|align=center| 17–6–1
|Joe Warren
|Verbal Submission (kneebar)
|Bellator 135
|
|align=center|2
|align=center|0:45
|Thackerville, Oklahoma, United States
|
|-
| Win
| align=center| 16–6–1
| Thomas Vasquez
| Decision (unanimous)
| Bellator 118
|
| align=center| 3
| align=center| 5:00
| Atlantic City, New Jersey, United States
|
|-
| Win
| align=center| 15–6–1
| Tom McKenna
| TKO (punches)
| Bellator 108
|
| align=center| 1
| align=center| 4:29
| Atlantic City, New Jersey, United States
|
|-
| Win
| align=center| 14–6–1
| Shely Santana
| TKO (punches)
| Shooto Brazil: Manaus
|
| align=center| 2
| align=center| 2:00
| Manaus, Amazonas, Brazil
|
|-
| Loss
| align=center| 13–6–1
| Eduardo Dantas
| KO (punches)
| Bellator 89
|
| align=center| 2
| align=center| 3:01
| Charlotte, North Carolina, United States
|
|-
| Win
| align=center| 13–5–1
| Luis Nogueira
| TKO (elbows)
| Bellator 73
|
| align=center| 2
| align=center| 4:20
| Tunica, Mississippi, United States
|
|-
| Win
| align=center| 12–5–1
| Travis Marx
| Decision (unanimous)
| Bellator 68
|
| align=center| 3
| align=center| 5:00
| Atlantic City, New Jersey, United States
|
|-
| Win
| align=center| 11–5–1
| Ed West
| Decision (unanimous)
| Bellator 65
|
| align=center| 3
| align=center| 5:00
| Atlantic City, New Jersey, United States
|
|-
| Loss
| align=center| 10–5–1
| Alexis Vila
| Decision (split)
| Bellator 55
|
| align=center| 3
| align=center| 5:00
| Yuma, Arizona, United States
|
|-
| Win
| align=center| 10–4–1
| Chase Beebe
| Decision (split)
| Bellator 51
|
| align=center| 3
| align=center| 5:00
| Canton, Ohio, United States
|
|-
| Loss
| align=center| 9–4–1
| Joe Warren
| Decision (unanimous)
| Bellator 41
|
| align=center| 3
| align=center| 5:00
| Yuma, Arizona, United States
|
|-
| Win
| align=center| 9–3–1
| Ryan Vaccaro
| Decision (unanimous)
| Ring of Combat 33
|
| align=center| 3
| align=center| 5:00
| Atlantic City, New Jersey, United States
|
|-
| Win
| align=center| 8–3–1
| Jacob Kirwan
| Decision (unanimous)
| Ring of Combat 31
|
| align=center| 3
| align=center| 4:00
| Atlantic City, New Jersey, United States
|
|-
| Win
| align=center| 7–3–1
| David Derby
| TKO (punches)
| Washington Combat: Battle of the Legends
|
| align=center| 1
| align=center| 1:37
| Washington, District of Columbia, United States
|
|-
| Loss
| align=center| 6–3–1
| Damacio Page
| KO (punches)
| WEC 39
|
| align=center| 1
| align=center| 0:18
| Corpus Christi, Texas, United States
|
|-
| Draw
| align=center| 6–2–1
| Masakatsu Ueda
| Draw
| Shooto: Shooto Tradition 3
|
| align=center| 3
| align=center| 5:00
| Tokyo, Japan
|
|-
| Loss
| align=center| 6–2
| Brian Bowles
| KO (punch)
| WEC 31
|
| align=center| 2
| align=center| 2:09
| Las Vegas, Nevada, United States
|
|-
| Win
| align=center| 6–1
| Kenji Osawa
| Decision (majority)
| Shooto: Back To Our Roots 3
|
| align=center| 3
| align=center| 5:00
| Tokyo, Japan
|
|-
| Win
| align=center| 5–1
| Naoya Uematsu
| Decision (unanimous)
| Fury FC 1: Warlords Unleashed
|
| align=center| 3
| align=center| 5:00
| Sao Paulo, Brazil
|
|-
| Win
| align=center| 4–1
| Fredson Paixão
| Decision (unanimous)
| Jungle Fight 6
|
| align=center| 3
| align=center| 5:00
| Manaus, Brazil
|
|-
| Loss
| align=center| 3–1
| Akitoshi Hokazono
| Decision (unanimous)
| Shooto: 9/23 in Korakuen Hall
|
| align=center| 3
| align=center| 5:00
| Tokyo, Japan
|
|-
| Win
| align=center| 3–0
| Jin Akimoto
| Decision (unanimous)
| Shooto: 9/26 in Kourakuen Hall
|
| align=center| 3
| align=center| 5:00
| Tokyo, Japan
|
|-
| Win
| align=center| 2–0
| Shuichiro Katsumura
| Decision (unanimous)
| Shooto 2004: 1/24 in Korakuen Hall
|
| align=center| 3
| align=center| 5:00
| Tokyo, Japan
|
|-
| Win
| align=center| 1–0
| Masato Shiozawa
| Decision (majority)
| Shooto: 5/4 in Korakuen Hall
|
| align=center| 3
| align=center| 5:00
| Tokyo, Japan
|
Personal
Galvão is married to his wife Paula. The couple currently reside in New York City where Galvão trains and teaches Brazilian jiu-jitsu.
References
External links
Marcos Galvao at PFL
1981 births
Living people
Brazilian male mixed martial artists
Bantamweight mixed martial artists
Mixed martial artists utilizing Brazilian jiu-jitsu
Brazilian practitioners of Brazilian jiu-jitsu
Brazilian emigrants to the United States
People awarded a black belt in Brazilian jiu-jitsu
People from Long Island City, Queens
Bellator MMA champions |
81927 | https://en.wikipedia.org/wiki/Diomedes | Diomedes | Diomedes () or Diomede (; ) is a hero in Greek mythology, known for his participation in the Trojan War.
He was born to Tydeus and Deipyle and later became King of Argos, succeeding his maternal grandfather, Adrastus. In Homer's Iliad Diomedes is regarded alongside Ajax the Great and Agamemnon, after Achilles, as one of the best warriors of all the Achaeans in prowess (which is especially made clear in Book 7 of the Iliad when Ajax the Greater, Diomedes, and Agamemnon are the most wished for by the Achaeans to fight Hector out of nine volunteers, who included Odysseus and Ajax the Lesser). Subsequently, Diomedes founded ten or more Italian cities and, after his death, was worshipped as a divine being under various names in both Italy and Greece.
Early myths
Diomedes was, on his father's side, an Aetolian, and on his mother's an Argive. His father, Tydeus, was himself of royal blood, being the son of Oeneus, the king of Calydon. He had been exiled from his homeland for killing his relatives, either his cousins or his paternal uncles. In any case, Tydeus was exiled, and he found refuge at Argos, where the king, Adrastus, offered him hospitality, even giving him his daughter, Deipyle, to be his wife. The two were happily married and had two children together—a daughter, Comaetho, and a son, Diomedes.
Sometime later, Polynices, a banished prince of Thebes, arrived in Argos; he approached Adrastus and pleaded his case to the king, as he requested his aid to restore him to his original homeland. Adrastos promised to do so and set out to gather an expeditionary force with which to march against Thebes. This force was made up of seven individual champions, each assigned to lead an assault on one of the seven gates of the city; Tydeus, Polynices and Adrastus were among them. Together, these champions were known as the Seven against Thebes.
The expedition proved to be a complete disaster, however, as all seven of the Argive champions were killed in the ensuing battle, except for Adrastus, who escaped thanks to his horse Arion, who was the fastest of all of his brethren. Diomedes' father, Tydeus, was among those who had been slain.
Tydeus was Athena's favourite warrior at the time, and when he was dying she wanted to offer him a magic elixir (which she had obtained from her father) that would make him immortal. However, she withdrew the intended privilege in apparent disgust when Tydeus gobbled down the brains of the hated enemy who had wounded him.
According to some, Diomedes was four years old when his father was killed. At the funeral of their fathers, the sons of the seven fallen champions (Aegialeus, Alcmaeon, Amphilocus, Diomedes, Euryalus, Promachus, Sthenelus, and Thersander) met and vowed to vanquish Thebes in order to avenge their fathers. They were called "the Epigoni" because they were born "after everything has happened".
Ten years later, the Epigoni set out to launch another expedition against Thebes, appointing Alcmaeon as their commander-in-chief. They strengthened their initial forces with contingents from Messenia, Arcadia, Corinth, and Megara. This army, however, was still small compared to that of Thebes.
The war of the Epigoni is remembered as the most important expedition in Greek mythology prior to the Trojan War. It was a favorite topic for epics, but, unfortunately, all of these epics are now lost. The main battle took place at Glisas where Prince Aegialeus (son of Adrastus and heir to the throne) was slain by King Laodamas, who was in turn killed by Alcmaeon. With their king dead, the Thebans, believing this to be the end for them, sought counsel from the seer Tiresias, who urged them to flee the city. They did so, and, faced with no opposition, the Epigoni entered the city, plundering its treasures and tearing down its great walls. Having achieved their objective, the Epigoni returned home, but not before they installed Thersander, son of the fallen prince Polynices (the instigator of the first Theban expedition), as the city's new ruler.
As Diomedes and the Argive forces travelled home, an elderly King Adrastus died of grief upon learning that his son Aegialeus had perished in the battle; as such, Diomedes was left as the last of Adrastus' male descendants. That being so, upon returning home to Argos, Diomedes ascended to the throne. In order to secure his grasp on the throne, Diomedes married Aegialeus' daughter, Princess Aegialia.
According to some, Diomedes ruled Argos for more than five years and brought much wealth and stability to the city during his time. He was a skilled politician and was greatly respected by other rulers. He still kept an eye on Calydonian politics (his father's homeland), and when the sons of Agrius (led by Thersites) put Oeneus (Diomedes’ grandfather) in jail and their own father on the throne, Diomedes decided to restore Oeneus to the throne.
Diomedes attacked and seized the kingdom, slaying all the traitors except Thersites, Onchestus (who escaped to Peloponnesus) and Agrius (who killed himself) restoring his grandfather to the throne. Later, Oeneus passed the kingdom to his son-in-law, Andraemon, and headed to Argos to meet Diomedes. He was assassinated on the way (in Arcadia) by Thersites and Onchestus. Unable to find the murderers, Diomedes founded a mythical city called "Oenoe" at the place where his grandfather was buried to honour his death. Later, Thersites fought against the Trojans in the Trojan War and noble Diomedes did not mistreat him (however, Thersites was hated by all the other Achaeans). In fact, when Thersites was brutally slain by Achilles (after having mocked him when the latter cried over Penthesilia's dead body), Diomedes was the only person who wanted to punish Achilles.
According to Hyginus and Pseudo-Apollodorus, Diomedes became one of the suitors of Helen and, as such, he was bound by the oath of Tyndareus, which established that all the suitors would defend and protect the man who was chosen as Helen's husband against any wrong done against him in regard to his marriage. Accordingly, when the Trojan prince Paris stole Menelaus' wife, all those who had sworn the oath were summoned by Agamemnon (Menelaus’ brother), so that they would join the coalition that was to sail from Aulis to Troy in order to retrieve Helen and the Spartan property that was stolen. However, Hesiod does not include Diomedes in his list of suitors. It's possible that labelling Diomedes a suitor of Helen was a later addition, extrapolated from his name being listed in the Catalogue of Ships. If, in fact, Helen ruled Sparta with her husband Menelaus for ten years before her abduction, Diomedes would have still been a child at the time of their marriage and thus a very unlikely suitor.
Trojan War
Diomedes is known primarily for his participation in the Trojan War. According to Homer, Diomedes enters the war with a fleet of 80 ships, third only to the contributions of Agamemnon (100 ships) and Nestor (90). Both Sthenelus and Euryalus (former Epigoni) fought under his command with their armies. Sthenelus was the driver of Diomedes’ chariot and probably his closest friend. All the troops from Argos, Tiryns, Troezen and some other cities were headed by Diomedes.
Diomedes' place among Achaeans
Although he was the youngest of the Achaean kings, Diomedes is considered the most experienced leader by many scholars (he had fought more battles than others, including the most important war expedition before the Trojan War – even old Nestor had not participated in such military work).
Second only to Achilles, Diomedes is considered to be the mightiest and the most skilled warrior among the Achaeans. He was overwhelming Telamonian Ajax in an armed sparring contest when the watching Achaeans bade the men to stop and take equal prizes because they feared for Ajax's life. Ajax gave Diomedes the prize (long sword) because Diomedes drew the first blood. He vanquished (and could have killed) Aeneas (the second best Trojan warrior) once.
He and Odysseus were the only Achaean heroes who participated in covert military operations that demanded discipline, bravery, courage, cunning, and resourcefulness.
Diomedes received the most direct divine help and protection. He was the favorite warrior of Athena (who even drove his chariot once). He was also the only hero except Heracles, son of Zeus, that attacked—and even wounded—Olympian gods (most notably Ares, whom he struck with his spear). Once, he was even granted divine vision in order to identify immortals.
Only Diomedes and Menelaus were offered immortality and became gods in post-Homeric mythology.
Weapons
The god Hephaestus made Diomedes' cuirass for him. He was the only Achaean warrior apart from Achilles who carried such an arsenal of gear made by Hera's son. He also had a round shield with the mark of a boar. In combat, he also carried a spear as well as his father's sword. His golden armor bore a crest of a boar on the breast. It was created by a mortal smith but was blessed by Athena, who gave it to Tydeus. When he died, it passed to Diomedes. A skilled smith created the sword for Tydeus, which bore designs of a lion and a big boar.
Diomedes in Aulis
In Aulis, where the Achaean leaders gathered, Diomedes met his brother in arms Odysseus, with whom he shared several adventures. Both of them were favorite heroes of Athena and each shared characteristics of their patron goddess – Odysseus her wisdom and cunning, and Diomedes her courage and skill in battle; though neither was wholly bereft of either aspect. They began to combine their efforts and actions already when being in Aulis.
When the sacrifice of Iphigenia (Agamemnon's daughter) became a necessity for the Achaeans to sail away from Aulis, King Agamemnon had to choose between sacrificing his daughter and resigning from his post of high commander among Achaeans. When he decided to sacrifice his daughter to Artemis, Odysseus carried out this order of Agamemnon by luring Iphigenia from Mycenae to Aulis, where murder, disguised as wedding, awaited her.<ref>Dictys Cretensis, Journal of the Trojan War 1.20</ref> According to Hyginus, Diomedes went with Odysseus to fetch Iphigenia, making this the two companions' first mission together. However, Pseudo-Apollodorus has Agamemnon send Odysseus and Talthybius instead. According to Euripides, neither of the two went to fetch Iphigenia, though he calls the plan Odysseus' idea in Iphigenia at Taurus.
Palamedes
Once in Troy, Odysseus murdered Palamedes (the commander who outwitted Odysseus in Ithaca, proving him to be feigning insanity and thus forcing him to stand by his oath and join the alliance), drowning him while he was fishing. According to other stories, when Palamedes advised the Achaeans to return home, Odysseus accused him of being a traitor and forged false evidence and found a fake witness to testify against him, whereupon Palamedes was stoned to death.
Some say that both Diomedes and Odysseus drowned Palamedes. Another version says that he conspired with Odysseus against Palamedes, and under the pretence of having discovered a hidden treasure, they let him down into a well and there stoned him to death. Others say that, though Diomedes guessed or knew about the plot, he did not try to defend Palamedes, because Odysseus was essential for the fall of Troy.
Diomedes in the Iliad
Diomedes is one of the main characters in the Iliad. This epic narrates a series of events that took place during the final year of the great war. Diomedes is the key fighter in the first third of the epic. According to some interpretations, Diomedes is represented in the epic as the most valiant soldier of the war, who avoids committing hubris. He is regarded as the perfect embodiment of traditional heroic values. While striving to become the best warrior and attain honor and glory, he does not succumb to the madness which 'menos' might entail.
He was the only human except for Heracles, to be granted strength (with permission) to directly fight with immortals themselves and injures two Olympian immortals (both Ares and Aphrodite) in a single day. However, he still displays self-restraint and humility to retreat before Ares and give way to Apollo thus remaining within mortal limits. This is in contrast to Patroclus (who does not give way when opposed by Apollo) and Achilles (who resorts to fight the river Scamander on his own).
His character also helps to establish one of the main themes of the epic; how human choices and efforts become insignificant when fate and immortals are in control. Diomedes follows Homeric tradition closely and having absolute faith on the superiority of fate, he predicts the conclusion of Achilles' efforts to go against fate.
Apart from his outstanding fighting abilities and courage, Diomedes is on several crucial occasions shown to possess great wisdom, which is acknowledged and respected by his much older comrades, including Agamemnon and Nestor. Diomedes, Nestor and Odysseus were some of the greatest Achaean strategists. Throughout the Iliad, Diomedes and Nestor are frequently seen speaking first in war-counsel.
Instances of Diomedes' maturity and intelligence as described in parts of the epic:
In Book IV Agamemnon taunts Diomedes by calling him a far inferior fighter compared to his father. His enraged comrade Sthenelus urges Diomedes to stand up to Agamemnon by responding that he has bested his father and avenged his death by conquering Thebes. Diomedes responded that it was part of Agamemnon's tasks as a leader to urge forward the Achaean soldiers, and that men of valour should have no problem withstanding such insults. However, when Agamemnon earlier uses the same kind of taunting on Odysseus, he responds with anger.
Although Diomedes dismissed Agamemnon's taunting with respect, he did not hesitate to point out Agamemnon's inadequacy as a leader in certain crucial situations. In Book IX, Agamemnon proposes going back to Hellas because Zeus has turned against them. Diomedes then reminds him of the previous insult and tells him that his behavior is not proper for a leader. Achaean council – Book IX
Diomedes points out that because Troy is destined to fall, they should continue fighting regardless of Zeus’ interventions. Fate and Gods were with Achaeans at the start and therefore Zeus’ interventions could only be temporary. Even if all other Achaeans have lost their faith and goes home, he and Sthenelus would still remain and continue to fight till Troy is sacked.
"The sons of the Achaeans shouted applause at the words of Diomedes, and presently Nestor rose to speak. 'Son of Tydeus,' said he, 'in war your prowess is beyond question, and in council you excel all who are of your own years; no one of the Achaeans can make light of what you say nor gainsay it, but you have not yet come to the end of the whole matter. You are still young- you might be the youngest of my own children—still you have spoken wisely and have counselled the chief of the Achaeans not without discretion;'" Achaean council – Book IX
When Agamemnon tried to appease Achilles's wrath so that he would fight again, by offering him many gifts, Nestor appointed three envoys to meet Achilles (Book IX). They had to return empty handed; Achilles had told them that he will leave Troy and never return. The Achaeans were devastated at this. Diomedes points out the folly of offering these gifts which ultimately served only to encourage Achilles' pride to the level that he now wishes to defy fate. Diomedes then makes a prediction (based on Homeric tradition) that eventually becomes true. He says that even if Achilles somehow manages to leave Troy, he will never be able to stay away from battle because human efforts and choice cannot defy fate; "let him go or stay—the gods will make sure that he will fight." In Book XV, Zeus says to Hera that he had already made a plan to make sure that Achilles will eventually enter the battle.
Diomedes also encourages Agamemnon to take the lead of next day's battle. "But when fair rosy-fingered morn appears, forthwith bring out your host and your horsemen in front of the ships, urging them on, and yourself fighting among the foremost." (Book IX) Agamemnon accepts this counsel and the next day's battle starts with his "aristeia" where he becomes the hero of the day.
Diomedes' aristeia ("excellence"—the great deeds of a hero) begins in Book V and continues in Book VI. This is the longest aristeia in the epic. Some scholars claim that this part of the epic was originally a separate, independent poem (describing the feats of Diomedes) that Homer adapted and included in the Iliad. Diomedes' aristeia represents many of his heroic virtues such as outstanding fighting skills, bravery, divine protection/advice, carefully planned tactics of war, leadership, humility and self-restraint.
Book V
Book V begins with Athena, the war-like goddess of wisdom putting valour into the heart of her champion warrior. She also makes a stream of fire flare from his shield and helmet. Diomedes then slays a number of Trojan warriors including Phegeus (whose brother was spirited away by Hera's son, Hephaestus before being slain by Diomedes) until Pandarus wounds him with an arrow. Diomedes then prays to Athena for the slaughter of Pandarus. She responds by offering him a special vision to distinguish gods from men and asks him to wound Aphrodite if she ever comes to battle. She also warns him not to engage any other god.
He continues to make havoc among the Trojans by killing Astynous, Hypeiron, Abas, Polyidus, Xanthus, Thoon, Echemmon and Chromius (two sons of Priam). Finally, Aeneas (son of Aphrodite) asks Pandarus to mount his chariot so that they may fight Diomedes together. Sthenelus warns his friend of their approach.
Diomedes faces this situation by displaying both his might and wisdom. Although he can face both of these warriors together, he knows that Aphrodite may try to save her son. He also knows the history of Aeneas' two horses (they descend from Zeus's immortal horses). Since he has to carry out Athena's order, he orders Sthenelus to steal the horses while he faces Aphrodite's son.
Pandarus throws his spear first and brags that he has killed the son of Tydeus. The latter responds by saying "at least, one of you will be slain" and throws his spear. Pandarus is killed and Aeneas is left to fight Diomedes (now unarmed). Not bothering with weapons, Diomedes picks up a huge stone and crushes his enemy's hip with it. Aeneas faints and is rescued by his mother before Diomedes can kill him. Mindful of Athena's orders, Diomedes runs after Aphrodite and wounds her arm. Dropping her son, the goddess flees towards Olympus. Apollo now comes to the rescue of the Trojan hero. Disregarding Athena's advice, Diomedes attacks Apollo three times before Apollo warns him not to match himself against immortals. Respecting Apollo, Diomedes then withdraws himself from that combat. Although he has failed in killing Aeneas, Sthenelus, following his orders, has already stolen the two valuable horses of Aeneas. Diomedes then became the owner of the second best pair of horses (after Achilles’ immortal ones) among Achaeans.
Aphrodite complained to her mother about Diomedes' handiwork. The latter reminded her of mighty Heracles (now, an Olympian himself) who held the record of wounding not one but two Olympians as a human.
The transgression of Diomedes by attacking Apollo had its consequences. Urged by Apollo, Ares came to the battlefield to help Trojans. Identifying the god of war, Diomedes protected the Achaeans by ordering them to withdraw towards their ships. Hera saw the havoc created by her son and together with Athena, she came to the Achaeans' aid. When Athena saw Diomedes resting near his horses, she mocked him, reminding him of Tydeus who frequently disobeyed her advice. Diomedes replied "Goddess, I know you truly and will not hide anything from you. I am following your instructions and retreating for I know that Ares is fighting among the Trojans". Athena answered "Diomedes most dear to my heart, do not fear this immortal or any other god for I will protect you." Throwing Sthenelus out of the chariot and mounting it herself, the goddess (who invented the chariot and taught humans to drive it) drove straight at Ares. She also put on the helmet of Hades, making her invisible to even gods. Ares saw only Diomedes in the chariot and threw his spear which was caught by Athena. Diomedes then threw his spear (which was guided by Athena) at Ares, wounding his stomach. The god screamed in a voice of ten thousand men and fled away. This was how Diomedes became the only human to wound two Olympians in a single day.
Book VI
Diomedes continued his feats by killing Axylus and Calesius. Hector's brother Helenus described Diomedes' fighting skills in this manner: "He fights with fury and fills men's souls with panic. I hold him mightiest of them all; we did not fear even their great champion Achilles, son of an immortal though he be, as we do this man: his rage is beyond all bounds, and there is none can vie with him in prowess."
Helenus then sent Hector to the city of Troy to tell their mother about what was happening. According to the instructions of Helenus, Priam's wife gathered matrons at the temple of Athena in the acropolis and offered the goddess the largest, fairest robe of Troy. She also promised the sacrifice of twelve heifers if Athena could take pity on them and break the spear of Diomedes. Athena, of course, did not grant it.
Meanwhile, one brave Trojan named Glaucus challenged the son of Tydeus to a single combat. Impressed by his bravery and noble appearance, Diomedes inquired if he were an immortal in disguise. Although Athena has previously told him not to fear any immortal, Diomedes displayed his humility by saying, "I will not fight any more immortals."
Glaucus told the story of how he was descended from Bellerophon who killed the Chimaera and the Amazons. Diomedes realized that his grandfather Oeneus hosted Bellerophon, and so Diomedes and Glaucus must also be friends. They resolved to not fight each other and Diomedes proposed exchanging their armours. Cunning Diomedes only gave away a bronze armour for the golden one he received. The phrase ‘Diomedian swap’ originated from this incident.
Book VII
Diomedes was among the nine Achaean warriors who came forward to fight Hector in a single combat. When they cast lots to choose one among those warriors, the Achaeans prayed "Father Zeus, grant that the lot fall on Ajax, or on the son of Tydeus, or upon Agamemnon." Ajax was chosen to fight Hector.
Idaeus of the Trojans came for a peace negotiation, and he offered to give back all the treasures Paris stole plus more—everything except Helen. In the Achaean council, Diomedes was the first one to speak: "Let there be no taking, neither treasure, nor yet Helen, for even a child may see that the doom of the Trojans is at hand." These words were applauded by all and Agamemnon said, "This is the answer of the Achaeans."
Book VIII
Zeus ordered all other deities to not interfere with the battle. He made the Trojans stronger so they could drive away the Achaeans from battle. Then he thundered aloud from Ida and sent the glare of his lightning upon the Achaeans. Seeing this, all the great Achaean warriors—including the two Ajaxes, Agamemnon, Idomeneus and Odysseus—took flight. Nestor could not escape because one of his horses was wounded by Paris’ arrow. He might have perished if not for Diomedes.
This incident is the best example for Diomedes’ remarkable bravery. Seeing that Nestor's life was in danger, the son of Tydeus shouted for Odysseus' help. The latter ignored his cry and ran away. Left alone in the battleground, Diomedes took his stand before Nestor and ordered him to take Sthenelus’ place. Having Nestor as the driver, Diomedes bravely rushed towards Hector. Struck by his spear, Hector's driver Eniopeus was slain. Taking a new driver, Archeptolemus, Hector advanced forward again. Zeus saw that both Hector and Archeptolemus were about to be slain by Diomedes and decided to intervene. He took his mighty Thunderbolt and shot its lightning in front of Diomedes’ chariot. Nestor advised Diomedes to turn back since no person should try to transgress Zeus’ will. Diomedes answered, "Hector will talk among the Trojans and say, 'The son of Tydeus fled before me to the ships.' This is the vaunt he will make, and may the earth then swallow me." Nestor responded, "Son of Tydeus, though Hector say that you are a coward the Trojans and Dardanians will not believe him, nor yet the wives of the mighty warriors whom you have laid low." Saying these words, Nestor turned the horses back. Hector, seeing that they had turned back from battle, called Diomedes a "woman and a coward" and promised to slay him personally. Diomedes thought three times of turning back and fighting Hector, but Zeus thundered from heaven each time.
When all the Achaean seemed discouraged, Zeus sent an eagle as a good omen. Diomedes was the first warrior to read this omen, and he immediately attacked the Trojans and killed Agelaus.
At the end of the day's battle, Hector made one more boast, "Let the women each of them light a great fire in her house, and let watch be safely kept lest the town be entered by surprise while the host is outside... I shall then know whether brave Diomed will drive me back from the ships to the wall, or whether I shall myself slay him and carry off his bloodstained spoils. Tomorrow let him show his mettle, abide my spear if he dare. I ween that at break of day, he shall be among the first to fall and many another of his comrades round him. Would that I were as sure of being immortal and never growing old, and of being worshipped like Athena and Apollo, as I am that this day will bring evil to the Argives."
These words subsequently turned out to be wrong. In spite of careful watch, Diomedes managed to launch an attack upon the sleeping Trojans. Hector was vanquished by Diomedes yet again and it was Diomedes that ended up being worshipped as an immortal.
Book IX
Agamemnon started shedding tears and proposed to abandon the war for good because Zeus was supporting the Trojans. Diomedes pointed out that this behavior was inappropriate for a leader like Agamemnon. He also declared that he will never leave the city unvanquished for the gods were originally with them. This speech signifies the nature of Homeric tradition where fate and divine interventions have superiority over human choices. Diomedes believed that Troy was fated to fall and had absolute and unconditional faith in victory.
However, this was one of the two instances where Diomedes' opinion was criticized by Nestor. He praised Diomedes’ intelligence and declared that no person of such young age could equal Diomedes in counsel. He then criticized Diomedes for not making any positive proposal to replace Agamemnon's opinion – a failure which Nestor ascribed to his youth. Nestor believed in the importance of human choices and proposed to change Achilles' mind by offering many gifts. This proposal was approved by both Agamemnon and Odysseus.
The embassy failed because Achilles himself had more faith in his own choices than fate or divine interventions. He threatened to leave Troy, never to return believing that this choice will enable him to live a long life. When the envoys returned, Diomedes criticized Nestor's decision and Achilles' pride saying that Achilles’ personal choice of leaving Troy is of no importance (therefore, trying to change it with gifts is useless). Diomedes said, "Let Achilles stay or leave if he wishes to, but he will fight when the time comes. Let’s leave it to the gods to set his mind on that." (In Book 15, Zeus tells Hera that he has already planned the method of bringing Achilles back to battle, confirming that Diomedes was right all along)
Book X
Agamemnon and Menelaus rounded up their principal commanders to get ready for battle the next day. They woke up Odysseus, Nestor, Ajax, Diomedes and Idomeneus. While the others were sleeping inside their tents, king Diomedes was seen outside his tent clad in his armour sleeping upon an ox skin, already well-prepared for any problem he may encounter at night. During the Achaean council held, Agamemnon asked for a volunteer to spy on the Trojans. Again, it was Diomedes who stepped forward.
The son of Tydeus explained "If another will go with me, I could do this in greater confidence and comfort. When two men are together, one of them may see some opportunity which the other has not caught sight of; if a man is alone he is less full of resource, and his wit is weaker." These words inspired many other heroes to step forward. Agamemnon put Diomedes in charge of the mission and asked him to choose a companion himself. The hero instantly selected Odysseus for he was loved by Athena and was quick witted. Although Odysseus had deserted Diomedes in the battlefield that very day, instead of criticizing him, the latter praised his bravery in front of others. Odysseus' words hinted that he actually did not wish to be selected.
Meanwhile, in a similar council held by Hector, not a single prince or king would volunteer to spy on Achaeans. Finally Hector managed to send Dolon, a good runner, after making a false oath (promising him Achilles' horses after the victory).
On their way to the Trojan camp, Diomedes and Odysseus discovered Dolon approaching the Achaean camp. The two kings lay among the corpses till Dolon passed them and ran after him. Dolon proved to be the better runner but Athena infused fresh strength into the son of Tydeus for she feared some other Achaean might earn the glory of being first to hit Dolon. Diomedes threw his spear over Dolon's shoulders and ordered him to stop.
Dolon gave them several valuable pieces of information. According to Dolon, Hector and the other councilors were holding conference by the monument of great Ilus, away from the general tumult. In addition, he told about a major weakness in Trojan army. Only the Trojans had watchfires; they, therefore, were awake and kept each other to their duty as sentinels; but the allies who have come from other places were asleep and left it to the Trojans to keep guard. It is never explained in the epic why Dolon, specially mentioned as a man of lesser intelligence, came to notice this flaw while Hector (in spite of all his boasting) completely missed/ignored it.
On further questioning, Diomedes and Odysseus learnt that among the various allies, Thracians were the most vulnerable for they had come last and were sleeping apart from the others at the far end of the camp. Rhesus was their king and Dolon described Rhesus’ horses in this manner; "His horses are the finest and strongest that I have ever seen, they are whiter than snow and fleeter than any wind that blows".
Having truthfully revealed valuable things, Dolon expected to be taken as a prisoner to the ships, or to be tied up, while the other two found out whether he had told them the truth or not. But Diomedes told him: "You have given us excellent news, but do not imagine you are going to get away, now that you have fallen into our hands. If we set you free tonight, there is nothing to prevent your coming down once more to the Achaean ships, either to play the spy or to meet us in open fight. But if I lay my hands on you and take your life, you will never be a nuisance to the Argives again." Having said this, Diomedes cut off the prisoner's head with his sword, without giving him time to plead for his life.
Although the original purpose of this night mission was spying on the Trojans, the information given by Dolon persuaded the two friends to plan an attack upon the Thracians. They took the spoils and set them upon a tamarisk tree in honour of Athena. Then they went where Dolon had indicated, and having found the Thracian king, Diomedes let him and twelve of his soldiers pass from one kind of sleep to another; for they were all killed in their beds, while asleep. Meanwhile, Odysseus gathered the team of Rhesus’ horses. Diomedes was wondering when to stop. He was planning to kill some more Thracians and stealing the chariot of the king with his armour when Athena advised him to back off for some other god may warn the Trojans.
This first night mission demonstrates another side of these two kings where they employed stealth and treachery along with might and bravery. In Book XIII, Idomeneus praises Meriones and claims the best warriors do in fact excel in both types of warfare, 'lokhos' (ambush) and 'polemos' (open battle). Idomeneus’ words portray ambush, "the place where the merit of men most shines through, where the coward and the resolute man are revealed", as type of warfare only for the bravest.
The first night mission also fulfills one of the prophecies required for the fall of Troy: that Troy will not fall while the horses of Rhesus feed upon its plains. According to another version of the story, it had been foretold by an oracle that if the stallions of Rhesus were ever to drink from the river Scamander, which cuts across the Trojan plain, then the city of Troy would never fall. The Achaeans never allowed the horses to drink from that river for all of them were stolen by Diomedes and Odysseus shortly after their arrival. In a different story (attributed to Pindar), Rhesus fights so well against the Achaeans that Hera sends Odysseus and Diomedes to kill him secretly at night. Another version (Virgil and Servius) says that Rhesus was given an oracle that claims he will be invincible after he and his horses drink from the Scamander. In all these versions, killing Rhesus by Diomedes was instrumental for the victory. The horses of Rhesus were given to king Diomedes.
According to some scholars, the rest of Thracians, deprived of their king, left Troy to return to their kingdom. This was another bonus of the night mission.
Book XI
In the forenoon, the fight was equal, but Agamemnon turned the fortune of the day towards the Achaeans until he got wounded and left the field. Hector then seized the battlefield and slew many Achaeans. Beholding this, Diomedes and Odysseus continued to fight with a lot of valor, giving hope to the Achaeans. The king of Argos slew Thymbraeus, two sons of Merops, and Agastrophus.
Hector soon marked the havoc Diomedes and Odysseus were making, and approached them. Diomedes immediately threw his spear at Hector, aiming for his head. This throw was dead accurate but the helmet given by Apollo saved Hector's life. Yet, the spear was sent with such great force that Hector swooned away. Meanwhile, Diomedes ran towards Hector to get his spear. Hector recovered and mingled with the crowd, by which means he saved his life from Diomedes for the second time. Frustrated, Diomedes shouted after Hector calling him a dog. The son of Tydeus, frequently referred to as the lord of war cry, was not seen speaking disrespectful words to his enemies before.
Shortly after that Paris jumped up in joy for he managed to achieve a great feat by fixing Diomedes' foot to the ground with an arrow. Dismayed at this, Diomedes said "Seducer, a worthless coward like you can inflict but a light wound; when I wound a man though I but graze his skin it is another matter, for my weapon will lay him low. His wife will tear her cheeks for grief and his children will be fatherless: there will he rot, reddening the earth with his blood, and vultures, not women, will gather round him." Under Odysseus' cover, Diomedes withdrew the arrow but unable to fight with a limp, he retired from battle.
Book XIV
The wounded kings (Diomedes, Agamemnon and Odysseus) held council with Nestor regarding the possibility of Trojan army reaching their ships. Agamemnon proposed drawing the ships on the beach into the water but Odysseus rebuked him and pointed out the folly of such council. Agamemnon said, "Someone, it may be, old or young, can offer us better counsel which I shall rejoice to hear." Wise Diomedes said, "Such a one is at hand; he is not far to seek, if you will listen to me and not resent my speaking though I am younger than any of you ... I say, then, let us go to the fight as we needs must, wounded though we be. When there, we may keep out of the battle and beyond the range of the spears lest we get fresh wounds in addition to what we have already, but we can spur on others, who have been indulging their spleen and holding aloof from battle hitherto." This council was approved by all.
Book XXIII
In the funeral games of Patroclus, Diomedes (though wounded) won all the games he played. First, he participated in the chariot race where he had to take the last place in the starting-line (chosen by casting lots). Diomedes owned the fastest horses after Achilles (who did not participate). A warrior named Eumelus took the lead and Diomedes could have overtaken him easily but Apollo (who had a grudge against him) made him drop the whip. Beholding this trick played by the sun-god, Athena reacted with great anger. She not only gave the whip back to the son of Tydeus but also put fresh strength to his horses and went after Eumelus to break his yoke. Poor Eumelus was thrown down and his elbows, mouth, and nostrils were all torn. Antilochus told his horses that there is no point trying to overtake Diomedes for Athena wishes his victory. Diomedes won the first prize – "a woman skilled in all useful arts, and a three-legged cauldron". The chariot race is considered as the most prestigious competition in the funeral games and the most formal occasion for validating the status of the elite. In this way Diomedes asserts his status as the foremost Achaean hero after Achilles.
Next, he fought with great Ajax in an armed sparring contest where the winner was to draw blood first. Ajax attacked Diomedes where his armour covered his body and achieved no success. Ajax owned the biggest armour and the tallest shield which covered most of his body leaving only two places vulnerable; his neck and armpits. So, Diomedes maneuvered his spear above Ajax's shield and attacked his neck, drawing blood. The Achaean leaders were scared that another such blow would kill Ajax and they stopped the fight. Diomedes received the prize for the victor. This is the final appearance of Diomedes in the epic.
Role as Athena's favored warrior
It is generally accepted that Athena is closest to Diomedes in the epic. For example, although both Odysseus and Diomedes were favorites of the goddess Athena, Odysseus prayed for help even before the start the above footrace, whereas Diomedes received Athena's help without having to ask. Moreover, the goddess spoke to the hero without any disguise in Book V where he could see her in the true divine form (a special vision was granted to him). Such an incident doesn't happen even in the other Homeric epic, The Odyssey, where Athena always appears to Odysseus in disguise.
Amazons
Penthesileia led a small army of Amazons to Troy for the last year of the Trojan War. Two of her warriors, named Alcibie and Derimacheia, were slain by Diomedes.
A dispute with Achilles
Penthesileia killed many Achaeans in battle. She was, however, no match for Achilles, who killed her. When Achilles stripped Penthesileia of her armour, he saw that the woman was young and very beautiful, and seemingly falls madly in love with her. Achilles then regrets killing her. Thersites mocked Achilles for his behaviour, because the hero was mourning his enemy. Enraged, Achilles killed Thersites with a single blow to his face.
Thersites was so quarrelsome and abusive in character that only his cousin, Diomedes, mourned for him. Diomedes wanted to avenge Thersites, but the other leaders persuaded the two mightiest Achaean warriors against fighting each other. Hearkening to prayers of comrades, the two heroes reconciled at last. According to Quintus Smyrnaeus, the Achaean leaders agreed to the boon of returning her body to the Trojans for her funeral pyre. According to some other sources, Diomedes angrily tossed Penthesileia's body into the river, so neither side could give her decent burial.
Antilochus' funeral games
Nestor's son was killed by Memnon, and Achilles held funeral games for Antilochus. Diomedes won the sprint.
Achilles' funeral games
After Achilles' death, the Achaeans piled him a mound and held magnificent games in his honor. According to Apollodorus, Diomedes won the footrace. Smyrnaeus says that the wrestling match between him and Ajax the Great came to a draw.
Neoptolemus
After the death of Achilles, it was prophesied that Troy could not be taken if Neoptolemus (Achilles's son) would not come and fight. According to Quintus Smyrnaeus, Odysseus and Diomedes came to Scyros to bring him to the war at Troy. According to the Epic Cycle, Odysseus and Phoenix did this.
Another prophecy
The Achaean seer Calchas prophesied that Philoctetes (whom the Achaeans had abandoned on the island of Lemnos due to the vile odour from snakebite) and the bow of Heracles are needed to take Troy. Philoctetes hated Odysseus, Agamemnon and Menelaus, because they were responsible for leaving him behind.
Diomedes and Odysseus were charged with achieving this prophecy also. Knowing that Philoctetes would never agree to come with them, they sailed to the island and stole the bow of Heracles by a trick. According to Little Iliad, Odysseus wanted to sail home with the bow but Diomedes refused to leave Philoctetes behind. Heracles (now a god) or Athena then persuaded Philoctetes to join the Achaeans again (with the promise that he will be healed) and he agreed to go with Diomedes. The bow of Heracles and the poisoned arrows were used by Philoctetes to slay Paris; this was a requirement to the fall of Troy.
According to some, Diomedes and Odysseus were sent into the city of Troy to negotiate for peace after the death of Paris.
The Palladium
After Paris' death, Helenus left the city but was captured by Odysseus. The Achaeans somehow managed to persuade the seer/warrior to reveal the weakness of Troy. The Achaeans learnt from Helenus, that Troy would not fall, while the Palladium, image or statue of Athena, remained within Troy's walls. The difficult task of stealing this sacred statue again fell upon the shoulders of Odysseus and Diomedes.
Odysseus, some say, went by night to Troy, and leaving Diomedes waiting, disguised himself and entered the city as a beggar. There he was recognized by Helen, who told him where the Palladium was. Diomedes then climbed the wall of Troy and entered the city. Together, the two friends killed several guards and one or more priests of Athena's temple and stole the Palladium "with their bloodstained hands". Diomedes is generally regarded as the person who physically removed the Palladium and carried it away to the ships. There are several statues and many ancient drawings of him with the Palladium.
According to the Little Iliad, on the way to the ships, Odysseus plotted to kill Diomedes and claim the Palladium (or perhaps the credit for gaining it) for himself. He raised his sword to stab Diomedes in the back. Diomedes was alerted to the danger by glimpsing the gleam of the sword in the moonlight. He turned round, seized the sword of Odysseus, tied his hands, and drove him along in front, beating his back with the flat of his sword. Because Odysseus was essential for the destruction of Troy, Diomedes refrained from punishing him. From this action was said to have arisen the Greek proverbial expression “Diomedes’ necessity", applied to those who act contrary to their inclination for the greater good. The expression 'Diomedeian Compulsion' also originated from this. (The incident was commemorated in 1842 by the French sculptor Pierre-Jules Cavelier in a muscle-bound plaster statue).
Diomedes took the Palladium with him when he left Troy. According to some, he brought it to Argos where it remained until Ergiaeus, one of his descendants, took it away with the assistance of the Laconian Leagrus, who conveyed it to Sparta. Others say that he brought it to Italy. Some say that Diomedes was robbed of the palladium by Demophon in Attica, where he landed one night on his return from Troy, without knowing where he was. According to another tradition, the Palladium failed to bring Diomedes any luck due to the unrighteous way he obtained it. He was informed by an oracle, that he should be exposed to unceasing sufferings unless he restored the sacred image to the Trojans. Therefore, he gave it back to his enemy, Aeneas.
Stealing the Palladium after killing the priests was viewed as the greatest transgression committed by Diomedes and Odysseus by Trojans. Odysseus used this sentiment to his advantage when he invented the Trojan Horse stratagem.
The Wooden Horse
This stratagem invented by Odysseus made it possible to take the city. Diomedes was one of the warriors inside. He slew many Trojan warriors inside the city.
According to Quintus Smyrnaeus, while slaughtering countless Trojans, Diomedes met an elderly man named Ilioneus who begged for mercy. Despite his fury of war, Diomedes held back his sword so that the old man might speak. Ilioneus begged "Oh compassionate my suppliant hands! To slay the young and valiant is a glorious thing; but if you smite an old man, small renown waits on your prowess. Therefore turn from me your hands against young men, if you hope ever to come to grey hairs such as mine." Firmly resolved in his purpose, Diomedes answered. "Old man, I look to attain to honored age; but while my Strength yet exists, not a single foe will escape me with life. The brave man makes an end of every foe." Having said this, Diomedes slew Ilioneus.
Some of the other Trojan warriors slain by Diomedes during that night were Coroebus who came to Troy to win the hand of Cassandra, Eurydamas and Eurycoon. Cypria says that Polyxena died after being wounded by Odysseus and Diomedes in the capture of the city.
Aftermath
After the fall of Troy
During the sacking and looting of the great city, the seeress Cassandra, daughter of Priam and Hecuba, clung to the statue of Athena, but the Lesser Ajax raped her. Odysseus, unsuccessfully, tried to persuade the Achaean leaders to put Ajax to death, by stoning the Locrian leader (to divert the goddess's anger). The other Achaean leaders disagreed because Ajax himself clung to the same statue of Athena in order to save himself. The failure of Achaean leaders to punish Ajax the Lesser for the sacrilege of Athena's altar resulted in earning her wrath.
Athena caused a quarrel between Agamemnon and Menelaus about the voyage from Troy. Agamemnon then stayed on to appease the anger of Athena. Diomedes and Nestor held a discussion about the situation and decided to leave immediately. They took their vast armies and left Troy. They managed to reach home safely but Athena called upon Poseidon to bring a violent storm upon most of other Achaean ships. Diomedes is one of the few Achaean commanders to return home safely, arriving in Argos only four days after his departure from Troy. Since the other Achaeans suffered during their respective 'nostoi' (Returns) because they committed an atrocity of some kind, Diomedes' safe nostos implies that he had the favour of the gods during his journey.
The Palamedes affair haunted several Achaean Leaders including Diomedes. Palamedes's brother Oeax went to Argos and reported to Aegialia, falsely or not, that her husband was bringing a woman he preferred to his wife. Others say that Aegialia herself had taken a lover, Cometes (son of Sthenelus), being persuaded to do so by Palamedes's father Nauplius. Still others say that despite Diomedes's noble treatment of her son Aeneas, Aphrodite never managed to forget about the Argive spear that had once pierced her flesh in the fields of Troy. She helped Aegialia to obtain not one, but many lovers. (According to different traditions, Aegialia was living in adultery with Hippolytus, Cometes or Cyllabarus.)
In any case Aegialia, being helped by the Argives, prevented Diomedes from entering the city. Or else, if he ever entered Argos, he had to take sanctuary at the altar of Hera, and thence flee with his companions by night. Cometes was shortly the king of Argos, in Diomedes' absence, but was quickly replaced by the rightful heir, Cyanippus, who was the son of Aegialeus.
Life in Italy
Diomedes then migrated to Aetolia, and thence to Daunia (Apulia) in Italy. He went to the court of King Daunus, King of the Daunians. The king was honored to accept the great warrior. He begged Diomedes for help in warring against the Messapians, for a share of the land and marriage to his daughter. Diomedes agreed to the proposal, drew up his men and routed the Messapians. He took his land which he assigned to the Dorians, his followers. The two nations 'Monadi' and the 'Dardi' were vanquished by Diomedes along with the two cities of 'Apina' and 'Trica'.
Diomedes later married Daunus's daughter Euippe and had two sons named Diomedes and Amphinomus. Some say that, after the sack of Troy, Diomedes came to Libya (due to a storm), where he was put in prison by King Lycus (who planned on sacrificing him to Ares). It is said that it was the king's daughter Callirrhoe, who, loosing Diomedes from his bonds, saved him. Diomedes is said to have sailed away, without the least acknowledgment of the girl's kindly deed, whereupon she killed herself, out of grief, with a halter.
Cities founded by Diomedes
The Greeks and Romans credited Diomedes with the foundation of several Greek settlements in Magna Graeca in southern Italy: Argyrippa or Arpi, Aequum Tuticum (Ariano Irpino), Beneventum (Benevento), Brundusium (Brindisi), Canusium (Canosa), Venafrum (Venafro), Salapia, Spina, Garganum, Sipus (near Santa Maria di Siponto), Histonium (Vasto), Drione (San Severo), and Aphrodisia or Venusia (Venosa). The last was made as a peace-offering to the goddess, including temples in her honor.
Virgil's Aeneid describes the beauty and prosperity of Diomedes' kingdom. When war broke out between Aeneas and Turnus, Turnus tried to persuade Diomedes to aid them in the war against the Trojans. Diomedes told them he had fought enough Trojans in his lifetime and urged Turnus that it was best to make peace with Aeneas than to fight the Trojans. He also said that his purpose in Italy is to live in peace. Venulus, one of Latinus' messengers, recalls the mission to Diomedes after they seek his help in the war against the Rutulians. He states that when he found Diomedes, he was laying the foundations of his new city, Argyrippa. Diomedes eventually speaks and states that, as punishment for his involvement at Troy, he never reached his fatherland of Argos and that he never saw his beloved wife again. The hero also states that birds pursue him and his soldiers, birds which used to be his companions and cry out everywhere they land, including the sea cliffs. Ovid, on the other hand, writes that Venulus came to the home of exiled Diomedes in vain, but he was erecting walls with the favour of Iapygian Daunus, his new father-in-law, which would make the city Luceria, not Argyrippa.
The worship and service of gods and heroes was spread by Diomedes far and wide : in and near Argos he caused temples of Athena to be built. His armour was preserved in a temple of Athena at Luceria in Apulia, and a gold chain of his was shown in a temple of Artemis in Peucetia. At Troezene he had founded a temple of Apollo Epibaterius and instituted the Pythian games there. Other sources claim that Diomedes had one more meeting with his old enemy Aeneas where he gave the Palladium back to the Trojans.
Hero cult of Diomedes
Hero cults became much more commonplace from the beginning of the 8th century onwards, and they were widespread throughout several Greek cities in the Mediterranean by the last quarter of the century. Diomedes’ cults were situated predominantly in Cyprus, Metapontum, and other cities on the coast of the Adriatic sea (The archaeological evidence for the hero cult of Diomedes comes mostly from this area). There are also vestiges of this cult in areas like Cyprus and some mainland Greek cities, given the inscriptions on votive offerings found in temples and tombs, but the popularity is most evident along the Eastern coast of Italy. This cult reached so far East in the Mediterranean due to the Achaean migration during the 8th century. The most distinct votive offerings to the hero were actually found within the island of Palagruža on the Adriatic.
Strabo claims that the votive offerings in the Daunian temple of Athena at Luceria contained votive offerings specifically addressing Diomedes.
Diomedes was worshipped as a hero not only in Greece, but on the coast of the Adriatic, as at Thurii and Metapontum. At Argos, his native place, during the festival of Athena, his shield was carried through the streets as a relic, together with the Palladium, and his statue was washed in the river Inachus.
There were two islands named after the hero (Islands of Diomedes) on the Adriatic. Strabo mentions that one was uninhabited. A passage in Aelian's On Animals explains the significance of this island and the mysterious birds which inhabit it. Strabo reflects on the peculiarities of this island, including the history tied to Diomedes' excursions and the regions and peoples among which he had the most influence. He writes that Diomedes himself had sovereignty over the areas around the Adriatic, citing the islands of Diomedes as proof of this, as well as the various tribes of people who worshiped him even in contemporary times, including the Heneti and the Dauni. The Heneti sacrificed a white horse to Diomedes in special groves where wild animals grew tame.
This cult was not widespread; cults like those of Herakles and Theseus had a much more prominent function in the Greek world due to the benefits which they granted their followers and the popular mythological traditions of these figures.
Death
Strabo lists four different traditions about the hero's life in Italy. For one, he claims that at the city of Urium, Diomedes was making a canal to the sea when he was summoned home to Argos. He left the city and his undertakings half-finished and went home where he died. The second tradition claims the opposite, that he stayed at Urium until the end of his life. The third tradition claims he disappeared on Diomedea, the uninhabited island (called after him) in the Adriatic where the Shearwaters who were formerly his companions live, which implies some kind of deification. The fourth tradition comes from the Heneti, who claim Diomedes stayed in their country and eventually had a mysterious apotheosis.
One Legend says that on his death, the albatrosses got together and sang a song (their normal call). Others say his companions were turned into birds afterwards. The family name for albatrosses, Diomedeidae, and the genus name for the great albatrosses, Diomedea, originate from Diomedes.
On San Nicola Island of the Tremiti Archipelago there is a Hellenic period tomb called Diomedes's Tomb. According to a legend, the goddess Venus seeing the men of Diomedes cry so bitterly transformed them into birds (Diomedee) so that they could stand guard at the grave of their king. In Fellini's movie 8½, a cardinal tells this story to actor Marcello Mastroianni.
Immortality
According to the post Homeric stories, Diomedes was given immortality by Athena, which she had not given to his father. Pindar mentions the hero's deification in Nemean X, where he says "the golden-haired, gray-eyed goddess made Diomedes an immortal god."
In order to attain immortality, a scholiast for Nemean X says Diomedes married Hermione, the only daughter of Menelaus and Helen, and lives with the Dioscuri as an immortal god while also enjoying honours in Metapontum and Thurii.
He was worshipped as a divine being under various names in Italy where statues of him existed at Argyripa, Metapontum, Thurii, and other places. There was a temple consecrated to Diomedes called 'The Timavo' at the Adriatic. There are traces in Greece also of the worship of Diomedes.
The first two traditions listed by Strabo give no indication of divinity except later through a hero cult, and the other two declare strongly for Diomedes' immortality as more than a mere cult hero.
Afterlife
There are less known versions of Diomedes' afterlife. A drinking song to Harmodius, one of the famous tyrannicides of Athens, includes a reference to Diomedes as an inhabitant of the Islands of the Blessed, along with Achilles and Harmodius.
In his Inferno, Dante sees Diomedes in the Eighth Circle of Hell, where the "counsellors of fraud" are imprisoned for eternity in sheets of flame. His offenses include advising the theft of the Palladium and, of course, the strategem of the Trojan Horse. The same damnation is imposed on Odysseus, who is also punished for having persuaded Achilles to fight in the Trojan war, without telling him that this would inevitably lead to his death.
The Troilus and Cressida legend
Diomedes plays an important role in the medieval legend of Troilus and Cressida, in which he becomes the girl's new lover when she is sent to the Greek camp to join her traitorous father. In Shakespeare's play of that title, Diomedes is often seen fighting Troilus over her.
See also
1437 Diomedes, a minor asteroid
Diomedes (Thracian king)
HMS Diomede—four British ships named after Diomedes
USS Diomedes (ARB-11)
References
Further reading
Šašel Kos, Marjeta. “The Story of the Grateful Wolf and Venetic Horses in Strabo’s Geography". In: Studia Mythologica Slavica'' 11 (October). Ljubljana, Slovenija. 2008. pp. 9–24. https://doi.org/10.3986/sms.v11i0.1685.
External links
Greek mythological heroes
Epigoni
Achaean Leaders
Kings of Argos
Kings in Greek mythology
Metamorphoses characters
Characters in the Aeneid
Argive characters in Greek mythology
Characters in Greek mythology |
1031936 | https://en.wikipedia.org/wiki/Unexpand | Unexpand | unexpand is a command in Unix and Unix-like operating systems. It is used to convert groups of space characters into tab characters.
For example:
$ echo " asdf sdf" | unexpand | od -c
0000000 \t \t a s d f s d f \n
0000014
$ echo " asdf sdf" | od -c
0000000
0000020 a s d f s d f \n
0000032
Here the echo command prints a string of text that includes multiple consecutive spaces, then the output is directed into the unexpand command. The resulting output is then displayed by the octal dump command od. At the second prompt, the same echo output is sent directly through the od command. As can be seen by comparing the two, the unexpand program converts sequences of eight spaces into single tabs (printed as '\t').
See also
List of Unix commands
Expand (Unix)
References
External links
The program's manpage
Unix SUS2008 utilities |
638429 | https://en.wikipedia.org/wiki/Free%20Pascal | Free Pascal | Free Pascal Compiler (FPC) is a compiler for the closely related programming-language dialects Pascal and Object Pascal. It is free software released under the GNU General Public License, with exception clauses that allow static linking against its runtime libraries and packages for any purpose in combination with any other software license.
It supports its own Object Pascal dialect, as well as the dialects of several other Pascal family compilers to a certain extent, including those of Borland Pascal (named "Turbo Pascal" until the 1990 version 6), Borland (later Embarcadero) Delphi, and some historical Macintosh compilers. The dialect is selected on a per-unit (module) basis, and more than one dialect can be used per program.
It follows a write once, compile anywhere philosophy and is available for many CPU architectures and operating systems (see Targets). It supports inline assembly language and includes an internal assembler capable of parsing several dialects such as AT&T and Intel style.
There are separate projects to facilitate developing cross-platform graphical user interface (GUI) applications, the most prominent one being the Lazarus integrated development environment (IDE).
Supported dialects
Initially, Free Pascal adopted the de facto standard dialect of Pascal programmers, Borland Pascal, but later adopted Delphi's Object Pascal. From version 2.0 on, Delphi compatibility has been continuously implemented or improved.
The project has a compilation mode concept, and the developers made it clear that they would incorporate working patches for the standardized dialects of the American National Standards Institute (ANSI) and International Organization for Standardization (ISO) to create a standards-compliant mode.
A small effort has been made to support some of the Apple Pascal syntax to ease interfacing to the Classic Mac OS and macOS. The Apple dialect implements some standard Pascal features that Turbo Pascal and Delphi omit.
The 2.2.x release series did not significantly change the dialect objectives beyond roughly Delphi 7 level syntax, instead aiming for closer compatibility. A notable exception to this was the addition of support for generics to Free Pascal in version 2.2.0, several years before they were supported in any capacity by Delphi.
In 2011 several Delphi 2006-specific features were added in the development branch, and some of the starting work for the features new in Delphi 2009 (most notably the addition of the UnicodeString type) was completed. The development branch also has an Objective-Pascal extension for Objective-C (Cocoa) interfacing.
As of version 2.7.1, Free Pascal implemented basic ISO Pascal mode, though many things such as the Get and Put procedures, and the file-buffer variable concept for file handling were still absent.
As of version 3.0.0, ISO Pascal mode is fairly complete. It has been able to compile standardpascal.org's P5 ISO Pascal compiler with no changes.
History
Early years
Free Pascal was created when Borland clarified that Borland Pascal development for DOS would stop with version 7, to be replaced by a Windows-only product, which later became Delphi.
Student Florian Paul Klämpfl began developing his own compiler written in the Turbo Pascal dialect and produced 32-bit code for the GO32v1 DOS extender, which was used and developed by the DJ's GNU Programming Platform (DJGPP) project at that time.
Originally, the compiler was a 16-bit DOS executable compiled by Turbo Pascal. After two years, the compiler was able to compile itself and became a 32-bit executable.
Expansion
The initial 32-bit compiler was published on the Internet, and the first contributors joined the project. Later, a Linux port was created by Michael van Canneyt, five years before the Borland Kylix Pascal compiler for Linux became available.
The DOS port was adapted for use in OS/2 using the Eberhard Mattes eXtender (EMX) which made OS/2 the second supported compiling target. As well as Florian Klämpfl the original author, Daniël Mantione also contributed significantly to make this happen, providing the original port of the run-time library to OS/2 and EMX. The compiler improved gradually, and the DOS version migrated to the GO32v2 extender. This culminated in release 0.99.5, which was much more widely used than prior versions, and was the last release aiming only for Borland Pascal compliance; later releases added a Delphi compatibility mode. This release was also ported to systems using Motorola 68000 family (m68k) processors.
With release 0.99.8 the Win32 target was added, and a start was made with incorporating some Delphi features. Stabilizing for a non-beta release began, and version 1.0 was released in July 2000. The 1.0.x series was widely used, in business and education. For the 1.0.x releases, the port to 68k CPU was redone, and the compiler produced stable code for several 68k Unix-like and AmigaOS operating systems.
Version 2
During the stabilization of what would become 1.0.x, and also when porting to the Motorola 68k systems, it was clear that the design of the code generator was far too limited in many aspects. The principal problems were that adding processors meant rewriting the code generator, and that the register allocation was based on the principle of always keeping three free registers between building blocks, which was inflexible and difficult to maintain.
For these reasons, the 1.1.x series branched off from the 1.0.x main branch in December 1999. At first, changes were mostly clean-ups and rewrite-redesigns to all parts of the compiler. The code generator and register allocator were also rewritten. Any remaining missing Delphi compatibility was added.
The work on 1.1.x continued slowly but steadily. In late 2003, a working PowerPC port became available, followed by an ARM port in summer 2004, a SPARC port in fall 2004, and an x86-64-AMD64 port in early 2004, which made the compiler available for a 64-bit platform.
In November 2003, a first beta release of the 1.1.x branch was packaged and numbered 1.9.0. These were quickly followed by versions 1.9.2 and 1.9.4; the latter introduced OS X support. The work continued with version 1.9.6 (January 2005), 1.9.8 (late February 2005), 2.0.0 (May 2005), 2.0.2 (December 2005), and 2.0.4 (August 2006).
Version 2.2.x
In 2006, some of the major reworks planned for 2.2, such as the rewrite of the unit system, had still not begun, and it was decided to instead start stabilizing the already implemented features.
Some of the motives for this roadmap change were the needs of the Lazarus integrated development environment project, particularly the internal linker, support for Win64, Windows CE, and OS X on x86, and related features like DWARF. After betas 2.1.2 and 2.1.4, version 2.2.0 was released in September 2007, followed by version 2.2.2 in August 2008 and version 2.2.4 in March 2009.
The 2.2.x series vastly improved support for the ActiveX and Component Object Model (COM) interface, and Object Linking and Embedding (OLE), though bugs were still being found. The delegation to interface using the implements keyword was partly implemented, but was not complete . Library support for ActiveX was also improved.
Another major feature was the internal linker for Win32, Win64, and Windows CE, which greatly improved linking time and memory use, and make the compile-link-run cycle in Lazarus much faster. The efficiency for smart-linking, or dead code elimination, was also improved.
Minor new features included improved DWARF (2/3) debug format support, and optimizations such as tail recursion, omission of unneeded stack frames and register-based common subexpression elimination (CSE) optimization. A first implementation of generic programming (generics) support also became available, but only experimentally.
Version 2.4.x
The 2.4.x release series had a less clear set of goals than earlier releases. The unit system rewrite was postponed again, and the branch that became 2.4 was created to keep risky commits from 2.2 to stabilize it. Mostly these risky commits were more involved improvements to the new platforms, Mac PowerPC 64, Mac x86-64, iPhone, and many fixes to the ARM and x86-64 architectures in general, as well as DWARF.
Other compiler improvements included whole program optimization (WPO) and devirtualization and ARM embedded-application binary interface (EABI) support.
Later, during the 2.2 cycle, a more Delphi-like resource support (based on special sections in the binary instead of Pascal constants) was added. This feature, direly needed by Lazarus, became the main highlight of the branch.
Other more minor additions were a memory manager that improved heap manager performance in threaded environments, small improvements in Delphi compatibility such as OleVariant, and improvements in interface delegation.
On January 1, 2010, Free Pascal 2.4.0 was released, followed on November 13, 2010, by bug fix release 2.4.2, with support for for..in loops, sealed and abstract classes, and other changes.
Version 2.6.x
In January 2012, Free Pascal 2.6 was released. This first version from the 2.6 release series also supported Objective Pascal on OS X and iOS targets and implemented many small improvements and bug fixes. In February 2013, FPC 2.6.2 was released. It contained NetBSD and OpenBSD releases for the first time since 1.0.10, based on fresh ports. In March 2014, the last point release in the 2.6 series, 2.6.4, was launched, featuring mostly database (fcl-db) updates.
Version 3.0.x
Version 3.0.0 was released on November 25, 2015, and was the first major release since January 1, 2012.
It introduced many new language features.
Version 3.0.2 was released on February 15, 2017, and includes bug fixes and minor compiler updates.
Version 3.0.4 was released on November 28, 2017.
It includes many language improvements over previous versions, including an internal linker for Executable and Linkable Format (ELF), Arm AARCH64 for iOS and Linux, a revived i8086 platform, extended libraries and much more.
Version 3.2.x
The next major release, version 3.2.0, was published on June 19, 2020. It introduced many new language features, including generic routines, standard namespaces, managed records and expanded functionality for dynamic arrays, in addition to the advent of new standard units and the support of additional platforms.
Version 3.2.2 was released on May 20, 2021, and supports macOS on AArch64 and naming of threads. Additionally it includes bug fixes and minor compiler updates.
Targets
Free Pascal also supports byte code generation for the Java Virtual Machine as of version 3.0.0 and targets both Oracle's Java and Google's Android JVM, although Object Pascal syntax is not fully supported. Free Pascal 3.0.0 also supports ARMHF platforms like the Raspberry Pi, including ARMV6-EABIHF running on Raspbian. Work on 64-bit ARM has resulted in support for iOS in 3.0.0 as well. A native ARM Android target has been added, ending the formerly hacked ARM Linux target to generate native ARM libraries for Android. This makes porting Lazarus applications to Android (using Custom Drawn Interface) easier. Since FPC 2.6.2, OpenBSD and NetBSD are supported on IA32 and X86_64 architectures. A new target embedded has been added for usage without OS (ARM Cortex M and MIPS mainly). With InstantFPC it is possible to run Pascal programs, which are translated just in time, as Unix scripts or CGI back-end.
Ultibo core is an embedded or bare metal development environment for Raspberry Pi. Ultibo is based on Free Pascal and developed under a modified version of Lazarus. The IDE is PC based but has been ported to Linux and Mac as well. Ultibo is an OS-less runtime and has support for most functions and allows the programmer full control over the hardware via the RTL units. The runtime implements multi-threaded, pre-emptive multitasking. The programmer can put threads on a specific CPU or let the runtime divide the load automatically or a mix of the two. Most Raspberry Pi models are supported including the A, B, A+ and B+ as well as the Raspberry Pi 2B, 3B, 4B/400/CM4 and Zero.
Integrated development environments
Like most modern compilers, Free Pascal can be used with an integrated development environment (IDE). Besides independent IDEs there are also plugins to various existing IDEs
Free Pascal has its own text-mode IDE resembling Turbo Pascal's IDE. It is made using the Free Vision framework (also included with Free Pascal), a Turbo Vision clone. In addition to many features of the Turbo Pascal IDE, it has code completion and support for multiple help file formats (HTML, Microsoft Compiled HTML Help (CHM), Information Presentation Facility (IPF). Instead of using command line tools, the IDE uses its own embedded compiler, based on the same source as the command line compiler and debugger (using libgdb or GDBMI) to provide its functionality.
Lazarus is the most popular IDE used by Free Pascal programmers. It looks and feels similar to the Delphi IDE, and can be used to create console and graphical applications, Windows services, daemons, and web applications. Lazarus provides a cross-platform user interface framework, called Lazarus Component Library (LCL). Graphical applications created with LCL can be ported to another platform via recompiling or cross compiling.
Dev-Pascal is a free Windows-only IDE for Free Pascal and GNU Pascal, with no further development following the 2004 FPC version and the 2005 GPC version.
Bundled libraries
Apart from a compiler and an IDE, Free Pascal provides the following libraries:
Free Pascal Runtime Library (RTL): Basic low-level runtime library for general programming tasks
Free Component Library (FCL): High-level software component library for general programming tasks
Examples of software produced with Free Pascal
ULTIBO Core] is a development environment targeting bare-metal (no operating system) Raspbian PI boards. It uses FreePascal/Lazarus and links the application wit an unikernel runtime.
Beyond Compare is a data comparison utility for Windows, OS X, and Linux. The Linux and OS X versions are compiled with Lazarus/FPC.
Cartes du Ciel is a free planetarium program for Linux, OS X, and Windows. It maps and labels most constellations, planets, and objects visible by telescope. It was fully written in Lazarus/FPC, and released under GPL.
Cheat Engine is an open-source memory scanner, hex editor, and debugger. It can be used for cheating in computer games. Since version 6.0 it is compiled with Lazarus/FPC.
D_2D & D_3D data plotting programs.
Double Commander is an open-source multi-platform two-panel orthodox file manager inspired by the Microsoft Windows-only Total Commander.
Free Pascal is written in Object Pascal and assembly language, and self-compiled.
HNSKY, Hallo Northern Sky is a free planetarium program for Windows and Linux. Since version 3.4.0 written & compiled with Lazarus/FPC.
Lazarus: Free Pascal's affiliated Delphi-like software package for rapid development of graphical applications.
MeKin2D: package for planar linkage, cam and gear mechanism kinematics.
Morfik: Morfik WebOS AppBuilder uses Free Pascal to produce CGI binaries.
MyNotex is a free software note-taking and notes manager for Linux.
Early versions of the Nim compiler were developed in Free Pascal, before it became self-hosting in Nim.
Peazip is an open source archiver, made with Lazarus/FPC.
TorChat, previously written in Python, is now being rewritten in Free Pascal and Lazarus.
Tranzistow is a 32/64-bit software synthesizer for Windows and Linux developed with FreePascal/Lazarus.
See also
fpGUI Free Pascal GUI toolkit – a cross-platform and custom-drawn toolkit implemented in Object Pascal
References
External links
Official websites
FPC
Lazarus RAD IDE
General introduction
Official documentation
Modern Object Pascal Introduction for Programmers - by Michalis Kamburelis
Sites specialized in game development
Pascal Game Development
Pascal Gamer Magazine
FPC 4 GBA Programming Tutorial – an extensive tutorial into game programming on the Game Boy Advance with Free Pascal
Classic Mac OS software
Compilers
Cross-platform free software
Cross-platform software
Free compilers and interpreters
Free software programmed in Pascal
Linux programming tools
MacOS programming tools
MorphOS software
Object-oriented programming languages
Pascal (programming language)
Pascal (programming language) compilers
Pascal programming language family
Pascal (programming language) software
Platform-sensitive development
Programming tools for Windows
Self-hosting software
Software using the GPL license
Solaris software
Systems programming languages |
15364809 | https://en.wikipedia.org/wiki/Process%20development%20execution%20system | Process development execution system | Process development execution systems (PDES) are software systems used to guide the development of high-tech manufacturing technologies like semiconductor manufacturing, MEMS manufacturing, photovoltaics manufacturing, biomedical devices or nanoparticle manufacturing. Software systems of this kind have similarities to product lifecycle management (PLM) systems. They guide the development of new or improved technologies from its conception, through development and into manufacturing. Furthermore they borrow on concepts of manufacturing execution systems (MES) systems but tailor them for R&D rather than for production. PDES integrate people (with different backgrounds from potentially different legal entities), data (from diverse sources), information, knowledge and business processes.
Benefits
Documented benefits of process development execution systems include:
Reduced time to market
Reduced amounts of experimentation
Improved quality / more robust manufacturing process
Reduced prototyping costs
Savings through the re-use of original data, information and knowledge
A framework for product optimization
Reduced waste
Savings through the complete integration of engineering workflows
Ability to provide collaboration partners with access to a centralized development record
Relationships with other level 3 / level 4 systems
A process development execution system (PDES) is a system used by companies to perform development activities for high-tech manufacturing processes.
Software systems of this kind leverage diverse concepts from other software categories like PLM, manufacturing execution system (MES), ECM but focus on tools to speed up the technology development rather than the production.
A PDES is similar to a manufacturing execution systems (MES) in several ways. The key distinguishing factor of a PDES is that it is tailored for steering the development of a manufacturing process, while MES is tailored for executing the volume production using the developed process. Therefore, the toolset and focus of a PDES is on lower volume but higher flexibility and experimentation freedom. The tools of an MES are more focused on less variance, higher volumes, tighter control and logistics. Both types of application software increase traceability, productivity, and quality of the delivered result. For PDESs quality refers to the capability of the process to perform without failure under a wide range of conditions, i.e. the robustness of the developed manufacturing process. For MESs quality refers to the quality of the manufactured good/commodity. Additionally both software types share functions including equipment tracking, product genealogy, labour and item tracking, costing, electronic signature capture, defect and resolution monitoring, executive dashboards, and other various reporting solutions.
In contrast to PLM systems, PDES typically address the collaboration and innovation challenges with a bottom-up approach. They start-out with the details of manufacturing technologies (like PPLM), a single manufacturing step with all its physical aware parameterization and integrating steps into sequences, into devices, into systems, etc.
Other rather similar software categories are laboratory information management systems (LIMS) and laboratory information system (LIS). PDESs offer a wider set of functionalities e.g. virtual manufacturing techniques, while they are typically not integrated with the equipment in the laboratory.
PDESs have many parts and can be deployed on various scales – from simple Work in Progress tracking, to a complex solution integrated throughout an enterprise development infrastructure. The latter connects with other enterprise systems like enterprise resource and planning systems (ERPs), manufacturing execution systems (MESs), product lifecycle management (PLM), supervisory, control and data acquisition (SCADA) solutions and scheduling and planning systems (both long-term and short-term tactical).
Example: PDES usage during semiconductor device development
New ideas for manufacturing processes (for new goods/commodities or improved manufacturing) are often based on, or can at least benefit from, previous developments and recipes already in use. The same is true when developing new devices, for example, a MEMS sensor or actuator. A PDES offers an easy way to access these previous developments in a structured manner. Information can be retrieved faster, and previous results can be taken into account more efficiently. A PDES typically offers means to display and search for result data from different viewpoints, and to categorise the data according to the different aspects. These functionalities are applied to all result data, such as materials, process steps, machines, experiments, documents and pictures. The PDES also provides a way to relate entities belonging to the same or similar context and to explore the resulting information.
In the assembly phase from process steps to process flows, a PDES helps to easily build, store, print, and transfer new process flows. By providing access to previously assembled process flows the designer is able to use those as building blocks or modules in the newly developed flow. The usage of standard building blocks can dramatically reduce the design time and the probability of errors.
A PDES demonstrates its real benefits in the verification phase. Knowledge (for example in the semiconductor device fabrication – clean before deposition; After polymer spin-on no temperature higher than 100 °C until resist is removed) is provided in a format that can be interpreted by a computer as rules. If a domain expert enters the rules for his/her process steps, all engineers can later use these rules to check newly developed process flows, even if the domain expert is not available. For a PDES, this means it has to be able to
manage rules
connect rules with Boolean terms (and, or, not) and
check process flows using these rules. This rule check verifies the principle manufacturability of a newly designed manufacturing flow.
The processing rule check gives no indication about the functionality or even the structure of the produced good or device. In the area of semiconductor device fabrication, the techniques of semiconductor process simulation / TCAD can provide an idea about the produced structures. To support this ’virtual fabrication’, a PDES is able to manage simulation models for process steps. Usually the simulation results are seen as standalone data. To rectify this situation PDESs are able to manage the resulting files in combination with the process flow. This enables the engineer to easily compare the expected results with the simulated outcome. The knowledge gained from the comparison can again be used to improve the simulation model.
After virtual verification the device is produced in an experimental fabrication environment. A PDES allows a transfer of the process flow to the fabrication environment (for example in semiconductor: FAB). This can be done by simply printing out a runcard for the operator or by interfacing to the Manufacturing Execution Systems (MES) of the facility. On the other hand a PDES is able to manage and document last minute changes to the flow like parameter adjustments during the fabrication.
During and after processing a lot of measurements are taken. The results of these measurements are often produced in the form of files such as images or simple text files containing rows and columns of data. The PDES is able to manage these files, to link related results together, and to manage different versions of certain files, for example reports. Paired with flexible text, and graphical retrieval and search methods, a PDES provides the mechanism to view and assess the accumulated data, information and knowledge from different perspectives. It provides insight into both the information aspects as well as the time aspects of previous developments.
Development activities within high tech industries are an increasingly collaborative effort. This leads to the need to exchange information between the partners or to transfer process intellectual property from a vendor to a customer. PDESs' support this transfer while being selective to protect the IPR of the company.
See also
Microfabrication
Semiconductor device fabrication
Microelectromechanical systems
Product information management system (PIMS)
References
D. Ortloff, J. Popp, T. Schmidt, and R. Brück. Process Development Support Environment: A tool SUITE TO ENGINEER MANUFACTURING SEQUENCES In International Journal of Nanomanufacturing, “Recent Developments and Innovations in NEMS/MEMS devices”, 2007
T. Schmidt, K. Hahn, T. Binder, J. Popp, A. Wagener, and R. Brück. OPTIMIZATION OF MEMS FABRICATION PROCESS DESIGN BY VIRTUAL EXPERIMENTS. In Proceedings of SPIE: Micro- and Nanotechnology: Materials, Processes, Packaging, and Systems III, Adelaide, volume 6415, 2006. Smart Materials, Nano and Micro-Smart Systems 2006.
NEXUS news. "Successful Outcome from the PROMENADE Project...", mst|news, April 2008.
ICT Results. "A virtual factory for micromachines", ICT Results, June 2007.
Electronics World – High-Tech R&D − Drowning in Data but Starving for Information .
External links
Semiconductor Manufacturing
Semiconductor Glossary
Knowledge management
Information science
Information systems
Technical communication |
8645116 | https://en.wikipedia.org/wiki/BackupHDDVD | BackupHDDVD | BackupHDDVD is a small computer software utility program available in command line and GUI versions which aids in the decryption of commercial HD DVD discs protected by the Advanced Access Content System. It is used to back up discs, often to enable playback on hardware configurations without full support for HDCP. The program's source code was posted online, but no licence information was given.
Written by an anonymous programmer using the handle Muslix64, BackupHDDVD is distributed with none of the cryptographic keys necessary for decryption. Users wanting to use the software to decrypt a protected disc's contents must obtain the appropriate keys separately, a task with which neither the original author nor his or her versions of BackupHDDVD assist.
BackupHDDVD represented the first known successful attack against AACS. The utility circumvents content protection by decrypting video files directly with AES, the underling cryptographic cipher used by AACS. Using this technique, BackupHDDVD is able to completely bypass the AACS chain of trust, rendering it immune to revocation. The cost of this immunity is that users are forced to rely on keys leaking from commercial player software to use BackupHDDVD with new discs.
History
According to the creator of BackupHDDVD, he or she first set out to circumvent AACS to bypass a restriction in software HD DVD players which reduced the quality of AACS restricted 1080p high definition video to that of standard definition DVD video or refused to play outright unless an HDCP compliant chain of video hardware was present. At the time only a few computer monitors and video cards supported HDCP. As a result, configurations that would have allowed high-definition HD DVD viewing in software players were exceptionally rare.
On December 18, 2006, a video which showed BackupHDDVD being used to decrypt and copy the film Full Metal Jacket to a hard drive was uploaded to YouTube. Two days after the video was uploaded, the initial version of the utility along with its source code and documentation was uploaded to a file hosting service. A link to the file was then posted by the utility's creator on the forums of Doom9, a website devoted to DVD backup. The utility's documentation, along with the forum post, contained little information as to how necessary keys could be obtained. The author elaborated in another forum post, claiming that keys could be obtained by exploiting the necessity for them to be held in memory to allow playback in player software.
On January 2, 2007, the author posted the 1.0 version of the BackupHDDVD utility, which included support for the decoding of discs using volume keys. For several weeks following the utility's release no success using the author's key extraction technique was reported. In mid-January 2007, a volume key was published by another member of the Doom9 forum along with an explanation of the technique used to obtain it. Other forum members quickly discovered keys for different titles. Keys for many discs are now readily available on the internet.
Further development of BackupHDDVD was being hosted on SourceForge until the site received a DMCA takedown notice alleging a violation in late February. In compliance with the notice, the project was immediately removed. Several versions of BackupHDDVD have been released by individuals other than the original author, including some versions with GUIs and the ability to locate keys on the internet or scan for them in memory automatically. HDDecrypter, a port of BackupHDDVD to C with a native Windows GUI is also available. This version supports multiple CPU threads and runs faster than its Java counterparts. While development of BackupHDDVD has ceased, a commercial HD DVD decryption utility called Slysoft AnyDVD HD exists which relies on compromised AACS processing or media keys to allow for the backup or unrestricted viewing of any AACS-protected discs without the need for title or volume keys.
Background
The AACS Licensing Authority (LA) assigns a series of 253 unique cryptographic keys to device manufacturers. When an AACS protected disc is manufactured, a series of up to 64 keys called title keys are generated and the video content on the disc is encrypted using these keys. The title keys are stored on the disc and themselves encrypted with another key called the volume unique key. The volume unique key for any disc can be calculated by all authorized devices using another key called a processing key, which is derived from a media key block stored on each disc. Authorized devices use one or more of the manufacturer's assigned device keys to decrypt the media key block, yielding a processing key and enabling further decryption of the volume and title keys, and finally the content.
If a device key is to be revoked, the media key blocks on all discs manufactured after the time of revocation are encrypted in a way which does not enable the revoked device to obtain a valid processing key. Users trying to view new content on a revoked player would be forced to upgrade their player software to a more secure version, thereby limiting the scope of the compromise each time an exploit is discovered. While a compromised device or processing key could be used to decrypt a large number of discs, BackupHDDVD does not use these keys because they can be revoked by AACS LA. Because the AACS revocation system works by preventing a given device or player from calculating a valid volume unique key, BackupHDDVD circumvents the system entirely by relying on volume or title keys leaked from authorized players. With these keys BackupHDDVD is not subject to device revocation and is able to decrypt the content directly, bypassing the key exchange and verification process.
Features and limitations
Users must have either found decryption keys themselves or obtained them elsewhere for most versions of BackupHDDVD to work. The utility reads a text file containing volume or title keys and attempts to find a set of corresponding keys for the inserted disc. Through a standard AES library, it then decrypts each video file on the disc using the appropriate keys and writes the results to a location specified by the user. Direct file decryption allows the utility's functionality to remain unaffected by device key revocation and its performance unencumbered with AACS overhead.
Originally intended to be a proof of concept, BackupHDDVD is severely limited in its ability to produce fully functional copies of commercial discs. Early versions were unable to properly decrypt discs which used the in-movie experience technology. New versions work around this limitation by excluding interactive content from decrypted copies. The utility cannot process HD DVD navigation functionality which enables menus, chapters, secondary audio tracks and subtitles, so these features are inaccessible in copies created by BackupHDDVD. Most versions provide no validation for keys and will still attempt to decrypt a disc's contents with an incorrect key, resulting in corrupt files.
Legality
Under United States anti-circumvention law created by the Digital Millennium Copyright Act, BackupHDDVD may qualify as a device primarily intended to "circumvent a technological measure that effectively controls access to a [protected] work." If identified as such, it would be illegal to use or distribute.
Reaction
Reaction to the utility by Doom9 forum members, bloggers, and mainstream media has ranged from supportive to intensely hostile. By some, the circumvention of AACS was seen as a reaffirmation of fair use. Others felt that the utility was no more than a piracy tool and would bring about group punishment against consumers in the form of player revocation. One article compared proponents of BackupHDDVD to terrorists. When the release of the tool was first publicized, several articles claimed that AACS had been cracked. In fact no cryptographic weaknesses constituting a crack have yet been found in AES, the underlying cryptographic system of AACS. Keys are actually obtained through a side-channel attack.
Initially, it was thought that the compromise of HD DVD's security would entice some studios into adopting the competing Blu-ray format, but Blu-ray's AACS implementation has since been circumvented using a similar method. However, Blu-ray offers an additional layer of protection called BD+.
There was some speculation that the player used by the utility's author to obtain keys would be revoked. Cyberlink, which sells the PowerDVD player software, was quick to deny that its software could be used to obtain keys. Corel was silent about the role its WinDVD software had played in the leaking of volume and title keys. Both companies have since released updates for their player software.
The consortium behind the HD DVD format and the studios delivering films on the format did not release an official statement beyond that they were investigating the utility. On January 24, 2007 AACS LA issued a statement acknowledging that AACS security had been compromised while urging software vendors to limit the availability of keys in memory. Beginning with discs manufactured in late April, versions of PowerDVD and WinDVD responsible for leaking keys have been revoked and free updates are available to owners of affected versions.
Notes
External links
Original post at Doom9
2006 software
DVD rippers
Video software
Digital rights management circumvention software
Proprietary software |
474278 | https://en.wikipedia.org/wiki/Unreal%20Tournament%202004 | Unreal Tournament 2004 | Unreal Tournament 2004 is a first-person arena shooter video game developed by Epic Games and Digital Extremes. Part of the Unreal franchise, it is the third game in the Unreal Tournament series and the sequel to Unreal Tournament 2003.
Among significant changes to gameplay mechanics and visual presentation, one of the major additions introduced by Unreal Tournament 2004 is the inclusion of vehicles and the Onslaught game type, allowing for large-scale battles.
A sequel, Unreal Tournament 3, was released on November 19, 2007.
Plot
The game is set in a universe where humans long before fought a war with the Skaarj, leaving their galactic empire in shambles. To assist in the rebuilding of the colonies by calming down enraged colonists, the Liandri Corporation came up with the idea of staging a gladiatorial tournament for the miners. The interest was so high that it grew into a sport, with sponsored teams battling in specially made arenas.
From the very beginning, Xan Kriegor, a robot, reigned as champion in the Tournament, until Malcolm, then leading the team Thunder Crash, defeated him and proceeded to merge with the other popular team at the time – the Iron Guard, led by Brock. In last year's tournament, they were defeated by the Juggernauts, led by gene-boosted monster Gorge.
The game takes place as the Tournament enters its 10th year, Malcolm is back with his old team Thunder Crash and trying to reclaim his title as champion, Brock is back with the Iron Guard and trying for the glory of his own and Gorge and the Juggernauts are there to defend their title. Additionally, the Skaarj Empire has sent a team of their own to the tournament in search of honor and glory and ex-champion Xan Kriegor has had some modifications and is back to return the title where it belongs.
Gameplay
Unreal Tournament 2004 is a first-person shooter representing a fast-paced extreme sport of the future. The game, designed primarily for multiplayer gameplay, offers multiple ways of movement including double-jumping, dodge-jumping, wall-dodging and shield-jumping. UT2004 also features an extensive array of weapons, all of which come with a secondary fire. Some of them were designed specifically for use in vehicle-based game types, and typically appear only in those game types such as the Anti-Vehicle Rocket Launcher (AVRiL) and the Grenade Launcher. More than 100 maps are included in the game for all new and existing game types.
Gametypes
The available game types are:
Assault — An objective-oriented game type in which one team attacks the objectives (usually one at a time in a specific order) while another defends. Often, attackers will be rewarded for completing an objective by being allowed to spawn closer to the next objective. If the attacking team completes the final objective within the allowed time, the teams switch roles and another round on the same map begins. If not, the original attackers lose. If a second round begins and the new attackers complete the final objective in less time than the first attackers, they win; if not, they lose.
Onslaught — or ONS is a vehicle-based game mode in which the objective is to capture a series of power nodes connecting the player and their opponents’ bases and destroy the power core located within their base. First team to destroy opponents’ power core wins.
Bombing Run — Each level has a ball that starts in the middle of the playing field. The player's team scores by getting the ball through the enemy team's hoop. The player scores 7 points for jumping through the hoop while holding the ball and 3 points for tossing the ball through the hoop. The player holding the ball cannot use weapons but can pass the ball to teammates. The ball is dropped if the player is killed.
Capture the Flag — The player's team must score flag captures by taking the enemy flag from the enemy base and returning it to their own flag. If the flag carrier is killed, the flag drops to the ground for anyone to pick up. If the player's team's flag is taken, it must be returned (by touching it after it is dropped) before their team can score a flag capture.
Deathmatch — or DM, is a game type, in which the point is to either reach a certain number of frags (or kills) or to the highest number of frags at the time limit for the match.
Team Deathmatch — Two teams duke it out in a quest for battlefield supremacy. The team with the most frags wins.
Invasion — It is a simple survival mode. The players are forced to work together to try and survive endless waves of monsters from Unreal that get increasingly difficult with each wave. Once a player dies they cannot respawn until the round is over. Rounds can either end after a time limit (victory) or when all players are dead (failure).
Double Domination — The player's team scores by capturing and holding both Control Points for ten seconds. Control Points are captured by touching them. After scoring, the Control Points are reset to neutral.
Last Man Standing — Each player starts with a limited number of lives. The last remaining player to still have lives wins the match.
Mutant — All players start in a deathmatch setting with all weapons, and the first player to kill becomes the "mutant". This player receives unlimited ammo, camouflage, Berserk (Increases rate of fire and knockback) and super speed for an indefinite amount of time, but he slowly loses health and can't pick up any health items. When the mutant is killed, the mutant powers are passed to the killer.
Vehicles
There are many vehicles available in Unreal Tournament 2004. Most of them make an appearance in the Onslaught game type, while a few feature in Assault. The full set consists of aircraft types and vehicles. There are also two spacecraft which only officially feature in one Assault map and different types of gun turrets which players can take control of.
Development
Unreal Tournament 2004 was built with Unreal Engine 2.5 and the content of its predecessor, Unreal Tournament 2003. The game was developed by multiple studios, with Epic Games leading the project. Lead programmer Steve Polge described the role of each company involved:
Epic Games
Enhancements to the Unreal Tournament 2003 game types, the new user interface, voice over IP and bot voice command support, engine enhancements and optimizations. They made an improved single-player game, and improved community and demo recording support, in addition to thirty-one new playable characters. A sniper rifle similar to the one included in the original Unreal Tournament was added. They created one Onslaught map, and developed AI support for Onslaught. 16 DM maps, five capture the flag maps, two Double Domination maps and one Bombing Run map were added. The Assault gametype design and implementation were also reintroduced from the original Unreal Tournament.
Digital Extremes
Three deathmatch maps, six capture the flag maps, two Bombing Run maps, and three Double Domination maps, two playable characters, a new HUD design; weapon models for the assault rifle, shock rifle, and link gun.
Psyonix
The Onslaught gametype design and implementation, with six vehicles, four weapons (grenade launcher, Spider Mine Layer, Anti-Vehicular Rocket Launcher (AVRiL), and the Phoenix Target Painter), and the energy turret. They created seven Onslaught maps, and collaborated with Streamline Studios on the popular map ONS-Torlan. They made the model for the Translocator, a portable teleporter.
Streamline Studios
The single-player introduction movie and ONS-Torlan in collaboration with Psyonix. Streamline Studios created the Assault map AS-Confexia as a test for ONS-Torlan, which they released for free.
Release
On February 11, 2004, a playable demo was released for multiple platforms, including Microsoft Windows, OS X, Linux on x86-32 (February 13, 2004) and Linux on x86-64 (February 15, 2004). An updated demo version, including all the bug fixes from official patches and some original content, was released on September 23, 2004.
After being delayed from a late 2003 release, Unreal Tournament 2004 was released on March 16, 2004, for the PC (Linux x86-32/x86-64 and Windows), the Mac OS X version (DVD only) followed on March 31, 2004. The version for Windows x86-64 was released as a downloadable patch on October 1, 2005. At release, consumers could purchase the game on CD, or a limited time special edition DVD version that came with a Logitech microphone headset and a second DVD filled with video-tutorials on how to use the included UnrealEd. A single DVD version with neither the microphone nor tutorials was also released in Europe. The CD version of the game came on six discs. On April 13, 2004, Unreal Tournament 2004 was re-released as a special edition DVD. The game in the United States included a $10 mail-in rebate requiring that a short form is completed and sent to the publisher along with a copy of the manual cover for Unreal Tournament 2003. Versions sold in the United Kingdom had a similar offer but required sending in the play CD for Unreal Tournament 2003 instead.
In summer 2004, Epic and Atari, in collaboration, released an XP Levels downloadable map pack, which included two Onslaught maps, ONS-Ascendancy and ONS-Aridoom. The pack is free for download and use on any system capable of running the game.
On September 21, 2004, Atari released in stores the "Editor's Choice Edition" of Unreal Tournament 2004 which adds three vehicles, four Onslaught maps, and six character skins to the original game, and contains several mods developed by the community as selected by Epic Games. This extension (excluding mods) was released as a Bonus Pack by Atari on September 23, 2004, and is available for free download.
In December 2005, the Mega Bonus Pack was released online by Epic Games, which included several new maps, along with the latest patch and the Editor's Choice Edition content.
In November 2006, Unreal Anthology was released which bundles Unreal Gold, Unreal II: The Awakening, Unreal Tournament (Game of the Year edition), and Unreal Tournament 2004. On March 17, 2008, the game was released standalone and as part of the Unreal Deal Pack on Valve's digital distribution service Steam, followed later in the year by the "Editor's Choice Edition" on GOG.com.
Music
The soundtrack for Unreal Tournament 2004 was composed by Kevin Riepl, Starsky Partridge, and Will Nevins. It contains grand orchestral scores, hard rock, and minimalistic electronic songs. The game also includes almost all tracks from Unreal Tournament 2003.
Modification
Unreal Tournament 2004 includes extensive modification support which allows users to easily create maps, models, game modes as well as various other additions to the game. The game features a flexible modification system which seamlessly blends custom content with the original, as well as allowing for easy tweaking of the game with the "mutator" system.
In 2004, Epic Games held the "Make Something Unreal Contest", which rewarded the creators of the best-submitted modifications with prizes in cash, computer hardware, and, ultimately, a license for commercial use of Unreal Engine 2 and 3. Red Orchestra, a total conversion modification based on the Eastern Front of World War II and focused on realism-oriented gameplay, was the winner of the contest and is currently available as a retail title on Steam.
Alien Swarm was the winner of Phase 4 of the Make Something Unreal Contest for best non-first-person shooter modification. In 2010, the game was released as a standalone game for free, based on the Source engine instead of the Unreal engine.
Killing Floor was originally a total conversion mod for Unreal Tournament 2004, first released in 2005. The retail release followed on May 14, 2009. Its sequel, Killing Floor 2, was released in 2016.
The developers of the acclaimed 2003 game modification Deathball were awarded grant money from Epic to develop Supraball in 2014.
The game served as a platform for the Computer game bot Turing Test competition, also known as BotPrize.
Reception
Upon release, Unreal Tournament 2004 was met with universal acclaim. Several critics praised the unique, fast-paced, fun and challenging nature of the game as its main selling points, while fans touted the post-release support and extensive modding capabilities. The game holds a score of 94% on GameRankings and a score of 93/100 on Metacritic.
GameSpot named Unreal Tournament 2004 the best computer game of March 2004. It received runner-up placements in GameSpot's 2004 "Best Shooter" and "Best Multiplayer Game" award categories across all platforms, losing to Half-Life 2 and Halo 2, respectively. It was a runner-up for Computer Games Magazines list of 2004's top 10 computer games. However, it won the magazine's "Best Multiplayer" award.
In March 2014, GamesRadar ranked Unreal Tournament 2004 as the 70th best game on their "Top 100 Best Video Games of All Time" list.
Awards
References
External links
2004 video games
Atari games
Esports games
Epic Games games
First-person shooters
Arena shooters
Linux games
MacOS games
Multiplayer and single-player video games
Multiplayer online games
Unreal (video game series)
Unreal Engine games
Video game sequels
Video games about death games
Video games developed in Canada
Video games developed in the United States
Video games with user-generated gameplay content
Windows games
MacSoft games |
6684865 | https://en.wikipedia.org/wiki/St.%20Joseph%27s%20College%2C%20Tiruchirappalli | St. Joseph's College, Tiruchirappalli | St. Joseph's College (SJC), Tiruchirappalli in Tamil Nadu, India, was established in 1844 by the Society of Jesus (Jesuits) and it is regarded as one of the prestigious institutions in India. It was affiliated to Madras University in 1869 and is currently an affiliated first grade college of Bharathidasan University.
It is the only college in Tamil Nadu awarded with "Heritage Status" by UGC.
History
St. Joseph's College celebrated its centenary in 1945 and sesquicentenary in 1995. It acquired Five Star status awarded by the National Assessment and Accreditation Council (NAAC) in 2014, was recognised by UGC as a College with Potential for Excellence (CPE) in 2004, and was accredited with A Grade [3rd Cycle] by NAAC in 2012. The college is owned by the Society of St. Joseph's, a body registered under Societies Regulation Act (1860), having its office at Tiruchirappalli. And it has the heritage college status as one among 12 colleges in India in 2016, which is given by the Government of India. Around 30 Jesuits serve on the staff. It acquired the A++ Rank awarded by the recent National Assessment and Accreditation Council (NAAC) in 2019.
Departments
School of Biological Sciences
Botany – The Botany Department dates back to 1912 when the study of natural science was introduced. In 1952, the B.A. Botany degree course became B.Sc. Botany, and in 1958 M.Sc. in Botany. The department is FIST supported, with separate research facilities for Molecular Biology, Physiology, and Bioinformatics. By 2015 the department had awarded 50 Ph.D.s while publishing 500 research papers and 5 books. The department's botanical garden is internationally recognized.
Biochemistry – The Biochemistry Department was started in 1993 at a postgraduate level and became a separate department in 2002. It was one of the first independent departments of Biochemistry in India. By 2015 the department had trained over 400 Biochemists.
Biotechnology – The Department of Biotechnology was started in 2002 to produce Biotechnology postgraduates to cater to industry, academia, and research centres. Bharathidasan University declared it a research department in 2007 adding to the M.Sc. the degrees M.Phil. and Ph.D. A research atmosphere is maintained at the PG level, with students encouraged to attend the national and international symposia and present papers, and to organize workshops, exhibitions, and intercollegiate competitions that will develop their organizing and leadership skills. To make this accessible to the rural and middle-class sectors, the fee is fixed at ₹18,000 per semester.
School of Computing Sciences
Mathematics – The Department of Mathematics was founded with the college in 1844, when it already offered postgraduate courses. In 1911 the University of Madras granted permission to run the honours course in mathematics.
Statistics – The Statistics Department was started in 1978 and became a PG department in 1999, receiving recognition as a research department from the Bharathidasan University that same year.
Computer science – The Department of Computer Science began by offering the B.Sc. in 1983. In 1984 it added the MCA and in 2002 the M.Phil. and Ph.D. St. Joseph's College was the first arts and science college to offer MCA in India and first to produce the Ph.D. in Computer Science in Bharathidasan University. By 2014, the department had produced 15 Ph.D.s and around 150 M.Phil.s.
Information technology – The Department of Information Technology was established in 2007, as a spin-off from the Department of Computer Science. It offers the BCA, M.Sc. Computer Science, and M.Sc. Information Technology. It also offers a Postgraduate Diploma in Computer Science and Applications, with ICT enabled teaching and learning.
School of Languages and Culture
French – The Department of French began from the founding of the college at Nagapattinam in 1844. French was taught to European officials at first and later some Indians were admitted into the course.
History – The Department of History began with the college in 1844. The B.A. in history was introduced when the college was affiliated to the University of Madras. When in 1911 the college became an arts and science college, an honours course in history was introduced. During this period the library stack room in the history section was flooded with primary sources such as dispatches from the East India Company, annual reports of the Archaeological Survey of India, inscription manuals, and gazetteers. But the number of students dwindled and the department was closed down, with the B.A. Honours course continuing up to 1960. B.A. History was revived in 1977. In 2014 the department offers a B.A., M.A., M.Phil., and Ph.D. It has a strong research orientation, producing 42 Ph.D.s and 320 M.Phil. scholars since 1977. The faculty members have authored 16 books both in English and Tamil and published 70 research papers on history and related areas. A biannual research journal Indian Historical Studies has been published by the department since October 2004, financially supported by Indian Council of Historical Research, New Delhi.
Tamil – This is one of the oldest departments. B.A. Tamil was started in 1882 and M.A. Tamil in 1995. It was recognized as a research department in 1986.
Sanskrit – The Department of Sanskrit was started in 1907. Application oriented courses in Sanskrit for beginners were started along with the autonomous system. The curriculum under autonomy was revised to include prosody as a new subject and modified to suit the present needs of the society, keeping abreast of the latest developments.
Hindi – The Hindi Department was started in 1944. Since Tamil Nadu is a non-Hindi speaking state, the department is small but answers to student needs as they arise, e.g., students from Central Schools and Anglo-Indian Schools, from the B.Com. program, and from the evening college.
English – The Department of English is the only department that has contact with every student at the undergraduate level. The B.A. (English) has been offered since 1962, M.A. (English) since 1965, and M.Phil. since 1984.
School of Management Studies
Economics – The Department of Economics at the very beginning of the college was a part of the history B.A., probably because of the predominance of history subjects. The Planning Forum, Economics Association, and Population Club are the co-curricular activities of the department. The department organizes annually a regional-level workshop on research methodology, CADAR memorial lecture, and intercollegiate "ECONS" competitions. Dr. M. Sebastian, S.J., former department head, founded the Association of Economists of Tamil Nadu and Pondicherry. ECONS is a cultural and academic extravaganza organized by the students of the department. It provides an opportunity for students to expose their hidden talents and potentials. Students of various colleges of Bharathidasan University compete for the Rolling Shield given by the department.
Commerce – The Department of Commerce opened in 1948, offering a three-year B.Com. degree. In 1954 it was suspended and in 1957 it was revived. The postgraduate course (M.Com.) was started in 1988. The department started a full-time M.Phil. course in 2001 and a full-time Ph.D. research programme in 2003. In 2002 the specialized M.A. Transport Management was launched, a two-year postgraduate course. The department had some legendary professors such as Prof.M.P.Vellore whom students still cherish his method of teaching.
Human resource management – The Department of Society, Culture, and Civilisation was started in 1983, offering its M.A. degree programme to all graduates in arts or science. Later the department's nomenclature was changed to Social Dynamics, and then to Human Resource Management. It is a value-based and socially oriented course. Input is theoretical and practical to understand the social structure, and the causes and agencies of social change. During the summer vacation, rural and tribal camps, industrial visits, and in-plant and in-house training programmes are offered. All-India educational tours are organized to expose students to diverse cultures.
Business administration – The Department of Business Administration had its origin in the Department of Economics. The department began to function independently from the academic year 2002 onwards as St. Joseph's Institute of Management.
Commerce Computer Applications – The undergraduate degree course in Commerce Computer Application (B.Com. C.A.) was started in the year 2008, and the M.Com. C.A was added in 2011.
School of Physical Sciences
Physics – B.A. Physics was started in 1881, B.Sc. (Hons.) Physics in 1906, and M.Sc. Physics in 1961. The B.A. Physics became B.Sc. Physics in 1930. Recognition was offered by the University of Madras for research work leading to a Ph.D. in 1971, and to a M.Phil. in 1977.
Chemistry – The Department of Chemistry was established in 1906. M.Sc. Chemistry is offered as both a day and evening course. B.Sc. Chemistry is offered only in Shift-I.
Electronics – The BSc Electronics (Bachelor of Electronics Science) was started by the Department of Physics in 1993, to prepare students for self-employment or higher education in various related fields. In the year 1997 the M.Sc. Electronics (Master of Electronics Science) was introduced. The course exposes students to such concepts as Digital Signal Processing (DSP), Embedded System (ES), and VLSI design. The PG students undertake an industrial project in their final semester, to familiarize them with the real-time environment and possible employment opportunities.
Sport
In 2013 and 2014 the team of St. Joseph's College won the Bharathidasan University Inter-Zonal Inter-Collegiate Men's Football Tournament.
Notable alumni
A.P.J. Abdul Kalam, former President of India
Archbishop Michael Augustine, D.D., D.C.L., Former Archbishop of Pondicherry and Cuddalore.
G. N. Ramachandran, scientist, FRS,
A. J. John, chief minister of Travancore-Cochin
Sandilyan, writer
Sujatha, writer
S. Ashok Kumar, judge, Madras High Court and Andhra Pradesh High Court
A. Srinivasa Raghavan, Tamil writer
Srirangam Kannan, Morsing Vidwan, Carnatic musician
S. P. Adithanar, lawyer, politician, minister and founder of the Tamil daily newspaper Dina Thanthi
S. A. Ashokan, famous for villain roles in Tamil Film
V. R. Ramachandra Dikshitar, historian, Indologist and Dravidologist
Prabhu Solomon, film director
D. Napoleon, actor and former Union Minister of State for Social Justice and Empowerment
N. Gopalaswami, Padma Bhushan award winner and former chief election commissioner of India
Vasanth, film director
Major Mariappan Saravanan Vir chakra, Indian army hero of Batalik
R. S. Krishnan, experimental physicist and the discoverer of Krishnan Effect
Balasubramanian Viswanathan, material scientist and emeritus professor IIT Madras
Subramanian Kalyanaraman, neurosurgeon, Shanti Swarup Bhatnagar laureate
E. S. Raja Gopal, physicist, Shanti Swarup Bhatnagar laureate
Sam C. S., music director
Arokia Rajiv, Indian athlete
A. R. Lakshmanan, judge of Supreme court
Joseph Mundassery, Malayalam Literary critic, Politician
See also
List of Jesuit sites
References
Jesuit universities and colleges in India
Universities and colleges in Tiruchirappalli
Educational institutions established in 1844
1844 establishments in British India
Colleges affiliated to Bharathidasan University
Academic institutions formerly affiliated with the University of Madras |
354396 | https://en.wikipedia.org/wiki/Bank%20switching | Bank switching | Bank switching is a technique used in computer design to increase the amount of usable memory beyond the amount directly addressable by the processor instructions. It can be used to configure a system differently at different times; for example, a ROM required to start a system from diskette could be switched out when no longer needed. In video game systems, bank switching allowed larger games to be developed for play on existing consoles.
Bank switching originated in minicomputer systems. Many modern microcontrollers and microprocessors use bank switching to manage random-access memory, non-volatile memory, input-output devices and system management registers in small embedded systems. The technique was common in 8-bit microcomputer systems. Bank-switching may also be used to work around limitations in address bus width, where some hardware constraint prevents straightforward addition of more address lines, and to work around limitations in the ISA, where the addresses generated are narrower than the address bus width. Some control-oriented microprocessors use a bank-switching technique to access internal I/O and control registers, which limits the number of register address bits that must be used in every instruction.
Unlike memory management by paging, data is not exchanged with a mass storage device like disk storage. Data remains in quiescent storage in a memory area that is not currently accessible to the processor (although it may be accessible to the video display, DMA controller, or other subsystems of the computer) without the use of special prefix instructions.
Technique
Bank switching can be considered as a way of extending the address space of processor instructions with some register. Examples:
The follow-on system to a processor with a 12 bit address has a 15 bit address bus, but there is no way to directly specify the high three bits on the address bus. Internal bank registers can be used to provide those bits.
The follow-on system to a processor with a 15 bit address has an 18 bit address bus, but legacy instructions only have 15 address bits; internal bank registers can be used to provide those bits. Some new instructions can explicitly specify the bank.
A processor with a 16-bit external address bus can only address 216 = 65536 memory locations. If an external latch was added to the system, it could be used to control which of two sets of memory devices, each with 65536 addresses, could be accessed. The processor could change which set is in current use by setting or clearing the latch bit. The latch can be set or cleared by the processor in several ways; a particular memory address may be decoded and used to control the latch, or, in processors with separately-decoded I/O addresses, an output address may be decoded. Several bank-switching control bits could be gathered into a register, approximately doubling the available memory spaces with each additional bit in the register. Because the external bank-selecting latch (or register) is not directly connected with the program counter of the processor, it does not automatically change state when the program counter overflows; this cannot be detected by the external latch since the program counter is an internal register of the processor. The extra memory is not seamlessly available to programs. Internal registers of the processor remain at their original length, so the processor cannot directly span all of bank-switched memory by, for example, incrementing an internal register. Instead the processor must explicitly do a bank-switching operation to access large memory objects. There are other limitations. Generally a bank-switching system will have one block of program memory that is common to all banks; no matter which bank is currently active, for part of the address space only one set of memory locations will be used. This area would be used to hold code that manages the transitions between banks, and also to process interrupts.
Often a single database spans several banks, and the need arises to move records between banks (as for sorting). If only one bank is accessible at a time, it would be necessary to move each byte twice: first into the common memory area, perform a bank switch to the destination bank, and then actually to move the byte into the destination bank. If the computer architecture has a DMA engine or a second CPU, and its bank access restrictions differ, whichever subsystem can transfer data directly between banks should be used.
Unlike a virtual memory scheme, bank-switching must be explicitly managed by the running program or operating system; the processor hardware cannot automatically detect that data not currently mapped into the active bank is required. The application program must keep track of which memory bank holds a required piece of data, and then call the bank-switching routine to make that bank active. However, bank-switching can access data much faster than, for example, retrieving the data from disk storage.
Microcomputer use
Processors with 16-bit addressing (8080, Z80, 6502, 6809, etc.) commonly used in early video game consoles and home computers can directly address only 64 KB. Systems with more memory had to divide the address space into a number of blocks that could be dynamically mapped into parts of a larger address space. Bank switching was used to achieve this larger address space by organizing memory into separate banks of up to 64 KB each. Blocks of various sizes were switched in and out via bank select registers or similar mechanisms. Cromemco was the first microcomputer manufacturer to use bank switching, supporting 8 banks of 64 KB in its systems.
When using bank switching some caution was required in order not to corrupt the handling of subroutine calls, interrupts, the machine stack, and so on. While the contents of memory temporarily switched out from the CPU was inaccessible to the processor, it could be used by other hardware, such as video display, DMA, I/O devices, etc. CP/M-80 3.0 released in 1983 and the Z80-based TRS-80s the Model 4 and Model II supported bank switching to allow use of more than the 64 KB of memory that the 8080 or Z80 processor could address.
Bank switching allowed extra memory and functions to be added to a computer design without the expense and incompatibility of switching to a processor with a wider address bus. For example, the C64 used bank switching to allow for a full 64 KB of RAM and still provide for ROM and memory-mapped I/O as well. The Atari 130XE could allow its two processors (the 6502 and the ANTIC) to access separate RAM banks, allowing programmers to make large playfields and other graphic objects without using up the memory visible to the CPU.
Microcontrollers
Microcontrollers (microprocessors with significant input/output hardware integrated on-chip) may use bank switching, for example, to access multiple configuration registers or on-chip read/write memory. An example is the PIC microcontroller. This allows short instruction words to save space during routine program execution, at the cost of extra instructions required to access relatively infrequently used registers, such as those used for system configuration at start-up.
The IBM PC
In 1985, the companies Lotus and Intel introduced Expanded Memory Specification (EMS) 3.0 for use in IBM PC compatible computers running MS-DOS. Microsoft joined for versions 3.2 in 1986 and 4.0 in 1987 and the specification became known as Lotus-Intel-Microsoft EMS or LIM EMS. It is a form of bank switching technique that allows more than the 640 KB of RAM defined by the original IBM PC architecture, by letting it appear piecewise in a 64 KB "window" located in the Upper Memory Area. The 64 KB is divided into four 16 KB "pages" which can each be independently switched. Some computer games made use of this, and though EMS is obsolete, the feature is nowadays emulated by later Microsoft Windows operating systems to provide backwards compatibility with those programs.
The later eXtended Memory Specification (XMS), also now obsolete, is a standard for, in principle, simulating bank switching for memory above 1 MB (called "extended memory"), which is not directly addressable in the Real Mode of x86 processors in which MS-DOS runs. XMS allows extended memory to be copied anywhere in conventional memory, so the boundaries of the "banks" are not fixed, but in every other way it works like the bank switching of EMS, from the perspective of a program that uses it. Later versions of MS-DOS (starting circa version 5.0) included the EMM386 driver, which simulates EMS memory using XMS, allowing programs to use extended memory even if they were written for EMS. Microsoft Windows emulates XMS also, for those programs that require it.
Video game consoles
Bank switching was also used in some video game consoles. The Atari 2600, for instance, could only address 4 KB of ROM, so later 2600 game cartridges contained their own bank switching hardware in order to permit the use of more ROM and thus allow for more sophisticated games (via more program code and, equally important, larger amounts of game data such as graphics and different game stages). The Nintendo Entertainment System contained a modified 6502 but its cartridges sometimes contained a megabit or more of ROM, addressed via bank switching called a Multi-Memory Controller. Game Boy cartridges used a chip called MBC (Memory Bank Controller), which not only offered ROM bank switching, but also cartridge SRAM bank switching, and even access to such peripherals as infrared links or rumble motors. Bank switching was still being used on later game systems. Several Sega Mega Drive cartridges, such as Super Street Fighter II were over 4 MB in size and required the use of this technique (4 MB being the maximum address size).
The GP2X handheld from Gamepark Holdings uses bank switching in order to control the start address (or memory offset) for the second processor.
Video processing
In some types of computer video displays, the related technique of double buffering may be used to improve video performance. In this case, while the processor is updating the contents of one set of physical memory locations, the video generation hardware is accessing and displaying the contents of a second set. When the processor has completed its update, it can signal to the video display hardware to swap active banks, so that the transition visible on screen is free of artifacts or distortion. In this case, the processor may have access to all the memory at once, but the video display hardware is bank-switched between parts of the video memory. If the two (or more) banks of video memory contain slightly different images, rapidly cycling (page-flipping) between them can create animation or other visual effects that the processor might otherwise be too slow to carry out directly.
Alternative and successor techniques
Bank switching was later supplanted by segmentation in many 16-bit systems, which in turn gave way to paging memory management units. In embedded systems, however, bank switching is still often used for its simplicity, low cost, and often better adaptation to those contexts than to general purpose computing.
See also
Sideways address space, an example of bank switching on the BBC Micro
Overlay (programming)
References
External links
Computer memory
Memory management |
10131591 | https://en.wikipedia.org/wiki/Dynamic%20loading | Dynamic loading | Dynamic loading is a mechanism by which a computer program can, at run time, load a library (or other binary) into memory, retrieve the addresses of functions and variables contained in the library, execute those functions or access those variables, and unload the library from memory. It is one of the 3 mechanisms by which a computer program can use some other software; the other two are static linking and dynamic linking. Unlike static linking and dynamic linking, dynamic loading allows a computer program to start up in the absence of these libraries, to discover available libraries, and to potentially gain additional functionality.
History
Dynamic loading was a common technique for IBM's operating systems for System/360 such as OS/360, particularly for I/O subroutines, and for COBOL and PL/I runtime libraries, and continues to be used in IBM's operating systems for z/Architecture, such as z/OS. As far as the application programmer is concerned, the loading is largely transparent, since it is mostly handled by the operating system (or its I/O subsystem). The main advantages are:
Fixes (patches) to the subsystems fixed all programs at once, without the need to relink them
Libraries could be protected from unauthorized modification
IBM's strategic transaction processing system, CICS (1970s onwards) uses dynamic loading extensively both for its kernel and for normal application program loading. Corrections to application programs could be made offline and new copies of changed programs loaded dynamically without needing to restart CICS (which can, and frequently does, run 24/7).
Shared libraries were added to Unix in the 1980s, but initially without the ability to let a program load additional libraries after startup.
Uses
Dynamic loading is most frequently used in implementing software plugins. For example, the Apache Web Server's *.dso "dynamic shared object" plugin files are libraries which are loaded at runtime with dynamic loading. Dynamic loading is also used in implementing computer programs where multiple different libraries may supply the requisite functionality and where the user has the option to select which library or libraries to provide.
In C/C++
Not all systems support dynamic loading. UNIX-like operating systems such as macOS, Linux, and Solaris provide dynamic loading with the C programming language "dl" library. The Windows operating system provides dynamic loading through the Windows API.
Summary
Loading the library
Loading the library is accomplished with LoadLibrary or LoadLibraryEx on Windows and with dlopen on UNIX-like operating systems. Examples follow:
Most UNIX-like operating systems (Solaris, Linux, *BSD, etc.)
void* sdl_library = dlopen("libSDL.so", RTLD_LAZY);
if (sdl_library == NULL) {
// report error ...
} else {
// use the result in a call to dlsym
}
macOS
As a UNIX library:
void* sdl_library = dlopen("libSDL.dylib", RTLD_LAZY);
if (sdl_library == NULL) {
// report error ...
} else {
// use the result in a call to dlsym
}
As a macOS Framework:
void* sdl_library = dlopen("/Library/Frameworks/SDL.framework/SDL", RTLD_LAZY);
if (sdl_library == NULL) {
// report error ...
} else {
// use the result in a call to dlsym
}
Or if the framework or bundle contains Objective-C code:
NSBundle *bundle = [NSBundle bundleWithPath:@"/Library/Plugins/Plugin.bundle"];
NSError *err = nil;
if ([bundle loadAndReturnError:&err])
{
// Use the classes and functions in the bundle.
}
else
{
// Handle error.
}
Windows
HMODULE sdl_library = LoadLibrary(TEXT("SDL.dll"));
if (sdl_library == NULL) {
// report error ...
} else {
// use the result in a call to GetProcAddress
}
Extracting library contents
Extracting the contents of a dynamically loaded library is achieved with GetProcAddress on Windows and with dlsym on UNIX-like operating systems.
UNIX-like operating systems (Solaris, Linux, *BSD, macOS, etc.)
void* initializer = dlsym(sdl_library,"SDL_Init");
if (initializer == NULL) {
// report error ...
} else {
// cast initializer to its proper type and use
}
On macOS, when using Objective-C bundles, one can also:
Class rootClass = [bundle principalClass]; // Alternatively, NSClassFromString() can be used to obtain a class by name.
if (rootClass)
{
id object = [[rootClass alloc] init]; // Use the object.
}
else
{
// Report error.
}
Windows
FARPROC initializer = GetProcAddress(sdl_library,"SDL_Init");
if (initializer == NULL) {
// report error ...
} else {
// cast initializer to its proper type and use
}
Converting a library function pointer
The result of dlsym() or GetProcAddress() has to be converted to a pointer of the appropriate type before it can be used.
Windows
In Windows, the conversion is straightforward, since FARPROC is essentially already a function pointer:
typedef INT_PTR (*FARPROC)(void);
This can be problematic when the address of an object is to be retrieved rather than a function. However, usually one wants to extract functions anyway, so this is normally not a problem.
typedef void (*sdl_init_function_type)(void);
sdl_init_function_type init_func = (sdl_init_function_type) initializer;
UNIX (POSIX)
According to the POSIX specification, the result of dlsym() is a void pointer. However, a function pointer is not required to even have the same size as a data object pointer, and therefore a valid conversion between type void* and a pointer to a function may not be easy to implement on all platforms.
On most systems in use today, function and object pointers are de facto convertible. The following code snippet demonstrates one workaround which allows to perform the conversion anyway on many systems:
typedef void (*sdl_init_function_type)(void);
sdl_init_function_type init_func = (sdl_init_function_type)initializer;
The above snippet will give a warning on some compilers: warning: dereferencing type-punned pointer will break strict-aliasing rules. Another workaround is:
typedef void (*sdl_init_function_type)(void);
union { sdl_init_function_type func; void * obj; } alias;
alias.obj = initializer;
sdl_init_function_type init_func = alias.func;
which disables the warning even if strict aliasing is in effect. This makes use of the fact that reading from a different union member than the one most recently written to (called "type punning") is common, and explicitly allowed even if strict aliasing is in force, provided the memory is accessed through the union type directly. However, this is not strictly the case here, since the function pointer is copied to be used outside the union. Note that this trick may not work on platforms where the size of data pointers and the size of function pointers is not the same.
Solving the function pointer problem on POSIX systems
The fact remains that any conversion between function and data object pointers has to be regarded as an (inherently non-portable) implementation extension, and that no "correct" way for a direct conversion exists, since in this regard the POSIX and ISO standards contradict each other.
Because of this problem, the POSIX documentation on dlsym() for the outdated issue 6 stated that "a future version may either add a new function to return function pointers, or the current interface may be deprecated in favor of two new functions: one that returns data pointers and the other that returns function pointers".
For the subsequent version of the standard (issue 7, 2008), the problem has been discussed and the conclusion was that function pointers have to be convertible to void* for POSIX compliance. This requires compiler makers to implement a working cast for this case.
If the contents of the library can be changed (i.e. in the case of a custom library), in addition to the function itself a pointer to it can be exported. Since a pointer to a function pointer is itself an object pointer, this pointer can always be legally retrieved by call to dlsym() and subsequent conversion. However, this approach requires maintaining separate pointers to all functions that are to be used externally, and the benefits are usually small.
Unloading the library
Loading a library causes memory to be allocated; the library must be deallocated in order to avoid a memory leak. Additionally, failure to unload a library can prevent filesystem operations on the file which contains the library. Unloading the library is accomplished with FreeLibrary on Windows and with dlclose on UNIX-like operating systems. However, unloading a DLL can lead to program crashes if objects in the main application refer to memory allocated within the DLL. For example, if a DLL introduces a new class and the DLL is closed, further operations on instances of that class from the main application will likely cause a memory access violation. Likewise, if the DLL introduces a factory function for instantiating dynamically loaded classes, calling or dereferencing that function after the DLL is closed leads to undefined behaviour.
UNIX-like operating systems (Solaris, Linux, *BSD, macOS, etc.)
dlclose(sdl_library);
Windows
FreeLibrary(sdl_library);
Special library
The implementations of dynamic loading on UNIX-like operating systems and Windows allow programmers to extract symbols from the currently executing process.
UNIX-like operating systems allow programmers to access the global symbol table, which includes both the main executable and subsequently loaded dynamic libraries.
Windows allows programmers to access symbols exported by the main executable. Windows does not use a global symbol table and has no API to search across multiple modules to find a symbol by name.
UNIX-like operating systems (Solaris, Linux, *BSD, macOS, etc.)
void* this_process = dlopen(NULL,0);
Windows
HMODULE this_process = GetModuleHandle(NULL);
HMODULE this_process_again;
GetModuleHandleEx(0,0,&this_process_again);
In Java
In the Java programming language, classes can be dynamically loaded using the object. For example:
Class type = ClassLoader.getSystemClassLoader().loadClass(name);
Object obj = type.newInstance();
The Reflection mechanism also provides a means to load a class if it isn't already loaded. It uses the classloader of the current class:
Class type = Class.forName(name);
Object obj = type.newInstance();
However, there is no simple way to unload a class in a controlled way. Loaded classes can only be unloaded in a controlled way, i.e. when the programmer wants this to happen, if the classloader used to load the class is not the system class loader, and is itself unloaded. When doing so, various details need to be observed to ensure the class is really unloaded. This makes unloading of classes tedious.
Implicit unloading of classes, i.e. in an uncontrolled way by the garbage collector, has changed a few times in Java. Until Java 1.2. the garbage collector could unload a class whenever it felt it needed the space, independent of which class loader was used to load the class. Starting with Java 1.2 classes loaded via the system classloader were never unloaded and classes loaded via other classloaders only when this other classloader was unloaded. Starting with Java 6 classes can contain an internal marker indicating to the garbage collector they can be unloaded if the garbage collector desires to do so, independent of the classloader used to load the class. The garbage collector is free to ignore this hint.
Similarly, libraries implementing native methods are dynamically loaded using the System.loadLibrary method. There is no System.unloadLibrary method.
Platforms without dynamic loading
Despite its promulgation in the 1980s through UNIX and Windows, some systems still chose not to add—or even to remove—dynamic loading. For example, Plan 9 from Bell Labs and its successor 9front intentionally avoid dynamic linking, as they consider it to be "harmful". The Go programming language, by some of the same developers as Plan 9, also did not support dynamic linking, but plugin loading is available since Go 1.8 (February 2017). The Go runtime and any library functions are statically linked into the compiled binary.
See also
Compile and go system
DLL Hell
Direct binding
Dynamic binding (computing)
Dynamic dispatch
Dynamic library
Dynamic linker
Dynamic-link library
FlexOS
GNU linker
gold (linker)
Library (computing)
Linker (computing)
Loader (computing)
Name decoration
Prebinding
Prelinking
Relocation (computer science)
Relocation table
Resident System Extension (RSX)
Static library
Terminate and Stay Resident (TSR)
References
Further reading
External links
General Links
Dynamic Loading on Linux4U
Dynamic Shared Object (DSO) Support by Apache
C++ Dynamic Linking By Example
Dynamic Library Loading Example (complete but concise working example)
Dynamic Library Programming Topics from Apple Developer Connection (targeted to macOS)
C/C++ UNIX API:
dlopen
dlsym
dlclose
C/C++ Windows API:
LoadLibrary
GetProcAddress
FreeLibrary
Delay-Loaded DLLs
Java API:
ClassLoader
Class
Computer libraries
Operating system technology |
40179273 | https://en.wikipedia.org/wiki/Monkey%20HTTP%20Server | Monkey HTTP Server | Monkey HTTP Server is an optimized web server for Linux. It is designed to achieve high performance under high loads by making the most of the Linux kernel in terms of specific system calls and optimization techniques. It is HTTP/1.1 compliant (RFC 2616) and supports common features such as IPv6, TLS, Virtual Hosts, CGI, FastCGI, Directory Listing, and Security Rules.
The server is designed as a small core extensible through its plugin interface. The binary size of Monkey is around 100 KB and around 250 KB on runtime depending on the loaded plugins. Monkey can perform well on x86 and x86-64, and ARM architectures running Linux embedded variants.
Monkey was started in 2001 as an open source project. It is currently licensed under the Apache License v2.
References
External links
Debinux: Monkey Server on Debian Linux Debian
Monkey Server: Yocto Project Participant: Yocto Project
Techrepublic.com: Easy way to get a web server up and running on smaller or embedded systems
RealTime Logic: Barracuda Drive Server Software Benchmarks
Monkey Project in Google Summer of Code
Damn Small Linux (DSL) Wiki : Setting Up Monkey Server
Free web server software
Web server software for Linux |
15687548 | https://en.wikipedia.org/wiki/Postage%20stamps%20and%20postal%20history%20of%20the%20Palestinian%20National%20Authority | Postage stamps and postal history of the Palestinian National Authority | The Palestinian National Authority began in 1994 to issue stamps and operate postal services as authorized by the Oslo Accords.
Postal service
Starting in 1994–95, the Palestinian National Authority (PNA) established post offices throughout the PNA, developed its own unique postmarks and issued stamps. In its first decade, the PNA expanded from 49 to 82 post offices (1994–2004). It provides a range of mailing services and issued its first stamp booklets in 2000.
In 1999, the PNA and Israel agreed that PNA mail could be sent directly to Egypt and Jordan. Earlier, the PNA had claimed that Israel had violated its agreements regarding postal service by impeding mail to Egypt and Jordan. When mail addressed to Arab countries could not be delivered, it was marked with a "no service" cachet because it could not be forwarded. The lack of forwarding has been due apparently to Israeli policy and the Arab boycott. At times, The PNA's Ministry of Telecom & Information Technology issued a critical report on postal services in areas under Israeli control. In 2002, the minister of PNA Post and Telecommunications, Imad al-Faluji, claimed that Israel had destroyed its post offices in Gaza.
Prior to 2021, the PNA did not have postcodes or addressing rules that would help automate and improve delivery services. A project to develop such a system started in 2010 with preliminary codes and a map being published in January 2011. In February 2021, the Palestinian Authority announced the implementation of its own postal codes, and that postal items not bearing a postal code would not be processed after April. This move came in part with an intent to assert Palestinian sovereignty, however, post in Palestine is still subject to seizure and blockades as it passes through Jordan and/or Israel prior to delivery. Palestinian postcodes begin with the capital letter 'P', followed by three digits which represent the governorate, postal sector, and zone respectively. Four characters may be appended to the postcode which indicate the final point of delivery.
Recognition of PNA postal authority
The PNA is authorized to manage postal operations, issue stamps and postal stationery, and set rates, under agreements signed between Israel and the PNA following the Oslo Accords. The agreements specifically regulate the wording that can be used on the stamps issued, specifying that they "shall include only the terms 'the Palestinian Council' or 'the Palestinian Authority.'"
The first PNA stamps, printed by German state printer Bundesdruckerei Berlin, used the currency designation mils (which was the currency of the British Mandate of Palestine between 1927 and 1948). Israel protested over this issue, and all early stamps issued in 1994 had to be overprinted with fils (1/1000 of a Jordanian dinar), as illustrated by the souvenir sheet shown. A Palestinian newspaper, The Jerusalem Times, broke the story of the mils mistake on the stamps.
Initially, PNA stamps were recognized only by Arab states, according to the PNA minister of post and telecommunications.
Israel approved of PNA postage, following disputes over the currency designation, in November 1995. Direct mail service with Jordan is said to have resumed in 2007.
Deliveries between the PNA and foreign countries are made through commercial agreements with Egypt, Israel, and Jordan. The Universal Postal Union and its member countries generally do not recognize stamps issued by entities that have not achieved full independence, such as the lands controlled in the Gaza Strip and West Bank by the PNA. Indeed, its accord with Israel (Article 29) stipulates that the PNA's lack of membership in the Universal Postal Union would not change, nor would the PNA seek to change its status. The UPU and PNA do maintain relations (see picture). Nonetheless, it has become clear that the stamps issued by the PNA were functioning for postal activities within Palestine and for international postal communications. According to the New York Times, the doubts of stamp collectors were removed by the listing of the PNA in philatelic catalogs. Accordingly, collectors are analyzing not only stamps but also such matters as Palestinian postmarks and tariffs.
Besides their postal role, Israeli post offices have played a pivotal role in political affairs for Palestinians in East Jerusalem. In 1996 and 2006, Israeli post offices in East Jerusalem served as voting stations for Palestinian elections.
Post-2009 situation
Due to the political split between the Fatah-controlled West Bank and the Hamas-controlled Gaza Strip in 2009, there exist two separate postal administrations: The Ministry of Telecom & Information Technology in Gaza, and Palestine Post of the Palestinian Ministry of Telecom & IT in Ramallah/al-Bireh. Both are issuing stamps for their respective areas, although for international use only the PNA stamps issued in the West Bank are valid.
Postage stamps issued
The Scott Publishing Company began incorporating stamps issued by the PNA into its catalogue of worldwide stamps in 1999. The initial listing was for the 77 stamps issued between 1994 and July 1997 and appeared in the July issue of Scott Stamp Monthly, the company's magazine for collectors.
In 1994, the PNA's stamps featured the Palestinian flag, architectural scenes, and a souvenir sheet a commemorative of the Gaza–Jericho Agreement. It also issued a series of six official mail stamps.
In 1995, due to pressure from Israel, the 1994 designs were reissued with an overprint of fils as its currency; for an example, see the Gaza-Jericho souvenir sheet pictured.
PNA stamps have honored various individuals: Yasser Arafat (1996), the visiting Pope John Paul II (1996), German politician Hans-Jürgen Wischnewski (1997), Mother Teresa (1997), U.S. President Bill Clinton signing the Wye River Memorandum, French President Jacques Chirac, and artist Ibrahim Hazimeh, whose fours works appear on a souvenir sheet (2001).
The PNA also has commemorated anniversaries of the Arab League with a souvenir sheet, philatelic exhibitions with landscape photographs placed in gutter blocks honoring (1996), a series and sheet for the 1996 Atlanta Olympics, the return of Hong Kong to China (1997), the first elections within the PNA (a 1996 souvenir sheet), the opening of the Gaza airport, and the PNA's admission to the United Nations (1998). The PNA produced three stamps with inset reproductions of Mandate stamps.
The PNA also issues annual Christmas stamps, such as a nativity scene series on a souvenir sheet (1996).
Themes chosen for PNA stamps include: two series of Palestinian costumes (1997, 2002), local plants (1996), birds, photographs of 19th century Gaza and Hebron, the Canaanite god Baal, Byzantium era mosaics, butterflies, horses, tales of the Arabian nights, the airship LZ 127 Graf Zeppelin, cacti (2003), Palestinian universities, folk art (2003). Along its nature themes, stamps were issued with the World Wildlife Fund (2001).
The PNA did not issue any new stamps in 2004 or 2007. In 2008 a set of for stamps commemorating the late poet Mahmoud Darwish has been released.
Forgeries
A number of forgeries of PNA stamps have been sold, for instance on eBay. These illegal stamps include a series on chessmasters Garry Kasparov and Anatoly Karpov and Pope John Paul II, as pictured here. The authentic PNA stamp of the Pope is shown above to the left.
Philatelic Bureaux
Originally all philatelic services were based at the GPO in Gaza City, but since the political split between the Fatah-controlled West Bank and the Hamas-controlled Gaza Strip in 2009 there exist two offices selling stamps, FDCs, etc., issued by their respective authorities to collectors:
Ministry of Telecom & Information Technology (Gaza): General Post Office, Omer al-Mukhtar, Gaza City.
Palestine Post (West Bank): Post Office al-Bireh
See also
Postage stamps and postal history of Palestine
References and sources
References
Sources
Wallach, Josef: The gradual termination of the Israeli postal services in the Gaza Strip and Jericho, May 4–17, 1994: an eye-witness report. Holy Land Postal History. Vol. 3, no. 59, 1994, pp. 1023–1036.
Wallach, Josef: The transition period of the Palestinian Authority post : part 1 ; pen cancellation & provisional postmarks. Holy Land Postal History. Vol. 4, no. 65/66, 1996, pp. 149–157.
Wallach, Josef: The transition period of the Palestinian Authority post : part 2 ; the external postal communications from the Palestinian Authority. Holy Land Postal History. Vol. 4, no. 73/74, 1997, pp. 418–429.
Zywietz, Tobias: Registration marks and labels of the Palestinian National Authority. The Israel Philatelist. Vol. 58, 2007, no. 4, pp. 156–157; and The BAPIP Bulletin. Vol. 17, no. 156, 2007, pp. 1–6.
Zywietz, Tobias: The postmarks of the Palestinian National Authority : part 1 : a classification of types. The Israel Philatelist. Vol. 60, 2009, no. 3, pp. 104–107; and The BAPIP Bulletin. Vol. 17, no. 159, 2009, pp. 19–23.
External links
A Short Introduction To The Philately Of Palestine
Forwarding, Underground Mail during Israeli Occupation
Palestine Postcode Listing
Palestinian territories
National symbols of the Palestinian National Authority
Palestinian National Authority
Philately of Palestine |
48594059 | https://en.wikipedia.org/wiki/OpenCart | OpenCart | OpenCart is an online store management system. It is PHP-based, using a MySQL database and HTML components. Support is provided for different languages and currencies. It is freely available under the GNU General Public License. As of May 2016, 342,000 websites were using OpenCart.
History
OpenCart was originally developed in 1998 by Christopher G. Mann for Walnut Creek CDROM and later The FreeBSD Mall. The first public release was on May 11, 1999. Developed in Perl, the project saw little activity, and progress stalled in 2000, with Mann posting a message on April 11 stating "other commitments are keeping me from OpenCart development".
The domain expired in February 2005 before being revived by Daniel Kerr, a UK-based developer, who used it as the basis for his own e-commerce software, written in PHP. The first stable release was version 1.1.1, released onto Google Code on 10 February 2009.
In September 2014, Kerr claimed that OpenCart was the number one e-commerce software supplier in China while in August 2015 it was recorded as responsible for 6.42% of the global e-commerce volumes recorded by builtwith.com, behind WooCommerce and Magento and ahead of OSCommerce, ZenCart and Shopify. In February 2017, he stated that OpenCart had about 317,000 live OpenCart sites, which was, according to Kerr, more than Shopify or Magento.
Version 2.0 of the software was released in October 2014, featuring an extensive update of the interface.
Version 2.2.0.0 of the software was released in March 2016, after months of testing from OpenCart users.
Version 3.0.3.7 of the software was released in Feb 2021, in collaboration with Webkul.
Features
Anti-Fraud
OpenCart uses fraud management services such as FraudLabs, ClearSale and Global Payments to review customer orders.
Payments
The OpenCart package offers a variety of payment methods, from bank transfers to online payment gateways. The available core payment methods in an OpenCart installation are as follows: 2Checkout, Authorize.Net, Amazon Payments, Bank Transfer, Cash On Delivery, Klarna, PayPal, Skrill, SagePay and many more.
Publications
See also
Comparison of shopping cart software
List of online payment service providers
References
External links
Free e-commerce software
Free software programmed in PHP |
681920 | https://en.wikipedia.org/wiki/B2evolution | B2evolution | b2evolution is a content and community management system written in PHP and backed by a MySQL database. It is distributed as free software under the GNU General Public License.
b2evolution originally started as a multi-user multi-blog engine when François Planque forked b2evolution from version 0.6.1 of b2/cafelog in 2003. A more widely known fork of b2/cafelog is WordPress. b2evolution is available in web host control panels as a "one click install" web app.
Most of the early major releases were named after famous cities or particular places the project maintainer has visited and/or was inspired by.
After version 5.0, the project began to emphasize online community and online marketing features and integration with social networking sites, with the ability to automatically post new content to Twitter. To highlight the software's ability to manage many types of content, its blogs were renamed to "collections".
b2evolution 5.0 was rapidly adopted, becoming the most popular version, but overall b2evolution usage is declining relative to competitors WordPress and Drupal. Currently, it is installed on less than 0.1% of web sites.
Main Features
Known primarily for its multi-blog capabilities, b2evolution also includes "all the features of traditional blog tools" like file & photo management, advanced skinning, multiple domain support, detailed user permissions, and W3C standards compliance. It installs on almost any LAMP (Linux, Apache, MySQL/MariaDB, PHP) server. The software will run on IIS using FastCGI, but database servers other than MySQL and MariaDB are not supported. Configuration is handled through the installer or administrative back-end.
In addition to its ability to manage multiple blogs, b2evolution supports multiple users and admins under a single installation without the need of external plugins. b2evolution also supports numerous third-party plugins. These include text format extensions enabling Textile, Auto-P, Greymatter, BB code, Texturize, LaTeX, and graphic smilies. Also, plugins which facilitate full integration with third party tools such as Gallery 2, YouTube, and digg are available.
Other features include community-wide spam filters, in which many b2evolution sites aggregate and tag spammer IPs into a central blacklist for the benefit of all b2evolution blogs, a button to declare "comment spam bankruptcy"—which deletes all comments across an entire b2evolution installation, a fully skinnable interface, strong SEO features including automatic redirection of renamed articles and insertion of canonical link tags, url shortening, localization into a dozen language packs, and a fully exposed API for plugin developers to add new functionality. b2evolution's code is factored into the blog application itself and a framework called EvoCore. EvoCore can be used on its own to build non-blog web applications.
See also
List of content management systems
Content Management System
Blog software
References
External links
GitHub repository
PHPBuilder article on b2evolution
An interview with François Planque
Free content management systems
Blog software
Free software programmed in PHP
Software forks |
15006141 | https://en.wikipedia.org/wiki/Portrait%20Professional | Portrait Professional | Portrait Professional or PortraitPro is a Windows and Mac based portrait imaging enhancement software targeted at professional and keen amateur photographers. Developed by Anthropics Technology Ltd and first released in July 2006, it has been in continuous development ever since.
The current software, version 18, was released in October 2018, the previous version, 17, was released in October 2017.
PortraitPro, PortraitPro Studio, and PortraitPro Studio Max are image editors for Windows and Mac OS X, specifically targeted at editing portrait photographs.
Rather than using brushes alone as a traditional image editor does, PortraitPro "instantly detects faces in each image opened" and applies automatic retouching. Further transformations are done through sliders or brushes. One of the unique, but controversial abilities is automatically reshaping the face to fit a model of beauty.
The Studio editions do the above and additionally handle raw files, 16 bit per color component TIFF files and color profiles. It is also available as a Photoshop plugin. The Studio Max edition offers automatic batch processing in which multiple images are retouching automatically by the software.
Features
Below is a list of the features currently available in the latest version of PortraitPro, version 18:
Automatically detect faces in an image
Reshape all or any aspect of the face
Corrects skin blemishes such as spots or pimples
Smooth out and neaten hair
Thicken and re-color hair.
Reduce and/or remove wrinkles
Remove grease, sweat or shine highlights from the skin
Adjust the lighting on the face
Add realistic looking makeup
Remove red eye
Recolor eyes
Whiten teeth and eyes
Sharpen individual features like eyes, eyebrows, nose and mouth
Change backgrounds
Add overlays, watermarks or logos
Plugin
PortraitPro Studio functions as a standalone, as a Photoshop plugin and as a plugin to Elements, Lightroom, and Aperture
Language availability
PortraitPro is available in English, French, German, Italian, Spanish, Brazilian Portuguese. Older versions are also available in Swedish, Arabic, Chinese, Korean and Japanese.
Cultural impact
The cultural impact of airbrushing software being readily available to anyone is a proliferation of airbrushed images being used on social media profiles and online dating sites.
Portrait editing software such as Portrait Professional enables anyone to easily alter their own portrait photographs, making themselves look younger, with less wrinkles and blemishes.
History
Portrait Professional was originally known as My Perfect Picture. Portrait Professional started at version 4. It required a web server to process the image. Version 5 did so as well. Version 6 was the first version to run without needing a connection to a web server.
Version 8 improved face sculpting and slimming, user interface, color calibration and raw support in the Studio version.
Version 9 was the first version to offer ClearSkin skin improving technology and also to work as a standalone and as a Photoshop plugin. Other improvements included the ability to handle profile views, a batch mode, and an intelligent touch up brush. In response to customer requests, version 10 had improved plugin support for Photoshop, Lightroom and Aperture, a new child mode, and an enhance skin only mode. Major improvements in version 11 (November 2012) included its automated face and feature finder, an improved handling of multiple faces within one session, and improved face contouring and slimming.
Version 12, released in March 2014, was rebranded PortraitPro. Major improvements included the ability to change the lighting on the face, improved feature enhancing, and in the Studio Max edition only, an automatic batch mode with the ability to automatically determine age and gender of each face.
Versions 13 and 14 were skipped; the next version sold was 15 in line with the year of release. Later versions have all been named for their release year.
Version 17 was launched in October 2017 and was the first version to include background removal in replacement. It also included a snapshots option for temporarily saving edits to return to later.
Version 18 was released in October 2018, the same month that Anthropics launched PortraitPro Body 3. Version 18 offered improved face detection technology and Smart Filter capability.
Version 19 was released in October 2019 . Version 19 offered Intelligent Skin Smoothing, Enhanced Hair Retouching, Expression Sliders and Interactive Tutorials.
Version 20 ???
Version 21 was released in December 2020, Introducing Brand New Features Such as Sky Replacement, Lighting Brushes, De-Noiser, Clone tool, History, and lots more...
Version 22 was released in October 2021, Introducing Neck & Shoulder thinning, Chin reshaping, Body Lighting, Hairline, ...
Tools
Presets. Known as Saved Sliders or Presets depending on version, these are pre-loaded slider settings that have been determined to work best for a particular subject, for example to make a young woman look glamorous.
Touch Up/ Restore Brush. The former paints over spots or blemishes in the skin that have not been eliminated automatically; the latter restores them. Adjust the size and strength of the brush with the sliders beside it.
Batch Mode. Developed to particularly appeal to those photographers who retouch a high volume of photos.
Face Sculpt Controls subtly reshape the face to beautify facial features.
Skin Smoothing Controls improve the appearance of the skin. Also provides tools to refine the areas that Portrait Professional treats as skin.
Eye Controls improve the appearance of the eyes. Also provides an option to enable red-eye removal.
Mouth and Nose Controls improve the appearance of the mouth and nose.
Skin Coloring Controls alter the color of the skin.
Skin Lighting Controls enhance the lighting on the skin.
Makeup Controls add and enhance makeup in a portrait. Adjust eyeliner, eyshadow, lipstick, blusher, mascara. Added in version 15 of the software.
Hair Controls improve the appearance of the hair. Also provides tools to let you refine the areas that Portrait Professional treats as hair.
Picture Controls are for various aspects of the whole image, such as brightness and contrast. Also provide a cropping tool.
Layers allows the user to remove or replace the background and to add overlays.
See also
Raster Graphics Editors
References
External links
Raster graphics editors
Photo software
Adobe Photoshop
Windows graphics-related software
MacOS graphics-related software |
8229010 | https://en.wikipedia.org/wiki/Call%20of%20Duty | Call of Duty | Call of Duty is a first-person shooter video game franchise published by Activision. Starting out in 2003, it first focused on games set in World War II. Over time, the series has seen games set in the midst of the Cold War, futuristic worlds, and outer space. The games were first developed by Infinity Ward, then also by Treyarch and Sledgehammer Games. Several spin-off and handheld games were made by other developers. The most recent title, Call of Duty: Vanguard, was released on November 5, 2021.
The series originally focused on the World War II setting, with Infinity Ward developing the first (2003) and second (2005) titles in the series and Treyarch developing the third (2006). Call of Duty 4: Modern Warfare (2007) introduced a new, modern setting, and proved to be the breakthrough title for the series, creating the Modern Warfare sub-series. The game's legacy also influenced the creation of a remastered version, released in 2016. Two other entries, Modern Warfare 2 (2009) and Modern Warfare 3 (2011), were made. The sub-series received a reboot with Modern Warfare in 2019. Infinity Ward have also developed two games outside of the Modern Warfare sub-series, Ghosts (2013) and Infinite Warfare (2016). Treyarch made one last World War II-based game, World at War (2008), before releasing Black Ops (2010) and subsequently creating the Black Ops sub-series. Four other entries, Black Ops II (2012), III (2015), 4 (2018), and Cold War (2020) were made, the latter in conjunction with Raven Software. Sledgehammer Games, who were co-developers for Modern Warfare 3, have also developed three titles, Advanced Warfare (2014), WWII (2017), and Vanguard (2021).
, the series has sold over 400 million copies. Earlier games in the series released to universal acclaim, but several of the more recent installments have received mixed reviews, with some criticzing the series themes and supposed repetitivity. Meanwhile, the games in the series have consistently released annually to blockbuster-level sales, the series is verified by the Guinness World Records as the best-selling first-person shooter game series. It is also the most successful video game franchise created in the United States and the third best-selling video game franchise of all time. Other products in the franchise include a line of action figures designed by Plan B Toys, a card game created by Upper Deck Company, Mega Bloks sets by Mega Brands, and a comic book miniseries published by WildStorm Productions.
Main series
World War II games
Call of Duty
Call of Duty is a first-person shooter video game based on id Tech 3, and was released on October 29, 2003. The game was developed by Infinity Ward and published by Activision. The game simulates the infantry and combined arms warfare of World War II. An expansion pack, Call of Duty: United Offensive, was developed by Gray Matter Interactive with contributions from Pi Studios and produced by Activision. The game follows American and British paratroopers and the Red Army. The Mac OS X version of the game was ported by Aspyr Media. In late 2004, the N-Gage version was developed by Nokia and published by Activision. Other versions were released for PC, including Collector's Edition (with soundtrack and strategy guide), Game of the Year Edition (includes game updates), and the Deluxe Edition (which contains the United Offensive expansion and soundtrack; in Europe the soundtrack was not included). On September 22, 2006, Call of Duty, United Offensive, and Call of Duty 2 were released together as Call of Duty: War Chest for PC. Since November 12, 2007, Call of Duty games have been available for purchase via Valve's content delivery platform Steam.
Call of Duty 2
Call of Duty 2 is a first-person shooter video game and the sequel to Call of Duty. It was developed by Infinity Ward and published by Activision. The game is set during World War II and is experienced through the perspectives of soldiers in the Red Army, British Army, and United States Army. It was released on October 25, 2005, for Microsoft Windows, November 15, 2005, for the Xbox 360, and June 13, 2006, for Mac OS X. Other versions were made for mobile phones, Pocket PCs, and smartphones.
Call of Duty 3
Call of Duty 3 is a first-person shooter and the third installment in the Call of Duty video game series. Released on November 7, 2006, the game was developed by Treyarch, and was the first major installment in the Call of Duty series not to be developed by Infinity Ward. It was also the first not to be released on the PC platform. It was released on the PlayStation 2, PlayStation 3, Wii, Xbox, and Xbox 360.
Call of Duty: WWII
Call of Duty: WWII is the fourteenth game in the series and was developed by Sledgehammer Games. It was released worldwide on November 3, 2017, for Microsoft Windows, PlayStation 4 and Xbox One. The game is set in the European theatre, and is centered around a squad in the 1st Infantry Division, following their battles on the Western Front, and set mainly in the historical events of Operation Overlord.
Call of Duty: Vanguard
Call of Duty: Vanguard is the eighteenth game in the series and is developed by Sledgehammer Games, with Treyarch developing the game's Zombies mode. It was released on November 5, 2021, for PC, PlayStation 4, PlayStation 5, Xbox One and Xbox Series X/S. The story depicts the birth of special forces to face an emerging threat at the end of the war during various theaters of World War II.
Modern Warfare series
Call of Duty 4: Modern Warfare
Call of Duty 4: Modern Warfare is the fourth installment of the main series, and was the first game in the Modern Warfare timeline. Developed by Infinity Ward, it is the first game in the series not to be set during World War II. The game was released for Microsoft Windows, Nintendo DS, PlayStation 3, and Xbox 360 on November 7, 2007. Download and retail versions for Mac OS X were released by Aspyr in September 2008. As of May 2009, Call of Duty 4: Modern Warfare has sold over 13 million copies.
Call of Duty: Modern Warfare Remastered
Call of Duty: Modern Warfare Remastered is a remastered version of Call of Duty 4: Modern Warfare that was released alongside the Legacy Edition, Legacy Pro Edition and Digital Deluxe Edition of Call of Duty: Infinite Warfare on November 4, 2016, for PlayStation 4, Xbox One, and PC. It was later released standalone on June 27, 2017, for PS4, and July 27, 2017, for Xbox One and PC. The game was developed by Raven Software and executive produced by Infinity Ward.
Call of Duty: Modern Warfare 2
Call of Duty: Modern Warfare 2 is the sixth installment of the main series, and the second game in the Modern Warfare timeline. It was developed by Infinity Ward and published by Activision. Activision Blizzard announced Modern Warfare 2 on February 11, 2009. The game was released worldwide on November 10, 2009, for the Xbox 360, PlayStation 3 and Microsoft Windows. A Nintendo DS iteration of the game, titled Call of Duty: Modern Warfare: Mobilized, was released alongside the game and the Wii port of Call of Duty : Modern Warfare. Modern Warfare 2 is the direct sequel to Call of Duty 4 and continues the same storyline, taking place five years after the first game and featuring several returning characters including Captain Price and "Soap" MacTavish.
Call of Duty: Modern Warfare 3
Call of Duty: Modern Warfare 3 is a first-person shooter video game. It is the eighth installment of the Call of Duty series and the third installment of the Modern Warfare arc. Due to a legal dispute between the game's publisher Activision and the former co-executives of Infinity Ward – which caused several lay-offs and departures within the company – Sledgehammer Games assisted in the development of the game, while Raven Software was brought in to make cosmetic changes to the menus of the game. The game was said to have been in development since only two weeks after the release of Call of Duty: Modern Warfare 2. Sledgehammer was aiming for a "bug free" first outing in the Call of Duty franchise, and had also set a goal for Metacritic review scores above 95 percent.
The game continues the story from the point at which it ended in the Call of Duty: Modern Warfare 2 and continues the fictional battle story between the United States and Russia, which evolves into the Third World War between NATO allied nations and ultra-nationalist Russia.
Call of Duty: Modern Warfare (2019)
Call of Duty: Modern Warfare is the sixteenth entry in the Call of Duty series and is also a reboot of the Modern Warfare series. The story has been described to be darker and more realistic than previous Call of Duty games. It is set in the Black Ops timeline, separate from the other Modern Warfare games (however, characters such as Captain Price and other fan favorites from the series make a return). The game was officially revealed on May 30, 2019, and released on October 25, 2019.
The second main battle royale installment in the Call of Duty franchise, titled Call of Duty: Warzone, was released in March 2020, as a part of the Call of Duty: Modern Warfare video game but does not require purchase of it. The title exceeded 50 million players in the first month after release.
Black Ops story arc
Call of Duty: World at War
Call of Duty: World at War, developed by Treyarch, is the fifth installment of the main series. Released after Modern Warfare, it returns to the World War II setting of earlier titles, featuring the Pacific theater and Eastern front. The game uses the same proprietary game engine as Call of Duty 4 and was released for the PC, PlayStation 3, Wii, Xbox 360 consoles and the Nintendo DS handheld in North America on November 11, 2008, and November 14, 2008, in Europe. As of June 2009, Call of Duty: World at War has sold over 11 million copies. It acts as a prologue for Treyarch's next game, Black Ops, which is in the same universe, sharing characters and story references.
Call of Duty: Black Ops
Call of Duty: Black Ops is the seventh installment in the series, the third developed by Treyarch, and was published by Activision for release on November 9, 2010. It is the first game in the series to take place during the Cold War and also takes place partially in the Vietnam War. It was initially available for Microsoft Windows, Xbox 360, and PlayStation 3 and was later released for the Wii as well as the Nintendo DS.
Call of Duty: Black Ops II
Call of Duty: Black Ops II is the ninth main installment in the series, developed by Treyarch and published by Activision. The game was revealed on May 1, 2012. It was the first game in the series to feature future warfare technology, and the campaign features multiple branching storylines driven by player choice and multiple endings. It was later released on November 12, 2012.
Call of Duty: Black Ops III
Call of Duty: Black Ops III is the twelfth main installment in the series, developed by Treyarch and published by Activision. The game was released on November 6, 2015.
Call of Duty: Black Ops 4
Call of Duty: Black Ops 4 is the fifteenth main installment in the series. It was developed by Treyarch and published by Activision. The game was released on October 12, 2018. It was the first featured Call of Duty game to forgo a single-player campaign game mode, focusing only at the multiplayer aspect of the game. The game also introduced an entirely new battle royale game mode, called Blackout, in addition to multiplayer and zombies co-op mode.
Call of Duty: Black Ops Cold War
Call of Duty: Black Ops Cold War is the seventeenth main installment in the series. It was developed by Treyarch and Raven Software, and published by Activision. The game was released on November 13, 2020. Set during the 1980s and focusing on Soviet and American espionage during the Cold War, the game is chronologically set between Call of Duty: Black Ops and Black Ops II.
Standalone games
Call of Duty: Ghosts
Call of Duty: Ghosts is the tenth main installment in the series, and was developed by Infinity Ward. The game was released on November 5, 2013. It was the first game to be developed for eighth-gen consoles such as PlayStation 4 and Xbox One.
Call of Duty: Advanced Warfare
Call of Duty: Advanced Warfare is the eleventh main installment in the series, developed by Sledgehammer Games with assistance from Raven Software and High Moon Studios. It was released in November 2014. The game was the first game in the series to feature advanced movements, such as double jump and boost slide.
Call of Duty: Infinite Warfare
Call of Duty: Infinite Warfare is the thirteenth main installment in the series, developed by Infinity Ward, and was published by Activision. The game was released on November 4, 2016.
Primary developer rotation
In 2006, Treyarch released Call of Duty 3, their first Call of Duty game of the main series. Treyarch and Infinity Ward signed a contract stating that the producer of each upcoming title in the series would alternate between the two companies. In 2010, Sledgehammer Games announced they were working on a main series title for the franchise. This game was postponed in order to help Infinity Ward produce Modern Warfare 3. In 2014, it was confirmed that Sledgehammer Games would produce the 2014 title, Call of Duty: Advanced Warfare, and the studios would begin a three-year rotation. After Sledgehammer developed Call of Duty: WWII (2017), they began developing a new Call of Duty entry alongside Raven Software due for release in 2020. However, there were conflicts of interest between the two, which resulted in Treyarch taking over control of the project in order to speed up the development process.
Other games
Console titles
Call of Duty: Finest Hour
Call of Duty: Finest Hour is the first console installment of Call of Duty, and was released on the GameCube, PlayStation 2, and Xbox. The PlayStation 2 and Xbox versions of the game include an online multiplayer mode which supports up to 32 players. It also includes new game modes.
Call of Duty 2: Big Red One
Call of Duty 2: Big Red One is a spin-off of Call of Duty 2 developed by Treyarch, and based on the American 1st Infantry Division's exploits during World War II. The game was released on GameCube, PlayStation 2, and Xbox.
Call of Duty: World at War – Final Fronts
Call of Duty: World at War – Final Fronts is the PlayStation 2 adaptation of Call of Duty: World at War. Developed by Rebellion Developments, Final Fronts features three campaigns involving the U.S. fighting in the Pacific theater, the Battle of the Bulge, and the British advancing on the Rhine River into Germany.
Call of Duty: The War Collection
Call of Duty: The War Collection is a boxed set compilation of Call of Duty 2, Call of Duty 3 and Call of Duty: World at War. It was released for the Xbox 360 on June 1, 2010.
Handheld titles
Call of Duty: Roads to Victory
Call of Duty: Roads to Victory is a PSP game which is a portable spin-off of Call of Duty 3.
Call of Duty: Modern Warfare: Mobilized
Call of Duty: Modern Warfare: Mobilized is the Nintendo DS companion game for Modern Warfare 2. Developed by n-Space, the game takes place in the same setting as the main console game, but follows a different storyline and cast of characters. Playing as the S.A.S. and the Marines in campaign mode, both forces are trying to find a nuclear bomb.
Call of Duty: Black Ops DS
Call of Duty: Black Ops DS is the Nintendo DS companion game for Black Ops. Developed by n-Space, the game takes place in the same setting as the main console game, but follows a different storyline and cast of characters.
Call of Duty: Black Ops: Declassified
Call of Duty: Black Ops: Declassified is a PlayStation Vita Call of Duty game.
PC titles
Call of Duty Online
Call of Duty Online was announced by Activision when the company first stated their interest in a Massively multiplayer online game (MMO) in early 2011. By then, it had been in development for two years. Call of Duty Online is free-to-play for mainland China and is hosted by Tencent. Since Activision had lost the publishing rights to Call of Duty and several other franchises in China due to a legal dispute on most of the gaming consoles (Xbox 360, PlayStation 3, and Wii).
Call of Duty Warzone
Call of Duty Warzone is an online battle royale game announced by Raven Software and released by Activision. The game was released on March 10, 2020, as part of Modern Warfare (2019) and later, Black Ops Cold War following the latter's release in November 2020. Warzone became a standalone battle royale title later in 2020 and is continually updated with seasonal and unique feature updates . Activision has announced that this game will have a mobile version sometime in the future.
Mobile titles
Call of Duty: Modern Warfare 2: Force Recon
Call of Duty: Modern Warfare 2: Force Recon is the J2ME mobile game for Modern Warfare 2. Developed by Glu Mobile, the game takes place after 5 years Modern Warfare in Mexico.
Call of Duty: Zombies and Zombies 2
Call of Duty: Zombies is a first-person shooter video game developed by Ideaworks Game Studio, and published by Activision for iOS. It is a spin-off of the Call of Duty series, and based on the "Nazi Zombies" mode of Call of Duty: World at War.
Call of Duty: Strike Team
Call of Duty: Strike Team is a first and third-person shooter game developed by The Blast Furnace, and published by Activision for iOS and Android. The game is set in 2020 with players tasked with leading a U.S. Joint Special Operations Team after the country "finds themselves in a war with an unknown enemy".
Call of Duty: Heroes
Call of Duty: Heroes was a real-time strategy game developed by Faceroll Games, and published by Activision for Android and iOS.
Call of Duty: Mobile
Call of Duty: Mobile is the franchise's mobile title for iOS and Android developed by Tencent Games' TiMi Studios. It was released on October 1, 2019. Previously, it was first announced on March 18, 2019, at the year's Game Developers Conference. As of October 4, 2019, the game has surpassed over 35 million downloads worldwide.
Canceled titles
Call of Duty: Combined Forces
Call of Duty: Combined Forces was a proposed concept draft originally intended to be a sequel to Call of Duty: Finest Hour. However, due to multiple legal issues that arose between Spark Unlimited, Electronic Arts, and Activision as well as other production problems, the game's draft and scripts never came to be. The game was projected to cost $10.5 million to produce after Finest Hour was complete. Eventually, Activision deemed the pitch as more of an expansion than something entirely new, causing the company to reject the proposal and end their contract with Spark Unlimited shortly after.
Call of Duty: Devil's Brigade
Call of Duty: Devil's Brigade was a canceled first-person shooter for the Xbox 360 developed by Underground Entertainment. The game was set in World War II, mainly focusing on the Italian Campaign.
Call of Duty: Vietnam
Call of Duty: Vietnam was a third-person shooter set during the Vietnam War. It was in development for at least six to eight months at Sledgehammer Games. The development was stopped because Infinity Ward needed help finishing Call of Duty: Modern Warfare 3 due to the employee firings and departures in 2010.
Call of Duty: Roman Wars
Call of Duty: Roman Wars was a canceled third and first-person video game in the Call of Duty franchise. The game was set in ancient Rome, and allowed players to take control of famous historical figure Julius Caesar, along with "low grunts", and officers of the Tenth Legion. It was eventually canceled, as Activision had uncertainties about branding it as a Call of Duty title.
Other media
Comic books
Modern Warfare 2: Ghost is a six-part comic book mini-series based on Call of Duty: Modern Warfare 2. The storyline focuses on the backstory of the character Simon "Ghost" Riley. The series is published by WildStorm and the first issue was released on November 10, 2009, alongside the game.
Call of Duty: Zombies is a six-part comic book series published by Dark Horse Comics. The series ties in with the Zombies game mode of the Black Ops subseries developed by Treyarch. The series is co-written by Justin Jordan, Treyarch's Jason Blundell and Craig Houston. The series is illustrated by artist Jonathan Wayshak and colorist Dan Jackson. The cover arts are handled by artist Simon Bisley. The series was announced by Treyarch in July 2016, with the first issue slated for release in October. After a slight delay, the first issue was released on October 26, 2016. The five other issues were released in the months of 2017: issue #2 released on January 11, 2017; issue #3 released on March 1, 2017; issue #4 released on April 19, 2017; issue #5 released on June 21, 2017; and issue #6 released on August 23, 2017. A paperback edition containing all six issues was released on November 15, 2017.
Merchandise
The Call of Duty Real-Time Card Game was announced by card manufacturer Upper Deck.
In 2004, Activision, in cooperation with the companies Plan-B Toys and Radioactive Clown, released the "Call of Duty: Series 1" line of action figures, which included three American soldiers and three German soldiers from the World War II era. While the American G.I. action figure was made in 2004, Plan-B Toys later discontinued a controversial Nazi SS Guard action figure based on the Nazi Totenkopf officer seen in Call of Duty.
In 2008, McFarlane Toys announced their partnership with Activision to produce action figures for the Call of Duty series. McFarlane Toys' first series of action figures were released in October 2008 and consists of four different figures: Marine with Flamethrower, Marine Infantry, British Special Ops, and Marine with Machine Gun.
Short films
Find Makarov is a fan-made film that was well received by Call of Duty publishers, Activision, who contacted We Can Pretend and subsequently produced a second short film, Operation Kingfish.
Find Makarov: Operation Kingfish is a fan-made prequel to Call of Duty: Modern Warfare 2 and was first shown at Call of Duty XP. The video was produced by We Can Pretend, with visual effects by The Junction, and was endorsed by Activision. The video tells the story of how Captain Price ended up in a Russian Gulag set before the events of Modern Warfare 2.
Films
On November 6, 2015, upon the release of Black Ops III, The Hollywood Reporter reported that Activision Blizzard launched a production studio called Activision Blizzard Studios and are planning a live action Call of Duty cinematic universe in 2019. On February 16, 2018, it was announced that Stefano Sollima will direct the film. Days later, he told Metro UK that he is considering having both Tom Hardy and Chris Pine as the leads for the film. In an interview with FilmSlash, Sollima stated that the film will be a real soldier movie, not a war movie. On November 27, 2018, it was announced that Joe Robert Cole will be writing the sequel. Filming on the first film was supposed to start filming in Spring 2019 for a 2020 or 2021 release. In February 2020, Sollima revealed in an interview that the film is put on hold saying that it's not Activision's priority.
Esports
The Call of Duty games were used in esports, starting in 2006, alongside the game released at the time, Call of Duty 4: Modern Warfare. Over the years, the series has extended with releases such as Call of Duty: World at War, Call of Duty: Modern Warfare 2, Call of Duty: Black Ops, Call of Duty: Modern Warfare 3, Call of Duty: Black Ops II, and Call of Duty: Ghosts. Games are played in leagues like Major League Gaming.
Players can compete in ladders or tournaments. The ladders are divided into several sub ladders such as the singles ladder, doubles ladder, team ladder (3v3 – 6v6) and hardcore team ladder (3v3 – 6v6). The difference between the regular team ladder and the hardcore team ladder is the in-game settings and thus a rule differentiation. Winning ladder matches on a competitive website rewards the user with experience points which add up to give them an overall rank.
The tournaments offered on these websites provide players with the opportunity to win cash prizes and trophies. The trophies are registered and saved on the player's profile if/when they win a tournament and the prize money is deposited into his or her bank account. Call of Duty: Ghosts was the most competitively played game in 2014, with an average of 15,000 teams participating every season.
For the past 6 seasons in competitive Call of Duty, Full Sail University has hosted a prize giveaway, giving $2,500 to the top team each season. The other ladders give out credits and medals registered on players' profiles. Tournaments hosted on the Call of Duty: Ghostss Arena give cost from 15 to 30 credits, thus averaging at a cost of about $18.75 per tournament. If the player competes with a team, the prize money is divided and an equal cut is given to each player. Other tournaments with substantial prizes are hosted in specific cities and countries for LAN teams.
The biggest Call of Duty tournament hosted was Call of Duty: Experience 2011, a tournament that began when Call of Duty: Modern Warfare 3 was released.
Playing Call of Duty competitively is most popular in Europe and North America, with users who participate in tournaments and ladder matches daily.
Activision launched a 12 team Call of Duty League, following a similar city-based franchise structure as the Overwatch League, in January 2020. The league's teams include those from Atlanta, Chicago, Dallas, Florida, London, Minnesota, New York, Paris, Seattle and Toronto, and with two teams from Los Angeles, OpTic Gaming Los Angeles (now Los Angeles Thieves) and Los Angeles Guerrillas.
Call of Duty Endowment
The Call of Duty Endowment (CODE) is a nonprofit foundation created by Activision Blizzard to help find employment for U.S. military veterans. The first donation, consisting of $125,000, was presented to the Paralyzed Veterans of America.
Co-chairman General James L. Jones is a former U.S. National Security Advisor. Founder Robert Kotick is the CEO of Activision Blizzard. Upon its founding in 2009, the organization announced a commitment to create thousands of career opportunities for veterans, including those returning from the Middle East. Annual awards given by the endowment include the "Seal of Distinction", a $30,000 initial grant given to selected veteran's service organizations. In November 2014, the endowment launched the "Race to 1,000 Jobs" campaign to encourage gamers to donate money to and get involved in organizations that provide veterans with services. , the Call of Duty Endowment had provided around $12 million in grants to veterans' organizations in the United States, which has helped find jobs for 14,700 veterans.
On March 30, 2010, CODE presented 3,000 copies of Call of Duty: Modern Warfare 2, approximately $180,000 in value, to the U.S. Navy. The copies were delivered to over 300 ships and submarines as well as Navy Morale, Welfare, and Recreation facilities worldwide.
Controversies and legal matters
Modern Warfare 2 controversies
Modern Warfare 2 on release had a number of controversial matters. Most significantly, the level "No Russian" had the player experience a massacre of civilians at a Russian airport.
Fallout with Infinity Ward leadership
As Infinity Ward's founders Jason West and Vince Zampella started new contract negotiations to continue developing the Call of Duty Activision around 2007, a number of legal issues arose between Infinity Ward and Activision. Ultimately, West and Zampella were forced out of Infinity Ward, later forming Respawn Entertainment within Electronic Arts. West and Zampella, as well as several Infinity Ward staff that departed the studio alongside them to join Respawn, filed lawsuits against Activision related to unpaid royalties and bonuses.
Trademark infringement claims by AM General
AM General, the manufacturer of the Humvee, sued Activision in 2017 for using the Humvee in multiple Call of Duty games. A federal district judge gave Activision a summary motion in its favor to dismiss the case in April 2020, stating that the purpose of the use of the Humvee in the games, to provide military realism, was quite different from the trademark purpose that AM General had established, for selling to the military.
References
External links
Activision Blizzard franchises
Activision games
Esports games
First-person shooters
Multiplayer online games
Tencent
Third-person shooters
Video game franchises introduced in 2003
Video game franchises
Windows games
World War II video games |
64819914 | https://en.wikipedia.org/wiki/List%20of%20International%20Organization%20for%20Standardization%20standards%2C%2030000-31999 | List of International Organization for Standardization standards, 30000-31999 | This is a list of published International Organization for Standardization (ISO) standards and other deliverables. For a complete and up-to-date list of all the ISO standards, see the ISO catalogue.
The standards are protected by copyright and most of them must be purchased. However, about 300 of the standards produced by ISO and IEC's Joint Technical Committee 1 (JTC1) have been made freely and publicly available.
ISO 30000 – ISO 31999
ISO 30000:2009 Ships and marine technology – Ship recycling management systems – Specifications for management systems for safe and environmentally sound ship recycling facilities
ISO 30002:2012 Ships and marine technology – Ship recycling management systems – Guidelines for selection of ship recyclers (and pro forma contract)
ISO 30003:2009 Ships and marine technology – Ship recycling management systems – Requirements for bodies providing audit and certification of ship recycling management
ISO 30004:2012 Ships and marine technology – Ship recycling management systems – Guidelines for the implementation of ISO 30000
ISO 30005:2012 Ships and marine technology – Ship recycling management systems – Information control for hazardous materials in the manufacturing chain of shipbuilding and ship operations
ISO 30006:2010 Ship recycling management systems – Diagrams to show the location of hazardous materials onboard ships
ISO 30007:2010 Ships and marine technology – Measures to prevent asbestos emission and exposure during ship recycling
ISO 30042:2019 Management of terminology resources — TermBase eXchange (TBX)
ISO/IEC 30071 Information technology — Development of user interface accessibility
ISO/IEC 30071-1:2019 Part 1: Code of practice for creating accessible ICT products and services
ISO/IEC 30100 Information technology – Home network resource management
ISO/IEC 30100-1:2016 Part 1: Requirements
ISO/IEC 30100-2:2016 Part 2: Architecture
ISO/IEC 30100-3:2016 Part 3: Management application
ISO/IEC 30101:2014 Information technology – Sensor networks: Sensor network and its interfaces for smart grid system
ISO/IEC TR 30102:2012 Information technology – Distributed Application Platforms and Services (DAPS) – General technical principles of Service Oriented Architecture
ISO/IEC TS 30103:2015 Software and Systems Engineering – Lifecycle Processes – Framework for Product Quality Achievement
ISO/IEC TS 30104:2015 Information Technology – Security Techniques – Physical Security Attacks, Mitigation Techniques and Security Requirements
ISO/IEC 30105 Information technology – IT Enabled Services-Business Process Outsourcing (ITES-BPO) lifecycle processes
ISO/IEC 30105-1:2016 Part 1: Process reference model (PRM)
ISO/IEC 30105-2:2016 Part 2: Process assessment model (PAM)
ISO/IEC 30105-3:2016 Part 3: Measurement framework (MF) and organization maturity model (OMM)
ISO/IEC 30105-4:2016 Part 4: Terms and concepts
ISO/IEC 30105-5:2016 Part 5: Guidelines
ISO/IEC 30106 Information technology – Object oriented BioAPI
ISO/IEC 30106-1:2016 Part 1: Architecture
ISO/IEC 30106-2:2016 Part 2: Java implementation
ISO/IEC 30106-3:2016 Part 3: C# implementation
ISO/IEC 30107 Information technology – Biometric presentation attack detection
ISO/IEC 30107-1:2016 Part 1: Framework
ISO/IEC 30107-3:2017 Part 3: Testing and reporting
ISO/IEC 30108 Information technology – Biometric Identity Assurance Services
ISO/IEC 30108-1:2015 Part 1: BIAS services
ISO/IEC TR 30109:2015 Information technology – User interfaces – Worldwide availability of personalized computer environments
ISO/IEC TR 30110:2015 Information technology – Cross jurisdictional and societal aspects of implementation of biometric technologies – Biometrics and children
ISO/IEC 30111:2013 Information technology – Security techniques – Vulnerability handling processes
ISO/IEC TR 30112:2014 Information technology – Specification methods for cultural conventions
ISO/IEC 30113 Information technology – Gesture-based interfaces across devices and methods
ISO/IEC 30113-1:2015 Part 1: Framework
ISO/IEC 30113-11:2017 Part 11: Single-point gestures for common system
ISO/IEC TR 30114 Information technology – Extensions of Office Open XML file formats
ISO/IEC TR 30114-1:2016 Part 1: Guidelines
ISO/IEC 30114-2:2018 Part 2: Character repertoire checking
ISO/IEC 30116:2016 Information technology – Automatic identification and data capture techniques – Optical Character Recognition (OCR) quality testing
ISO/IEC TR 30117:2014 Information technology – Guide to on-card biometric comparison standards and applications
ISO/IEC 30121:2015 Information technology – Governance of digital forensic risk framework
ISO/IEC 30122 Information technology – User interfaces – Voice commands
ISO/IEC 30122-1:2016 Part 1: Framework and general guidance
ISO/IEC 30122-2:2017 Part 2: Constructing and testing
ISO/IEC 30122-3:2017 Part 3: Translation and localization
ISO/IEC 30122-4:2016 Part 4: Management of voice command registration
ISO/IEC TR 30125:2016 Information technology – Biometrics used with mobile devices
ISO/IEC 30128:2014 Information technology – Sensor networks – Generic Sensor Network Application Interface
ISO/IEC 30129:2015 Information technology – Telecommunications bonding networks for buildings and other structures
ISO/IEC 30130:2016 Software engineering – Capabilities of software testing tools
ISO/IEC TR 30132 Information technology – Information technology sustainability – Energy efficient computing models
ISO/IEC TR 30132-1:2016 Part 1: Guidelines for energy effectiveness evaluation
ISO/IEC 30134 Information technology – Data centres – Key performance indicators
ISO/IEC 30134-1:2016 Part 1: Overview and general requirements
ISO/IEC 30134-2:2016 Part 2: Power usage effectiveness (PUE)
ISO/IEC 30134-3:2016 Part 3: Renewable energy factor (REF)
ISO/IEC TS 30135 Information technology – Digital publishing – EPUB3
ISO/IEC TS 30135-1:2014 Part 1: EPUB3 Overview
ISO/IEC TS 30135-2:2014 Part 2: Publications
ISO/IEC TS 30135-3:2014 Part 3: Content Documents
ISO/IEC TS 30135-4:2014 Part 4: Open Container Format
ISO/IEC TS 30135-5:2014 Part 5: Media Overlay
ISO/IEC TS 30135-6:2014 Part 6: EPUB Canonical Fragment Identifier
ISO/IEC TS 30135-7:2014 Part 7: EPUB3 Fixed-Layout Documents
ISO/IEC 30170:2012 Information technology – Programming languages – Ruby
ISO/IEC 30182:2017 Smart city concept model – Guidance for establishing a model for data interoperability
ISO/IEC 30190:2016 Information technology – Digitally recorded media for information interchange and storage – 120 mm Single Layer (25,0 Gbytes per disk) and Dual Layer (50,0 Gbytes per disk) BD Recordable disk
ISO/IEC 30191:2015 Information technology – Digitally recorded media for information interchange and storage – 120 mm Triple Layer (100,0 Gbytes single sided disk and 200,0 Gbytes double sided disk) and Quadruple Layer (128,0 Gbytes single sided disk) BD Recordable disk
ISO/IEC 30192:2016 Information technology – Digitally recorded media for information interchange and storage – 120 mm Single Layer (25,0 Gbytes per disk) and Dual Layer (50,0 Gbytes per disk) BD Rewritable disk
ISO/IEC 30193:2016 Information technology – Digitally recorded media for information interchange and storage – 120 mm Triple Layer (100,0 Gbytes per disk) BD Rewritable disk
ISO 30300:2011 Information and documentation – Management systems for records – Fundamentals and vocabulary
ISO 30301:2011 Information and documentation – Management systems for records – Requirements
ISO 30302:2015 Information and documentation – Management systems for records – Guidelines for implementation
ISO 30400:2016 Human resource management – Vocabulary
ISO 30401:2018 Knowledge management system - Requirements
ISO 30405:2016 Human resource management – Guidelines on recruitment
ISO/TR 30406:2017 Human resource management – Sustainable employability management for organizations
ISO/TS 30407:2017 Human resource management – Cost-Per-Hire
ISO 30408:2016 Human resource management – Guidelines on human governance
ISO 30409:2016 Human resource management – Workforce planning
ISO 30414:2018 Human resource management – Guidelines for internal and external human capital reporting
ISO 30500:2018 Non-sewered sanitation systems — Prefabricated integrated treatment units — General safety and performance requirements for design and testing
ISO 31000:2018 Risk management – Principles and guidelines
ISO/TR 31004:2013 Risk management – Guidance for the implementation of ISO 31000
ISO/IEC 31010:2009 Risk management – Risk assessment techniques
ISO 31030:2021 Travel risk management — Guidance for organizations
ISO/IEC/IEEE 31320 Information technology – Modeling Languages
ISO/IEC/IEEE 31320-1:2012 Part 1: Syntax and Semantics for IDEF0
ISO/IEC/IEEE 31320-2:2012 Part 2: Syntax and Semantics for IDEF1X97 (IDEFobject)
Notes
References
External links
International Organization for Standardization
ISO Certification Provider
International Organization for Standardization |
17017917 | https://en.wikipedia.org/wiki/Software%20studies | Software studies | Software studies is an emerging interdisciplinary research field, which studies software systems and their social and cultural effects. The implementation and use of software has been studied in recent fields such as cyberculture, Internet studies, new media studies, and digital culture, yet prior to software studies, software was rarely ever addressed as a distinct object of study. To study software as an artifact, software studies draws upon methods and theory from the digital humanities and from computational perspectives on software. Methodologically, software studies usually differs from the approaches of computer science and software engineering, which concern themselves primarily with software in information theory and in practical application; however, these fields all share an emphasis on computer literacy, particularly in the areas of programming and source code. This emphasis on analysing software sources and processes (rather than interfaces) often distinguishes software studies from new media studies, which is usually restricted to discussions of interfaces and observable effects.
History
The conceptual origins of software studies include Marshall McLuhan's focus on the role of media in themselves, rather than the content of media platforms, in shaping culture. Early references to the study of software as a cultural practice appear in Friedrich Kittler's essay, "Es gibt keine Software", Lev Manovich's Language of New Media, and Matthew Fuller's Behind the Blip: Essays on the Culture of Software. Much of the impetus for the development of software studies has come from video game studies, particularly platform studies, the study of video games and other software artifacts in their hardware and software contexts. New media art, software art, motion graphics, and computer-aided design are also significant software-based cultural practices, as is the creation of new protocols and platforms.
The first conference events in the emerging field were Software Studies Workshop 2006 and SoftWhere 2008.
In 2008, MIT Press launched a Software Studies book series with an edited volume of essays (Fuller's Software Studies: A Lexicon), and the first academic program was launched, (Lev Manovich, Benjamin H. Bratton, and Noah Wardrip-Fruin's "Software Studies Initiative" at U. California San Diego).
In 2011, a number of mainly British researchers established Computational Culture, an open-access peer-reviewed journal. The journal provides a platform for "inter-disciplinary enquiry into the nature of the culture of computational objects, practices, processes and structures."
Related fields
Software studies is closely related to a number of other emerging fields in the digital humanities that explore functional components of technology from a social and cultural perspective. Software studies' focus is at the level of the entire program, specifically the relationship between interface and code. Notably related are critical code studies, which is more closely attuned to the code rather than the program, and platform studies, which investigates the relationships between hardware and software.
See also
Cultural studies
Digital sociology
References
Footnotes
Bibliography
Further reading
External links
Software studies bibliography at Monoskop.org
Computing culture
Cultural studies
Digital humanities
Science and technology studies
Software
Technological change |
5778225 | https://en.wikipedia.org/wiki/California%20Department%20of%20Consumer%20Affairs | California Department of Consumer Affairs | The California Department of Consumer Affairs (DCA) is a department within the California Business, Consumer Services, and Housing Agency. DCA's stated mission is to serve the interests of California's consumers by ensuring a standard of professionalism in key industries and promoting informed consumer practices. The DCA provides the public with information on safe consumer practices, in an effort to protect the public from unscrupulous or unqualified people who promote deceptive products or services.
DCA licenses or certifies practitioners in more than 255 professions. There are currently more than 2.4 million practitioners licensed by the DCA. The Department consists of more than 40 bureaus, boards, committees, commission, and other entities that license and regulate practitioners. Regulatory duties include investigating complaints against licensees and disciplining violators. Boards, committees, and commissions operate independently but rely on DCA for administrative support. Fees paid by these licensees fund DCA operations almost exclusively. Bureaus, programs, divisions, and offices are under the full control of DCA.
List of bureaus, boards, and commissions
California Board of Chiropractic Examiners
California Athletic Commission
California Board of Accountancy
California Board of Acupuncture
California Architects Board
California Board for Professional Engineers, Land Surveyors, and Geologists
California Board of Barbering and Cosmetology
California Board of Behavioral Sciences
California Bureau of Electronic and Appliance Repair, Home Furnishings and Thermal Insulation
California Board of Guide Dogs for the Blind
California Board of Optometry
California Board of Pharmacy
California Board of Vocational Nursing and Psychiatric Technicians
California Bureau of Automotive Repair
California Bureau of Marijuana Control, formerly the Bureau of Medical Marijuana Regulation
California Bureau of Naturopathic Medicine
California Bureau for Private Postsecondary Education
California Bureau of Real Estate
California Bureau of Real Estate Appraisers
California Bureau of Security and Investigative Services
California Cemetery and Funeral Bureau
California Complaint Resolution Program
California Contractors State License Board
California Court Reporters Board
California Dental Board
California Dental Hygiene Committee
California Hearing Aid Dispensers Bureau
California Landscape Architects Technical Committee
Medical Board of California
Osteopathic Medical Board of California
Consumer support
DCA provides the public with live telephone assistance in more than 170 languages for consumer-related questions and concerns. The Department publishes a number of publications on consumer-related issues, the most popular being the California Tenants Guide. Publications are free to the public and are made available on the department's website.
DCA's enforcement staff works with the Office of the Attorney General of California and local district attorneys to investigate fraudulent activity in the marketplace. Many investigations are initiated as a result of complaints from consumers.
DCA has a Complaint Resolution Program to help resolve disputes between consumers and businesses.
History
Consumer protection in California began with the passage of the Medical Practice Act of 1876. The Act was designed to regulate the State's medical professionals, who up to that point had operated virtually unchecked. However, an actual government agency with the legal authority to enforce the Act was not created until 1878. The three boards created that year were later consolidated into what is now the Medical Board of California. Additional professions and vocations were brought under State authority in the next 30 years. By the late 1920s, the Department of Vocational and Professional Standards was responsible for licensing or certifying accountants, barbers, cosmetologists, dentists, embalmers, optometrists, pharmacists, physicians, and veterinarians. The Consumer Affairs Act was passed in 1970, giving the Department its current name.
Administration
DCA’s boards, bureaus, and other entities are supported by a dedicated and highly skilled staff of legal, technical, and administrative professionals. These professionals provide a wide range of support services including human resources, information technology, investigations, professional examinations, training, strategic planning, budgeting, and more.
The Office of Administrative Services provides accounting, business, personnel, and budget services. It consists of Business Services, Human Resources, and Fiscal Operations. Business Services ensures that DCA entities promote sound business decisions and practices in contracting and purchasing goods and services. It also manages DCA’s many facilities, vehicle fleet, emergency response, and its mailroom, copying, and imaging services. Human Resources provides human resources support for DCA employees. Fiscal Operations provides budget, accounting, and central cashiering services.
The Office of Information Services directs and manages information technology for all of DCA. It consists of Applications Services, Enterprise Technology Services, Infrastructure Services, Client Services, Enterprise Project Services, and the Information Security Office. Application Services maintains the Consumer Affairs System and the Applicant Tracking System databases that form the core of DCA’s business processes. Enterprise Technology maintains and supports DCA’s UNIX/Wide Area Network as well as the Internet and intranet sites, and maintains the enterprise architecture. Infrastructure Services maintains the desktop and network services, and phone services. Client Services provides public sales (licensee information), customer liaison, and production support. It includes the Family Support Unit, which maintains systems that involve processing limited license hold issues related to child support systems, and the Service Desk. Enterprise Project Services provides project management assistance, control agency liaison services, oversees the OIS change management and release process, manages the BreEZe project that will replace the DCA legacy systems, and is implementing IT Governance. The Information Security Office establishes the IT security and data privacy policies, maintains the business continuity planning process, investigates IT security breaches, and acts as liaison to the State Information Technology Agency in matters related to the IT security of DCA.
The Complaint Resolution Program helps resolve complaints that consumers have filed after experiencing difficulty or disappointment in the California marketplace.
The Consumer information Center is DCA’s information resource center for consumers and licensees. Through its Call Center and Correspondence Unit, CIC provides consumers and licensees with user-friendly information and identifies for them the government agency or community organization that can best address their needs. CIC phone agents answer calls from consumers to DCA’s toll-free number. Correspondence Unit staff respond to e-mails and letters sent to the Department.
The Equal Employment Opportunity Office promotes equal employment opportunity at DCA. The EEO Office also promotes affirmative action for people with disabilities and works to prevent and eliminate discriminatory practices through policy implementation, training, education, and outreach.
The Division of Investigation is the law enforcement and investigative branch of DCA. It is the only entity within DCA that employs investigators who are designated peace officers. DOI staff work to provide timely, objective, and cost-effective investigations regarding allegations of misconduct by licensees of client agencies, and to developing information for filing criminal, administrative, and civil actions on behalf of these agencies. DOI field investigations frequently involve allegations of the illegal use and theft of drugs, sexual misconduct, quality-of-care issues, and unlicensed activity. Within the DOI is the Special Operations Unit which is responsible for workplace security and employee safety at DCA.
The Legal Division includes the Legal Office, the Legal Services Unit, and the Administrative Unit. These units provide legal services to the Department’s Executive staff and to all DCA entities. The Legal Office serves as in-house counsel for the Director as well as the boards, bureaus, programs, and other entities of DCA. Legal Office lawyers provide legal analysis and opinions on laws, issues, proposed legislation, government contracts, employer-employee matters, the Open Meetings Act, the Public Records Act, and the Information Practices Act. The Legal Services Unit counsels the Director in carrying out the consumer mandates of the Consumer Affairs Act. This unit created and maintains several consumer handbooks and guides, including California Tenants: A Guide to Residential Tenants’ and Landlords’ Rights and Responsibilities; The Small Claims Court: A Guide to Its Practical Use; and more than 30 consumer-oriented legal guides. The Administrative Unit provides in-house counsel to the Department’s administrative divisions and Division of Investigation and represents DCA before the State Personnel Board and the Department of Personnel Administration.
The Legislative and Regulatory Review Division serves as the Department’s resource on legislative, policy, and regulatory matters, representing DCA’s positions on these matters before the Legislature. The Division monitors and analyzes legislative bills on consumer issues, reviews proposed regulation packages, and provides substantive policy consultation and review on myriad issues throughout DCA and its entities. Division staff also advise the Director on public policy affecting consumers, as well as on any proposed regulations that impact the health, safety, and welfare of Californians. Division staff attend all board and bureau meetings to identify, analyze, and monitor policy issues, as well as other matters of interest.
The Office of Professional Examination Services provides psychometric consulting services for the management of occupational licensure examination programs. OPES’ services include occupational analysis, item writing, examination development, standard setting, program evaluation, and statistical analysis of examination performance. OPES follows the highest technical and professional standards in the industry to ensure that licensing examinations are valid, job-related, and legally defensible. In addition to servicing 30—40 interagency contracts with DCA boards, bureaus, and committees, OPES also oversees the master contract for examination administration at computer-based testing centers throughout the State. In June 2013, OPES implemented a new master contract with PSI Services LLC, resulting in cost savings of 10 percent for its clients that use the contract.
The Office of Public Affairs creates and executes strategic media and communications plans for DCA, proactively provides news media with information of interest to consumers, and responds to media inquiries. OPA alerts media to unlicensed activity sweeps.
The Office of Publications, Design & Editing designs, edits, updates, and distributes more than 200 consumer publications, newsletters, and reports produced by DCA’s various entities and by its Executive Office. PDE supports DCA’s licensees by producing and publishing online newsletters for many of its boards and bureaus, and supports DCA staff by producing Did You Know?, the monthly online newsletter for employees. PDE staff also write, edit, design, and distribute DCA’s award-winning quarterly consumer magazine, Consumer Connection.
Solid Training Solutions supports the development of all DCA employees through the design, delivery, evaluation, and administration of training and education programs. Its mission is to develop and manage a centralized program for training, education, and human resources development which ensures a skilled workforce that can meet DCA’s strategic objectives. In addition, SOLID offers strategic planning assistance, process improvement, and more.
References
Department of Consumer Affairs in the 2010-2011 budget
External links
California Department of Consumer Affairs
Department of Consumer Affairs in the California Code of Regulations
Consumer Affairs, California Department of
Consumer rights agencies |
30611425 | https://en.wikipedia.org/wiki/Professional%20Petroleum%20Data%20Management%20Association | Professional Petroleum Data Management Association | The Professional Petroleum Data Management Association (PPDM Association) is the global, not-for-profit organization that works collaboratively within the petroleum industry to create and promote standards and best practices for data management. The Association’s vision is the global adoption of data management standards and best practices throughout the upstream (exploration and production) petroleum industry.
The focus of the Association is:
Continued development and support of the PPDM data model
Standard or baseline definitions of essential terminology
Best practices for developing a data governance strategy
Education and training around data management standards
Certification for E&P (exploration and production) data management professionals.
PPDM and the Need to Organize Petroleum Data
Historically, petroleum data has been managed and analyzed using many different proprietary systems. These systems are typically built based on local terminology and business needs, and use different practices for identifying, gathering, transferring and interpreting information. A typical operating company may use dozens (or even hundreds) of software applications. Each department is tuned to the needs of different segments of the company; production accounting, field operations, seismic exploration, reserves management and financial departments all store information about wells in their respective software applications.
In 1989, one Calgary-based oil company and several of its software suppliers recognized that a non-proprietary data model was preferable to separate and private models. The creation of a comprehensive data model is an expensive and lengthy process. A private data model precludes the purchase of third-party software and other data-dependent services, without expensive customization. Therefore, a group of technical experts began work on a “public” model, and other companies responded to the invitation to participate.
As the model developed, more companies accepted the concept of non-competitive collaboration and recognized that there is little competitive advantage to using an exclusive private data model. In 1991 the cooperative workgroup was incorporated in Alberta as a not-for-profit society, the Public Petroleum Data Model Association.
The initial data modeling efforts were on the requirements for well data in a relational database management system. Throughout the 1990s, the scope expanded to land rights, seismic surveys, well production and reserves, stratigraphy, records management, etc. Version 3.8 of the PPDM Model, released in 2008, covers 53 subject areas and has over 1700 tables.
In 2008, the name was changed to the Professional Petroleum Data Management Association. This acknowledges the expansion of the products and services beyond just the data model, and emphasizes the focus on developing the professional practice of data management for the petroleum industry.
The Data Model
The PPDM Model is suitable for a master data management system. The specifications DDL are provided for use in Oracle and SQL Server systems. In addition, the modular design allows selected portions to be used in business-specific databases and applications.
Although it was originally called a public model, it was never freely distributed by the Association. “Public” always meant “non-proprietary” not “free.” The way to get the Model was (and still is) to become a member of the Association. However, many non-members around the world continue to use versions or adaptations of the PPDM model, usually because the model is embedded in a database or application purchased from a software provider. PPDM Lite, a simplified model based on Version 3.7, is available free to any registered user on the PPDM website.
The PPDM Model is a set of specifications for creating a relational database. It is NOT a set of data for the petroleum industry. By analogy, the model is only the blueprint for a huge pigeon loft (birdhouse); it does not have birds already in the pigeon-holes. However, the Model contains a vast amount of knowledge about the industry’s business practices (how the data are acquired and used.) The Association estimates that Version 3.8 represents over $100 million of invested funds and human resources since inception.
.
Membership
The PPDM Association is a member-based society. Membership is open to corporations and individuals from around the world. The membership fee structure is based on the member’s financial size (revenues.) Over half the annual revenue is from companies based in the USA; the balance is from Canada and the rest of the world. Associate membership is available to individuals.
Most of the activities of the Association are financed by the annual membership fees and carried out by people who work for the member companies. Special projects are funded by sponsoring companies who provide additional funds and specialist personnel. The Association’s office in Calgary has a small staff for technical support, communication, and administration.
The members are represented by a board of directors. Each director is elected by the members to a term of two years (renewable.) They are mainly from large oil companies and software or data vendors.
Product Development Process
The real power of the Association, and the quality of its products, is rooted in the cooperative approach to development, “The PPDM Way.” When several members recognize a data management need (e.g. expand the data model to a new subject area, or promote best practices for data governance), a draft charter is prepared. If the charter is approved by the PPDM board of directors, and sufficient resources are committed by the members, a workgroup is formed.
Companies supply the workgroup participants who identify the business requirements in detail, and develop the technical solutions. Workgroup meetings are typically spread out over a year or more because the participants continue to be active in their regular employment.
Improving Communication
Semantic misunderstanding causes data errors and mistakes in analysis of the data. In 2009, the PPDM Association developed a set of baseline definitions for a "Well" and its main components. These definitions are useful for comparison with the specific definitions used by key industry data providers, aggregators, and operating companies. The "What Is A Well?" definitions are a "Rosetta stone" framework for the petroleum industry.
References
External links
official web site
PPDM and What is a Well?
Standards and other resources for well identification
Standards organizations in Canada
Data modeling
Information technology management
Petroleum economics
Petroleum organizations
International trade associations |
12604896 | https://en.wikipedia.org/wiki/Quake%20Live | Quake Live | Quake Live is a first-person arena shooter video game by id Software. It is an updated version of Quake III Arena that was originally designed as a free-to-play game launched via a web browser plug-in. On September 17, 2014, the game was re-launched as a standalone title on Steam.
Quake Live was previously a free-to-play game, with subscription options offering additional arenas, game types and game server options. As of October 27, 2015, the game is no longer free and must be purchased, and the subscription options were dropped.
Gameplay
The gameplay of Quake Live consists of players attempting to kill more of their opponents than any other player or team in a given match. This is achieved by navigating a 3D environment and shooting other players with a variety of weapons, while collecting health, armor, weapons, ammo and various power-ups. As players get more advanced, they use other tricks and techniques such as rocket and strafe jumping.
Quake Live was released as a free version of Quake III: Gold (Quake III and its expansion pack, Team Arena) available only through a web browser. Quake Live Skill-based matchmaking is powered by a "metagame engine" developed by GaimTheory. Development of the match-making system was taken on by id Software after GaimTheory's collapse.
Game modes
Free For All (FFA): Players engage in a match, where everyone fights for themselves. Whoever hits the frag limit first wins and ends the game. When the time limit expires, player with the most frags is the winner.
Instagib: Free for All mode or TDM where players start with only a Railgun. There are no powerups around the map (i.e. health, ammo, weapons). Instagib servers are unranked. Instagib is one shot one kill.
Duel: Player versus player (1-on-1) combat. Whoever gets the most frags before the time is up wins.
Race: Players start at a point/flag, and they have to get to another point as fast as possible using strafe jumping, rocket jumping, and other techniques, competing against other players. Uses PQL physics, so the player moves faster than usual.
Team Deathmatch (TDM): Same rules as Free for All but in this mode, two teams fight each other.
Clan Arena (CA): Teambased gameplay where everyone starts fully equipped with full armor and weapons. When fragged, the player must wait for the next round to begin. Players can rocket jump and plasma climb with no health penalty. Players on the same team suffer no damage from their own teammates' weapons.
Capture the Flag (CTF): Each team has a base, holding a flag. To earn points and win the game, a player must take the opposing team's flag and return it to their own base, while his team's flag is secure at his own base. Players have the ability to drop the flag at any given time for a tactical play.
InstaCTF: Similar to Instagib (i.e. railgun, lack of powerups, etc.) but in a CTF format. Instagib CTF servers are also unranked.
1-Flag CTF (1FCTF): Each team fights for control of the white flag in the center, and work to carry it to the enemy flag stand. Unlike in CTF, the flag in 1FCTF, can be thrown between teammates as well as through teleporters.
Harvester (HAR): When a player is fragged, a skull spawns from the skull generator. Players must then carry the skulls to the enemy flag stand to earn points.
Freeze Tag (FT): A team based game mode combining elements of Clan Arena and Team Deathmatch. Rather than spectating when one is fragged, one is instead "frozen", and cannot respawn until a player on their team "thaws" them by standing adjacent to them for several seconds. When all players on one team are frozen, the other team wins the round.
InstaFreeze (IFT): Similar to Instagib (i.e. railgun, lack of powerups, etc.) but in a FT format. Instagib FT servers are also unranked.
Domination (DOM): Capture domination points to earn points for your team. First team to reach the Score Limit wins.
Attack & Defend (A&D): Players, spawn equipped with all weapons and full armor, alternate each round Attacking or Defending the flag. Touch the enemy's flag to be awarded a bonus point. Eliminate the opposing team or capture their flag to win the round.
Red Rover (RR): Every player joins either the Red team or the Blue team, and these two teams play one match continuously. In this mode, when a player is fragged, they immediately respawn as a member of the opposing team. This allows for continuous play, instead of having to wait for the next round. The game ends when one team no longer has any players. Players receive a point for fragging another player and lose a point for dying. The player with the most points at the end of the round wins that particular match.
During the QuakeCon 2008 keynote speech, John Carmack stated that Quake Live has no plans to allow user-made modifications, but they have hired successful Quake III mod authors to help them with their project. A large number of the maps are based heavily on originals from Quake III Arena, Team Arena and popular user-made maps. Newer map additions even include maps from previous Quake titles, such as 'The Edge', which is almost identical to the famous Quake II map Q2DM1.
Development
On August 3, 2007, at QuakeCon 2007, id Software publicly announced their plans to release a free browser-based Quake III game titled Quake Zero. In early 2008, the title was officially renamed to Quake Live due to a domain squatting issue.
During late 2008 and early 2009, Quake Live was in an invitation-only closed beta. A handful of players were selected to begin the testing of the beta and were later allowed to invite a limited number of friends, whom, in turn, were permitted to send out invitations of their own. On February 24, 2009, the game progressed from closed beta to open beta, which caused an increased amount of traffic on the web server. Queues were organized to limit the stress and prevent the overloading of the servers. Within the first six hours after launch over 113,000 user accounts were created. The queues were removed after several days, and the servers were then upgraded to handle the larger volume of traffic.
Once Quake Live exited its closed beta stage, it was to be funded partially by in-game and website-based advertisements. IGA Worldwide were contracted by id Software to handle this aspect of the game's marketing. Problems with this model surfaced almost immediately with the announcement by the advertising agency that they were struggling as a result of the financial difficulties. In March 2009, the agency admitted that sale was a possibility if further investments were not forthcoming.
At QuakeCon 2009, John Carmack stated publicly that their financial scheme for the game had so far failed to provide sufficient income to keep the project in the black. As a result, he announced that a premium subscription service was being planned:
The in-game advertising stuff has not been big business. That's not going to be able to carry the project ... Quake Live is gonna be Quake Live for the foreseeable future ... It's only just now that we're going to be able to put it to the test.
Marty Stratton, id Software's Executive Producer, has commented that:
The plan is to completely integrate the ability to start and manage private games directly through QUAKE LIVE, utilizing all of the friends, awareness and notification features we have available through the site. This ability will be the cornerstone of a QUAKE LIVE Premium Service that will be offered for a small monthly fee (likely less than $5 per month).
On August 6, 2010, the game left its public beta period, and "premium" and "pro" subscription options were announced. On September 11, 2012, id Software introduced subscriptions in one, three, six, and twelve month increments, along with the ability to purchase redeemable gift tokens.
In November 2013, citing the planned deprecation of NPAPI browser plug-ins by major browsers, Quake Live began to phase out its browser version and began migrating to a standalone client. However, this change necessitated the removal of OS X and Linux support from the game.
On August 27, 2014, Quake Live saw what was its biggest update since the game's initial release in 2010. The main objective of the update was to allow for new players to better integrate into the game with a prominent focus on the game's spawn system, movement and item control. Notable changes included the addition of loadouts in certain game types, a "continuous bunny hop" mode, a new Heavy Machine Gun weapon, and other changes across the game.
On October 28, 2015, a major update was released, representing "an accumulation of a year of code updates, optimizations, and over 4,500 map fixes". As part of the update, Quake Live also switched from its own in-house account system to using the Steamworks API, giving the game tighter integration with the Steam ecosystem and client features. However, due to these changes, all user statistics were reset. Additionally, the premium subscription options was dropped, as the game is no longer free-to-play and must be purchased for US$10.
Competitive play
Being largely similar to Quake III Arena, which is renowned for its extensive use in professional electronic sports, Quake Live has seen inclusion in many tournaments worldwide. In recent years, however, the game has experienced a decline in the number of tournaments due to waning popularity. The last major event currently holding Quake Live competitions is QuakeCon.
The following competitions and organizations have held Quake Live events:
Adroits (2012–present)
Asus (2010–2011)
DreamHack (2011–2013)
Electronic Sports World Cup (2010)
FaceIt (2012–Present)
FnaticMSI PLAY BEAT IT (2010)
Intel Extreme Masters (2010–2011)
The Gathering (2010–2011)
QuakeCon (2008–2016)
Zotac (2009–2012)
125fps (2013–present)
Reception
PC Gamer gave the game an 8.8/10 score and commented: "Quake Live may be a 10-year-old shooter, but it's still a rush".
References
External links
2010 video games
Browser games
Esports games
First-person shooters
Arena shooters
Multiplayer online games
Quake (series)
Video game remakes
Windows games
Id Software games
Multiplayer and single-player video games
Video games with Steam Workshop support
Id Tech games
Video games developed in the United States |
32456535 | https://en.wikipedia.org/wiki/Model-driven%20security | Model-driven security | Model-driven security (MDS) means applying model-driven approaches (and especially the concepts behind model-driven software development) to security.
Development of the concept
The general concept of Model-driven security in its earliest forms has been around since the late 1990s (mostly in university research), and was first commercialized around 2002. There is also a body of later scientific research in this area, which continues to this day.
A more specific definition of Model-driven security specifically applies model-driven approaches to automatically generate technical security implementations from security requirements models. In particular, "Model driven security (MDS) is the tool supported process of modelling security requirements at a high level of abstraction, and using other information sources available about the system (produced by other stakeholders). These inputs, which are expressed in Domain Specific Languages (DSL), are then transformed into enforceable security rules with as little human intervention as possible. MDS explicitly also includes the run-time security management (e.g. entitlements/authorisations), i.e. run-time enforcement of the policy on the protected IT systems, dynamic policy updates and the monitoring of policy violations."
Model-driven security is also well-suited for automated auditing, reporting, documenting, and analysis (e.g. for compliance and accreditation), because the relationships between models and technical security implementations are traceably defined through the model-transformations.
Opinions of industry analysts
Several industry analyst sources state that MDS "will have a significant impact as information security infrastructure is required to become increasingly real-time, automated and adaptive to changes in the organisation and its environment". Many information technology architectures today are built to support adaptive changes (e.g. Service Oriented Architectures (SOA) and so-called Platform-as-a-Service "mashups" in cloud computing), and information security infrastructure will need to support that adaptivity ("agility"). The term DevOpsSec (see DevOps) is used by some analysts equivalent to model-driven security.
Effects of MDS
Because MDS automates the generation and re-generation of technical security enforcement from generic models, it:
enables SOA agility
reduces complexity (and SOA security complexity)
increases policy flexibility
supports rich application security policies
supports workflow context sensitive security policies
can auto-generate SOA infrastructure security policies
supports reuse between SOA stakeholders
minimises human errors
can auto-generate domain boundary security policies
helps enable SOA assurance accreditation (covered in ObjectSecurity’s MDSA eBook)
Implementations of MDS
Apart from academic proof-of-concept developments, the only commercially available full implementations of model-driven security (for authorization management policy automation) include ObjectSecurity OpenPMF, which earned a listing in Gartner's "Cool Vendor" report in 2008 and has been advocated by a number of organizations (e.g. U.S. Navy ) as a means to make authorization policy management easier and more automated.
See also
Model-driven architecture
Data-driven security
Authorization
Attribute based access control
XACML
Role-based access control
Mandatory access control
Discretionary access control
References
Computer security |
768940 | https://en.wikipedia.org/wiki/Hackers%20on%20Planet%20Earth | Hackers on Planet Earth | The Hackers on Planet Earth (HOPE) conference series is a hacker convention sponsored by the security hacker magazine 2600: The Hacker Quarterly that until 2020 was typically held at Hotel Pennsylvania, in Manhattan, New York City. Occurring biennially in the summer, there have been twelve conferences to date with the most recent occurring July 20–23, 2018. HOPE 2020, originally planned to be held at St. John's University, was instead held as a nine-day virtual event from July 25 to August 2, 2020. HOPE features talks, workshops, demonstrations, tours, and movie screenings.
HOPE was significantly inspired by the quadrennial Hack-Tic events in the Netherlands which also inspired the annual Chaos Communication Congress (C3) held in Germany. Summercon was also an influential predecessor.
Structure
HOPE has been held at Hotel Pennsylvania in New York City every time except once since 1994. The event is always structured in a similar way. It consists of three days and three nights of activities, including talks, workshops, and performances. It also features hackerspace villages, a film festival, lock picking villages, a wide variety of vendors, art installations, live video, vintage computers, robots, an amateur/ham radio station, electronics workshops, and book signings.
The closing ceremony is a regular part of the event, celebrating the event, the organizers, and volunteers, but also features performances. Since 2006, monochrom's Johannes Grenzfurthner is a regular performer at the closing ceremony.
Conferences
HOPE: Hackers on Planet Earth
Held August 13–14, 1994 at the Hotel Pennsylvania, the first HOPE conference marked 2600: The Hacker Quarterly'''s 10th anniversary. Over 1,000 people attended, including speakers from around the world. Access to a 28.8 kbit/s local network was provided. This conference was visited and covered in the second episode of the "Your Radio Playhouse" show, later renamed This American Life.
Beyond HOPE
The August 8–10, 1997 Beyond HOPE conference was held at the Puck Building, in Manhattan, New York City. Attendance doubled, with 2,000 attendees. Bell Technology Group helped to support the hackers. The hacker group L0pht Heavy Industries presented a panel discussion that covered some of their recent projects, accomplishments, emerging trends and shortcomings in technologies, and a deep dive into Windows NT password internals. A TAP reunion and a recorded live broadcast of Off the Hook took place.
A 10 Mbit/s local network was provided to attendees.
H2K
The July 14–15, 2000 HOPE returned to the Hotel Pennsylvania, where subsequent conferences have been held. The conference ran 24 hours a day, bringing in 2,300 attendees. Jello Biafra gave a keynote speech. In a cultural exchange between the punk rock icon/free speech activist and the hacker community, Jello drew connections between the two communities, despite his lack of computer experience. The EFF also raised thousands of dollars. The conference provided a working Ethernet and a T1 link to the internet.
H2K2
H2K2, July 12–14, 2002, had a theme focused on U.S. Homeland Security Advisory System. H2K2 included two tracks of scheduled speakers, with a third track reserved for last-minute and self-scheduled speakers, a movie room, retrocomputing, musical performances, a State of the World Address by Jello Biafra, keynotes by Aaron McGruder and Siva Vaidhyanathan and discussions on the DMCA and DeCSS. Freedom Downtime premiered on Friday evening (July 14). The conference provided wireless 802.11b coverage and wired Ethernet, an open computer area for access to a 24-hour link to the Internet at "T-1ish" speeds, made available by the DataHaven Project and an internal network.
The Fifth HOPE
The Fifth HOPE, July 9–11, 2004, had a theme on propaganda, and commemorated the anniversaries of both the H.O.P.E. conferences and Off the Hook (with a live broadcast of the show from the conference, Beyond H.O.P.E.). Keynotes speakers were Kevin Mitnick, Steve Wozniak, and Jello Biafra. There was also a presentation by "members" of the Phone Losers of America who celebrated their tenth anniversary. The Cult of the Dead Cow hacker collective celebrated its twentieth anniversary at the conference. The conference provided access to a four-layer public network with two T1 lines, plus backup links to the internet via a public terminal cluster, various wired connections, a WiFi network on three floors and a video network.
HOPE Number Six
HOPE Number Six, July 21–23, 2006, included talks from Richard Stallman and Jello Biafra.
Kevin Mitnick was scheduled to be at the conference but was unable to appear: while on vacation in Colombia an illness prevented his timely return to the U.S. HOPE Number Six had a 100-megabit Internet connection; the conference organizers claimed it was the fastest Internet connection to-date at any U.S. hacker conference. The event's theme was based on the number six and The Prisoner (a designation shared by the titular "prisoner,").
Notable occurrences:
Steve Rambam, a private investigator heading Pallorium, Inc., an online investigative service, was scheduled to lead a panel discussion titled "Privacy is Dead... Get Over It." A few minutes before the start of the panel, Rambam was arrested by the FBI on charges that he unlawfully interfered with an ongoing case Federal prosecutors filed against Albert Santoro, a former Brooklyn assistant New York district attorney indicted in January 2003 on a count of money-laundering. The charges were eventually dropped and the talk was subsequently held in November 2006, long after the conference.
Jello Biafra began his talk by referring to the arrest of Steve Rambam, noting the convention had been more "spook heavy" than usual. He then announced a "special message" to "any Federal agents that may be in the audience", and mooned the convention.
The Last HOPE
The "Last HOPE" took place July 18–20, 2008 at the Hotel Pennsylvania. A change from past years was the use of an Internet forum to facilitate community participation in the planning of the event.
The conference name referred to the expectation that this would be the final H.O.P.E. conference due to the scheduled demolition of its venue, the Hotel Pennsylvania. The Save Hotel Pennsylvania Foundation was created to work toward keeping the building from being demolished by its then-new owner, Vornado Realty Trust.
The "Next HOPE" was scheduled for Summer 2010. At the closing ceremony it was revealed that the use of the word "last" could also refer to the previous event, or one that had ended (referring to The Last HOPE itself).
Steven Levy gave the keynote address. Kevin Mitnick, Steve Rambam, Jello Biafra, and Adam Savage of MythBusters were featured speakers. Descriptions and audio of the talks can be found at thelasthope.org
The Next HOPE
The 8th HOPE convention, "The Next HOPE", took place on July 16–18, 2010. The Next HOPE was held at the Hotel Pennsylvania, as the plans by Vornado to demolish the hotel are on hold.
HOPE Number Nine
HOPE Number Nine occurred July 13–15, 2012 at Hotel Pennsylvania in Manhattan.
Keynote presentations for HOPE Number Nine were given by The Yes Men (with Andy Bichelbaum as principal speaker and Vermin Supreme also participating) and NSA whistleblower William Binney. Chris Kubecka, principal speaker of a presentation about internet censorship was served a cease and desist letter in an attempt to censor the presentation by Unisys and threatened with termination for a presentation titled "The Internet is for Porn! How High Heels and Fishnet Have Driven Internet Innovation and Information Security". Unisys demanded all information regarding the presentation be removed from the internet, but the Streisand effect occurred, with the censorship attempt posted on thousands of websites instead. A first for the conference, a ghost speaker @JK47theweapon had to deliver most of the presentation due to legal threats against Kubecka. Prior to beginning, the MC invited "any hangers on or associates of the law firm of Baker & McKenzie" to speak to the Electronic Frontier Foundation (EFF). Baker & McKenzie is the law firm of Unisys Netherlands which threatened to terminate its employee by letter for giving a presentation about internet censorship.
HOPE X
HOPE X took place from July 18–20, 2014 at Hotel Pennsylvania. The keynote speakers were Daniel Ellsberg and Edward Snowden; also featured was noted former NSA official and whistleblower Thomas Drake. The theme of the conference was "dissent", and whistle-blowing was a topic of a good number of talks. But the conference also featured critical talks about the state of hackdom, for example Johannes Grenzfurthner of monochrom spoke about the problems of rockstar martyrdom'' within the hacker scene and the creation of hacker cult figures (like Snowden, Appelbaum or Assange) by unreflective members of the community or the media.
Notable changes included a massive increase in available bandwidth. Previous conferences had a 50 Mbit connection; HOPE X had a 10 Gbit fibre optic connection provided by Hurricane Electric. This geometric increase in bandwidth made possible live streaming of all conference talks in real time. The Ellsberg/Snowden keynote was seen in over 120 countries. This also was the first year all conference areas were fully connected to the conference network, albeit with the Workshop floor with slightly limited connectivity (a 1 Gbit connection, as compared to the 10 Gbit backbone of the other conference spaces). Five different wireless networks were provided to conference attendees. The hammocks on the mezzanine level, which provided a place for some attendees to sleep if they were unable to procure a place to otherwise do so, were replaced by inflatable furniture in a dedicated "Chill Space" area. Mezzanine space was also explicitly dedicated to attendee meetups in the form of villages, similar to assemblies at Chaos Communication Congresses and villages at hacker camps, specifically "Village Zone A" (primarily a soldering and electronics workshop), "Village Zone B", "Lockpickers Village", and "Noisy Square". Workshop tracks were published in the schedule and the conference took nearly all the hotel's available meeting space.
HOPE XI
HOPE XI (The Eleventh HOPE) took place from July 22–24, 2016 at Hotel Pennsylvania. Cory Doctorow was the keynote speaker. Like last time, HOPE XI was provided Internet transit by Hurricane Electric at 111 Eighth Avenue over a fiber connection leased from RCN Corporation. Aruba Networks sponsored 50 wireless access points which were used to provide 3 wireless networks for attendees, two of which were secured with either WPA or PSK, another network for the NOC, and one for the press and speakers.
Network connectivity was fully provided for in all areas, which came into use throughout the conference as many talks were filled to capacity and attendees either watched streams on their own devices or in designated overflow and viewing areas.
The Circle of HOPE (HOPE 12)
The 12th HOPE conference, "The Circle of HOPE", occurred July 20–22, 2018. Speakers included Chelsea Manning, Barrett Brown, Richard Stallman, Jason Scott, Matt Blaze, Micah Lee, and Steve Rambam, among many others. The conference was marked by protests from alt-right activists.
HOPE 2020
A conference was originally planned for July 31-August 2, 2020 at a new venue, St. John's University in Queens. Due to the COVID-19 pandemic it was changed to a nine-day virtual event from July 25 to August 2, 2020. In addition to a longer schedule for talks, most of the originally planned events will be streamed, including workshops and musical performances. Keynote speakers are Libby Liu of the Open Technology Fund (OTF), Flavio Aggio of the World Health Organization (WHO), Idalin Bobé of TechActivist.org, Tiffany Rad of Anatrope Inc, Yeshimabeit Milner of Data for Black Lives, Jaron Lanier, Cindy Cohn, Cory Doctorow, and Richard Thieme. Conference participants communicated primarily using the first year appearance of HOPE's own Matrix chat server.
2021 canceled plan
An in-person HOPE conference was planned for summer 2021, breaking from the typical biennial conference interval, but was canceled due to the ongoing COVID-19 pandemic.
A New HOPE
The 14th conference, A New Hope, is scheduled to occur at St. John's University in Queens, New York City from 22-24 July 2022.
See also
Chaos Communication Camp
DEF CON
ToorCon
References
External links
HOPE website
2600: The Hacker Quarterly
Hacker conventions
Hacker culture
Free-software events
Recurring events established in 1994
1994 establishments in New York City
Conventions in New York City |
64638626 | https://en.wikipedia.org/wiki/Learning%20engineering | Learning engineering | Learning Engineering is the systematic application of evidence-based principles and methods from educational technology and the learning sciences to create engaging and effective learning experiences, support the difficulties and challenges of learners as they learn, and come to better understand learners and learning. It emphasizes the use of a human-centered design approach in conjunction with analyses of rich data sets to iteratively develop and improve those designs to address specific learning needs, opportunities, and problems, often with the help of technology. Working with subject-matter and other experts, the Learning Engineer deftly combines knowledge, tools, and techniques from a variety of technical, pedagogical, empirical, and design-based disciplines to create effective and engaging learning experiences and environments and to evaluate the resulting outcomes. While doing so, the Learning Engineer strives to generate processes and theories that afford generalization of best practices, along with new tools and infrastructures that empower others to create their own learning designs based on those best practices.
Supporting learners as they learn is complex, and design of learning experiences and support for learners usually requires interdisciplinary teams. Learning engineers themselves might specialize in designing learning experiences that unfold over time, engage the population of learners, and support their learning; automated data collection and analysis; design of learning technologies; design of learning platforms; or some combination. The products of learning engineering teams include on-line courses (e.g., a particular MOOC), software platforms for offering online courses, learning technologies (e.g., ranging from physical manipulatives to electronically-enhanced physical manipulatives to technologies for simulation or modeling to technologies for allowing immersion), after-school programs, community learning experiences, formal curricula, and more. Learning engineering teams require expertise associated with the content that learners will learn, the targeted learners themselves, the venues in which learning is expected to happen, educational practice, software engineering, and sometimes even more.
Learning engineering teams employ an iterative design process for supporting and improving learning. Initial designs are informed by findings from the learning sciences. Refinements are informed by analysis of data collected as designs are carried out in the world. Methods from learning analytics, design-based research, and rapid large-scale experimentation are used to evaluate designs, inform refinements, and keep track of iterations. According to the IEEE Standards Association's IC Industry Consortium on Learning Engineering, "Learning Engineering is a process and practice that applies the learning sciences using human-centered engineering design methodologies and data-informed decision making to support learners and their development."
History
Herbert Simon, a cognitive psychologist and economist, first coined the term learning engineering in 1967. However, associations between the two terms learning and engineering began emerging earlier, in the 1940s and as early as the 1920s. Simon argued that the social sciences, including the field of education, should be approached with the same kind of mathematical principles as other fields like physics and engineering.
Simon’s ideas about learning engineering continued to reverberate at Carnegie Mellon University, but the term did not catch on until Bror Saxberg began using it in 2014
. A clear line can be drawn from Simon to Saxberg. In 1978, Herb Simon helped bring John Anderson to Carnegie Mellon and Anderson soon began to test his theory of cognition within intelligent tutoring systems. In 1998, Carnegie Learning was spun off producing the first widespread use of intelligent tutoring systems in K12 schools. In 2004, Kenneth Koedinger and Kurt Vanlehn started the Pittsburgh Science of Learning Center, or LearnLab for short. Bror Saxberg brought his team from Kaplan to visit CMU. The team went back to Kaplan, armed with LearnLab’s KLI framework, a theoretical framework linking cognition and instruction. They began executing what we now call learning engineering to enhance, optimize, and test their educational products. Bror Saxberg would later co-write the 2014 book using the term learning engineering. It caught on this time.
Subsequently, the term learning engineering has come to emphasize a focus on applied research (rather than foundational or theoretical research), as well as incorporating research findings about how people learn in order to support learning and improve real-life learning outcomes.
Overview
Learning Engineering is aimed at addressing a deficit in the application of science and engineering methodologies to education and training. Its advocates emphasize the need to connect computing technology and generated data with the overall goal of optimizing learning environments.
Learning Engineering initiatives aim to improve educational outcomes by leveraging computing to dramatically increase the applications and effectiveness of learning science as a discipline. Digital learning platforms have generated large amounts of data which can reveal immediately actionable insights.
The Learning Engineering field has the further potential to communicate educational insights automatically available to educators. For example, learning engineering techniques have been applied to the issue of drop-out or high failure rates. Traditionally, educators and administrators have to wait until students actually withdraw from school or nearly fail their courses to accurately predict when the drop out will occur. Learning engineers are now able to use data on off-task behavior or wheel spinning to better understand student engagement and predict whether individual students are likely to fail.
This data enables educators to spot struggling students weeks or months prior to being in danger of dropping out. Proponents of Learning Engineering posit that data analytics will contribute to higher success rates and lower drop-out rates.
Learning Engineering can also assist students by providing automatic and individualized feedback.
Carnegie Learning’s tool LiveLab, for instance, employs big data to create a learning experience for each student user by, in part, identifying the causes of student mistakes. Research insights gleaned from LiveLab analyses allow teachers to see student progress in real-time.
Common approaches
A/B Testing
A/B testing compares two versions of a given program and allows researchers to determine which approach is most effective. In the context of Learning Engineering, platforms like TeacherASSIST and Coursera use A/B testing to determine which type of feedback is the most effective for learning outcomes.
Neil Heffernan’s work with TeacherASSIST includes hint messages from teachers that guide students toward correct answers. Heffernan’s lab runs A/B tests between teachers to determine which type of hints result in the best learning for future questions.
UpGrade is an open-source platform for A/B testing in education. It allows EdTech companies to run experiments within their own software. ETRIALS leverages ASSISTments and give scientists freedom to run experiments in authentic learning environments. Terracotta is a research platform that supports teachers' and researchers' abilities to easily run experiments in live classes.
Educational Data Mining
Educational Data Mining involves analyzing data from student use of educational software to understand how software can improve learning for all students. Researchers in the field, such as Ryan Baker at the University of Pennsylvania, have developed models of student learning, engagement, and affect to relate them to learning outcomes.
Platform Instrumentation
Education tech platforms link educators and students with resources to improve learning outcomes. For example, Phil Poekert at the University of Florida College of Education’s Lastinger Center for Learning has created Flamingo, a platform that integrates critical functionalities like resources and teaching management systems along with a community-based forum.
Other platforms like MATHia, Algebra Nation, LearnPlatform, coursekata, and ALEKS offer interactive learning environments created to align with key learning outcomes.
Dataset Generation
Datasets provide the raw material that researchers use to formulate educational insights. For example, Carnegie Mellon University hosts a large volume of learning interaction data in LearnLab's DataShop. Their datasets range from sources like Intelligent Writing Tutors to Chinese tone studies to data from Carnegie Learning’s MATHia platform.
Kaggle, a hub for programmers and open source data, regularly hosts machine learning competitions. In 2019, PBS partnered with Kaggle to create the 2019 Data Science Bowl. The DataScience Bowl sought machine learning insights from researchers and developers, specifically into how digital media can better facilitate early-childhood STEM learning outcomes.
Datasets, like those hosted by Kaggle PBS and Carnegie Learning, allow researchers to gather information and derive conclusions about student outcomes. These insights help predict student performance in courses and exams.
Learning Engineering in Practice
Combining education theory with data analytics has contributed to the development of tools that differentiate between when a student is wheel spinning (i.e., not mastering a skill within a set timeframe) and when they are persisting productively. Tools like ASSISTments alert teachers when students consistently fail to answer a given problem, which keeps students from tackling insurmountable obstacles, promotes effective feedback and educator intervention, and increases student engagement.
Studies have found that Learning Engineering may help students and educators to plan their studies before courses begin. For example, UC Berkeley Professor Zach Pardos uses Learning Engineering to help reduce stress for community college students matriculating into four-year institutions. Their predictive model analyzes course descriptions and offers recommendations regarding transfer credits and courses that would align with previous directions of study.
Similarly, researchers Kelli Bird and Benjamin Castlemen’s work focuses on creating an algorithm to provide automatic, personalized guidance for transfer students. The algorithm is a response to the finding that while 80 percent of community college students intend to transfer to a four-year institution, only roughly 30 percent actually do so. Such research could lead to a higher pass/fail rate and help educators know when to intervene to prevent student failure or drop out.
Challenges
The multidisciplinary nature of learning engineering creates challenges. The problems that learning engineering attempts to solve often require expertise in diverse fields such as software engineering, instructional design, domain knowledge, pedagogy/andragogy, psychometrics, learning sciences, data science, and systems engineering. In some cases, an individual Learning Engineer with expertise in multiple disciplines might be sufficient. However, learning engineering problems often exceed any one person’s ability to solve.
Each discipline brings its own metaphors and use of figurative language. Often a term or metaphor carries a different meaning for professionals or academics from different domains. At times a term that is used positively in one domain carries a strong negative perception in another domain.
A 2021 convening of thirty learning engineers produced recommendations that key challenges and opportunities for the future of the field involve enhancing R&D infrastructure, supporting domain-based education research, developing components for reuse across learning systems, enhancing human-computer systems, better engineering implementation in schools, improving advising, optimizing for the long-term instead of short-term, supporting 21st-century skills, improved support for learner engagement, and designing algorithms for equity.
See also
Learning sciences
Instructional Design
Adaptive Learning
Human-Computer Interaction
References
Further reading
Mark Lieberman. "Learning Engineers Inch Toward the Spotlight". Inside Higher Education. September 26, 2018.
External links
The Simon Initiative
Neologisms |
8654 | https://en.wikipedia.org/wiki/Data%20General%20Nova | Data General Nova | The Data General Nova is a series of 16-bit minicomputers released by the American company Data General. The Nova family was very popular in the 1970s and ultimately sold tens of thousands of units.
The first model, known simply as "Nova", was released in 1969. The Nova was packaged into a single 3U rack-mount case and had enough computing power to handle most simple tasks. The Nova became popular in science laboratories around the world. It was followed the next year by the SuperNOVA, which ran roughly four times as fast.
Introduced during a period of rapid progress in integrated circuit (or "microchip") design, the line went through several upgrades over the next five years, introducing the 800 and 1200, the Nova 2, Nova 3, and ultimately the Nova 4. A single-chip implementation was also introduced as the microNOVA in 1977, but did not see widespread use as the market moved to new microprocessor designs. Fairchild Semiconductor also introduced a microprocessor version of the Nova in 1977, the Fairchild 9440, but it also saw limited use in the market.
The Nova line was succeeded by the Data General Eclipse, which was similar in most ways but added virtual memory support and other features required by modern operating systems. A 32-bit upgrade of the Eclipse resulted in the Eclipse MV series of the 1980s.
History
Edson de Castro and the PDP-X
Edson de Castro was the Product Manager of the pioneering Digital Equipment Corporation (DEC) PDP-8, a 12-bit computer widely referred to as the first true minicomputer. He also led the design of the upgraded PDP-8/I, which used early integrated circuits in place of individual transistors.
During the PDP-8/I process, de Castro had been visiting circuit board manufacturers who were making rapid advances in the complexity of the boards they could assemble. de Castro concluded that the 8/I could be produced using fully automated assembly on large boards, which would have been impossible only a year earlier. Others within DEC had become used to the smaller boards used in earlier machines and were concerned about tracking down problems when there were many components on a single board. For the 8/I, the decision was made to stay with small boards, using the new "flip-chip" packaging for a modest improvement in density.
During the period when the PDP-8 was being developed, the introduction of ASCII and its major update in 1967 led to a new generation of designs with word lengths that were multiples of 8 bits rather than multiples of 6 bits as in most previous designs. This led to mid-range designs working at 16-bit word lengths instead of DEC's current 12- and 18-bit lineups. de Castro was convinced that it was possible to improve upon the PDP-8 by building a 16-bit minicomputer CPU on a single 15-inch square board.
In 1967, de Castro began a new design effort known as "PDP-X" which included several advanced features. Among these was a single underlying design that could be used to build 8-, 16- and 32-bit platforms. This progressed to the point of producing several detailed architecture documents. Ken Olsen was not supportive of this project, feeling it did not offer sufficient advantages over the 12-bit PDP-8 and the 18-bit PDP-9. It was eventually canceled in the spring of 1968.
Design of the Nova
Cancelation of the PDP-X prompted de Castro to consider leaving DEC to build a system on his own. He was not alone; in late 1967 a group of like-minded engineers formed to consider such a machine. The group included Pat Green, a divisional manager, Richard Sogge, another hardware engineer, and a software engineer, Henry Burkhardt III. In contrast to the PDP-X, the new effort focussed on a single machine that could be brought to market quickly, as de Castro felt the PDP-X concept was far too ambitious for a small startup company.
Discussing it with the others at DEC, the initial concept led to an 8-bit machine which would be less costly to implement. The group began talking with Herbert Richman, a salesman for Fairchild Semiconductor who knew the others through his contacts with DEC. At the time, Fairchild was battling with Texas Instruments and Signetics in the rapidly growing TTL market and were introducing new fabs that allowed more complex designs. Fairchild's latest 9300 series allowed up to 96 gates per chip, and they had used this to implement a number of 4-bit chips like binary counters and shift registers.
Using these ICs reduced the total IC count needed to implement a complete arithmetic logic unit (ALU), the core mathematical component of a CPU, allowing the expansion from an 8-bit design to 16-bit. This did require the expansion of the CPU from a single printed circuit board to two, but such a design would still be significantly cheaper to produce than the 8/I while still being more powerful and ASCII-based. A third board held the input/output circuitry and a complete system typically included another board with 4 kB of random access memory. A complete four-card system fit in a single rackmount chassis.
The boards were designed so they could be connected together using a printed circuit backplane, with minimal manual wiring, allowing all the boards to be built in an automated fashion. This greatly reduced costs over 8/I, which consisted of many smaller boards that had to be wired together at the backplane, which was itself connected together using wire wrap. The larger-board construction also made the Nova more reliable, which made it especially attractive for industrial or lab settings.
The new design used a simple load–store architecture which would reemerge in the RISC designs in the 1980s. As the complexity of a flip-flop was being rapidly reduced as they were implemented in chips, the design offset the lack of addressing modes of the load/store design by adding four general-purpose accumulators, instead of the single register that would be found in similar low-cost offerings like the PDP series.
Nova introduction
Late in 1967, Richman introduced the group to New York-based lawyer Fred Adler, who began canvassing various funding sources for seed capital. By 1968, Adler had arranged a major funding deal with a consortium of venture capital funds from the Boston area, who agreed to provide an initial $400,000 investment with a second $400,000 available for production ramp-up. de Castro, Burkhart and Sogge quit DEC and started Data General (DG) on 15 April 1968. Green did not join them, considering the venture too risky, and Richman did not join until the product was up and running later in the year.
Work on the first system took about nine months, and the first sales efforts started that November. They had a bit of luck because the Fall Joint Computer Conference had been delayed until December that year, so they were able to bring a working unit to the Moscone Center where they ran a version of Spacewar!. DG officially released the Nova in 1969 at a base price of US$3,995 (), advertising it as "the best small computer in the world." The basic model was not very useful out of the box, and adding 8 kW (16 kB) RAM in the form of core memory typically brought the price up to $7,995. In contrast, an 8/I with 4 kW (6 kB) was priced at $12,800.
The first sale was to a university in Texas, with the team hand-building an example which shipped out in February. However, this was in the midst of a strike in the airline industry and the machine never arrived. They sent a second example, which arrived promptly as the strike had ended by that point, and in May the original one was finally delivered as well.
The system was successful from the start, with the 100th being sold after six months, and the 500th after 15 months. Sales accelerated as newer versions were introduced, and by 1975 the company had annual sales of $100 million.
SuperNOVA
Ken Olsen had publicly predicted that DG would fail, but with the release of the Nova it was clear that was not going to happen. By this time a number of other companies were talking about introducing 16-bit designs as well. Olsen decided these presented a threat to their 18-bit line as well as 12-bit, and began a new 16-bit design effort. This emerged in 1970 as the PDP-11, a much more complex design that was as different from the PDP-X as the Nova was. The two designs competed heavily in the market.
Rumors of the new system from DEC reached DG shortly after the Nova began shipping. In the spring of 1970 they hired a new designer, Larry Seligman, to leapfrog any possible machine in the making. Two major changes had taken place since the Nova was designed; one was that Signetics had introduced the 8260, a 4-bit IC that combined an adder, XNOR and AND, meaning the number of chips needed to implement the basic logic was reduced by about three times. Another was that Intel was aggressively talking up semiconductor-based memories, promising 1024 bits on a single chip and running at much higher speeds than core memory.
Seligman's new design took advantage of both of these improvements. To start, the new ICs allowed the ALU to be expanded to full 16-bit width on the same two cards, allowing it to carry out math and logic operations in a single cycle and thereby making the new design four times as fast as the original. In addition, new smaller core memory was used that improved the cycle time from the original's 1,200 ns to 800 ns, offering a further improvement. Performance could be further improved by replacing the core with read-only memory; lacking core's read/write cycle, this could be accessed at 300 ns for a dramatic performance boost.
The resulting machine, known as the SuperNOVA, was released in 1970. Although the initial models still used core, the entire design was based on the premise that faster semiconductor memories would become available and the platform could make full use of them. This was introduced later the same year as the SuperNOVA SC, featuring semiconductor (SC) memory. The much higher performance memory allowed the CPU, which was synchronous with memory, to be further increased in speed to run at a 300 ns cycle time (3.3 MHz). This made it the fastest available minicomputer for many years. Initially the new memory was also very expensive and ran hot, so it was not widely used.
1200 and 800
As a demonstration of the power of their Micromatrix gate array technology, in 1968 Fairchild prototyped the 4711, a single-chip 4-bit ALU. The design was never intended for mass production and was quite expensive to produce. The introduction of the Signetics 8260 in 1969 forced their hand; both Texas Instruments and Fairchild introduced 4-bit ALUs of their own in 1970, the 74181 and 9341, respectively. In contrast to the 8260, the new designs offered all common logic functions and further reduced the chip count.
This led DG to consider the design of a new CPU using these more integrated ICs. At a minimum, this would reduce the CPU to a single card for either the basic Nova or the SuperNOVA. A new concept emerged where a single chassis would be able to host either machine simply by swapping out the CPU circuit board. This would allow customers to purchase the lower-cost system and then upgrade at any time.
While Seligman was working on the SuperNOVA, the company received a letter from Ron Gruner stating "I've read about your product, I've read your ads, and I'm going to work for you. And I'm going to be at your offices in a week to talk to you about that." He was hired on the spot. Gruner was put in charge of the low-cost machine while Seligman designed a matching high-performance version.
Gruner's low-cost model launched in 1970 as the Nova 1200, the 1200 referring to the use of the original Nova's 1,200 ns core memory. It featured a 4-bit ALU based on a single 74181 chip, and was thus essentially a repackaged Nova. Seligman's repackaged four-ALU SuperNOVA was released in 1971 as the Nova 800, resulting in the somewhat confusing naming where the lower-numbered model has higher performance. Both models were offered in a variety of cases, the 1200 with seven slots, the 1210 with four and the 1220 with fourteen.
Later models
By this time the PDP-11 was finally shipping. It offered a much richer instruction set architecture than the deliberately simple one in the Nova. Continuing improvement in IC designs, and especially their price–performance ratio, was eroding the value of the original simplified instructions. Seligman was put in charge of designing a new machine that would be compatible with the Nova while offering a much richer environment for those who wanted it. This concept shipped as the Data General Eclipse series, which offered the ability to add additional circuity to tailor the instruction set for scientific or data processing workloads. The Eclipse was successful in competing with the PDP-11 at the higher end of the market.
Around the same time, rumors of a new 32-bit machine from DEC began to surface. DG decided they had to have a similar product, and Gruner was put in charge of what became the Fountainhead Project. Given the scope of the project, they agreed that the entire effort should be handled off-site, and Gruner selected a location at Research Triangle Park in North Carolina. This design became very complex and was ultimately canceled years later.
While these efforts were underway, work on the Nova line continued.
840
The 840, first offered in 1973, also included a new paged memory system allowing for addresses of up to 17-bits. An index offset the base address into the larger 128 kword memory. Actually installing this much memory required considerable space; the 840 shipped in a large 14-slot case.
Nova 2
The next version was the Nova 2, with the first versions shipping in 1973. The Nova 2 was essentially a simplified version of the earlier machines as increasing chip densities allowed the CPU to be reduced in size. While the SuperNOVA used three 15×15" boards to implement the CPU and its memory, the Nova 2 fitted all of this onto a single board. ROM was used to store the boot code, which was then copied into core when the "program load" switch was flipped. Versions were available with four ("2/4"), seven and ten ("2/10") slots.
Nova 3
The Nova 3 of 1975 added two more registers, used to control access to a built-in stack. The processor was also re-implemented using TTL components, further increasing the performance of the system. The Nova 3 was offered in four-slot (the Nova 3/4) and twelve-slot (the Nova 3/12) versions.
Nova 4
It appears that Data General originally intended the Nova 3 to be the last of its line, planning to replace the Nova with the later Eclipse machines. However, continued demand led to a Nova 4 machine, this time based on four AMD Am2901 bit-slice ALUs. This machine was designed from the start to be both the Nova 4 and the Eclipse S/140, with different microcode for each. A floating-point co-processor was also available, taking up a separate slot. An additional option allowed for memory mapping, allowing programs to access up to 128 kwords of memory using bank switching. Unlike the earlier machines, the Nova 4 did not include a front panel console and instead relied on the terminal to emulate a console when needed.
There were three different versions of the Nova 4, the Nova 4/C, the Nova 4/S and the Nova 4/X. The Nova 4/C was a single-board implementation that included all of the memory (16 or 32 kwords). The Nova 4/S and 4/X used separate memory boards. The Nova 4/X had the on-board memory management unit (MMU) enabled to allow up to 128 kwords of memory to be used. The MMU was also installed in the Nova 4/S, but was disabled by firmware. Both the 4/S and the 4/X included a "prefetcher" to increase performance by fetching up to two instructions from memory before they were needed.
microNOVA
Data General also produced a series of microNOVA single-chip implementations of the Nova processor. To allow it to fit into a 40-pin dual in-line package (DIP) chip, the address bus and data bus shared a set of 16 pins. This meant that reads and writes to memory required two cycles, and that the machine ran about half the speed of the original Nova as a result.
The first chip in the series was the mN601, of 1977. This was sold both as a CPU for other users, a complete chipset for those wanting to implement a computer, a complete computer on a single board with 4 kB of RAM, and as a complete low-end model of the Nova. An upgraded version of the design, 1979's mN602, reduced the entire chipset to a single VLSI. This was offered in two machines, the microNOVA MP/100 and larger microNOVA MP/200.
The microNOVA was later re-packaged with a monitor in a PC-style case with two floppy disks as the Enterprise. Enterprise shipped in 1981, running RDOS, but the introduction of the IBM PC the same year made most other machines disappear under the radar.
Nova’s legacy
The Nova influenced the design of both the Xerox Alto (1973) and Apple I (1976) computers, and its architecture was the basis for the Computervision CGP (Computervision Graphics Processor) series. Its external design has been reported to be the direct inspiration for the front panel of the MITS Altair (1975) microcomputer.
Data General followed up on the success of the original Nova with a series of faster designs. The Eclipse family of systems was later introduced with an extended upwardly compatible instruction set, and the MV-series further extended the Eclipse into a 32-bit architecture to compete with the DEC VAX. The development of the MV-series was documented in Tracy Kidder's popular 1981 book, The Soul of a New Machine. Data General itself would later evolve into a vendor of Intel processor-based servers and storage arrays, eventually being purchased by EMC.
there are still 16-bit Novas and Eclipses running in a variety of applications worldwide, including air traffic control. There is a diverse but ardent group of people worldwide who restore and preserve original 16-bit Data General systems.
Technical description
Processor design
The Nova, unlike the PDP-8, was a load–store architecture. It had four 16-bit accumulator registers, of which two (2 and 3) could be used as index registers. There was a 15-bit program counter and a single-bit carry register. As with the PDP-8, current + zero page addressing was central. There was no stack register, but later Eclipse designs would utilize a dedicated hardware memory address for this function.
The earliest models of the Nova processed math serially in 4-bit packets, using a single 74181 bitslice ALU. A year after its introduction, this design was improved to include a full 16-bit parallel math unit using four 74181s, this design being referred to as the SuperNova. Future versions of the system added a stack unit and hardware multiply/divide.
The Nova 4 / Eclipse S/140 was based on four AMD 2901 bit-slice ALUs, with microcode in read-only memory, and was the first Nova designed for DRAM main memory only, without provision for magnetic core memory.
Memory and I/O
The first models were available with 8K words of magnetic core memory as an option, one that practically everyone had to buy, bringing the system cost up to $7,995.
This core memory board was organized in planar fashion as four groups of four banks, each bank carrying two sets of core in a 64 by 64 matrix; thus there were 64 x 64 = 4096 bits per set, x 2 sets giving 8,192 bits, x 4 banks giving 32,768 bits, x 4 groups giving a total of 131,072 bits, and this divided by the machine word size of 16 bits gave 8,192 words of memory.
The core on this 8K word memory board occupied a centrally located "board-on-a-board", 5.25" wide by 6.125" high, and was covered by a protective plate. It was surrounded by the necessary support driver read-write-rewrite circuitry. All of the core and the corresponding support electronics fit onto a single standard 15 x board. Up to 32K of such core RAM could be supported in one external expansion box. Semiconductor ROM was already available at the time, and RAM-less systems (i.e. with ROM only) became popular in many industrial settings. The original Nova machines ran at approximately 200 kHz, but its SuperNova was designed to run at up to 3 MHz when used with special semiconductor main memory.
The standardized backplane and I/O signals created a simple, efficient I/O design that made interfacing programmed I/O and Data Channel devices to the Nova simple compared to competing machines. In addition to its dedicated I/O bus structure, the Nova backplane had wire wrap pins that could be used for non-standard connectors or other special purposes.
Programming model
The instruction format could be broadly categorized into one of three functions: 1) register-to-register manipulation, 2) memory reference, and 3) input/output. Each instruction was contained in one word. The register-to-register manipulation was almost RISC-like in its bit-efficiency; and an instruction that manipulated register data could also perform tests, shifts and even elect to discard the result. Hardware options included an integer multiply and divide unit, a floating-point unit (single and double precision), and memory management.
The earliest Nova came with a BASIC interpreter on punched tape. As the product grew, Data General developed many languages for the Nova computers, running under a range of consistent operating systems. FORTRAN IV, ALGOL, Extended BASIC, Data General Business Basic, Interactive COBOL, and several assemblers were available from Data General. Third party vendors and the user community expanded the offerings with Forth, Lisp, BCPL, C, ALGOL, and other proprietary versions of COBOL and BASIC.
Instruction set
The machine instructions implemented below are the common set implemented by all of the Nova series processors. Specific models often implemented additional instructions, and some instructions were provided by optional hardware.
Arithmetic instructions
All arithmetic instructions operated between accumulators. For operations requiring two operands, one was taken from the source accumulator, and one from the destination accumulator, and the result was deposited in the destination accumulator. For single-operand operations, the operand was taken from the source register and the result replaced the destination register. For all single-operand opcodes, it was permissible for the source and destination accumulators to be the same, and the operation functioned as expected.
All arithmetic instructions included a "no-load" bit which, when set, suppressed the transfer of the result to the destination register; this was used in conjunction with the test options to perform a test without losing the existing contents of the destination register. In assembly language, adding a '#' to the opcode set the no-load bit.
The CPU contained a single-bit register called the carry bit, which after an arithmetic operation would contain the carry out of the most significant bit. The carry bit could be set to a desired value prior to performing the operation using a two-bit field in the instruction. The bit could be set, cleared, or complemented prior to performing the instruction. In assembly language, these options were specified by adding a letter to the opcode: 'O' — set the carry bit; 'Z' — clear the carry bit, 'C' — complement the carry bit, nothing — leave the carry bit alone. If the no-load bit was also specified, the specified carry value would be used for the computation, but the actual carry register would remain unaltered.
All arithmetic instructions included a two-bit field which could be used to specify a shift option, which would be applied to the result before it was loaded into the destination register. A single-bit left or right shift could be specified, or the two bytes of the result could be swapped. Shifts were 17-bit circular, with the carry bit "to the left" of the most significant bit. In other words, when a left shift was performed, the most significant bit of the result was shifted into the carry bit, and the previous contents of the carry bit were shifted into the least significant bit of the result. Byte swaps did not affect the carry bit. In assembly language, these options were specified by adding a letter to the opcode: 'L' — shift left; 'R' — shift right, 'S' — swap bytes; nothing — do not perform a shift or swap.
All arithmetic instructions included a three-bit field that could specify a test which was to be applied to the result of the operation. If the test evaluated to true, the next instruction in line was skipped. In assembly language, the test option was specified as a third operand to the instruction. The available tests were:
SZR — skip on zero result
SNR — skip on nonzero result
SZC — skip on zero carry
SNC — skip on nonzero carry
SBN — skip if both carry and result are nonzero
SEZ — skip if either carry or result, or both, is zero
SKP — always skip
nothing — never skip
The actual arithmetic instructions were:
MOV — move the contents of the source accumulator to the destination accumulator
COM — move the bitwise complement of the source accumulator to the destination accumulator
ADD — add source accumulator to destination accumulator
ADC — take the bitwise complement of the source accumulator and add it to the destination accumulator
NEG — move the negative of the source accumulator to the destination accumulator
SUB — subtract the contents source accumulator from the destination accumulator
INC — add 1 to the contents of the source accumulator and move to the destination accumulator
AND — perform the bitwise AND of the two accumulators and place the result in the destination accumulator
An example arithmetic instructions, with all options utilized, is:
ADDZR# 0,2,SNC
This decoded as: clear the carry bit; add the contents of AC2 (accumulator 2) to AC0; circularly shift the result one bit to the right; test the result to see if the carry bit is set and skip the next instruction if so. Discard the result after performing the test. In effect, this adds two numbers and tests to see if the result is odd or even.
Memory reference instructions
The Nova instruction set contained a pair of instructions that transferred memory contents to accumulators and vice versa, two transfer-of-control instructions, and two instructions that tested the contents of a memory location. All memory reference instructions contained an eight-bit address field, and a two-bit field that specified the mode of memory addressing. The four modes were:
Mode 0 — absolute addressing. The contents of the address field of the instruction is zero-filled on the left and used as the target address.
Mode 1 — relative addressing. The contents of the address field of the instruction is sign extended to the left and added to the current value of the program counter (which, by the time the instruction executes, points to the next instruction). The result is used as the target address.
Mode 2 — indexed addressing. The contents of the address field of the instruction is sign extended to the left and added to the current value of accumulator 2. The result is used as the target address.
Mode 3 — indexed addressing. The contents of the address field of the instruction is sign extended to the left and added to the current value of accumulator 3. The result is used as the target address.
Obviously, mode 0 was only capable of addressing the first 256 memory words, given the eight-bit address field. This portion of memory was referred to as "page zero". Page zero memory words were considered precious to Nova assembly language programmers because of the small number available; only page zero locations could be addressed from anywhere in the program without resorting to indexed addressing, which required tying up accumulator 2 or 3 to use as an index register. In assembly language, a ".ZREL" directive caused the assembler to place the instructions and data words that followed it in page zero; an ".NREL" directive placed the following instructions and data words in "normal" memory. Later Nova models added instructions with extended addressing fields, which overcame this difficulty (at a performance penalty).
The assembler computed relative offsets for mode 1 automatically, although it was also possible to write it explicitly in the source. If a memory reference instruction referenced a memory address in .NREL space but no mode specifier, mode 1 was assumed and the assembler calculated the offset between the current instruction and the referenced location, and placed this in the instruction's address field (provided that the resulting value fit into the 8-bit field).
The two load and store instructions were:
LDA — load the contents of a memory location into the specified accumulator.
STA — store the contents of the specified accumulator into a memory location.
Both of these instructions included an "indirect" bit. If this bit was set (done in assembly language by adding a '@' to the opcode), the contents of the target address were assumed to be a memory address itself, and that address would be referenced to do the load or store.
The two transfer-of-control instructions were:
JMP — transfers control to the specified memory location
JSR ("jump subroutine") — Does the same as the JMP instruction, but additionally loads the return address (the instruction following the JSR instruction in line) into accumulator 3 before jumping.
As in the case of the load and store instructions, the jump instructions contained an indirect bit, which likewise was specified in assembly using the '@' character. In the case of an indirect jump, the processor retrieved the contents of the target location, and used the value as the memory address to jump to. However, unlike the load and store instructions, if the indirect address had the most significant bit set, it would perform a further cycle of indirection. On the Nova series processors prior to the Nova 3, there was no limit on the number of indirection cycles; an indirect address that referenced itself would result in an infinite indirect addressing loop, with the instruction never completing. (This could be alarming to users, since when in this condition, pressing the STOP switch on the front panel did nothing. It was necessary to reset the machine to break the loop.)
The two memory test instructions were:
ISZ — increment the memory location, and skip the next instruction if the result is zero.
DSZ — decrement the memory location, and skip the next instruction if the result is zero.
As in the case of the load and store instructions, there was an indirect bit that would perform a single level of indirect addressing. These instructions were odd in that, on the Novas with magnetic core memory, the instruction was executed within the memory board itself. As was common at the time, the memory boards contained a "write-back" circuit to solve the destructive-read problem inherent to magnetic core memory. But the write-back mechanism also contained a mini arithmetic unit, which the processor used for several purposes. For the ISZ and DSZ instructions, the increment or decrement occurred between the memory location being read and the write-back; the CPU simply waited to be told if the result was zero or nonzero. These instructions were useful because they allowed a memory location to be used as a loop counter without tying up an accumulator, but they were slower than performing the equivalent arithmetic instructions.
Some examples of memory reference instructions:
LDA 1,COUNT
Transfers the contents of the memory location labeled COUNT into accumulator 1. Assuming that COUNT is in .NREL space, this instruction is equivalent to: LDA 1,1,(COUNT-(.+1))
where '.' represents the location of the LDA instruction.
JSR@ 0,17
Jump indirect to the memory address specified by the contents of location 17, in page zero space, and deposit the return address in accumulator 3. This was the standard method for making an RDOS system call on early Nova models; the assembly language mnemonic ".SYSTM" translated to this.
JMP 0,3
Jump to the memory location whose address is contained in accumulator 3. This was a common means of returning from a function or subroutine call, since the JSR instruction left the return address in accumulator 3.
STA 0,3,-1
Store the contents of accumulator 0 in the location that is one less than the address contained in accumulator 3.
DSZ COUNT
Decrement the value in the location labeled COUNT, and skip the next instruction if the result is zero. As in the case above, if COUNT is assumed to be in .NREL space, this is equivalent to: DSZ 1,(COUNT-(.+1))
I/O Instructions
The Novas implemented a channelized model for interfacing to I/O devices. In the model, each I/O device was expected to implement two flags, referred to as "Busy" and "Done", and three data and control registers, referred to as A, B, and C. I/O instructions were available to read and write the registers, and to send one of three signals to the device, referred to as "start", "clear", and "pulse". In general, sending a start signal initiated an I/O operation that had been set up by loading values into the A/B/C registers. The clear signal halted an I/O operation and cleared any resulting interrupt. The pulse signal was used to initiate ancillary operations on complex subsystems, such as seek operations on disk drives. Polled devices usually moved data directly between the device and the A register. DMA devices generally used the A register to specify the memory address, the B register to specify the number of words to be transferred, and the C register for control flags. Channel 63 referred to the CPU itself and was used for various special functions.
Each I/O instruction contained a six-bit channel number field, a four-bit to specify which register to read or write, and a two-bit field to specify which signal was to be sent. In assembly language, the signal was specified by adding a letter to the opcode: 'S' for start, 'C' for clear, 'P' for pulse, and nothing for no signal. The opcodes were:
DIA — move the contents of the device's A register to the specified accumulator
DOA — send the contents of the specified accumulator to the A register of the device on the specified channel
DIB — move the contents of the device's B register to the specified accumulator
DOB — send the contents of the specified accumulator to the B register of the device on the specified channel
DIC — move the contents of the device's C register to the specified accumulator
DOC — send the contents of the specified accumulator to the C register of the device on the specified channel
NIO — "no I/O", a misnomer. The instruction was used to send a signal to a device without doing a register transfer.
In addition, four instructions were available to test the status of a device:
SKPBN — skip the next instruction if the device's busy flag is set
SKPBZ — skip the next instruction if the device's busy flag is clear
SKPDN — skip the next instruction if the device's done flag is set
SKPDZ — skip the next instruction if the device's done flag is clear
Starting a device caused it to set its busy flag. When the requested operation was completed, conventionally the device cleared its busy flag and set its done flag; most devices had their interrupt request mechanism wired to the done flag, so setting the done flag caused an interrupt (if interrupts were enabled and the device wasn't masked).
Special Instructions
These instructions performed various CPU control and status functions. All of them were actually shorthand mnemonics for I/O instructions on channel 63, the CPU's self-referential I/O channel.
INTA — interrupt acknowledge. Transferred the channel number of the interrupting device to the specified accumulator.
INTDS — disabled all interrupts
INTEN — enabled all interrupts
IORST — I/O reset. Sent a reset signal on the I/O bus, which stopped all I/O, disabled interrupts and cleared all pending interrupts.
MSKO — mask out. Used the contents of the specified accumulator to set up the interrupt mask. How the mask was interpreted was up to the implementation of each I/O device. Some devices could not be masked.
READS — transferred the contents of the 16 front panel data switches to the specified accumulator.
HALT — stopped the CPU. Once halted, the CPU could be made to start again only by manual intervention at the front panel.
Interrupts and interrupt handling
From the hardware standpoint, the interrupt mechanism was relatively simple, but also less flexible, than current CPU architectures. The backplane supported a single interrupt request line, which all devices capable of interrupting connected to. When a device needed to request an interrupt, it raised this line. The CPU took the interrupt as soon as it completed the current instruction. As stated above, a device was expected to raise its "done" I/O flag when it requested an interrupt, and the convention was that the device would clear its interrupt request when the CPU executed a I/O clear instruction on the device's channel number.
The CPU expected the operating system to place the address of its interrupt service routine into memory address 1. When a device interrupted, the CPU did an indirect jump through address 1, placing the return address into memory address 0, and disabling further interrupts. The interrupt handler would then perform an INTA instruction to discover the channel number of the interrupting device. This worked by raising an "acknowledge" signal on the backplane. The acknowledge signal was wired in a daisy-chain format across the backplane, such that it looped through each board on the bus. Any device requesting an interrupt was expected to block the further propagation of the acknowledge signal down the bus, so that if two or more devices had pending interrupts simultaneously, only the first one would see the acknowledge signal. That device then responded by placing its channel number on the data lines on the bus. This meant that, in the case of simultaneous interrupt requests, the device that had priority was determined by which one was physically closest to the CPU in the card cage.
After the interrupt had been processed and the service routine had sent the device an I/O clear, it resumed normal processing by enabling interrupts and then returning via an indirect jump through memory address 0. In order to prevent a pending interrupt from interrupting immediately before the return jump (which would cause the return address to be overwritten), the INTEN instruction had a one-instruction-cycle delay. When it was executed, interrupts would not be enabled until after the following instruction, which was expected to be the JMP@ 0 instruction, was executed.
The operating system's interrupt service routine then typically performed an indexed jump using the received channel number, to jump to the specific interrupt handling routine for the device. There were a few devices, notably the CPU's power-failure detection circuit, which did not respond to the INTA instruction. If the INTA returned a result of zero, the interrupt service routine had to poll all of the non-INTA-responding devices using the SKPDZ/SKPDN instructions to see which one interrupted.
The operating system could somewhat manage the ordering of interrupts by setting an interrupt mask using the MSKO instruction. This was intended to allow the operating system to determine which devices were permitted to interrupt at a given time. When this instruction was issued, a 16-bit interrupt mask was transmitted to all devices on the backplane. It was up to the device to decide what the mask actually meant to it; by convention, a device that was masked out was not supposed to raise the interrupt line, but the CPU had no means of enforcing this. Most devices that were maskable allowed the mask bit to be selected via a jumper on the board. There were devices that ignored the mask altogether.
On the systems having magnetic core memory (which retained its contents without power), recovery from a power failure was possible. A power failure detection circuit in the CPU issued an interrupt when loss of the main power coming into the computer was detected; from this point, the CPU had a short amount of time until a capacitor in the power supply lost its charge and the power to the CPU failed. This was enough time to stop I/O in progress, by issuing an IORST instruction, and then save the contents of the four accumulators and the carry bit to memory. When the power returned, if the CPU's front panel key switch was in the LOCK position, the CPU would start and perform an indirect jump through memory address 2. This was expected to be the address of an operating system service routine that would reload the accumulators and carry bit, and then resume normal processing. It was up to the service routine to figure out how to restart I/O operations that were aborted by the power failure.
Front panel layout
As was the convention of the day, most Nova models provided a front panel console to control and monitor CPU functions. Models prior to the Nova 3 all relied on a canonical front panel layout, as shown in the Nova 840 panel photo above. The layout contained a keyed power switch, two rows of address and data display lamps, a row of data entry switches, and a row of function switches that activated various CPU functions when pressed. The address lamps always displayed the current value of the program counter, in binary. The data lamps displayed various values depending on which CPU function was active at the moment. To the left of the leftmost data lamp, an additional lamp displayed the current value of the carry bit. On most models the lamps were incandescent lamps which were soldered to the panel board; replacing burned-out lamps was a bane of existence for Data General field service engineers.
Each of the data switches controlled the value of one bit in a 16-bit value, and per Data General convention, they were numbered 0-15 from left to right. The data switches provided input to the CPU for various functions, and could also be read by a running program using the READS assembly language instruction. To reduce panel clutter and save money, the function switches were implemented as two-way momentary switches. When a function switch lever was lifted, it triggered the function whose name was printed above the switch on the panel; when the lever was pressed down, it activated the function whose name appeared below the switch. The switch lever returned to a neutral position when released.
Referencing the Nova 840 photo, the first four switches from the left performed the EXAMINE and DEPOSIT functions for the four accumulators. Pressing EXAMINE on one of these caused the current value of the accumulator to be displayed in binary by the data lamps. Pressing DEPOSIT transferred the binary value represented by the current settings of the data switches to the accumulator.
Going to the right, the next switch was the RESET/STOP switch. Pressing STOP caused the CPU to halt after completing the current instruction. Pressing RESET caused the CPU to halt immediately, cleared a number of CPU internal registers, and sent an I/O reset signal to all connected devices. The switch to the right of that was the START/CONTINUE switch. Pressing CONTINUE caused the CPU to resume executing at the instruction currently pointed at by the program counter. Pressing START transferred the value currently set in data switches 1-15 to the program counter, and then began executing from there.
The next two switches provided read and write access to memory from the front panel. Pressing EXAMINE transferred the value set in data switches 1-15 to the program counter, fetched the value in the corresponding memory location, and displayed its value in the data lamps. Pressing EXAMINE NEXT incremented the program counter and then performed an examine operation on that memory location, allowing the user to step through a series of memory locations. Pressing DEPOSIT wrote the value contained in the data switches to the memory location pointed at by the program counter. Pressing DEPOSIT NEXT first incremented the program counter and then deposited to the pointed-to memory location.
The INST STEP function caused the CPU to execute one instruction, at the current program counter location, and then halt. Since the program counter would be incremented as part of the instruction execution, this allowed the user to single-step through a program. MEMORY STEP, a misnomer, caused the CPU to run through a single clock cycle and halt. This was of little use to users and was generally only used by field service personnel for diagnostics.
PROGRAM LOAD was the mechanism usually used to boot a Nova. When this switch was triggered, it caused the 32-word boot ROM to be mapped over the first 32 words of memory, set the program counter to 0, and started the CPU. The boot ROM contained code that would read 256 words (512 bytes) of code from a selected I/O device into memory and then transfer control to the read-in code. The data switches 8-15 were used to tell the boot ROM which I/O channel to boot from. If switch 0 was off, the boot ROM would assume the device was a polled device (e.g., the paper tape reader) and run a polled input loop until 512 bytes had been read. If switch 0 was on, the boot ROM assumed the device was a DMA-capable device and it initiated a DMA data transfer. The boot ROM was not smart enough to position the device prior to initiating the transfer. This was a problem when rebooting after a crash; if the boot device was a disk drive, its heads had likely been left on a random cylinder. They had to be repositioned to cylinder 0, where RDOS wrote the first-level boot block, in order for the boot sequence to work. Conventionally this was done by cycling the drive through its load sequence, but users who got frustrated with the wait time (up to 5 minutes depending on the drive model) learned how to input from the front panel a drive "recalibrate" I/O code and single-step the CPU through it, an operation that took an experienced user only a few seconds.
The power switch was a 3-way keyed switch with positions marked OFF, ON, and LOCK. In the OFF position all power was removed from the CPU. Turning the key to ON applied power to the CPU. However, unlike current CPUs, the CPU did not start automatically when power was applied; the user had to use PROGRAM LOAD or some other method to start the CPU and initiate the boot sequence. Turning the switch to LOCK disabled the front panel function switches; by turning the switch to LOCK and removing the key, the user could render the CPU resistant to tampering. On systems with magnetic core memory, the LOCK position also enabled the auto power failure recovery function. The key could be removed in the OFF or LOCK positions.
Performance
The Nova 1200 executed core memory access instructions (LDA and STA) in 2.55 microseconds (μs). Use of read-only memory saved 0.4 μs. Accumulator instructions (ADD, SUB, COM, NEG, etc.) took 1.55 μs, MUL 2.55 μs, DIV 3.75 μs, ISZ 3.15-4.5 μs. On the later Eclipse MV/6000, LDA and STA took 0.44 μs, ADD, etc. took 0.33 μs, MUL 2.2 μs, DIV 3.19 μs, ISZ 1.32 μs, FAD 5.17 μs, FMMD 11.66 μs.
Assembly language examples
Hello world program
This is a minimal programming example in Nova assembly language. It is designed to run under RDOS and prints the string “Hello, world.” on the console.
; a "hello, world" program for Nova running RDOS
; uses PCHAR system call
.titl hello
.nrel
.ent start
start:
dochar:
lda 0,@pmsg ; load ac0 with next character,
mov# 0,0,snr ; test ac0; skip if nonzero (don't load result)
jmp done
.systm
.pchar ; print first
jmp er ; skipped if OK
movs 0,0 ; swap bytes
.systm
.pchar ; print second
jmp er ; skipped if OK
isz pmsg ; point to next character
jmp dochar ; go around again
done:
.systm ; normal exit
.rtn
er:
.systm ; error exit
.ertn
halt
pmsg:
.+1 ; pointer to first character of string
; note bytes are packed right-to-left by default
; <15><12> denotes a CR LF pair.
.txt /Hello, world.<15><12>/
0 ; flag word to end string
.end start
16-bit multiplication
Basic models of the Nova came without built-in hardware multiply and divide capability, to keep prices competitive. The following routine multiplies two 16-bit words to produce a 16-bit word result (overflow is ignored). It demonstrates combined use of ALU op, shift, and test (skip). Note that when this routine is called by jsr, AC3 holds the return address. This is used by the return instruction jmp 0,3. An idiomatic way to clear an accumulator is sub 0,0. Other single instructions can be arranged to load a specific set of useful constants (e.g. -2, -1, or +1).
mpy: ; multiply AC0 <- AC1 * AC2, by Toby Thain
sub 0,0 ; clear result
mbit: movzr 1,1,szc ; shift multiplier, test lsb
add 2,0 ; 1: add multiplicand
movzl 2,2,szr ; shift and test for zero
jmp mbit ; not zero, do another bit
jmp 0,3 ; return
Binary print accumulator
The following routine prints the value of AC1 as a 16-digit binary number, on the RDOS console. It reveals further quirks of the Nova instruction set. For instance, there is no instruction to load an arbitrary “immediate” value into an accumulator (although memory reference instructions do encode such a value to form an effective address). Accumulators must generally be loaded from initialized memory locations (e.g. n16). Other contemporary machines such as the PDP-11, and practically all modern architectures, allow for immediate loads, although many such as ARM restrict the range of values that can be loaded immediately.
Because the RDOS .systm call macro implements a jsr, AC3 is overwritten by the return address for the .pchar function. Therefore, a temporary location is needed to preserve the return address of the caller of this function. For a recursive or otherwise re-entrant routine, a stack, hardware if available, software if not, must be used instead. The return instruction becomes jmp @ retrn which exploits the Nova's indirect addressing mode to load the return PC.
The constant definitions at the end show two assembler features: the assembler radix is octal by default (20 = sixteen), and character constants could be encoded as e.g. "0.
pbin: ; print AC1 on console as 16 binary digits, by Toby Thain
sta 3,retrn ; save return addr
lda 2,n16 ; set up bit counter
loop: lda 0,chr0 ; load ASCII '0'
movzl 1,1,szc ; get next bit in carry
inc 0,0 ; bump to '1'
.systm
.pchar ; AC0-2 preserved
jmp err ; if error
inc 2,2,szr ; bump counter
jmp loop ; loop again if not zero
lda 0,spc ; output a space
.systm
.pchar
jmp err ; if error
jmp @retrn
spc: " ;that's a space
chr0: "0
n16: -20
retrn: 0
Facts
The Canadian Broadcasting Corporation in Montreal used the Nova 1200 for channel play-out automation up until the late 1980s. It was then replaced with refurbished Nova 4 units and these were in use until the mid 1990s.
See also
Fairchild 9440 - a single-chip implementation of the Nova 2 and 3
National Semiconductor IMP-16 - 5-chip p-mos implementation of the original Nova
National Semiconductor PACE and INS8900 - single-chip implementation with simplified instruction set
Notes
References
Citations
Bibliography
External links
Bob Supnik's SimH project – Includes a basic Nova emulator in a user-modifiable package
The portable C compiler includes a NOVA target.
Novas Are Forever (SimuLogic’s) website – Attempts to archive everything DG plus provide free and commercial products
A portable PDP-8 and DG Nova cross-assembler
Carl Friend’s Minicomputer Museum – Describes the Nova instruction set in detail
Nova
16-bit computers
Computers using bit-slice designs
Computer-related introductions in 1969 |
5517819 | https://en.wikipedia.org/wiki/SoftKey | SoftKey | SoftKey International (originally SoftKey Software Products, Inc.) was a software company founded by Kevin O'Leary in 1986 in Toronto, Ontario. It was known as The Learning Company from 1995 to 1999 after acquiring The Learning Company and taking its name.
SoftKey played a major role in the dissolution of the edutainment industry by the turn of the millennium. Contributing factors include its reduction of the market price by releasing shovelware discs of freeware and shareware, hostile takeovers of major edutainment software companies, reduction of these acquisitions to a skeleton staff, and questionable financial practices to maintain its stock price.
In 1999, the company was acquired by Mattel in what Businessweek called "one of the worst deals of all time".
Products
SoftKey published and distributed CD-ROM-based personal computer software for Windows and Macintosh computers during the late 1980s and 1990s. Its lineup consisted of software intended for home audiences, specifically shovelware discs containing various freeware or shareware game software. The company enjoyed great success by offering "jewel-case only" products, dubbed as the "Platinum" line.
As a home and small office software publisher, SoftKey bought the rights to application packages from their authors and distributed them under its own "Key" label. By late 1992, SoftKey was distributing 35 different products in this manner. SoftKey began to develop its own software by 1994, and had branched out to include edutainment games and CD-ROMs in its line of products.
In 1986, SoftKey released specialized graphics package KeyChart for the IBM PC and compatibles, designed to make time-consuming plotting easier. In 1993, it was selling KeyMap, a DOS-only software that offered maps, route planning, and a database tool for annotating maps. Around this time, Computer Associates acquired Easy Tax (DOS) from SoftKey and sold it as Simply Tax.
SoftKey's acquisition of The Learning Company added the Reader Rabbit and Math Rabbit educational video games to its collection. Its acquisition of MECC added The Oregon Trail, Word Munchers, Number Munchers and Storybook Weaver. With the acquisition of Broderbund, it obtained multiple award-winning brands including Carmen Sandiego, The Print Shop, Living Books, Family Tree Maker, Arthur, and KidPix.
Marketing
According to founder Kevin O'Leary, SoftKey's business model was to market its retail products "no different from cat food or any other consumer good." It was one of few companies to rent space in stores to better manage distribution. O'Leary stated, "When we approach a retailer, we can offer them a wide range of titles that diversifies their risk. So if they give us five or 10 square feet of store space, we’ll guarantee X dollars of sell-through." He also said, "It's not about technology anymore. It's about marketing, merchandising, brand management, and shelf space. In the cat food business, that's all that matters. And in the software business, that's all that matters.''
The company pioneered revolving racks with software packaged in standard CD jewel cases, allowing them to display three times as much product. It took products out of niche software businesses and into general stores with more traffic such as Office Depot, Radio Shack, Willson Stationers and SmithBooks. It used eye-catching graphics on the boxes and made all of its packaging uniform. O'Leary believed that "What's inside the box is important, but it's not as important as how it's marketed." He stated that "It is truly a packaged goods philosophy that's taken over this industry. It's about facings and shelf space and advertising dollars and driving sales through the door and profit per square foot in gross margin."
In October 1995, SoftKey had 10 centers in cities in Europe, Asia, Canada, and the United States. It sold its products through more than 18,000 outlets, including grocery stores, hardware stores, and airport gift shops, and had distributors in 47 countries.
Pricing
SoftKey's pricing strategy was to prioritize the number of copies sold over the price per unit. As such, SoftKey listed its titles for lower prices, generally between $40 and $100, with minimum profit. The Christian Science Monitor stated that the move could "transform the industry," leading to lower software prices but more variety in the types of stores that sell software.
The corporate mission of SoftKey International, Inc. was "to be the leading electronic publisher of value-priced consumer software-worldwide." One analyst dubbed its products "coasterware", since they were so cheap that "if you don't like the actual software you can use the CD-ROMs as drink coasters".
O'Leary wanted to "produce products to service that 40 percent of the market that hasn't bought educational software because of pricing issues." He stated, "In the last two years, we've moved from an industry that sells primarily to businesses to an industry that's going through a violent change to become a commodity.''
The company became known for aggressively driving down the development costs of products and laying off employees of the companies it acquired. Casey Dworkin, publisher of Retail Price Week, said that SoftKey appeals to companies that want to "sell software by the pound, appealing to impulse purchases by customers who are intrigued but don't want to drop $40 for a piece of software." They compared SoftKey's practices to a laundry-detergent maker marketing a premium-brand version, a lower-end brand, and a generic version of the same product.
SoftKey built a business by acquiring struggling software companies, repackaging and repricing its products. "SoftKey believes that much consumer software is overpriced and therefore cannot reach a broad market. It's a philosophy that clashes with the artistic sensibilities of many in the multimedia software business—but is nonetheless likely to become increasingly influential in the volatile software world."
Profit
SoftKey Software Products was the fastest growing company in Canada in 1992, with sales of $36.8 million and profit of $6.1 million. Its most profitable products were its tax-software and processing service. By April 1995, SoftKey's stock was valued at $25.50, about 20 times the year's earnings. A public offering of 2.3 million common shares was priced at $28.875.
SoftKey products were sold in more than 19,000 stores in over 40 countries In June of that year, Montgomery Securities raised more than $60 million for the company. In October, SoftKey raised another $350 million in an unrated private offering. On November 28, 1995, SoftKey rose from 3.2 million to 4.7 million shares, the largest increase in open positions among Nasdaq issues.
In August 1998, the stock exchange halted trading in The Learning Company, as the company issued a statement to clear up questions about its accounting practices. Shares of The Learning Company (NYSE: TLC) fell 1 15/16 to 26 3/8 and Mattel (NYSE: MAT) plunged 20 percent to 23 11/16. The company continued to grow, with revenue of $800 million despite an accumulated deficit of $1.1 billion by the end of 1998.
History
In 1986, Canadian businessman and investor Kevin O'Leary along with John Freeman started SoftKey Software Products, Inc. in O'Leary's basement with a loan of $10,000 from his mother. He convinced other companies to bundle SoftKey's products with their own, later licensing software from other firms, which proved more cost-effective than internal development.
In 1993, SoftKey International was created out of a three-way merger between SoftKey Software Products, WordStar International, and Spinnaker Software. Shareholders of Softkey Software represented about 53 percent of the new company's shares. After the merger, the company moved to Spinnaker's offices in Cambridge, Mass.
Acquisitions
MECC and The Learning Company
In October 1995, SoftKey initiated a bidding war against Broderbund for Learning Company, launching a hostile offer valued at $606 million. SoftKey also announced it had agreed to buy the Minnesota Educational Computing Corporation (MECC) for $370 million, throwing wrench into Broderbund's offer. O'Leary commented, "They're working on the economics of yesterday", stating that "Learning's premium-priced products were out of step with trends in the market."
After the acquisition of The Learning Company, SoftKey changed its name to "The Learning Company". A substantial percentage of the staff were let go, reducing it to a skeleton staff. MECC' senior vice president of product development Susan Schilling stated: "[O'Leary] had an interest in earning money. I'm not sure he had a desire to help children learn."
Acquisitions from 1994 - 1998
On September 14, 1994, SoftKey acquired privately held Software Marketing Corp., Phoenix, for about 600,000 shares of SoftKey common stock and the assumption of $1.6 million in long-term debt.
On November 30, 1995, the original Learning Company announced that it had sued the Tribune Company for violating securities laws as a "strategic partner" of SoftKey International. The next day, SoftKey agreed to acquire Compton's New Media Inc. from Tribune for stock valued at $106.5 million.
In March 1998, Softkey, now called The Learning Company, acquired Mindscape Inc. from Pearson PLC for $150 million in cash and stock. Broderbund's Red Orb Entertainment was moved to Mindscape.
In June 1998, Learning Co. agreed to buy rival Broderbund Software Inc., maker of the blockbuster game Myst, in a stock deal valued at about $416 million.
In December 1998 ,The Learning Company acquired Palladium Interactive.
According to Information technology consulting company Booz Allen Hamilton, two of SoftKey International's acquisition deals rank among the ten worst U.S. acquisitions during 1994–1996 as measured by shareholder value two years after the deal.
Sale to Mattel
In the fall of 1998, Mattel agreed to acquire The Learning Company in a stock-for-stock merger valuing the company at approximately $4.2 billion. The merger was finalized and unanimously approved by both companies' boards of directors on December 14. A few weeks after the sale, the Center for Financial Research and Analysis forensic accounting firm published a report critical of Mattel. O'Leary, who had been hired as president of Mattel's new TLC digital division, sold his stock for $6 million a few months before $2 billion in shareholder value was lost in one day.
Despite owning software titles through their Mattel Media division, Mattel lost $82.4 million in the year of 1998 because of several problems with the acquisition, including a loss of a key distribution deal and a high return of unsold products from retailers. The total financial losses to Mattel have been estimated to be as high as $3.6 billion.
On May 7, 1999, shareholders of both companies voted to approve the merger. The merger was completed on May 13, 1999. Jill E. Barad, Mattel's chairman and chief executive officer stated "This merger gives Mattel a $1 billion software division with an unparalleled portfolio of branded content and profit margins exceeding that of our traditional business," The company was placed under Mattel's new Mattel Interactive division.
Aftermath
The sale proved to be fraught. The Telegraph deemed it "one of the worst takeovers in recent history". Toy analyst Margaret Whitfield of Tucker Anthony Cleary Gull called it "a disaster for Mattel". Bloomberg, Businessweek, and CNBC all described it as one of the worst mergers of all time.
In the fourth quarter of 1999, Mattel reported a loss of $184 million, reportedly due to poor sales and inventory problems. Michael Perik and Kevin O'Leary, founders and heads of the Learning Co, left the company. Reports from the Center for Financial Research and Analysis later highlighted the "lack of proper due diligence by Mattel during the Learning Co. acquisition."
In January 2000, Mattel brought on software executive Bernard Stolar to assist with their financial troubles. On February 3, 2000 Chairman and CEO Jill E. Barad resigned from Mattel. The 1999 Annual Report began, "The bad news for 1999 unfortunately has overshadowed the good news. We are all painfully aware of the negative effect the acquisition of The Learning Company and its subsequent performance had on our results for 1999"
The acquisition saw the end of the mid-1990s edutainment boom. Former Learning Company educational design department manager, Toby Levenson, said that edutainment had become "a toxic word". Blake Montgomery of EdSurge wrote, "For many years, people making educational products didn't want them to be entertaining because that could be called "edutainment" and that would hurt your funding.”
Sale to Gores Technology Group
On April 3, 2000, Mattel announced its plan to dissolve its assets related to the software business. Gores Technology Group acquired The Learning Company to create their entertainment, productivity and education divisions.
The entertainment division was sold to Ubisoft in 2001. Gores subsequently sold most of the other holdings – including the edutainment series and the brand name The Learning Company – to Irish company Riverdeep Interactive Learning, which later became Houghton Mifflin Harcourt. Harcourt released several book sets under The Learning Company brand umbrella, including Oregon Trail Adventures, The Little Box of Love, and The Little Box of Laughs.
As of April 2018, Houghton Mifflin Harcourt has ceased using the Learning Company brand.
List of acquisitions
February 1994 – WordStar International and Spinnaker Software
June 1994 – Aris Multimedia Entertainment
July 1994 – Compact Publishing
September 1995 – Software Marketing Corporation
July 1995 – Tewi Verlag GmbH
August 1995 – Future Vision Holding
December 1995 – The Learning Company
December 1995 – Compton's NewMedia
Late 1995 – EduSoft
May 1996 – Minnesota Educational Computing Corporation (MECC)
October 1997 – Microsystems Software
December 1997 – Creative Wonders
March 1998 – Mindscape
August 1998 – Broderbund
Software titles
References
External links
Defunct software companies of the United States
Mattel subsidiaries |
47215335 | https://en.wikipedia.org/wiki/Abdul%20Razaque | Abdul Razaque | Abdul Razaque (born August 17, 1987, Johi, Dadu, Sind, Pakistan) is a Pakistani computer scientist, now based in the U.S., and an expert in designing mathematical models, particularly for the disaster recovery process in the field of wireless sensor network, IoT, Big Data Management and Secure Cloud Computing. He was an active researcher in the Wireless and Mobile Communication Laboratory at the University of Bridgeport. He worked as a visiting professor at Cleveland State University.
Education
Razaque received his B.S. and M.S. degrees in Computer Science from the University of Sindh. Following this, he undertook his master's degree in Multimedia & Communication at Mohammad Ali Jinnah University, and pursued studies at University of Bridgeport in the US, earning a PhD degree in 2014-15, under the supervision of Khaled Elleithy.
Research and publications
Razaque published over 180 research articles and gave presentations in 75 countries during his PhD studies, which is considered to be the highest ever number of publications produced by a PhD student.
Dr.Abdul Razaque is author of five Books in the field of Cyber Security and Networks.
Services
Dr.Razaque has been engaged in strategic planning activities of The Institute of Electrical and Electronics Engineers as a Chair for the strategic and planning committee, IEEE (SAC) Region-1, United States for the year 2014, and Relational Officer, IEEE for (Europe, Africa and Middle East) SAC Region-8 for the year 2014. Dr. Razaque served as a jury member for the 2012-13 year, for The Royal Award For Islamic Finance, an international award offered every couple of years to recognize one exceptional individual who has excelled in advancing Islamic finance globally through outstanding performance and contribution.
Awards/Honor
National Cyber Security Expert Award by WorldSkills Kazakhstan for the Cyber Security achievements, 2019
Notable Alumni of University of Bridgeport, Connecticut USA, 2015
Nominated by Commonwealth of nations for the Distinguished Research Award, 2015
Special award in 2014 from the Islamic Development Bank due to his scholarly work and socioeconomic activities
One of five recipients awarded by the National Science Foundation (NSF) to present his research work in Plamero, Italy in October, 2013
The Distinguished Alumnus Award in leadership from the Eisenhower Fellowships 2013-14
Certificate of Excellence from the Student Programming Board, University of Bridgeport, Spring 2012
Shell Pakistan Inspirational Award 2011
Cultural exchange Fellow awarded by United States Educational Foundation in Pakistan, 2011
Cultural Exchange Fellowship Award, 2011
Distinguished Globe Award in sustainability Innovation from Globe Award organization, 2010
Recognized by the Pakistan Science Foundation as outstanding Student Researcher in 2008
Professional Role
Abdul Razaque chaired more than dozen of International Conferences and delivered the keynote speeches and declared as speaker of year in 2013.
Innovation
Razaque is CEO and owner of M-learning platform inc. that is fully secured platform supported with key management algorithms and cryptographic hash function, which helps the million users from the academia to open their classes and maintain the activities including the tasks automatically using smart Android phones. Dr. Razaque was also Co-founder and Chief Executive of Advanced Research Machines (ARM), based in Hong Kong.
Bibliography
Academic books in English
Mobile Malware Infringement and Detection(2019)
User biometric authentication (Comprehensive Analysis)(2019)
Cryptographic Algorithms(2019)
Computer Network Essentials(2019)
Cybersecurity Domains(2019)
References
1983 births
Living people
Pakistani computer scientists
University of Sindh alumni
University of Bridgeport alumni |
49402921 | https://en.wikipedia.org/wiki/Watch%20Dogs%202 | Watch Dogs 2 | Watch Dogs 2 (stylized as WATCH_DOGS 2) is a 2016 action-adventure game developed by Ubisoft Montreal and published by Ubisoft. It is the sequel to 2014's Watch Dogs and the second installment in the Watch Dogs series. It was released for the PlayStation 4, Xbox One and Microsoft Windows in November 2016, and Stadia in December 2020. Set within a fictionalized version of the San Francisco Bay Area, the game is played from a third-person perspective and its open world is navigated on-foot or by vehicle. Players control Marcus Holloway, a hacker who works with the hacking group DedSec to take down the city's advanced surveillance system known as ctOS. There are multiple ways to complete missions, and each successful assignment increases the follower count of DedSec. Cooperative multiplayer allows for competitive one-on-one combat and connecting with other players to neutralize a player who is causing havoc.
Ubisoft Montreal studied player feedback from the first game to assess what could be improved in Watch Dogs 2 and the setting was researched by making frequent trips to California. Ubisoft Reflections was responsible for overhauling the driving mechanic. Real hackers were consulted to validate scripts and game mechanics for authenticity and references to real-life hacktivism were fictionalized, like the Project Chanology protest. The original soundtrack was composed by Hudson Mohawke. The game was released to overall positive reception from critics which praised the game for improving upon the original Watch Dogs in areas like the hacking, setting, characters and driving. However, character inconsistencies, firearms, and frequent technical issues — later patched — were cited as imperfections. Watch Dogs 2 had sold more than 10 million copies by March 2020. A sequel, Watch Dogs: Legion, was released on October 29, 2020.
Gameplay
Similar to its predecessor, Watch Dogs 2 is an action-adventure game with stealth elements and played from a third-person perspective as Marcus Holloway, a young hacker. The game features an open world set in a fictionalized version of the San Francisco Bay Area, an area more than twice as large as the Chicagoland setting from Watch Dogs. It consists of four different areas: San Francisco, Oakland, Marin, and Silicon Valley. Players can navigate the game's world on-foot or by the various vehicles featured in the game, such as cars, trucks, buses, cable cars, motorcycles, quad bikes, and boats. The driving mechanic was overhauled and designed to be more accessible. The player can shoot their weapons while driving. Marcus also has improved acrobatic skills, and the ability to parkour around the city. The player can use different methods to approach the game's missions, choosing between the aggressive approach, in which they defeat enemies with guns which are made with a 3D printer; explosives, like mines; or Marcus' own melee weapon, a billiard ball attached to a bungee cord. Alternatively, the player can use the stealth approach, in which they can evade enemies or paralyze them temporarily with Marcus' taser. Watch Dogs 2, like its predecessor, places a particular emphasis on using environmental apparatus and the terrain to Marcus' advantage. For example, a player may hack an A/C unit to produce an electric shock when an enemy nears it. Marcus may also employ his own modular taser devices and explosives to use tactically against enemies. When law enforcement witnesses the player committing a crime, or is alerted by a non-player character (NPC), police officers will attempt to arrest the player. The game upgrades system is a returning feature, with items being divided into three categories: Ghost, Aggressor, and Trickster. Upgrades can be customized according to playstyles.
Marcus can hack into various electronic devices connected to the ctOS system with his in-game smartphone. For example, Marcus can modify the personal information of NPCs to have them arrested or attacked by one of the various gangs such as the 580s, the Tezcas, the Auntie Shu Boys, the Bratva or the Sons of Ragnarok, hack and manipulate every mobile phone featured in the game, disrupt traffic by hacking cars and traffic lights, hack into monitoring cameras, and carry out "mass hacking", which hacks the electrical equipment of a large group of people. The player can also gain multiple options while hacking the same object. For instance, if the player attempts to hack a car, they can gain direct control over them, or have the car lose control and crash in a random direction. Unlike Aiden, the protagonist of the first game, Marcus has an arsenal of advanced equipment, including a quadcopter and remote-controlled car, both of which can be used for remote hacking and scouting. Marcus' apparel can be customized with over 700 articles of clothing, available for purchase in stores that maintain fashion styles unique to what is worn by the denizens in each area. The game features several main story missions, and side-missions known as "operations". Once completed, Marcus' follower count will increase.
Multiplayer
Multiplayer returns in Watch Dogs 2. The game introduces a cooperative multiplayer mode, in which players can meet and interact with other random players. They can explore the open world and complete missions together, which will also help players to gain followers. The game features an emote system, which allows players' characters to communicate with each other through basic gestures. The game can be played completely online or offline. It also features six competitive multiplayer modes:
Hacking Invasion: A one-versus-one competitive multiplayer mode, originally featured in the first game, in which a player covertly joins another player's single-player session and steals virtual data from them. The invading player must stay hidden while stealing the data, while the defending player must identify and kill the invading player.
Bounty Hunter: A mode introduced in the game. If an online player creates too much chaos in the world, the mode will be initiated. Alternatively, a player can manually initialize this game mode. Police, alongside one to three other players, will join the player's game with the hope of killing the hunted and claiming the bounty, which gives them experience points. The hunted could either strike back at the hunters by killing them, which gives them greater rewards, or escape from them until the bounty expires. The hunted, meanwhile, also can be assisted by another player if that player chooses to join the hunted. Players can manually place a bounty on themselves using the in-game smartphone.
Showd0wn: A mode added in an update. In this mode, 2 teams of 2 players battle each other in short missions. Missions vary from the first team to steal the hard drives to the offensive team having to hack the servers the defensive team is protecting in a limited amount of time.
Racing: A mode added in an update. Up to four players compete in head-to-head races to reach the finish line with drones, ekarts, boats, and bikes.
Man vs Machine: A mode added in an update. Up to four players work together to take down a machine in a narrow time frame.
Loot Trucks: A mode added in an update. Up to four players compete in a head-to-head battle to steal a valuable box from a truck, and escape the police and other players. This event has a chance to randomly occur while a player is free-roaming, but can also be manually triggered.
Plot
In 2016, three years after the events of Chicago, San Francisco becomes the first city to install the next generation of ctOS (central Operating System) – a computing network connecting every device together into a single system, developed by technology company Blume. Hacker Marcus Holloway, punished for a crime he did not commit through ctOS 2.0, decides to join the hacking group DedSec (composed of hackers Sitara Dhawan, Josh Sauchak, Horatio Carlin, and "Wrench"), and conducts an initiation test by hacking a Blume server farm to wipe his profile from the system. DedSec determines that the new ctOS can covertly harm innocent citizens across the city, and thus decides to bring about awareness of their goals through conducting a social media campaign to recruit, by exposing corruption and crimes being conducted through the system, before bringing down Blume.
After several successful exposures, Josh discovers a number of irregularities in their follower numbers. When Marcus investigates this, he learns that DedSec has been used by Blume's CTO Dušan Nemec, in order to sell ctOS 2.0 to those frightened at being hacked. Forced to leave the city for a while, DedSec partake in a hacking event in the desert, and encounter legendary hacker Raymond "T-Bone" Kenney. Interested in assisting them, Kenney joins DedSec as they work to continue their fight against Blume. After hacking the server farm of a major internet company, the group use the data they acquire to pursue and expose corruption amongst law enforcement officers, politicians, and numerous Silicon Valley corporations. During this time, Marcus also focuses on bringing down several criminal syndicates, after one gang murders Horatio for refusing to assist them with their operations, and thwarts Dušan's attempts to disrupt DedSec's operations through a rival hacking group and the FBI.
Eventually, DedSec comes across information about the data manipulation program called "Bellwether", designed by Kenney, and learn that with both this and a new satellite network, designed to bypass undersea data cables, Dušan plans to manipulate world finances and politics, thus creating a monopoly on the entire world's electronic data. To expose this and his corruption, DedSec co-ordinates a massive operation to allow Marcus to infiltrate Blume's San Francisco headquarters, hack their servers, and feed the information of Dušan's crimes to the police. While Dušan is arrested for fraud and Blume is put under investigation, DedSec resolves to continue their fight against the company.
In an extended ending scene added in a post-release patch, two unidentified individuals note that more DedSec cells and hacktivist groups have been emerging worldwide in response to the San Francisco Blume scandal, and that it is time to put their own plans into motion. The filename of the recording seen in the ending is a set of coordinates located in Brixton, London; foreshadowing future events.
Development
At E3 2014, Ubisoft executive Tony Key claimed they were satisfied with the sales of the first game, and that the brand would be turned into a long-running franchise. According to creative director Jonathan Morin, the first game's main goal was to establish the Watch Dogs brand. It was intended that they take risks with the sequel, instead of creating a more polished version of the previous game. To improve the game, Morin and his team read the reviews of the first game, and visited NeoGAF and various forums to study player feedback. Their priorities included creating a "believable" environment, giving players more freedom, and introducing a new leading character, whose personality would be completely different from that of the protagonist of the first game, Aiden Pearce. The primary developer Ubisoft Montreal worked with other subsidiaries Ubisoft Toronto, Ubisoft Paris, Ubisoft Bucharest, Ubisoft Kyiv, and Ubisoft Reflections to aid in the production. The driving mechanic was completely overhauled to make it more accessible to players, and was developed by Ubisoft Reflections, the developer of Ubisoft's own Driver series. In light of complaints about a graphical downgrade in Watch Dogs from what was seen at E3 2012, Ubisoft assured that Watch Dogs 2 would not suffer the same outcome because, unlike the first installment, it was developed for PlayStation 4 and Xbox One from the start. Another improvement from the first game was a more prominent thematic connection to the narrative. Main operations are structured like story arcs that last up to ninety minutes each, advancing the plot with each completion.
The developer worked with consultant hackers who would validate their scripts, including the use of jargon, and gameplay mechanics in order to ensure the authenticity of the subject matter. The propaganda used by the game's hacker group DedSec was influenced by animated GIF culture, glitch art and comic books from the late 1940s. David Maynor served as a hacking advisor. Content director Thomas Geffroyd, who had twenty years of experience with the hacking community, was tasked to accumulate information from hacktivists – such as author Violet Blue – and then relay it to the team. The game also features references to real life; Project Chanology was fictionalized in the mission "The False Prophets".
Ubisoft Montreal made frequent scouting trips to California to research the setting, and attempted to put most of the local landmarks in that region in the game. For regions that they could not put in the game, the team redesigned these locations and put them back into the game. According to producer Dominic Guay, having realistic and accurate locations featured in the game was essential for the game as they encourage players to explore the open world. Unlike many of Ubisoft's previous open world games, players do not need to climb towers in order to discover locations and missions. Instead, the game is opened up from the start, allowing players to explore the city freely. The game's new progression system, which tasks players to gain followers instead of completing main missions, was another way Ubisoft Montreal hoped to encourage exploration and make the city feel more "free". Watch Dogs 2 had around sixty programmers devoted to its development.
The soundtrack was composed by Hudson Mohawke. Ingrained with a combination of electronic music and hip hop, it was approached from the palette of cult science fiction music. Ubisoft teamed up with Dutch music producer Oliver Heldens to influence the video for his track "Good Life" in the vein of DedSec. For acquiring licensed songs, an agreement was made with Amoeba Music. Mohawke's soundtrack was released separately as DedSec – Watch Dogs 2 (Original Game Soundtrack) via Warp Records.
A sequel to Watch Dogs was rumored since its release but first officialized by publisher Ubisoft through financial reports in February and May 2016, before it was confirmed as a part of the 2016 E3 lineup. A 20-minute online reveal was hosted a couple of days later. On October 27, 2016, Watch Dogs 2 was announced to have been released to manufacturing.
The game engine is upgraded version from Disrupt.
Release
On June 8, 2016, Ubisoft revealed the game would be released on November 15 of that year for Microsoft Windows, PlayStation 4 and Xbox One in six separate editions. In September 2016, it was announced that Watch Dogs 2 would have enhancements on PlayStation 4 Pro. In October 2016, Ubisoft announced that the Windows version was delayed to November 29, 2016 to ensure that the game was well-optimized. It was featured on the front cover of Edge in August. Two weeks from release, Ubisoft and Samsung partnered to bundle a free digital download of Watch Dogs 2 with the purchase of their solid-state disks or curved gaming monitors. Amazon Prime copies were subject to an early release, which revealed issues with the seamless multiplayer. Ubisoft vowed to repair the feature on schedule but on the day of release, the company said it was broken – citing persistent lagging and crashing. Cooperative multiplayer was enabled a week after the game's release. A free trial lasting three hours was released for PlayStation 4 on January 17, 2017; the Xbox One version was downloadable on January 24.
Pre-ordering "The Gold Edition Collector's Edition" included additional content such as weapon skins, vehicles and drones; the "Deluxe Collector's Edition" contains the same, but excluded the season pass. Each of these, as well as the generic "Collector's Edition", contained a physical robot called "Wrench Junior", controlled by a mobile app on a smartphone or tablet computer. The "Gold Edition" came with the same items and season pass, and while the "Deluxe Edition" omitted the inclusion of the season pass, it contained all other additions. The mission "Zodiac Killer" was also exclusive to pre-order purchases. It involves the protagonist Marcus Holloway in chasing a copycat killer emulating the same modus operandi as the Zodiac Killer. Amazon and Twitch Prime members were privy to free content like XP boosts and skin packs. "ScoutXpedition", a PlayStation 4 pre-order bonus mission, became free to download in January 2017.
Downloadable content
Five downloadable content (DLC) packs have been released: the "T-Bone Content Bundle", "Human Conditions", "No Compromise", "Root Access Bundle", and "Psychedelic Pack". As per an exclusivity agreement with Sony Interactive Entertainment, all DLCs for Watch Dogs 2 were timed exclusives for PlayStation 4.
Root Access Bundle (available in December 2016) and Psychedelic Pack (available on launch day) feature a Zodiac Killer mission as well as new outfits, cars, skins, and weapons.
The T-Bone Content Bundle was released for PlayStation 4 on December 22, 2016, and includes a new co-op difficulty setting, "Mayhem", plus the clothes and truck of the original Watch Dogs character Raymond "T-Bone" Kenney.
Human Conditions was released on February 21, 2017 for the PlayStation 4 and on March 23 for the Xbox One and PC, and includes three new stories set in San Francisco's science and medicine industries. The pack also includes new co-op missions featuring a new enemy class called "the Jammer", a technologically savvy enemy capable of jamming all of a player's hacker equipment, making them vulnerable to head-on attacks.
No Compromise was released on April 18, 2017 for PlayStation 4 and was launched on 18 May for Xbox One and Microsoft Windows, featuring a new story mission, outfits and weapons.
Reception
Watch Dogs 2 received "generally favorable" reviews from critics, according to review aggregator Metacritic. Technical issues on consoles were fixed with the Update 1.04 patch. In his review, Destructoids Zack Furniss praised the sequel's tonal shift to a lack of seriousness and stated that its protagonist Marcus Holloway boasted a similar charm and wit. He thought well of the hacking component as it was suggestible to multiple fields of use, and enjoyed its nature of compatibility with a non-lethal approach; in fact, Furniss felt that for this reason firearms could have been excluded entirely. The driving was lauded as an improvement from the first game, yet technical issues like glitches and low frame rates were cited as shortcomings. To Matt Buchholtz, writing for EGM, the game signified "less a hacktivist tale and more a beautiful immersion into the San Francisco Bay". The setting, characters and story were cited as considerable refinements from its predecessor. Buchholtz discerned that the tasks demanded to gain followers were successful in encouraging world exploration. He noted however that – in context of the main character – murder made little sense, which led to increased usage of stealth. Elise Favis at Game Informer both disparaged and praised elements in comparison to those of Watch Dogs. She enjoyed that hacking was prioritized in the gameplay and the new "smoother" driving mechanic, but saw inconsistencies in the protagonist's actions versus his personality and thought supporting characters "too obnoxious and petty to be meaningful companions". Favis also experienced low frame rate capabilities on PlayStation 4.
Aron Garst of Game Revolution stated that Watch Dogs 2 had redressed "nearly every negative aspect of the original", and as such, marked a favorable change in the franchise. IGNs Dan Stapleton liked Marcus Holloway more than Aiden Pearce of the first game, and similarly appreciated the supporting characters of DedSec. Marcus' penchant for moral integrity was a noticeable contradiction for Stapleton, though, in light of the prospect to have him kill innocent people if one so chooses. Therefore, the character's personality was observed as the only preclusion to violence and an axiomatic push toward the stealth approach, which Stapleton insisted was the most accommodating of available tools. Writing for Polygon, Philip Kollar saw that Watch Dogs 2 could appeal to those able to connect with "being young, angry at the system and certain that you know what's best for the world". Its tongue-in-cheek demeanor was said to naturally coincide with the hacker culture and open world genre. San Francisco – the spaces of which were described as "cleverly designed" – never felt overwhelming in size to Kollar but inspired joy as he took advantage of the immediate ability to explore it entirely. His complaints concerned firearms; their use was considered "a complete failure of imagination" and unbelievable from the members of DedSec — "an Anonymous-esque group of peaceful hacktivists". Alice Bell of VideoGamer.com wrote in her verdict, "Watch Dogs 2 is missing a bit of refinement, and has had issues with multiplayer, but joining DedSec is still a riot and a half. It's high energy fun with engaging characters, and you can make an entire city your playground".
Sales
In November 2016, Ubisoft revealed that the game's pre-orders were disappointing for the company. Due to this, Ubisoft took a more conservative approach and reduced the sales projection for the second half of its fiscal year 2017. However, CEO Yves Guillemot was confident that the game would not be a commercial failure, and compared the game to Far Cry 3, a commercially successful game with low pre-order sales. He believed that reviews would have a great impact to the game sales due to consumers' "wait-and-see" approach. Watch Dogs 2 was the second-best-selling retail video game in the United Kingdom in its week of release, according to Chart-Track, an eighty percent decrease from the sales of the original. In the United States, the game ranked number eight in sales in January 2017. The PlayStation 4 version sold 68,796 copies in Japan. In May 2020, Ubisoft announced in their earnings report that Watch Dogs 2 has sold more than 10 million copies by the end of the 2019–20 fiscal year, which ends in March 2020.
Sequel
A sequel, Watch Dogs: Legion, was teased by Ubisoft via Twitter a week before the official announcement at E3 2019, where the release date was revealed to originally be March 6, 2020, but was pushed back to an October 29 release.
Notes
References
External links
2016 video games
Action-adventure games
Asymmetrical multiplayer video games
Cameras in fiction
Cybernetted society in fiction
Cyberpunk video games
Video games set in 2016
Hacking video games
Open-world video games
Video games about mass surveillance
Multiplayer and single-player video games
Organized crime video games
Parkour video games
PlayStation 4 games
PlayStation 4 Pro enhanced games
Postcyberpunk
Stadia games
Stealth video games
Ubisoft games
Video games developed in Canada
Video games developed in France
Video games developed in Romania
Video games developed in the United Kingdom
Video games featuring black protagonists
Video games set in California
Video games set in San Francisco
Video game sequels
Video games with downloadable content
Windows games
Xbox One games
Video games using Havok |
1932206 | https://en.wikipedia.org/wiki/Paul%20Montgomery | Paul Montgomery | Joseph Paul Montgomery (June 5, 1960 – June 19, 1999 ) was an American entrepreneur and inventor. In the mid 1980s, he was among the first to see the potential of personal computer technology in the field of video production and 3D animation. As Vice President of NewTek and Co-Founder and President of Play, Inc., Montgomery drove the creation of the first widely-successful digital video products, including the Emmy-award-winning Video Toaster and the Snappy Video Snapshot.
In the 1996 book, The Age of Videography, Montgomery was cited as one of the 25 most influential people in the history of videography. Montgomery received a Primetime Emmy award for his personal contributions in creating the Video Toaster. He is listed as an inventor on U.S. patents 6,380,950 and 6,941,517 regarding low-bandwidth television.
Career
Beginnings of desktop video
Although Montgomery started his career in real estate and artist promotion, in the early 1980s he became enamored by technology and personal computers, in particular with the Commodore Amiga. In 1985, the Amiga computer featured graphics, audio and multi-tasking capabilities greater than other personal computers of its time, making it a suitable platform for early 3D animation, video production and audio production products.
Montgomery first came to the fore in the Amiga community as a founder of the First Amiga User Group (FAUG, pronounced "fog") in California's Silicon Valley. FAUG meetings often featured the hardware and software engineers responsible for the creation of the Amiga, since the Amiga Corporation headquarters was in nearby Santa Clara, California. During this time, Montgomery worked for Trip Hawkins at video game pioneer Electronic Arts as product manager. Montgomery later credited Hawkins' experience at Apple with the Steve Jobs-like product and marketing strategy Montgomery used at both NewTek and Play. Montgomery met hardware engineer Brad Carvey in a computer store, and upon viewing a demonstration of inventor Tim Jenison's early Amiga experiments, arranged for Carvey and Jenison to meet.
NewTek
When Electronic Arts decided to focus product development efforts on the Apple IIGS computer rather than the Amiga, Montgomery left and moved to Topeka, Kansas to help Jenison build NewTek. At that time, Jenison, Carvey and others were developing a Video Black Box for the Amiga capable of real-time video effects.
Under Jenison and Montgomery's leadership, this Video Black Box evolved into the Video Toaster. Billed as the "television studio in-a-box", the product combined the traditionally separate, dedicated pieces of traditional video production hardware into a single, relatively inexpensive add-on for the Amiga. It included a real-time video switcher, real-time video effects, luma-keyer, character generator, still store, paint software and the Lightwave 3D animation software. The Video Toaster altered the video production industry by proving a personal computer could make high-quality television visuals at a low price point.
Montgomery brought fellow FAUG members Allen Hastings and Stuart Ferguson to NewTek to create Lightwave. Borrowing a slogan from Apple Inc., NewTek was aggressive in promoting Lightwave as the 3D animation software "for the rest of us". Lightwave was inexpensive and ran on the Amiga personal computer, while its competition at the time was expensive and ran on dedicated Silicon Graphics workstations. Lightwave was used to create animation and special effects for many television and feature films including Babylon 5, Star Trek and Titanic.
The NewTek team was featured in USA Today, Time, Newsweek, Forbes and Fortune as well as being dubbed "revolutionaries" by Tom Brokaw on NBC Nightly News and featured as "the bad boys of video" in Rolling Stone Magazine. In 1993, the National Academy of Television Arts and Sciences awarded Montgomery and the other inventors of the Video Toaster a Primetime Emmy award. That same year, Fortune estimated the privately held company's sales at US$25 million.
Play Inc.
Tensions began to rise at NewTek between Jenison and Montgomery over technical, marketing and personal issues. Commodore's business was failing, the Amiga platform was at risk, and Jenison was slow to accept a new strategy.
In 1994, Montgomery and Jenison split. Montgomery left, taking most of NewTek's programmers and some top marketing staff with him. After several months, the group founded Play Incorporated together with Amiga software leader Digital Creations and video hardware developer Progressive Image Technologies, and focused their efforts on the Microsoft Windows platform.
Play's first product, the Snappy Video Snapshot, was released in April 1995. Snappy was a still-image digitizer which could take video input from a VCR, camcorder, TV or any video source, and capture true-color (24-bit) high-quality digital still images. Snappy was the first mainstream video input device for Windows personal computers, with Play selling over US$25 million of Snappy in its first year. Byte Magazine awarded Snappy its Technical Excellence award in December 1995, stating "Every once in a while, we see a product so impressive, it makes us rethink an entire category. That was certainly the case with Play Inc.'s Snappy."
Play's next consumer-oriented product was Gizmos, a suite of utilities, games and multimedia software for Windows personal computers. PC Magazine said Gizmos was one of the "Best Products of 1998".
Play created Trinity as the next-generation Video Toaster for the Windows personal computer platform. Trinity included real-time 3D video effects, digital component video switcher, chroma-keyer, still and video clip store, character generator, paint system, and non-linear video editor. After several lengthy delays, Trinity shipped in August 1998 to wide critical acclaim. To many in the industry, Trinity became the logical successor to the Video Toaster. Play also acquired 3D animation software developer Electric Image in November 1998. Electric Image animation system was re-launched for both Mac and Windows platforms as Electric Image Universe.
Play also launched 'Play TV', an online network of shows broadcast from Play headquarters, the San Francisco Bay Area and as far away as Revelstoke B.C. and streamed over the Internet. The network was the first live internet TV network and an early precursor to the internet video revolution.
TV Technology called Play Incorporated “one of the industry's most aggressive and innovative developers“. Play folded following Montgomery's death, with many employees, including Kiki Stockhammer returning to NewTek, which by then had redirected its efforts also into the Windows platform.
Management style
Montgomery's enthusiasm for technology and people helped both NewTek and Play develop a passionate customer base, including high-profile celebrity users. Early users of the Video Toaster included Todd Rundgren, Herbie Hancock, Penn and Teller, U2 and Oingo Boingo. Montgomery's leadership and marketing skills helped NewTek and Play obtain major national press attention for its products, including feature stories on NBC Nightly News and an article in Rolling Stone Magazine. He was the self-proclaimed P.T. Barnum of NewTek.
Company culture
NewTek and Play both contained employees passionate about Montgomery and the products they created. Wil Wheaton, who briefly moved to Topeka to work for NewTek, called Montgomery "the soul of NewTek and the soul of Play" in his book Just a Geek. NewTek employees were often spotted roller blading, playing laser tag, video games and working long hours.
Death
June 19, 1999 Montgomery died of heart attack while vacationing in Seattle. Montgomery was survived by his wife, Michele, his parents, and siblings.
References
Businesspeople in software
Businesspeople from California
1999 deaths
1960 births
20th-century American businesspeople |
49840454 | https://en.wikipedia.org/wiki/Troy%20Hunt | Troy Hunt | Troy Adam Hunt is an Australian web security consultant known for public education and outreach on security topics. He created Have I Been Pwned?, a data breach search website that allows users to see if their personal information has been compromised. He has also authored several popular security-related courses on Pluralsight, and regularly presents keynotes and workshops on security topics. He created ASafaWeb, a tool that formerly performed automated security analysis on ASP.NET websites.
Data breaches
As part of his work administering the Have I Been Pwned? (HIBP) website, Hunt has been involved in the publication of 609 data breaches , and journalists cite him as a cybersecurity expert and data-breach expert.
HIBP had recorded more than 5 billion compromised user-accounts. Governments of Australia, United Kingdom and Spain use the service to monitor their official domains. Popular services, such as 1Password, Eve Online, Okta or Kogan have integrated HIBP into their account-verification process.
Gizmodo included HIBP in its October 2018 list of "100 Websites That Shaped the Internet as We Know It".
In August 2015, following the Ashley Madison data breach, Hunt received many emails from Ashley Madison members asking for help. He criticized the company for doing a poor job informing its userbase.
In February 2016 children's toy-maker VTech, who had suffered a major data breach months earlier, updated its terms of service to absolve itself of wrongdoing in the event of future breaches. Hunt, who had added the data from VTech's breach to the databases of Have I Been Pwned?, published a blog post harshly criticizing VTech's new policy, calling it "grossly negligent". He later removed the VTech breach from the database, stating that only two people besides himself had access to the data and wishing to reduce the chance of its spread.
In February 2017 Hunt published details of vulnerabilities in the Internet-connected children's toy, CloudPets, which had allowed access to 820,000 user records as well as 2.2 million audio files belonging to those users.
In November 2017 Hunt testified before the United States House Committee on Energy and Commerce about the impact of data breaches.
Also in November 2017 Hunt joined Report URI, a project (launched in 2015 by Scott Helme) which allows real-time monitoring of CSP and HPKP violations on a website. He planned to bring funding and his expertise to the project.
Education
Hunt is known for his efforts in security education for computer and IT professionals. He has created several dozen courses on Pluralsight, an online education and training website for computer and creative professionals. He is one of the primary course authors for Pluralsight's Ethical Hacking path, a collection of courses designed for the Certified Ethical Hacker certification.
Additionally, Hunt works in education by speaking at technology conferences and running workshops. His primary workshop, titled Hack Yourself First, aims to teach software developers with little security background how to defend their applications by looking at them from an attacker's perspective.
Awards and achievements
2011–present : Microsoft MVP for Developer Security.
2016–present : Microsoft Regional Director.
2018 : AusCERT's Individual Excellence in Information Security award.
2018 : Grand Prix Prize for the Best Overall Security Blog, The European Security Blogger Award.
References
External links
Living people
Computer security specialists
Australian computer specialists
Australian bloggers
1977 births |
512587 | https://en.wikipedia.org/wiki/IDL%20%28programming%20language%29 | IDL (programming language) | IDL, short for Interactive Data Language, is a programming language used for data analysis. It is popular in particular areas of science, such as astronomy, atmospheric physics and medical imaging. IDL shares a common syntax with PV-Wave and originated from the same codebase, though the languages have subsequently diverged in detail. There are also free or costless implementations, such as GNU Data Language (GDL) and Fawlty Language (FL).
Overview
IDL is vectorized, numerical, and interactive, and is commonly used for interactive processing of large amounts of data (including image processing). The syntax includes many constructs from Fortran and some from C.
IDL originated from early VMS Fortran, and its syntax still shows its heritage:
x = findgen(100)/10
y = sin(x)/x
plot,x,y
The function in the above example returns a one-dimensional array of floating point numbers, with values equal to a series of integers starting at 0.
Note that the operation in the second line applies in a vectorized manner to the whole 100-element array created in the first line, analogous to the way general-purpose array programming languages (such as APL, J or K) would do it. This example contains a division by zero; IDL will report an arithmetic overflow, and store a NaN value in the corresponding element of the array (the first one), but the other array elements will be finite. The NaN is excluded from the visualization generated by the command.
As with most other array programming languages, IDL is very fast at doing vector operations (sometimes as fast as a well-coded custom loop in Fortran or C) but quite slow if elements need processing individually. Hence part of the art of using IDL (or any other array programming language, for that matter) for numerically heavy computations is to make use of the built-in vector operations.
History
The predecessor versions of IDL were developed in the 1970s at the Laboratory for Atmospheric and Space Physics (LASP) at the University of Colorado at Boulder. At LASP, David Stern was involved in efforts to allow scientists to test hypotheses without employing programmers to write or modify individual applications. The first program in the evolutionary chain to IDL that Stern developed was named Rufus; it was a simple vector-oriented calculator that ran on the PDP-12. It accepted two-letter codes that specified an arithmetic operation, the input registers to serve as operands, and the destination register. A version of Rufus developed on the PDP-8 was the Mars Mariner Spectrum Editor (MMED). MMED was used by LASP scientists to interpret data from Mariner 7 and Mariner 9. Later, Stern wrote a program named SOL, which also ran on the PDP-8. Unlike its predecessors, it was a true programming language with a FORTRAN-like syntax. SOL was an array-oriented language with some primitive graphics capabilities.
Stern left LASP to found Research Systems Inc. (RSI) in 1977. The first RSI product was IDL for the PDP-11. In this release, the graphics supported by IDL were primarily Tektronix terminals and raster graphics displays. RSI sold its first IDL licenses to NASA's Goddard Space Flight Center and Ball Aerospace & Technologies Corp. in 1979. Two years later RSI released an initial VAX/VMS version of IDL, which was written in VAX MACRO and FORTRAN. It took advantage of the VAX virtual memory and 32-bit address space. The National Center for Atmospheric Research (NCAR), the University of Michigan, the University of Colorado, and the Naval Research Laboratory started to use IDL with this version.
In 1987 RSI shifted development work of IDL to the Unix environment, which required a complete re-write of the code in C rather than a port of the existing version of VAX IDL. Stern and Ali Bahrami rewrote IDL for Unix on the Sun 3, taking advantage of the re-write to extend and improve the language. Subsequently, IDL was further expanded and ported to several variants of Unix, VMS, Linux, Microsoft Windows (1992), and Mac OS (1994).
Widgets were added to IDL in 1992, providing event-driven programming with graphical user interfaces. In 1997 ION (IDL On the Net), a web server-based system, was commercially released. The first version of ENVI, an application for remote sensing multispectral and hyperspectral image analysis written in IDL, was released in 1994. ENVI was created, developed and owned by Better Solutions Consulting, LLC, until it was purchased from BSC in October 2000 by Eastman Kodak coincident with their purchase of RSI. RSI sold, marketed and supported ENVI under the terms of a license agreement with BSC, LLC from 1994 through October 2000. New object and pointer types, and limited object-oriented programming capabilities, were added to IDL in 1997.
IDL has been applied widely in space science, for example in solar physics. The European Space Agency used IDL to process almost all of the pictures of Halley's Comet taken by the Giotto spacecraft. The team repairing the Hubble Space Telescope used IDL to help them diagnose anomalies in the main mirror. In 1995, astronauts on board a Space Shuttle used IDL loaded on a laptop to study ultraviolet radiation. Currently, amongst other applications, IDL is being used for most of the analysis of the SECCHI part of the STEREO mission at NRL, USA, and at the Rutherford Appleton Laboratory, UK.
RSI became a wholly owned subsidiary of ITT Industries in March 2004. As of 15 May 2006, RSI began doing business as ITT Visual Information Solutions. Effective 31 October 2011, as a result of restructuring, that company became Exelis Visual Information Solutions. , IDL is now owned and maintained by Harris Geospatial Solutions.
Features
As a computer language, IDL:
is dynamically typed.
has separate namespaces for variables, functions and procedures, but no namespace hierarchy.
was originally single threaded but now has many multi-threaded functions and procedures.
has all function arguments passed by reference; but see "problems", below.
has named parameters called keywords which are passed by reference.
provides named parameter inheritance in nested routine calls, by reference or value.
does not require variables to be predeclared.
provides COMMON block declarations and system variables to share global values among routines.
provides a basic form of object-oriented programming, somewhat similar to Smalltalk, along with operator overloading.
implements a persistent, global heap of pointer and object variables, using reference counting for garbage collection.
compiles to an interpreted, stack-based intermediate p-code (à la Java Virtual Machine).
provides a simple and efficient index slice syntax to extract data from large arrays.
provides various integer sizes, as well as single and double precision floating point real and complex numbers.
provides composite data types such as character strings, homogeneous-type arrays, lists, hash tables, and simple (non-hierarchical) record structures of mixed data types.
Problems
Some of these features, which make IDL very simple to use interactively, also cause difficulties when building large programs. The single namespace is particularly problematic; for example, language updates that include new built-in functions have on occasion invalidated large scientific libraries.
Arrays are passed by reference, and this mechanism is an advertised feature of the language to pass data back out of a subroutine – in contrast, array slices are copied before being passed, so that data modifications do not flow back into array ranges (after the subroutine exits), violating the principle of least surprise.
Many historical irregularities survive from the early heritage of the language, requiring individual workarounds by the programmer. As an example:
Array indexing and subroutine entry can both be carried out with exactly the same syntax (parentheses); this ambiguity, coupled with the single namespace for all variables and subroutines, can cause code to stop working when newly defined subroutines or language extensions conflict with local variable names. IDL programmers can avoid many of these problems by using square brackets for array indexing, thereby avoiding conflicts with function names which use parentheses.
The preceding issue can be alleviated using this compiler option:
COMPILE_OPT STRICTARR
ITT Visual Information Solutions (ITT VIS), the developers of IDL, have taken explicit steps to prevent bytecode compatibility with other environments. Files containing compiled routines use a binary tagged-data-structure format that has not been officially published but has been investigated and documented by users but also contain the following notice as ASCII text embedded within each saved file: "IDL Save/Restore files embody unpublished proprietary information about the IDL program. Reverse engineering of this file is therefore forbidden under the terms of the IDL End User License Agreement (IDL EULA). All IDL users are required to read and agree to the terms of the IDL EULA at the time that they install IDL. Software that reads or writes files in the IDL Save/Restore format must have a license from ITT Visual Information Solutions explicitly granting the right to do so. In this case, the license will be included with the software for your inspection. Please report software that does not have such a license to ITT Visual Information Solutions..." , the statement has not been tested in a court of law.
Also, that provision of the IDL EULA has no effect in Australia, as a result of sections 47D and 47H of that country's Copyright Act.
Examples
The following graphics were created with IDL (source code included):
Image of random data plus trend, with best-fit line and different smoothings
Plots of delta-o-18 against age and depth (from EPICA and Vostok)
coyote IDL gallery examples of IDL imaging
See also
List of numerical-analysis software
ENVI – an image processing software package built in IDL
IRAF – a free, graphical data reduction environment produced by NOAO
MATLAB – a technical computing environment providing similar capabilities to IDL
NumPy – an extension for Python that gives it array math capabilities similar to those of IDL
Perl Data Language (PDL) – An extension to Perl that gives it array math capabilities similar to those of IDL
Scilab - a high-level, numerically oriented programming language designed for Scientific computing and interfaces
Solarsoft – library for solar data analysis and spacecraft operation activities written predominately in IDL
GDL – GNU Data Language, a free implementation similar to IDL.
Fawlty Language – Fawlty Language is an IDL8 (Interactive Data Language) compatible compiler.
References
External links
IDL home page
Coyote's Guide to IDL Programming
The IDL Astronomy User's Library at NASA Goddard
Fawlty Language home page
Array programming languages
Earth sciences graphics software
Numerical programming languages
Plotting software
Programming languages created in 1977 |
52948503 | https://en.wikipedia.org/wiki/TRAME | TRAME | TRAME (TRAnsmission of MEssages) was the name of the second computer network in the world similar to the internet to be used in an electric utility. Like the internet, the base technology was packet switching; it was developed by the electric utility ENHER in Barcelona. It was deployed by the same utility, first in Catalonia and Aragón, Spain, and later in other places. Its development started in 1974 and the first routers, called nodes at that time, were deployed by 1978. The network was in operation until 2016 (38 years) with successive technological software and hardware updates.
Beginnings
In 1974, packet switching was a technology known only in research circles. The concept began in 1968 in association with the United States' Advanced Research Projects Agency (ARPA) research project ARPANET. The idea of applying the packet switching concept to electric utilities control communication networks first appeared in 1974 when the Swedish power utility Vattenfall started to create its TIDAS packet-switching network and was followed by the Spanish electric utility ENHER, which aimed to telecontrol and automate its high-voltage power grid. For this purpose, ENHER created a specific team of people to develop both the packet-switching network and the supervisory control and data acquisition (SCADA) system, also called the telecontrol system. By 1978 the first four TRAME routers were available and by 1980, eight of them were deployed and operating. The printed circuit boards (PCBs) controlling the communication lines were connected to a shared memory PCB allowing them to exchange data and messages. The project was developed together with its main initial application, the Telecontrol or SCADA system SICL () with which initially they shared a very similar hardware. The maximum link capacity was 9600 bit/s, which in 1980 was the maximum possible on a 4 kHz wide voice channel at the time. These channels were the basic unit of the then-analog communication systems in use. By that time power utilities used either telephone calls or low speed (below 1200bit/s) dedicated links for telecontrol, typically shared among ten high-voltage electrical substations.
Services
The basic service provided by the TRAME network was SCADA or Telecontrol to automate the high-voltage power grid, thus improving operational efficiency, which was until then operated manually with telephone communication between human operators. Each TRAME router was associated with one or more remote terminal units (RTUs) of the SICL telecontrol system. It also had connected screens, and later PCs, located in electrical substations to interchange messages between them and with the Control Center located in the well-known in Barcelona. It was a kind of predecessor to today's e-mail. Later, in the 1990s, other protocols (X.25, IP) were developed to include corporate information technology (IT) terminals, company physical surveillance systems and other services. Additionally, applications and terminals were developed for the transmission of voice and video over the TRAME network.
Protocols
The TRAME routing system, like that of the original ARPANET, was based on the Bellman-Ford algorithm but with "split-horizon" as in the Swedish TIDAS network, but with an original improvement. This protocol allows optimal paths to be found in meshed networks for each packet to be transmitted, allowing the shared use of the same network by multiple services. In contrast, traditional circuit-switched technology used to establish dedicated circuits for each service or communication. The addressing of routers and terminals used a proprietary system with a 16-bit address; it would be the equivalent of the well-known IP (Internet Protocol) version 4 (IPv4), still in use on the internet today, which uses 32-bit addresses. It is necessary to take into account that in 1978, the IPv4 protocol did not yet exist since the IPv4 version used on the internet did not appear until 1981, and in fact, did not reach the general public until much later.
The line protocols were also proprietary and were called UCL (, 'line control unit'), which linked the routers together, and UTR (), the access protocol. They were designed to offer the highest quality of service required by the telecontrol/SCADA function in terms of data integrity and availability set by the International Electrotechnical Commission (IEC) IEC-870-5-1 and ANSI C37.1. standards, and because the protocol used at the time in corporate computer networks, HDLC (high-level data link control), did not offer enough quality for critical industrial applications. Later on, other protocols like X.25 and IP were also made compatible with the aforementioned TRAME protocols. In 2000, the UTR protocol was replaced by the international standard IEC 60870- 5-101/104.
Initially network flow control was based on the management of eight data priorities in head-of-the-line (HOL) waiting queues. Later and after some experimentation, a flow control method based on a bit indicating route congestion and management of the gap between packets when accessing the network was adopted. This required measuring the capacity of the route bottleneck. An end-to-end protocol was also added for some flows requiring order preservation like X.25.
Evolution
To last for 38 years, the technology had to endure intense evolution. There were essentially four TRAME generations which are summarized in the table.
A description of the four generations of TRAME is provided below.
TRAME 1
The project began in 1974 and in 1978 a first network with four routers was already installed and in operation at the electric utility ENHER. In 1980, the network had eight nodes in operation (see Figure I). The hardware was based on the Zilog Z80 processor and had a multiprocessor structure with 16 processors sharing a common memory. The software was developed at ENHER's headquarters located in the well-known Casa Fuster, , 132, Barcelona, using the Z80 assembly language. Beyond 1980 the software began to be written in C programming language and an HP64000 Logic Development System emulator was used for the purpose. The hardware was produced by ISEL, an INI () company.
The routing system was a variant of Bellman-Ford with split-horizon. It was an improvement of the original ARPA network routing system consisting of an original update procedure which allowed for a faster reaction to changes. The distance function was the number of packets in the output waiting queues plus one.
The line protocols (UCL for internal lines linking routers and UTR for accessing the network) were designed to meet the stringent requirements set for telecontrol (SCADA) of high-voltage power networks (IEC-870-5-1 and ANSI C37.1 standards).
At the OSI transport layer, windows with a width of 1 to 8, depending on the required service, residing in the terminals were used.
Initially, addresses were only 14 bits long to address both the routers (called nodes by then) and the devices connected to them. They were made up of two fields, an 8-bit field to address the router and a 6-bit sub-address to address the terminals connected to it. The node address was assigned to the nodes and not to the ends of the links as in the internet.
The basic advantages of TRAME over other technologies used in electric utilities at the time were in part due to the packet technology itself: ability to manage any network topology, automatic adaptability to topological and traffic changes, integration of different link technologies (digital or analog) and capacities in a single network, open and decentralized intercommunicability between users and devices, simultaneous communication with several users and locations from a single physical connection, and integrated network supervision. In fact, the network was provided from its inception with a supervision center consisting of a computer and a synoptic board located at the company's headquarters (see Figure II).
But other advantages were due to the specific design of TRAME: high data integrity, priority support for packets, and ease of including special protocols such as the many SCADA protocols in use at that time. All of the above resulted in improved quality of service, especially with respect to data availability and data integrity, and in the integration of services in a single network. Part of the evolution of its deployment can be seen in Figures II to IV.
TRAME 2
In 1990, TRAME 2 was fully deployed and TRAME 1 was replaced. The processor of the new hardware was Intel 80286 and the hardware structure and external appearance of the routers was very similar to that of TRAME 1. The software was written in C and the above-mentioned emulator continued to be used.
Improvements over TRAME 1 were the introduction of the standardized X.25 access protocol to enable the connection of corporate terminals to the network, the ability to handle the 64kbit/s of the new digital lines, increased switching capacity, and the introduction of an end-to-end protocol to avoid packet loss and clutter as required by X.25.
An important improvement was the possibility of using dual homing to increase terminal availability; they could be connected to the network by two access points. For the purpose, the terminals had two addresses, a primary and a secondary one.
Regarding addressing, in 1991 two bits were added to the addressing to indicate the network. The address space was thus increased to 16 bits and, in this way, up to four networks could be freely meshed as in a single one. This addressing scheme was maintained in subsequent versions of TRAME.
TRAME 3
The hardware was again a multiprocessor structure with 16 processors sharing a common memory but the latter was not a separate PCB but instead was distributed among the 16 PCBs to avoid single points of failure.
The interconnection of PCBs was done with a shared 40Mbit/s capacity multimaster bus designed and manufactured by DIMAT, S.A.. It also included a serial channel for maintenance, monitoring, reprogramming and resetting of the different modules through a terminal connected to them.
The software was developed by ENHER in collaboration with DIMAT, S.A..
The routing algorithm remained the same, but the distance function was changed to a less dynamic one. A flow control procedure based route congestion metering and backwards indication to the source was introduced.
Improvements over TRAME2 were IPv4 support, the introduction of an SNMP monitoring agent, a new flow control system, an improved distance metric that made the system less dynamic, and an autoexec task to periodically check hardware and software.
TRAME+
The hardware design was radically modified by moving to a single processor per node architecture as opposed to the traditional TRAME hardware. It had two alternative base modules of different capacity based on Intel i960CA and i960RM processors with a 1Gbit/s bus to communicate the different router boards. The number of physical interfaces was only ten (eight serial + two Ethernet (10B2 or 10BT)) since Ethernet allowed for the connection of several devices on a single LAN. It also had a front service serial channel.
By losing redundancy (a single processor per router) the node lost some availability over previous versions of TRAME. This was done for economical reasons stemming from the fact that the network was being extended to smaller substations where cost constraints are higher. Dual homing could help in places with more stringent availability requirements.
Improvements over TRAME 3 were the ability to handle 2Mbit/s capacity links, smaller and less expensive routers, access by Ethernet and standard protocols, and the change from the proprietary UTR protocol to the internationally standardized ones for SCADA systems (IEC 60870-5-101 and IEC 60870-5-104) with an original adaptation to packet-switched networks.
References
External links
Video introducing TRAME 1
Computer networks |
620709 | https://en.wikipedia.org/wiki/List%20of%20Linux%20distributions | List of Linux distributions | This page provides general information about notable Linux distributions in the form of a categorized list. Distributions are organized into sections by the major distribution or package management system they are based on.
RPM-based
Red Hat Linux and SUSE Linux were the original major distributions that used the .rpm file format, which today is used in several package management systems. Both of these were later divided into commercial and community-supported distributions. Red Hat Linux was divided into a community-supported but Red Hat-sponsored distribution named Fedora, and a commercially supported distribution called Red Hat Enterprise Linux, whereas SUSE was divided into openSUSE and SUSE Linux Enterprise
CentOS/RHEL-based
Fedora-based
Fedora is a community supported distribution. It aims to provide the latest software while maintaining a completely Free Software system.
openSUSE-based
urpmi-based
apt-rpm based
Independent RPM distributions
Distributions using .rpm packages, excluding derivatives of zypp, Fedora, urpmi, and apt-rpm.
DEB-based
Debian Linux is a distribution that emphasizes free software. It supports many hardware platforms. Debian and distributions based on it use the .deb package format and the dpkg package manager and its frontends (such as apt or synaptic).
Debian-based
Debian-based (security-oriented)
MEPIS-based
Knoppix-based
Knoppix, itself, is based on Debian. It is a live distribution, with automated hardware configuration and a wide choice of software, which is decompressed as it loads from the drive.
Ubuntu-based
Ubuntu is a distribution based on Debian, designed to have regular releases, a consistent user experience and commercial support on both desktops and servers.
Official distributions
These Ubuntu variants simply install a set of packages different from the original Ubuntu, but since they draw additional packages and updates from the same repositories as Ubuntu, all of the same software is available for each of them.
Discontinued official distributions
Third-party distributions
Unofficial variants and derivatives are not controlled or guided by Canonical Ltd. and generally have different goals in mind.
Arch-based
Pacman is a package manager that is capable of resolving dependencies and automatically downloading and installing all necessary packages. It is primarily developed and used by Arch Linux and its derivatives.
Gentoo-based
Gentoo is a distribution designed to have highly optimized and frequently updated software. Distributions based on Gentoo use the Portage package management system with emerge or one of the alternative package managers.
Slackware-based
Slax-based
Source based
Rollback
Mobile device
Router
Embedded systems
Minimalistic
Historical
Security-oriented
Entertainment
Not categorized
The following distributions have not been categorized under the preceding sections.
See also
Comparison of Linux distributions
Comparison of netbook-oriented Linux distributions
DistroWatch
Linux on PowerPC
Linux on IBM Z
List of live CDs
List of router or firewall distributions
References
External links
Linux free distros (Free Software Foundation)
Repository tracking
The LWN.net Linux Distribution List – Categorized list with information about each entry.
Distrowatch – Announcements, information, links and popularity ranking for many Linux distributions.
Linux Distros – Information and ISO files for many oldest Linux distributions.
Linux Distributions |
46889261 | https://en.wikipedia.org/wiki/Total%20War%3A%20Warhammer | Total War: Warhammer | Total War: Warhammer is a turn-based strategy and real-time tactics video game developed by Creative Assembly and published by Sega for Microsoft Windows via the Steam gaming platform. The game was brought to macOS and Linux by Feral Interactive. The game features the gameplay of the Total War series with factions of Games Workshop's Warhammer Fantasy series; it is the first Total War game not to portray a historical setting. It is the 10th title in the Total War series and the first title to be released in the Total War: Warhammer trilogy.
Like previous titles in the Total War series, gameplay unfolds both on a scale of kingdoms in a turn-based strategy campaign, managing cities and the movement of armies, and on a smaller scale in real-time tactics skirmishes and sieges, managing the movement and actions of individual units and characters within an army during a battle. The player controls one of several fantasy factions, each with their own units, characters and abilities. These include Dwarfs, Human factions, Greenskins and Vampire Counts at launch, with more added as paid downloadable content.
Total War: Warhammer was largely well received by critics, and sold over half a million copies in its first few days on sale. Total War: Warhammer has two sequels: Total War: Warhammer II (released September 2017) and Total War: Warhammer III (released February 2022).
Gameplay
Total War: Warhammer is a turn-based strategy game with real-time tactical battles between armies. While previous Total War games feature historical settings, Warhammer introduces the fantasy setting as well as characters from the Warhammer universe. These characters, which include monsters, warriors, and heroes, are controlled by the player or computer.
The game begins with the ascension of Karl Franz as the newly elected Emperor of the Empire and the recent turmoil that has occurred with a civil war uprising and the counts of the empire resenting his rule. His task is to unite his fractured kingdom and assert his dominion before challenging the other realms surrounding them and bring peace to the Old World. This peace is challenged by the eternal grudge of the Dwarfs towards the savage Greenskins, and the Vampires ruled by the Von Carsteins in far-flung Sylvania attempting to lead an undead army west and seize the Imperial throne. Yet in the north the Chaos horde rides and seeks to destroy everything in its path corrupting all that stands in its way of domination.
Total War: Warhammer featured four playable factions at launch, including the Empire (humans), the Greenskins (orcs and goblins), the Dwarfs and the Vampire Counts (undead). The Chaos faction, made up of evil humans and monsters, was available for free to those who pre-ordered or purchased in the first week of release and subsequently available as downloadable content (DLC). The Bretonnians, another human faction, are available since February 2017 for the Campaign, Skirmish and Multiplayer. Each faction has access to their own unique units and a campaign element, a new feature for Total War. For instance, the Greenskins faction featuring units such as Trolls and Giants, has the "Waaagh!" system, which pushes the player to always be on the warpath.
The campaign map is similar to that featured in Total War: Attila, the primary difference being the bigger changes in physical terrain and climate as one moves from a particular point in the map to another. The campaign map spans from the Chaos wastes in the north to the Greenskin-infested badlands in the south and from the Great Ocean in the west to the Dwarven realms in the World's Edge mountains to the east.
While Total War: Warhammer is built around the Total War system of city and unit building, army manoeuvring and diplomacy with other factions, it has numerous new elements that differ from previous Total War games. In addition to those already mentioned, they include the ability of agents to participate in battles to give your army an edge; a wider variety of animations, with 30 different types of skeleton and body types compared to only five or six previously; flying units such as dragons, which make use of the new animation capacity; corruption is now caused by the presence of Vampire Counts or Chaos armies, rather than internal factors; the renaming of Generals as Lords - they now fight as individuals rather than embedded within a bodyguard unit, and can be upgraded via skill and equipment trees to boost both their own and their army's power; and the addition of a quest mode which tasks players to complete missions and battles to receive unlockable items and abilities. One of the most significant new elements, however, is magic. Different factions have different amounts of access to the various "lores" (types) of magic, with some, such as the Dwarfs, having no access whatsoever. Units with access to magic can turn the tide of battles - their abilities are far more powerful than any available to battlefield units in previous games.
Development
In December 2012, publisher Sega announced a partnership with Games Workshop to develop multiple titles for the Warhammer series. Sega tasked The Creative Assembly, the creator of the Total War series, to develop the titles. The first game in the series was set to be released "beyond 2013". At the time of the announcement, Creative Assembly had five titles in development, which included 2013's Total War: Rome II and 2014's Alien: Isolation. On January 13, 2015, the game was leaked through an artbook called The Art of Total War. The game was teased in a video released by The Creative Assembly to celebrate its 15th anniversary. However, the game was not officially announced until April 22, 2015, in which Sega released a cinematic debut trailer for the game. Total War: Warhammer is set to be the first title in a trilogy, with expansions and standalone titles to be released in the future. Total War: Warhammer was due to be released for Microsoft Windows on April 28, 2016. However, on March 3, 2016, Creative Assembly announced that the game was delayed to May 24, 2016. The Linux version was released by Feral Interactive on 22 November 2016 with the macOS version following on 18 April 2017.
Downloadable content
The Chaos Warriors downloadable content (DLC) was the first DLC to be released for Total War: Warhammer; it was made available to purchase alongside its initial release and was included for those who preordered the game. This was widely criticized by the gaming community and from Warhammer fans in particular, with Creative Assembly, the developer of the game, stating they were "disheartened" by the reaction. On April 29, 2016, it was announced that the Chaos Warriors DLC would be available for free for a week after its release.
In May 2016, Creative Assembly announced that mods and Steam Workshop's features would be supported. Creative Assembly have developed several mods that were released alongside the game, while players can create their own mods through official mod tools. On September 26, 2018 an expanded limited edition version of the game titled Total War: Warhammer: Dark Gods Edition was announced on the official site which included Warriors of Chaos, Bretonnia, and Norsca along with the four core races. On July 30, 2020 a second expanded limited edition called Total War: Warhammer: Savage Edition was announced which included Warriors of Chaos again as well as the Beastmen, not including its DLC that tied into the Wood Elves race pack.
Reception
Total War: Warhammer had generally favourable reviews from critics. It has a score of 87/100 on Metacritic. IGN awarded it a score of 8.6 out of 10, saying "Total War: Warhammer brims with exciting ideas, awesome characters, and delightful units and faction mechanics." GameSpot awarded it a score of 9.0 out of 10, saying "It's a triumph of real-time strategy design, and the best the Total War series has ever been." PC Gamer awarded it a score of 86%, saying "If you find real history a bit bland compared to glorious nonsense made up by strange British people then Warhammer is the Total War for you." Game Informer awarded it a score of 8.75 out of 10, saying "the series has never felt so fun...Total War: Warhammer is one of the best Total War games I've ever played." The Guardian awarded it a score of four out of five stars, saying "Total War: Warhammer has done the best it can do with the legacy Total War engine, and is also a loving tribute to Warhammer."
Total War: Warhammer was also the fastest-selling Total War game, selling half a million copies in the first few days on sale. As a promotional contest for the multiplayer online battle arena game Dota 2, Warhammer-themed community created cosmetics for playable characters in that game were released in September 2016.
Sequels
Total War: Warhammer was designed to be split into three parts, the initial game being the first episode.
A sequel called Total War: Warhammer II was released on September 28, 2017. This game contained a massive combined campaign map, accessible to players who owned both this and the previous game.
The third game Total War: Warhammer III was announced in February 2021, for a release in 2021. Once again, the game will contain a combined campaign map, accessible to players who own all 3 games.
References
External links
2016 video games
Creative Assembly games
Crossover video games
Linux games
MacOS games
Multiplayer and single-player video games
Real-time tactics video games
Sega video games
Video games with Steam Workshop support
Total War (video game series)
Turn-based strategy video games
Video games developed in the United Kingdom
Video games with downloadable content
Warhammer Fantasy video games
Windows games
Grand strategy video games |
56504292 | https://en.wikipedia.org/wiki/Spanish%20Cybersecurity%20Research%20Conference | Spanish Cybersecurity Research Conference | The Spanish Cybersecurity Research Conference (Spanish: Jornadas Nacionales de Investigación en Ciberseguridad (JNIC)), is a scientific congress that works as a meeting point where different actors working in the field of cybersecurity research (universities, technological and research centres, companies and public authorities) can exchange knowledge and experience with the shared goal of strengthening research in the Cybersecurity field at the national level.
Goals
The need to run these kind of conferences was identified during the drafting of the Summary report of the feasibility study and design of a network of centers of excellence in R&D in cybersecurity, with the consensus of participants.
The strategic plan of the Spanish Network of Excellence on Cybersecurity Research included on its measure #17, the creation of national cybsersecurity R&D+i conferences, intended to be the scientific meeting point in which both the Network of Excellence in particular and the research ecosystem in general could demonstrate their capacities, both in terms of knowledge and talent and in terms of research findings and their potential for transference to market.
Equally, the measure #12 of the same study, proposed the design of an open call for proposals with mechanisms to evaluate and select candidates in order to grant awards and acknowledgement for research excellence.
Organizers
Each edition of the conferences is organised by the institution selected according to the procedure laid out in the regulation of the JNIC.
An organising committee is named based on the regulations established for the JNIC, with the General chair of the committee being the representative from the organising institution who is responsible for the event.
The Spanish National Cybersecurity Institute (INCIBE) in its mission to support research in cybersecurity for strengthening the cybersecurity sector, collaborates in the organization of this conference.
Technology Transfer Program
With the aim of converting the JNIC into a scientific forum of excellence in national cybersecurity field that promotes the innovation, for the first time in the 2017 edition, a complete Technological Transfer Program has been designed, that is an instrument to bring final users (companies, organisms, etc.) in contact with researchers in order to solve cybersecurity problems that are currently unresolved, formulated as scientific challenges.
After the good reception and the success of participation in this new initiative by challengers and research teams, the initiative has been running for several years now, helping to promote technology transfer. In addition, in 2021 some changes have been implemented to become a programme co-funded by INCIBE in which the period dedicated to research is also increased.
Current edition
JNIC 2022, will be held in Bilbao in June 2022 and organized by Tecnalia.
Past Editions
JNIC2015, held in León on 14, 15 and 16 September 2015 and organized by Universidad de León.
JNIC2016 held in Granada, on 15, 16 y 17 June 2016 and organized by Universidad de Granada.
JNIC2017, held in Madrid, on 31 May, 1 and 2 June 2017 and organized by Universidad Rey Juan Carlos.
JNIC2018, held in San Sebastián, on 13, 14 and 15 June 2018 and organized by Universidad de Mondragón.
JNIC2019, held in Cáceres, Spain, on 5, 6 and 6 June 2019 and organized by University of Extremadura, COMPUTAEX Foundation and Complutense University of Madrid.
JNIC2020, postponed to 2021 as a result of the situation generated by the coronavirus pandemic (COVID-19).
JNIC 2021 LIVE, held online on 9 and 10 of June 2021 and organized by University of Castilla–La Mancha.
References
Computer security
Computer science conferences
International conferences in Spain |
1375557 | https://en.wikipedia.org/wiki/Wacom | Wacom | () is a Japanese company headquartered in Kazo, Saitama, Japan, that specializes in graphics tablets and related products. The meaning of the company name, "Wacom", was derived by changing the English name WORLD COMPUTER with "WA," which means "harmony"in Japanese. The name was created to express the goal of attaining harmony between people and computers.
Headquarters locations
The American headquarters are located in the Pearl District of Portland, Oregon,
Functionality
Wacom tablet functionality was used in the screen of the Compaq Concerto computer in 1992, making it an early tablet computer. In 1991, Wacom chips were used in the Samsung Penmaster tablet computer which was also sold as the GridPad SL by Grid Systems. The Penmaster had an early precursor to Samsung's S Pen, known today for its inclusion in the Galaxy Note line of phones, which also use Wacom's technology to power the S Pen, since its conception with the Galaxy Note line of phones in 2011.
Product lines
Intuos
2018 models feature 1024 levels of pressure sensitivity and a resolution of 2540 lines per inch (1000 lines/cm). Each of the models have a 5.8 × 3.6 in (14.7 × 9.2 cm) active surface area, a weight of 290 ±50g, and 4 control buttons.
In the Americas and Europe, four models are available in 2018: Intuos Draw, Intuos Art, Intuos Photo, and Intuos Comic.
Accessories
Wacom's Wireless Accessory Kit is a USB dongle and adapter which allows all Intuos tablet Models connect to a computer wirelessly. This kit is compatible with certain models. It did not work with the 2011 Bamboo Splash, Bamboo Connect or Bamboo Pen models.
Drivers
The Linux Wacom Project produced drivers for Linux/X11. According to Peter Hutterer in his XDC2016 talk, Wacom has 3 Linux kernel developers (Ping Cheng, Jason Gerecke and Aaron Skomra) working full-time on Linux support.
Durability
Several Wacom models, including the Intuos4 and Bamboo, were criticized for the drawing surface's roughness, which caused the small pressure-sensitive 'nib' to wear down, and become slanted or scratchy in the same way as pencil lead, albeit more slowly. This could also cause the surface to become smoother where it is used more, resulting in uneven slick and non-slick areas. As the nibs were only short lengths of plastic, it was possible for a user wanting a more durable nib to improvise a replacement from a short length of nylon 'wire' (approx 0.065 inches or 1.7mm diameter) like that found in grass trimmer or 'weed-eater' refills, suitably straightened by hand and smoothed (rounded off) at one end with abrasive paper. Additionally, a thin sheet of glass or acetate can be placed over the drawing surface to avert surface or nib damage in the same way as screen protectors are used on phones, although in the case of glass this may induce a—usually modest—parallax error when tracing.
The Intuos4 surface sheet was revised in October 2010 to reduce nib wear. Wacom Europe sells a bundle that includes the revised surface sheet and replacement nibs at a reduced price for installation in existing Intuos4 tablets.
Drivers
ThinkyHead Software published the free TabletMagic driver package. TabletMagic is a driver for discontinued serial-port Wacom tablets for use on modern Apple Macintosh computers under the Mac OS X operating system. A USB-to-serial port adapter is required. (OS X open source drivers for many such adapters are available from Source Forge.)
Technology
Wacom tablets use patented electromagnetic resonance technology called "Electro Magnetic Resonance" ("EMR").
Their technology built into laptops with capatitative touchscreens is called AES, "Active ElectroStatic". It comes, as of 2021, in two versions. AES1 offers 2048 levels of sensitivity, but is criticized for wobbly diagonal lines. AES2 is supported by Bluetooth and doubles pressure sensitivity to 4096 levels, adds tilt sensitivity and allows for more precise drawings.
References
External links
(in English)
Japanese companies established in 1983
Companies based in Portland, Oregon
Companies based in Saitama Prefecture
Companies listed on the Tokyo Stock Exchange
Computer companies established in 1983
Computer companies of Japan
Display technology companies
Japanese brands
Multinational companies headquartered in Japan |
1467265 | https://en.wikipedia.org/wiki/Meanings%20of%20minor%20planet%20names%3A%2010001%E2%80%9311000 | Meanings of minor planet names: 10001–11000 |
10001–10100
|-
| 10001 Palermo || || The city of Palermo, Italy, where the Palermo Observatory located, at which Giuseppe Piazzi discovered 1 Ceres in 1801 (see naming for and ) ||
|-id=002
| 10002 Bagdasarian || || Aleksandr Sergeevich Bagdasaryan (born 1946), a radio and electronics engineer and director of a Moscow-based research corporation ||
|-id=003
| 10003 Caryhuang || || Cary K. Huang (born 1997) is an animator and educator, known for his variety of animated web shows, coding projects, and data visualization videos. He and his twin brother created the popular online interactive size comparison tool "The Scale of the Universe" in 2010. ||
|-id=004
| 10004 Igormakarov || || Igor' Mikhajlovich Makarov (born 1927) is known for his research on nonlinear and adaptive systems, artificial intelligence and the choice and acceptance of decisions. He was chief scientific secretary of the Russian Academy of Sciences during 1988–1996. ||
|-id=005
| 10005 Chernega || || Nikolaj Akimovich Chernega (born 1923), a specialist in astrometry and the compilation of catalogues of highly precise stellar coordinates. ||
|-id=006
| 10006 Sessai || || Nishiyama Sessai (1735–1798), a Confucian scholar in the Edo period, born at Kamogata, Okayama prefecture. ||
|-id=007
| 10007 Malytheatre || || Maly Theatre, Moscow (a.k.a. Ostrovsky's house and "The Second Moscow University"), the oldest Russian theater (founded in 1756) ||
|-id=008
| 10008 Raisanyo || || Rai San'yō (1780–1832), a Confucian scholar in the Edo period, born at Takehara, Hiroshima prefecture. ||
|-id=009
| 10009 Hirosetanso || || Hirose Tansō (1782–1856), a Confucian scholar in the Edo period, born at Hita, Oita prefecture. ||
|-id=010
| 10010 Rudruna || || RUDruNa, or Rossijskij Universitet Druzhby Narodov, is the Russian University of Friendship of Nations. ||
|-id=011
| 10011 Avidzba || || Anatolij Mkanovich Avidzba (born 1951), an orchardist and viticulturist. ||
|-id=012
| 10012 Tmutarakania || || Tmutarakania, a Russian principality in the Tamanian peninsula from the tenth to the twelfth centuries. ||
|-id=013
| 10013 Stenholm || || Björn Stenholm, Swedish astronomer at Lund Observatory has for many years worked on outreach activities in astronomy, notably as editor of the Swedish journal Populär Astronomi (IAU). ||
|-id=014
| 10014 Shaim || || Shaim, a town in the Tyumen province of the Russian Federation. In its environs the first oil field in western Siberia was discovered in 1959. ||
|-id=015
| 10015 Valenlebedev || || Valentin Lebedev (born 1942), Russian cosmonaut and author, founder and director of the Scientific Geoinformation Center of the Russian Academy of Sciences ||
|-id=016
| 10016 Yugan || || Yugan is the shortened name of Nefteyugansk, a town in western Siberia that is the center of the drilling operations of Ust'-Balyk and other oil fields. ||
|-id=017
| 10017 Jaotsungi || || Jao Tsung-I, (born 1917), a world-renowned sinologist, painter and calligrapher ||
|-id=018
| 10018 Lykawka || || Patryk Sofia Lykawka (born 1976) is a Brazilian-Italian planetary scientist and dynamicist whose contributions include modeling Edgeworth-Kuiper Belt formation and the dynamical evolution processes of mean motion resonances. ||
|-id=019
| 10019 Wesleyfraser || || Wesley C. Fraser (born 1981) is a researcher at Queen's University Belfast whose studies include the size distribution of Kuiper Belt objects to better constrain their formation. ||
|-id=020
| 10020 Bagenal || || Frances Bagenal (born 1954), a planetary scientist and professor at the University of Colorado, who has been a science team member for the Voyager, Galileo and New Horizons missions. ||
|-id=021
| 10021 Henja || || Karin Henja is a prolific constructor of the Swedish form of crossword puzzles. ||
|-id=022
| 10022 Zubov || || Vladimir Ivanovich Zubov (1930–2000), a Russian mathematician and mechanician. ||
|-id=023
| 10023 Vladifedorov || || Vladimir Dmitrievich Fedorov (born 1933), an outstanding Russian surgeon, scientist and professor. ||
|-id=024
| 10024 Marthahazen || 1980 EB || Martha L. Hazen (born 1931), American astronomer who maintained Harvard's photographic plate archive and edited the Harvard Announcement Cards precursors of IAU's CBATs ||
|-id=025
| 10025 Rauer || || Heike Rauer (born 1961), a German planetary astronomer, is known for her observational work on cometary comae, in particular that of comet C/1995 O1 (Hale-Bopp). She is currently working at the Institute of Space Sensor Technology and Planetary Exploration in Berlin on a project to search for extrasolar planetary systems. ||
|-id=026
| 10026 Sophiexeon || || Sophie Xeon (1986–2021), known as SOPHIE, was a highly influential Scottish singer, songwriter, and producer. Sophie was known as an electronic music pioneer whose futuristic style changed the landscape of pop music in the early 21st century. ||
|-id=027
| 10027 Perozzi || 1981 FL || Ettore Perozzi (born 1957), of Telespazio, Rome, works on solar-system dynamics and on interplanetary mission analysis. He has been involved in the Cassini/Huygens mission and in proposals for missions to comets and minor planets. ||
|-id=028
| 10028 Bonus || || Shelley R. Bonus, American astronomer, creator of the "Janet Planet" and "Space E. Tracy" astronomy shows and lectures, assisted in organizing the photographic glass plate archive of the 1.2-m Schmidt Oschin Telescope at Palomar Observatory ||
|-id=029
| 10029 Hiramperkins || 1981 QF || Hiram Perkins (1833–1924), a professor of mathematics and astronomy at the Ohio Wesleyan University from 1857 to 1907. ||
|-id=030
| 10030 Philkeenan || 1981 QG || Philip Keenan (1908–2000), a professor of astronomy with the Ohio State University at Perkins Observatory from 1946 until his death. ||
|-id=031
| 10031 Vladarnolda || || Vladimir Arnold (born 1937), a Russian mathematician, is an authority on the theories of dynamical systems, functions, differential equations and the mathematical methods of classical mechanics. The name was suggested by V. J. Judovich. ||
|-id=032
| 10032 Hans-Ulrich || || Hans-Ulrich Auster (born 1959) is Head of the Space Magnetometer Laboratory at Braunschweig Technical University, known for research and development of magnetometers aboard multiple spacecraft, including Rosetta's Philae lander. ||
|-id=033
| 10033 Bodewits || || Dennis Bodewits (born 1979) is a research scientist at the University of Maryland who performs observational studies of the activity and evolution of comets and active asteroids using the Swift gamma-ray burst space observatory. ||
|-id=034
| 10034 Birlan || 1981 YG || Mirel Birlan (born 1963), Romanian astronomer at Paris Observatory, began his career in 1991 as an astronomer at the Bucharest Observatory. He has conducted observing campaigns on minor Solar-System bodies and has been involved in groundbased science of Rosetta mission asteroid targets. The name was suggested by M. A. Barucci. ||
|-id=035
| 10035 Davidgheesling || || David Gheesling (1967–2020), of Roswell, GA (USA), was an astronomy and meteorite enthusiast, author, public speaker, and a member of the Board of Director of the International Meteorite Collectors Association. He was a globally-known promoter and hunter of meteorites and his collection, Falling Rocks, is one of the largest in private hands. ||
|-id=036
| 10036 McGaha || 1982 OF || James E. McGaha (born 1946), a Tucson astronomer, lecturer, U.S. Air Force pilot and skeptic, actively promotes science and the refutation of pseudoscience. ||
|-id=037
| 10037 Raypickard || 1984 BQ || Ray Pickard (born 1967), of Bathurst, NSW (Australia), is a teacher, academic, and leading expert on meteorite identification and analysis. He owns and runs Bathurst Observatory in central New South Wales, where he hosts a small museum displaying one of the largest private meteorite collections in the world. ||
|-id=038
| 10038 Tanaro || || Tanaro, longest river of Piedmont, Italy. ||
|-id=039
| 10039 Keet Seel || 1984 LK || Keet Seel, an exceptionally well-preserved prehistoric cliff dwelling located in Tsegi Canyon, in what is now the Navajo National Monument in northern Arizona; the name is apparently from a Navajo phrase "kits'iil" or "kin ts'iil" meaning "houses that have been left behind" (1998 Flagstaff Festival of Science asteroid naming contest winner). The name was suggested by M. T. Gibson. ||
|-id=040
| 10040 Ghillar || 1984 QM || Ghillar Michael Anderson (born 1951), of Goodooga, NSW (Australia), is an Aboriginal elder, Senior Law Man, and leader of the Euahlayi people bordering northern New South Wales and southern Queensland. He has shared in-depth knowledge about Kamilaroi and Euahlayi astronomical knowledge and has published several academic papers on the topic. ||
|-id=041
| 10041 Parkinson || || Bradford Parkinson (born 1935) is an American engineer and inventor who led a team that developed the Global Positioning System with revolutionary tracking technology. The GPS has transformed navigation, recreation, law enforcement and all sciences requiring precise knowledge of location. ||
|-id=042
| 10042 Budstewart || 1985 PL || L. R. ("Bud") Stewart (1903–1979), a cofounder of the Columbus Astronomical Society in 1947 and its first president. ||
|-id=043
| 10043 Janegann || 1985 PN || Jane Gann (1910–1994), a cofounder and first female president of the Columbus Astronomical Society. ||
|-id=044
| 10044 Squyres || 1985 RU || Steven W. Squyres (born 1956), a professor of astronomy at Cornell University. ||
|-id=045
| 10045 Dorarussell || || Dora Oake Russell (1913–1986) was a Canadian writer and educator, who, in 1965, co-founded the St. John's Centre branch of the Royal Astronomical Society of Canada (RASC) in Newfoundland. She was awarded the Queen Elizabeth II Silver Jubilee Medal and the RASC Service Award in 1977, and wrote a weekly column on astronomy in The Evening Telegram. ||
|-id=046
| 10046 Creighton || 1986 JC || James M. Creighton (1856–1946), a pioneering American architect who designed "Old Main" at the University of Arizona ||
|-id=047
| 10047 Davidchapman || || David Chapman (born 1953) is a Canadian amateur astronomer and former oceanographer at the Defence Research and Development Canada, who was honored with the Simon Newcomb Award and the Service award of the Royal Astronomical Society of Canada (RASC) in 1986 and 2015, respectively. ||
|-id=048
| 10048 Grönbech || 1986 TQ || Danish observational astronomer Bent Grönbech (1947–1977) was widely known for the Grönbech-Olsen catalogues of complete Strömgren photometry of southern bright stars and for his research on eclipsing binaries, comets and minor planets. He published 36 scientific papers ||
|-id=049
| 10049 Vorovich || || Izrailevich Vorovich (born 1920), an academician of the Russian Academy of Sciences Iosif. ||
|-id=050
| 10050 Rayman || || Marc D. Rayman (born 1956) has been devoted to the exploration of space since childhood and is exceptionally effective at communicating this topic to the public. At the Jet Propulsion Laboratory he was instrumental in the success of Deep Space 1 as chief mission engineer. ||
|-id=051
| 10051 Albee || || Arden L. Albee (born 1928), a Caltech professor of geology and planetary sciences. ||
|-id=052
| 10052 Nason || || Jymme Curtis (Curt) Nason (born 1953), co-founder of the Royal Astronomical Society of Canada New Brunswick Centre in 2000 ||
|-id=053
| 10053 Noeldetilly || || Rolland Noël de Tilly (1906–1983), long-time leader of the Royal Astronomical Society of Canada, Centre de Montréal ||
|-id=054
| 10054 Solomin || || Yurij Mefodievich Solomin (born 1935), People's artist of the U.S.S.R, is a Russian actor who is especially popular for his parts in several Soviet films. ||
|-id=055
| 10055 Silcher || || German composer Friedrich Silcher (1789–1860) ||
|-id=056
| 10056 Johnschroer || || John A. Schroer IV (1956–2014) was a planetarium and space science educator for the Michigan Science Center in Detroit. He was also former president of the Great Lakes Planetarium Association and an avid amateur radio operator. His enthusiasm and love of astronomy opened the universe to school children and the public at large. ||
|-id=057
| 10057 L'Obel || || Matthias de l'Obel (Lobelius, 1538–1616), a Flemish physician and botanist. ||
|-id=058
| 10058 Ikwilliamson || || Isabel K. Williamson (1908–2000), was a Canadian observer of aurora and meteors, who won the Royal Astronomical Society of Canada's Chant Medal in 1948 ||
|-id=059
| 10059 McCullough || || Brian McCullough (born 1953) former president and vice president of the Ottawa Centre branch of the Royal Astronomical Society of Canada (RASC), and an active science communicator at the Canada Science and Technology Museum in Ottawa. ||
|-id=060
| 10060 Amymilne || 1988 GL || Amy Rae Milne (born 1982), a Canadian environmentalist has dedicated herself to creating happiness for others, has led her life with spirit. A love of science and its relationship to understanding and preserving our environment has brought her national recognition. ||
|-id=061
| 10061 Ndolaprata || || Ndola de Jesus Veiga Prata (born 1965), Angolan medical doctor and public health expert and lecturer ||
|-id=062
| 10062 Kimhay || || Kimberley Dawn Hay (born 1959), a North American sketch artist and amateur astronomer, observer of sunspots and meteor showers, and contributor to AMS, AAVSO, ALPO, as well as the RASC. ||
|-id=063
| 10063 Erinleeryan || || Erin Lee Ryan (born 1981) is a research scientist with the SETI Institute whose work includes spectral and lightcurve observations of the Hilda asteroids. ||
|-id=064
| 10064 Hirosetamotsu || 1988 UO || Tamotsu Hirose (born 1931) is known as an astronomical leader throughout the four prefectures of the island of Shikoku. He began observing sunspots with a heliostat in 1949, after which he built his own private observatory for the continuous observation of sunspots, a major contribution to astronomy ||
|-id=065
| 10065 Greglisk || 1988 XK || Greg Lisk (born 1963) Canadian amateur astronomer and president and organizer at RASC's Belleville Centre. In 2014, he was honored with the RASC Service Award (Src). ||
|-id=066
| 10066 Pihack || || Brian Pihack (born 1956), a Canadian chiropractor, amateur astronomer and president at RASC's Niagara Centre, where he has been giving astronomy lectures to the public of southern Ontario. ||
|-id=067
| 10067 Bertuch || || Friedrich Justin Bertuch (1747–1822), a German author, bookseller and successful liberal employer. ||
|-id=068
| 10068 Dodoens || || Rembertus Dodonaeus (1516–1585), a Flemish physician and botanist. ||
|-id=069
| 10069 Fontenelle || || Bernard Le Bovier, sieur de Fontenelle (1657–1757), well known for his famous work Entretiens sur la pluralité des mondes (1686). ||
|-id=070
| 10070 Liuzongli || || Liu Zongli (born 1937), a professor of astronomy and astronomer at Beijing National Observatory. ||
|-id=071
| 10071 Paraguay || || Paraguay, a South American country bordered by Bolivia, Brazil and Argentina. ||
|-id=072
| 10072 Uruguay || || Uruguay, a country in the south eastern region of South America, bordered on the east by the Atlantic Ocean. ||
|-id=073
| 10073 Peterhiscocks || || Peter Hiscocks (1945–2018) was a Candadian amateur astronomer and electrical engineer at Ryerson University, Toronto, and an expert in light pollution abatement at RASC's Toronto Centre. ||
|-id=074
| 10074 Van den Berghe || || Frits Van den Berghe (1883–1939), a Belgian painter, considered a master of Flemish Expressionism. ||
|-id=075
| 10075 Campeche || || The Bay of Campeche is surrounded by the Mexican states of Campeche, Tabasco and Veracrux. ||
|-id=076
| 10076 Rogerhill || 1989 PK || Roger Hill (born 1955), 6 time past president, newsletter editor for 12 years and member of the RASC's Hamilton Centre for over 50 years. ||
|-id=077
| 10077 Raykoenig || || Raymond Koenig (1930–2007) was a Canadian physicist and astronomer, and a founding member of the RASC's Kitchener-Waterloo Centre. ||
|-id=078
| 10078 Stanthorpe || || Stanthorpe, Queensland's wine capital, Australia ||
|-id=079
| 10079 Meunier || || Constantin Meunier (1831–1905), a Belgian sculptor and painter. ||
|-id=080
| 10080 Macevans || || William MacDonald Evans (born 1942), a Canadian electrical engineer and former president of the Canadian Space Agency (1994–2001), recipient of NASA's Distinguished Public Service Medal, and a Member of the Order of Canada. He was born in Sarnia, Canada, completed his undergraduate studies at Queen's University, and received his Master of Science from the University of Birmingham. ||
|-id=081
| 10081 Dantaylor || || Daniel Taylor (born 1958) a Canadian amateur astronomer from Ontario, and former president of RASC's Windsor Centre, who is active in the abatement of light pollution on a national level. ||
|-id=082
| 10082 Bronson || || Ted Arthur Bronson (born 1952), a Canadian amateur astronomer and former president of RASC's Thunder Bay Centre. In 2006, he received a RASC Service Award. ||
|-id=083
| 10083 Gordonanderson || || Gordon "Jay" Anderson (born 1947), a former meteorologist, eclipsophile, and author, who served as Editor of the Journal of the Royal Astronomical Society of Canada for 10 years. ||
|-id=084
| 10084 Rossparker || || Ross Parker (born 1959), a Canadian amateur astronomer and historian, who is a member of RASC's Regina Centre. ||
|-id=085
| 10085 Jekennedy || || John Edward Kennedy (1916–1999), a Canadian physicist who was a charter member of the Canadian Astronomical Society (CASCA). ||
|-id=086
| 10086 McCurdy || 1990 SZ || Bruce Jefferson McCurdy (born 1955) a Canadian amateur astronomer in Edmonton, who was honored with the 2007 Service Award of the Royal Astronomical Society of Canada (RASC) for his contributions to community outreach and his publications. ||
|-id=087
| 10087 Dechesne || || Roland George Dechesne (born 1960), a Canadian amateur astronomer, former president of the Ottawa Centre branch of the Royal Astronomical Society of Canada (RASC), organizer of the "Barbecue Under the Stars" event in Calgary, and a leading member of RASC's Light Pollution Abatement Committee, who was honored with the Fellowship of the Royal Astronomical Society of Canada in 2021 for his lifetime of service to the Society. ||
|-id=088
| 10088 Digne || || Digne, a town in southern France ||
|-id=089
| 10089 Turgot || || Anne Robert Jacques Turgot (1727–1781), a French economist. ||
|-id=090
| 10090 Sikorsky || || Igor Sikorsky (1889–1972), an aircraft designer. ||
|-id=091
| 10091 Bandaisan || || Mount Bandai, Japanese active volcano in Fukushima prefecture ||
|-id=092
| 10092 Sasaki || || Katsuhiro Sasaki (born 1941), the director of the Department of Science and Engineering, National Science Museum, Tokyo. ||
|-id=093
| 10093 Diesel || || Rudolf Diesel (1858–1913), a German thermal engineer and inventor of the diesel engine. ||
|-id=094
| 10094 Eijikato || 1991 DK || Eiji Kato (born 1942), together with his wife Naomi, runs a bed and breakfast in Australia and introduces their guests to the wonders of the night sky from their in-house observatory. He also translates comet hunter Seki's webpage into English to reach wider audiences outside Japan. ||
|-id=095
| 10095 Carlloewe || || Carl Loewe (1796–1869), a German composer was an organist and director of the Pomeranian music festivals in Stettin. ||
|-id=096
| 10096 Colleenohare || || Colleen O'Hare (born 1955), member of the Okanagan Centre branch of the Royal Astronomical Society of Canada (RASC), who won the 2012 Qilak Award and the RASC Service Award in 2018. ||
|-id=097
| 10097 Humbroncos || || In memory of the sixteen people killed in the Humboldt Broncos bus crash near Armley, Saskatchewan, Canada, in 2018. ||
|-id=098
| 10098 Jaymiematthews || || Jaymie Matthews (born 1958), a Canadian astrophysicist, asteroseismologist, and a principal investigator for the MOST spacecraft. He is a member of the University of British Columbia and was made an Officer of the Order of Canada. ||
|-id=099
| 10099 Glazebrook || || Karl Glazebrook (born 1965), an astronomer at Johns Hopkins University. ||
|-id=100
| 10100 Bürgel || || Bruno H. Bürgel (1875–1948), a German shoemaker who became one of the best known German popular astronomical writer of his time. ||
|}
10101–10200
|-
| 10101 Fourier || || Joseph Fourier (1768–1830), a French mathematician who exerted a strong influence on mathematical physics through his Théorie analytique de la chaleur (1822), wherein he showed that the conduction of heat in solid bodies may be analyzed in terms of infinite mathematical series, the so-called "Fourier series". In 1798 he accompanied Napoleon to Egypt, where he was engaged, until 1801, in extensive research on Egyptian antiquities. ||
|-id=102
| 10102 Digerhuvud || || Digerhuvud, a place on the island of Gotland, Sweden, where seastacks are most common. ||
|-id=103
| 10103 Jungfrun || || Jungfrun, largest stack on Gotland island, Sweden ||
|-id=104
| 10104 Hoburgsgubben || || Hoburgsgubben is a very characteristic seastack on southern Gotland, Sweden, looking like an old man watching the sea. ||
|-id=105
| 10105 Holmhällar || || Holmhällar a place on the island of Gotland, Sweden, contains an unusual area of seastacks. One of the expeditions from the Uppsala Observatory to the total solar eclipse on 1954 June 30 was based there. ||
|-id=106
| 10106 Lergrav || || Lergrav, a settlement with stacks on the island of Gotland, Sweden. ||
|-id=107
| 10107 Kenny || || Kenneth Robert Steel (1929–), the father of British discoverer Duncan Steel ||
|-id=108
| 10108 Tomlinson || 1992 HM || Ray Tomlinson (1941–2016) an American computer programmer who implemented the first email program on the ARPANET system, the precursor to the Internet, in 1971 ||
|-id=109
| 10109 Sidhu || 1992 KQ || Jaskarn Singh "Sid" Sidhu (born 1938), member of the Victoria Centre branch of the Royal Astronomical Society of Canada (RASC) and a mentor for new members, who received the RASC President's Award in 2010. ||
|-id=111
| 10111 Fresnel || || Augustin-Jean Fresnel (1788–1827), French physicist who constructed the so-called "Fresnel lens", following an original idea by Buffon (1748) of dividing a lens surface into concentric rings. By studying the aberration of light, he removed a number of objections to the wave theory. ||
|-id=114
| 10114 Greifswald || 1992 RZ || Greifswald, the old German Hanse city on the Baltic Sea, is a scientific, economic and cultural center. The Ernst-Moritz-Arndt University, founded around 1456, has an astronomical tradition that has now been revived through the associated Greifswald Observatory. The name was suggested by the first discoverer. ||
|-id=116
| 10116 Robertfranz || || Robert Franz (1815–1892), a German composer ||
|-id=117
| 10117 Tanikawa || 1992 TW || Kiyotaka Tanikawa (born 1944) is an associate professor at the National Astronomical Observatory of Japan who specializes in the study of the three-body problem ||
|-id=119
| 10119 Remarque || || Erich Maria Remarque (1898–1970) German novelist, chiefly known for his Im Westen nichts Neues ("All Quiet on the Western Front", 1929). At 18 he was drafted into the German army and wounded several times. His novel records the daily horrors of war in laconic understatement, in shocking contrast to patriotic rhetoric. In 1933 his books were burnt by the Nazis. ||
|-id=120
| 10120 Ypres || || The Belgian city of Ypres, with Bruges and Ghent, virtually controlled Flanders in the 13th century. During the Middle Ages, it became a major cloth-weaving city. Within the bulge of the British lines during World War I, Ypres was completely destroyed, subsequently to be rebuilt in its original style. ||
|-id=121
| 10121 Arzamas || || Arzamas, Russia, on the Tesha River ||
|-id=122
| 10122 Fröding || || Gustav Fröding, 19th-century Swedish poet and journalist, several of whose poems were set to music by Sibelius ||
|-id=123
| 10123 Fideöja || || Fide and Öja, two small towns on the Swedish island of Gotland. The church in Öja hosts a very famous crucifix from the thirteenth century. ||
|-id=124
| 10124 Hemse || || Hemse, the second largest town on the Swedish island of Gotland, is the central node of the southern region. Close to the town there are two pastoral meadows typical of the island. ||
|-id=125
| 10125 Stenkyrka || || Stenkyrka, a coastal parish on Gotland, Sweden. It hosts one of the largest church towers on the island. In the church can be found the oldest dated gravestone on the island, from the year 1200. ||
|-id=126
| 10126 Lärbro || || Lärbro, a village on the island of Gotland, Sweden. At the church, there is a well-preserved defense tower from the 11th century. Close to the village there is also a spring well known from a Swedish poem. ||
|-id=127
| 10127 Fröjel || || Fröjel, a small parish on the island of Gotland, Sweden, there is a 29-m-long stone ship from the Bronze Age. ||
|-id=128
| 10128 Bro || || Bro, is a small parish on the island of Gotland, Sweden, where an old cairn from the Bronze Age is found, said to be the burial site of Baldur. ||
|-id=129
| 10129 Fole || || Fole, is a small parish on the island of Gotland, Sweden, where the house Vatlings, one of the best-preserved residences from the Middle Ages in the Gotland countryside, is found. ||
|-id=130
| 10130 Ardre || || Ardre is a small parish on the eastern side of the island of Gotland, Sweden. Two teachers from Uppsala discovered the beautiful beaches there at the beginning of the twentieth century, and since then the village of Ljugarn has been a popular summer resort. ||
|-id=131
| 10131 Stånga || || Stånga, a place on the island of Gotland, Sweden, where annual summer games have been held since 1924 ||
|-id=132
| 10132 Lummelunda || || Lummelunda, a place north of Visby, on the island of Gotland, Sweden, where a 4-kilometer limestone long cave is located. ||
|-id=136
| 10136 Gauguin || || Paul Gauguin (1848–1903), leading French painter of the post-impressionist period, who abandoned imitative art for expressiveness through color. A meeting with van Gogh at Paris (1886) and a journey to Martinique (1887) were decisive experiences in his life. In Tahiti he discovered the brilliant coloring and sensuous delights of a tropical landscape, enjoying in a primitive community the "natural" life. ||
|-id=137
| 10137 Thucydides || || Thucydides (ca. 460-400 BC), the greatest of the ancient Greek historians, who wrote strictly contemporary history of events through which he lived. His best known work, History of the Peloponnesian War, recounted the fifth-century-BC struggle between Athens and Sparta. He was filled with a passion for truth, keeping him free from vulgar partiality against the enemy: "I have written not for immediate applause, but for posterity". ||
|-id=138
| 10138 Ohtanihiroshi || || Hiroshi Ohtani (born 1939) is a professor in the department of astronomy at Kyoto University. His research themes include observational and theoretical studies of interstellar matter and observational study of active galaxies, especially of Seyfert and related galaxies. ||
|-id=139
| 10139 Ronsard || || Pierre de Ronsard (1524–1585), the most important member of the group of poets known as "La Pléiade". Much inspired by Greek and Roman poetry, following Horatius' example he composed the Odes (1550). He is most remembered for his Amours de Marie and the Sonnets pour Hélène. A reflection on the brevity of youth and beauty, his Mignonne, allons voir si la rose has been set to music half a dozen times since the sixteenth century. ||
|-id=140
| 10140 Villon || || François Villon (1431–1463), one of the greatest French lyric poets, known for his ballads, chansons and rondeaux. Le grand Testament is his master work. Herein he reviews his life, expressing his horror of sickness, old age, death and a poignant regret for his wasted youth. Known for his criminal excesses, he spent much time in prison, until he was condemned to be hanged (Ballade des pendus). However, in 1463 his sentence was commuted to banishment from Paris. ||
|-id=141
| 10141 Gotenba || 1993 VE || Gotenba is a city at the foot of Mt. Fuji. Every year it is the site of a star party that promotes astronomical activities in cooperation with amateur astronomers to spread astronomy to the public ||
|-id=142
| 10142 Sakka || || Kazuyuki Sakka (born 1943), the director of the Kyoto School of Computer Science, studied spectroscopic properties of galaxies and emission nebulae. He has also created software for astronomy education and popularization ||
|-id=143
| 10143 Kamogawa || || Kamogawa, a famous river in Japan, flows through the center of Kyoto city. Kamogawa has often appeared in Japanese literature and art ||
|-id=146
| 10146 Mukaitadashi || || Tadashi Mukai (born 1945), a professor in the department of earth and planetary sciences at Kobe University, is known for studies of near-earth objects ||
|-id=147
| 10147 Mizugatsuka || || Mizugatsuka is a Japanese park in the middle of the southern trail of Mount Fuji. The clear air makes it a mecca for amateur astronomers. ||
|-id=148
| 10148 Shirase || || The adventurer Nobu Shirase (1861–1946) was the first Japanese to explore Antarctica, reaching latitude -80\rm o05' on 1912 Jan. 28 ||
|-id=149
| 10149 Cavagna || 1994 PA || Marco Cavagna (born 1958), an Italian amateur astronomer. He began observing comets, variable stars and occultations at an early age. In 1989 he was one of the promoters of the follow-up program, with special interest in NEOs, at Sormano Observatory. Cavagna introduced the discoverers to the Italian astrometric community during its first meeting, held in Verona in 1991. ||
|-id=151
| 10151 Rubens || || Peter Paul Rubens (1577–1640), a Flemish painter and the greatest exponent of sensuous Baroque painting. In 1600, after two years seniority as a master, he left Antwerp for Italy to study the ancient and modern masters of painting. In 1609 he settled permanently in Flanders and became a major religious painter (e.g. "Descent from the Cross", painted for the Antwerp cathedral). Because of his diplomatic capacities Rubens often served as an ambassador. The peace treaty of 1630 between England and Spain can be largely attributed to him personally. ||
|-id=152
| 10152 Ukichiro || || Ukichiro Nakaya (1900–1962), professor of physics at Hokkaido University, studied the crystalline structure of snow and in 1935 succeeded in making artificial snow for the first time ||
|-id=153
| 10153 Goldman || 1994 UB || Stuart J. Goldman (born 1963), associate editor of Sky & Telescope, who has guided its readers through the ever-changing world of astronomical books, computer software and now the vast wilderness of the Internet. He volunteered weekends to help build the observatory at which this minor planet was discovered. ||
|-id=154
| 10154 Tanuki || 1994 UH || Lake Tanuki is an artificial pond to the east of Mt. Fuji. Amateur astronomers gather at its shores for observation as well as to enjoy the glorious sunrises from behind Mt. Fuji ||
|-id=155
| 10155 Numaguti || || Atusi Numaguti (1963–2001), an associate professor at Hokkaido University, was actively involved in research on the earth's hydrological cycle. The Atmospheric General Circulation Model he established is now used as a standard in Asia. He founded a summer school for young meteorologists ||
|-id=157
| 10157 Asagiri || || Asagiri Highlands are located at the west side of Mt. Fuji in Shizuoka prefecture. The clear air is inviting to amateur astronomers ||
|-id=158
| 10158 Taroubou || 1994 XK || Tarobou Highland is located at the west side of Mt. Fuji, in Gotenba City, Shizuoka prefecture. The clear air makes it a mecca for amateur astronomers ||
|-id=159
| 10159 Tokara || || The Tokara Islands form an archipelago in southern Japan. It includes seven inhabited and five uninhabited islands ||
|-id=160
| 10160 Totoro || || Hayao Miyazaki produced the animated movie My Neighbor Totoro in 1988, featuring the fairy Totoro. Through the movie, Totoro once again found his place in the hearts of Japanese children, in a time when the woods and darkness where Totoro lives are rapidly disappearing from the earth ||
|-id=161
| 10161 Nakanoshima || || Nakanoshima, largest island in the Tokara Islands, Japan, dominated by the picturesque Mount Ontake (Tokara Fuji) ||
|-id=162
| 10162 Issunboushi || 1995 AL || The extraordinarily small character Issunboushi---Issun means about 3 cm in old Japanese---was the hero of many old Japanese tales. Born the size of a bean, he defeated ogres, succeeded in a stratagem that got him a beautiful bride, and shook a mallet that instantly transformed him into a normal young man ||
|-id=163
| 10163 Onomichi || || The Japanese city of Onomichi near Hiroshima ||
|-id=164
| 10164 Akusekijima || || Akusekijima, an island in the Tokara Islands, Japan, known for its hot spring. The dense subtropical forest is believed to be the home of the gods that guard the mountainous island, and many shrines have been built to worship the gods. ||
|-id=166
| 10166 Takarajima || || Takarajima, southernmost inhabited island of the Tokara Islands, Japan, famous as the model of Robert Louis Stevenson's Treasure Island. Many people come to see the limestone cave where the pirate Captain Kidd is said to have hidden his treasures. ||
|-id=167
| 10167 Yoshiwatiso || || Yoshikazu Watanabe (born 1953; Iso was his mother's maiden name) was a leading meteor observer in Japan. He is a council member of the Oriental Astronomical Association and a successful surveyor of historical records of comets and meteors in the modern Japanese era. The name was suggested by the discoverer and I. Hasegawa. ||
|-id=168
| 10168 Stony Ridge || 1995 CN || The founders of the Stony Ridge Observatory, the amateur astronomers Anthony L. Bland, Norman L. Boltz, Charles Buzzetti, George A. Carroll, Roy R. Cook, Alvin E. Cram, Roy K. Ensign, W. H. Griffith, Harold J. Ireland, J. George Moyen, Norris A. Roberts, Easy Sloman, John Sousa, John Terlep and Dave Thomas. The observatory is located near Los Angeles in the United States. Starting in 1964, the observatory was used by the Aeronautical Chart and Information Center in St. Louis to map potential landing sites for the Apollo space program. ||
|-id=169
| 10169 Ogasawara || 1995 DK || Located in the Pacific Ocean 1000 km south of Tokyo, the Ogasawara Islands (Bonin Islands), with their extraordinary natural environment, are dubbed the "Galapagos of the Orient". On the Titi-jima Island is the National Astronomical Observatory's Ogasawara Station of VERA (VLBI Exploration of Radio Astrometry) ||
|-id=170
| 10170 Petrjakeš || || Petr Jakeš, Czech geologist and geochemist † ||
|-id=171
| 10171 Takaotengu || || Takaotengu, legendary supernatural creature of Mount Takao, Japan. Its history dates back to 1300 or earlier as a holy place in the western part of Tokyo. Tall and strong, Takaotengu had a long nose on his red face and wings on his back. He was able to fly and had the power to spawn thunderstorms. ||
|-id=172
| 10172 Humphreys || || Minnesota astronomer Roberta M. Humphreys (born 1944) is a leader in studies of physical properties of massive stars in the Milky Way and in nearby galaxies. She headed the Automated Plate Scanner Project to digitize the Palomar Sky Survey and make a publicly available database of a billion stars and several million galaxies ||
|-id=173
| 10173 Hanzelkazikmund || 1995 HA || Miroslav Zikmund (born 1920) and Jiří Hanzelka (born 1919), Czech travelers, photographers and documentarists who visited 83 countries on five continents by car during 1947–1950 and truck during 1959–1964. A museum containing items collected and a rich archive of about 150~000 photographs has recently opened in Zlin. The name was suggested by J. Grygar. ||
|-id=174
| 10174 Emička || 1995 JD || Ema Moravcová (born 1999), is the daughter of the discoverer, Zdeněk Moravec. ||
|-id=175
| 10175 Aenona || || Aenona, now the Croatian city of Nin is the Roman name of the first capital of the old Croatian kingdom. It is located on the east coast of the Adriatic Sea. The world's smallest cathedral, used as an observatory for establishing the local calendar, is located there. ||
|-id=176
| 10176 Gaiavettori || || Gaia Vettori (born 1999) is the daughter of Vincenzo Vettori, an amateur astronomer in the Montelupo Group ||
|-id=177
| 10177 Ellison || || Harlan Ellison (1934–2018) was an American science-fiction author whose works include I Have No Mouth, I Must Scream, and Shatterday. He has served as consultant on several television series, particularly Babylon 5. His original screenplay for the Star Trek episode The City on the Edge of Forever won one of his 11 Hugo Awards. ||
|-id=178
| 10178 Iriki || 1996 DD || Iriki, an historical town in the Satsuma area, Kagoshima prefecture, Japan (now merged into Satsumasendai, Kagoshima) Here on the Mt. Yaeyama highland are the National Astronomical Observatory's Iriki Station of VERA (VLBI Exploration of Radio Astrometry), as well as the Kagoshima University's 1-m optical-infrared telescope. ||
|-id=179
| 10179 Ishigaki || 1996 DE || The picturesque Ishigakijima is the largest of the Yaeyama Islands, Okinawa prefecture. Installed in this island is the National Astronomical Observatory's Ishigaki Station of VERA (VLBI Exploration of Radio Astrometry) ||
|-id=181
| 10181 Davidacomba || || Davida H. Comba (born 1928), wife of American amateur astronomer Paul G. Comba, who discovered this minor planet. A psychiatrist by profession and a nurturing mother and devoted wife, she constantly supported and encouraged the discoverer's passion for minor planet observations. ||
|-id=182
| 10182 Junkobiwaki || || Junko Biwaki (born 1914) was a teacher of elementary and junior high-school in Yamaguchi prefecture for 43 years beginning in 1933. She has been very active in improving education and the status of women ||
|-id=183
| 10183 Ampère || || André-Marie Ampère (1775–1836), French physicist who founded the science of electromagnetism. In 1820 he formulated a law that mathematically describes the phenomenon of deflection of a magnetic needle near a current-carrying wire. A full account of his theories has been given in his Mémoire sur la théorie mathématique des phénomènes électrodynamique (1827). ||
|-id=184
| 10184 Galvani || || Luigi Galvani (1737–1798), Italian physician and physicist who conceived the electrical nature of nerve impulses. His discoveries led to the invention of the voltaic pile. His findings have been published in De viribus electricitatis in motu musculari commentarius (1791). ||
|-id=185
| 10185 Gaudi || || Antoni Gaudí (1852–1926), a Spanish architect, whose work was strongly influenced by "Art Nouveau" ornamental elements, Neo-Gothic style and the Moors, this last with its mixture of cheap stone and colorful tiles. Gaudi's creations are mainly concentrated in Barcelona, site of the Sagrada Familia cathedral. ||
|-id=186
| 10186 Albéniz || || A child prodigy, the Spanish composer and pianist Isaac Albéniz (1860–1909) studied at the conservatories of Leipzig and Brussels. In Paris he was influenced by Vincent d´Indy and Paul Dukas. His fame rests chiefly on his piano music, notably the suite Iberia, which was colored by the spirit of Spanish folk music ||
|-id=188
| 10188 Yasuoyoneda || 1996 JY || Yasuo Yoneda (born 1942), the first director of "Tenkyukan", the Dynic Astronomical Observatory, is an amateur astronomer who observes sunspots. He contributes to the spread of astronomy and to the support of amateur astronomers. He also likes mountain climbing ||
|-id=189
| 10189 Normanrockwell || || Norman Rockwell (1894–1978) spent his career creating images showing American life as he saw it. His distinctive style conveyed emotions in a way rarely achieved in modern art. His work appeared in magazines such as Life, but he earned his reputation through the exposure of 322 covers on The Saturday Evening Post. ||
|-id=193
| 10193 Nishimoto || || Physicist Daron L. Nishimoto (born 1966) has worked at AMOS since 1988. The good-natured support of his family has allowed him to spend long hours in support of AMOS programs. In particular, he is the driving force behind the highly successful Raven autonomous telescope program ||
|-id=195
| 10195 Nebraska || || The is a U.S. state of Nebraska. This minor planet has been the first one to be discovered in this state. ||
|-id=197
| 10197 Senigalliesi || 1996 UO || the Italian amateur astronomer Paolo Senigalliesi (1936–1986). He was an ardent observer who devoted most of his time and energy to the observation of planets. In 1968, he was a founding member of the Italian Group of Observers of Planets, and he participated in the activities of the Jupiter Division Team with indefatigable professionalism. He played an important role in the dissemination of astronomical information and was one of the founders of the Amateur Astronomers Association of Marches. He also played an important role in the construction of the Pietralacroce Observatory at Ancona ||
|-id=198
| 10198 Pinelli || || Paolo Pinelli (born 1954) is an amateur astronomer of the Montelupo group. He was the first to propose the construction of a public observatory in the city of Montelupo ||
|-id=199
| 10199 Chariklo || || Chariclo (Chariklo), from Greek mythology, a female centaur and the wife of Chiron, sometimes described as a sea nymph. Together they are said to have had as many as five children, and she is also sometimes said to have been the mother of Tiresias, the famous seer. ||
|-id=200
| 10200 Quadri || || Ulisse Quadri (born 1953), an Italian teacher, amateur astronomer, discoverer of minor planets and author of articles and texts on science and mathematics for children. His interests in astronomy include astrometry and photometry of minor bodies, sundials and software development. He is one of the founders of the Bassano Bresciano Observatory and planned and built the mechanical part of the automatic robotic telescope there. ||
|}
10201–10300
|-
| 10201 Korado || || Korado Korlević (born 1958), a Croatian astronomer who leads the team of amateur astronomers at the Visnjan Observatory in Croatia and has been enthusiastically involved with observations of minor planets, comets and meteors. This program was recently credited with the discovery of comet P/1999 DN _3 . He also teaches astronomical classes each summer ||
|-id=203
| 10203 Flinders || 1997 PQ || Matthew Flinders (1774–1814), British navigator and explorer, or his grandson the archaeologist and Egyptologist Flinders Petrie ||
|-id=204
| 10204 Turing || || Alan Turing (1912–1954), British mathematician, logician, cryptographer, and computer scientist ||
|-id=205
| 10205 Pokorný || || Zdeněk Pokorný (born 1947), a Czech astronomer ||
|-id=207
| 10207 Comeniana || 1997 QA || Bratislava's Comenius University (Universitas Comeniana in Latin), the leading institution of higher learning in the Slovak Republic, was founded in 1919, and the Institute of Astronomy, one of the university's first institutes, was established in 1943. The observatory in Modra also belongs to the university ||
|-id=208
| 10208 Germanicus || || Germanicus (15 B.C.–19 A.D.), a Roman general and nephew of Tiberius, also wrote several poems, including Aratea, the Latin version of Aratus' Phaenomena, an important astronomical work in which he described the constellations. In 1963, in Amelia, near Terni, a 2-meter bronze statue of Germanicus was found ||
|-id=209
| 10209 Izanaki || || Izanagi, from Japanese mythology, is the god who descended to the island Onogoro with the goddess Izanami and created the land there, including the island of Awaji. ||
|-id=210
| 10210 Nathues || || Andreas Nathues (born 1967), a German geophysicist who studied the physical properties of the Eunomia family of minor planets using innovative observing and data-analysis techniques at the German Aerospace Center (DLR), Berlin ||
|-id=211
| 10211 La Spezia || || La Spezia is an Italian town near the Monte Viseggi Observatory. It is famous for its "Poets' Gulf", in honor of the nineteenth-century English poets Byron and Shelley, who lived, loved and died in Italy, the country of their adoption ||
|-id=213
| 10213 Koukolík || || František Koukolík (born 1941), Czech neuropathologist and popularizer of science ||
|-id=215
| 10215 Lavilledemirmont || 1997 SQ || Jean de la Ville de Mirmont (1864–1914) a French writer, whose work evoked images of unreachable horizons and bitterness. His poetic opera L'Horizon Chimérique ("Fanciful Horizon") inspired the music of Gabriel Fauré. The name was suggested by R. and A. Soubie. ||
|-id=216
| 10216 Popastro || || Society for Popular Astronomy (SPA), a national astronomical society based in the United Kingdom, celebrates its fiftieth anniversary in 2003. It was established as the Junior Astronomical Society to promote astronomy as a hobby, particularly among beginners. The SPA is one of three national societies for astronomy in the U.K ||
|-id=217
| 10217 Richardcook || || Richard Cook (born 1965) was the Mars Pathfinder Flight Operations Manager and was responsible for running the day-to-day operations of the Mars Pathfinder spacecraft during launch, the landing phase and surface operations on Mars ||
|-id=218
| 10218 Bierstadt || || Albert Bierstadt (1830–1902), a landscape artist from the Hudson River School, was best known for his panoramic scenes of the American West, including the Rocky Mountains, Yosemite and the Grand Canyon. His work inspired those who followed him westward while forever preserving the power and beauty of the vanishing frontier ||
|-id=219
| 10219 Penco || || Umberto Penco, an Italian physicist at the University of Pisa. After teaching high school for several years, he became a researcher in the department of physics at the University of Pisa. He has worked in astrophysics, most recently on mathematical models of chemical evolution of galaxies, and he maintains an interest in science education at secondary-school level, training teachers in astronomy and physics. Penco has assisted the San Marcello Observatory as a scientific consultant since it was first established, and he has given advice especially on the selection and improvement of the optical instrumentation. ||
|-id=220
| 10220 Pigott || || Edward Pigott (1753–1825), an English astronomer and discoverer of variable stars and comets ||
|-id=221
| 10221 Kubrick || || Stanley Kubrick (1928–1999), American film director ||
|-id=222
| 10222 Klotz || || Alain Klotz (born 1947), a French amateur astronomer at the Centres d´Etudes Spatiales du Rayonnement in Toulouse, is a pioneer in amateur CCD spectroscopy at the T60 telescope at the Pic du Midi Observatory. He is currently president of AUDE, the French electronic detectors users association. ||
|-id=223
| 10223 Zashikiwarashi || || Taking the form of a child with bobbed hair, Zashikiwarashi is a traditional spirit of the people of the Tohoku district. It haunts the Japanese-style rooms of old families. It is said that a family would be wealthy while the spirit lives and become poor when it leaves ||
|-id=224
| 10224 Hisashi || || Hisashi Hirabayashi (born 1943), Japanese senior chief officer of JAXA Space Education and director of the Space Education Center, who led the Very Long Baseline Interferometer and Space Observatory Program with the radio satellite HALCA that successfully revealed active galactic nuclei. ||
|-id=226
| 10226 Seishika || || Seishika is a thin purple flower specified as an endangered plant. Known as its elusive flower, it lives only in the Yaeyama Islands area, Okinawa prefecture. The pretty flower blooms exquisitely around April on Mt. Banna-take near the VERA Ishigakijima Station ||
|-id=227
| 10227 Izanami || || Izanami-no-mikoto is the mythical goddess who descended to the island Onogoro with the god Izanaki and various other gods. After her death she was also called Yomotsu-ookami in the land of the dead ||
|-id=233
| 10233 Le Creusot || || The French town of Le Creusot, location of the Le Creusot Observatory () and home of the discoverer Jean-Claude Merlin ||
|-id=234
| 10234 Sixtygarden || || 60 Garden Street is the street address of the Harvard-Smithsonian Center for Astrophysics. Observers of minor planets and comets know it as the seat of the Minor Planet Center and the Central Bureau for Astronomical Telegrams, which communicate fast-breaking news of astronomical discoveries to the international community. ||
|-id=237
| 10237 Adzic || || Vladislav Adzic (born 1984), 2002 Intel ISEF finalist. He attended the Ward Melville High School, East Setauket, New York, U.S.A ||
|-id=239
| 10239 Hermann || || Shawn M. Hermann (born 1975), now at Raytheon Corporation, Tucson, was one of the first observers for LONEOS. During 1998–1999 he discovered two Apollos, an Amor and a comet, 275P/Hermann. ||
|-id=241
| 10241 Miličević || || Nikola Miličević (1887–1963), Croatian astronomer and last administrator of Blaca hermitage (or Pustinja Blaca – Blaca monastery) on Brač, Croatia ||
|-id=242
| 10242 Wasserkuppe || 2808 P-L || Wasserkuppe, high plateau, the highest peak in the Rhön Mountains, in the German state of Hesse. At 950 m, is the highest peak in the Rhön. The area is used for glider training. ||
|-id=243
| 10243 Hohe Meissner || 3553 P-L || Hohe Meissner, (750 m) is a volcano north of the Rhön between the Werra and Fulda rivers, southeast of the city of Kassel, Germany. The basalt quarry is still used. The two rivers Werra and Fulda flow together near the city of Münden and form the Weser river. ||
|-id=244
| 10244 Thüringer Wald || 4668 P-L || Thüringer Wald, a German mountain range east of the Werra river, flowing from northwest to southeast. The summits are the Inselsberg (900 m) and the Beerberg (980 m). It is a wonderful area with beautiful forests for hikers. The main industry is creating Christmas decorations and children's toys. ||
|-id=245
| 10245 Inselsberg || 6071 P-L || Großer Inselsberg at 900 m, is one of the peaks of the Thüringer Wald mountain range, Germany. ||
|-id=246
| 10246 Frankenwald || 6381 P-L || The Franconian Forest (, Germany, forms the continuation of the Thüringer Wald mountains to the southeast up to the Fichtelgebirge. ||
|-id=247
| 10247 Amphiaraos || 6629 P-L || Amphiaraus (Amphiaraos), from Greek mythology. The Greek seer took part in the campaign of the Argonauts and the "Seven against Thebes". ||
|-id=248
| 10248 Fichtelgebirge || 7639 P-L || Fichtelgebirge, is a compact German mountain range east of the city of Bayreuth. The highest mountain is the Schneeberg (1050 m). It is a popular skiing area. ||
|-id=249
| 10249 Harz || 9515 P-L || The Harz, is the northernmost and highest medium-high compact mountain range of Germany. The silver mines were used until the twentieth century, and other ores have been found here. The story goes that witches meet here on May 1, riding their broomsticks on the "Hexentanzplatz" near the Brocken. ||
|-id=250
| 10250 Hellahaasse || 1252 T-1 || Hella S. Haasse, Dutch novelist ||
|-id=251
| 10251 Mulisch || 3089 T-1 || Harry Mulisch, Dutch writer ||
|-id=252
| 10252 Heidigraf || 4164 T-1 || Heidi Graf (born 1941), former Head of ESTEC Communications Office (1977–2006) at ESA; "founding mother" of permanent exhibition Space Expo in Noordwijk, Netherlands (since 1990) ||
|-id=253
| 10253 Westerwald || 2116 T-2 || Westerwald, in Germany. It is a low mountain range with some volcanoes, blending into the "Siebengebirge", a range of seven extinct volcanic mountains. ||
|-id=254
| 10254 Hunsrück || 2314 T-2 || The Hunsrück is a German mountain range, located west of the Rhine between the rivers Nahe and Mosel. In the southern part many semiprecious stones are found, helping create a jewelry industry. ||
|-id=255
| 10255 Taunus || 3398 T-3 || The Taunus, a German mountain range, is the continuation of the Hundsrück at the eastern side of the Rhine. Its highest mountain, at 880 m, is called "Feldberg in the Taunus". As in the Schwarzwald, there are many thermal springs. ||
|-id=256
| 10256 Vredevoogd || 4157 T-3 || Loek Vredevoogd, chairman of the Board of Governors of Leiden University during 1994–2002. ||
|-id=257
| 10257 Garecynthia || 4333 T-3 || The marriage of Gareth Williams, associate director of the Minor Planet Center, and Cynthia Marsden, daughter of the director, Brian G. Marsden, in Lexington, Massachusetts, on 1 October 2002. ||
|-id=258
| 10258 Sárneczky || 1940 AB || Krisztián Sárneczky (born 1974) is a Hungarian asteroid and comet researcher at Konkoly Observatory, who discovered 363 numbered asteroids and five supernovae. He is a very active science communicator, and the leader of the Comet Section of the Hungarian Astronomical Association. ||
|-id=259
| 10259 Osipovyurij || 1972 HL || Yury Osipov (born 1936) is an outstanding Russian mathematician and mechanician, known worldwide as an expert in the theory of control, as well as in the theory of differential equations and its applications. Since 1991 he has been president of the Russian Academy of Sciences ||
|-id=261
| 10261 Nikdollezhal' || || Nikolay Dollezhal (1899–2000), Russian expert in power engineering, was the chief designer of the reactor for the world's first atomic power station, located in Obninsk, some 120 km southwest of Moscow ||
|-id=262
| 10262 Samoilov || || Evgenij Valerianovich Samoilov (born 1912) is a well-known Russian dramatic actor and People's Artist of the former U.S.S.R. He performs at the State Academic Maly Theatre in Moscow ||
|-id=263
| 10263 Vadimsimona || || Russian physicist Vadim Aleksandrovich Simonenko is deputy director of the Russian Scientific Research Institute of Technical Physics at Snezhinsk. He is known for his work on the hazards of near-earth objects and the protection of the earth ||
|-id=264
| 10264 Marov || || Mikhail Yakovlevich Marov (born 1933), professor and head of the planetary department at Keldysh Institute of Applied Mathematics, is one of the initiators and scientific leaders of research of Venus and Mars from space. He is also currently the president of IAU Division III ||
|-id=265
| 10265 Gunnarsson || || Marcus Gunnarsson (born 1971), a planetary scientist at Uppsala Astronomical Observatory ||
|-id=266
| 10266 Vladishukhov || || Vladimir Shukhov (1853–1939), Russian engineer and inventor of the water-tube boiler ||
|-id=267
| 10267 Giuppone || || Cristian Giuppone (born 1979) is an Argentine astronomer at the Cordoba Astronomical Observatory investigating the co-orbital three-body problem with dissipation, with applications to planetary and small bodies dynamics. ||
|-id=269
| 10269 Tusi || || Nasīr al-Dīn al-Tūsī † ||
|-id=270
| 10270 Skoglöv || || Erik Skoglöv (born 1968), a Swedish astronomer at Uppsala Observatory ||
|-id=272
| 10272 Yuko || || Yuko Kimura (born 1981) is an administrative associate at the National Astronomical Observatory of Japan who organizes international collaboration programs promoting studies of asteroids. ||
|-id=273
| 10273 Katvolk || || Kathryn Volk (born 1985) completed her PhD at the University of Arizona investigating the long-term dynamical evolution of Centaur asteroids and the Kuiper Belt. ||
|-id=274
| 10274 Larryevans || || Larry Evans (born 1943) is an expert in gamma-ray, x-ray and neutron spectroscopy, including the analysis and interpretation of data collected by the NEAR mission to (433) Eros. ||
|-id=275
| 10275 Nathankaib || || Nathan Kaib (born 1980) is a professor at the University of Oklahoma who specializes in the formation and evolution of planetary systems, in particular the outer solar system. ||
|-id=276
| 10276 Matney || || Mark Matney (born 1963) of the Johnson Space Center has made fundamental contributions to models and observations of Earth's orbital debris environment. ||
|-id=277
| 10277 Micheli || || Marco Micheli (born 1983), an Italian discoverer of minor planets, researcher at ESA's SSA programme NEO Coordination Centre and a member of the Pan-STARRS1 survey's NEO search team studying meteor streams ||
|-id=278
| 10278 Virkki || || Anne Virkki (born 1988) is a postdoctoral scholar at the Arecibo Observatory who studies near-Earth asteroids, specializing in understanding the properties of asteroid surfaces and regolith using radar scattering measurements. ||
|-id=279
| 10279 Rhiannonblaauw || || Rhiannon Blaauw (born 1986) is a scientist working at the NASA Meteoroid Environment Office who has developed new techniques for measuring fluxes and particle distributions within meteor showers. ||
|-id=280
| 10280 Yequanzhi || || Ye Quan-Zhi (born 1988), a Chinese postdoctoral researcher at Caltech and discoverer of minor planets, who studies the transitions between asteroids and comets and associated meteor streams. ||
|-id=281
| 10281 Libourel || || Guy Libourel (born 1956) is a cosmochemist at Observatoire de la Côte d´Azur (France) whose research includes the petrology and formation of chondrules. ||
|-id=282
| 10282 Emilykramer || || Emily Kramer (born 1986) is a postdoctoral researcher at the Jet Propulsion Laboratory who uses visible and thermal wavelength measurements to estimate the amount of mass shed by comets throughout their orbits. ||
|-id=283
| 10283 Cromer || || Dedicated teachers Michael (born 1941) and Sarah (born 1945) Cromer, of Flagstaff, Arizona, set a standard in education for hundreds of young students. Their active concern for the learning process and involvement in the welfare of successive generations, in and out of the classroom, is an example for all ||
|-id=285
| 10285 Renémichelsen || || René Michelsen, a Danish astronomer and discoverer of minor planets ||
|-id=286
| 10286 Shnollia || || Simon Shnoll, Russian biophysicist ||
|-id=287
| 10287 Smale || || American mathematician Stephen Smale (born 1930) is a member of National Academy of Sciences. He concentrates on the junction of algebraic topology and theory of differential equations and on problems of complexity of algorithms. The name was suggested by V. J. Judovich ||
|-id=288
| 10288 Saville || 1983 WN || Curt Saville (1946–2001) was an avid ocean and arctic explorer. He rowed across both the Atlantic and Pacific oceans. Saville also worked to encourage scientific exploration of the Earth and space. The name was suggested by P. C. Thomas ||
|-id=289
| 10289 Geoffperry || 1984 QS || Geoffrey Perry (1927–2000), a physics teacher at Kettering Grammar School, England, taught his students to monitor radio signals from Soviet satellites. His group of students discovered the Plesetsk launch site and became the most reliable public source of space information during the Cold War. ||
|-id=290
| 10290 Kettering || 1985 SR || Kettering Group, the satellite tracking group established by Geoffrey Perry at the school at which he taught. The group monitored and analyzed radio transmissions from Soviet satellites, often scooping official news media. ||
|-id=293
| 10293 Pribina || || Pribina (c. 800–861), a Slavic prince and first Slavic ruler to build a Christian church on Slavic territory in Nitra ||
|-id=295
| 10295 Hippolyta || 1988 GB || Hippolyta, from Greek mythology, was one of the greatest queens of the Amazons. She wore a beautiful golden girdle, a gift from her father Ares, the war-god, as a symbol of her Amazonian queenship. Heracles was sent by the Greeks to acquire the girdle, a battle took place, and beautiful Hippolyta died. ||
|-id=296
| 10296 Rominadisisto || || Romina Paula Di Sisto (born 1970) is an astronomer at the La Plata University of Argentina whose research includes the dynamics and collisional evolution of Centaurs, Jupiter family comets, and Hilda and Trojan asteroids. ||
|-id=297
| 10297 Lynnejones || || Rhiannon Lynne Allen (R. Lynne Jones) (born 1973) is a researcher at the University of Washington working to optimize the performance of the Large Synoptic Survey Telescope for solar system science. ||
|-id=298
| 10298 Jiangchuanhuang || || Jiangchuan Huang (born 1961) served as the chief designer of the Chang'e 2 satellite, which in 2008 executed a fly-by of (4179) Toutatis. ||
|-id=300
| 10300 Tanakadate || || Tanakadate Aikitsu (1856–1952), a Japanese geophysicist and founder of the International Latitude Observatory at Mizusawa, Iwate ||
|}
10301–10400
|-
| 10301 Kataoka || 1989 FH || Yoshiko Kataoka (born 1927), an amateur astronomer in Takarazuka, Hyogo prefecture, is a director of the Oriental Astronomical Association. She was a pioneer in the study of meteoric dust. In 1993 she provided a fund to establish and keep the Vega Prize for distinguished women amateur astronomers ||
|-id=303
| 10303 Fréret || || The famous French historian Nicolas Fréret (1688–1749), well known for his atheistic treatise Lettre de Thrasybule à Leucippe (1720), was imprisoned in the Bastille for alleging---correctly---that the Franks were evolved from German tribes ||
|-id=304
| 10304 Iwaki || 1989 SY || Masae Iwaki (born 1933), an amateur astronomer in Oita, is the winner of the Vega Prize for distinguished women amateur astronomers. She has been very active in the popularization of astronomy through frequent star parties and lectures, as well as through writings in newspapers ||
|-id=305
| 10305 Grignard || || Fernand (Ferre) Grignard (1939–1982), a member of an ancient family, became famous during the 1960s in Western Europe for his folk songs and blues. Another well-known family member is Victor Grignard (1871–1935), who received the 1912 Nobel prize for chemistry ||
|-id=306
| 10306 Pagnol || 1990 QY || Marcel Pagnol (1895–1974) was a French writer who will be always remembered for his novels Jean de Florette and Manon des Sources. One of his comedies, Topaze, dealing with the corruptive power of money, brought him extraordinary success at the theater. ||
|-id=310
| 10310 Delacroix || || Eugène Delacroix (1798–1863), a French painter, was inspired by contemporary events. His "Dante and Virgil in Hell" is one of the landmarks of French 19th-century romantic painting. Delacroix's choice of colors later influenced the impressionist painters. He is best known for his painting "Liberty leading the people". ||
|-id=311
| 10311 Fantin-Latour || || Henri Fantin-Latour (1836–1904), a French painter, was known for his still-life paintings with flowers and later for his lithographs. Famous also for his portrait groups, which he arranged in rows of heads, he immortalized many contemporary French celebrities. ||
|-id=313
| 10313 Vanessa-Mae || || Vanessa-Mae (born 1978), a Singaporean-British violinist, created a "bridge between classical and popular music". Her debut album in 1995 sold two million copies. She has won world recognition for her performances in the most prestigious halls. ||
|-id=315
| 10315 Brewster || || Stephen Singer-Brewster (born 1945), a former member of the Palomar Planet Crossing Asteroid Survey, has had a long fascination with astronomy. He is a member of the Outer Planets project at the Jet Propulsion Laboratory and a member of the board of trustees of Stony Ridge Observatory. He discovered comet 105P. ||
|-id=316
| 10316 Williamturner || || William Turner (1508–1568), British ornithologist and "Father of English Botany", is best known for his book A New Herball. ||
|-id=318
| 10318 Sumaura || 1990 TX || Sumaura Elementary School, established in 1902, is the oldest private elementary school in Kobe. It continually produces talented people. The name was suggested by Ken Nomura, son of the first discoverer ||
|-id=319
| 10319 Toshiharu || || Toshiharu Hatanaka (born 1962), a research associate in the department of information and knowledge engineering at Tottori University, is president of the Tottori Society of Astronomy ||
|-id=320
| 10320 Reiland || || Charles Thomas Reiland (born 1946), for many years president of the Amateur Astronomers Association of Pittsburgh, initiated the Wagman Observatory, observed in the Allegheny Observatory's astrometry program and tirelessly promoted public interest in astronomy. The name was suggested by T. P. Kohman. ||
|-id=321
| 10321 Rampo || || Rampo Edogawa (Hirai Taro, 1894–1965), born in Nabari city, Mie prefecture, was a writer who specialized in Japan's mystery genre. He was popular with young readers, and one of his best-known novels is The Boy Detectives Club. ||
|-id=322
| 10322 Mayuminarita || || Mayumi Narita (born 1970) is a Japanese swimmer who is a paraplegic. At the Paralympic Games in Sydney in 2000, she won six gold medals and one silver medal. She also won two gold, two silver and one bronze in Atlanta in 1996 ||
|-id=323
| 10323 Frazer || || James George Frazer (1854–1941) is best remembered for The Golden Bough, a study in comparative religion (in 12 volumes). The work sets forth a mass of evidence for establishing the thesis that human beings must have begun with magic and progressed to religion and from that to science ||
|-id=324
| 10324 Vladimirov || || Vladimir Alekseevich Vladimirov (born 1951) is a prominent authority on stability theory in hydrodynamics and biophysical hydrodynamics. He is a professor of applied mathematics at the University of York. The name was suggested by V. J. Judovich ||
|-id=325
| 10325 Bexa || || The iceberg B10A, which measures some 80 km by 40 km, broke off from the Thwaites glacier in Antarctica in 1992. Having taken hundreds of thousands of years to form, B10A now drifts in the South Atlantic driven by marine currents and wind ||
|-id=326
| 10326 Kuragano || || Sukehikro Kuragano (born 1933) is a member of Kawasaki Astronomical Association and has been an amateur observer of variable stars for about half a century. He independently discovered Comet C/1957 P1 (Mrkos) while he was climbing Mt. Fuji ||
|-id=327
| 10327 Batens || || Diderik Batens (born 1944) is a member of the philosophy department at the University of Ghent. About 20 years ago he founded a new kind of logic ("adaptive logic") that has led to many publications ||
|-id=330
| 10330 Durkheim || || Émile Durkheim (1858–1917), a French sociologist, was convinced that ethical and social structures were endangered by the advent of technology and mechanization. In 1895 he proposed an educational reform, Les Règles de la méthode sociologique, that could avoid the perils of social disconnectedness. ||
|-id=331
| 10331 Peterbluhm || || Peter Bluhm (1942–1997), a German Computer specialist, was known for his efforts in electronic communication among amateur astronomers in Germany since the early 1980s. In 1987 he founded the first Astronomical Bulletin Board System in Dahlenburg. The name was suggested by A. Doppler. ||
|-id=332
| 10332 Défi || || Défi Corporatif Canderel is a fundraising event for cancer research programs at universities in Montreal. Founded by Jonathan Wener, the event has been directed by Gerald Levy since its inception in 1990. It features a costumed run through the streets of Montreal and has raised more than three million dollars. ||
|-id=334
| 10334 Gibbon || || Edward Gibbon (1737–1794), a British historian, celebrated for his six-volume work The Decline and Fall of the Roman Empire (1776–1789), attributed the fall of the Roman Empire to the loss of civil virtue among its citizens. ||
|-id=340
| 10340 Jostjahn || || Jost Jahn (born 1959), German amateur astronomer and discoverer of minor planets ||
|-id=343
| 10343 Church || || Frederic Edwin Church (1826–1900), an American painter, one of several artists of the Hudson River School who strove to paint the wonders of nature in meticulous and dynamically detailed landscapes. He was perhaps the most famous American painter of his time. ||
|-id=346
| 10346 Triathlon || || Since Pam Truty founded the Burn Lake Triathlon in Las Cruces, New Mexico, in 1984, the relay team of Wendee Wallach-Levy, Laura Wright and Barbara Pardo has won medals every year, including 14 golds. Laura has also done more than 30 years volunteer work for the American Red Cross. ||
|-id=347
| 10347 Murom || || Murom, Russia, on the left bank of the Oka river ||
|-id=348
| 10348 Poelchau || || Harald Poelchau (1903–1972), a German theologian, socialist and humanist, comforted more than a thousand people condemned to death by the nazi regime as a chaplain at the penitentiaries of Tegel, Plötzensee and Brandenburg-Görden in Berlin. He was a surviving member of the Kreisau Circle. ||
|-id=350
| 10350 Spallanzani || || Lazzaro Spallanzani (1729–1799), an Italian biologist, was known for his research on the spontaneous generation of cellular life. He also proved that microbes come from the air, paving the way for Pasteur. His masterpiece was Dissertationi de fisica animale e vegetale (1780), an interpretation of the process of digestion. ||
|-id=351
| 10351 Seiichisato || || Seiichi Sato (born 1930) is a member of Kawasaki Astronomical Association. As a medical doctor he greatly contributed to the field of industrial diseases, and as an amateur astronomer he has been abroad 13 times to observe total solar eclipses ||
|-id=352
| 10352 Kawamura || || Mikio Kawamura (born 1931) is a member of Kawasaki Astronomical Association. He is a mechanical engineer by profession and has published five books on telescope-making. He has frequently organized star parties for general public ||
|-id=353
| 10353 Momotaro || || In a Japanese folk tale Momotaro, the Peach Boy, came out of a big peach and fought off ogres with his partners---a dog, a monkey and a pheasant ||
|-id=354
| 10354 Guillaumebudé || || Guillaume Budé (1468–1540) was one of the first philologists in France to teach himself classical Greek, making him an expert on the language of Homer. Founder of the Collège de France (1530), he is well known for his Commentaires sur la langue grecque (1529). ||
|-id=355
| 10355 Kojiroharada || 1993 EQ || Kojiro Harada (born 1926), mechanical engineer, is a member of Kawasaki Astronomical Association. A long-time observer of double stars, he has also written many fairy tales on stars, dramatizing and performing in them himself ||
|-id=356
| 10356 Rudolfsteiner || || Rudolf Steiner (1861–1925), Austrian thinker, who was the editor of the scientific works of Wolfgang Goethe, and this inspired him to write his well-known work Die Philosophie der Freiheit (1894). In 1912 he founded the Anthroposophical Society upon the belief that there is a spiritual perception independent of the senses. ||
|-id=358
| 10358 Kirchhoff || || Gustav Kirchhoff (1824–1887) was a German physicist who, together with Robert Bunsen, founded the discipline of spectrum analysis. They demonstrated that an element gives off a characteristic colored light when heated to incandescence. ||
|-id=361
| 10361 Bunsen || || Robert Bunsen (1811–1899) was a German chemist who discovered the alkali-group metals cesium and rubidium. He also found an antidote to arsenic poisoning (1834) and invented the carbon-zinc electric cell (1841). He is best remembered by every chemistry student for the development of the Bunsen burner. ||
|-id=364
| 10364 Tainai || || Tainai-Daira is a hilly district in Kurokawa Village, north of Niigata prefecture. Since 1984, the village has become the venue of the "Tainai Hoshi Matsuri", the most popular star party in Japan ||
|-id=365
| 10365 Kurokawa || || Kurokawa is a small village with a mere 1800 population, located in northern Niigata prefecture. The village takes pride in its beautiful scenery, including the Tainai River and Tainai Hills ||
|-id=366
| 10366 Shozosato || || Shozo Sato (born 1943) is a maker and repairman of art clocks. He is an experienced lunar photographer and has coauthored a book on the moon. As president of Astro-Club, Fukuyama, Hiroshima prefecture, he has frequently organized star parties for general public ||
|-id=367
| 10367 Sayo || || Sayo is a town in Hyogo prefecture where the Nishi-Harima Astronomical Observatory is situated. The town was declared the Town of Stars in 1990 ||
|-id=368
| 10368 Kozuki || || Kozuki is a town in Hyogo prefecture where the Nishi-Harima Astronomical Observatory is situated. The emblem of Kozuki Town is the waning moon ||
|-id=369
| 10369 Sinden || || David Sinden (born 1932), as chief optician for Grubb-Parsons of Newcastle upon Tyne, was responsible for the optical components of the Isaac Newton, Anglo-Australian and U.K. Schmidt telescopes. In 1979, he founded the Sinden Optical Company, which in 2003 restored Thomas Grubb's first reflector (1834) ||
|-id=370
| 10370 Hylonome || || Fairest of all the female centaurs, the beautiful and civilized Hylonome was in love with the handsome Cyllaros, who was accidentally killed by a javelin, thrown at a wedding. On witnessing this, Hylonome threw herself on the javelin and died ||
|-id=371
| 10371 Gigli || || Paolo Gigli, Italian astronomer and co-founder of the Pian dei Termini Observatory. Early on, Gigli's main interests concerned the study of variable stars and the observation of the Sun. Later he became a speaker on astronomy at the observatory, where public lectures are held three times a week. ||
|-id=372
| 10372 Moran || || Landscape artist Thomas Moran (1837–1926) focused his work on the American frontier, from the shores of Lake Superior to the "Grand Canyon of the Yellowstone". His illustrations of the west appeared in Harper's Weekly and The Aldine, among others. He participated in John Wesley Powell's 1873 expedition to the Grand Canyon ||
|-id=373
| 10373 MacRobert || 1996 ER || For two decades the versatile writing of Alan MacRobert (born 1951) has introduced Sky & Telescope readers to everything from the joys of simple stargazing to the complex worlds of astrophysics and cosmology. Many of his guided sky tours are collected in Star-Hopping for Backyard Astronomers ||
|-id=374
| 10374 Etampes || || Étampes, France ||
|-id=375
| 10375 Michiokuga || || Michio Kuga (1927–1999), high school teacher and from 1971 to 1982 curator at the Yamaguchi Museum. A specialist on star scintillation, he also supervised a number of lectures and exhibitions concerning astronomy at the museum. His efforts made a significant contribution to the popularization of astronomy in Yamaguchi Prefecture. ||
|-id=376
| 10376 Chiarini || 1996 KW || Francesca (born 1981) and Gabriele (born 1986) Chiarini are grandchildren of Giorgio Sassi, co-founder of Osservatorio San Vittore. Gabriele often transmits his grandfather's CCD images for reduction in Bologna, thereby saving time and a 100-km round-trip journey ||
|-id=377
| 10377 Kilimanjaro || || Kilimanjaro, a dormant volcano and the highest mountain in Africa ||
|-id=378
| 10378 Ingmarbergman || || Ingmar Bergman (1918–2007), a Swedish theatre and film director who has achieved worldwide fame with films such as The Seventh Seal (1956) and Wild Strawberries (1957). Although his films are morally complex, they can also be hopeful and lovely. ||
|-id=379
| 10379 Lake Placid || 1996 OH || Lake Placid is a town in northern New York State in the U.S. that hosted the 1932 and 1980 Olympic Winter Games, Lake Placid is also the birthplace of the discoverer. Located in the Adirondack Mountains, Lake Placid is renowned for its natural beauty. ||
|-id=380
| 10380 Berwald || || Franz Berwald (1796–1868), a Swedish composer, may be considered the founder of musical Romanticism in Sweden. Although his compositions are somewhat influenced by the German composers Spohr and von Weber, they are highly original in construction and in the use of harmonic means. ||
|-id=381
| 10381 Malinsmith || 1996 RB || Konrad Malin-Smith (born 1934), a retired science teacher, has given entertaining talks to local astronomical societies in southeastern England over the last 20 years. He and his daughter Beverley have entertained and befriended numerous eclipse chasers at recent solar eclipses; and also obtained superb photographic results. ||
|-id=382
| 10382 Hadamard || || Jacques Hadamard (1865–1963), French mathematician, who made major contributions to the theory of functions of a complex variable and the study of the partial differential equations of mathematical physics. In 1896 he gave a proof of the prime number theorem that defines the frequency of prime numbers among the integers (also see Hadamard transform). ||
|-id=385
| 10385 Amaterasu || || Amaterasu-oomikami, the mythical Japanese goddess of the sun, was born from the left eye of the god Izanaki and ruled the world of the heaven Takamagahara. To protest the misconduct of her younger brother, the god Susanoo, she hid in the cave called Ama-no-iwayado, and the world fell into complete darkness ||
|-id=386
| 10386 Romulus || || Romulus, first king of Rome, reigned from 753 to 716 BC. Legend has it that the twins Romulus and Remus were saved from the Tiber river by the wolf that raised them. In the first year of this reign Romulus founded the city. He was deified as Quirinus. ||
|-id=387
| 10387 Bepicolombo || 1996 UQ || Giuseppe (Bepi) Colombo (1920–1984), an Italian mathematician and astronomer at the University of Padova, made fundamental contributions to the theory of resonances, notably with regard to the Kirkwood gaps and the rotation of Mercury. He also pioneered the use of planetary encounters for gravity assists in arranging space missions. ||
|-id=388
| 10388 Zhuguangya || || Chinese nuclear scientist Zhu Guangya (born 1924) made many contributions to nuclear physics and atomic energy technologies and helped develop China's atomic energy program ||
|-id=389
| 10389 Robmanning || 1997 LD || Rob Manning (born 1958) was the Flight System Chief Engineer for the successful Mars Pathfinder mission at JPL. He was responsible for all technical aspects of the Pathfinder spacecraft. He also led the team that designed, developed, tested and operated Pathfinder's very successful entry, descent and landing system ||
|-id=390
| 10390 Lenka || || Lenka Šarounová (born 1973), an assiduous observer at the Ondřejov Observatory. She has a broad range of interests, from astronomy and meteorology to music. She loves gaining new experiences through traveling and meeting people. Her photometric and astrometric observations of minor planets became an integral part of the discoverers' research project on NEOs ||
|-id=392
| 10392 Brace || || DeWitt Bristol Brace (1858–1905), who founded the department of physics and astronomy at the University of Nebraska in 1888. His was the first definitive study resulting in the broad dismissal of the "ether" theory. His work was recognized and applauded by Rutherford, among many others. In 1901 Brace was elected vice-president of the American Association for the Advancement of Science ||
|-id=395
| 10395 Jirkahorn || || Jiří Horn (1941–1994), an astronomer at the Ondřejov Observatory. He worked in stellar astrophysics, observational astronomy and data reduction, making important contributions to all of them. He was a member of the team that in the late 1960s made the first calculations of the evolution of close binaries with mass loss. He played an important role in the commissioning phase of the 2-m telescope at Ondřejov. He created the user-friendly software SPEFO for the reduction of stellar spectra that is still in use by many astronomers. Name proposed by the discoverers, following a suggestion by P. Koubský, who also prepared the citation ||
|-id=399
| 10399 Nishiharima || || Nishiharima is the southwestern area of Hyogo prefecture and site of the Nishi-Harima Astronomical Observatory ||
|-id=400
| 10400 Hakkaisan || 1997 VX || Hakkaisan is a sacred mountain in Niigata prefecture, where religious training is carried out. The astronomical observatory of Nihon University has been located on the hillside since 1992 ||
|}
10401–10500
|-
| 10401 Masakoba || || Masateru Kobayashi (born 1953) is a Japanese amateur astronomer and the chairperson of the Astronomical Society of Yamaguchi prefecture. He has served as a guide at numerous stargazing meetings, and has planned and conducted many total solar eclipse tours. ||
|-id=403
| 10403 Marcelgrün || || Marcel Grün (born 1946), Czech astronomer and director of the Prague Planetarium ||
|-id=404
| 10404 McCall || || Robert T. McCall (1919–2010), a legendary space artist whose work has not only documented the development of NASA's efforts to place men on the moon but has provided a far-reaching vision of man's future in Space. His works include murals at the National Air and Space Museum and illustrations for 2001: A Space Odyssey. ||
|-id=405
| 10405 Yoshiaki || || Yoshiaki Mogami (1546–1614), a military commander during the Japanese feudal period. ||
|-id=410
| 10410 Yangguanghua || || Yang Guanghua (1923–2006) was a chemical engineer and an educationalist. He was one of the founders of chemical reaction and petroleum processing engineering and an inaugurator of Chinese higher education in petroleum. He served as President and in other leadership posts within the University of Petroleum and its predecessors. ||
|-id=412
| 10412 Tsukuyomi || || Tsukuyomi-no-mikoto, the Japanese god of night and the moon, was born from the right eye of the god Izanami no kami (Izanaki). It is said that he made his older sister, the goddess Amaterasu, very angry and caused the separate appearance of the sun in the day and the moon at night. ||
|-id=413
| 10413 Pansecchi || || Luigi Pansecchi (born 1940) has made fine studies of cometary tails. As a member of the Gruppo Astrofili Giovanni e Angelo Bernasconi and of the Italian Astronomical Society, he collaborated with the Osservatorio San Vittore in Bologna and with the Osservatorio Astronomico of Brera in Milan. ||
|-id=415
| 10415 Mali Lošinj || || Mali Lošinj, Croatian island and city, known for the nautical school and the Leo Brenner Astronomical Society ||
|-id=416
| 10416 Kottler || || Herbert Kottler (born 1939), MIT Lincoln Laboratory associate director in 1984–1996. ||
|-id=421
| 10421 Dalmatin || || Herman Dalmatin (Hermanus Dalmata), 12th-century Croatian translator of astronomical and mathematical Arabic books ||
|-id=423
| 10423 Dajčić || 1999 BB || Mario Dajčić (1923–1991), Croatian amateur astronomer, telescope builder and educator, founder of the Astronomical Society of Pula ||
|-id=424
| 10424 Gaillard || || Boris Gaillard (born 1976) is an amateur astronomer and software engineer. ||
|-id=425
| 10425 Landfermann || || Dietrich Wilhelm Landfermann (1800–1882), a German educator, who emphasized classical languages as a base for humanism in science and society, notably at the Landfermann-Gymnasium in Duisburg, Germany ||
|-id=426
| 10426 Charlierouse || || Charles (Charlie) Rouse (1924–1988), an American jazz tenor saxophonist. ||
|-id=427
| 10427 Klinkenberg || 2017 P-L || Dirk Klinkenberg, Dutch mathematician and astronomer, discoverer of several comets † ||
|-id=428
| 10428 Wanders || 2073 P-L || Adriaan Wanders (1903–1984), Dutch astronomer and author. He notably studied sunspots. ||
|-id=429
| 10429 van Woerden || 2546 P-L || Hugo van Woerden (born 1926), Dutch astronomer who studied neutral hydrogen in galaxies ||
|-id=430
| 10430 Martschmidt || 4030 P-L || Maarten Schmidt, Dutch-born American astronomer ||
|-id=431
| 10431 Pottasch || 4042 P-L || Stuart R. Pottasch (born 1932), American astrophysics professor and expert on planetary nebulae ||
|-id=432
| 10432 Ullischwarz || 4623 P-L || Ulrich Schwarz (born 1932), Dutch radio astronomer ||
|-id=433
| 10433 Ponsen || 4716 P-L || Jaap Ponsen (1931–1961), Dutch astronomer on variable stars, who observed at the Leiden Southern Station in South Africa ||
|-id=434
| 10434 Tinbergen || 4722 P-L || Jaap Tinbergen (born 1934), Dutch radio astronomer ||
|-id=435
| 10435 Tjeerd || 6064 P-L || Tjeerd van Albada (born 1936), Dutch astronomer ||
|-id=436
| 10436 Janwillempel || 6073 P-L || Jan Willem Pel (born 1943), Dutch astronomer and photometrist, project leader for a spectrograph on the VLT ||
|-id=437
| 10437 van der Kruit || 6085 P-L || Pieter van der Kruit (born 1944), Dutch radio astronomer ||
|-id=438
| 10438 Ludolph || 6615 P-L || Ludolph van Ceulen (1540–1610), Dutch mathematician who calculated the value of Pi to 35 decimal places ||
|-id=439
| 10439 van Schooten || 6676 P-L || Frans van Schooten (1615–1660), Dutch mathematician ||
|-id=440
| 10440 van Swinden || 7636 P-L || Jean Henri van Swinden (1746–1823), Dutch mathematician and physicist ||
|-id=441
| 10441 van Rijckevorsel || 9076 P-L || Elie van Rijckevorsel (1845–1928), who collaborated on the first geomagnetic survey in the Netherlands ||
|-id=442
| 10442 Biezenzo || 4062 T-1 || Cornelis Biezenzo (1888–1975), Dutch physicist ||
|-id=443
| 10443 van der Pol || 1045 T-2 || Balthasar van der Pol, Dutch experimental physicist † ||
|-id=444
| 10444 de Hevesy || 3290 T-2 || George de Hevesy, Hungarian chemist † ||
|-id=445
| 10445 Coster || 4090 T-2 || Dirk Coster, Dutch chemist and co-discoverer of the element Hafnium † ||
|-id=446
| 10446 Siegbahn || 3006 T-3 || Kai Siegbahn, Swedish physicist, winner of the 1981 Nobel Prize in physics. ||
|-id=447
| 10447 Bloembergen || 3357 T-3 || Nicolaas Bloembergen, Dutch physicist, winner of the 1981 Nobel Prize in physics † ||
|-id=448
| 10448 Schawlow || 4314 T-3 || Arthur Leonard Schawlow, American physicist, winner of the 1981 Nobel Prize in Physics. ||
|-id=449
| 10449 Takuma || 1936 UD || Hitoshi Takuma (born 1949), an active solar observer in Japan. ||
|-id=450
| 10450 Girard || 1967 JQ || Terrence Girard (born 1957), American astronomer ||
|-id=452
| 10452 Zuev || || Vladimir Evseevich Zuev (born 1925), a professor at Tomsk University, is a scientist in the field of atmospheric physics and a pioneer in laser sounding methods. ||
|-id=453
| 10453 Banzan || || Kumazawa Banzan (1619–1691), a Confucian scholar in the Edo period. ||
|-id=454
| 10454 Vallenar || 1978 NY || Vallenar, capital of the Chilean province of Huasco, is located some 90 km north of the La Silla observatory site. ||
|-id=455
| 10455 Donnison || || John Donnison (born 1948), British astronomer ||
|-id=456
| 10456 Anechka || || Anya (Anechka) Ivanchenko (1987–1999), daughter of a friend of the discoverer Nikolai Chernykh ||
|-id=457
| 10457 Suminov || || Vyacheslav Mikhailovich Suminov (born 1932), a professor and head of the faculty at the Moscow Aviation-Technological Institute. ||
|-id=458
| 10458 Sfranke || || Sigbrit Franke (born 1942), Swedish educator ||
|-id=459
| 10459 Vladichaika || || Vladimir Dmitrievich Chaika, Ukrainian naval architect ||
|-id=460
| 10460 Correa-Otto || || Jorge Correa-Otto (born 1981) is an Argentine astronomer at San Juan National University performing dynamical studies of the solar system and planetary systems around binary stars. ||
|-id=461
| 10461 Dawilliams || 1978 XU || David Allen Williams (born 1966), an associate research professor in Earth & Space Exploration at Arizona State University ||
|-id=462
| 10462 Saxogrammaticus || 1979 KM || Saxo Grammaticus (c.1150–1220) was secretary to Bishop Absalon, the founder of Copenhagen. He is the author of the comprehensive Gesta Danorum (Deeds of the Danes), written in elegant Latin prose. It extends until 1190 and is a major source of knowledge about the eventful early history of this northern people and their rulers. ||
|-id=463
| 10463 Bannister || || Michele Bannister (born 1986) is a postdoctoral research fellow at Queen's University Belfast whose work includes surveys to discover and characterize trans-Neptunian objects. ||
|-id=464
| 10464 Jessie || 1979 SC || Jessica Lynne Peterson, from Harvard MA, (1994–2009), loved for her smile and kind spirit. ||
|-id=465
| 10465 Olkin || || Catherine B. Olkin (born 1966) is a researcher at Southwest Research Institute (Boulder, Colorado), Deputy Project Scientist for the New Horizons mission and Deputy Principal Investigator for the Lucy mission. Her studies include stellar occultations, color compositional analysis of the Pluto system, and the study of Trojans. ||
|-id=466
| 10466 Marius-Ioan || || Marius-Ioan Piso (born 1954) is President of the Romanian Space Agency (ROSA) and a leading advocate for space research in Romania. Over two decades he orchestrated the process of Romania becoming a member of the European Space Agency. ||
|-id=467
| 10467 Peterbus || || Peter Bus (1951–2016) was a Dutch amateur astronomer and founding member of the Dutch Comet Section of the Royal Dutch Association for Meteorology and Astronomy who was dedicated to the observation of comets and meteor showers. ||
|-id=468
| 10468 Itacuruba || || Itacuruba (Nova Itacuruba), a town in Pernambuco, Brazil, and location of the Observatório Astronômico do Sertão de Itaparica (OASI). The original city was flooded in 1988 in forming Itaparica Lake. ||
|-id=469
| 10469 Krohn || || Katrin Krohn (born 1984) is a researcher at the German Aerospace Center (DLR-Berlin) studying cryogenic flow features and cryovolcanism on Ceres using Dawn spacecraft data. ||
|-id=470
| 10470 Bartczak || || Przemysł aw Bartczak (born 1974) is a researcher at the Astronomical Observatory of the Adam Mickiewic University in Poznan, Poland who studies asteroid lightcurve inversion techniques that yield both convex and non-convex shape and spin solutions. ||
|-id=471
| 10471 Marciniak || || Anna Marciniak (born 1979) is a Polish researcher at the Poznań Observatory of the Adam Mickiewicz University in Poznań, studying the spin and shape properties of long-period main-belt asteroids. ||
|-id=472
| 10472 Santana-Ros || || Toni Santana-Ros (born 1984) is a postdoctoral researcher at the Astronomical Observatory of the Adam Mickiewic University in Poznan, Poland where he performs photometric measurements of small bodies in support of the Gaia mission. ||
|-id=473
| 10473 Thirouin || || Audrey Thirouin (born 1984) is a researcher at the Lowell Observatory who performs photometric measurements of trans-Neptunian objects investigating differences in binary and non-binary populations. ||
|-id=474
| 10474 Pecina || || Petr Pecina (born 1950) is a retired astronomer from the Czech Academy of Sciences known for studies of meteoroid interaction with planetary atmospheres, including analytical solutions for meteoroid deceleration and ablation. ||
|-id=475
| 10475 Maxpoilâne || || Max Poilâne (born 1941) is a well-known Parisian boulanger who is also an enthusiast and supporter of astronomy and space exploration. ||
|-id=476
| 10476 Los Molinos || || The Los Molinos Observatory located north of Montevideo, Uruguay. It is actively involved in follow-up observations of asteroids and comets. ||
|-id=477
| 10477 Lacumparsita || || The song La cumparsita, one of the most famous and recognizable tangos of all time. It was played for the first time in 1917 in Montevideo, site of the 2017 Asteroids Comets Meteors conference. ||
|-id=478
| 10478 Alsabti || 1981 WO || Abdul Athem Alsabti (born 1945) introduced astronomy teaching into Iraq in 1970, was project leader in building the National Astronomical Observatory. ||
|-id=479
| 10479 Yiqunchen || 1982 HJ || Yiqun Chen (born 1968) was born in Beijing and is a traditionally trained artist and sculptor, with art pieces installed in several parks in China. She currently applies her experience in production of computer-generated animation ||
|-id=480
| 10480 Jennyblue || || Jennifer S. Blue (born 1954), of the U.S. Geological Survey, Flagstaff, Arizona, has been the sine qua non of the IAU Working Group on Planetary System Nomenclature since 1995, serving both as its secretary and as the keeper of the Gazetteer of Planetary Nomenclature ||
|-id=481
| 10481 Esipov || || Valentin Feodorovich Esipov (born 1933), head of the radioastronomy department at the Sternberg Astronomical Institute, Moscow University. ||
|-id=482
| 10482 Dangrieser || || Daniel Grieser (1926–1999), an optical engineer with Battelle Memorial Institute in Columbus, Ohio. ||
|-id=483
| 10483 Tomburns || || Under the leadership of Tom Burns (born 1952) since 1993, the Perkins Observatory began a new life as the premier public astronomy venue in central Ohio. With his weekly newspaper column and visits to area schools Burns has inspired and educated thousands of people. ||
|-id=484
| 10484 Hecht || 1983 WM || For more than a decade, Martin D. Hecht (born 1926) has volunteered to help organize the Lowell Observatory's archives. ||
|-id=487
| 10487 Danpeterson || || Dan Peterson (born 1949), a juvenile probation director who works with troubled youth to keep them in school and help them find direction in their lives. He served previously as a smoke jumper in Alaska and is a piano player extraordinaire. ||
|-id=489
| 10489 Keinonen || || Juhani Keinonen (born 1946), an emeritus professor and a long-serving director of the Department of Physics, University of Helsinki. ||
|-id=498
| 10498 Bobgent || || Robert Gent (born 1947), an enthusiastic amateur astronomer and International Dark-Sky Association volunteer. ||
|-id=500
| 10500 Nishi-koen || 1987 GA || Nishi-koen park is the location of the Sendai Astronomical Observatory, which is celebrating its fiftieth anniversary on 2005 Feb. 1. The observatory will be moved to near the Ayashi Station in 2008. ||
|}
10501–10600
|-
| 10501 Ardmacha || 1987 OT || The Irish Gaelic name of the city of Armagh in Northern Ireland † ||
|-id=502
| 10502 Armaghobs || || Armagh Observatory, Ireland † ||
|-id=503
| 10503 Johnmarks || || John D. Marks (born 1943), an American political writer, founder and former president of Search for Common Ground (SFCG), an international non-profit organization. SFCG works to end violent conflicts seeking a peaceful resolutions via person-to-person interactions. ||
|-id=504
| 10504 Doga || || Eugenij Dmitrievich Doga (born 1937), a Russian composer who has written music for many popular movies. ||
|-id=505
| 10505 Johnnycash || || Johnny Cash (1932–2003), an American singer, songwriter, musician, and actor, nicknamed "The Man in Black" for his trademark all-black stage wardrobe. ||
|-id=506
| 10506 Rydberg || || Johannes Rydberg, 19th–20th-century Swedish physicist, after whom the Rydberg constant is named ||
|-id=509
| 10509 Heinrichkayser || || Heinrich Gustav Johannes Kayser, 19th–20th-century German physicist who demonstrated the presence of helium in the Earth's atmosphere ||
|-id=510
| 10510 Maxschreier || || Max Schreier (1907–1997), Austrian-born Bolivian astronomer, founder of observatories in Santa Ana and Patacamaya, and author of Einstein desde los Andes de Bolivia ||
|-id=512
| 10512 Yamandu || || Yamandu Alejandro Fernandez (1927–2010) was a Uruguayan amateur astronomer and communicator who was well known as a telescope builder and observer of variable stars, stellar occultations, novae and comets. ||
|-id=515
| 10515 Old Joe || || "Old Joe" is the students' name for the Joseph Chamberlain Clock Tower at the University of Birmingham, which received its charter in 1900 and is now celebrating its centenary. Birmingham, England's "second city", prospered from metal-working trades, from which enlightened industrialists founded the university. ||
|-id=516
| 10516 Sakurajima || 1989 VQ || Mount Sakurajima, a volcano on the southern tip of Kyūshū, Kagoshima prefecture, Japan. It is said that it "changes colour seven times a day" † ||
|-id=523
| 10523 D'Haveloose || || José D´Haveloose (1922–1996), a surgeon in the West Flanders town of Tielt. ||
|-id=524
| 10524 Maniewski || || Jan Maniewski (born 1933), a medical doctor in Antwerp. ||
|-id=526
| 10526 Ginkogino || || Ginko Ogino (1851–1913) a Japanese physician, who became the first registered woman doctor in Japan. ||
|-id=529
| 10529 Giessenburg || || Rudolf Charles d'Ablaing van Giessenburg (1826–1904), a Dutch writer, freemason and editor, will always be remembered for the first complete edition (1864) of Le Testament de Jean Meslier, Curé d´Etrépigny (1727). ||
|-id=538
| 10538 Torode || || In a 1992 study of 170 astrolabes, British industrial chemist Rowland K. E. Torode (born 1923) measured the ecliptic longitudes of the stars depicted and thereby determined, with allowance for precession, the ages of the instruments. He was also secretary of the Kidderminster Astronomical Society for several years. ||
|-id=540
| 10540 Hachigoroh || || Hachigoroh Kikuchi (1926–1999) was the executive committee chief of the Haramura star party and was instrumental in getting it started. ||
|-id=541
| 10541 Malesherbes || 1991 YX || Guillaume-Chrétien de Lamoignon de Malesherbes (1721–1794), a botanist and a French statesman. As chancellor he controlled the press, yet without his secret support the Encyclopédie, representing the thought of the Enlightenment, may never have been published. He was guillotined for his defense of King Louis XVI. ||
|-id=542
| 10542 Ruckers || || Hans Ruckers (1555–1623) was the most famous of all harpsichord makers and founder of a dynasty of Flemish instrument makers. His earliest (1581) known instrument is a virginal with two independent keyboards, now in New York City. These instruments were so prized that they were often rebuilt, enlarged and copied. ||
|-id=543
| 10543 Klee || || Paul Klee (1879–1940), a Swiss painter and graphic artist. ||
|-id=544
| 10544 Hörsnebara || || Hörsne and Bara Gotland parishes, Sweden, joined to become a single parish in 1883 ||
|-id=545
| 10545 Källunge || || Källunge is a small parish on Gotland. The architecture of the church, the only one on the island of its kind, is very strange ||
|-id=546
| 10546 Nakanomakoto || || Makoto Nakano (born 1956), an associate professor in the Faculty of Education and Welfare Science at Oita University. ||
|-id=547
| 10547 Yosakoi || 1992 JF || Yosakoi, a popular Japanese folk song about the forbidden love between a monk and a girl ||
|-id=549
| 10549 Helsingborg || || Helsingborg, Sweden. ||
|-id=550
| 10550 Malmö || || Malmö, Sweden. ||
|-id=551
| 10551 Göteborg || || Gothenburg, Sweden. ||
|-id=552
| 10552 Stockholm || || Stockholm, Sweden. ||
|-id=553
| 10553 Stenkumla || || Stenkumla is a small parish on the island Gotland. The oldest parts of its church date from the twelfth century ||
|-id=554
| 10554 Västerhejde || || Västerhejde socken on Gotland, Sweden. ||
|-id=555
| 10555 Tagaharue || 1993 HH || Harue Taga (born 1951), astronomy curator of Chiba Municipal Planetarium. ||
|-id=557
| 10557 Rowland || || Henry Augustus Rowland (1848–1901), American astronomer and first president of the American Physical Society, known for his high-quality diffraction gratings. ||
|-id=558
| 10558 Karlstad || || Karlstad, Sweden. ||
|-id=559
| 10559 Yukihisa || || Yukihisa Matsumoto (born 1962), a former researcher of the Nishi Mino Observatory. ||
|-id=560
| 10560 Michinari || 1993 TN || Michinari Yamamoto (born 1970), a researcher at Ayabe City Observatory. ||
|-id=561
| 10561 Shimizumasahiro || || Masahiro Shimizu (born 1956), the president of the Shimizu Clinic. ||
|-id=563
| 10563 Izhdubar || 1993 WD || Izhdubar, an ancient Chaldean sun-god. ||
|-id=566
| 10566 Zabadak || || Zabadak is a name of a Japanese music group that is led by Tomohiko Kira. ||
|-id=567
| 10567 Francobressan || 1994 CV || Franco Bressan (born 1947), an Italian mathematics teacher and amateur astronomer. ||
|-id=568
| 10568 Yoshitanaka || || Yoshiji Tanaka (1948–2003), a Japanese science magazine editor instrumental in starting the Haramura star party. ||
|-id=569
| 10569 Kinoshitamasao || 1994 GQ || [Masao Kinoshita (born 1949) discovered that the number of radio-meteor echoes decreases as the radiant approaches the meridian. This is widely known as the Kinoshita effect. ||
|-id=570
| 10570 Shibayasuo || 1994 GT || Yasuo Shiba (born 1961), a Japanese data manager of the Japan Meteor Society, specializing in fireballs ||
|-id=572
| 10572 Kominejo || || Kominejo castle, in Sirakawa city, is famous as a place where observations were made of the 1887 Aug. 19 total solar eclipse, the track of which passed across the center of Japan ||
|-id=573
| 10573 Piani || || Franco Piani (born 1955), Italian amateur astronomer, is the most experienced and agreeable proponent of astronomy at the CCAF observatory in Farra d'Isonzo. He takes care of all mechanical aspects of the instruments and has participated in most of the new discoveries of this site. ||
|-id=577
| 10577 Jihčesmuzeum || 1995 JC || Jihočeské muzeum (The South Bohemian Museum) was established in České Budějovice in 1877. It is well known for its naturalistic, art, historical and archaeological collections, including moldavites, glass and a horse railway museum. Important are its cultural and scientific roles. ||
|-id=579
| 10579 Diluca || 1995 OE || Roberto Di Luca (born 1959), amateur observer of lunar and asteroidal occultations, is network manager at the Astronomical Observatory of the University of Bologna. As a member of the Associazione Astrofili Bolognesi, he often collaborates with the group at the Osservatorio San Vittore in Bologna. ||
|-id=581
| 10581 Jeníkhollan || || Jeník Hollan (born 1955), a Czech astronomer and environmentalist at the Brno Observatory, has deeply influenced many students and observers, including the discoverer. Sometimes in unorthodox ways, he makes a point of teaching his students to examine the most substantial points. ||
|-id=582
| 10582 Harumi || 1995 TG || Harumi Ikari (born 1957), wife of Japanese astronomer Yasukazu Ikari, who discovered this minor planet. ||
|-id=583
| 10583 Kanetugu || || Kanetugu Naoe (1560–1619) was a Japanese military commander during the Japanese feudal period. He was on the side of the Toyotomis, and in the decisive battle of 1600 he fought against Yoshiaki Mogami, the lord of Yamagata (a part of present Yamagata Prefecture), who stood by the Tokugawas. ||
|-id=584
| 10584 Ferrini || || Federico Ferrini, Italian physicist and professor of astronomical techniques at the University of Pisa. He has published more than 100 scientific papers in major astronomical journals. These cover many subjects in modern theoretical astrophysics, among them planetology, star formation, the interstellar medium, galactic evolution and its cosmological effects. He is responsible for the Italian light pollution commission and is coordinator of the Mediterranean Astronomical Network. ||
|-id=585
| 10585 Wabi-Sabi || || Wabi-sabi is the quintessential Japanese aesthetic. Valued are one-of-a-kind objects of natural materials in the private domain, showing a sense of the "rustic" and of simplicity, as well as functional sufficiency in the face of material poverty, obvious repair, or age. The name was suggested by J. Montani. ||
|-id=586
| 10586 Jansteen || || Jan Havickszoon Steen (1626–1679) was a Dutch genre painter during the Dutch Golden Age. He is well known for his sense of humor, psychological insight and the abundance of color in his paintings. The name was suggested by W. Fröger. ||
|-id=587
| 10587 Strindberg || || August Strindberg (1849–1912), a Swedish playwright and novelist, made important contributions to the naturalistic, symbolic and expressionistic theater. His works include Röda Rummet ("The Red Room", 1879), Fröken Julie ("Miss Julie", 1888) and Dödsdansen ("The Dance of Death", 1900). ||
|-id=588
| 10588 Adamcrandall || 1996 OE || Adam Crandall Rees (born 1960), stepson of the discoverer, Paul G. Comba. ||
|-id=591
| 10591 Caverni || || Raffaello Caverni (1837–1900), an Italian priest born in Montelupo, was also an amateur scientist. He wrote many books, the most important of them being Storia del Metodo Sperimentale in Italia, for which he received the award of the Royal Institute of Venice on 25 May 1890. ||
|-id=593
| 10593 Susannesandra || || Susanne Sandness (born 1956), wife of American amateur astronomer Robert G. Sandness, who discovered this minor planet. ||
|-id=596
| 10596 Stevensimpson || 1996 TS || For two decades the graphic innovations of Steven Simpson (born 1958), especially those involving star charts, have allowed (Sky & Telescope) readers to understand the universe better, whether they do so by locating planets in a starry sky or by visualizing the inner workings of atoms. ||
|-id=598
| 10598 Markrees || || Mark B. Rees (born 1963), stepson of the discoverer, Paul G. Comba ||
|}
10601–10700
|-
| 10601 Hiwatashi || 1996 UC || Kenji Hiwatashi, electrical engineer at NHK (Japan Broadcasting Corporation) from 1947 to 1979. ||
|-id=602
| 10602 Masakazu || || Masakazu Kusakabe (born 1946) is a ceramic artist, best known for his design of the Smokeless Wood Fire Kiln. ||
|-id=604
| 10604 Susanoo || 1996 VJ || Susanoo-no-mikoto is the Japanese god of heroes and the ancestor soul and a younger brother of the goddess Amaterasu. ||
|-id=605
| 10605 Guidoni || || Umberto Guidoni, Italian astronaut † ||
|-id=606
| 10606 Crocco || || Gaetano Arturo Crocco, Italian pioneer of aeronautics and space science † ||
|-id=607
| 10607 Amandahatton || || Amanda H. Hatton, the discoverer's stepdaughter. ||
|-id=608
| 10608 Mameta || || Katsuhiko Mameta (born 1958) is one of Japan's top meteor observers. He is an active amateur astronomer who has been secretary of the Astronomical Society of Hyogo since 2000. ||
|-id=609
| 10609 Hirai || || Yuzo Hirai, a professor at the Institute of Information Sciences and Electronics. ||
|-id=611
| 10611 Yanjici || || Yan Jici (1901–1996) was a renowned physical scientist and educator, and a member of the Chinese Academy of Sciences. He was one of the Chinese pioneers of physics research, one of the founders of optical instrument development and was President of the University of Science and Technology of China from 1980 to 1984 ||
|-id=612
| 10612 Houffalize || || Houffalize, Belgium, on the Ourthe River ||
|-id=613
| 10613 Kushinadahime || || Kushinadahime, the mythical empress of the god Susanoo-no-mikoto, was offered as a sacrifice to the giant snake Yamata-no-orochi but was saved by the god Susanoo ||
|-id=616
| 10616 Inouetakeshi || || Takeshi Inoue (born 1969) is astronomy curator of Akashi Municipal Planetarium, where he has been engaged in popularizing astronomy since 1997 ||
|-id=617
| 10617 Takumi || || Amateur astronomer Takumi Takahata (born 1941) has created many computer programs that are used for astronomical calculations. The "measurescope" Takumi lent to the discoverers was used to determine the coordinates of this minor planet ||
|-id=619
| 10619 Ninigi || || According to the Japanese myth, the god Ninigi-no-mikoto is a grandson of the goddess Amaterasu. By the order of Amaterasu he descended from the heaven Takamagahara to the peak Takachiho to dominate the land ||
|-id=626
| 10626 Zajíc || || Jan Zajíc (born 1910), founder and for a long time director of the observatory in Vlašim, has brought astronomy to many young people. In spite of many problems, this public observatory is currently one of the most active in the Czech Republic. The naming is on the occasion of Zají c's 90th birthday ||
|-id=627
| 10627 Ookuninushi || || The mythical Japanese god Ookuninushi-no-mikoto created the land, together with the god Sukunabikona-no-mikoto. The name means "king of great land" and is a frequent reference in literature and folklore. A well-known story is that he helped a white rabbit skinned by a shark as the retribution for trickery ||
|-id=628
| 10628 Feuerbacher || || Berndt Feuerbacher (born 1940), a German physicist, was for two decades head of the Institute of Space Simulation at the German Aerospace Center in Cologne. His institute has performed pioneering research work in space. He initiated the development of the comet lander Philae as part of the European Space Agency's Rosetta mission. ||
|-id=633
| 10633 Akimasa || || Akimasa Nakamura (born 1961) is a prolific Japanese observer of minor planets and comets. In the course of his observing program at the Kuma Kogen Astronomical Observatory he has obtained thousands of precise positions of minor bodies. His estimates of the magnitudes of minor planets are of particularly high quality and serve as the standard in the analysis of "astrometric" magnitude estimates. He is also Japanese coordinator for the International Comet Quarterly. This name marks the occasion of Nakamura's becoming a father in early 1999 ||
|-id=634
| 10634 Pepibican || || Josef "Pepi" Bican (1913–2001), a Czech footballer who represented Austria in 19 and Czechoslovakia in 14 international matches and scored more than 5000 goals in his career. He is considered one of the best center-forward of the century by the International Federation of Soccer Historians and Statisticians. After retirement, Bican developed an interest in astronomy. ||
|-id=637
| 10637 Heimlich || || Henry J. Heimlich is an American surgeon who in the early 1970s devised the "Heimlich maneuver", a potentially life-saving procedure for propelling food or other foreign objects up and out of the throat ||
|-id=638
| 10638 McGlothlin || || Gerald R. McGlothlin (born 1952) was responsible for refurbishing much of the LONEOS dome, turning a bare photographic darkroom into a modern control room and computer room. In his spare time he is a skilled potter ||
|-id=639
| 10639 Gleason || || Arianna Gleason (born 1980) is a student observer with the Spacewatch Project. She has been instrumental in the data reduction for two Spacewatch papers on the outer solar system and is a prolific discoverer of Near-Earth Objects ||
|-id=642
| 10642 Charmaine || || Charmaine Wilkerson (born 1962), wife of the first discoverer, Andrea Boattini, is an American-born writer and broadcaster. She has produced numerous reports on astronomical phenomena and missions. ||
|-id=645
| 10645 Brač || || Brač island, Croatia, home of the Pustinja Blaca Observatory ("Blaca Desert" Observatory) ||
|-id=646
| 10646 Machielalberts || 2077 P-L || Machiel Alberts (1909–) was the first astronomer in The Netherlands to succeed, with a home-built camera, to capture a meteor on film. He was actively engaged in meteor observations, as well as in building appliances and instruments for amateur astronomers to enable meteor photography and other types of meteor observation. ||
|-id=647
| 10647 Meesters || 3074 P-L || P. G. Meesters (1887–1964) was a Dutch amateur astronomer. He built his own observatory and was an active observer of variable stars. His book Mijn Sterrenwacht, Speurtochten langs het Firmament ("My observatory, exploring the skies") is still known by amateurs. ||
|-id=648
| 10648 Plancius || 4089 P-L || Petrus Plancius (1552–1622) was a Dutch theologian, astronomer, navigator and appointed cartographer to the new Dutch East India Company. Plancius depicted the 12 new southern constellations on a globe he constructed in 1598. ||
|-id=649
| 10649 VOC || 4098 P-L || Verenigde Oostindische Compagnie, Dutch for Dutch East India Company † ||
|-id=650
| 10650 Houtman || 4110 P-L || Frederick de Houtman, Dutch navigator who travelled to the East Indies in 1595 as assistant to Pieter Dirkszoon Keyser † ||
|-id=651
| 10651 van Linschoten || 4522 P-L || Jan Huyghen van Linschoten, Dutch cartographer and spy for the Dutch East India Company † ||
|-id=652
| 10652 Blaeu || 4599 P-L || Willem Janszoon Blaeu, Dutch cartographer and hydrographer for the Dutch East India Company † ||
|-id=653
| 10653 Witsen || 6030 P-L || Nicolaas Witsen, Dutch mayor of Amsterdam and member of the board of the Dutch East India Company † ||
|-id=654
| 10654 Bontekoe || 6673 P-L || Willem Ysbrandtszoon Bontekoe, Dutch East India Company skipper whose ship flew into a hundred thousand pieces on the way to the East Indies † ||
|-id=655
| 10655 Pietkeyser || 9535 P-L || Pieter Dirkszoon Keyser, Dutch navigator who travelled to the East Indies in 1595 with Frederik de Houtman as his assistant † ||
|-id=656
| 10656 Albrecht || 2213 T-1 || Carl Theodor Albrecht (1843–1915), German astronomer and geodesist, first director of the International Latitude Service. ||
|-id=657
| 10657 Wanach || 2251 T-1 || Bernhard Karl Wanach (1867–1928), a Latvian-born astronomer and geodesist, carried out pioneering work on polar motion with C. T. Albrecht, whom he succeeded as head of the International Latitude Service. ||
|-id=658
| 10658 Gretadevries || 2281 T-1 || Greta de Vries (1967–2006) was the assistant to the director of the Kapteyn Astronomical Institute in Groningen, when she tragically died while on holiday. She was a beloved key staff member of the institute ||
|-id=659
| 10659 Sauerland || 3266 T-1 || The Sauerland, a German rural region, has fairly high mountains, such as Kahler Asten at 840 m, and is partly a nature reserve. It lies just east of the German industrial Rhine-Ruhr region. The area is frequented by hikers during summer and by skiers and tobogganers during winter. ||
|-id=660
| 10660 Felixhormuth || 4348 T-1 || Felix Hormuth (born 1975), German astronomer ||
|-id=661
| 10661 Teutoburgerwald || 1211 T-2 || The Teutoburg Forest of Germany is famous because it was here, in 9 A.D., that Varus was defeated by Arminius, chief of the Cherusci, a Teutonic tribe. Today the precise place where the battle took place is to be found at the north side, not far from the city of Osnabrück. ||
|-id=662
| 10662 Peterwisse || 3201 T-2 || Peter Wisse, Dutch curator of the "Museon", the Dutch Center for educational exhibitions ||
|-id=663
| 10663 Schwarzwald || 4283 T-2 || The Black Forest (Schwarzwald) in Germany. It lies east of the Rhine river and extends from Basel as far as the city of Baden-Baden. Up to the timber line at about 1200 m, its vegetation consists mainly of fir and spruce. ||
|-id=664
| 10664 Phemios || 5187 T-2 || Phemios was a singer with Telemachos, forced to play for Penelope's suitors, spared by Odysseus for friendly deeds and because a singer is sacred ||
|-id=665
| 10665 Ortigão || 3019 T-3 || Catarina Ortigão (born 1974) is a person of rare inner beauty, to whom Pedro Lacerda, a colleague of the discoverers, would like to pay tribute. She is a Portuguese-born scientist working in the field of medical physics ||
|-id=666
| 10666 Feldberg || 4171 T-3 || The Feldberg is the highest mountain (1490 m) of the Schwarzwald. Winter and summer, its wonderful surrounding area attracts tourists, hikers and skiers ||
|-id=667
| 10667 van Marxveldt || 1975 UA || Cissy van Marxveldt (Setske de Haan), 19th–20th-century Dutch writer, author of the humorous Joop ter Heul novels for teenage girls; Anne Frank addressed her diary letters to an imaginary friend based on one of van Marxveldt's characters ||
|-id=668
| 10668 Plansos || || The discoverer's grandchildren: Pandora Mae Honiara (born 2000), Noël Richard (born 2000), Alexander Richard (born 2001), Orlando Harry Tengis (born 2002), Samuel Philip (born 2004), Salomé Olivia Lindsay (born 2005), Lidia Philipa (born 2007). The name is an anagram of the first name initials. ||
|-id=669
| 10669 Herfordia || 1977 FN || Herford, a town in what is sometimes called "Eastern Westfalia", is known for its numerous light industries and beautiful surrounding countryside. It was in Herford that Walter Baade, born in nearby Schröttinghausen, first realized his love of astronomy ||
|-id=670
| 10670 Seminozhenko || || Ukrainian physicist Vladimir Petrovich Seminozhenko (born 1950) is known for his research on the kinetics of excitation in superconductors and semiconductors and on high-temperature superconductivity ||
|-id=671
| 10671 Mazurova || || Ekaterina Yakovlevna Mazurova (1900–1995) was a Russian actress who worked in Moscow theaters and played many roles in films. In her youth and at the beginning of her artistic career she was connected with the town of Shuya, and she gave to the museum in Shuya her collection of more than 1000 pieces of Russian and foreign art ||
|-id=672
| 10672 Kostyukova || 1978 QE || Tatiana Andreevna Kostyukova (born 1957) is a botanist and cultivator of flowers in Kiev. Her collection of flowers won a diploma at the 2001 Moscow Autumn Flower Show ||
|-id=673
| 10673 Berezhnoy || || Alexey A. Berezhnoy (born 1972) is a Russian chemist and astronomer at Moscow State University studying chemical processes during the interaction of meteoroids with planetary atmospheres and surfaces, including the lunar exosphere. ||
|-id=674
| 10674 de Elía || || Gonzalo Carlos de Elía (born 1977) is an Argentine astronomer at La Plata National University who studies the formation and evolution of planetary systems. ||
|-id=675
| 10675 Kharlamov || || Valerij Borisovich Kharlamov (1948–1981) was an outstanding Russian ice hockey player. As a team member he repeatedly won world championships and was champion of the Olympic Games in 1972 and 1976 ||
|-id=676
| 10676 Jamesmcdanell || || James P. McDanell (born 1937) spent nearly three decades with the Jet Propulsion Laboratory before retiring in 1999. He was the Voyager Navigation Team Chief during the highly successful encounters with Saturn and its satellites. He subsequently became manager of the Navigation Systems Section ||
|-id=677
| 10677 Colucci || || Adrian Rodriguez Colucci (born 1978) is an astronomer at the Valongo Observatory of Rio de Janeiro, Brazil. He is a specialist in tidal evolution of planets and small bodies. ||
|-id=678
| 10678 Alilagoa || || Victor Alí-Lagoa (born 1983) is a Spanish astronomer whose PhD research at the Instituto de Astrofísica de Canarias focused on the thermal properties of small bodies. ||
|-id=679
| 10679 Chankaochang || || Chan-Kao "Rex" Chang (born 1976) is a researcher at the National Central University of Taiwan whose work includes searching for fast-rotating asteroids in Palomar Transient Factory survey data and rotation rate distribution studies. ||
|-id=680
| 10680 Ermakov || || Anton Ermakov (born 1988) is a postdoctoral researcher at the California Institute of Technology who studies the gravity and interior structures of Vesta and Ceres using Dawn spacecraft data. ||
|-id=681
| 10681 Khture || || The Kharkiv Technical University of Radioelectronics, founded in 1930, is a recognized school of specialists in radioelectronics, computer science, telecommunication, metrology and biotechnical and medical systems. Khture is also known for its time service and for radioastronomical research on meteors ||
|-id=683
| 10683 Carter || 1980 LY || Carter Worth Roberts (born 1946), president of the Eastbay Astronomical Society, is known for superlative dabbling in photography and puns and his ability to fix things. He collaborated on a safe solar-eclipse-viewing booklet and helped restore "Rachel", the 0.5-m Brashear refractor for the Chabot Space and Science Center ||
|-id=684
| 10684 Babkina || || Nadezhda Georgievna Babkina (born 1950) is a People's artist of Russia and the artistic director of the ensemble "Russian song" ||
|-id=685
| 10685 Kharkivuniver || 1980 VO || V. N. Karazin Kharkiv National University (В. Н. Каразіна Харківський Національний Університет) of Ukraine ||
|-id=686
| 10686 Kaluna || || Heather Kaluna (born 1984) is a researcher at the University of Hawaii studying the evolution of water in carbonaceous asteroids as well as space weathering processes. ||
|-id=688
| 10688 Haghighipour || 1981 DK || Nader Haghighipour (born 1967) is a professor at the University of Hawaii specializing in solar system dynamics as well as extrasolar planets. His service includes President of IAU Division F (Planetary Sciences and Astrobiology) for the period 2015–2018. ||
|-id=689
| 10689 Pinillaalonso || || Noemi Pinilla-Alonso (born 1971) is a planetary scientist at the Florida Space Institute and an expert in the study of surface compositions of minor solar system bodies using observational techniques and modeling. ||
|-id=690
| 10690 Massera || || José Luis Massera (1915–2002), a Uruguayan mathematician who studied the stability of differential equations. Massera's Lemma solves the equilibrium stability problem in nonlinear differential equations in terms of the Lyapunov function. ||
|-id=691
| 10691 Sans || || Juan Diego Sans (1922–2005) was a Uruguayan professor and public communicator of astronomy at the Universidad de la Republica. He was co-founder of the Asociación de Aficionados a la Astronomía and president of the Sociedad Uruguaya de Astronomía. ||
|-id=692
| 10692 Opeil || || Cyril P. Opeil SJ (born 1960) is a professor at Boston College studying the thermal properties of meteorites to improve understanding of orbital and rotational changes caused by the re-radiation of solar flux. ||
|-id=693
| 10693 Zangari || || Amanda M. Zangari (born 1986) is a postdoctoral researcher at Southwest Research Institute (Boulder, Colorado) whose studies include photometry and stellar occultations of the Pluto system and other Kuiper belt objects. ||
|-id=694
| 10694 Lacerda || || Pedro Lacerda (born 1975) is a lecturer at Queen's University Belfast whose work includes analyzing rotational lightcurves to infer physical properties of trans-Neptunian objects and other small solar system bodies. ||
|-id=695
| 10695 Yasunorifujiwara || || Yasunori Fujiwara (born 1957) is a pioneer of meteor video observations in Japan known for his study of the Leonid meteor stream. ||
|-id=696
| 10696 Giuliattiwinter || || Silvia Maria Giuliatti Winter (born 1965) is a Brazilian astronomer at the São Paulo State University working on ring dynamics and the dynamics of the Pluto system. ||
|-id=697
| 10697 Othonwinter || || Othon Cabo Winter (born 1963) is a Brazilian astronomer at the São Paulo State University researching orbital dynamics with application to the stability of multiple asteroid systems. ||
|-id=698
| 10698 Singer || || Kelsi N. Singer (born 1984) is a postdoctoral researcher at Southwest Research Institute (Boulder, Colorado) studying outer solar system icy satellites and the Kuiper belt population through the crater size distribution revealed by the New Horizons mission to the Pluto system. ||
|-id=699
| 10699 Calabrese || || Pietro Calabrese (1944–2010) was editor of the Italian newspapers Il Messaggero and La Gazzetta dello Sport. A noted journalist, he was fascinated by the idea of communicating with extraterrestrial intelligence. ||
|-id=700
| 10700 Juanangelviera || || Juan Angel Viera (1925–2012) was an amateur astronomer, high-school teacher in astronomy and a communicator in Uruguay. He was Honorary President and co-founder of the Asociación de Aficionados a la Astronomía. ||
|}
10701–10800
|-
| 10701 Marilynsimons || 1981 PF || Marilyn Hawrys Simons (born 1951) is an American economist and philanthropist. She is Chair of the board of Cold Spring Harbor Laboratory, and founded the Stony Brook Women's Leadership Council. She is the president of the Simons Foundation, co-founded with her husband James, that supports math and science research. ||
|-id=702
| 10702 Arizorcas || 1981 QD || The Arizona Orchestra Association represents Arizona's forty-one orchestras. ||
|-id=707
| 10707 Prunariu || || Dumitru Prunariu (born 1952 ) became the first Romanian cosmonaut flying in 1981 aboard Soyuz 40 to the Salyut 6 space laboratory. He is one of the proposal initiators for International Asteroid Day (June 30) declared by the UN General Assembly. ||
|-id=708
| 10708 Richardspalding || || Richard Spalding (born 1935) is an engineer at Sandia National Laboratories whose satellite projects include the detection of Gamma Ray Bursts and transient atmospheric phenomena generated by lightning and meteors. ||
|-id=709
| 10709 Ottofranz || || Otto G. Franz (born 1931), a Lowell Observatory astronomer. ||
|-id=711
| 10711 Pskov || || Pskov, a Russian city on the Velikaya River near the Estonian border ||
|-id=712
| 10712 Malashchuk || || Valentina Mikhailovna Malashchuk (born 1947), accountant general of the Crimean Astrophysical Observatory ||
|-id=713
| 10713 Limorenko || || Leonid Pavlovich Limorenko (born 1951), assistant director of the Crimean Astrophysical Observatory. ||
|-id=715
| 10715 Nagler || || Al Nagler (born 1935), an optical designer involved in NASA's Gemini and Apollo missions ||
|-id=716
| 10716 Olivermorton || 1983 WQ || Oliver Morton (born 1965) writes about the growth of scientific knowledge and its consequences, with a particular interest in planetary science and the interdisciplinary perspective that it offers. ||
|-id=717
| 10717 Dickwalker || 1983 XC || Richard Walker (a.k.a. Dick Walker; 1938–2005), American astronomer at USNO and discoverer of Epimetheus ||
|-id=718
| 10718 Samus' || || Nikolaj Nikolaevich Samus' (born 1949) is a scientist in stellar astrophysics at the Institute of Astronomy of the Russian Academy of Sciences and Moscow University. ||
|-id=719
| 10719 Andamar || 1985 TW || Anne Marren (born 1944) and David Marren (born 1953), friends of American discoverer Edward L. G. Bowell ||
|-id=720
| 10720 Danzl || 1986 GY || Nichole M. Danzl, American amateur astronomer, former Spacewatch Observer and discoverer of minor planets ||
|-id=721
| 10721 Tuterov || || Vladimir Lukich Tuterov (born 1960), a splendid builder, is a friend of the discoverer's family. ||
|-id=722
| 10722 Monari || 1986 TB || Luisa Monari (born 1961), wife of Italian co-discoverer Ermes Colombini ||
|-id=724
| 10724 Carolraymond || || Carol A. Raymond (born 1960), a scientist at the Jet Propulsion Laboratory ||
|-id=725
| 10725 Sukunabikona || 1986 WB || Sukunabikona, the Japanese god of a naughty character ||
|-id=726
| 10726 Elodie || || Élodie Bouteille (born 1990), a French student at the Lycée Diderot ||
|-id=727
| 10727 Akitsushima || 1987 DN || Jinmu (Akitsushima), the first emperor of Japan according to legend ||
|-id=728
| 10728 Vladimirfock || || Vladimir Fock (1898–1974), a Russian physicist ||
|-id=729
| 10729 Tsvetkova || || Valentina Petrovna Tsvetkova (1917–), a Russian artist ||
|-id=730
| 10730 White || 1987 SU || Nathaniel Miller White (born 1941), American astronomer at Lowell Observatory ||
|-id=733
| 10733 Georgesand || || George Sand (1804–1876), French writer. ||
|-id=734
| 10734 Wieck || || Clara Josephine Wieck (1819–1896), a German child prodigy and by 1835 had established a reputation as a pianist throughout Europe. ||
|-id=735
| 10735 Seine || || The Seine, a major river in France, which passes the cities of Troyes, Paris and Rouen, before ending at the English Channel near Le Havre ||
|-id=736
| 10736 Marybrück || || Mary Brück (1925–2011), an Irish astronomer. ||
|-id=737
| 10737 Brück || || Hermann Brück (1905–2000), a German-born astronomer in the UK ||
|-id=738
| 10738 Marcoaldo || || Marco Aldo Ferreri (born 1981), son of Italian discoverer Walter Ferreri ||
|-id=739
| 10739 Lowman || || Margaret D. Lowman (born 1953) has worked to understand the role tropical forests play in Earth's interconnected ecosystem. As a canopy biologist, field work has taken her to the treetops of Australia, Belize, Panama, Peru and Africa. She directs research and conservation at Florida's Marie Selby Botanical Gardens. ||
|-id=740
| 10740 Fallersleben || || August Heinrich Hoffmann von Fallersleben (1798–1874), a German poet and philologist ||
|-id=741
| 10741 Valeriocarruba || || Valerio Carruba (born 1970) is an astronomer at the São Paulo State University in Brazil whose research includes the dynamics and identification of asteroid families and the effect of non-linear secular resonances in the asteroid belt. ||
|-id=744
| 10744 Tsuruta || 1988 XO || Masatoshi Tsuruta (born 1938), president of the Saga Astronomical Society since 1998, is an instructor during observing sessions and is engaged in the spread of astronomical activities at the Saga City Observatory. He is particularly gifted as a photographer of diffuse nebulae ||
|-id=745
| 10745 Arnstadt || || Arnstadt, a town in Thuringia with a 1300-year history. ||
|-id=746
| 10746 Mühlhausen || || In Carolinian times the Thuringian town of Mühlhausen was the haunt of emperors and kings. It became a Reichstadt in 1180 and a member of the Hanse in 1418. J. S. Bach was an organist here during 1707–1708. The intact city is a jewel of town planning in medieval times. ||
|-id=747
| 10747 Köthen || || Köthen, a German town in Saxony-Anhalt ||
|-id=749
| 10749 Musäus || || Johann Karl August Musäus (1735–1787), a private tutor at the court of Weimar. ||
|-id=753
| 10753 van de Velde || || Henry van de Velde (1863–1957), a Belgian painter, architect and interior designer ||
|-id=758
| 10758 Aldoushuxley || || Aldous Leonard Huxley (1894–1963), an English writer ||
|-id=760
| 10760 Ozeki || || Takaaki Ozeki (born 1952), previously a teacher of science, is now astronomy curator of the Hoshinoko Yakata Observatory. ||
|-id=761
| 10761 Lyubimets || || Lyubimets, the Russian word for darling, seems to be an appropriate name for Grigorij (born 2000), grandson of the Crimean astronomer Lyudmila Karachkina. ||
|-id=762
| 10762 von Laue || || Max von Laue (1879–1960), student of Planck, discovered the diffraction of x-rays in crystals, thereby permitting their structural analysis. For this he received the 1914 Nobel Prize in physics. He extended the theory of relativity, and he stood up for outlawed Jewish physicists like Einstein. ||
|-id=763
| 10763 Hlawka || || Edmund Hlawka (1916–2009), Austrian mathematician. ||
|-id=764
| 10764 Rübezahl || || Rübezahl, a fairy tale figure in German, Polish, and Czech folklore ||
|-id=767
| 10767 Toyomasu || || Shinji Toyomasu (born 1967) is a research fellow of the Misato Observatory. ||
|-id=768
| 10768 Sarutahiko || || Sarutahiko Ōkami, a Japanese Shinto deity and guardian of Earth ||
|-id=769
| 10769 Minas Gerais || || Minas Gerais, a Brazilian state ||
|-id=770
| 10770 Belo Horizonte || || Belo Horizonte, capital city of the Brazilian state of Minas Gerais ||
|-id=771
| 10771 Ouro Prêto || || Ouro Preto, ancient capital of the Brazilian state of Minas Gerais ||
|-id=773
| 10773 Jamespaton || || James Paton (1903–1973), a Scottish meteorologist. ||
|-id=774
| 10774 Eisenach || || Eisenach a town in Thuringia, Germany . ||
|-id=775
| 10775 Leipzig || || Leipzig, largest city of Saxony, Germany ||
|-id=776
| 10776 Musashitomiyo || || Musashitomiyo ("minor stickleback"; Pungitius sp.), a rare freshwater fish, seen only in Japan's Kumagawa River ||
|-id=778
| 10778 Marcks || || Gerhard Marcks (1889–1981), sculptor and graphic artist. ||
|-id=780
| 10780 Apollinaire || || Guillaume Apollinaire (1880–1918), a French poet ||
|-id=781
| 10781 Ritter || || Johann Wilhelm Ritter (1776–1810), German chemist, physicist and philosopher ||
|-id=782
| 10782 Hittmair || || Otto Hittmair (born 1924), a well-known Austrian theoretical physicist. ||
|-id=784
| 10784 Noailles || || Anna de Noailles (1876–1933), the daughter of a Romanian prince and granddaughter of a Turkish pasha. ||
|-id=785
| 10785 Dejaiffe || || René Dejaiffe (born 1940), a Belgian astronomer ||
|-id=786
| 10786 Robertmayer || || Julius Robert Mayer (1814–1878), a German doctor and naturalist. ||
|-id=787
| 10787 Ottoburkard || || Otto M. Burkard (born 1908), an Austrian professor emeritus of meteorology and geophysics of the University of Graz ||
|-id=789
| 10789 Mikeread || || Michael T. Read (born 1978) is a student working as an observer and engineer at Spacewatch. He discovered comets 238P/Read and 344P/Read. ||
|-id=791
| 10791 Uson || 1992 CS || Uson Morishita (1890–1965), born in Sagawa, Kochi prefecture, was one of the earliest mystery writers in Japan. He wrote many novels, mentored young writers, and is called the father of Japanese mystery novels. ||
|-id=792
| 10792 Ecuador || || Ecuador, the South American country ||
|-id=793
| 10793 Quito || || Quito, the capital city of Ecuador ||
|-id=794
| 10794 Vänge || || Vänge, a settlement on the Swedish island of Gotland ||
|-id=795
| 10795 Babben || || Babben Larsson (born 1956), a Swedish actress, singer and comedian ||
|-id=796
| 10796 Sollerman || || Jesper Sollerman (born 1968), a Swedish astronomer at Stockholm University, who researches supernovae, pulsars and gamma-ray bursts and is also a popularizer of astronomy ||
|-id=797
| 10797 Guatemala || || Guatemala, the Central American country ||
|-id=799
| 10799 Yucatán || || The Mexican Yucatán Peninsula ||
|}
10801–10900
|-
| 10801 Lüneburg || || Lüneburg, one of the richest Hanse towns, more than 1000 years old. ||
|-id=802
| 10802 Masamifuruya || || Masami Furuya (born 1973), a research fellow at the Kawabe Observatory of Kawabe Cosmic Park. ||
|-id=803
| 10803 Caléyo || || Jose M. Caréyo (born 1938), a jazz composer living in Havana. Inspired by the striking image of comet C/1965 S1 (Ikeya-Seki) on its approach to the sun, he improvised music that vividly depicts the remarkable sunbound comet and sent the score to the two discoverers. ||
|-id=804
| 10804 Amenouzume || || Amenouzume is the mythical Japanese goddess who managed to free the goddess Amaterasu by dancing in front of the rock door when she shut herself up in the cave Ama-no-iwayado. After that Amenouzume descended from heaven, following the god Ninigi-no-mikoto. ||
|-id=805
| 10805 Iwano || || Hisaka Iwano (born 1957), an engineer and amateur astronomer in Japan ||
|-id=806
| 10806 Mexico || || Mexico, a country in the southern part of North America ||
|-id=807
| 10807 Uggarde || || Uggarde rojr, cairn on Gotland island, Sweden ||
|-id=808
| 10808 Digerrojr || || Digerrojr, cairn on Gotland island, Sweden ||
|-id=809
| 10809 Majsterrojr || || Majsterrojr, cairn on Gotland island, Sweden ||
|-id=810
| 10810 Lejsturojr || || Lejstu rojr, cairn on Gotland island, Sweden ||
|-id=811
| 10811 Lau || || Lau, Gotland, socken on southern Gotland island, Sweden ||
|-id=812
| 10812 Grötlingbo || || Grötlingbo, socken on Gotland island, Sweden ||
|-id=813
| 10813 Mästerby || || Mästerby, socken on Gotland island, Sweden ||
|-id=814
| 10814 Gnisvärd || || Gnisvärd is a small fishing village on Gotland. One of the largest stone ships on the island, almost 50 meters in length, can be found there ||
|-id=815
| 10815 Östergarn || || The socken of Östergarn is situated in a very attractive part of Gotland with much natural beauty. Several fishing villages are to be found there, such as Katthammarsvik, Herrvik and Sysne ||
|-id=819
| 10819 Mahakala || 1993 HG || Mahakala, or "Great Time", is one of the destructive aspects of Shiva in Vedic Hinduism † ||
|-id=820
| 10820 Offenbach || || Jacques Offenbach (1819–1880), a German-French composer. ||
|-id=821
| 10821 Kimuratakeshi || 1993 SZ || Takeshi Kimura (born 1943), the senior executive officer at a consulting company in Tokyo and is also a well-known amateur astronomer. ||
|-id=822
| 10822 Yasunori || || Yasunori Harada (born 1971), a research engineer and amateur astronomer in Japan. ||
|-id=823
| 10823 Sakaguchi || || Naoto Sakaguchi (born 1962), an amateur astronomer. ||
|-id=825
| 10825 Augusthermann || || August Hermann Francke (1663–1727), a German theologian and pedagogue. ||
|-id=827
| 10827 Doikazunori || || azunori Doi (born 1952), a Japanese architect and amateur astronomer. ||
|-id=828
| 10828 Tomjones || || Thomas D. Jones (born 1955), a planetary scientist. ||
|-id=829
| 10829 Matsuobasho || 1993 UU || Matsuo Basho (1644–1694), a master of the Haikai poetry of the early Edo period, was born in Ueno in Iga Province (the present Iga City in Mie prefecture). He established a distinct Haikai style called Shofu based on the essence of the Japanese aesthetic Wabi-Sabi ||
|-id=830
| 10830 Desforges || || Jacques Desforges(fr) (1723–1791), a French priest at Étampes ||
|-id=831
| 10831 Takamagahara || || Takamagahara was the heaven that appears in Japanese ancient myth. The place was ruled by the goddess Amaterasu. ||
|-id=832
| 10832 Hazamashigetomi || || Hazama Shigetomi (1756–1816), an astronomer in the Japanese Edo period who studied positional astronomy. ||
|-id=834
| 10834 Zembsch-Schreve || || Guido Zembsch-Schreve (born 1916), a Dutch secret agent, parachuted as an allied agent into occupied France in 1943. He was betrayed in 1944 and eventually sent to Dora, where the V-2 rockets were manufactured. He escaped and wrote Pierre Lalande: Special Agent. ||
|-id=835
| 10835 Fröbel || || Friedrich Fröbel (1782–1852), a Thuringian pedagogue, was committed to the education of young children. In 1839 he founded the first nursery school, which he named Kindergarten. He created toys and tools for use by children in different age groups. ||
|-id=837
| 10837 Yuyakekoyake || || Yuyakekoyake, Japanese popular nursery rhyme ||
|-id=838
| 10838 Lebon || || Gustave Le Bon (1841–1931), a French social psychologist. ||
|-id=839
| 10839 Hufeland || || Christoph Wilhelm Hufeland, German physician. ||
|-id=841
| 10841 Ericforbes || || Eric Gray Forbes (1933–1984), a professor and director of the History of Medicine and Science Unit at Edinburgh University. ||
|-id=847
| 10847 Koch || || Heinrich Hermann Robert Koch, German physician and Nobelist. ||
|-id=850
| 10850 Denso || || Denso Corporation, for which the discoverer worked for eight years as an electrical engineer, is the largest manufacturer of automobile parts in Japan. ||
|-id=853
| 10853 Aimoto || 1995 CW || Minoru Aimoto (born 1965), a senior researcher at Saji Observatory, is in charge of astronomical exhibitions and astronomical lectures for visitors to the observatory. His other pursuits include mainly photography of deep space, comets, etc., using a 1.03-m telescope and a wide-field telescope ||
|-id=856
| 10856 Bechstein || || Carl Bechstein (1826–1900), born in the Thuringian town of Gotha, founded a piano factory in Berlin in 1853. His instruments were used by Liszt, Bülow, Rubinstein and Wagner. Branches of his factory in London, Paris and St. Petersburg testify to the esteem in which Bechstein's instruments are held. ||
|-id=857
| 10857 Blüthner || || Julius Blüthner (1824–1910) founded a piano factory in Leipzig in 1853. His instruments found high recognition because of their sonority, tone color and several technical innovations. The name Blüthner inspired friends of music around the world. Despite the elements of mass production, every piano remained a work of art. ||
|-id=861
| 10861 Ciske || || Ciske Staring was a courier in Amsterdam for the Dutch resistance during World War II. This naming is to honor especially the women of the Resistance who executed dangerous tasks and kept up the human spirit in spite of gruesome conditions. ||
|-id=863
| 10863 Oye || || Jacob and Martha Oye are the grandparents of Paul Kervin, AMOS technical director. ||
|-id=864
| 10864 Yamagatashi || || The city of Yamagata, in the center of Yamagata prefecture. ||
|-id=865
| 10865 Thelmaruby || || Thelma Ruby is a British actress of international fame. One of her early accomplishments was to play Golda in the original theater version of Fiddler on the Roof. ||
|-id=866
| 10866 Peru || || Peru, on the west coast of South America, is dominated by the great Andes mountain ranges, and it extends east to include the headwaters of the Amazon river. ||
|-id=867
| 10867 Lima || || Lima, Peru. ||
|-id=870
| 10870 Gwendolen || || Mary Gwendolen Ellery Read Aikman, the discoverer's mother † ||
|-id=872
| 10872 Vaculík || || Ludvík Vaculík, Czech writer and journalist † ||
|-id=874
| 10874 Locatelli || || Pietro Antonio Locatelli, Italian violinist and composer † ||
|-id=875
| 10875 Veracini || || Francesco Maria Veracini, Italian violinist and composer † ||
|-id=877
| 10877 Jiangnan Tianchi || 1996 UR || Jiang Nan Tian Chi, at high altitude and unaffected by artificial lights, is one of the best observing stations in eastern China. The name was suggested by T. Chen ||
|-id=878
| 10878 Moriyama || 1996 VV || Moriyama, a city on east side of Lake Biwa, the largest lake in Japan, in Shiga Prefecture. ||
|-id=880
| 10880 Kaguya || || SELENE, a lunar explorer developed by the Japan Aerospace Exploration Agency (JAXA), nicknamed Kaguya after a Japanese folktale character ||
|-id=882
| 10882 Shinonaga || || Kouji Shinonaga (born 1952), the director of Kamagari Observatory since 1991. ||
|-id=884
| 10884 Tsuboimasaki || || Masaki Tsuboi (born 1954), the president of the Hiroshima Astronomical Society and a leader of the amateur astronomy community in western Japan. ||
|-id=885
| 10885 Horimasato || || Masato Hori (born 1957), a specialist in civil engineering and a member of the Hiroshima Astronomical Society. ||
|-id=886
| 10886 Mitsuroohba || || Mitsuro Ohba, Japanese polar adventurer. ||
|-id=888
| 10888 Yamatano-orochi || || Yamatano-orochi is a giant snake appearing in Japanese ancient mythology. The snake had eight heads and eight tails and was long enough to cover eight valleys and eight peaks. It was defeated by the god Susanoo-no-mikoto. ||
|-id=891
| 10891 Fink || || Uwe Fink (born 1939), at the Lunar and Planetary Laboratory, has made major contributions in the fields of planetary atmospheres, the surface composition of small bodies, reflection spectra, absorption coefficients of ices and cometary coma production rates. ||
|-id=894
| 10894 Nakai || || R. Carlos Nakai, musician and cultural anthropologist of Navajo-Ute descent † ||
|-id=895
| 10895 Aynrand || || Ayn Rand (1905–1982), Russian-born philosopher and writer, emigrated to the United States at age 21. She was the author of several novels and books, of which The Fountainhead (1943) and Atlas Shrugged (1957) are best known. The discoverer also named his observatory as a tribute to her. ||
|-id=900
| 10900 Folkner || || William Folkner (born 1956), a principal scientist at the Jet Propulsion Laboratory, is a recognized authority on the planetary ephemerides. He continually improves the orbital positions of all the planets using a wide variety of ground-based and space-based observations ||
|}
10901–11000
|-id=907
| 10907 Savalle || || Renaud Savalle (born 1971), an astronomical software programmer, who wrote the CCD acquisition system used by the Asteroid Survey at Caussols that allowed this minor planet to be discovered. He now works at the Canada-France-Hawaii Telescope, where he is a systems programmer. ||
|-id=908
| 10908 Kallestroetzel || || Karl-Heinz Stroetzel (born 1935), at the DLR Institute of Space Sensor Technology and Planetary Exploration, was a major contributor to the development and construction of the CCD cameras for the search programs at Caussols, Kvistaberg and Asiago. ||
|-id=911
| 10911 Ziqiangbuxi || || Originated from I Ching (the Book of Changes), "Zi Qiang Bu Xi" are the Chinese characters for "Unremittingly practicing self-improvement". This phrase is one of the mottos of Tsinghua University, along with several other prestigious universities in China. ||
|-id=914
| 10914 Tucker || || Roy Tucker (born 1951), an instrumentalist at Kitt Peak National Observatory, is owner and chief observer of southern Arizona's Goodricke-Pigott Observatory. ||
|-id=916
| 10916 Okina-Ouna || || Okina and Ouna are the two small lunar explorers developed by the Japan Aerospace Exploration Agency. They were separated from the main orbiter of the lunar explorer "KAGUYA (SELENE)" in Oct. 2007. Okina and Ouna are also the foster parents of Kaguya in the old Japanese story Kaguya-hime ||
|-id=918
| 10918 Kodaly || || Zoltán Kodály (1882–1967), Hungarian composer ||
|-id=919
| 10919 Pepíkzicha || || Josef Zicha (born 1939) was the head engineer for the 2m telescope at Ondřejov. ||
|-id=921
| 10921 Romanozen || || Romano Zen (born 1946), known in Italy and abroad for his high-quality optical instruments. ||
|-id=924
| 10924 Mariagriffin || || Maria Anna Griffin (born 1962), wife of the discoverer, Ian P. Griffin ||
|-id=925
| 10925 Ventoux || || Mont Ventoux (1909 m) in the French département of Vaucluse (Provence). ||
|-id=927
| 10927 Vaucluse || || Vaucluse is a French département. This minor planet was discovered by a member of AUDE (Association des Utilisateurs de Detecteurs Electroniques) based in the little Vaucluse village of Saint-Estève in the commune of Blauvac. ||
|-id=928
| 10928 Caprara || || Giovanni Caprara (born 1948) is science and space editor of Il Corriere della Sera, the most authoritative newspaper in Italy. ||
|-id=929
| 10929 Chenfangyun || || Chen Fangyun (1916–2000), a pioneer of radio electronics research in China. ||
|-id=930
| 10930 Jinyong || || Jin Yong (pen-name of Louis Cha), Chinese writer ||
|-id=931
| 10931 Ceccano || 1998 DA || Ceccano, where the discovery observations of this minor planet were made, is a small city, some 90 km southeast of Rome. ||
|-id=932
| 10932 Rebentrost || || David Rebentrost (1614–1703), a vicar, doctor and herbalist in Drebach. ||
|-id=934
| 10934 Pauldelvaux || || Paul Delvaux (1897–1994) was a Belgian Surrealist painter who became famous for his somnambulistic nudes, walking in stations between the trains, between skeletons or sitting in front of ancient Greek temples. ||
|-id=937
| 10937 Ferris || || William D. Ferris (born 1961), a video producer-director at Northern Arizona University, has been an assiduous and successful observer for LONEOS since 1998. ||
|-id=938
| 10938 Lorenzalevy || || Lorenza Levy (born 1976), an observer for LONEOS since mid–1999. ||
|-id=943
| 10943 Brunier || || Serge Brunier (born 1958), a reporter and editor -in-chief of "Ciel et Espace" magazine and wrote several articles on the world's observatories. ||
|-id=947
| 10947 Kaiserstuhl || 2061 P-L || The Kaiserstuhl (570 m) is an old volcanic mountain range between the Schwarzwald and the Rhine river. It has one of the mildest climates in Germany. Since Roman times the slopes of the mountains have been covered with vineyards, producing the well-known wine "Kaiserstühler". ||
|-id=948
| 10948 Odenwald || 2207 P-L || The Odenwald is a mountain range in Germany between the Main and Neckar rivers, east of the Rhine river. Heidelberg is located in the southern part of the Odenwald. Its summits are Königstuhl and Melibokus. ||
|-id=949
| 10949 Königstuhl || 3066 P-L || The Königstuhl, second highest mountain of the Odenwald range of Germany, site of the Landessternwarte Heidelberg-Königstuhl and the Max-Planck-Institut für Astronomie ||
|-id=950
| 10950 Albertjansen || 4049 P-L || Albert Jansen (1940–2004), Dutch first director of the Hague Planetarium, later active as an amateur astronomer in South Africa ||
|-id=951
| 10951 Spessart || 4050 P-L || The Spessart, a small chain of mountains surrounded by the river Main on three sides in Germany. Geologically, is part of the mountains east of the Rhine, which extend from Basel in the south to Frankfurt in the north. ||
|-id=952
| 10952 Vogelsberg || 4152 P-L || Vogelsberg Mountains, a volcanic mountain range in German ||
|-id=953
| 10953 Gerdatschira || 4276 P-L || Gerda Tschira (born 1943), German founder and director of the Carl Bosch museum, Heidelberg ||
|-id=954
| 10954 Spiegel || 4545 P-L || Beate Spiegel (born 1960), German head of the office of the Klaus Tschira Foundation ||
|-id=955
| 10955 Harig || 5011 P-L || Ludwig Harig (born 1927) is a German writer. Besides experimental texts and poetry, he also wrote narrative prose. A trilogy about his father and himself, with their lives projected against the background of historic events in a German-French border region, is especially noteworthy. The name was suggested by H. Duerbeck ||
|-id=956
| 10956 Vosges || 5023 P-L || The Vosges (1420 m) mountain range extends west of the Rhine in France, opposite the German Schwarzwald mountains. ||
|-id=957
| 10957 Alps || 6068 P-L || The Alps form a great mountain chain stretching from the Mediterranean Sea between southern France and Italy through Switzerland to eastern Austria. ||
|-id=958
| 10958 Mont Blanc || 6188 P-L || Mont Blanc (4800 m), in the French-Italian Alps, is the highest mountain in Europe. ||
|-id=959
| 10959 Appennino || 6579 P-L || The Apennine Mountains is a mountain range that extends for the whole length of Italy, a 1400-km stretch from the Gulf of Genoa to the Strait of Messina. It also effectively crosses the strait to Sicily, where the mountains are geologically very active, especially Mount Etna (3280 m). ||
|-id=960
| 10960 Gran Sasso || 6580 P-L || Gran Sasso (2910 m) is the highest mountain of the Apennines, Italy. It is located in the part called the Abruzzi. ||
|-id=961
| 10961 Buysballot || 6809 P-L || C. H. D. Buys Ballot (1817–1890), Dutch meteorologist, created Buys Ballot's law describing the turning of the winds in northern and southern hemispheres. He founded the Astronomical Institute at the University of Utrecht (Sonnenborgh) in 1853 and the Royal Netherlands Meteorological Institute in 1854. ||
|-id=962
| 10962 Sonnenborgh || 9530 P-L || Sonnenborgh Observatory in Utrecht, founded in 1853 by Buys Ballot, specializes in the study of the sun. In 1988, when the Institute moved to a new building, Sonnenborgh became a public observatory and now houses the "Stichting De Koepel", a school of astronomy. ||
|-id=963
| 10963 van der Brugge || 2088 T-1 || Aad H. van der Brugge, a Dutch amateur astronomer and prolific member of the Royal Netherlands Association for Meteorology and Astronomy ||
|-id=964
| 10964 Degraaff || 3216 T-1 || Willem de Graaff (1923–004), was a Dutch astronomical researcher at Utrecht University who unveiled the wonders of the universe to thousands of people in over 625 lectures in 42 years. ||
|-id=965
| 10965 van Leverink || 3297 T-1 || Simon van Leverink (born 1947), member of the Working Group on Meteors of the Royal Netherlands Meteorological and Astronomical Society has been a well-known meteor specialist, traveling all over the world to observe meteors. He is a famous builder of observing equipment such as the Allsky network. The name was suggested by A. H. van der Brugge. ||
|-id=966
| 10966 van der Hucht || 3308 T-1 || Karel A. van der Hucht (born 1946), a Dutch astronomer who was appointed Assistant General Secretary of the International Astronomical Union in 2003 ||
|-id=967
| 10967 Billallen || 4349 T-1 || William H. Allen (born 1939), a New Zealand amateur astronomer and electrical engineer, erected his private observatory with a 0.32-m telescope in Rapaura, New Zealand. He has participated in photometric campaigns on cataclysmic variables, notably eta Carinae, as well as on stellar occultations by minor planets. ||
|-id=968
| 10968 Sterken || 4393 T-1 || Christiaan Sterken (born 1946), a Belgian astronomer, Research Director of the Belgian Fund For Scientific Research, and co-founder of the Journal of Astronomical Data ||
|-id=969
| 10969 Perryman || 4827 T-1 || Michael Perryman (born 1954), British project scientist and scientific leader of the HIPPARCOS and GAIA astrometry missions of the European Space Agency ||
|-id=970
| 10970 de Zeeuw || 1079 T-2 || Tim de Zeeuw (born 1956), a Dutch astronomer at Leiden Observatory and Director General of the European Southern Observatory (ESO) since 2007. He is the husband of Ewine van Dishoeck (see (10971)) ||
|-id=971
| 10971 van Dishoeck || 1179 T-2 || Ewine van Dishoeck (born 1955), a Dutch astronomer at Leiden Observatory ||
|-id=972
| 10972 Merbold || 1188 T-2 || Ulf Merbold (born 1941), a German astronaut and Spacelab module specialists of the U.S. Space Shuttle ||
|-id=973
| 10973 Thomasreiter || 1210 T-2 || Thomas Reiter (born 1958), a German astronaut who stayed on both the Russian Mir Space Station and the ISS ||
|-id=974
| 10974 Carolalbert || 2225 T-2 || Carol Handahl and Albert O. Grender, on their 50th wedding anniversary. The Grenders are aunt and uncle of, and godparents to D. W. E. Green, who made the identifications involving this object. ||
|-id=975
| 10975 Schelderode || 2246 T-2 || Schelderode is an agrarian village founded in the tenth century and located along the river Schelde in Flanders, Belgium. It has been the workplace and residence of Belgian astronomer Christiaan Sterken for more than three decades ||
|-id=976
| 10976 Wubbena || 2287 T-2 || Eltjo Wubbena (born 1947) was president of the NVWS, the Dutch popular-astronomy society, from 1975 to 1985. He observed variable stars for many years and promoted international contacts between amateur astronomers. Name suggested by H. van Woerden and A. van de Brugge ||
|-id=977
| 10977 Mathlener || 3177 T-2 || Edwin Mathlener (born 1962), Dutch astronomy amateur, director of Dutch astronomy information center "De Koepel" and editor of its magazine "Zenit" and almanac "Sterrengids". ||
|-id=978
| 10978 Bärbchen || 4095 T-2 || Barbara Börngen ("Bärbchen"; 1934–2010) wife of German astronomer and discoverer of minor planets, Freimut Börngen ||
|-id=979
| 10979 Fristephenson || 4171 T-2 || Francis Richard Stephenson (born 1941), a British historian of astronomy and professorial fellow at the University of Durham, is known for his use of ancient and medieval astronomical records to improve our knowledge of the earth's rotation, supernovae and comets. The name was suggested by the object's identifier, D. W. E. Green, with the encouragement of the discoverers. ||
|-id=980
| 10980 Breimer || 4294 T-2 || Douwe Breimer (born 1943), a Dutch pharmacologist and President of Leiden University ||
|-id=981
| 10981 Fransaris || 1148 T-3 || Frans Saris (born 1942), a Dutch atomic and molecular physicist, Dean of Sciences at Leiden University ||
|-id=982
| 10982 Poerink || 2672 T-3 || Urijan Poerink (born 1953), Dutch meteor researcher ||
|-id=983
| 10983 Smolders || 3196 T-3 || Petrus L. L. Smolders (born 1940), Dutch scientist, writer and journalist, spaceflight and astronomy popularizer ||
|-id=984
| 10984 Gispen || 3507 T-3 || Willem Hendrik Gispen (born 1943), a Dutch neuroscientist, rector of Utrecht University 2001–2007, who contributed to the establishment of the Sonnenborgh museum and observatory. ||
|-id=985
| 10985 Feast || 4017 T-3 || Michael Feast (1926–), a South African astronomer ||
|-id=986
| 10986 Govert || 4313 T-3 || Govert Schilling (born 1956), Dutch amateur astronomer and science writer, journalist, and astronomy popularizer. ||
|-id=988
| 10988 Feinstein || 1968 OL || Alejandro Feinstein (born 1928), an Argentinian astronomer at La Plata Observatory and co-founder of the Argentinian Astronomical Association (Asociación Argentina de Astronomía) ||
|-id=989
| 10989 Dolios || || Dolios, the faithful servant of Laertes at Ithaca. ||
|-id=990
| 10990 Okunev || || Boris Nikolaevich Okunev (1897–1961), professor at the D. F. Ustinov Mechanical Institute in Leningrad, was a scientist in theoretical mechanics and ballistics. He was also interested in the history of science, poetry and art. He bequeathed his unique collection of Russian painters of "the Silver Age" to the Russian Museum. ||
|-id=991
| 10991 Dulov || || Viktor Georgievich Dulov (1929–2001), a Russian professor who was known for his work in theoretical gas dynamics and applied mathematics ||
|-id=992
| 10992 Veryuslaviya || 1974 SF || The Chubenko family: Vera Ivanovna (born 1951) and her sons Vyacheslav (born 1973), an astronomer and fanciful writer, and Yury (born 1978), a journalist who made a great contribution to the social rehabilitation of children and people with specific physical facilities. ||
|-id=994
| 10994 Fouchard || || Marc Fouchard (born 1972) is a professor at the Laboratoire d´Astronomie de Université Lille and collaborator at the Institut de Mécanique Céleste et de Calcul des Éphémérides (IMCCE) (France), specializing in the dynamics of long-period comets. ||
|-id=996
| 10996 Armandspitz || || Armand Spitz (1904–1971), was an American planetarium designer. He is renowned for his invention of a low-cost planetarium in early models of which the star images are projected by means of holes drilled in dodecahedral plastic panels ||
|-id=997
| 10997 Gahm || || Gösta Gahm (born 1942), Swedish astronomer at Stockholm Observatory ||
|-id=999
| 10999 Braga-Ribas || || Felipe Braga-Ribas (born 1982) is a professor at the Federal Technological University of Paraná, Curitiba (Brazil) specializing in predictions and observations of stellar occultations, including the detection of rings around the centaur (10199) Chariklo. ||
|}
References
010001-011000 |
24562032 | https://en.wikipedia.org/wiki/List%20of%20important%20publications%20in%20cryptography | List of important publications in cryptography | This is a list of important publications in cryptography, organized by field.
Some reasons why a particular publication might be regarded as important:
Topic creator – A publication that created a new topic
Breakthrough – A publication that changed scientific knowledge significantly
Influence – A publication which has significantly influenced the world or has had a massive impact on the teaching of cryptography.
Cryptanalysis
The index of coincidence and its applications in cryptology
Description: Presented the index of coincidence method for codebreaking; number 22 in the Riverbank Publications series.
Treatise on the Enigma
Description: The breaking of the Enigma.
The Codebreakers: The Story of Secret Writing
Description: Almost nothing had been published in cryptography in several decades and very few non-government researchers were thinking about it. The Codebreakers, a popular and non academic book, made many more people aware and contains a lot of technical information, although it requires careful reading to extract it. Its 1967 appearance was followed by the appearance of many papers over the next few years.
Differential Cryptanalysis of DES-like Cryptosystems
Description: The method of differential cryptanalysis.
A new method for known plaintext attack of FEAL cipher
Description: The method of linear cryptanalysis.
Theory
Communication Theory of Secrecy Systems
Description: Information theory based analysis of cryptography. The original form of this paper was a confidential Bell Labs report from 1945, not the one published.
Probabilistic Encryption
Description: The paper provides a rigorous basis to encryption (e.g., partial information) and shows that it possible to equate the slightest cryptanalysis to solve a pure math problem.
Second, it introduces the notion of computational indistinguishability.
Proofs that Yield Nothing But their Validity or All Languages in NP have Zero-Knowledge Proofs
Description: This paper explains how to construct a zero-knowledge proof system for any language in NP.
Private key cryptography
Cryptographic Coding for Data-Bank Privacy
Description: Feistel ciphers are a form of cipher of which DES is the most important. It would be hard to overestimate the importance of either Feistel or DES. Feistel pushed a transition from stream ciphers to block ciphers. Although most ciphers operate on streams, most of the important ciphers today are block ciphers at their core.
Data Encryption Standard
NBS Federal Standard FIPS PUB 46, 15 Jan 1977.
Description: DES is not only one of the most widely deployed ciphers in the world but has had a profound impact on the development of cryptography. Roughly a generation of cryptographers devoted much of their time to attacking and improving DES.
Public Key Cryptography
New directions in cryptography
Description: This paper suggested public key cryptography and presented Diffie–Hellman key exchange. For more information about this work see: W.Diffie, M.E.Hellman, "Privacy and Authentication: An Introduction to Cryptography", in Proc. IEEE, Vol 67(3) Mar 1979, pp 397–427.
On the Signature Reblocking Problem in Public Key Cryptography
Description: In this paper (along with Loren M. Kohnfelder,"Using Certificates for Key Distribution in a Public-Key Cryptosystem", MIT Technical report 19 May 1978), Kohnfelder introduced certificates (signed messages containing public keys) which are the heart of all modern key management systems.
Secure Communications Over Insecure Channels
Description: This paper introduced a branch of public key cryptography, known as public key distribution systems. Merkle's work predated "New directions in cryptography" though it was published after it. The Diffie–Hellman key exchange is an implementation of such a Merkle system. Hellman himself has argued that a more correct name would be Diffie–Hellman–Merkle key exchange.
A Method for Obtaining Digital Signatures and Public Key Cryptosystems
Description: The RSA encryption method. The first public-key encryption method.
How to Share a Secret
Description: A safe method for sharing a secret.
On the security of public key protocols
Description: Introduced the adversarial model against which almost all cryptographic protocols are judged.
Protocols
Using encryption for authentication in large networks of computers
Description: This paper introduced the basic ideas of cryptographic protocols and showed how both secret-key and public-key encryption could be used to achieve authentication.
Kerberos
Description: The Kerberos authentication protocol, which allows individuals communicating over an insecure network to prove their identity to one another in a secure and practical manner.
A Protocol for Packet Network Interconnection
A Dynamic Network Architecture
Description: Network software in distributed systems.
See also
Books on cryptography
References
The Codebreakers
https://users.cs.jmu.edu/abzugcx/public/Cryptology/Journal-Articles-on-Crypto-POSTED.pdf
History of computer science
Cryptography
Cryptography books |
1107036 | https://en.wikipedia.org/wiki/Medical%20record | Medical record | The terms medical record, health record and medical chart are used somewhat interchangeably to describe the systematic documentation of a single patient's medical history and care across time within one particular health care provider's jurisdiction. A medical record includes a variety of types of "notes" entered over time by healthcare professionals, recording observations and administration of drugs and therapies, orders for the administration of drugs and therapies, test results, x-rays, reports, etc. The maintenance of complete and accurate medical records is a requirement of health care providers and is generally enforced as a licensing or certification prerequisite.
The terms are used for the written (paper notes), physical (image films) and digital records that exist for each individual patient and for the body of information found therein.
Medical records have traditionally been compiled and maintained by health care providers, but advances in online data storage have led to the development of personal health records (PHR) that are maintained by patients themselves, often on third-party websites. This concept is supported by US national health administration entities and by AHIMA, the American Health Information Management Association.
Because many consider the information in medical records to be sensitive private information covered by expectations of privacy, many ethical and legal issues are implicated in their maintenance, such as third-party access and appropriate storage and disposal. Although the storage equipment for medical records generally is the property of the health care provider, the actual record is considered in most jurisdictions to be the property of the patient, who may obtain copies upon request.
Uses
The information contained in the medical record allows health care providers to determine the patient's medical history and provide informed care. The medical record serves as the central repository for planning patient care and documenting communication among patient and health care provider and professionals contributing to the patient's care. An increasing purpose of the medical record is to ensure documentation of compliance with institutional, professional or governmental regulation.
The traditional medical record for inpatient care can include admission notes, on-service notes, progress notes (SOAP notes), preoperative notes, operative notes, postoperative notes, procedure notes, delivery notes, postpartum notes, and discharge notes.
Personal health records combine many of the above features with portability, thus allowing a patient to share medical records across providers and health care systems.
Electronic medical records could also be studied to quantify disease burdens – such as the number of deaths from antimicrobial resistance – or help identify causes of, factors of and contributors to diseases, especially when combined with genome-wide association studies. For such purposes, electronic medical records could potentially be made available in securely anonymized or pseudonymized forms to ensure patients' privacy is maintained.
Contents
A patient's individual medical record identifies the patient and contains information regarding the patient's case history at a particular provider. The health record as well as any electronically stored variant of the traditional paper files contain proper identification of the patient. Further information varies with the individual medical history of the patient.
The contents are generally written with other healthcare professionals in mind. This can result in confusion and hurt feelings when patients read these notes. For example, some abbreviations, such as for shortness of breath, are similar to the abbreviations for profanities, and taking "time out" to follow a surgical safety protocol might be misunderstood as a disciplinary technique for children.
Media applied
Traditionally, medical records were written on paper and maintained in folders often divided into sections for each type of note (progress note, order, test results), with new information added to each section chronologically. Active records are usually housed at the clinical site, but older records are often archived offsite.
The advent of electronic medical records has not only changed the format of medical records but has increased accessibility of files. The use of an individual dossier style medical record, where records are kept on each patient by name and illness type originated at the Mayo Clinic out of a desire to simplify patient tracking and to allow for medical research.
Maintenance of medical records requires security measures to prevent from unauthorized access or tampering with the records.
Medical history
The medical history is a longitudinal record of what has happened to the patient since birth. It chronicles diseases, major and minor illnesses, as well as growth landmarks. It gives the clinician a feel for what has happened before to the patient. As a result, it may often give clues to current disease state. It includes several subsets detailed below.
Surgical history
The surgical history is a chronicle of surgery performed for the patient. It may have dates of operations, operative reports, and/or the detailed narrative of what the surgeon did.
Obstetric history
The obstetric history lists prior pregnancies and their outcomes. It also includes any complications of these pregnancies.
Medications and medical allergies
The medical record may contain a summary of the patient's current and previous medications as well as any medical allergies.
Family history
The family history lists the health status of immediate family members as well as their causes of death (if known). It may also list diseases common in the family or found only in one sex or the other. It may also include a pedigree chart. It is a valuable asset in predicting some outcomes for the patient.
Social history
The social history is a chronicle of human interactions. It tells of the relationships of the patient, his/her careers and trainings, and religious training. It is helpful for the physician to know what sorts of community support the patient might expect during a major illness. It may explain the behavior of the patient in relation to illness or loss. It may also give clues as to the cause of an illness (e.g. occupational exposure to asbestos).
Habits
Various habits which impact health, such as tobacco use, alcohol intake, exercise, and diet are chronicled, often as part of the social history. This section may also include more intimate details such as sexual habits and sexual orientation.
Immunization history
The history of vaccination is included. Any blood tests proving immunity will also be included in this section.
Growth chart and developmental history
For children and teenagers, charts documenting growth as it compares to other children of the same age is included, so that health-care providers can follow the child's growth over time. Many diseases and social stresses can affect growth, and longitudinal charting can thus provide a clue to underlying illness. Additionally, a child's behavior (such as timing of talking, walking, etc.) as it compares to other children of the same age is documented within the medical record for much the same reasons as growth.
Medical encounters
Within the medical record, individual medical encounters are marked by discrete summations of a patient's medical history by a physician, nurse practitioner, or physician assistant and can take several forms. Hospital admission documentation (i.e., when a patient requires hospitalization) or consultation by a specialist often take an exhaustive form, detailing the entirety of prior health and health care. Routine visits by a provider familiar to the patient, however, may take a shorter form such as the problem-oriented medical record (POMR), which includes a problem list of diagnoses or a "SOAP" method of documentation for each visit. Each encounter will generally contain the aspects below:
Chief complaint
This is the main problem (traditionally called a complaint) that has brought the patient to see the doctor or other clinician. Information on the nature and duration of the problem will be explored.
History of the present illness
A detailed exploration of the symptoms the patient is experiencing that have caused the patient to seek medical attention.
Physical examination
The physical examination is the recording of observations of the patient. This includes the vital signs, muscle power and examination of the different organ systems, especially ones that might directly be responsible for the symptoms the patient is experiencing.
Assessment and plan
The assessment is a written summation of what are the most likely causes of the patient's current set of symptoms. The plan documents the expected course of action to address the symptoms (diagnosis, treatment, etc.).
Orders and prescriptions
Written orders by medical providers are included in the medical record. These detail the instructions given to other members of the health care team by the primary providers.
Progress notes
When a patient is hospitalized, daily updates are entered into the medical record documenting clinical changes, new information, etc. These often take the form of a SOAP note and are entered by all members of the health-care team (doctors, nurses, physical therapists, dietitians, clinical pharmacists, respiratory therapists, etc.). They are kept in chronological order and document the sequence of events leading to the current state of health.
Test results
The results of testing, such as blood tests (e.g., complete blood count) radiology examinations (e.g., X-rays), pathology (e.g., biopsy results), or specialized testing (e.g., pulmonary function testing) are included. Often, as in the case of X-rays, a written report of the findings is included in lieu of the actual film.
Other information
Many other items are variably kept within the medical record. Digital images of the patient, flowsheets from operations/intensive care units, informed consent forms, EKG tracings, outputs from medical devices (such as pacemakers), chemotherapy protocols, and numerous other important pieces of information form part of the record depending on the patient and his or her set of illnesses/treatments.
Administrative issues
Medical records are legal documents that can be used as evidence via a subpoena duces tecum, and are thus subject to the laws of the country/state in which they are produced. As such, there is great variability in rules governing production, ownership, accessibility, and destruction. There is some controversy regarding proof verifying the facts, or absence of facts in the record, apart from the medical record itself.
In 2009, Congress authorized and funded legislation known as the Health Information Technology for Economic and Clinical Health Act to stimulate the conversion of paper medical records into electronic charts. While many hospitals and doctor's offices have since done this successfully, electronic health vendors' proprietary systems are sometimes incompatible.
Demographics
Demographics include patient information that is not medical in nature. It is often information to locate the patient, including identifying numbers, addresses, and contact numbers. It may contain information about race and religion as well as workplace and type of occupation. It also contains information regarding the patient's health insurance. It is common to also find emergency contact information located in this section of the medical chart.
Production
In the United States, written records must be marked with the date and time and scribed with indelible pens without use of corrective paper. Errors in the record should be struck out with a single line (so that the initial entry remains legible) and initialed by the author.
Orders and notes must be signed by the author. Electronic versions require an electronic signature.
Ownership of patient's record
Ownership and keeping of patient's records varies from country to country.
US law and customs
In the United States, the data contained within the medical record belongs to the patient, whereas the physical form the data takes belongs to the entity responsible for maintaining the record per the Health Insurance Portability and Accountability Act. Patients have the right to ensure that the information contained in their record is accurate, and can petition their health care provider to amend factually incorrect information in their records.
There is no consensus regarding medical record ownership in the United States. Factors complicating questions of ownership include the form and source of the information, custody of the information, contract rights, and variation in state law. There is no federal law regarding ownership of medical records. HIPAA gives patients the right to access and amend their own records, but it has no language regarding ownership of the records. Twenty-eight states and Washington, D.C., have no laws that define ownership of medical records. Twenty-one states have laws stating that the providers are the owners of the records. Only one state, New Hampshire, has a law ascribing ownership of medical records to the patient.
Canadian law and customs
Under Canadian federal law, the patient owns the information contained in a medical record, but the healthcare provider owns the records themselves. The same is true for both nursing home and dental records. In cases where the provider is an employee of a clinic or hospital, it is the employer that has ownership of the records. By law, all providers must keep medical records for a period of 15 years beyond the last entry.
The precedent for the law is the 1992 Canadian Supreme Court ruling in McInerney v MacDonald. In that ruling, an appeal by a physician, Dr. Elizabeth McInerney, challenging a patient's access to their own medical record was denied. The patient, Margaret MacDonald, won a court order granting her full access to her own medical record. The case was complicated by the fact that the records were in electronic form and contained information supplied by other providers. McInerney maintained that she didn't have the right to release records she herself did not author. The courts ruled otherwise. Legislation followed, codifying into law the principles of the ruling. It is that legislation which deems providers the owner of medical records, but requires that access to the records be granted to the patient themselves.
UK law and customs
In the United Kingdom, ownership of the NHS's medical records has in the past generally been described as belonging to the Secretary of State for Health and this is taken by some to mean copyright also belongs to the authorities.
German law and customs
In Germany, a relatively new law, which has been established in 2013, strengthens the rights of patients. It states, amongst other things, the statutory duty of medical personnel to document the treatment of the patient in either hard copy or within the electronic patient record (EPR). This documentation must happen in a timely manner and encompass each and every form of treatment the patient receives, as well as other necessary information, such as the patient's case history, diagnoses, findings, treatment results, therapies and their effects, surgical interventions and their effects, as well as informed consents. The information must include virtually everything that is of functional importance for the actual, but also for future treatment. This documentation must also include the medical report and must be archived by the attending physician for at least 10 years. The law clearly states that these records are not only memory aids for the physicians, but also should be kept for the patient and must be presented on request.
In addition, an electronic health insurance card was issued in January 2014 which is applicable in Germany (Elektronische Gesundheitskarte or eGK), but also in the other member states of the European Union (European Health Insurance Card). It contains data such as: the name of the health insurance company, the validity period of the card, and personal information about the patient (name, date of birth, sex, address, health insurance number) as well information about the patient's insurance status and additional charges. Furthermore, it can contain medical data if agreed to by the patient. This data can include information concerning emergency care, prescriptions, an electronic medical record, and electronic physician's letters. However, due to the limited storage space (32kB), some information is deposited on servers.
Accessibility
United States
In the United States, the most basic rules governing access to a medical record dictate that only the patient and the health-care providers directly involved in delivering care have the right to view the record. The patient, however, may grant consent for any person or entity to evaluate the record. The full rules regarding access and security for medical records are set forth under the guidelines of the Health Insurance Portability and Accountability Act (HIPAA).
The rules become more complicated in special situations. A 2018 study found discrepancies in how major hospitals handle record requests, with forms displaying limited information relative to phone conversations.
Capacity
When a patient does not have capacity (is not legally able) to make decisions regarding his or her own care, a legal guardian is designated (either through next of kin or by action of a court of law if no kin exists). Legal guardians have the ability to access the medical record in order to make medical decisions on the patient’s behalf. Those without capacity include the comatose, minors (unless emancipated), and patients with incapacitating psychiatric illness or intoxication.
Medical emergency
In the event of a medical emergency involving a non-communicative patient, consent to access medical records is assumed unless written documentation has been previously drafted (such as an advance directive)
Research, auditing, and evaluation
Individuals involved in medical research, financial or management audits, or program evaluation have access to the medical record. They are not allowed access to any identifying information, however.
Risk of death or harm
Information within the record can be shared with authorities without permission when failure to do so would result in death or harm, either to the patient or to others. Information cannot be used, however, to initiate or substantiate a charge unless the previous criteria are met (i.e., information from illicit drug testing cannot be used to bring charges of possession against a patient). This rule was established in the United States Supreme Court case Jaffe v. Redmond.
Canada
In the 1992 Canadian Supreme Court ruling in McInerney v. MacDonald gave patients the right to copy and examine all information in their medical records, while the records themselves remained the property of the healthcare provider. The 2004 Personal Health Information Protection Act (PHIPA) contains regulatory guidelines to protect the confidentiality of patient information for healthcare organizations acting as stewards of their medical records. Despite legal precedent for access nationwide, there is still some variance in laws depending on the province. There is also some confusion among providers as to the scope of the patient information they have to give access to, but the language in the supreme court ruling gives patient access rights to their entire record.
United Kingdom
In the United Kingdom, the Data Protection Acts and later the Freedom of Information Act 2000 gave patients or their representatives the right to a copy of their record, except where information breaches confidentiality (e.g., information from another family member or where a patient has asked for information not to be disclosed to third parties) or would be harmful to the patient's wellbeing (e.g., some psychiatric assessments). Also, the legislation gives patients the right to check for any errors in their record and insist that amendments be made if required.
Destruction
In general, entities in possession of medical records are required to maintain those records for a given period. In the United Kingdom, medical records are required for the lifetime of a patient and legally for as long as that complaint action can be brought. Generally in the UK, any recorded information should be kept legally for 7 years, but for medical records additional time must be allowed for any child to reach the age of responsibility (20 years). Medical records are required many years after a patient's death to investigate illnesses within a community (e.g., industrial or environmental disease or even deaths at the hands of doctors committing murders, as in the Harold Shipman case).
Abuses
The outsourcing of medical record transcription and storage has the potential to violate patient–physician confidentiality by possibly allowing unaccountable persons access to patient data.
Falsification of a medical record by a medical professional is a felony in most United States jurisdictions.
Governments have often refused to disclose medical records of military personnel who have been used as experimental subjects.
Data breaches
Given the series of medical data breaches and the lack of public trust, some countries have enacted laws requiring safeguards to be put in place to protect the security and confidentiality of medical information as it is shared electronically and to give patients some important rights to monitor their medical records and receive notification for loss and unauthorized acquisition of health information. The United States and the EU have imposed mandatory medical data breach notifications.
Patients' medical information can be shared by a number of people both within the health care industry and beyond. The Health Insurance Portability and Accessibility Act (HIPAA) is a United States federal law pertaining to medical privacy that went into effect in 2003. This law established standards for patient privacy in all 50 states, including the right of patients to access to their own records. HIPAA provides some protection, but does not resolve the issues involving medical records privacy.
Medical and health care providers experienced 767 security breaches resulting in the compromised confidential health information of 23,625,933 patients during the period of 2006–2012.
Privacy
The federal Health Insurance Portability and Accessibility Act (HIPAA) addresses the issue of privacy by providing medical information handling guidelines. Not only is it bound by the Code of Ethics of its profession (in the case of doctors and nurses), but also by the legislation on data protection and criminal law. Professional secrecy applies to practitioners, psychologists, nursing, physiotherapists, occupational therapists, nursing assistants, chiropodists, and administrative personnel, as well as auxiliary hospital staff. The maintenance of the confidentiality and privacy of patients implies first of all in the medical history, which must be adequately guarded, remaining accessible only to the authorized personnel. However, the precepts of privacy must be observed in all fields of hospital life: privacy at the time of the conduct of the anamnesis and physical exploration, the privacy at the time of the information to the relatives, the conversations between healthcare providers in the corridors, maintenance of adequate patient data collection in hospital nursing controls (planks, slates), telephone conversations, open intercoms etc.
See also
Bioethics
Electronic health record
Hospital information system
Medical history
Medical law
OpenNotes
Patient record access
Right to know
Physical examination
Physician-patient privilege
Labour inspection
Midwife
Nursing
Pharmaceutical
References
External links
Personal Medical Records from MedlinePlus
American Health Information Management Association
Medical Record Privacy - Electronic Privacy Information Center (EPIC)
Organizations dealing with medical records
ASTM Continuity of Care Record - a patient health summary standard based upon XML, the CCR can be created, read and interpreted by various EHR or Electronic Medical Record (EMR) systems, allowing easy interoperability between otherwise disparate entities.
American Health Information Management Association
Health informatics
Public records |
1596302 | https://en.wikipedia.org/wiki/Evenor | Evenor | Evenor (Ancient Greek: or Εὐήνορα Euenor means 'joy of men') is the name of a character from the myth of Atlantis and of several historical figures.
Mythological
Evenor, father of Cleito by Leucippe.
Evenor, the "brazen-tasleted" Achaean warrior who participated in the Trojan War. He was from Dulichium and was slain by Paris during the siege of Troy.
Evenor, a Trojan soldier who was killed by Neoptolemus during the Trojan War. The latter smote Evenor above the flank and drove the spear into his liver which resulted to his swift anguished death.
Evenor, father of Leocritus and possibly, of Evenorides, both were Suitors of Penelope.
Historical
Evenor, a Greek painter who flourished around 420 BC, the father and teacher of the better-known painter Parrhasius of Ephesus.
Evenor, a Greek surgeon and medical author who lived in or before the 3rd century BC and apparently wrote about fractures and joint dislocations; if he is the same as an Evenor quoted by Pliny the Elder, he also wrote about the medicinal properties of plants.
Notes
References
Apollodorus, The Library with an English Translation by Sir James George Frazer, F.B.A., F.R.S. in 2 Volumes, Cambridge, MA, Harvard University Press; London, William Heinemann Ltd. 1921. ISBN 0-674-99135-4. Online version at the Perseus Digital Library. Greek text available from the same website.
Homer, The Odyssey with an English Translation by A.T. Murray, PH.D. in two volumes. Cambridge, MA., Harvard University Press; London, William Heinemann, Ltd. 1919. . Online version at the Perseus Digital Library. Greek text available from the same website.
Pliny the Elder, The Natural History. John Bostock, M.D., F.R.S. H.T. Riley, Esq., B.A. London. Taylor and Francis, Red Lion Court, Fleet Street. 1855. Online version at the Perseus Digital Library.
Pliny the Elder, Naturalis Historia. Karl Friedrich Theodor Mayhoff. Lipsiae. Teubner. 1906. Latin text available at the Perseus Digital Library.
Quintus Smyrnaeus, The Fall of Troy translated by Way. A. S. Loeb Classical Library Volume 19. London: William Heinemann, 1913. Online version at theoi.com
Quintus Smyrnaeus, The Fall of Troy. Arthur S. Way. London: William Heinemann; New York: G.P. Putnam's Sons. 1913. Greek text available at the Perseus Digital Library.
Achaeans (Homer)
Characters in the Odyssey
Characters in Greek mythology
3rd-century BC Greek physicians
Ancient Greek writers known only from secondary sources |
2771695 | https://en.wikipedia.org/wiki/Ututo | Ututo | Ututo is a Linux distribution consisting entirely of free software. The distribution is named for a variety of gecko found in northern Argentina.
Ututo was the first fully free Linux-based system recognized by the GNU Project. The founder of the GNU Project, Richard Stallman, formerly endorsed the distribution nearly exclusively, and used it on his personal computer, before he switched to gNewSense, and later Trisquel.
History
Ututo was first released in 2000 by Diego Saravia in National University of Salta. Argentina. It was one of the first live CD distributions in the world and the first Linux distribution in Argentina. Ututo carried Simusol, a system to simulate Solar Energy projects. Ututo was simple to install, because it did not need any configuration. It automatically detected the hardware in the machine, it only asked to "move your mouse". At that time no other distribution worked that way.
In 2002, Ututo-R was created, which offered the possibility of operating like a software router. This version was created by Marcos Zapata and used in Buenos Aires public schools.
In 2004, the Ututo-e project was born, swiftly becoming the most important derivative of Ututo. This project was started by Daniel Olivera.
In 2006, Ututo was declared "of National Interest" by the Argentine Chamber of Deputies.
Ututo XS
Ututo XS is the current stable version of Ututo.
Ututo XS is compiled using Gentoo Linux ebuilds and emerge software. All documentation is in Spanish.
With the emergence of the XS series, many new features were added, including a faster system installer. Ututo has been used in different hardware projects such as . Pablo Manuel Rizzo designed the package management system, Ututo-Get, modelled after Debian's APT; however, as other Gentoo-based distros, Ututo is compatible with Portage.
Ututo has different binaries optimized for different Intel and AMD processors .
With no releases since 2012 the distribution is considered "dormant".
Ututo UL
Ututo UL (or Ubuntu-Libre) is the current developed version of Ututo. Ututo UL utilize Ubuntu as the distro base, with all non-free software removed as usual in the Ututo project, and Linux-libre as the kernel.
In 2017 the original idea of distributing Simusol, a system to simulate Solar Energy projects, returned to the heart of the project.
Reception
Tux Machines reviewed Utoto in 2006:
See also
Comparison of Linux distributions
GNU/Linux naming controversy
List of Linux distributions based on Gentoo
List of 3rd-party Linux distributions based on Ubuntu
References
External links
A review of Ututo-e by Linux.com
Richard Stallman talking about Ututo
2000 software
Free software only Linux distributions
Gentoo Linux derivatives
X86-64 Linux distributions
Linux distributions |
19641 | https://en.wikipedia.org/wiki/Mass%20media | Mass media | Mass media refers to a diverse array of media technologies that reach a large audience via mass communication. The technologies through which this communication takes place include a variety of outlets.
Broadcast media transmit information electronically via media such as films, radio, recorded music, or television. Digital media comprises both Internet and mobile mass communication. Internet media comprise such services as email, social media sites, websites, and Internet-based radio and television. Many other mass media outlets have an additional presence on the web, by such means as linking to or running TV ads online, or distributing QR codes in outdoor or print media to direct mobile users to a website. In this way, they can use the easy accessibility and outreach capabilities the Internet affords, as thereby easily broadcast information throughout many different regions of the world simultaneously and cost-efficiently. Outdoor media transmit information via such media as AR advertising; billboards; blimps; flying billboards (signs in tow of airplanes); placards or kiosks placed inside and outside buses, commercial buildings, shops, sports stadiums, subway cars, or trains; signs; or skywriting. Print media transmit information via physical objects, such as books, comics, magazines, newspapers, or pamphlets. Event organising and public speaking can also be considered forms of mass media.
The organisations that control these technologies, such as movie studios, publishing companies, and radio and television stations, are also known as the mass media.
Issues with definition
In the late 20th century, mass media could be classified into eight mass media industries: books, the Internet, magazines, movies, newspapers, radio, recordings and television. The explosion of digital communication technology in the late 20th and early 21st centuries made prominent the question: what forms of media should be classified as "mass media"? For example, it is controversial whether to include mobile phones, computer games (such as MMORPGs) and video games in the definition. In the early 2000s, a classification called the "seven mass media" came into use. In order of introduction, they are:
Print (books, pamphlets, newspapers, magazines, posters, etc.) from the late 15th century
Recordings (gramophone records, magnetic tapes, cassettes, cartridges, CDs and DVDs) from the late 19th century
Cinema from about 1900
Radio from about 1910
Television from about 1950
Internet from about 1990
Mobile phones from about 2000
Each mass medium has its own content types, creative artists, technicians and business models. For example, the Internet includes blogs, podcasts, web sites and various other technologies built atop the general distribution network. The sixth and seventh media, Internet and mobile phones, are often referred to collectively as digital media; and the fourth and fifth, radio and TV, as broadcast media. Some argue that video games have developed into a distinct mass form of media.
While a telephone is a two-way communication device, mass media communicates to a large group. In addition, the telephone has transformed into a cell phone which is equipped with Internet access. A question arises whether this makes cell phones a mass medium or simply a device used to access a mass medium (the Internet). There is currently a system by which marketers and advertisers are able to tap into satellites, and broadcast commercials and advertisements directly to cell phones, unsolicited by the phone's user. This transmission of mass advertising to millions of people is another form of mass communication.
Video games may also be evolving into a mass medium. Video games (for example, massively multiplayer online role-playing games (MMORPGs), such as RuneScape) provide a common gaming experience to millions of users across the globe and convey the same messages and ideologies to all their users. Users sometimes share the experience with one another by playing online. Excluding the Internet, however, it is questionable whether players of video games are sharing a common experience when they play the game individually. It is possible to discuss in great detail the events of a video game with a friend one has never played with, because the experience is identical to each. The question, then, is whether this is a form of mass communication.
Characteristics
Five characteristics of mass communication have been identified by sociologist John Thompson of Cambridge University:
"[C]omprises both technical and institutional methods of production and distribution" – This is evident throughout the history of mass media, from print to the Internet, each suitable for commercial utility
Involves the "commodification of symbolic forms" – as the production of materials relies on its ability to manufacture and sell large quantities of the work; as radio stations rely on their time sold to advertisements, so too newspapers rely on their space for the same reasons
"[S]eparate contexts between the production and reception of information"
Its "reach to those 'far removed' in time and space, in comparison to the producers"
"[I]nformation distribution" – a "one to many" form of communication, whereby products are mass-produced and disseminated to a great quantity of audiences
Mass vs. mainstream and alternative
The term "mass media" is sometimes erroneously used as a synonym for "mainstream media". Mainstream media are distinguished from alternative media by their content and point of view. Alternative media are also "mass media" outlets in the sense that they use technology capable of reaching many people, even if the audience is often smaller than the mainstream.
In common usage, the term "mass" denotes not that a given number of individuals receives the products, but rather that the products are available in principle to a plurality of recipients.
Forms of mass media
Broadcast
The sequencing of content in a broadcast is called a schedule. With all technological endeavours a number of technical terms and slang have developed.
Radio and television programs are distributed over frequency bands which are highly regulated in the United States. Such regulation includes determination of the width of the bands, range, licensing, types of receivers and transmitters used, and acceptable content.
Cable television programs are often broadcast simultaneously with radio and television programs, but have a more limited audience. By coding signals and requiring a cable converter box at individual recipients' locations, cable also enables subscription-based channels and pay-per-view services.
A broadcasting organisation may broadcast several programs simultaneously, through several channels (frequencies), for example BBC One and Two. On the other hand, two or more organisations may share a channel and each use it during a fixed part of the day, such as the Cartoon Network/Adult Swim. Digital radio and digital television may also transmit multiplexed programming, with several channels compressed into one ensemble.
When broadcasting is done via the Internet the term webcasting is often used. In 2004, a new phenomenon occurred when a number of technologies combined to produce podcasting. Podcasting is an asynchronous broadcast/narrowcast medium. Adam Curry and his associates, the Podshow, are principal proponents of podcasting.
Film
The term 'film' encompasses motion pictures as individual projects, as well as the field in general. The name comes from the photographic film (also called film stock), historically the primary medium for recording and displaying motion pictures. Many other terms for film exist, such as motion pictures (or just pictures and "picture"), the silver screen, photoplays, the cinema, picture shows, flicks and, most commonly, movies.
Films are produced by recording people and objects with cameras, or by creating them using animation techniques or special effects. Films comprise a series of individual frames, but when these images are shown in rapid succession, an illusion of motion is created. Flickering between frames is not seen because of an effect known as persistence of vision, whereby the eye retains a visual image for a fraction of a second after the source has been removed. Also of relevance is what causes the perception of motion: a psychological effect identified as beta movement.
Film has emerged as an important art form. They entertain, educate, enlighten and inspire audiences. Any film can become a worldwide attraction, especially with the addition of dubbing or subtitles that translate the original language.
Video games
A video game is a computer-controlled game in which a video display, such as a monitor or television set, is the primary feedback device. The term "computer game" also includes games which display only text or which use other methods, such as sound or vibration, as their primary feedback device. There always must also be some sort of input device, usually in the form of button/joystick combinations (on arcade games), a keyboard and mouse/trackball combination (computer games), a controller (console games), or a combination of any of the above. Also, more esoteric devices have been used for input, e.g., the player's motion. Usually there are rules and goals, but in more open-ended games the player may be free to do whatever they like within the confines of the virtual universe.
In common usage, an "arcade game" refers to a game designed to be played in an establishment in which patrons pay to play on a per-use basis. A "computer game" or "PC game" refers to a game that is played on a personal computer. A "Console game" refers to one that is played on a device specifically designed for the use of such, while interfacing with a standard television set. A "video game" (or "videogame") has evolved into a catchall phrase that encompasses the aforementioned along with any game made for any other device, including, but not limited to, advanced calculators, mobile phones, PDAs, etc.
Audio recording and reproduction
Sound recording and reproduction is the electrical or mechanical re-creation or amplification of sound, often as music. This involves the use of audio equipment such as microphones, recording devices and loudspeakers. From early beginnings with the invention of the phonograph using purely mechanical techniques, the field has advanced with the invention of electrical recording, the mass production of the 78 record, the magnetic wire recorder followed by the tape recorder, the vinyl LP record. The invention of the compact cassette in the 1960s, followed by Sony's Walkman, gave a major boost to the mass distribution of music recordings, and the invention of digital recording and the compact disc in 1983 brought massive improvements in ruggedness and quality. The most recent developments have been in digital audio players.
An album is a collection of related audio recordings, released together to the public, usually commercially.
The term record album originated from the fact that 78 RPM phonograph disc records were kept together in a book resembling a photo album. The first collection of records to be called an "album" was Tchaikovsky's Nutcracker Suite, release in April 1909 as a four-disc set by Odeon Records. It retailed for 16 shillings—about £15 in modern currency.
A music video (also promo) is a short film or video that accompanies a complete piece of music, most commonly a song. Modern music videos were primarily made and used as a marketing device intended to promote the sale of music recordings. Although the origins of music videos go back much further, they came into their own in the 1980s, when Music Television's format was based on them. In the 1980s, the term "rock video" was often used to describe this form of entertainment, although the term has fallen into disuse.
Music videos can accommodate all styles of filmmaking, including animation, live-action films, documentaries, and non-narrative, abstract film.
Internet
The Internet (also known simply as "the Net" or less precisely as "the Web") is a more interactive medium of mass media, and can be briefly described as "a network of networks". Specifically, it is the worldwide, publicly accessible network of interconnected computer networks that transmit data by packet switching using the standard Internet Protocol (IP). It consists of millions of smaller domestic, academic, business and governmental networks, which together carry various information and services, such as email, online chat, file transfer, and the interlinked web pages and other documents of the World Wide Web.
Contrary to some common usage, the Internet and the World Wide Web are not synonymous: the Internet is the system of interconnected computer networks, linked by copper wires, fibre-optic cables, wireless connections etc.; the Web is the contents, or the interconnected documents, linked by hyperlinks and URLs. The World Wide Web is accessible through the Internet, along with many other services including e-mail, file sharing and others described below.
Toward the end of the 20th century, the advent of the World Wide Web marked the first era in which most individuals could have a means of exposure on a scale comparable to that of mass media. Anyone with a web site has the potential to address a global audience, although serving to high levels of web traffic is still relatively expensive. It is possible that the rise of peer-to-peer technologies may have begun the process of making the cost of bandwidth manageable. Although a vast amount of information, imagery, and commentary (i.e. "content") has been made available, it is often difficult to determine the authenticity and reliability of information contained in web pages (in many cases, self-published). The invention of the Internet has also allowed breaking news stories to reach around the globe within minutes. This rapid growth of instantaneous, decentralised communication is often deemed likely to change mass media and its relationship to society.
"Cross-media" means the idea of distributing the same message through different media channels. A similar idea is expressed in the news industry as "convergence". Many authors understand cross-media publishing to be the ability to publish in both print and on the web without manual conversion effort. An increasing number of wireless devices with mutually incompatible data and screen formats make it even more difficult to achieve the objective "create once, publish many".
The Internet is quickly becoming the center of mass media. Everything is becoming accessible via the internet. Rather than picking up a newspaper, or watching the 10 o'clock news, people can log onto the internet to get the news they want, when they want it. For example, many workers listen to the radio through the Internet while sitting at their desk.
Even the education system relies on the Internet. Teachers can contact the entire class by sending one e-mail. They may have web pages on which students can get another copy of the class outline or assignments. Some classes have class blogs in which students are required to post weekly, with students graded on their contributions.
Blogs (web logs)
Blogging, too, has become a pervasive form of media. A blog is a website, usually maintained by an individual, with regular entries of commentary, descriptions of events, or interactive media such as images or video. Entries are commonly displayed in reverse chronological order, with most recent posts shown on top. Many blogs provide commentary or news on a particular subject; others function as more personal online diaries. A typical blog combines text, images and other graphics, and links to other blogs, web pages, and related media. The ability for readers to leave comments in an interactive format is an important part of many blogs. Most blogs are primarily textual, although some focus on art (artlog), photographs (photoblog), sketchblog, videos (vlog), music (MP3 blog) and audio (podcasting), are part of a wider network of social media. Microblogging is another type of blogging which consists of blogs with very short posts.
RSS feeds
RSS is a format for syndicating news and the content of news-like sites, including major news sites like Wired, news-oriented community sites like Slashdot, and personal blogs. It is a family of Web feed formats used to publish frequently updated content such as blog entries, news headlines, and podcasts. An RSS document (which is called a "feed" or "web feed" or "channel") contains either a summary of content from an associated web site or the full text. RSS makes it possible for people to keep up with web sites in an automated manner that can be piped into special programs or filtered displays.
Podcast
A podcast is a series of digital-media files which are distributed over the Internet using syndication feeds for playback on portable media players and computers. The term podcast, like broadcast, can refer either to the series of content itself or to the method by which it is syndicated; the latter is also called podcasting. The host or author of a podcast is often called a podcaster.
Mobile
Mobile phones were introduced in Japan in 1979 but became a mass media only in 1998 when the first downloadable ringing tones were introduced in Finland. Soon most forms of media content were introduced on mobile phones, tablets and other portable devices, and today the total value of media consumed on mobile vastly exceeds that of internet content, and was worth over $31 billion in 2007 (source Informa). The mobile media content includes over $8 billion worth of mobile music (ringing tones, ringback tones, truetones, MP3 files, karaoke, music videos, music streaming services etc.); over $5 billion worth of mobile gaming; and various news, entertainment and advertising services. In Japan mobile phone books are so popular that five of the ten best-selling printed books were originally released as mobile phone books.
Similar to the internet, mobile is also an interactive media, but has far wider reach, with 3.3 billion mobile phone users at the end of 2007 to 1.3 billion internet users (source ITU). Like email on the internet, the top application on mobile is also a personal messaging service, but SMS text messaging is used by over 2.4 billion people. Practically all internet services and applications exist or have similar cousins on mobile, from search to multiplayer games to virtual worlds to blogs. Mobile has several unique benefits which many mobile media pundits claim make mobile a more powerful media than either TV or the internet, starting with mobile being permanently carried and always connected. Mobile has the best audience accuracy and is the only mass media with a built-in payment channel available to every user without any credit cards or PayPal accounts or even an age limit. Mobile is often called the 7th Mass Medium and either the fourth screen (if counting cinema, TV and PC screens) or the third screen (counting only TV and PC).
Print media
Magazine
A magazine is a periodical publication containing a variety of articles, generally financed by advertising or purchase by readers.
Magazines are typically published weekly, biweekly, monthly, bimonthly or quarterly, with a date on the cover that is in advance of the date it is actually published. They are often printed in color on coated paper, and are bound with a soft cover.
Magazines fall into two broad categories: consumer magazines and business magazines. In practice, magazines are a subset of periodicals, distinct from those periodicals produced by scientific, artistic, academic or special interest publishers which are subscription-only, more expensive, narrowly limited in circulation, and often have little or no advertising.
Magazines can be classified as:
General interest magazines (e.g. Frontline, India Today, The Week, The Sunday Times etc.)
Special interest magazines (women's, sports, business, scuba diving, etc.)
Newspaper
A newspaper is a publication containing news and information and advertising, usually printed on low-cost paper called newsprint. It may be general or special interest, most often published daily or weekly. The most important function of newspapers is to inform the public of significant events. Local newspapers inform local communities and include advertisements from local businesses and services, while national newspapers tend to focus on a theme, which can be exampled with The Wall Street Journal as they offer news on finance and business related-topics. The first printed newspaper was published in 1605, and the form has thrived even in the face of competition from technologies such as radio and television. Recent developments on the Internet are posing major threats to its business model, however. Paid circulation is declining in most countries, and advertising revenue, which makes up the bulk of a newspaper's income, is shifting from print to online; some commentators, nevertheless, point out that historically new media such as radio and television did not entirely supplant existing.
The internet has challenged the press as an alternative source of information and opinion but has also provided a new platform for newspaper organisations to reach new audiences. According to the World Trends Report, between 2012 and 2016, print newspaper circulation continued to fall in almost all regions, with the exception of Asia and the Pacific, where the dramatic increase in sales in a few select countries has offset falls in historically strong Asian markets such as Japan and the Republic of Korea. Most notably, between 2012 and 2016, India's print circulation grew by 89 per cent.
Outdoor media
Outdoor media is a form of mass media which comprises billboards, signs, placards placed inside and outside commercial buildings/objects like shops/buses, flying billboards (signs in tow of airplanes), blimps, skywriting, AR advertising. Many commercial advertisers use this form of mass media when advertising in sports stadiums. Tobacco and alcohol manufacturers used billboards and other outdoor media extensively. However, in 1998, the Master Settlement Agreement between the US and the tobacco industries prohibited the billboard advertising of cigarettes. In a 1994 Chicago-based study, Diana Hackbarth and her colleagues revealed how tobacco- and alcohol-based billboards were concentrated in poor neighbourhoods. In other urban centers, alcohol and tobacco billboards were much more concentrated in African-American neighbourhoods than in white neighbourhoods.
Purposes
Mass media encompasses much more than just news, although it is sometimes misunderstood in this way. It can be used for various purposes:
Advocacy, both for business and social concerns. This can include advertising, marketing, propaganda, public relations and political communication.
Entertainment, traditionally through performances of acting, music and TV shows along with light reading; since the late 20th century also through video and computer games.
Public service announcements and emergency alerts (that can be used as political device to communicate propaganda to the public).
Professions involving mass media
Journalism
Journalism is the discipline of collecting, analyzing, verifying and presenting information regarding current events, trends, issues and people. Those who practice journalism are known as journalists.
News-oriented journalism is sometimes described as the "first rough draft of history" (attributed to Phil Graham), because journalists often record important events, producing news articles on short deadlines. While under pressure to be first with their stories, news media organisations usually edit and proofread their reports prior to publication, adhering to each organisation's standards of accuracy, quality and style. Many news organisation claim proud traditions of holding government officials and institutions accountable to the public, while media critics have raised questions about holding the press itself accountable to the standards of professional journalism.
Public relations
Public relations is the art and science of managing communication between an organisation and its key publics to build, manage and sustain its positive image. Examples include:
Corporations use marketing public relations to convey information about the products they manufacture or services they provide to potential customers to support their direct sales efforts. Typically, they support sales in the short and long term, establishing and burnishing the corporation's branding for a strong, ongoing market.
Corporations also use public relations as a vehicle to reach legislators and other politicians, seeking favorable tax, regulatory, and other treatment, and they may use public relations to portray themselves as enlightened employers, in support of human-resources recruiting programs.
Nonprofit organisations, including schools and universities, hospitals, and human and social service agencies, use public relations in support of awareness programs, fund-raising programs, staff recruiting, and to increase patronage of their services.
Politicians use public relations to attract votes and raise money, and when successful at the ballot box, to promote and defend their service in office, with an eye to the next election or, at career's end, to their legacy.
Publishing
Publishing is the industry concerned with the production of literature or information – the activity of making information available for public view. In some cases, authors may be their own publishers.
Traditionally, the term refers to the distribution of printed works such as books and newspapers. With the advent of digital information systems and the Internet, the scope of publishing has expanded to include websites, blogs and the like.
As a business, publishing includes the development, marketing, production, and distribution of newspapers, magazines, books, literary works, musical works, software and other works dealing with information.
Publication is also important as a legal concept; (1) as the process of giving formal notice to the world of a significant intention, for example, to marry or enter bankruptcy, and; (2) as the essential precondition of being able to claim defamation; that is, the alleged libel must have been published.
Software publishing
A software publisher is a publishing company in the software industry between the developer and the distributor. In some companies, two or all three of these roles may be combined (and indeed, may reside in a single person, especially in the case of shareware).
Software publishers often license software from developers with specific limitations, such as a time limit or geographical region. The terms of licensing vary enormously, and are typically secret.
Developers may use publishers to reach larger or foreign markets, or to avoid focussing on marketing. Or publishers may use developers to create software to meet a market need that the publisher has identified.
Internet Based Professions
A YouTuber is anyone who has made their fame from creating and promoting videos on the public video-sharing site, YouTube. Many YouTube celebrities have made a profession from their site through sponsorships, advertisements, product placement, and network support.
History
The history of mass media can be traced back to the days when dramas were performed in various ancient cultures. This was the first time when a form of media was "broadcast" to a wider audience. The first dated printed book known is the "Diamond Sutra", printed in China in 868 AD, although it is clear that books were printed earlier. Movable clay type was invented in 1041 in China. However, due to the slow spread of literacy to the masses in China, and the relatively high cost of paper there, the earliest printed mass-medium was probably European popular prints from about 1400. Although these were produced in huge numbers, very few early examples survive, and even most known to be printed before about 1600 have not survived. The term "mass media" was coined with the creation of print media, which is notable for being the first example of mass media, as we use the term today. This form of media started in Europe in the Middle Ages.
Johannes Gutenberg's invention of the printing press allowed the mass production of books to sweep the nation. He printed the first book, a Latin Bible, on a printing press with movable type in 1453. The invention of the printing press gave rise to some of the first forms of mass communication, by enabling the publication of books and newspapers on a scale much larger than was previously possible. The invention also transformed the way the world received printed materials, although books remained too expensive really to be called a mass-medium for at least a century after that. Newspapers developed from about 1612, with the first example in English in 1620; but they took until the 19th century to reach a mass-audience directly. The first high-circulation newspapers arose in London in the early 1800s, such as The Times, and were made possible by the invention of high-speed rotary steam printing presses, and railroads which allowed large-scale distribution over wide geographical areas. The increase in circulation, however, led to a decline in feedback and interactivity from the readership, making newspapers a more one-way medium.
The phrase "the media" began to be used in the 1920s. The notion of "mass media" was generally restricted to print media up until the post-Second World War, when radio, television and video were introduced. The audio-visual facilities became very popular, because they provided both information and entertainment, because the colour and sound engaged the viewers/listeners and because it was easier for the general public to passively watch TV or listen to the radio than to actively read. In recent times, the Internet become the latest and most popular mass medium. Information has become readily available through websites, and easily accessible through search engines. One can do many activities at the same time, such as playing games, listening to music and social networking, irrespective of location. Whilst other forms of mass media are restricted in the type of information they can offer, the internet comprises a large percentage of the sum of human knowledge through such things as Google Books. Modern-day mass media includes the internet, mobile phones, blogs, podcasts and RSS feeds.
During the 20th century, the growth of mass media was driven by technology, including that which allowed much duplication of material. Physical duplication technologies such as printing, record pressing and film duplication allowed the duplication of books, newspapers and movies at low prices to huge audiences. Radio and television allowed the electronic duplication of information for the first time. Mass media had the economics of linear replication: a single work could make money. An example of Riel and Neil's theory. proportional to the number of copies sold, and as volumes went up, unit costs went down, increasing profit margins further. Vast fortunes were to be made in mass media. In a democratic society, the media can serve the electorate about issues regarding government and corporate entities (see Media influence). Some consider the concentration of media ownership to be a threat to democracy.
Mergers and acquisitions
Between 1985 and 2018 about 76,720 deals have been announced in the media industry. This sums up to an overall value of around US$5,634 billion. There have been three major waves of M&A in the mass media sector (2000, 2007 and 2015), while the most active year in terms of numbers was 2007 with around 3,808 deals. The United States is the most prominent country in media M&A with 41 of the top 50 deals having an acquirer from the United States.
The largest deal in history was the acquisition of Time Warner by AOL Inc. for US$164,746.86 million.
Influence and sociology
Limited-effects theory, originally tested in the 1940s and 1950s, considers that because people usually choose what media to interact with based on what they already believe, media exerts a negligible influence. Class-dominant theory argues that the media reflects and projects the view of a minority elite, which controls it. Culturalist theory, which was developed in the 1980s and 1990s, combines the other two theories and claims that people interact with media to create their own meanings out of the images and messages they receive. This theory states that audience members play an active, rather than passive role in relation to mass media.
There is an article that argues 90 percent of all mass media including radio broadcast networks and programing, video news, sports entertainment, and others are owned by 6 major companies (GE, News-Corp, Disney, Viacom, Time Warner and CBS). According to Morris Creative Group, these six companies made over $200 billion in revenue in 2010. More diversity is brewing among many companies, but they have recently merged to form an elite which have the power to control the narrative of stories and alter people's beliefs. In the new media-driven age we live in, marketing has more value than ever before because of the various ways it can be implemented. Advertisements can convince citizens to purchase a specific product or have consumers avoid a particular product. The definition of what is acceptable by society can be heavily dictated by the media in regards to the amount of attention it receives.
The documentary Super Size Me describes how companies like McDonald's have been sued in the past, the plaintiffs claiming that it was the fault of their liminal and subliminal advertising that "forced" them to purchase the product. The Barbie and Ken dolls of the 1950s are sometimes cited as the main cause for the obsession in modern-day society for women to be skinny and men to be buff. After the attacks of 9/11, the media gave extensive coverage of the event and exposed Osama Bin Laden's guilt for the attack, information they were told by the authorities. This shaped the public opinion to support the war on terrorism, and later, the war on Iraq. A main concern is that due to this extreme power of the mass media, portraying inaccurate information could lead to an immense public concern. In his book The Commercialization of American Culture, Matthew P. McAllister says that "a well-developed media system, informing and teaching its citizens, helps democracy move toward its ideal state."
In 1997, J. R. Finnegan Jr. and K. Viswanath identified three main effects or functions of mass media:
The Knowledge Gap: The mass media influences knowledge gaps due to factors including "the extent to which the content is appealing, the degree to which information channels are accessible and desirable, and the amount of social conflict and diversity there is in a community".
Agenda Setting: People are influenced in how they think about issues due to the selective nature of what media groups choose for public consumption. After publicly disclosing that he had prostate cancer prior to the 2000 New York senatorial election, Rudolph Giuliani, the mayor of New York City (aided by the media) sparked a huge priority elevation of the cancer in people's consciousness. This was because news media began to report on the risks of prostate cancer, which in turn prompted a greater public awareness about the disease and the need for screening. This ability for the media to be able to change how the public thinks and behaves has occurred on other occasions. In mid-1970s when Betty Ford and Happy Rockefeller, wives of the then-President and then-Vice President, respectively, were both diagnosed with breast cancer. J. J. Davis states that "when risks are highlighted in the media, particularly in great detail, the extent of agenda setting is likely to be based on the degree to which a public sense of outrage and threat is provoked". When wanting to set an agenda, framing can be invaluably useful to a mass media organisation. Framing involves "taking a leadership role in the organisation of public discourse about an issue". The media is influenced by the desire for balance in coverage, and the resulting pressures can come from groups with particular political action and advocacy positions. Finnegan and Viswanath say, "groups, institutions and advocates compete to identify problems, to move them onto the public agenda, and to define the issues symbolically" (1997, p. 324).
Cultivation of Perceptions: The extent to which media exposure shapes audience perceptions over time is known as cultivation. Television is a common experience, especially in places like the United States, to the point where it can be described as a "homogenising agent" (S. W. Littlejohn). However, instead of being merely a result of the TV, the effect is often based on socioeconomic factors. Having a prolonged exposure to TV or movie violence might affect a viewer to the extent where they actively think community violence is a problem, or alternatively find it justifiable. The resulting belief is likely to be different depending on where people live, however.
Since the 1950s, when cinema, radio and TV began to be the primary or the only source of information for a larger and larger percentage of the population, these media began to be considered as central instruments of mass control. Up to the point that it emerged the idea that when a country has reached a high level of industrialisation, the country itself "belongs to the person who controls communications."
Mass media play a significant role in shaping public perceptions on a variety of important issues, both through the information that is dispensed through them, and through the interpretations they place upon this information. They also play a large role in shaping modern culture, by selecting and portraying a particular set of beliefs, values and traditions (an entire way of life), as reality. That is, by portraying a certain interpretation of reality, they shape reality to be more in line with that interpretation. Mass media also play a crucial role in the spread of civil unrest activities such as anti-government demonstrations, riots and general strikes. That is, the use of radio and television receivers has made the unrest influence among cities not only by the geographic location of cities, but also by proximity within the mass media distribution networks.
Racism and stereotyping
Mass media sources, through theories like framing and agenda-setting, can affect the scope of a story as particular facts and information are highlighted (Media influence). This can directly correlate with how individuals may perceive certain groups of people, as the only media coverage a person receives can be very limited and may not reflect the whole story or situation; stories are often covered to reflect a particular perspective to target a specific demographic.
Example
According to Stephen Balkaran, an Instructor of Political Science and African American Studies at Central Connecticut State University, mass media has played a large role in the way white Americans perceive African Americans. The media focus on African American in the contexts of crime, drug use, gang violence and other forms of anti-social behavior has resulted in a distorted and harmful public perception of African Americans.
In his 1999 article "Mass Media and Racism", Balkaran states: "The media has played a key role in perpetuating the effects of this historical oppression and in contributing to African Americans' continuing status as second-class citizens". This has resulted in an uncertainty among white Americans as to what the genuine nature of African Americans really is. Despite the resulting racial divide, the fact that these people are undeniably American has "raised doubts about the white man's value system". This means that there is a somewhat "troubling suspicion" among some Americans that their white America is tainted by the black influence. Mass media as well as propaganda tend to reinforce or introduce stereotypes to the general public.
Ethical issues and criticism
Lack of local or specific topical focus is a common criticism of mass media. A mass news media outlet is often forced to cover national and international news due to it having to cater for and be relevant for a wide demographic. As such, it has to skip over many interesting or important local stories because they simply do not interest the large majority of their viewers. An example given by the website WiseGeek is that "the residents of a community might view their fight against development as critical, but the story would only attract the attention of the mass media if the fight became controversial or if precedents of some form were set".
The term "mass" suggests that the recipients of media products constitute a vast sea of passive, undifferentiated individuals. This is an image associated with some earlier critiques of "mass culture" and mass society which generally assumed that the development of mass communication has had a largely negative impact on modern social life, creating a kind of bland and homogeneous culture which entertains individuals without challenging them. However, interactive digital media have also been seen to challenge the read-only paradigm of earlier broadcast media.
Whilst some refer to the mass media as "opiate of the masses", others argue that is a vital aspect of human societies. By understanding mass media, one is then able to analyse and find a deeper understanding of one's population and culture. This valuable and powerful ability is one reason why the field of media studies is popular. As WiseGeek says, "watching, reading, and interacting with a nation's mass media can provide clues into how people think, especially if a diverse assortment of mass media sources are perused".
Since the 1950s, in the countries that have reached a high level of industrialisation, the mass media of cinema, radio and TV have a key role in political power.
Contemporary research demonstrates an increasing level of concentration of media ownership, with many media industries already highly concentrated and dominated by a small number of firms.
Criticism
When the study of mass media began the media was compiled of only mass media which is a very different media system than the social media empire of the 21st-century experiences. With this in mind, there are critiques that mass media no longer exists, or at least that it doesn't exist in the same form as it once did. This original form of mass media put filters on what the general public would be exposed to in regards to "news" something that is harder to do in a society of social media.
Theorist Lance Bennett explains that excluding a few major events in recent history, it is uncommon for a group big enough to be labeled a mass, to be watching the same news via the same medium of mass production. Bennett's critique of 21st-century mass media argues that today it is more common for a group of people to be receiving different news stories, from completely different sources, and thus, mass media has been re-invented. As discussed above, filters would have been applied to original mass medias when the journalists decided what would or wouldn't be printed.
Social Media is a large contributor to the change from mass media to a new paradigm because through social media what is mass communication and what is interpersonal communication is confused. Interpersonal/niche communication is an exchange of information and information in a specific genre. In this form of communication, smaller groups of people are consuming news/information/opinions. In contrast, mass media in its original form is not restricted by genre and it is being consumed by the masses.
See also
Commercial broadcasting
Concentration of media ownership
Digital rights management
Interpersonal communication
Journalism
History of journalism
Media bias
Media echo chamber
Media regulation
Media-system dependency
Mediatization (media)
News media
Newspapers
History of Newspapers
Propaganda
Public relations
State media
Sources
Notes
Works cited
Further reading
Bösch, Frank. Mass Media and Historical Change: Germany in International Perspective, 1400 to the Present (Berghahn, 2015). 212 pp. online review
Cull, Nicholas John, David Culbert and David Welch, eds. Mass Persuasion: A Historical Encyclopedia, 1500 to the Present (2003) 479 pp; worldwide coverage
Dauber, Cori Elizabeth. "The shot seen 'round the world': The impact of the images of Mogadishu on American military operations." Rhetoric & Public Affairs 4.4 (2001): 653-687 online.
Folkerts, Jean and Dwight Teeter, eds. Voices of a Nation: A History of Mass Media in the United States (5th Edition, 2008)
Fourie, Pieter J. Media Studies: Media History, Media and Society (2008)
Graber, Doris A., and Johanna Dunaway. Mass media and American politics;; (CQ Press, 2017)
Paneth, Donald, ed. The Encyclopedia of American journalism (1983) online
Ross, Corey. Mass Communications, Society, and Politics from the Empire to the Third Reich (Oxford University press 2010) 448 pp, on Germany
Vaughn, Stephen L., ed. Encyclopedia of American Journalism (2007) online
In other languages
Hacker, Violaine "Citoyenneté culturelle et politique européenne des médias: entre compétitivité et promotion des valeurs", Nations, cultures et entreprises en Europe,'' sous la direction de Gilles Rouet, Collection Local et Global, L’Harmattan, Paris, pp. 163–84
External links
The Media: Carriers of Contagious Information
Peter Medlin, WNIJ, "Illinois Is the First State to Have High Schools Teach News Literacy," National Public Radio, August 12, 2021
Promotion and marketing communications
Main topic articles |
28196491 | https://en.wikipedia.org/wiki/John%20Melby | John Melby | John Melby (born 1941) is an American composer.
Life and work
John Melby is most widely known for his numerous compositions for computer-synthesized sounds, particularly in combination with live acoustic instruments. In addition to electronic music, Melby's catalog includes many acoustic chamber, vocal, and orchestral works. Since 2010, he has focused exclusively on writing acoustic music for chamber ensembles and symphony orchestra.
Born in Whitehall, Wisconsin, Melby holds degrees from the Curtis Institute of Music, the University of Pennsylvania, and Princeton University. He studied with Henry Weinberg, George Crumb, Peter Westergaard, J. K. Randall, and Milton Babbitt. Melby has held faculty positions at West Chester University and was appointed to the faculty of the School of Music of the University of Illinois at Urbana-Champaign in 1973, where he served until his retirement in 1997.
Melby has won numerous awards for his work including an NEA Fellowship (1977), a Guggenheim Fellowship (1983), an award from the American Academy of Arts and Letters (1984), and the 1979 First Prize from the International Electroacoustic Music Awards in Bourges, France.
His music is published by Theodore Presser Company (Merion Music), Associated Music Publishers, and American Composers Alliance. Recordings are available on a number of record labels. An all-Melby disc of three concerti was released on the Albany Records label in 2008.
Major works
Orchestral
Concerto for Computer and Orchestra (1987)
Symphony No. 1 (1993)
Thanatopsis (1999) for lyric baritone, chorus, and orchestra
Symphony No. 2 (2004)
Piano Concerto No. 3 (2010)
Violin Concerto No. 3 (2011)
Violoncello Concerto No. 3 (2012)
Viola Concerto No. 3 (2013)
Symphony No. 3 (2019)
Symphony No. 4 (2020)
Symphony No. 5 (2020)
Symphony No. 6 (2021)
Symphony No. 7 (2021)
Symphony No. 8 (2021)
Electro-Acoustic Concerti
Violin (No. 1: 1979 and No. 2: 1986)
Violoncello (No. 1: 1981 and No. 2: 1989)
Viola (No. 1: 1982 and No. 2: 2009)
Flute (No. 1: 1984 and No. 2: 1990)
Violin and English Horn (1984)
Piano (No. 1: 1985 and No. 2: 2006)
Clarinet (No. 1: 1986 and No. 2: 2006)
English Horn (1986)
Contrabass (1989)
Violin and Piano (2008)
Electro-Acoustic and Acoustic Vocal
Two Norwegian Songs (1965–66) for soprano (or tenor) and piano (texts by Henrik Ibsen)
Due canti de Leopardi (1966/74) for soprano, horn and piano (texts by Giacomo Leopardi)
Two Dances (1970) for tenor and piano (text by L. E. Kramer)
Valedictory (1973) for soprano and computer (text by L. E. Kramer)
Two Stevens Songs (1975) for soprano and computer (texts by Wallace Stevens)
The men that are falling (1978) for soprano, piano, and computer (text by Wallace Stevens)
Peter Quince at the Clavier (1988) for soprano and computer (text by Wallace Stevens)
Three Wordsworth Songs (2005) for soprano and computer (texts by William Wordsworth)
In Darkness (2007) for soprano and computer (texts by Amy Lowell)
Aftermath (2009) for soprano and computer (texts by Amy Lowell)
For Milton (2011) for soprano and computer (text by Percy Bysshe Shelley)
A Japanese Wood-Carving (2014) for soprano and string quartet (text by Amy Lowell)
Electro-Acoustic Solo and Chamber
91 Plus 5 (1969–70) for brass quintet and computer
Zonnorities (1974) for oboe/English horn, clarinet/bass clarinet, and computer
Transparences (1977) for trumpet and computer
Passages (1977–78) for tuba and computer
Accelerazioni (1979) for flute and computer
In tenebris (1980) for piano and computer
L'Infinito (1980) for string trio and computer
Wind, Sand and Stars (1983) for 8 instruments and computer
Alto Rhapsody (1986) for alto saxophone and computer
And I remembered the cry of the peacocks (1988) for English horn, string trio, and computer
Threeplay (1989) for flute, clarinet, contrabass, and computer
String Quartet No. 3 (1989–90) with computer
Zonnorities II (1991) for oboe/English horn, clarinet/Eb clarinet, and computer
Acoustic Chamber
Four Pieces for String Quartet (String Quartet No. 1) (1963–64)
Music for Six Players (1966) for woodwind quintet and piano
String Quartet No. 2 (1968)
Composition for Five Brasses (1968)
Epitaph (in memoriam Carl Ruggles) (1975) for winds and percussion
O, wind, if winter comes... (2014) for woodwind quintet
String Quartet No. 4 (2014)
Brass Quintet (2015)
Piano Quintet (2016)
String Quartet No. 5 (2017)
String Quartet No. 6 (2017)
String Quartet No. 7 (2019)
Acoustic Solo
First Piano Sonata (1964–65, rev. 1993)
Second Piano Sonata (1966)
The rest is silence... (1994) for organ
Electronics Alone
A forandre: Seven Variations for Digital Computer (1969)
...of quiet desperation (1976)
Chor der Steine (1979)
Layers (1981)
Chor der Waisen (1985)
Chor der Toten (1988)
Choral
Oculi omnium in te sperant, Domine (1976)
References
External links
John Melby website
John Melby's page at Theodore Presser Company
Albany Records release
20th-century classical composers
21st-century classical composers
American male classical composers
American classical composers
Living people
1941 births
21st-century American composers
20th-century American composers
West Chester University faculty
20th-century American male musicians
21st-century American male musicians |
1120666 | https://en.wikipedia.org/wiki/MaxDB | MaxDB | MaxDB is an ANSI SQL-92 (entry level) compliant relational database management system (RDBMS) from SAP AG, which was also delivered by MySQL AB from 2003 to 2007. MaxDB is targeted for large SAP environments e.g. mySAP Business Suite and other applications that require enterprise-level database functionality.
History
The database development started in 1977 as a research project at the Technical University of Berlin headed by Rudolf Munz. In the early 1980s it became a database product that subsequently was owned by Nixdorf Computer, Siemens-Nixdorf, Software AG and today by SAP AG. It has at various times been named VDN, RDS, Reflex, Supra 2, DDB/4, Entire SQL-DB-Server and Adabas D. In 1997 SAP acquired the software from Software AG and developed it as SAP DB, releasing the source code under the GNU General Public License in October 2000.
In 2003 SAP AG and MySQL AB jointly re-branded the database system to MaxDB. In October 2007 this reselling agreement was terminated and sales and support of the database reverted to SAP. SAP AG now manages MaxDB development, distribution, and support. New versions of the source code of MaxDB are no longer available under the GNU General Public License. SAP also stated that "Further commercial support concepts to cover mission critical use requirements outside of SAP scenarios are currently subject to discussion."
MaxDB since version 7.5 is based on the code base of SAP DB 7.4. Therefore, the MaxDB software version 7.5 can be used as a direct upgrade of previous SAP DB versions starting 7.2.04 and higher
Features
MaxDB is delivered with a set of administration and development tools. Most tools are available with both a GUI and command line interface (CLI). It offers bindings for JDBC; ODBC; SQLDBC (native C/C++ interface); precompiler; PHP; Perl; Python; WebDAV; OLE DB, ADO, DAO, RDO and .NET via ODBC; Delphi and Tcl via Third Party Programming Interfaces. MaxDB is cross-platform, offering releases for HP-UX, IBM AIX, Linux, Solaris, Microsoft Windows 2000, Microsoft Windows Server 2003, and up to Microsoft Windows 10.
MaxDB offers built-in hot backup, does not need any online reorganizations and claims to be SQL 92 Entry-Level compatible.
MaxDB since version 7.7.00, uses multiversion concurrency control (MVCC) instead of the previous lock based implementation.
Licensing
MaxDB was licensed under the GNU General Public License (GPL) from versions 7.2 through 7.6. Programming interfaces were licensed under the GPL with exceptions for projects released under other open source licenses.
SAP DB 7.3 and 7.4 were licensed as GPL but with LGPL drivers. MaxDB 7.5 was offered under dual licensing, i.e. licensed as GPL with GPL drivers or a commercial license.
From version 7.5 through version 7.6 onwards distribution of MaxDB (previously SAP DB) to the open source community was provided by MySQL AB, the same company that develops the open-source software database, MySQL.
Development was done by SAP AG, MySQL AB and the open-source software community.
In October 2007 SAP assumed full sales and commercial support for MaxDB. MaxDB 7.6 is now closed source, available free-of-charge (without support, and with usage restrictions) for use with non-SAP applications.
See also
List of relational database management systems
Comparison of relational database management systems
Comparison of database tools
References
External links
MaxDB Wiki on SAP Community Network
SAP MaxDB - The SAP Database System discussions, blogs, documents and videos on the SAP Community Network (SCN)
Proprietary database management systems
SAP SE |
15442337 | https://en.wikipedia.org/wiki/2009%20U.S.%20Figure%20Skating%20Championships | 2009 U.S. Figure Skating Championships | The 2009 U.S. Figure Skating Championships took place from January 18 to 25th 2009 at the Quicken Loans Arena in Cleveland, Ohio. Skaters competed in four disciplines – men's singles, ladies' singles, pair skating, and ice dancing – and across three levels: senior, junior, and novice. Medals were awarded in four colors: gold (first), silver (second), bronze (third), and pewter (fourth).
The event was used to determine the U.S. teams for the 2009 World Championships, 2009 Four Continents Championships, and 2009 World Junior Championships.
Qualifying
Qualification for the U.S. Championships began at one of nine regional competitions. The regions are New England, North Atlantic, South Atlantic, Upper Great Lakes, Eastern Great Lakes, Southwestern, Northwest Pacific, Central Pacific, and Southwest Pacific. The top four finishers in each regional advance to one of three sectional competitions (Eastern, Midwestern, and Pacific Coast). Skaters who placed in the top four at sectionals advanced to the U.S. Championships.
The top five finishers in each discipline from the previous year were given byes to the U.S. Championships, as were any skaters who qualify for the Junior or the Senior Grand Prix Final. Skaters were also given byes through a qualifying competition if they are assigned to an international event during the time that qualifying event was to take place. For example, if a skater competed at an event at the same time as his or her regional competition, that skater would receive a bye to sectionals. If a skater competed at an event at the same time as his or her sectional competition, that skater would qualify for the national event without having had to compete at a sectional championship.
Competition notes
Reigning ice dancing champions Tanith Belbin / Benjamin Agosto withdrew before the event began due to injury to Agosto.
2007 ladies' champion Kimberly Meissner withdrew before the event due to injury.
Senior ladies Katrina Hacker and Mirai Nagasu both earned an overall score of 54.79 in the short program. The tie was broken by the technical elements mark, by which Hacker had beaten Nagasu by 2.05 points. Hacker therefore placed 5th while Nagasu placed 6th in that segment of the competition.
Senior ladies Laney Diggs and Kristine Musademba tied for 10th place in the overall score. The tie was broken by the free skating segment and so Diggs placed ahead of Musademba overall.
Senior results
Men
Ladies
Pairs
Ice dancing
Junior results
Men
Ladies
Pairs
Ice dancing
Novice results
Men
Ladies
Pairs
Ice dancing
International team selections
World Championships
Four Continents Championships
World Junior Championships
References
External links
2009 U.S. Figure Skating Championships Results
U.S. Figure Skating Announces World, Four Continents and World Junior Teams
Official website
United States Figure Skating Championships
U.S. Figure Skating Championships
Figure skating
United States Figure Skating Championships
Sports competitions in Cleveland
January 2009 sports events in the United States |
17412594 | https://en.wikipedia.org/wiki/Symposium%20on%20Theoretical%20Aspects%20of%20Computer%20Science | Symposium on Theoretical Aspects of Computer Science | The Symposium on Theoretical Aspects of Computer Science (STACS) is an academic conference in the field of computer science. It is held each year, alternately in Germany and France, since 1984. Typical themes of the conference include algorithms, computational and structural complexity, automata, formal languages and logic.
STACS proceedings from 1984 to 2007 have been published by Springer Science+Business Media in the Lecture Notes in Computer Science series. The proceedings since 2008 are published by the Leibniz Center for Informatics in the open access series Leibniz International Proceedings in Informatics. The proceedings since are freely available from the conference portal, as well as from DROPS, the Dagstuhl Research Online Publication Server, and from Hyper Articles en Ligne.
The conference is indexed by several bibliographic databases, including the DBLP, Google Scholar and The Collection of Computer Science Bibliographies.
See also
The list of computer science conferences contains other academic conferences in computer science.
External links
.
STACS proceedings from 1984 to 2007 at Springer Link.
STACS at DBLP.
STACS proceedings.
Leibniz International Proceedings in Informatics home page
Theoretical computer science conferences |
25213644 | https://en.wikipedia.org/wiki/Free%20Knowledge%20Institute | Free Knowledge Institute | The Free Knowledge Institute (FKI) is a non-profit organisation founded in 2006 in the Netherlands. Inspired by the free software movement, the FKI fosters the free exchange of knowledge in all areas of society by promoting freedom of use, modification, copying, and distribution of knowledge pertaining to education, technology, culture, and science.
The FKI coordinates and participates in projects concerning education, access to knowledge, intellectual property, and open educational resources.
Vision
Communication networks, and especially the Internet, have become the driving force of a revolution only comparable to the one that followed the invention of the printing press. In its years of existence, the Internet has given wings to our natural tendency to share information.
However, still a dominant sector of society thinks that knowledge should be protected by several legal regimes commonly referred to with the term 'intellectual property'. This term suggests that knowledge can be exclusively owned and neglects the differences between tangible and intangible goods: while tangible goods have a scarcity problem, intangible goods can be copied and shared without limit and, when shared, tend to increase their total value.
A countermovement started in the 1980s with the rise of the Free Software movement and open standards, which have produced a tremendous wealth of free software applications and form the basis of the current internet. The principles behind Free Software have inspired the unrestricted sharing and reusing of artistic and cultural works in the free content movement (including Creative Commons) and the creation and use of free educational materials in the educational sector. In a similar way, the Open Access movement promotes the sharing and open publication of research for advancing scientific knowledge.
The Free Knowledge Institute believes that by promoting the use of Free Knowledge in the fields of Technology, Education, Culture and Science more individuals and organisations will profit from the benefits of sharing knowledge.
Founding principles
The Free Knowledge Institute has formulated a set of principles that it considers basic for being consistent with its vision. These founding principles take as a starting point the sharing of knowledge in the tradition of copyleft and include the use of free software, adherence to open standards, the importance of education, respect for diversity and different cultures, transparency and consensus.
Activities
In order to work towards this vision, the Free Knowledge Institute participates in political debates and activism to highlight the wrongs of certain policies and propose alternatives. For that reason the FKI works together in various networks and coalitions with other groups and organisations. With the Open Net Coalition, a collective warning has been formulated about policy proposals in the EU parliament threatening internet neutrality.
Projects
SELF Project
The SELF Platform aims to become a collaborative web platform with high quality educational and training materials about Free Software and Open Standards. It is based on world-class Free Software technologies that permit both reading and publishing free materials, and is driven by a worldwide community.
SELF (Science, Education and Learning in Freedom) is an international project that was initially financed by the European Commission which has developed a platform to encourage creative cooperation and the sharing of educational materials and continuous training, paying special attention to free software and open standards. Inspired by the Wikipedia model, the SELF Platform is open to the contributions of all those who would like to bring their knowledge to it, and share this knowledge without restrictions,.
Free Knowledge, Free Technology Conference
The Free Knowledge, Free Technology Conference (FKFT) was an event that centered the production and sharing of educational and training materials in the field of Free Software and Open Standards. It was held first in 2008 in Barcelona and was organised by the SELF Project and the Free Knowledge Institute.
Free Technology Academy
The Free Technology Academy consists of an advanced virtual campus with course modules that can be followed entirely on-line. The learning materials are Open Educational Resources that can be studied freely, but learners enrolled in the FTA will be guided by professional teaching staff from the participating universities. The full master programme can be concluded at one of the universities.
The project financially supported by the Life Long Learning Programme (LLP) of the European Commission, is a collaboration between the FKI and various European universities and organisations like the
Open Universiteit Nederland (OUNL) from The Netherlands, the Open University of Catalonia (UOC) from Spain and others.,.
Free Culture Forum
The Free Culture Forum was an international encounter on free culture and knowledge that took place in Barcelona from 30 October to 1 November 2009. It took place jointly with the second edition of the oXcars. During the Forum 200 organizations and individuals linked to free culture expressions discuss on the privatization of the creation and the intellectual property and its incidence in the access to the knowledge and the creation and distribution of the art, knowledge and culture. The Forum ended up with the definition of a "Charter for Innovation, Creativity and Access to Knowledge".
The first edition of the Forum was organised by Exgae, Networked politics and the Free Knowledge Institute.
References
External links
Official Website
Free Culture Forum
SELF Project Website
Free Technology Academy
Organisations based in Amsterdam
Computer law organizations
Foundations based in the Netherlands
Privacy organizations
Internet-related activism
Intellectual property activism
Knowledge sharing
2006 establishments in the Netherlands
Access to Knowledge movement
Organizations established in 2006 |
61579778 | https://en.wikipedia.org/wiki/Gottfried%20J%C3%A4ger | Gottfried Jäger | Gottfried Jäger (born 13 May 1937 in Magdeburg) is a German photographer, photo-theorist and former university teacher.
Biography
Gottfried Jäger, son of photographer Ernst Jäger (1913-1998), learned the craft of photography in the years 1954 to 1958 with the master photographer Siegfried Baumann in Bielefeld, receiving his apprenticeship qualification in 1957. He then studied technical photography at the Staatliche Höhere Fachschule für Photographie in Cologne, graduating in 1960 from the master craftsman exam. There he discovered a work by the early pioneer of computer art, Herbert W. Franke's 1957 Kunst und Konstruktion. Its subtitle, Physik und Mathematik als fotografisches Experiment (Physics and Mathematics as a Photographic Experiment) became Jäger's credo, an approach that he maintained throughout his career.
In 1960, Jäger accepted a position as a technical teacher of photography at the Werkkunstschule Bielefeld and established the medium as a basic discipline there. In 1972, this led to the founding of Photo/Film Design as a specialisation at the University of Applied Sciences Bielefeld, with contemporary photography and media studies. In the same year, Jäger was appointed Professor of Photography and Film at the University of Applied Sciences Bielefeld in the subject areas Artistic Foundations of Photography, Photography and Generative Image Systems. In 1984 he founded the research focus (FSP) Photography and Media with the annual Bielefeld photo symposia. From 1998-2002, Jäger was Visiting Professor at the Royal Melbourne Institute of Technology (RMIT) Melbourne, returning in 2009 to join in a symposium About Photography II with David Martin, Salvatore Panatteri, Emidio Puglielli and Patricia Todarello, September 12 – October 4.
In 2002 he retired from Bielefeld and was given the emeritus status. On the occasion of his retirement, the institution praised Jäger's decisive contribution to photography being "given equal status with the arts of painting and sculpture. As early as 1968, he defined the claim of photography as an art form with the term 'Generative Photography', which stands for a systematic-constructive direction in artistic photography." Incidentally, it was not until 1984 that photographs had become legally works of visual art according to German copyright law.
Jäger was for eight years Dean of the Faculty of Design and from 1993-1997 Vice President for research and development tasks of the FH Bielefeld. Since 2008 he is a member of the University Council of FH Bielefeld; he is a member, honorary member and has been the chairman of many photographic associations for many years (DFA, DGPh, BFF, FFA). In 1992 he received the George Eastman Medal of Kodak AG Germany; 1996 the David Octavius Hill Medal of the German Photographic Academy (DFA).
In 2011, Jäger defended his PhD dissertation on the photographic work of Carl Strüwe in a thesis Photomicrography as Obsession: The Photographic Work of Carl Strüwe (1898-1988) at the Faculty of Linguistics and Literature of the University of Bielefeld.
Artwork
From the beginning of his teaching at the Werkkunstschule Bielefeld Jäger created experimental photographic works, such as the Themes and Variations from 1960 to 1965. In each case a single image with different photographic design parameters is serially, controlled and varied step by step. The sometimes extensive series of images ultimately lead to photo compositions in the sense of Concrete Art, whose works dispensed with representation in favour of the free image as invention. An example of this are 21 light graphics that Jäger created in 1964 as figurative equivalents to the text "novel" of the German writer Helmut Heißenbüttel .
One of Jäger's inspirations was computer scientist Karl Steinbuch's 1961 book Automat und Mensch, an early discussion of artificial intelligence which proposed that a technical apparatus, a camera or a computer, were capable of achieving intellectual results and aesthetic products. The text was brought to his attention in the mid-60s by Hein Gravenhorst, a friend and fellow artist in generative photography, whom he had met through Manfred Kage. Gravenhorst and Kage were together making their own "polychromatic variations."
In 1965 Jäger was invited to show his "Lichtgrafiken" (light graphics) at the group show Fotografie '65 in Bruges, an exhibition of rarely experimental and often abstract photography that was conceptually opposite to that organized by Karl Pawek, also then showing in Bruges; the documentary Weltausstellung der Photographie: Was ist der Mensch ('World Exhibition of Photography: What is Man').
In 1968, Gottfried Jäger introduced the term Generative Photography as means of constructing photography on a systematic-constructive basis in the title of an exhibition of the Bielefelder Kunsthaus. Apart from his own, works by Kilian Breier, Pierre Cordier and Hein Gravenhorst were also included. The title, which was also approved by Franke, draws on the idea of generative aesthetics (1965) of the German philosopher Max Bense promulgated in the last chapter of his Aesthetica titled 'Projekte generativer Ästhetik';
Thus works of Generative Photography are a rational, apparatus-driven art confluent with the emerging computer age that follow a programmed design that applies mathematical and numerical parameters to artistic projects, and which equally entails development of 'concrete' artistic approaches. A favourable reception of the exhibition in the press was repeated by Otto Steinert during a meeting in the exhibition space of the Deutsche Gesellschaft für Photographie (German Society for Photography). Follow-up exhibitions around this topic took place at Galerie Spektrum in Hanover, in Antwerp, and elsewhere.
Jäger defined the Generative Photography process as one of “finding a new world inside the camera and trying to bring it out with a methodical, analytical system.” Jäger elaborates; "[my] image is the concretion of the technique from which it arises, [...] it is technique that has become art. The technique has become art. The technique is art."
An expression of this is the series of works by Gottfried Jäger from the years 1967 to 1973: about 200 black-and-white and coloured light graphics on the basis of a point of light, which by means of a multiple-pinhole camera that he invented to generate geometrically determined structures.
In his camera photographs of natural and technical objects from 1971 to 1991, Jäger consistently pursues the serial principle of logical sequences. In a series titled Arndt Street (1971), he used the predetermined system of photographing only corners in two-point perspective, which he described simply as, “A photographic documentation of the development of a street depicted through examples of corner buildings.”
In his group of luminogram works Colour Systems of the early 1980s, photographic paper no longer appears as a picture carrier but as an object of the artistic process. This resulted in photo objects, photo installations and installations in museums and galleries. They follow not so much a programmed procedure in the sense of generative photography as spontaneous inspiration in dealing with the peculiarities of the photographic material, such as its imaging properties, its peculiar surfaces and its distinct plastic qualities. For their titles, photography terms like Graukeil ('Greyscale 1983), Lichteinfall ('Incident Light', 1985), "Fotoecken" (Photo-corners, 1985) or "Bild" (View, 2000) are used.
From 1994, digital media were used to create "mosaics" and from 1996 "generative images". Both groups of works are inspired and derived from the optical program of the pinhole structures, but they modify it through digitization and lead to their own forms. The "Snapshots" (2003), comparable to the photographic snapshot, are 'snaps' from the infinite cosmos of the computer - but still on a geometrical-constructive basis. Recent works under the series title "Photos" (2004) thematise "photographicisms". As such, phototypical aesthetic appearances can be seen - but in this case they are no longer photographically generated, but computer generated and executed (Digigraphics™).
Reception
Jäger's oeuvre has been seen in over 30 solo exhibitions internationally including Germany, Switzerland, Belgium, Poland, USA, and Australia, but especially significant is his early inclusion in iconic exhibitions of technological and computer art of the 1960s: Experiments in Art and Technology at the Brooklyn Museum, (1968); New Tendencies in Zagreb (1969); and the exhibitions of On the Path to Computer Art that were shown in Germany, Switzerland, Japan, Brazil, France, and England between 1970 and 1976.
Jäger has authored over thirty books including texts in English: The Art of Abstract Photography (2002), Can Photography Capture our Time in Images? A Time-Critical Balance (2004), Concrete Photography (2005) and Light Image and Data Image: Traces of Concrete Photography (2015) and nine Jäger monographs have been published since 1964.
Awards
1996: David Octavius Hill Medal of the Society of German Photographers
2014: 2014 Cultural Award of the German Society for Photography
Exhibitions
Solo
1964 Gottfried Jäger. Photographs, light graphics. Art Salon Otto Fischer, Bielefeld.
1975 Gottfried Jäger. Apparative graphics. Gallery Le Disque Rouge, Brussels.
1982 Gottfried Jäger. Light images. Generative work. Fotomuseum in the Munich City Museum.
1986 Gottfried Jäger. Generative photo works. Gallery Photo-Medium-Art, Wroclaw
1990 Gottfried Jäger. Photo paper works photo installations. Gallery Anita Neugebauer, Basel.
1994 Gottfried Jäger. Interface: Generative work. Bielefelder Kunstverein, Museum Waldhof, catalogue.
1995 Gottfried Jäger. Photo Paper Works. Michael Senft - One Bond Gallery, New York.
1998 Gottfried Jäger. Photography. Gallery Arrigo, Zurich.
1999 Gottfried Jäger. Melbourne Experience. VISCOM 9 Gallery, Dep. Visual Communication, RMIT University (Royal Melbourne Institute of Technology).
2000 Gottfried Jäger. Generative Images. Lutz Teutloff Gallery, Bielefeld, catalogue.
2006 Gottfried Jäger and his collection of Concrete Photography. 16th Gmundner symposium on contemporary art, Gmunden, Austria, book documentation.
2011 Gottfried Jäger: consequences of consequences of consequences of consequences of consequences. Concrete photography. Photo Edition Berlin.
Group
1965 Fotograph '65. Experimental European photography. Huidevettershuis, Bruges, catalogue.
1966 Photography between science and art. Photokina, Cologne, catalogue.
1968 Generative Photography. Kilian Breier, Pierre Cordier, Hein Gravenhorst, Gottfried Jäger. Städt. Kunsthaus Bielefeld, catalogue.
1969 Experiments in Art and Technology. Brooklyn Museum, New York, catalogue.
1969 Nova tendcija 4. (New artistic tendencies). Muzej za umjetnost i obrt, Zagreb, catalogue.
1970-1976 Paths to computer art. Traveling exhibition of the German Goethe-Instituts, including Berlin (IDZ), Zurich (ETH), Goethe-Institute Tokyo, São Paulo, Brasilia, Rio de Janeiro, Bordeaux (SIGMA 9, 1973), Marseille, Angers: London (Polytechnic of Central) etc., catalogues.
1975 Generative Photography: Pierre Cordier, Karl Martin Holzhäuser, Gottfried Jäger. Internationaal Cultureel Center Antwerp, catalogue.
1980 German photographers after 1945. Kunstverein Kassel 1979; PPS Gallery Hamburg 1980; Overbeck-Gesellschaft Lübeck, catalogue.
1982 5th International Biennale Advanced Photography. Vienna Secession, Vienna, catalogue.
1984 Lensless Photography. The Franklin Institute Science Museum, Philadelphia, 1983, catalogue; IBM Gallery, New York, Prospect.
1986 Positions of experimental photography. Bielefeld. Kunsthalle Bielefeld, catalogue.
1989/1990 The photograph as an autonomous picture. Experimental Design 1839-1989. Kunsthalle Bielefeld, 1989; Bavarian Academy of Fine Arts, Munich, catalogue.
1989/1990 Document and Invention: photographs from the Federal Republic of Germany 1945 to today. German Photographic Academy GDL, Berlin, Freiburg i. Br. 1989; Philadelphia 1990, catalogue.
1991 Appearance and Time: photography in a generative context (with Markus Jäger). Photo gallery Bild, Baden, Switzerland, brochure.
1994 Future of Korean Photography. Seoul (Korea), catalogue.
1995 László Moholy-Nagy: idea and effect. Echoes of his work in contemporary art. Kunsthalle Bielefeld, catalogue.
1996 La corn de la licorne: Alchemy optique. Rencontres de la Photographie, Arles, France, catalogue.
2000 Abstract photography. Kunsthalle Bielefeld, catalogue.
2002ff. Concrete art in Europe after 1945. Collection Peter C. Ruppert. Museum in Kulturspeicher Würzburg, permanent exhibition, catalogue.
2006 Photography Concrete - Concrete Photography. Shaping with light without camera. Museum in the cultural memory Würzburg. Book Concrete Photography / Concrete Photography, Bielefeld, 2005.
2006 Gottfried Jäger und seine Sammlung Konkrete Fotografie with Dawid, Heinz Hajek-Halke, Heinrich Heidersberger, Peter Keetman, Uwe Meise, Floris Neusüss, Jaroslav Rössler & others, VKB-Galerie, Gmunden
2007 The New Tendencies. A European artist movement 1961-1973. Museum of Concrete Art Ingolstadt, catalogue.
2007/2009 Bit international - Nove tendencije. Computer and visual research. Zagreb 1961-1973. Graz: New Gallery at the Landesmuseum Joanneum, 2007; Karlsruhe: ZKM, 2009, catalogues.
2009 Karl Martin Holzhäuser, Gottfried Jäger: Real appearance. Works 2008. Epson Kunstbetrieb Düsseldorf, catalogue.
2010 Konkrét Fotó, Photogram. Vasarely Múseum Budapest, catalogue.
Books and exhibition catalogues
Herbert W. Franke, Gottfried Jäger: Apparative Art. From the kaleidoscope to the computer. Cologne: Publisher M. DuMont Schauberg, 1973, .
Gottfried Jäger, Karl Martin Holzhäuser: Generative Photography. Theoretical foundation, compendium and examples of a photographic image design. Ravensburg: Otto Maier publishing house, 1975, .
Strüwe, C., Jäger, G., Kunsthalle Bielefeld., & Kulturhistorisches Museum Bielefeld. (1982). Retrospektive Fotografie. Place of publication not identified: Edition Marzona.
Gottfried Jäger (editor), Jörg Boström, Karl Martin Holzhäuser: Against the indifference of photography. The Bielefeld Symposia on Photography 1979-1985. Contributions to the aesthetic theory and practice of photography. University of Applied Sciences Bielefeld. Dusseldorf: Edition Marzona, 1986, .
Gottfried Jäger: Imaging Photography. Fotografik light graphic light painting. Origins, concepts and specifics of an art form. Cologne: DuMont book publishing house, 1988, .
Gottfried Jäger (ed.): Bielefeld photo life. Small cultural history of photography in Bielefeld and the region 1896-1989. Developments in craft, press, design, art and college. Bielefeld, Dusseldorf: Edition Marzona, 1989, .
Gottfried Jäger: Photo aesthetics. The theory of photography. Texts from the years 1965 to 1990. Munich: Publisher Laterna magica, 1991, .
Gottfried Jäger: Indices. Generative work 1967-1996. Three projects. Published by Claudia Gabriele Philipp on the occasion of the awarding of the David Octavius Hill Medal 1996 of the German Photographic Academy in conjunction with the Art Prize of the City of Leinfelden-Echterdingen. Bielefeld: Kerber publishing house, 1996, .
Gottfried Jäger, Gudrun Wessing (ed.): On lászló moholy-nagy. Results of the International László Moholy-Nagy-Symposium, Bielefeld, 1995. On the 100th birthday of the artist and Bauhaus teacher. Bielefeld: Kerber Verlag, 1997, .
Andreas Dress, Gottfried Jäger (ed.): Visualization in Mathematics, Science and Art. Basics and Applications. Braunschweig, Wiesbaden: Vieweg publishing house, 1999, .
Gottfried Jäger (ed.): Photography thinking. About Vilém Flusser's Philosophy of Media Modernity. Bielefeld: Kerber publishing house, 2001, .
Gottfried Jäger (ed.): The Art of Abstract Photography / The Art of Abstract Photography. Stuttgart, New York: Arnoldsche Art Publishers, 2002, .
Jörg Boström, Gottfried Jäger (ed.): Can photography capture our time in pictures? A Time Critical Record / Can Photography Capture our Time in Images? A time-critical balance. 25 Years Bielefeld Symposia on Photography and Media 1979-2004 / 25 Years Bielefeld Symposia about Photography and Media 1979-2004. Bielefeld: Kerber publishing house, 2004, .
Gottfried Jäger, Rolf H. Krauss, Beate Reese: Concrete Photography / Concrete Photography. Bielefeld: Kerber publishing house, 2005, .
Gottfried Jäger: Ernst Jäger. Photographer. Castle: Dorise Verlag, 2009, .
Martin Roman Deppner, Gottfried Jäger (ed.): Denkprozesse der Fotografie. 30 years of Bielefeld photo symposia 1979-2009. Contributions to image theory. Bielefeld: Kerber Verlag, 2010, .
Gottfried Jäger: Photomicrography as an obsession. The photographic work of Carl Strüwe (1898-1988). Dissertation. Bielefeld: Verlag für Druckgrafik Hans Gieselmann, 2011.
Bibliography
Herbert W. Franke: 'A bridge between art and technology: The apparatus graphics of Gottfried Jäger'. In: Magazin Kunst (Mainz), No. 1/1975, p. 123.
Petr Tausk: 'Op Art and Photography. About pinhole structures by Gottfried Jäger.' In: The History of Photography in the 20th Century. Cologne: DuMont book publishing house, 1977, P. 165-166.
Wolfgang Kemp: 'Gottfried Jäger: Generative Photography.' In: Theory of Photography III. 1945-1980. Munich: Schirmer / Mosel, 1983, pp. 458–460.
Walter Koschatzky: 'Generative Photography. G. Jäger's principles lead to masterful achievements.' In: The Art of Photography. Technology, history, masterpieces. Salzburg, Vienna: Residenz Verlag, 1984, p. 367, 422-423. Reprint: dtb, 1987, pp. 260–261.
Eric Renner: 'Pinhole Revival in Art: The 1960s and 1970s. Gottfried Jäger proclaims ...' In: Pinhole Photography. Rediscovering a Historic Technique. Boston, London: Focal Press, 1995, pp. 50–52.
Gerhard Glüher: 'Blurred Contours, Whispering Contours'. In: NIKE New Art in Europe (Munich), No. 53/1995, pp. 36–37.
Gerhard Glüher: Gottfried Jäger: photo-sculptural objects, Marburg 1989.
Manfred Strecker: 'Photography becomes sheer art. The era of Gottfried Jägers at the Department of Design ends with the 25th Bielefeld Symposium on Photography and Media.' In: Neue Westfälische (Bielefeld), November 29, 2004.
Anais Feyeux: La Generative Photography. Entre démon de l'exactitude et rage de histoire. In: Études photographiques. Revue semestrial. No. 18/2006, p. 52-71. Paris: Société Francaise de Photographie, .
Klaus Honnef: Gottfried Jäger. Imaging systems. Concrete photography. In: Gisela Burkamp (ed.): Kunstverein Oerlinghausen, Bielefeld: Kerber Verlag, 2006, pp. 52–57.
Andreas Krase: Gottfried Jäger. Pinhole structures and mosaics. In: ders. (Ed.): True-sign. Photography and Science, catalogue, Technical Collections / Museums of the City of Dresden, 2006, pp. 28–31.
Andreas Beaugrand (ed.): Gottfried Jäger. Photography as a generative system. Pictures and texts 1960-2007. Bielefeld: Verlag für Druckgrafik Hans Gieselmann, 2007, .
Gudrun Wessing: An Experimental Photo Life. Gottfried Jäger has taken the limits of photography. In: TOP magazine Bielefeld, No. 4/2008, pp. 116–119.
Maria Frickenstein: Alter Geist in neuer Kunst. Die Leidenschaft von Fotografie und Kunst liegt bei den Jägers in der Familie. Über Ausstellung und Buch Ernst Jäger, Fotograf in Burg, Neue Westfälische (Bielefeld), January 8, 2010.
Jerzy Olek: Czysta Widzialnosc (About Gottfried Jäger, Interview with Numerous Fig.). In: artluck (Warszawa) 1st Quarter, No. 15/2010, pp. 20–25.
Manuela De Leonardis: Intervista Gottfried Jäger (12 August 2010): Limmagine libera dell'occhio di bimbo. In: il manifesto. quotidiano comunista, 21 September 2010.
Alexandra Holownia: Gottfried Jäger. In: foto wystawy, No. 7/2011, p. 16-19.
Work in collections
Museum of Arts and Crafts Hamburg (Lichtgrafiken zu H. Heißenbüttel).
Sprengel Museum Hannover (Collection of Photography Käthe Schroeder).
Städt. Museum Abteiberg Mönchengladbach (Etzold Collection: Program-Random-System).
Kunsthalle Bielefeld (Graphic Collection).
Fotomuseum in the Munich City Museum.
George Eastman House Rochester, NY
City Archives Leinfelden-Echterdingen (Collection German Photographic Academy).
Museum Ludwig Cologne (Photographic Collection).
Bibliothèque Nationale Paris (Photographic Collection).
Schupmann Collection Söhrewald.
Museum in Kulturspeicher Würzburg (Peter C. Ruppert Collection, Concrete Art in Europe after 1945).
Folkwang Museum Essen (Photographic Collection).
Kunsthalle Bremen (Collection Herbert W. Franke, Paths to Computer Art).
Literature about
Contemporary Photographers, 2nd Edition. Chicago, London: St. James Press, 1988, pp. 496–498.
Hans-Michael Koetzle: Encyclopaedia of Photographers 1900 to today. Munich: Knaur, 2002, pp. 218–219.
Reinhold Mißelbeck (ed.): Prestel lexicon of photographers. From the beginnings of 1839 to the present. Munich et al.: Prestel, 2002, p. 127.
Kürschner's Handbook of Fine Artists. Leipzig: KG Saur Verlag, 2007.
Bernd Stiegler, Felix Thürlemann: masterpieces of photography, Stuttgart: Philipp Reclam jun., 2011, pp. 272–273.
References
External links
Literature by and about Gottfried Jäger in the catalogue of the Deutschen Nationalbibliothek
Official website
Galerievertretung Photo Edition Berlin
Concrete art
German abstract artists
1937 births
Photographers from Saxony-Anhalt
20th-century German photographers
21st-century German photographers
Artists from Magdeburg
Living people |
10303225 | https://en.wikipedia.org/wiki/Alterface | Alterface | Alterface Projects is a manufacturer of interactive and media-based attractions, offering interactive technologies and turnkey solutions. Founded in 2001 and headquartered in Belgium, Europe, Alterface operates globally with US office and Asian branches in Beijing and Xiamen, China. Alterface creates and builds turnkey interactive mixed-media attractions for dark rides, spinning & duelling theatres and walkthroughs.
History
Founded in 2001, Alterface debuted as a spin-off of the University of Louvain-La-Neuve (UCL), active in the field of creation of interactive systems.
Products
Alterface develops products such as the Salto! show control management software, 3D and 4D shooting devices, and the non-linear & scalable Erratic Ride. The ride concept Action League combines tournament, interactive gaming and motion.
Notable attractions and projects
Popcorn Revenge (2019, Walibi Belgium) : Erratic® Ride featuring vehicles from ETF Ride Systems and theming design by Joravision. This interactive dark ride received numerous awards, including the Thea Award for Outstanding Achievement, Park World Excellence Award, European Star Award.
Le Kinétorium (2018, Jardin d'Acclimatation, France) : Interactive Theatre
Basilisk (2018, Legendia, Poland) : Interactive dark ride featuring vehicles from ETF Ride Systems and theming design by Joravision. In 2018 a range of prestigious awards have been allocated to the Basilisk interactive dark ride, including the Thea Award for Outstanding Achievement, Asia Attraction Crown Award, Park World Excellence Award, European Star Award.
Investiture of Gods (2019, Qingdao Oriental Movie Metropolis, China) : Interactive Indoor Roller Coaster.
Splashing UFO Rapid River (2016, Yomiuri Land, Japan) : Interactive Raft Ride.
Maus au Chocolat (2011, Phantasialand, Germany) : Interactive dark ride featuring vehicles from ETF Ride Systems 42 3D back projection screens, on screen shooting. Interaction software, show control system and overall design were provided by Alterface Projects, turnkey of the project.
Dragons Wild Shooting (2013, Lotte World, South Korea) : Interactive dark ride featuring trackless vehicles from ETF Ride Systems, shooting at screens and at moving and non-moving scenery (animatronics). All shooting targets are invisible, which helps keeping the theming free from visible, disruptive technology. Alterface Projects provided the interaction software and overall show control system. Overall design and art direction was provided by The Hettema Group.
Justice League: Alien Invasion 3D (2012, Warner Bros. Movie World, Australia) : Interactive dark-ride based on DC Comics' Juctice League intellectual property. It features shooting at 3D screens and at moving and non-moving scenery (animatronics). Alterface Projects provided the interaction software and overall show control system. Overall design and art direction was provided by Sally Corporation.
Justice League: Battle for Metropolis (2015, Six Flags Over Texas and Six Flags St. Louis, United States) : Interactive dark-ride based on DC Comics' Juctice League intellectual property. It features motion based vehicles from Oceaneering International, shooting at 3D screens and at moving and non-moving scenery (animatronics). Alterface Projects provided the interaction software and overall show control system. Overall design and art direction was provided by Sally Corporation.
Plants vs. Zombies: Garden Warfare 3Z Arena (2016, Carowinds, United States) : Interactive dark ride based on Electronic Arts and PopCap Games' Plants vs. Zombies intellectual property. It features motion based seats and shooting at 3D screens. Alterface Projects provided the interaction software and overall show control system.
References
External links
Alterface projects
Software companies of Belgium
Technology companies established in 2001
Wavre
Companies based in Walloon Brabant |
20168578 | https://en.wikipedia.org/wiki/Test%20oracle | Test oracle | In computing, software engineering, and software testing, a test oracle (or just oracle) is a mechanism for determining whether a test has passed or failed. The use of oracles involves comparing the output(s) of the system under test, for a given test-case input, to the output(s) that the oracle determines that product should have. The term "test oracle" was first introduced in a paper by William E. Howden. Additional work on different kinds of oracles was explored by Elaine Weyuker.
Oracles often operate separately from the system under test. However, method postconditions are part of the system under test, as automated oracles in design by contract models. Determining the correct output for a given input (and a set of program or system states) is known as the oracle problem or test oracle problem, which is a much harder problem than it seems, and involves working with problems related to controllability and observability.
Categories
A research literature survey covering 1978 to 2012 found several potential categories of test oracles.
Specified
These oracles are typically associated with formalized approaches to software modeling and software code construction. They are connected to formal specification, model-based design which may be used to generate test oracles, state transition specification for which oracles can be derived to aid model-based testing and protocol conformance testing, and design by contract for which the equivalent test oracle is an assertion.
Specified Test Oracles have a number of challenges. Formal specification relies on abstraction, which in turn may naturally have an element of imprecision as all models cannot capture all behavior.
Derived
A derived test oracle differentiates correct and incorrect behavior by using information derived from artifacts of the system. These may include documentation, system execution results and characteristics of versions of the system under test. Regression test suites (or reports) are an example of a derived test oracle - they are built on the assumption that the result from a previous system version can be used as aid (oracle) for a future system version. Previously measured performance characteristics may be used as an oracle for future system versions, for example, to trigger a question about observed potential performance degradation. Textual documentation from previous system versions may be used as a basis to guide expectations in future system versions.
A pseudo-oracle falls into the category of derived test oracle. A pseudo-oracle, as defined by Weyuker, is a separately written program which can take the same input as the program or system under test so that their outputs may be compared to understand if there might be a problem to investigate.
A partial oracle is a hybrid between specified test oracle and derived test oracle. It specifies important (but not complete) properties of the system under test. For example, metamorphic testing exploits such properties, called metamorphic relations, across multiple executions of the system.
Implicit
An implicit test oracle relies on implied information and assumptions. For example, there may be some implied conclusion from a program crash, i.e. unwanted behavior - an oracle to determine that there may be a problem. There are a number of ways to search and test for unwanted behavior, whether some call it negative testing, where there are specialized subsets such as fuzzing.
There are limitations in implicit test oracles - as they rely on implied conclusions and assumptions. For example, a program or process crash may not be a priority issue if the system is a fault-tolerant system and so operating under a form of self-healing/self-management. Implicit test oracles may be susceptible to false positives due to environment dependencies.
Human
When specified, derived or implicit test oracles cannot be used, then human input to determine the test oracles is required. These can be thought of as quantitative and qualitative approaches. A quantitative approach aims to find the right amount of information to gather on a system under test (e.g., test results) for a stakeholder to be able to make decisions on fit-for-purpose or the release of the software. A qualitative approach aims to find the representativeness and suitability of the input test data and context of the output from the system under test. An example is using realistic and representative test data and making sense of the results (if they are realistic). These can be guided by heuristic approaches, such as gut instincts, rules of thumb, checklist aids, and experience to help tailor the specific combination selected for the program/system under test.
Examples
Test oracles are most commonly based on specifications and documentation. A formal specification used as input to model-based design and model-based testing would be an example of a specified test oracle. The model-based oracle uses the same model to generate and verify system behavior. Documentation that is not a full specification of the product, such as a usage or installation guide, or a record of performance characteristics or minimum machine requirements for the software, would typically be a derived test oracle.
A consistency oracle compares the results of one test execution to another for similarity. This is another example of a derived test oracle.
An oracle for a software program might be a second program that uses a different algorithm to evaluate the same mathematical expression as the product under test. This is an example of a pseudo-oracle, which is a derived test oracle.
During Google search, we do not have a complete oracle to verify whether the number of returned results is correct. We may define a metamorphic relation such that a follow-up narrowed-down search will produce fewer results. This is an example of a partial oracle, which is a hybrid between specified test oracle and derived test oracle.
A statistical oracle uses probabilistic characteristics, for example with image analysis where a range of certainty and uncertainty is defined for the test oracle to pronounce a match or otherwise. This would be an example of a quantitative approach in human test oracle.
A heuristic oracle provides representative or approximate results over a class of test inputs. This would be an example of a qualitative approach in human test oracle.
References
Bibliography
Binder, Robert V. (1999). "Chapter 18 - Oracles" in Testing Object-Oriented Systems: Models, Patterns, and Tools, Addison-Wesley Professional, 7 November 1999,
Software testing
Computation oracles |
7423303 | https://en.wikipedia.org/wiki/List%20of%20Unix%20systems | List of Unix systems | Each version of the UNIX Time-Sharing System evolved from the version before, with version one evolving from the prototypal Unix. Not all variants and descendants are displayed.
Research Unix
{| style="background-color: transparent; width: 100%"
| align="left" valign="top" |
"Ken's new system" (→Unix) (1969)
UNIX Time-Sharing System v1 (1971)
UNIX Time-Sharing System v2 (1972)
UNIX Time-Sharing System v3 (1973)
UNIX Time-Sharing System v4 (1973)
UNIX Time-Sharing System v5 (1974)
UNSW 01 (1978)
UNIX Time-Sharing System v6 (1975)
Mini-UNIX (1977)
PWB/UNIX 1.0 (1977)
USG 1.0
CB UNIX 1
UNIX Time-Sharing System v7 (1979)
UNIX System III (1981)
UNIX Time-Sharing System v8 (1985)
UNIX Time-Sharing System v9 (1986)
UNIX Time-Sharing System v10 (1989)
|}
The versions leading to v7 are also sometimes called Ancient unix. After the release of Version 10, the Unix research team at Bell Labs turned its focus to Plan 9 from Bell Labs, a distinct operating system that was first released to the public in 1993.
AT&T UNIX Systems and descendants
Each of the systems in this list is evolved from the version before, with Unix System III evolving from both the UNIX Time-Sharing System v7 and the descendants of the UNIX Time-Sharing System v6.
{| style="background-color: transparent; width: 100%"
| align="left" valign="top" |
UNIX System III (1981)
UNIX System IV (1982)
UNIX System V (1983)
UNIX System V Release 2 (1984)
UNIX System V Release 3.0 (1986)
UNIX System V Release 3.2 (1987)
UNIX System V Release 4 (1988)
UNIX System V Release 4.2 (1992)
UnixWare 1.1 (1993)
UnixWare 1.1.1 (1994)
UnixWare 2.0 (1995)
UnixWare 2.1 (1996)
UnixWare 2.1.2 (1996)
| align="left" valign="top" |
UnixWare 7 (System V Release 5) (1998)
UnixWare 7.0.1 (1998)
UnixWare 7.1 (1999)
UnixWare 7.1.1 (1999)
UnixWare NSC 7.1+IP (2000)
UnixWare NSC 7.1+LKP (2000)
UnixWare NSC 7.1DCFS (2000)
Open Unix 8 (UnixWare 7.1.2) (2001)
Open Unix 8MP1 (2001)
Open Unix 8MP2 (2001)
Open Unix 8MP3 (2002)
Open Unix 8MP4 (2002)
SCO UnixWare 7.1.3 (2002)
SCO UnixWare 7.1.3 Update Pack 1 (2003)
SCO UnixWare 7.1.4 (2004)
|}
Unix-like operating systems
AIX
BSD
COSIX
DNIX
Domain/OS
HP-UX
illumos
IRIX
Linux
Sakura HyperMedia Desktop
SCO
Solaris
SOX
SunOS
uNETix
UNICOS
Uniplus+
Venix
Wollongong Unix
z/OS UNIX
See also
Unix-like
References
Unix systems |
30855965 | https://en.wikipedia.org/wiki/Shaheed%20Zulfikar%20Ali%20Bhutto%20Institute%20of%20Science%20and%20Technology | Shaheed Zulfikar Ali Bhutto Institute of Science and Technology | The Shaheed Zulfikar Ali Bhutto Institute of Science and Technology (SZABIST) ; ( is a private institute with multiple campuses in the residential and commercial areas of Pakistan especially in the heart of Pakistan, Karachi, Islamabad, and United Arab Emirates. Its main campus is located in Karachi, Sindh, Pakistan.
Overview
Begun in 1995 under the vision of its founder Pakistani Ex-Prime Minister Benazir Bhutto and led by Dr. Javaid Laghari as its first president and project director, SZABIST is honored and named in remembrance of Shaheed Zulfiqar Ali Bhutto. Financial endowment and research funding are coordinated by the leadership of the Pakistan Peoples Party. The university offers undergraduate and post-graduate degrees. It is a member of the Association of Commonwealth Universities of the United Kingdom and the Association to Advance Collegiate Schools of Business, as well as other international education associations. SZABIST is regarded as one of the more notable private research institutions of higher learning in Pakistan and ranked among the nation's top-ten institutions by the Higher Education Commission, as of 2013.
In addition, its business management program is listed as top ranking by the publication Business Week and is ranked among other noticeable science institutions by CNN & Time and Asiaweek. SZABIST is identified as a major centre of higher learning in Pakistan and is one of the largest private universities in the country by area, according to the HEC.
Global recognition
SZABIST is a Pakistani institute to have been recognized internationally:
BusinessWeek, the leading international business magazine, listed SZABIST among the best business schools internationally for six years (2001, 2002, 2003, 2004, 2006 and 2008).
Asia Inc. ranked SZABIST among the top MBA Schools of South Asia in its "Asia's Best MBA Schools Survey" for two consecutive years (2003, 2004).
SZABIST was ranked among the best Science and Technology and MBA schools in Asia by the CNN-Time publication, Asiaweek.
SZABIST was featured in the CNN Executive Education Schools, 2009.
Academics
The school offers programs in management sciences, computer sciences, media sciences, law, economics, engineering, public health, biosciences and social sciences. Some of the programs are external and offered in collaboration with universities in the UK. The following is a list of offered degrees:
Management Sciences: Bachelor of business administration (BBA), BS in Accounting & Finance (BS A&F), BS in Entrepreneurship, Executive Master of Business Administration, Master of Business Administration (MBA), Master of Project Management (MPM), MS in Project Management (MSPM), Master of Science (MS) in Management Sciences and Doctor of Philosophy (Ph.D) in Management Sciences.
Computer science: Bachelor of Science (BS) in Computer Science, Master of Science (MS) in Computer Science, Doctor of Philosophy (Ph.D) in Computer Sciences.
Mechatronics Engineering: Bachelor of Engineering (BE) in Mechatronics Engineering
Social Sciences: Bachelor of Science (BS) in Social Sciences and Economics, Master of Science (MS) in Social Sciences and Economics and Doctor of Philosophy (Ph.D) in Social Sciences and Economics.
Media Sciences: Bachelor of Science (BS) in Media Sciences with majors in Production and Advertising.
Biosciences: Bachelor of science (BS) in Biosciences and BS in Biotechnology, Masters of Science (MS) in Biosciences and Doctor of Philosophy (PhD) in Biosciences.
Public Health: Master of Public Health (MPH) and Master of Science in Public Health (MSPH).
External programs: Zulfikar Ali Bhutto Institute of Science and Technology offers external programs in Law (LLB) and Economics and Development (BSc) in collaboration with the University of London.
Intermediate program: SZABIST offers Intermediate at SZABIST Intermediate campus Larkana in affiliation with Board of Intermediate and Secondary Education, Larkana (BISE Larkana).
HEC ranking
SZABIST ranked amongst the top three universities for 2014 in Business and Information Technology by the Higher Education Commission (HEC).
International agreements
SZABIST has signed articulation agreements with the University of South Wales and the University of Northampton, UK. SZABIST has signed MoUs with the State University of New York, USA; University of London, UK; Philippine Women's University, Philippines and the Asian Academy of Film & Television, India.
ZAB Media Festival
The ZAB Media Festival is an annual event organized by the Department of Media Sciences.
References
External links
SZABIST official website
Universities and colleges in Dubai
Universities and colleges in Islamabad
Educational institutions established in 1995
1995 establishments in Pakistan
Engineering universities and colleges in Pakistan
Universities and colleges in Karachi
Private universities and colleges in Sindh
Islamabad Capital Territory
Memorials to Zulfikar Ali Bhutto |
59458 | https://en.wikipedia.org/wiki/ElGamal%20encryption | ElGamal encryption | In cryptography, the ElGamal encryption system is an asymmetric key encryption algorithm for public-key cryptography which is based on the Diffie–Hellman key exchange. It was described by Taher Elgamal in 1985. ElGamal encryption is used in the free GNU Privacy Guard software, recent versions of PGP, and other cryptosystems. The Digital Signature Algorithm (DSA) is a variant of the ElGamal signature scheme, which should not be confused with ElGamal encryption.
ElGamal encryption can be defined over any cyclic group , like multiplicative group of integers modulo n. Its security depends upon the difficulty of a certain problem in related to computing discrete logarithms.
The algorithm
ElGamal encryption consists of three components: the key generator, the encryption algorithm, and the decryption algorithm.
Key generation
The first party, Alice, generates a key pair as follows:
Generate an efficient description of a cyclic group of order with generator . Let represent the unit element of .
Choose an integer randomly from .
Compute .
The public key consists of the values . Alice publishes this public key and retains as her private key, which must be kept secret.
Encryption
A second party, Bob, encrypts a message to Alice under her public key as follows:
Map the message to an element of using a reversible mapping function.
Choose an integer randomly from .
Compute . This is called the shared secret.
Compute .
Compute .
Bob sends the ciphertext to Alice.
Note that if one knows both the ciphertext and the plaintext , one can easily find the shared secret , since . Therefore, a new and hence a new is generated for every message to improve security. For this reason, is also called an ephemeral key.
Decryption
Alice decrypts a ciphertext with her private key as follows:
Compute . Since , , and thus it is the same shared secret that was used by Bob in encryption.
Compute , the inverse of in the group . This can be computed in one of several ways. If is a subgroup of a multiplicative group of integers modulo , where is prime, the modular multiplicative inverse can be computed using the extended Euclidean algorithm. An alternative is to compute as . This is the inverse of because of Lagrange's theorem, since .
Compute . This calculation produces the original message , because ; hence .
Map back to the plaintext message .
Practical use
Like most public key systems, the ElGamal cryptosystem is usually used as part of a hybrid cryptosystem, where the message itself is encrypted using a symmetric cryptosystem, and ElGamal is then used to encrypt only the symmetric key. This is because asymmetric cryptosystems like ElGamal are usually slower than symmetric ones for the same level of security, so it is faster to encrypt the message, which can be arbitrarily large, with a symmetric cipher, and then use ElGamal only to encrypt the symmetric key, which usually is quite small compared to the size of the message.
Security
The security of the ElGamal scheme depends on the properties of the underlying group as well as any padding scheme used on the messages. If the computational Diffie–Hellman assumption (CDH) holds in the underlying cyclic group , then the encryption function is one-way.
If the decisional Diffie–Hellman assumption (DDH) holds in , then
ElGamal achieves semantic security. Semantic security is not implied by the computational Diffie–Hellman assumption alone. See decisional Diffie–Hellman assumption for a discussion of groups where the assumption is believed to hold.
ElGamal encryption is unconditionally malleable, and therefore is not secure under chosen ciphertext attack. For example, given an encryption of some (possibly unknown) message , one can easily construct a valid encryption of the message .
To achieve chosen-ciphertext security, the scheme must be further modified, or an appropriate padding scheme must be used. Depending on the modification, the DDH assumption may or may not be necessary.
Other schemes related to ElGamal which achieve security against chosen ciphertext attacks have also been proposed. The Cramer–Shoup cryptosystem is secure under chosen ciphertext attack assuming DDH holds for . Its proof does not use the random oracle model. Another proposed scheme is DHAES, whose proof requires an assumption that is weaker than the DDH assumption.
Efficiency
ElGamal encryption is probabilistic, meaning that a single plaintext can be encrypted to many possible ciphertexts, with the consequence that a general ElGamal encryption produces a 1:2 expansion in size from plaintext to ciphertext.
Encryption under ElGamal requires two exponentiations; however, these exponentiations are independent of the message and can be computed ahead of time if needed. Decryption requires one exponentiation and one computation of a group inverse, which can, however, be easily combined into just one exponentiation.
See also
Taher Elgamal, designer of this and other cryptosystems
ElGamal signature scheme
Homomorphic encryption
Further reading
References
Public-key encryption schemes |
40851187 | https://en.wikipedia.org/wiki/LibreDWG | LibreDWG | GNU LibreDWG is a software library programmed in C to manage DWG computer files, native proprietary format of computer-aided design software AutoCAD. It aims to be a free software replacement for the OpenDWG libraries. The project is managed by the Free Software Foundation (FSF).
Motivation
The proprietary format DWG is currently the most used file format in CAD, becoming a de facto standard, without other alternative extended, forcing many users to use this software in a dominant position on the part of the owner company Autodesk.
There did exist the OpenDWG library (later named "Teigha"), to access and manipulate data stored in DWG format, which is developed by reverse engineering by an association of manufacturers of CAD software with the intention of supporting their products. As OpenDWG's license does not allow the usage in free software projects, the FSF created a free alternative to OpenDWG.
History
GNU LibreDWG is based on the LibDWG library, originally written by Rodrigo Rodrigues da Silva and Felipe Correa da Silva Sanches and licensed as GPLv2 around 2005.
In July 2010 the FSF noted the creation of an alternative to the OpenDWG library as one of 13 "high priority projects".
GPLv3 controversies
In 2009 a license update of LibDWG/LibreDWG to the version 3 of the GNU GPL, made it impossible for the free software projects LibreCAD and FreeCAD to use LibreDWG legally.
Many projects voiced their unhappiness about the GPLv3 license selection for LibreDWG, such as FreeCAD, LibreCAD, Assimp, and Blender. Some suggested the selection of a license with a broader license compatibility, for instance the MIT, BSD, or LGPL 2.1.
A request went to the FSF to relicense GNU LibreDWG as GPLv2, which was rejected in 2012.
Refork
The project was stalled for a few years starting in 2011; this stall occurred for various reasons, including lack of volunteers, licensing issues and programmer motivation. In September 2013, the original project on which LibreDWG is based, LibDWG, announced that it was reactivating, re-forking its code from LibreDWG. A GPLv2 licensed alternative is the libdxfrw project, which can read simple DWGs.
The LibreDWG project has resumed active development, including the addition of more recent .dwg and .dxf formats with version 0.5 in June of 2018. The most recent release as of November 2020, version 0.11.1 includes read support for all DWG formats r13+, write support for r2000 DWG and read/write support for all r13+ DXF versions.
References
External links
Project wiki
Computer file formats
Computer-aided design |
5814799 | https://en.wikipedia.org/wiki/Mindtree | Mindtree | Mindtree Ltd is an Indian multinational information technology services and consulting company, headquartered in Bangalore, India. It is a part of the Larsen & Toubro Group. Founded in 1999, the company employs approximately 23,814 employees with an annual revenue of ₹7839.9 crore (US$1.1 billion).
The company deals in e-commerce, mobile applications, cloud computing, digital transformation, data analytics, Testing, enterprise application integration and enterprise resource planning, with more than 307 active clients and 43 offices in over 18 countries, as of 31 March 2019.
History
In August 1999, Mindtree Consulting Private Limited was founded by ten IT professionals, three of which invested through an entity incorporated in Mauritius. It was funded by the venture capital firms Walden International and Sivan Securities, and received further funding in 2001 from the Capital Group and Franklin Templeton.
It became a public company on 12 December 2006 and was listed on the Bombay Stock Exchange and National Stock Exchange. Its IPO debuted on 9 February 2007 and closed on 14 February 2007. The IPO was oversubscribed by more than a hundred times. Mindtree announced a new brand identity and logo, with the slogan "Welcome to possible" on 28 September 2012.
In 2012, Mindtree setup its first U.S. delivery center (USDC) in Gainesville, Florida, under the leadership of Scott Staples, co-founder and Global Head of Sales. As of 2017, the company has 43 offices in over 17 countries.
Larsen & Toubro, an infrastructure major and one of the largest conglomerates in India, took over control of Mindtree on June 2019 and currently has a 61.08% stake in the company.
In March 2020, Mindtree announced the appointment of Dayapatra Nevatia as COO with immediate effect. He joins the company from Accenture where he was the managing director as well as the director for delivery for advanced technology centers in India.
Services
Mindtree works in Application Development and Maintenance, Data Analytics, Digital Services, Enterprise Application Integration and Business Process Management, Engineering R&D, Enterprise Application Services, Testing, and Infrastructure Management Services.
The company offers various research and development services including Bluetooth Solutions, Digital Video Surveillance, an integrated test methodology called MindTest, an IT infrastructure management and service platform called MWatch, the application management service, Atlas, SAP Insurance and OmniChannel.
Mindtree's business is structured around clients in verticals such as Banking, Capital Markets, Consumer Devices & Electronics, Consumer Packed Goods, Independent Software Vendors, Manufacturing, Insurance, Media & Entertainment, Retail, Semiconductors and the Travel and Hospitality industry.
Employees
Mindtree has a total of 23,814 employees as of March 2021, of which 32% were women. Its workforce consists of employees from over 80 nationalities working from various offices around the globe. Out of its total workforce, 95% are software professionals and remaining 5% work in support and sales.
Acquisitions
Subsidiaries
Philanthropy
Mindtree Foundation is a unit of Mindtree that works towards improving the lives of people with disabilities and the enhancement in the quality of primary education. Mindtree Foundation was incorporated on 20 November 2007 under section 25 of Companies Act. Mindtree's employees, assistive technologies and associations with NGOs led to the following:
The launch of 'Udaan', a scholarship program to support the medical education of underprivileged students in association with Narayana Hrudayalaya Charitable Trust.
The launch of 'I Got Garbage', a cloud-based platform aimed to simplify waste management and transform every waste picker in Bengaluru, India into an entrepreneur through a structured and governed waste management framework.
Individual Social Responsibility – Employees join the cause of donation of old clothes/toys/books, distribution of solar lanterns, caring for the elderly, cleaning up the city, blood and organ donation.
See also
List of IT consulting firms
Fortune India 500
List of Indian IT companies
Software industry in Telangana
Software industry in Karnataka
References
External links
Information technology companies of Bangalore
International information technology consulting firms
Multinational companies headquartered in India
Outsourcing companies
Outsourcing in India
Software companies based in Mumbai
Software companies established in 1999
Information technology companies of Bhubaneswar
Indian brands
2019 mergers and acquisitions
1999 establishments in Karnataka
Larsen & Toubro
Companies listed on the National Stock Exchange of India
Companies listed on the Bombay Stock Exchange |
23057806 | https://en.wikipedia.org/wiki/Avogadro%20%28software%29 | Avogadro (software) | Avogadro is a molecule editor and visualizer designed for cross-platform use in computational chemistry, molecular modeling, bioinformatics, materials science, and related areas. It is extensible via a plugin architecture.
Features
Molecule builder-editor for Windows, Linux, Unix, and macOS.
All source code is licensed under the GNU General Public License (GPL) version 2.
Supported languages include: Chinese, English, French, German, Italian, Russian, Spanish, and Polish.
Supports multi-threaded rendering and computation.
Plugin architecture for developers, including rendering, interactive tools, commands, and Python scripts.
OpenBabel import of files, input generation for multiple computational chemistry packages, X-ray crystallography, and biomolecules.
See also
References
External links
Free chemistry software
Free software programmed in C++
Molecular modelling software
Computational chemistry software
Science software that uses Qt
Chemistry software for Linux |
51746 | https://en.wikipedia.org/wiki/Cisco | Cisco | Cisco (officially known as Cisco Systems, Inc.) is an American multinational technology conglomerate corporation headquartered in San Jose, California. Integral to the growth of Silicon Valley, Cisco develops, manufactures, and sells networking hardware, software, telecommunications equipment and other high-technology services and products. Cisco specializes in specific tech markets, such as the Internet of Things (IoT), domain security, videoconferencing, and energy management with leading products including Webex, OpenDNS, Jabber, Duo Security, and Jasper. Cisco is one of the largest information technology companies in the world ranking 63 on the Fortune 100 with $49 billion in revenue and nearly 80,000 employees.
Cisco Systems was founded in December 1984 by Leonard Bosack and Sandy Lerner, two Stanford University computer scientists who had been instrumental in connecting computers at Stanford. They pioneered the concept of a local area network (LAN) being used to connect distant computers over a multiprotocol router system. By the time the company went public in 1990, Cisco had a market capitalization of $224 million; by the end of the dot-com bubble in the year 2000, this had increased to $500 billion, surpassing Microsoft as the world's most valuable company. As of December 2021, Cisco had a market capitalization of around $267 billion.
Cisco stock (CSCO) was added to the Dow Jones Industrial Average on June 8, 2009, and is also included in the S&P 500 Index, the Russell 1000 Index, NASDAQ-100 Index and the Russell 1000 Growth Stock Index.
In 2021, Fortune ranked Cisco number one for the second year on their annual list of the 100 Best Companies to Work For based on employee satisfaction surveying. LinkedIn and Glassdoor also ranked Cisco as a top place to work in 2021 and recent years.
History
1984–1995: Origins and initial growth
Cisco Systems was founded in December 1984 by Sandy Lerner along with her husband Leonard Bosack. Lerner was the director of computer facilities for the Stanford University Graduate School of Business. Bosack was in charge of the Stanford University computer science department's computers.
Cisco's initial product has roots in Stanford University's campus technology. In the early 1980s students and staff at Stanford, including Bosack, used technology on the campus to link all of the school's computer systems to talk to one another, creating a box that functioned as a multiprotocol router called the "Blue Box". The Blue Box used circuitry made by Andy Bechtolsheim, and software that was originally written at Stanford by research engineer William Yeager. Due to the underlying architecture, and its ability to scale well, Yeager's well-designed invention became a key to Cisco's early success.
In 1985, Bosack and Stanford employee Kirk Lougheed began a project to formally network Stanford's campus. They adapted Yeager's software into what became the foundation for Cisco IOS, despite Yeager's claims that he had been denied permission to sell the Blue Box commercially. On July 11, 1986, Bosack and Lougheed were forced to resign from Stanford and the university contemplated filing criminal complaints against Cisco and its founders for the theft of its software, hardware designs, and other intellectual properties. In 1987, Stanford licensed the router software and two computer boards to Cisco. In addition to Bosack, Lerner, Lougheed, Greg Satz (a programmer), and Richard Troiano (who handled sales), completed the early Cisco team. The company's first CEO was Bill Graves, who held the position from 1987 to 1988. In 1988, John Morgridge was appointed CEO.
The name "Cisco" was derived from the city name San Francisco, which is why the company's engineers insisted on using the lower case "cisco" in its early years. The logo is intended to depict the two towers of the Golden Gate Bridge.
On February 16, 1990, Cisco Systems went public with a market capitalization of $224 million, and was listed on the NASDAQ stock exchange. On August 28, 1990, Lerner was fired. Upon hearing the news, her husband Bosack resigned in protest.
Although Cisco was not the first company to develop and sell dedicated network nodes, it was one of the first to sell commercially successful routers supporting multiple network protocols. Classical, CPU-based architecture of early Cisco devices coupled with flexibility of operating system IOS allowed for keeping up with evolving technology needs by means of frequent software upgrades. Some popular models of that time (such as Cisco 2500) managed to stay in production for almost a decade virtually unchanged. The company was quick to capture the emerging service provider environment, entering the SP market with product lines such as Cisco 7000 and Cisco 8500.
Between 1992 and 1994, Cisco acquired several companies in Ethernet switching, such as Kalpana, Grand Junction and most notably, Mario Mazzola's Crescendo Communications, which together formed the Catalyst business unit. At the time, the company envisioned layer 3 routing and layer 2 (Ethernet, Token Ring) switching as complementary functions of different intelligence and architecture—the former was slow and complex, the latter was fast but simple. This philosophy dominated the company's product lines throughout the 1990s.
In 1995, John Morgridge was succeeded by John T. Chambers.
1996–2005: Internet and silicon intelligence
The Internet Protocol (IP) became widely adopted in the mid-to-late 1990s. Cisco introduced products ranging from modem access shelves (AS5200) to core GSR routers, making them a major player in the market. In late March 2000, at the height of the dot-com bubble, Cisco became the most valuable company in the world, with a market capitalization of more than $500 billion. As of July 2014, with a market cap of about US$129 billion, it was still one of the most valuable companies.
The perceived complexity of programming routing functions in silicon led to the formation of several startups determined to find new ways to process IP and MPLS packets entirely in hardware and blur boundaries between routing and switching. One of them, Juniper Networks, shipped their first product in 1999 and by 2000 chipped away about 30% from Cisco SP Market share. In response, Cisco later developed homegrown ASICs and fast processing cards for GSR routers and Catalyst 6500 switches. In 2004, Cisco also started the migration to new high-end hardware CRS-1 and software architecture IOS-XR.
2006–2012: The Human Network
As part of a rebranding campaign in 2006, Cisco Systems adopted the shortened name "Cisco" and created "The Human Network" advertising campaign. These efforts were meant to make Cisco a "household" brand—a strategy designed to support the low-end Linksys products and future consumer products.
On the more traditional business side, Cisco continued to develop its routing, switching and security portfolio. The quickly growing importance of Ethernet also influenced the company's product lines. Limits of IOS and aging Crescendo architecture also forced Cisco to look at merchant silicon in the carrier Ethernet segment. This resulted in a new ASR9000 product family intended to consolidate the company's carrier ethernet and subscriber management business around EZChip-based hardware and IOS-XR.
Throughout the mid-2000s, Cisco also built a significant presence in India, establishing its Globalization Centre East in Bangalore for $1 billion. Cisco also expanded into new markets by acquisition—one example being a 2009 purchase of mobile specialist Starent Networks.
Cisco continued to be challenged by both domestic competitors Alcatel-Lucent, Juniper Networks, and an overseas competitor Huawei. Due to lower-than-expected profit in 2011, Cisco reduced annual expenses by $1 billion. The company cut around 3,000 employees with an early-retirement program who accepted a buyout and planned to eliminate as many as 10,000 jobs (around 14 percent of the 73,400 total employees before curtailment). During the 2011 analyst call, Cisco's CEO John Chambers called out several competitors by name, including Juniper and HP.
On July 24, 2012, Cisco received approval from the EU to acquire NDS (a TV software developer) for US$5 billion. In 2013, Cisco sold its Linksys home-router unit to Belkin International Inc., signaling a shift to sales to businesses rather than consumers.
Present day
On July 23, 2013, Cisco Systems announced a definitive agreement to acquire Sourcefire for $2.7 billion. On August 14, 2013, Cisco Systems announced it would cut 4,000 jobs from its workforce, which was roughly 6%, starting in 2014. At the end of 2013, Cisco announced poor revenue due to depressed sales in emerging markets, caused by economic uncertainty and by fears of the National Security Agency planting backdoors in its products.
In April 2014, Cisco announced funding for early-stage firms to focus on the Internet of Things. The investment fund was allocated to investments in IoT accelerators and startups such as The Alchemist Accelerator, Ayla Networks and EVRYTHNG. Later that year, the company announced it was laying off another 6,000 workers or 8% of its global workforce, as part of a second restructuring. On November 4, 2014, Cisco announced an investment in Stratoscale.
On May 4, 2015, Cisco announced CEO and Chairman John Chambers would step down as CEO on July 26, 2015, but remain chairman. Chuck Robbins, senior vice president of worldwide sales & operations and 17-year Cisco veteran, was announced as the next CEO. On July 23, 2015, Cisco announced the divestiture of its television set-top-box and cable modem business to Technicolor SA for $600 million, a division originally formed by Cisco's $6.9 billion purchase of Scientific Atlanta. The deal came as part of Cisco's gradual exit from the consumer market, and as part of an effort by Cisco's new leadership to focus on cloud-based products in enterprise segments. Cisco indicated that it would still collaborate with Technicolor on video products. On November 19, 2015, Cisco, alongside ARM Holdings, Dell, Intel, Microsoft and Princeton University, founded the OpenFog Consortium, to promote interests and development in fog computing.
In January 2016, Cisco invested in VeloCloud, a software-defined WAN (SD-WAN) start-up with a cloud offering for configuring and optimizing branch office networks. Cisco contributed to VeloCloud's $27 million Series C round, led by March Capital Partners.
In February 2017, Cisco launched a cloud-based secure internet gateway, called Cisco Umbrella, to provide safe internet access to users who do not use their corporate networks or VPNs to connect to remote data centers. Immediately after reporting their fourth-quarter earnings for 2017, Cisco's price-per-share value jumped by over 7%, while its Earnings per share ratio increased from 60 to 61 cents per share, due in part to Cisco's outperformance of analyst expectations. In September 2017, Chambers announced that he would step down from the executive chairman role at the end of his term on the board in December 2017. On December 11, 2017, Robbins was elected to succeed Chambers as executive chairman while retaining his role as CEO, and Chambers was given the title of "Chairman Emeritus".
Reuters reported that "Cisco Systems Inc’s (CSCO.O) product revenue in Russia grew 20 percent in 2017, ahead of Cisco’s technology product revenue growth in the other so-called BRIC countries of Brazil, China and India."
On May 1, 2018, Cisco Systems agreed to buy AI-driven business intelligence startup Accompany for $270 million. As of June 2018, Cisco Systems ranked 444th on Forbes Global 2000 list, with $221.3 billion market cap.
In 2019, Cisco acquired CloudCherry, a customer experience management company, and Voicea, an artificial intelligence company.
In March 2020, SVP and GM of Enterprise Networking David Goeckeler left to become CEO of Western Digital Corp. and was replaced by Todd Nightingale, head of Cisco Meraki.
Finance
For the fiscal year 2018, Cisco reported earnings of US$0.1 billion, with an annual revenue of US$49.3 billion, an increase of 2.8% over the previous fiscal cycle. Cisco's shares traded at over $43 per share, and its market capitalization was valued at US$213.2 billion in September 2018. Low Net Income for fiscal year 2018 was attributed to a one-time tax charge, that allowed Cisco to bring back capital from overseas. Cisco used this money it was able to bring back at a lower tax rate to fund share buybacks and acquisitions.
Corporate structure
Acquisitions and subsidiaries
Cisco acquired a variety of companies to spin products and talent into the company. In 1995–1996 the company completed 11 acquisitions. Several acquisitions, such as Stratacom, were one of the biggest deals in the industry when they occurred. During the Internet boom in 1999, the company acquired Cerent Corporation, a start-up company located in Petaluma, California, for about US$7 billion. It was the most expensive acquisition made by Cisco to that date, and only the acquisition of Scientific Atlanta has been larger. In 1999 Cisco also acquired stake for $1 Billion in KPMG Consulting to enable establishing Internet firm Metrius founded by Keyur Patel of Fuse. Several acquired companies have grown into $1Bn+ business units for Cisco, including LAN switching, Enterprise Voice over Internet Protocol (VOIP) platform Webex and home networking. The latter came as result of Cisco acquiring Linksys in 2003 and in 2010 was supplemented with new product line dubbed Cisco Valet.
Cisco announced on January 12, 2005, that it would acquire Airespace for US$450 million to reinforce the wireless controller product lines.
Cisco announced on January 4, 2007, that it would buy IronPort in a deal valued at US$830 million and completed the acquisition on June 25, 2007. IronPort was best known for its IronPort AntiSpam, its SenderBase email reputation service and its email security appliances. Accordingly, IronPort was integrated into the Cisco Security business unit. Ironport's Senderbase was renamed as Sensorbase to take account of the input into this database that other Cisco devices provide. SensorBase allows these devices to build a risk profile on IP addresses, therefore allowing risk profiles to be dynamically created on http sites and SMTP email sources.
Cisco announced on March 15, 2012, that it would acquire NDS Group for $5bn. The transaction was completed on July 30, 2012.
In more recent merger deals, Cisco bought Starent Networks (a mobile packet core company) and Moto Development Group, a product design consulting firm that helped develop Cisco's Flip video camera. Also in 2010, Cisco became a key stakeholder in e-Skills Week. In March 2011, Cisco completed the acquisition of privately held network configuration and change management software company Pari Networks.
Although many buy-ins (such as Crescendo Networks in 1993, Tandberg in 2010) resulted in acquisition of flagship technology to Cisco, many others have failed—partially or completely. For instance, in 2010 Cisco occupied a meaningful share of the packet-optical market, revenues were still not on par with US$7 billion price tag paid in 1999 for Cerent. Some of acquired technologies (such as Flip from Pure Digital) saw their product lines terminated.
In January 2013, Cisco Systems acquired Israeli software maker Intucell for around $475 million in cash, a move to expand its mobile network management offerings. In the same month, Cisco Systems acquired Cognitive Security, a company focused on Cyber Threat Protection. Cisco also acquired SolveDirect (cloud services) in March 2013 and Ubiquisys (mobile software) in April 2013.
Cisco acquired cyber-security firm Sourcefire, in October 2013.
On June 16, 2014, Cisco announced that it has completed the acquisition of ThreatGRID, a company that provided dynamic malware analysis and threat intelligence technology.
June 17, 2014, Cisco announced its intent to acquire privately held Tail-f Systems, a leader in multi-vendor network service orchestration solutions for traditional and virtualized networks.
April 2, 2015, Cisco announced plans to buy Embrane, a software-defined networking startup. The deal will give Cisco Embrane's software platform, which provides layer 3–7 network services for things such as firewalls, VPN termination, server load balancers and SSL offload.
May 7, 2015 Cisco announced plans to buy Tropo, a cloud API platform that simplifies the addition of real-time communications and collaboration capabilities within applications.
June 30, 2015, Cisco acquired privately held OpenDNS, the company best known for its DNS service that adds a level of security by monitoring domain name requests.
August 6, 2015, Cisco announced that it has completed the acquisition of privately held MaintenanceNet, the US-based company best known for its cloud-based contract management platform ServiceExchange. On the same month, Cisco acquired Pawaa, a privately held company in Bangalore, India that provides secure on-premises and cloud-based file-sharing software.
September 30, 2015, Cisco announced its intent to acquire privately held Portcullis Computer Security, a UK-based company that provides cybersecurity services to enterprise clients and the government sectors.
October 26, 2015, Cisco announced its intent to acquire ParStream, a privately held company based in Cologne, Germany, that provides an analytics database that allows companies to analyze large amounts of data and store it in near real-time anywhere in the network.
October 27, 2015, Cisco announced that it would acquire Lancope, a company that focuses on detecting threat activity, for $452.5 million in a cash-and-equity deal.
June 28, 2016, Cisco announced its intent to acquire CloudLock, a privately held cloud security company founded in 2011 by three Israeli military veterans, for $293 million. The deal was expected to close in the first quarter of 2017.
In August 2016, Cisco announced it is getting closer to making a deal to acquire Springpath, the startup whose technology is used in Cisco's HyperFlex Systems. Cisco already owns an undisclosed stake in the hyper-converged provider.
January 2017, Cisco announced they would acquire AppDynamics, a company that monitors application performance, for $3.7 billion. The acquisition came just one day before AppDynamics was set to IPO.
January 26, 2017, Cisco founded the Innovation Alliance in Germany with eleven other companies bringing together 40 sites and 2,000 staff to provide small businesses in Germany with expertise.
August 1, 2017, Cisco completed the acquisition of Viptela Inc. for $610 million in cash and assumed equity awards. Viptela was a privately held software-defined wide area network (SD-WAN) company based in San Jose, Ca.
October 23, 2017, Cisco Systems announced it would be acquiring Broadsoft for $1.9 Billion to further entrench itself in the cloud communication and collaboration area.
August 7, 2020, Cisco completed its acquisition of network intelligence company ThousandEyes.
October 1, 2020, Cisco announced that it would be acquiring Israeli startup Portshift for a reported $100 million.
December 7, 2020, Cisco announced that it would be acquiring Slido to improve Q&A, polls and engagement in WebEx videoconferencing
December 7, 2020, Cisco announced the acquisition of U.K based IMImobile in a $730M deal.
May 3, 2021, Cisco completed its acquisition of Q&A and polling platform Slido.
Ownership
As of 2017 Cisco Systems shares are mainly held by institutional investors (The Vanguard Group, BlackRock, State Street Corporation and others).
Facilities
Cisco is headquartered in San Jose, California at 170 West Tasman Dr. with dozens of buildings comprising its corporate campus. Over 15,000 full-time employees are based at the San Jose campus and the surrounding Bay Area. Cisco's second largest campus in the United States is located at Research Triangle Park in North Carolina with 7,000 employees spanning across 12 buildings.
In August 2020, Cisco announced the creation of a new 130,000 square feet Midwest headquarters in Chicago at the Old Chicago Main Post Office accommodating 1,200 employees. Cisco maintains over 200 corporate offices in more than 80 countries.
In July 2021, Cisco announced all employees the option to work remotely on a permanent basis.
Products and services
Cisco's products and services focus on three market segments—enterprise, service provider, midsize and small business.
Cisco provides IT products and services across five major technology areas: Networking (including Ethernet, optical, wireless and mobility), Security, Collaboration (including voice, video, and data), Data Center, and the Internet of Things.
Cisco has grown increasingly popular in the Asia-Pacific region over the last three decades and is the dominant vendor in the Australian market with leadership across all market segments. It uses its Australian office as one of the main headquarters for the Asia-Pacific region.
VoIP services
Cisco became a major provider of Voice over IP to enterprises and is now moving into the home user market through its acquisitions of Scientific Atlanta and Linksys. Scientific Atlanta provides VoIP equipment to cable service providers such as Time Warner, Cablevision, Rogers Communications, UPC and others; Linksys has partnered with companies such as Skype, Microsoft and Yahoo! to integrate consumer VoIP services with wireless and cordless phones.
Hosted Collaboration Solution (HCS)
Cisco partners can offer cloud-based services based on Cisco's virtualized Unified Computing System (UCS). A part of the Cisco Unified Services Delivery Solution that includes hosted versions of Cisco Unified Communications Manager (UCM), Cisco Unified Contact Center, Cisco Unified Mobility, Cisco Unified Presence, Cisco Unity Connection (unified messaging) and Cisco Webex Meeting Center.
Network Emergency Response
As part of its Tactical Operations initiative, Cisco maintains several Network Emergency Response Vehicles (NERV)s. The vehicles are maintained and deployed by Cisco employees during natural disasters and other public crises. The vehicles are self-contained and provide wired and wireless services including voice and radio interoperability, voice over IP, network-based video surveillance and secured high-definition video-conferencing for leaders and first responders in crisis areas with up to 3 Mbit/s of bandwidth (up and down) via a 1.8-meter satellite antenna.
NERVs are based at Cisco headquarters sites in San Jose, California, and at Research Triangle Park, North Carolina, allowing strategic deployment in North America. They can become fully operational within 15 minutes of arrival. High-capacity diesel fuel-tanks allow the largest vehicles to run for up to 72 hours continuously. The NERV has been deployed to incidents such as the October 2007 California wildfires; hurricanes Gustav, Ike and Katrina; the 2010 San Bruno gas pipeline explosion, tornado outbreaks in North Carolina and Alabama in 2011; and Hurricane Sandy in 2012.
The Tactical Operations team maintains and deploys smaller, more portable communication kits to emergencies outside of North America. In 2010, the team deployed to assist in earthquake recovery in Haiti and Christchurch (New Zealand). In 2011, they deployed to flooding in Brazil, as well as in response to the 2011 earthquake and tsunami in Japan.
In 2011, Cisco received the Innovation Preparedness award from the American Red Cross Silicon Valley Chapter for its development and use of these vehicles in disasters.
Certifications
Cisco Systems also sponsors a line of IT professional certifications for Cisco products. There are four or five (path to network designers) levels of certification: Entry (CCENT), Associate (CCNA/CCDA), Professional (CCNP/CCDP), Expert (CCIE/CCDE) and recently Architect (CCAr: CCDE previous), as well as nine different paths, Routing & Switching, Design, Industrial Network, Network Security, Service Provider, Service Provider Operations, Storage Networking, Voice, Datacenter and Wireless.
A number of specialist technicians, sales, and datacenter certifications are also available.
Cisco also provides training for these certifications via a portal called the Cisco Networking Academy. Qualifying schools can become members of the Cisco Networking Academy and then provide CCNA level or other level courses. Cisco Academy Instructors must be CCNA certified to be a CCAI certified instructor.
Cisco is involved with technical education in 180 countries with its Cisco Academy program. In March 2013, Cisco announced its interest in Myanmar by investing in two Cisco Networking Academies in Yangon and Mandalay and a channel partner network.
Corporate affairs
Awards and accolades
Cisco products, including IP phones and Telepresence, have been seen in movies and TV series. The company was featured in the documentary film Something Ventured which premiered in 2011.
Cisco was a 2002–03 recipient of the Ron Brown Award, a U.S. presidential honor to recognize companies "for the exemplary quality of their relationships with employees and communities". Cisco ranked number one in Great Place to Work's World's Best Workplaces 2019. In 2020, Fortune magazine ranked Cisco Systems at number four on their Fortune List of the Top 100 Companies to Work For in 2020 based on an employee survey of satisfaction.
According to a report by technology consulting firm LexInnova, Cisco was one of the leading recipients of network security-related patents with the largest portfolio within other companies (6,442 security-related patents) in 2015.
Controversies
Shareholder relations
A class action lawsuit filed on April 20, 2001, accused Cisco of making misleading statements that "were relied on by purchasers of Cisco stock" and of insider trading. While Cisco denied all allegations in the suit, on August 18, 2006, Cisco's liability insurers, its directors and officers paid the plaintiffs US$91.75 million to settle the suit.
Intellectual property disputes
On December 11, 2008, the Free Software Foundation filed suit against Cisco regarding Cisco's failure to comply with the GPL and LGPL license models and make the applicable source code publicly available. On May 20, 2009, Cisco settled this lawsuit by complying with FSF licensing terms and making a monetary contribution to the FSF.
In October 2020, Cisco was ordered to pay US$1.9 billion to Centripetal Networks for infringement on four cybersecurity patents.
Censorship in China
Cisco has been criticized for its involvement in censorship in the People's Republic of China. According to author Ethan Gutmann, Cisco and other telecommunications equipment providers supplied the Chinese government with surveillance and Internet infrastructure equipment that is used to block Internet websites and track online activities in China. Cisco has stated that it does not customize or develop specialized or unique filtering capabilities to enable governments to block access to information and that it sells the same equipment in China as it sells worldwide.
Wired News had uncovered a leaked, confidential Cisco PowerPoint presentation that detailed the commercial opportunities of the Golden Shield Project of Internet control. In May 2011, a group of Falun Gong practitioners filed a lawsuit under the Alien Tort Statute alleging that Cisco knowingly developed and customized its product to assist the Chinese government in prosecution and abuse of Falun Gong practitioners. The lawsuit was dismissed in September 2014 by the United States District Court for the Northern District of California, which decision was appealed to United States Court of Appeals for the Ninth Circuit in September 2015.
Tax fraud investigation
In October 2007, employees of Cisco's Brazilian unit were arrested on charges that they had imported equipment without paying import duties. In response, Cisco stated that they do not import directly into Brazil, and instead use middlemen.
Antitrust lawsuit
On December 1, 2008, Multiven filed an antitrust lawsuit against Cisco Systems, Inc. Multiven's complaint alleges that Cisco harmed Multiven and consumers by bundling and tying bug fixes/patches and updates for its operating system software to its maintenance services (SMARTnet). In May 2010, Cisco accused the person who filed the antitrust suit, British-Nigerian technology entrepreneur Peter Alfred-Adekeye, with hacking and pressured the US government to extradite him from Canada. Cisco settled the antitrust lawsuit two months after Alfred-Adekeye's arrest by making its software updates available to all Multiven customers.
Remotely monitoring users' connections
Cisco's Linksys E2700, E3500, E4500 devices have been reported to be remotely updated to a firmware version that forces users to register for a cloud service, allows Cisco to monitor their network use and ultimately shut down the cloud service account and thus render the affected router unusable.
Firewall backdoor developed by NSA
According to the German magazine Der Spiegel the NSA has developed JETPLOW for gaining access to ASA (series 5505, 5510, 5520, 5540 and 5550) and 500-series PIX Firewalls.
Cisco's Chief Security Officer addressed the allegations publicly and denied working with any government to weaken Cisco products for exploitation or to implement security back doors.
A document included in the trove of National Security Agency files released with Glenn Greenwald's book No Place to Hide details how the agency's Tailored Access Operations (TAO) unit and other NSA employees intercept servers, routers and other network gear being shipped to organizations targeted for surveillance and install covert firmware onto them before they are delivered. These Trojan horse systems were described by an NSA manager as being "some of the most productive operations in TAO because they pre-position access points into hard target networks around the world."
Cisco denied the allegations in a customer document saying that no information was included about specific Cisco products, supply chain intervention or implant techniques, or new security vulnerabilities. Cisco's general counsel also said that Cisco does not work with any government, including the United States government, to weaken its products. The allegations are reported to have prompted the company's CEO to express concern to the President of the United States.
Spherix patent suit
In March 2014 Cisco Systems was sued for patent infringement. Spherix says that over $43 billion of Cisco's sales infringe on old Nortel patents owned by Spherix. Officials with Spherix are saying that a wide range of Cisco products, from switches to routers, infringe on 11 former Nortel patents that the company now owns.
India Net censorship role
Cisco Systems is alleged to be helping the Indian Jammu and Kashmir administration build a firewall that will prevent Internet users in Kashmir from accessing blacklisted websites, including social media portals, through fixed-line connections. Cisco denies the allegations.
Caste discrimination lawsuit
In 2020 a lawsuit was initiated against Cisco and two of its employees by the California Department of Fair Employment and Housing for alleged discrimination against an Indian engineer on account of him being from a lower caste than them.
See also
Mass surveillance in the United States
Cisco Certifications
Cisco IOS
Packet Tracer
Cisco Catalyst
Cisco DevNet
Cisco Express Forwarding
Cisco Discovery Protocol
Cisco Security Agent
Cisco Systems VPN Client
Cisco WebEx
Cisco Field
References
Further reading
Bunnell, D. (2000). Making the Cisco Connection: The Story Behind the Real Internet Superpower. Wiley. .
Bunnell, D. & Brate, A. (2001). Die Cisco Story (in German). Moderne Industrie. .
Paulson, E. (2001). Inside Cisco: The Real Story of Sustained M&A Growth. Wiley. .
Slater, R. (2003). The Eye of the Storm: How John Chambers Steered Cisco Through the Technology Collapse. HarperCollins. .
Stauffer, D. (2001). Nothing but Net Business the Cisco Way. Wiley. .
Waters, J. K. (2002). John Chambers and the Cisco Way: Navigating Through Volatility. Wiley. .
Young, J. S. (2001). Cisco Unauthorized: Inside the High-Stakes Race to Own the Future. Prima Lifestyles. .
External links
1984 establishments in California
American companies established in 1984
Manufacturing companies based in San Jose, California
Companies in the Dow Jones Industrial Average
Companies in the NASDAQ-100
Companies listed on the Nasdaq
Computer companies established in 1984
Deep packet inspection
Electronics companies established in 1984
Multinational companies headquartered in the United States
Networking companies of the United States
Networking hardware companies
Technology companies based in the San Francisco Bay Area
Technology companies established in 1984
Telecommunications equipment vendors
Videotelephony
Companies listed on the Hong Kong Stock Exchange
1990 initial public offerings |
48364976 | https://en.wikipedia.org/wiki/Biohacking | Biohacking | Biohacking, biohacker, or biohack may refer to:
Biohackers, 2020 German techno-thriller streaming television series
Science and medicine
Body hacking, the application of the hacker ethic to improve one's own body
Do-it-yourself biology, movement in which individuals and small organizations study biology
Quantified self, measuring various biomarkers and behaviors to try to optimize health
Performance psychology, improving ones mental and behavioural capabilities to boost performance
See also
Nootropic, drugs, supplements, and other substances to improve cognitive function in healthy individuals
Nutrigenomics, study of the relationship between human genome, nutrition and health
Self-experimentation in medicine, scientific experimentation in which the experimenter conducts the experiment on her- or himself |
6657196 | https://en.wikipedia.org/wiki/Oracle%20Designer | Oracle Designer | Oracle Designer was Oracle's CASE tool for designing an information system and generating it. After generating the information system one is able to edit the generated code with Oracle Developer Suite.
As of April 2018 this product has reached its end of life and is now in sustaining support only. Alternative modeling and design tools are Oracle JDeveloper and Oracle SQL Developer Data Modeler.
History
The product's original name was Oracle CASE and it was developed in England. Oracle CASE was based on Oracle corporations "Computer Aided Software Engineering" method (CASE Method). CASE Method was in turn developed by Oracle Consulting UK in the 1980's based on modelling techniques such as Richard Barker et al's Entity Relationship Modelling. Eventually the product would be known as Oracle Designer, with a complementary product Oracle Developer (although in practice the combination of Oracle Designer/Developer was most commonly used). Oracle became the dominant database and enterprise application vendor in the 1990's and as a consequence Oracle Designer/Developer was used by many enterprises from the mid 1990's to the mid 2000's. A product called SQL Data Dictionary (SDD) was a precursor to Oracle CASE.
Context
In the 1980's relational database systems, running on unix based servers, became popular for administrative systems used by corporations and governments. Major factors were low maintenance cost and high developer productivity compared to earlier technologies. As increasingly large systems were developed, software development teams struggled to manage requirements and maintain code quality. Oracle CASE was initially used by Oracle Consulting UK's quality management team and later became the de-facto standard for Oracle Custom Development (Custom development as opposed to packaged application software). Oracle CASE Method later became known as Oracle Custom Development Method, with a similar approach for customisations of Oracle's Application Suite called Oracle Application Development Method.
Oracle sold their Designer and Developer product's to enterprises and consulting groups, who in turn created thousands of systems that are still in place as of 2021. The design philosophy behind Oracle Designer and competing tools in the 80's and 90's was the Three-schema-architecture that separated an external schema, logical schema and internal schema. For Oracle's product line, the internal schema corresponded to the inner workings of their relational database, the logical schema corresponded to SQL and the external schema corresponded to screens and reports.
Concepts
Oracle Designer was based on a well thought out set of concepts that suited the types of systems being developed from the 1980's to the mid 2000's. It's easiest to describe these concepts separately in terms of skills, structure and technology:
Skills
In terms of skills, software designers were expected to think out database structures in entity relationship models and functional decomposition models, then transform those models into database definitions and modules (the screens and reports). Software developers were then expected to elaborate the database definitions and modules to create working code. Finally the day to day running of the system was expected to be carried out by database administrators, who had detailed knowledge of the database internals.
Structure
Oracle Designer/Developer divided software development into data and applications, which were viewed at three levels of abstraction; Modelling, Design and implementation. This gives a 2x3 matrix of views which was visible throughout the product's lifecycle:
Entity Relationship Model. This is a high level abstraction of the database structure. Used primarily to generate the database design.
Database design. This is a representation of the tables, views, constraints of the database, with additional annotations. To illustrate the difference with the above; where an entity relationship model would show a relationship between two entities, the Database design would include additional columns for a foreign key, the foreign key constraint and an index over the foreign key columns. All of these could be generated from the entity relationship model, ensuring consistent naming and traceability. The names of tables and columns in many Oracle production databases in use today are due to the use of Oracle Designer. Later versions of the tool allowed specification of most of the internals of the Oracle database such as tablespaces and files.
Database Definition Language (DDL) generation from the Database design.
Function model. This is a function decomposition model, where each function contains a description and a CRUD matrix against the Entity Relationship model.
Modules. This modelled the screens, reports and other application components. Mostly used for screens, because of the availability of code generation for Oracle (Developer) Forms. It was common for
Application code. This consisted mostly of Oracle Forms, Oracle Reports, Stored procedures for the Oracle Database. Initially code was not stored in the Oracle Designer Repository, but in later versions developers were encouraged to add code to the repository, which was merged during code-generation. The client-server architecture of Oracle's Developer product was typical of the 1990's; PC computers running Oracle Forms and Reports that communicated with an Oracle Database over a network protocol called SQL*NET.
This structure was simpler than the software development processes that came before and was a better fit to the available technology. It was also simpler and led to a higher level of code generation than competing methodologies of the time such as IBM's Rational Unified Process.
Technology
Repository
Oracle Designer was initially based around a database that held design models, called a repository, not to be confused with a modern GIT repository ( A dictionary definition of a repository is a safe central place where things are stored). Later the Oracle Designer Repository included models and code, but always stored in an Oracle Database.
Modelling and design tools
The tools that made up Oracle Designer each had their view on the repository, with which to create and edit models, generate more detailed models, generate code or inspect the quality of a model. For example specification designers were expected to indicate which data elements a function would use, so that the person designing the database structure could verify there were no unused data elements. Another example is the generation of a database definition from an entity relationship model, which eventually would be used to generate table creation scripts. Early users of Oracle Designer tended to focus on modelling and generating the database structures and often neglected the function model and modules.
Initially the Oracle Designer user interface was developed using Oracle Forms and Oracle Reports. This was a character mode user interface that was typically used in terminal sessions or MS-Dos, with a GUI diagram editor that ran on Unix X-Windows terminals only. When graphical user interfaces became easily available on the Windows 3.1 and Windows 95 operating systems in the mid 1990's, a stopgap version was released in Forms 4.0 but quickly shelved and redeveloped in C++ as a Windows only program with sophisticated diagramming tools.
Code repository
By the time Oracle Designer became obsolete it encompassed code generation of Oracle Forms, Oracle Reports, Database triggers, Stored Database Procedures. It would be commonplace for large portions of a systems code to be generated in this fashion, with developers working around the code generators to add custom code at predetermined lifecycle events.
Reasons for moving away from Oracle Designer in the 2000's
Three trends made the Oracle Developer tools obsolete and Oracle Designer with it.
The internet
Oracle Designer/Developer was aimed at development of administrative systems that were mainly used internally by enterprises. Many applications appearing in the 2000's required customers to perform some form of self-service data entry. The architecture of Oracle Developer was not well suited to the needs and technologies of the internet because it would have required users on the internet to install some kind of application and then directly connect to a database. Although later versions of Oracle Developer included an application server, it required a java based plug-in to be installed in the users-browser which placed high demands on end-users browsers. This posed a challenge for organisations with a fleet of older computers and was impractical for customer-facing applications. Eventually enterprises moved to other development tools which supported HTTP/HTML form based transactions, removing the need for the associated Oracle Designer.
Integration requirements
After introducing systems for internal business processes in the 70's to the 90's, enterprises started to place more emphasis on integration between systems. Internet technologies such as HTTP, SOAP and Web-services became industry standards for data-exchange, but Oracle Developer's architecture made it hard to activate part of an application from an external source.
Graphical user interfaces
From 2000 onwards, graphical user interfaces and usability became a major factor in adopting newer development stacks. Oracle Developer was intended for, and very good at administrative applications that are used for data entry by enterprise employees. New users had to be trained how to use certain key-combinations in order to user the applications. For example each screen had a query and insert mode which allowed users to find and manipulate thinly veiled database records. Screens tended to resemble a collection of spreadsheet-like tables with a menu structure. Expectations of system user-friendliness increased in the 2000s and eventually outweighed the development productivity advantages of generating these types of applications.
Components
Business Process Modelling
Process Modeller
Systems Analysis Modelling
ER Diagrammer
Dataflow
Function Hierarchy
Design Wizards
Database Wizard
Application Wizard
Systems Design
Data Schema
Module Logic
Module Data
Preferences
Module Structure
Client/Server Generators
Server - Oracle database objects (tables, indexes, constraints etc)
Oracle Forms
Oracle Reports
Visual Basic
Web server
Microsoft Help
C++ Object Layer
Utilities
Repository Object Navigator (RON)
Matrix
Repository Reports
Admin Utility
SQL*Plus
Online help
Versions
Oracle CASE 1
Oracle CASE 2
Oracle CASE 3
Oracle CASE 4
Oracle CASE 5 - developed using SQL*Forms 3 character mode screens
Oracle CASE 5.1 was a major redevelopment where the screens were redeveloped using the Oracle Forms 4.0 which provided a GUI interface
The version numbers get confusing at this point because the numbers go backwards.
The software was renamed and the next version released was Oracle Designer/2000 6.0 (not to be confused with Designer 6 that was released years later).
The next minor release changed the numbering system to be in line with Oracle Developer, so it was named Designer 1.1
Designer 1 which supported generators for Forms 4.5
Designer 2 which supported generators for Forms 4.5 and 5
After this point the version numbers were changed to be in line with Oracle Developer
Designer 6 which supported generators for Forms 4.5, 5 and 6.
Designer 6i - the pre-release version number was 6.5. The production release was changed to 6i to keep in sync with the Oracle Developer version name
Designer 9i
Designer 10gR2 (10.1.2.6) – this was the last release of Designer
Publications
References
External links
Tutorial for Designer/2000
Oracle Designer Tutorial: Creating an Oracle Database, Elizabeth Gallas, Fermi National Accelerator Laboratory, November 2, 2000.PDF Version: Oracle Designer Tutorial: Creating an Oracle Database
Fast Track Design and Development with Oracle Designer 6i
Oracle software |
5217338 | https://en.wikipedia.org/wiki/Larry%20Augustin | Larry Augustin | Larry Augustin (born October 10, 1962) is a VP at Amazon Web Services. He formerly was the chairman of the board of directors of SugarCRM. He is a former venture capitalist and the founder of VA Software (now Geeknet). During the height of the dot-com bubble, Augustin was a billionaire on paper at the age of 38.
Augustin is featured in the 2001 documentary film Revolution OS.
Early life and education
Augustin grew up in a suburb of Dayton, Ohio, though he spent some of his early life on a family farm in New Hampshire.
After receiving a B.S. in electrical engineering from the University of Notre Dame, Augustin received a fellowship from Bell Labs to pursue a master's degree in electrical engineering from Stanford University. He went to work for Bell Labs for a year and then returned to Stanford to pursue a PhD.
Career
In 1993, Augustin founded VA Research (later VA Linux and Geeknet), while a Ph.D. student at Stanford. Augustin was a Stanford colleague of Jerry Yang and David Filo, the founders of Yahoo!. Filo and Yang introduced Augustin to Sequoia Capital, which provided Augustin with venture capital.
In November 1999, he launched SourceForge, a collaborative development environment or "forge".
On December 9, 1999, during the dot-com bubble, VA Linux became a public company via an initial public offering and Augustin, then 38-years old, became a billionaire on paper.
In August 2002, Augustin left VA Linux and from September 2002 to December 2004, he was a partner at Azure Capital Partners, where he helped lead Azure's investments in Zend Technologies and Medsphere.
In 2005, Augustin joined the board of directors of SugarCRM and in May 2009, Augustin was appointed as the chief executive officer.
Augustin was the CEO of SugarCRM until February 2019 when Craig Charlton was appointed the role, with. Augustin remaining the chairman of the board of directors.
As of July 2019, he became a VP at Amazon Web Services.
Personal life
Augustin works out in a gym every day after work. He is married and has a daughter born in 1997.
References
External links
Interviews
Audio interview on FLOSS Weekly
Interview on Slashdot
Interview on Linux Journal
American venture capitalists
Living people
Geeknet
Stanford University School of Engineering alumni
1962 births
American company founders
American technology chief executives
Open source advocates
University of Notre Dame alumni
People from New Hampshire |
69563193 | https://en.wikipedia.org/wiki/SKZ2021 | SKZ2021 | SKZ2021 is the second compilation album by South Korean boy band Stray Kids. It was released digitally on December 23, 2021, through JYP Entertainment, and distributed by Dreamus. It consists of fourteen tracks of the group's re-recorded version as the current member of the previous songs since their debut extended play I Am Not (2018), which were not included on their previous compilation album, SKZ2020 (2020), and the Korean version of "Scars" additionally, which serves as its lead single.
Background and release
Following the departure of Woojin from Stray Kids in late October 2019, the group released their first compilation album SKZ2020 on March 18, 2020, as the group's Japanese debut. SKZ2020 consists of 27 tracks of the 8-member re-recorded version of several previous songs since their pre-debut EP Mixtape (2018), and the singles "My Pace", "Double Knot", and "Levanter" recorded in Japanese. On January 1, 2021, the group uploaded the video Step Out 2021, containing the group's achievements in 2020, and to-do plans of 2021, including their upcoming SKZ2021, which and highlighted the title of the tracks not included on the previous SKZ2020.
Almost a year after uploading Step Out 2021, on December 21, the group uploaded a poster to announce SKZ2021 would be released on December 23 at 6:00 PM KST to digital music and streaming platform only. The complete track listing was revealed on the next day, consisting of thirteen of the previous-release tracks from the debut EP I Am Not (2018) to the sixth EP Clé: Levanter (2019), including the CD-exclusive tracks, titled "Mixtape", which use the original title instead, as well as "Scars", the group's second Japanese single recorded in Korean. The special music video of "Placebo", stated that it was made by the group's alter ego as SKZ Company personnel from their online program SKZ Code, was released on December 24.
Commercial performance
In Japan, SKZ2021 entered Oricon Digital Albums Chart at number five with 959 download units, as well as Billboard Japan Hot Albums at number 40, selling 955 downloads, debuted at number four on the component Download Albums. The lead single "Scars (Korean ver.)" reached number 114 on the Download Chart, while the track "Hoodie Season" number 39 on the Hungarian Single Top 40 Chart.
Track listing
Notes
"Placebo", "Behind the Light", "For You", "Broken Compass", and "Hoodie Season", which are an original title, titled "Mixtape#1", "Mixtape#2", "Mixtape#3", "Mixtape#4", and "Mixtape#5", respectively on its original included EP.
Credits and personnel
Credits adapted from Melon.
Musicians
Stray Kids – lead vocals
Bang Chan (3Racha) – background vocals , lyrics , composition , arrangement , computer programming , instrumentation
Changbin (3Racha) – background vocals , lyrics , composition
Han (3Racha) – background vocals , lyrics , composition
Lee Know – background vocals , lyrics , composition
Hyunjin – background vocals , lyrics , composition
Felix – background vocals , lyrics , composition
Seungmin – background vocals , lyrics , composition
I.N – background vocals , lyrics , composition
Armadillo – composition
Versachoi – arrangement , instrumentation , computer programming
Kim Park Chella – background vocals , composition , arrangement , computer programming , guitar , bass , keyboard , drum programming
Glory Face (Full8loom) (Jang Jun-ho) – composition , arrangement , instrumentation
This N That – composition , arrangement , computer programming , piano , synthesizer
Lee Woo-min 'Collapsedone' – arrangement , computer programming , synthesizer , piano , bass
KZ – background vocals , composition , MIDI programming , electric piano , bass
Space One – composition , arrangement , MIDI programming , piano , bass
Lee Seung-han – background vocals
Jukjae – guitar
Frants – composition , arrangement , computer programming , guitar , keyboard , synthesizer , drum programming
Slo – composition , arrangement , computer programming , synthesizer , drum programming , flute programming , bass programming
Hong Ji-sang – composition , arrangement , computer programming , guitar , keyboard , drum programming
Doplamingo – arrangement , computer programming , acoustic guitar , keyboard , drum programming , bass
Sojun – acoustic guitar , electric guitar
Cash Pie – electric guitar
J;Key – composition , arrangement , piano , bass , synthesizer , computer programming
Edmmer – arrangement , instrumentation
Alom – arrangement , instrumentation
Technical
Bang Chan (3Racha) – digital editing
Glory Face (Full8loom) (Jang Jun-ho) – digital editing
This N That – digital editing
Yue – vocal editing , additional vocal editing
KZ – vocal editing
Kim Hye-kwang – vocal editing
Hong Ji-sang – vocal editing
Jiyoung Shin NYC – additional editing
Edmmer – sound design
Alom – sound design
Choi Hye-jin – recording , additional recording , mixing
Kwak Jeong-shin – recording
Jung Mo-yeon – recording
Jung Eun-kyung – recording
Woo Min-jung – recording
Eom Se-hee – recording , mixing , mixing assistant
Noh Min-ji – recording
Hong Eun-yi – recording
Lim Hong-jin – recording , mixing
Jang Han-soo (JYPE Studio) – recording
Kim Min-hee – recording
Lee Sang-yeop – recording , additional recording
Lee Kyung-won – additional recording
Lee Tae-sub – mixing
Nahzam Sue – mixing
Yoon Won-kwon – mixing
Cliff Lin – mixing
Jang Han-soo (Looda Sound) – mixing
Shin Bong-won – mixing
Kwon Nam-woo – mastering
Park Jeong-eon – mastering
Locations
JYP Publishing (KOMCA) – original publishing , sub-publishing
Copyright Control – original publishing
Hybe – original publishing
Kwang Sound – vocal editing
JYPE Studios – recording , additional recording , mixing
The Vibe Studio – recording
In Grid Studio – recording
821 Sound – recording , mastering
U Productions – additional recording
Wormwood Hill Studio – mixing
Studio DDeepKick – mixing
Glab Studio – mixing
Nonhyeon-dong Studio – mixing
RCAVE Sound – mixing
Honey Butter Studio – mastering
Charts
Certifications and sales
Release history
References
2021 compilation albums
JYP Entertainment albums
Korean-language compilation albums
Stray Kids albums |
838142 | https://en.wikipedia.org/wiki/Addressing%20mode | Addressing mode | Addressing modes are an aspect of the instruction set architecture in most central processing unit (CPU) designs. The various addressing modes that are defined in a given instruction set architecture define how the machine language instructions in that architecture identify the operand(s) of each instruction. An addressing mode specifies how to calculate the effective memory address of an operand by using information held in registers and/or constants contained within a machine instruction or elsewhere.
In computer programming, addressing modes are primarily of interest to those who write in assembly languages and to compiler writers. For a related concept see orthogonal instruction set which deals with the ability of any instruction to use any addressing mode.
Caveats
Note that there is no generally accepted way of naming the various addressing modes. In particular, different authors and computer manufacturers may give different names to the same addressing mode, or the same names to different addressing modes. Furthermore, an addressing mode which, in one given architecture, is treated as a single addressing mode may represent functionality that, in another architecture, is covered by two or more addressing modes. For example, some complex instruction set computer (CISC) architectures, such as the Digital Equipment Corporation (DEC) VAX, treat registers and literal or immediate constants as just another addressing mode. Others, such as the IBM System/360 and its successors, and most reduced instruction set computer (RISC) designs, encode this information within the instruction. Thus, the latter machines have three distinct instruction codes for copying one register to another, copying a literal constant into a register, and copying the contents of a memory location into a register, while the VAX has only a single "MOV" instruction.
The term "addressing mode" is itself subject to different interpretations: either "memory address calculation mode" or "operand accessing mode". Under the first interpretation, instructions that do not read from memory or write to memory (such as "add literal to register") are considered not to have an "addressing mode". The second interpretation allows for machines such as VAX which use operand mode bits to allow for a register or for a literal operand. Only the first interpretation applies to instructions such as "load effective address".
The addressing modes listed below are divided into code addressing and data addressing. Most computer architectures maintain this distinction, but there are (or have been) some architectures which allow (almost) all addressing modes to be used in any context.
The instructions shown below are purely representative in order to illustrate the addressing modes, and do not necessarily reflect the mnemonics used by any particular computer.
Number of addressing modes
Different computer architectures vary greatly as to the number of addressing modes they provide in hardware. There are some benefits to eliminating complex addressing modes and using only one or a few simpler addressing modes, even though it requires a few extra instructions, and perhaps an extra register. It has proven much easier to design pipelined CPUs if the only addressing modes available are simple ones.
Most RISC architectures have only about five simple addressing modes, while CISC architectures such as the DEC VAX have over a dozen addressing modes, some of which are quite complicated. The IBM System/360 architecture had only three addressing modes; a few more have been added for the System/390.
When there are only a few addressing modes, the particular addressing mode required is usually encoded within the instruction code
(e.g. IBM System/360 and successors, most RISC). But when there are many addressing modes, a specific field is often set aside in the instruction to specify the addressing mode. The DEC VAX allowed multiple memory operands for almost all instructions, and so reserved the first few bits of each operand specifier to indicate the addressing mode for that particular operand.
Keeping the addressing mode specifier bits separate from the opcode operation bits produces an orthogonal instruction set.
Even on a computer with many addressing modes, measurements of actual programs indicate that the simple addressing modes listed below account for some 90% or more of all addressing modes used. Since most such measurements are based on code generated from high-level languages by compilers, this reflects to some extent the limitations of the compilers being used.
Useful side effect
Some instruction set architectures, such as Intel x86 and IBM/360 and its successors, have a load effective address instruction. This performs a calculation of the effective operand address, but instead of acting on that memory location, it loads the address that would have been accessed into a register. This can be useful when passing the address of an array element to a subroutine. It may also be a slightly sneaky way of doing more calculations than normal in one instruction; for example, using such an instruction with the addressing mode "base+index+offset" (detailed below) allows one to add two registers and a constant together in one instruction.
Simple addressing modes for code
Absolute or direct
+----+------------------------------+
|jump| address |
+----+------------------------------+
(Effective PC address = address)
The effective address for an absolute instruction address is the address parameter itself with no modifications.
PC-relative
+----+------------------------------+
|jump| offset | jump relative
+----+------------------------------+
(Effective PC address = next instruction address + offset, offset may be negative)
The effective address for a PC-relative instruction address is the offset parameter added to the address of the next instruction. This offset is usually signed to allow reference to code both before and after the instruction.
This is particularly useful in connection with jumps, because typical jumps are to nearby instructions (in a high-level language most if or while statements are reasonably short). Measurements of actual programs suggest that an 8 or 10 bit offset is large enough for some 90% of conditional jumps (roughly ±128 or ±512 bytes).
Another advantage of PC-relative addressing is that the code may be position-independent, i.e. it can be loaded anywhere in memory without the need to adjust any addresses.
Some versions of this addressing mode may be conditional referring to two registers ("jump if reg1=reg2"), one register ("jump unless reg1=0") or no registers, implicitly referring to some previously-set bit in the status register. See also conditional execution below.
Register indirect
+-------+-----+
|jumpVia| reg |
+-------+-----+
(Effective PC address = contents of register 'reg')
The effective address for a Register indirect instruction is the address in the specified register. For example, (A7) to access the content of address register A7.
The effect is to transfer control to the instruction whose address is in the specified register.
Many RISC machines, as well as the CISC IBM System/360 and successors, have subroutine call instructions that place the return address in an address register—the register-indirect addressing mode is used to return from that subroutine call.
Sequential addressing modes
Sequential execution
+------+
| nop | execute the following instruction
+------+
(Effective PC address = next instruction address)
The CPU, after executing a sequential instruction, immediately executes the following instruction.
Sequential execution is not considered to be an addressing mode on some computers.
Most instructions on most CPU architectures are sequential instructions. Because most instructions are sequential instructions, CPU designers often add features that deliberately sacrifice performance on the other instructions—branch instructions—in order to make these sequential instructions run faster.
Conditional branches load the PC with one of 2 possible results, depending on the condition—most CPU architectures use some other addressing mode for the "taken" branch, and sequential execution for the "not taken" branch.
Many features in modern CPUs—instruction prefetch and more complex pipelineing, out-of-order execution, etc.—maintain the illusion that each instruction finishes before the next one begins, giving the same final results, even though that's not exactly what happens internally.
Each "basic block" of such sequential instructions exhibits both temporal and spatial locality of reference.
CPUs that do not use sequential execution
CPUs that do not use sequential execution with a program counter are extremely rare. In some CPUs, each instruction always specifies the address of next instruction. Such CPUs have an instruction pointer that holds that specified address; it is not a program counter because there is no provision for incrementing it. Such CPUs include some drum memory computers such as the IBM 650, the SECD machine, and the RTX 32P.
Other computing architectures go much further, attempting to bypass the von Neumann bottleneck using a variety of alternatives to the program counter.
Conditional execution
Some computer architectures have conditional instructions (such as ARM, but no longer for all instructions in 64-bit mode) or conditional load instructions (such as x86) which can in some cases make conditional branches unnecessary and avoid flushing the instruction pipeline. An instruction such as a 'compare' is used to set a condition code, and subsequent instructions include a test on that condition code to see whether they are obeyed or ignored.
Skip
+------+-----+-----+
|skipEQ| reg1| reg2| skip the next instruction if reg1=reg2
+------+-----+-----+
(Effective PC address = next instruction address + 1)
Skip addressing may be considered a special kind of PC-relative addressing mode with a fixed "+1" offset. Like PC-relative addressing, some CPUs have versions of this addressing mode that only refer to one register ("skip if reg1=0") or no registers, implicitly referring to some previously-set bit in the status register. Other CPUs have a version that selects a specific bit in a specific byte to test ("skip if bit 7 of reg12 is 0").
Unlike all other conditional branches, a "skip" instruction never needs to flush the instruction pipeline, though it may need to cause the next instruction to be ignored.
Simple addressing modes for data
Register (or Register Direct)
+------+-----+-----+-----+
| mul | reg1| reg2| reg3| reg1 := reg2 * reg3;
+------+-----+-----+-----+
This "addressing mode" does not have an effective address and is not considered to be an addressing mode on some computers.
In this example, all the operands are in registers, and the result is placed in a register.
Base plus offset, and variations
This is sometimes referred to as 'base plus displacement'
+------+-----+-----+----------------+
| load | reg | base| offset | reg := RAM[base + offset]
+------+-----+-----+----------------+
(Effective address = offset + contents of specified base register)
The offset is usually a signed 16-bit value (though the 80386 expanded it to 32 bits).
If the offset is zero, this becomes an example of register indirect addressing; the effective address is just the value in the base register.
On many RISC machines, register 0 is fixed at the value zero. If register 0 is used as the base register, this becomes an example of absolute addressing. However, only a small portion of memory can be accessed (64 kilobytes, if the offset is 16 bits).
The 16-bit offset may seem very small in relation to the size of current computer memories (which is why the 80386 expanded it to 32-bit). It could be worse: IBM System/360 mainframes only have an unsigned 12-bit offset. However, the principle of locality of reference applies: over a short time span, most of the data items a program wants to access are fairly close to each other.
This addressing mode is closely related to the indexed absolute addressing mode.
Example 1:
Within a subroutine a programmer will mainly be interested in the parameters and the local variables, which will rarely exceed 64 KB, for which one base register (the frame pointer) suffices. If this routine is a class method in an object-oriented language, then a second base register is needed which points at the attributes for the current object (this or self in some high level languages).
Example 2:
If the base register contains the address of a composite type (a record or structure), the offset can be used to select a field from that record (most records/structures are less than 32 kB in size).
Immediate/literal
+------+-----+-----+----------------+
| add | reg1| reg2| constant | reg1 := reg2 + constant;
+------+-----+-----+----------------+
This "addressing mode" does not have an effective address, and is not considered to be an addressing mode on some computers.
The constant might be signed or unsigned. For example, move.l #$FEEDABBA, D0 to move the immediate hex value of "FEEDABBA" into register D0.
Instead of using an operand from memory, the value of the operand is held within the instruction itself. On the DEC VAX machine, the literal operand sizes could be 6, 8, 16, or 32 bits long.
Andrew Tanenbaum showed that 98% of all the constants in a program would fit in 13 bits (see RISC design philosophy).
Implicit
+-----------------+
| clear carry bit |
+-----------------+
+-------------------+
| clear Accumulator |
+-------------------+
The implied addressing mode, also called the implicit addressing mode (x86 assembly language), does not explicitly specify an effective address for either the source or the destination (or sometimes both).
Either the source (if any) or destination effective address (or sometimes both) is implied by the opcode.
Implied addressing was quite common on older computers (up to mid-1970s). Such computers typically had only a single register in which arithmetic could be performed—the accumulator. Such accumulator machines implicitly reference that accumulator in almost every instruction. For example, the operation < a := b + c; > can be done using the sequence < load b; add c; store a; > -- the destination (the accumulator) is implied in every "load" and "add" instruction; the source (the accumulator) is implied in every "store" instruction.
Later computers generally had more than one general-purpose register or RAM location which could be the source or destination or both for arithmetic—and so later computers need some other addressing mode to specify the source and destination of arithmetic.
Among the x86 instructions, some use implicit registers for one of the operands or results (multiplication, division, counting conditional jump).
Many computers (such as x86 and AVR) have one special-purpose register called the stack pointer which is implicitly incremented or decremented when pushing or popping data from the stack, and the source or destination effective address is (implicitly) the address stored in that stack pointer.
Many 32-bit computers (such as 68000, ARM, or PowerPC) have more than one register which could be used as a stack pointer—and so use the "register autoincrement indirect" addressing mode to specify which of those registers should be used when pushing or popping data from a stack.
Some current computer architectures (e.g. IBM/390 and Intel Pentium) contain some instructions with implicit operands in order to maintain backwards compatibility with earlier designs.
On many computers, instructions that flip the user/system mode bit, the interrupt-enable bit, etc. implicitly specify the special register that holds those bits. This simplifies the hardware necessary to trap those instructions in order to meet the Popek and Goldberg virtualization requirements—on such a system, the trap logic does not need to look at any operand (or at the final effective address), but only at the opcode.
A few CPUs have been designed where every operand is always implicitly specified in every instruction -- zero-operand CPUs.
Other addressing modes for code or data
Absolute/direct
+------+-----+--------------------------------------+
| load | reg | address |
+------+-----+--------------------------------------+
(Effective address = address as given in instruction)
This requires space in an instruction for quite a large address. It is often available on CISC machines which have variable-length instructions, such as x86.
Some RISC machines have a special Load Upper Literal instruction which places a 16- or 20-bit constant in the top half of a register. That can then be used as the base register in a base-plus-offset addressing mode which supplies the low-order 16 or 12 bits. The combination allows a full 32-bit address.
Indexed absolute
+------+-----+-----+--------------------------------+
| load | reg |index| address |
+------+-----+-----+--------------------------------+
(Effective address = address + contents of specified index register)
This also requires space in an instruction for quite a large address. The address could be the start of an array or vector, and the index could select the particular array element required. The processor may scale the index register to allow for the size of each array element.
Note that this is more or less the same as base-plus-offset addressing mode, except that the offset in this case is large enough to address any memory location.
Example 1:
Within a subroutine, a programmer may define a string as a local constant or a static variable. The address of the string is stored in the literal address in the instruction. The offset—which character of the string to use on this iteration of a loop—is stored in the index register.
Example 2:
A programmer may define several large arrays as globals or as class variables. The start of the array is stored in the literal address (perhaps modified at program-load time by a relocating loader) of the instruction that references it. The offset—which item from the array to use on this iteration of a loop—is stored in the index register. Often the instructions in a loop re-use the same register for the loop counter and the offsets of several arrays.
Base plus index
+------+-----+-----+-----+
| load | reg | base|index|
+------+-----+-----+-----+
(Effective address = contents of specified base register + contents of specified index register)
The base register could contain the start address of an array or vector, and the index could select the particular array element required. The processor may scale the index register to allow for the size of each array element. This could be used for accessing elements of an array passed as a parameter.
Base plus index plus offset
+------+-----+-----+-----+----------------+
| load | reg | base|index| offset |
+------+-----+-----+-----+----------------+
(Effective address = offset + contents of specified base register + contents of specified index register)
The base register could contain the start address of an array or vector of records, the index could select the particular record required, and the offset could select a field within that record. The processor may scale the index register to allow for the size of each array element.
Scaled
+------+-----+-----+-----+
| load | reg | base|index|
+------+-----+-----+-----+
(Effective address = contents of specified base register + scaled contents of specified index register)
The base register could contain the start address of an array or vector data structure, and the index could contain the offset of the one particular array element required.
This addressing mode dynamically scales the value in the index register to allow for the size of each array element, e.g. if the array elements are double precision floating-point numbers occupying 8 bytes each then the value in the index register is multiplied by 8 before being used in the effective address calculation. The scale factor is normally restricted to being a power of two, so that shifting rather than multiplication can be used.
Register indirect
+------+------+-----+
| load | reg1 | base|
+------+------+-----+
(Effective address = contents of base register)
A few computers have this as a distinct addressing mode. Many computers just use base plus offset with an offset value of 0. For example, (A7)
Register autoincrement indirect
+------+-----+-------+
| load | reg | base |
+------+-----+-------+
(Effective address = contents of base register)
After determining the effective address, the value in the base register is incremented by the size of the data item that is to be accessed. For example, (A7)+ would access the content of the address register A7, then increase the address pointer of A7 by 1 (usually 1 word). Within a loop, this addressing mode can be used to step through all the elements of an array or vector.
In high-level languages it is often thought to be a good idea that functions which return a result should not have side effects (lack of side effects makes program understanding and validation much easier). This addressing mode has a side effect in that the base register is altered. If the subsequent memory access causes an error (e.g. page fault, bus error, address error) leading to an interrupt, then restarting the instruction becomes much more problematic since one or more registers may need to be set back to the state they were in before the instruction originally started.
There have been at least two computer architectures which have had implementation problems with regard to recovery from interrupts when this addressing mode is used:
Motorola 68000 (address is represented in 24 bits). Could have one or two autoincrement register operands. The 68010+ resolved the problem by saving the processor's internal state on bus or address errors.
DEC VAX. Could have up to 6 autoincrement register operands. Each operand access could cause two page faults (if operands happened to straddle a page boundary). Of course the instruction itself could be over 50 bytes long and might straddle a page boundary as well!
Register autodecrement indirect
+------+-----+-----+
| load | reg | base|
+------+-----+-----+
(Effective address = new contents of base register)
Before determining the effective address, the value in the base register is decremented by the size of the data item which is to be accessed.
Within a loop, this addressing mode can be used to step backwards through all the elements of an array or vector. A stack can be implemented by using this mode in conjunction with the previous addressing mode (autoincrement).
See the discussion of side-effects under the autoincrement addressing mode.
Memory indirect
Any of the addressing modes mentioned in this article could have an extra bit to indicate indirect addressing, i.e. the address calculated using some mode is in fact the address of a location (typically a complete word) which contains the actual effective address.
Indirect addressing may be used for code or data. It can make implementation of pointers, references, or handles much easier, and can also make it easier to call subroutines which are not otherwise addressable. Indirect addressing does carry a performance penalty due to the extra memory access involved.
Some early minicomputers (e.g. DEC PDP-8, Data General Nova) had only a few registers and only a limited addressing range (8 bits). Hence the use of memory indirect addressing was almost the only way of referring to any significant amount of memory.
PC-relative
+------+------+---------+----------------+
| load | reg1 | base=PC | offset |
+------+------+---------+----------------+
reg1 := RAM[PC + offset]
(Effective address = PC + offset)
The PC-relative addressing mode can be used to load a register with a value stored in program memory a short distance away from the current instruction. It can be seen as a special case of the "base plus offset" addressing mode, one that selects the program counter (PC) as the "base register".
There are a few CPUs that support PC-relative data references. Such CPUs include:
The MOS 6502 and its derivatives used relative addressing for all branch instructions. Only these instructions used this mode, jumps used a variety of other addressing modes.
The x86-64 architecture and the 64-bit ARMv8-A architecture have PC-relative addressing modes, called "RIP-relative" in x86-64 and "literal" in ARMv8-A. The Motorola 6809 also supports a PC-relative addressing mode.
The PDP-11 architecture, the VAX architecture, and the 32-bit ARM architectures support PC-relative addressing by having the PC in the register file.
The IBM z/Architecture includes specific instructions, e.g., Load Relative Long, with PC-relative addressing if the General-Instructions-Extension Facility is active.
When this addressing mode is used, the compiler typically places the constants in a literal pool immediately before or immediately after the subroutine that uses them, to prevent accidentally executing those constants as instructions.
This addressing mode, which always fetches data from memory or stores data to memory and then sequentially falls through to execute the next instruction (the effective address points to data), should not be confused with "PC-relative branch" which does not fetch data from or store data to memory, but instead branches to some other instruction at the given offset (the effective address points to an executable instruction).
Obsolete addressing modes
The addressing modes listed here were used in the 1950–1980 period, but are no longer available on most current computers.
This list is by no means complete; there have been many other interesting and peculiar addressing modes used from time to time, e.g. absolute-minus-logical-OR of two or three index registers.
Multi-level memory indirect
If the word size is larger than the address, then the word referenced for memory-indirect addressing could itself have an indirect flag set to indicate another memory indirect cycle. This flag is referred to as an indirection bit, and the resulting pointer is a tagged pointer, the indirection bit tagging whether it is a direct pointer or an indirect pointer. Care is needed to ensure that a chain of indirect addresses does not refer to itself; if it does, one can get an infinite loop while trying to resolve an address.
The IBM 1620, the Data General Nova, the HP 2100 series, and the NAR 2 each have such a multi-level memory indirect, and could enter such an infinite address calculation loop.
The memory indirect addressing mode on the Nova influenced the invention of indirect threaded code.
The DEC PDP-10 computer with 18-bit addresses and 36-bit words allowed multi-level indirect addressing with the possibility of using an index register at each stage as well. The priority interrupt system was queried before decoding of every address word. So, an indirect address loop would not prevent execution of device service routines, including any preemptive multitasking scheduler's time-slice expiration handler. A looping instruction would be treated like any other compute-bound job.
Memory-mapped registers
On some computers, the registers were regarded as occupying the first 8 or 16 words of memory (e.g. ICL 1900, DEC PDP-10). This meant that there was no need for a separate "add register to register" instruction – one could just use the "add memory to register" instruction.
In the case of early models of the PDP-10, which did not have any cache memory, a tight inner loop loaded into the first few words of memory (where the fast registers were addressable if installed) ran much faster than it would have in magnetic core memory.
Later models of the DEC PDP-11 series mapped the registers onto addresses in the input/output area, but this was primarily intended to allow remote diagnostics. Confusingly, the 16-bit registers were mapped onto consecutive 8-bit byte addresses.
Memory indirect and autoincrement
The DEC PDP-8 minicomputer had eight special locations (at addresses 8 through 15). When accessed via memory indirect addressing, these locations would automatically increment prior to use. This made it easy to step through memory in a loop without needing to use the accumulator to increment the address.
The Data General Nova minicomputer had 16 special memory locations at addresses 16 through 31. When accessed via memory indirect addressing, 16 through 23 would automatically increment before use, and 24 through 31 would automatically decrement before use.
Zero page
The Data General Nova, Motorola 6800 family, and MOS Technology 6502 family of processors had very few internal registers. Arithmetic and logical instructions were mostly performed against values in memory as opposed to internal registers. As a result, many instructions required a two-byte (16-bit) location to memory. Given that opcodes on these processors were only one byte (8 bits) in length, memory addresses could make up a significant part of code size.
Designers of these processors included a partial remedy known as "zero page" addressing. The initial 256 bytes of memory ($0000 – $00FF; a.k.a., page "0") could be accessed using a one-byte absolute or indexed memory address. This reduced instruction execution time by one clock cycle and instruction length by one byte. By storing often-used data in this region, programs could be made smaller and faster.
As a result, the zero page was used similarly to a register file. On many systems, however, this resulted in high utilization of the zero page memory area by the operating system and user programs, which limited its use since free space was limited.
Direct page
The zero page address mode was enhanced in several late model 8-bit processors, including the WDC 65816, the CSG 65CE02, and the Motorola 6809. The new mode, known as "direct page" addressing, added the ability to move the 256-byte zero page memory window from the start of memory (offset address $0000) to a new location within the first 64 KB of memory.
The CSG 65CE02 allowed the direct page to be moved to any 256-byte boundary within the first 64 KB of memory by storing an 8-bit offset value in the new base page (B) register. The Motorola 6809 could do the same with its direct page (DP) register. The WDC 65816 went a step further and allowed the direct page to be moved to any location within the first 64 KB of memory by storing a 16-bit offset value in the new direct (D) register.
As a result, a greater number of programs were able to utilize the enhanced direct page addressing mode versus legacy processors that only included the zero page addressing mode.
Scaled index with bounds checking
This is similar to scaled index addressing, except that the instruction has two extra operands (typically constants), and the hardware checks that the index value is between these bounds.
Another variation uses vector descriptors to hold the bounds; this makes it easy to implement dynamically allocated arrays and still have full bounds checking.
Indirect to bit field within word
Some computers had special indirect addressing modes for subfields within words.
The GE/Honeywell 600 series character addressing indirect word specified either 6-bit or 9-bit character fields within its 36-bit word.
The DEC PDP-10, also 36-bit, had special instructions which allowed memory to be treated as a sequence of fixed-size bit fields or bytes of any size from 1 bit to 36 bits. A one-word sequence descriptor in memory, called a "byte pointer", held the current word address within the sequence, a bit position within a word, and the size of each byte.
Instructions existed to load and store bytes via this descriptor, and to increment the descriptor to point at the next byte (bytes were not split across word boundaries). Much DEC software used five 7-bit bytes per word (plain ASCII characters), with one bit per word unused. Implementations of C had to use four 9-bit bytes per word, since the 'malloc' function in C assumes that the size of an int is some multiple of the size of a char; the actual multiple is determined by the system-dependent compile-time operator sizeof.
Index next instruction
The Elliott 503, the Elliott 803, and the Apollo Guidance Computer only used absolute addressing, and did not have any index registers.
Thus, indirect jumps, or jumps through registers, were not supported in the instruction set. Instead, it could be instructed to add the contents of the current memory word to the next instruction. Adding a small value to the next instruction to be executed could, for example, change a JUMP 0 into a JUMP 20, thus creating the effect of an indexed jump. Note that the instruction is modified on-the-fly and remains unchanged in memory, i.e. it is not self-modifying code. If the value being added to the next instruction was large enough, it could modify the opcode of that instruction as well as or instead of the address.
Glossary
See also
Instruction set architecture
Address bus
References
External links
Addressing modes in assembly language
Addressing modes
Computer architecture
Machine code
Assembly languages |
56332630 | https://en.wikipedia.org/wiki/Punjab%20Information%20Technology%20Board | Punjab Information Technology Board | The Punjab Information Technology Board (reporting name: PITB) was established in 1999 by the Government of the Punjab as an autonomous body under the Department of Industries, operating under the administration of Information Technology Department from 2001 to 2011. The key focus of the department was to monitor global opportunities, cater to the growing need of IT, developing the policy initiatives, planning and implementation of initiatives to increase the competitiveness of the IT industry in the Punjab province. The Information Technology department was dissolved in 2011, and PITB was attached under the Planning & Development Department Punjab.
PITB acts as the foundation of innovation economy in Punjab which aims at modernization of governance techniques by implementation of transparency induced governance techniques. Moreover, PITB focuses on improving the digital literacy of the citizen of the province. In addition to the above-mentioned role, the organization is dedicated to provide effective and efficient technological services and build IT infrastructure for governmental agencies, national and international businesses.
PITB is considered the leader of technological innovation in Punjab, Pakistan which has developed, implemented and successfully impacted the health, education, law & order, agriculture, transport sector of the province. The organization is reviving the entrepreneurial culture in Pakistan by building capacity of students as well as professionals from private and public sector by providing them training and business incubation facility (About Us: PITB, 2019).
Budget
References
Government agencies of Punjab, Pakistan |
1105695 | https://en.wikipedia.org/wiki/Jeep%20Grand%20Cherokee | Jeep Grand Cherokee | The Jeep Grand Cherokee is a range of mid-size SUVs produced by the American manufacturer Jeep. While some other SUVs were manufactured with body-on-frame construction, the Jeep Grand Cherokee has always used a unibody chassis.
Development
The Grand Cherokee's origins date back to 1983 when American Motors Corporation (AMC) was designing a successor to the smaller Jeep Cherokee (XJ). Three outside (non-AMC) designers—Larry Shinoda, Alain Clenet, and Giorgetto Giugiaro—were also under contract with AMC to create and build a clay model of the Cherokee XJ replacement, then known as the "XJC" project. However, the basic design for the Cherokee's replacement was well under way by AMC's in-house designers and the 1989 Jeep Concept 1 show car foretold the basic design.
As AMC began development of the next Jeep in 1985, management created a business process that is now known as product lifecycle management (PLM). According to François Castaing, Vice President for Product Engineering and Development, the smallest U.S. automaker was looking for a way to speed up its product development process to compete better against its larger competitors. The XJC's development was aided by computer-aided design (CAD) software systems making the engineers more productive. Meanwhile, new communication systems allowed potential conflicts to be resolved faster, thus reducing costly engineering changes, because all drawings and documents were in a central database. The system was so effective that after Chrysler purchased AMC in 1987, it expanded the system throughout its enterprise, thus connecting everyone involved in designing and building products.
The Grand Cherokee thus became the first Chrysler-badged Jeep product. Development work for the new Jeep model continued and Chrysler's employees (after the 1987 buyout of AMC) were eager for a late-1980s release date; however, CEO Lee Iacocca was pushing for redesigned Chrysler minivans, thus delaying the Grand Cherokee's release until late 1992 as an Explorer competitor. Unlike the Explorer, the Grand Cherokee utilized monocoque (unibody) construction, whereas the Explorer was a derivative of the Ranger pickup with a separate body-on-frame. A Dodge branded version was designed as a precaution should Jeep dealers struggle handling so many Grand Cheeroke units.
The Grand Cherokee debuted in grand fashion at the 1992 North American International Auto Show in Detroit, Michigan. The vehicle that was driven was a Poppy Red Clear Coat 1993 Grand Cherokee ZJ Laredo with a quartz cloth interior and high-back bucket seats. Then Chrysler president Robert Lutz drove Detroit mayor, Coleman Young, from the Jefferson North Assembly Plant on North Jefferson Avenue via a police escort to Cobo Hall, up the steps of Cobo Hall and through a plate glass window to show off the new vehicle. Sales of the 1993 model year Grand Cherokee began in April 1992.
Production of the Grand Cherokee started shortly afterward in the purpose-built Jefferson North Assembly in Detroit, Michigan. European Grand Cherokees are manufactured in Austria by Magna Steyr. The Grand Cherokee "played a significant part in reviving Chrysler's fortunes by moving it into the then nascent market for high-margin sports utility vehicles."
Upon its introduction, it was the first full-scale manufacture of an automobile in the US using HFC-134a refrigerant in place of HCFC-12 for the HVAC system.
First generation (ZJ; 1993)
The original Grand Cherokee was launched in 1992 as a 1993 model year vehicle in the luxury SUV segment. The "ZJ" models, manufactured from 1992 to 1998, originally came in three trim levels: base (also known as SE), Laredo, and Limited, subsequent trims were added, included Orvis (MY 95–98), TSI (MY97–98). The base model included features such as full instrumentation, cloth interior, and a standard five-speed manual transmission, while gaining the moniker "SE" name for the 1994 model year. Power windows and locks were not standard equipment on the base trim. The minimal price tag differential resulted in low consumer demand, and as a result, the low-line model was eventually discontinued. Additional standard features included a driver-side airbag and four-wheel anti-lock braking system (ABS). The Laredo was the mid-scale model with standard features that included power windows, power door locks, cruise control, and a leather-wrapped steering wheel. Exterior features included medium-grey plastic paneling on the lower body and five-spoke alloy wheels. The Limited was the premium model, featuring body-color lower body paneling, and gold exterior accents. The Limited also boasted standard features such as leather seating, heated mirrors, front power seats, a keyless entry system, woodgrain interior appliqué, lace style alloy wheels, a driver information center with a compass, digitized climate control, an electrochromic rearview mirror, and Jensen brand stereo with multi-band equalizer. By 1996 the options list grew to include heated seats. Standard was the 4.0, with the 5.2 V8 (and 5.9 in 1998) being optional, as with other models. Package groups with the various trim levels included: fog lamps, skid plates, as well as convenience, lighting, luxury, power, security, and trailer towing packages.
When it was first introduced in April 1992 as an early 1993 model year vehicle, the Grand Cherokee only had one powertrain choice: the 4.0 L AMC-derived straight-six engine that made 190 horsepower. This became the "volume" engine for the Grand Cherokee. Transmission choices included a four-speed automatic transmission (early production ZJs used the AW4—the A500SE (later 42RE) replaced the AW4 during the latter half of the 1993 model year) or an Aisin AX15 manual transmission. Low demand for the manual transmission resulted in its discontinuation after 1994, but European-market ZJs retained it when coupled to the diesel engine (which was unavailable in North America). The drive train choices included rear-wheel drive or four-wheel-drive. In 1995, the engine dropped 5 horsepower to 185 due to new EPA regulations imposed on the 1996 model year.
In 1997, for the 1998 model year, a variant of the top-level Grand Cherokee Limited, the "5.9 Limited" was introduced. Jeep ads claimed it to be the "world's fastest sport utility vehicle", verified by third-party testing. The primary improvements in the 5.9 Limited version included a 245-horsepower 5.9L OHV V8 engine, heavy-duty 46RE automatic transmission, functional heat-extracting hood louvers, unique wide-slot body-colored grille with mesh inserts, special rocker moldings, low-restriction exhaust with three-inch chrome tip, a low-profile roof rack, and special 16" Ultra-Star wheels. The 5.9 Limited also received a 150 amp alternator and a 2-speed electric cooling fan. Other features include a standard 180-watt, 10-speaker Infinity Gold sound system with rear roof-mounted soundbar, standard sunroof, and an interior swaddled with unique "calf's nap" soft leather and faux wood trim. The 5.9 Limited was awarded "4×4 of the Year" for 1998 by Petersen's 4-Wheel & Off-Road magazine. The production of this model was 14,286 units.
Export models produced at the plant in Graz, Austria, were given the vehicle designation of "ZG".
Engines
Production numbers
Second generation (WJ/WG; 1999)
Launched in September 1998, the redesigned WJ 1999 Grand Cherokee shared just 127 parts with its predecessor (mostly fasteners). The European model was coded WG. The spare tire was relocated from the side of the cargo compartment to under the floor. (Like the 1998MY ZJ, the rear tailgate glass opened separately.) The two heavy pushrod V8 engines were replaced by Chrysler's then-new PowerTech. The new V8 engine produced less torque than the old pushrods, but was lighter, offered better fuel economy, and provided similar on-road performance figures (the 23-gallon fuel tank was replaced with one of a 20.5-gallon capacity). The straight-six engine was also updated. A redesign of the intake manifold added . While other Jeep vehicles used the Mopar 5 × 4.5 bolt circle, this was the first Jeep following the 1987 Chrysler buyout to receive a wider bolt pattern—5 × 5.
A notable feature available in this generation was the automatic four-wheel drive option called Quadra-Drive, which employed the New Venture Gear NV247 transfer case. This two-speed chain-driven transfer case uses a gerotor, a clutch pack coupled to a hydraulic pump, to transfer torque between the front and rear axles. The transfer case contains three modes, 4-All Time, Neutral, and 4-Lo. In 4-All Time, 100% of torque is sent to the rear axle in normal conditions. If the rear axle starts spinning at a higher rate than the front axle, hydraulic pressure builds up in the gerotor and causes the clutch pack to progressively transfer torque to the front axle until both axles return to the same speed. A neutral mode is intended for towing the vehicle. In 4-Lo, the front and rear axles are locked together through a 2.72 reduction gear ratio. The NV247 transfer case is mated to front and rear axles containing Jeep's Vari-Lok differentials. Vari-Lok differentials also use a gerotor to transfer torque between the wheels on either side of the axle. The major advantage of Quadra-Drive was that the combined transfer case and progressive locking differentials in each axle could automatically control traction between all four wheels. However, only the center differential could be permanently locked, and only in 4Lo. The Quadra-Trac II system included the NV247 transfer case with the standard open front and rear differentials.
The 45RFE and 545RFE automatic transmission in the WJ was notable. It included three planetary gear sets rather than the two normally used in a four-speed automatic. This gave it six theoretical speeds, and it would have been the first six-speed transmission ever produced in volume, but it was programmed to only use five of these ratios. Four were used for upshifts, with a different second gear for downshifts. Although five of the six ratios were used, Chrysler decided to call it a "4-speed automatic". For MY 2001, the programming was changed to make use of all six ratios. Rather than have six forward gears, the transmission was programmed to act as a five-speed with the alternate second gear for downshifts. The rpm at on a 545RFE is 2,000 rpm, 200 rpm less than the 45RFE programming. 1999 and 2000 model-year WJ owners can have their 45RFE transmission's programming flashed to enable the extra gear as both transmissions are physically the same. (Must purchase new PCM and ABS module and program them with a fake VIN to make this work.) The 42RE 4-speed automatic remained the transmission for the inline 6 engine. It had slight changes from the previous model Grand Cherokee.
The interior was also completely redesigned. The redesign allowed for larger rear doors, and more space for rear passengers. Controls for various items like headlights, heated seats, and rear wiper were moved to more convenient locations. The electronic Vehicle Information center was moved from below the radio to above the windshield and was standard on 2000–2004 models. Limited models included automatic dual-zone climate control. A 10-CD changer was also available with the Infinity Audio package.
In addition to Jeep's UniFrame construction, Daimler Chrysler partnered with Porsche to further strengthen the frame. This was done to reduce Noise Vibration Harshness (NVH). UniFrame is an unusual construction scheme, it incorporates all of the strength and durability of a body-on-frame construction into a unitized construction. By adding stiffness and rigidity to the structure, they enhanced the ride and strengthened the network of steel beams, rails and pillars (or "safety cage") that surround and protect occupants. More than 70 percent of the underbody is high-strength steel. All Jeep Grand Cherokees feature UniFrame construction.
The Grand Cherokee received a minor facelift for 2004 including round fog lamps, a lower front fascia, and a new body color-matched inset grille design.
Export models produced at the plant in Graz, Austria, were given the vehicle designation of "WG".
Engines
Third generation (WK; 2005)
The WK Grand Cherokee debuted in 2004 for the 2005 model year at the 2004 New York International Auto Show with available Quadra-Drive II four-wheel drive, rear-seat DVD player and optional 5.7 L Hemi V8. The 3.7 L V6 engine replaced the 4.0 L Straight-6. A Mercedes Benz sourced 3.0 V6 Common Rail Diesel (CRD) was available outside of North America from launch.
Jeep replaced the XJ-era leading-arms live-axle front suspension (found in the ZJ and WJ) with an independent double-wishbone setup like that which debuted in the 2002 Liberty. Classed as a truck-based SUV, the WH/WK Grand Cherokee offers "crossover" refinement, capability and NVH.
The 2007 Jeep Grand Cherokee made its European debut at the Euro Camp Jeep in Ardèche, France. This Jeep has gained 4 stars in the Euro NCAP crash safety tests conducted in 2005.
The Grand Cherokee received a minor facelift for 2008 with revised headlights and available High-Intensity Discharge (HID) Headlamps with auto-leveling. The lower portion of the front bumper was still removable as it was from launch to increase the approach angle for off-road use. The 4.7 L was refined, now producing , and .
The 2009 Jeep Grand Cherokee is available with an improved 5.7 L Hemi engine rated at and of torque. The engine uses variable valve timing to increase fuel economy.
Engines
Fourth generation (WK2; 2011)
The fourth-generation WK2 Grand Cherokee went on sale in summer 2010 as a 2011 model. It was unveiled at the 2009 New York Auto Show. In 2009, during its development, Chrysler management used it as an example of future products to convince United States federal regulators of Chrysler's future viability for the purpose of requesting a federal loan. This culminated in the Chrysler Chapter 11 reorganization that same year.
The fourth-generation Grand Cherokee retains its classic Jeep styling combined with a modern and sleek body style. The interior features leather trim and real wood accents, plus Bluetooth and uConnect electronics options. With the additional awards for the 2011 Grand Cherokee, the Jeep Grand Cherokee has won 30 awards for off-road capability, luxury, value, best-in-class, and safety, making it the most awarded SUV ever. Among the awards are: Top Safety Pick for 2011 from the IIHS, listed as a Consumers Digest Best Buy for 2011, Safest SUV in America by MSN Autos, and Truck of the Year for 2011 by The Detroit News.
Like previous generations, the WK2 Grand Cherokee chassis is a steel unibody. Unlike previous generations, it features four-wheel independent suspension for better on-road handling. The WK2 and 2011 Durango use a Chrysler designed and engineered platform/chassis that Mercedes-Benz later used for the Mercedes-Benz W166 series. The Chrysler designed platform was part of the DaimlerChrysler engineering projects that were to launch the WK2 Grand Cherokee with the Mercedes-Benz ML to follow.
Four-wheel drive systems include Quadra-Trac I, Quadra-Trac II, and Quadra-Drive II. Using Selec-Terrain, the driver can select modes for Auto, Sport, Snow, Sand/Mud, and Rock.
Optional Quadra-Lift height adjustable air suspension can raise the vehicle's ground clearance up to . Lift modes include Park, Aero, Normal Ride Height, Off-Road 1, and Off-Road 2.
Engine choices include the all new 3.6 L Pentastar V6 and 5.7 L Hemi V8. The Hemi V8 retains the Multiple Displacement System (MDS) that shuts down four cylinders in low-power driving situations. The V8 comes with the multi-speed automatic transmission that includes Electronic Range Selection (ERS) to manually limit the high gear operating range. Trailer towing is rated for Hemi models and for Pentastar models. A 3.0 L turbocharged diesel V6 developed and built by Fiat Powertrain Technologies and VM Motori (with Multijet II injection) rated at and of torque offered in export markets from mid-2011. The new 3.0 L CRD turbodiesel engine is available in European markets as low-power version.
The new Grand Cherokee SRT8, which started production on July 16, 2011, is equipped with a 6.4 L Hemi V8 engine. Jeep claims the new SRT8 gets 13 percent better fuel economy than its predecessor. To keep the gas mileage respectable, Jeep has employed a new active exhaust system that lets Chrysler's cylinder-deactivating Fuel Saver Technology operate over a wider rpm band. Chrysler claims that with the larger gas tank, the SUV can now travel up to on a single tank, while other sources estimate range to be .
The Jeep Grand Cherokee was released in India on 30 August 2016. Alongside the Wrangler, the Grand Cherokee was the first model to be sold directly by Jeep in the country. Jeeps have been built under license by Mahindra in India since the 1960s.
Engines
Fifth generation (WL; 2021)
The fifth generation (WL) Grand Cherokee was revealed as the three-row LWB version, Grand Cherokee L on January 7, 2021. The two-row version was revealed on September 30, 2021. The Grand Cherokee L is assembled at the new Mack Avenue Assembly Complex, which is built on the grounds of the Mack Avenue Engine Complex in Detroit, Michigan. The two-row Grand Cherokee will continue to be assembled at the nearby Jefferson North Assembly Plant, where it has been assembled since its introduction in 1992 for the 1993 model year.
Three different four-wheel-drive systems will be available: Quadra-Trac I, Quadra-Trac II featuring low range, and Quadra-Drive II with low range and "Quadra Lift" air suspension system, as well as rear-wheel drive. When properly equipped, the Grand Cherokee will be able to tow up to 7,200 lbs. The Grand Cherokee will also be able to ford up to two feet (24 inches) of water (when equipped with the Quadra Lift air suspension system). All engines will be mated to a ZF-sourced eight-speed automatic transmission that is controlled via a rotary shift knob. The Selec Terrain system, first introduced on the Jeep Grand Cherokee (WK2), will also be available on the Grand Cherokee WL, and is now controlled via a toggle switch in the center console. The Quadra Lift air suspension system is available only with the Quadra-Drive II system.
The 2021 Grand Cherokee is the third Fiat Chrysler Automobiles product to offer the new UConnect 5 infotainment suite, which will offer either an 8.4-inch or 10.1-inch high-resolution touchscreen display, SiriusXM Satellite Radio with 360L, SiriusXM Travel Link services, UConnect Guardian (powered by SiriusXM, a 4G LTE wireless Internet hotspot, wireless Apple CarPlay and Android Auto smartphone integration, and a integrated virtual assistant that can be activated by the phrase, "Hey UConnect", or "Hey Jeep", and can control multiple features of the vehicle, as well as provide other pertinent information.
Grand Cherokee L
The Grand Cherokee L went on sale in June 2021, wheelbase is longer than the previous generation two-row model, and longer than its two-row counterpart. It is equipped with an independent front and multi-link rear suspension. It arrived in Mexico on September 2021, offered only in the Summit Reserve 4X4 trim.
The Grand Cherokee L is available in five trim levels: Laredo, Altitude, Limited, Overland, and Summit. While all models will be powered by a 3.6-liter Pentastar V6 gasoline engine producing and (now assisted by the eTorque Mild Hybrid system), Overland and Summit models will also offer the 5.7-liter HEMI V8 gasoline engine with Multi Displacement System (MDS) that will produce and of torque.
For the first time, the Grand Cherokee will offer a 950-watt, nineteen-speaker McIntosh premium amplified surround sound audio system, replacing the previous 825-watt, eighteen-speaker Harman Kardon system on the Grand Cherokee WK2. Other new features available for the first time on a Grand Cherokee include massaging front seats, a rear seat view camera, a surround-view (360-degree) camera system, a rear view camera digital mirror, wireless Apple CarPlay and Android Auto smartphone integration, Qi-compatible wireless device charging, heated and ventilated second-row seats, second-row captain's chairs, twenty-one inch tires and wheels, Level 2 semi-autonomous driving technology, and power-folding second and third-row seats.
For 2022, the Grand Cherokee L, along with the all-new two-row Grand Cherokee, received the front passenger interactive touchscreen display, which was first introduced on the Jeep Wagoneer and Jeep Grand Wagoneer. Integrated into the woodgrain trim on the passenger side of the dashboard, the widescreen display allows the passenger to stream music wirelessly via Bluetooth to the vehicle's audio system, view the GPS navigation map, and send destinations directly to the central touchscreen display's navigation system. The display features a special coating that allow only the front passenger to view it while the vehicle is in motion.
Grand Cherokee
Originally scheduled to be released for the 2021 model year, but delayed until 2022, The two-row Grand Cherokee is available in seven trim levels: Laredo, Altitude, Limited, Overland, Trailhawk, Summit, and Summit Reserve (the off-road oriented Trailhawk trim will not be available on the long wheelbase Grand Cherokee L model). Compared to the previous generation two-row Grand Cherokee, the total passenger volume increases by , while cargo space is up .
Engine choices are carried over from the previous generation Grand Cherokee (WK2), with two naturally-aspirated units, but also added is turbocharged gasoline/electric plug-in hybrid (PHEV) powertrain. The base engine on all Grand Cherokees is the 3.6-liter Pentastar V6 gasoline engine, producing , and of torque. The optional engine, available on all Grand Cherokee trims aside from the Laredo, Altitude, and Limited, is the 5.7-liter HEMI V8 gasoline engine with the Multi Displacement System (MDS) cylinder deactivation system, producing 360 horsepower, and 390 lb. ft. of torque. When equipped with the 5.7-liter HEMI V8 gasoline engine, the all-new Grand Cherokee has a maximum towing capacity of 7,200 lbs. All engines, including the Plug In Hybrid (PHEV) powertrain, are paired with an eight-speed automatic transmission, with Stellantis manufacturing the 850RE transmission for the 3.6-liter model, and ZF manufacturing the 8HP70 transmission for the 5.7-liter model (all transmissions are based on the design of the ZF 8HP transmission, and use a new rotary controller in the center console). In addition to rear-wheel-drive, three different four-wheel-drive systems are available, and use a new Selec-Terrain toggle controller (the Quadra Drive II four-wheel-drive system also features the Quadra-Lift air suspension system. The Quadra-Lift system can raise or lower the vehicle to different heights, and is standard on all Trailhawk models.
Three different infotainment systems are available; two systems with an 8.4-inch touchscreen, and a third system with a 10.1-inch touchscreen, all three systems featuring the latest U Connect 5 software, which is Android-based. New features for the Grand Cherokee include SiriusXM Satellite Radio with 360L, wireless Apple CarPlay and Android Auto smartphone integration, a 360-degree camera system, and connected GPS navigation. Base Grand Cherokees feature a standard six-speaker audio system or an optional Alpine premium ten-speaker surround sound system with a subwoofer and a 506-watt amplifier. Uplevel Grand Cherokees offer an all-new McIntosh MX950 premium nineteen-speaker surround sound system with a subwoofer, a 950-watt amplifier, metal speaker grilles, and light-up door speaker emblems. An all-new rear seat entertainment system with dual screens and Amazon Fire TV is available on most Grand Cherokee models.
It is available with an optional 4xe plug-in hybrid available on the Limited, Trailhawk, Overland, Summit, and Summit Reserve trim levels. It uses an electrically assisted 2.0-liter turbocharged four-cylinder making a total of and . The 17 kWh battery pack provides an estimated of range when running solely on electric power. It has the ability to tow .
Sales
Recalls
Fuel system integrity
In 2010, the National Highway Traffic Safety Administration (NHTSA) launched an investigation into 1993–2004 model year Jeep Grand Cherokees which involves the fuel tanks of these SUVs. In moderate- to high-energy rear collisions, the fuel tank (located behind the rear axle) could be compromised structurally, resulting in fuel leakage and fire. The NHTSA claims that it has reports of 157 deaths resulting from fires caused by Grand Cherokees crashing. Also affected are 2002–2007 Jeep Liberty models and 1986–2001 Jeep Cherokee models, which totals about 5.1 million affected vehicles.
In June 2013, Chrysler Corporation responded to the recall, agreeing to recall 2.7 million Jeeps, though eliminating both the 1986–2001 Jeep Cherokee (XJ) and 1999–2004 Jeep Grand Cherokee WJ from the recall. The recall will include 2.7 million 1993–1998 Jeep Grand Cherokee ZJ and 2002–2007 Jeep Liberty KJ vehicles.
Two weeks prior to this recall, Chrysler Corporation claimed that the affected Jeep vehicles were safe, citing the vehicles' rates of fatal rear-impact crashes involving fire as well as their compliance with then-current requirements of FMVSS standard No. 301, though agreed to recall the affected vehicles later. To remedy the problem, Jeep dealerships will install a trailer hitch onto the rear bumpers of the vehicles that will protect the fuel tank if the vehicle is involved in a rear impact. If an affected vehicle is not currently equipped with a trailer hitch, one will be installed onto it, and older Jeep and non-factory aftermarket trailer hitches will be replaced with one from Chrysler Corporation. Despite the recall, the market for these Jeep vehicles has not suffered.
Transfer case actuator
In May 2013 there was a recall of WKs with the Quadra-Drive II and Quadra-Trac II systems. This followed cases of cars rolling away due to the transfer case moving into neutral of its own accord, and the owner not having applied the parking brake. The recall revised the Final Drive Control Module (FDCM) software. However, following the recall there were widespread reports on enthusiast web sites of both the neutral and low ratio modes of the transfer case ceasing to function, and a survey showed that fewer than 10% of respondents had experienced no issues with the recall. Attempting to resolve these issues, some dealers subsequently replaced the transfer case actuator, FDCM, and even the transfer case itself, often at customer expense and usually to no avail.
The cause of the roll-aways was faulty soldering in the transfer case actuator. It has been deduced that the revised software detects this by noting any deviation in resistance, and thereupon locks the transfer case in the high ratio for safety; but that it is over-reacting to minor resistance variations from other causes. Originally Chrysler dealers claimed that the loss of neutral and low ratio following the recall was a coincidence; then it claimed that the revised software was revealing pre-existing faults in the system, despite it occurring even with new parts. Chrysler has also claimed that only a small fraction of cars have issues following the recall; but most users never have occasion to use the low ratio and may never discover the fault. Four years after this recall its issues remain unresolved.
Transmission parking pawl
In April 2016, the National Highway Traffic Safety Administration (NHTSA) ordered a recall of 2014 and 2015 Jeep Grand Cherokees and other cars that use an electronic gear shifter because it sometimes does not go into (or does not remain in) the park position, despite the operator's best intentions. Consumers reported that they put the car in park and left the engine running, and then were surprised when the car rolled away under power.
An investigation by FCA US and the National Highway Traffic Safety Administration found some drivers have exited their vehicles without first selecting "PARK." Such behavior may pose a safety risk if a vehicle's engine is still running.
The company is aware of 41 injuries that are potentially related. It was also the cause of actor Anton Yelchin's death. The vehicles involved in these events were inspected and no evidence of equipment failure was found. The vehicles also deliver warning chimes and alert messages if their driver-side doors are opened while their engines are still running and "PARK" is not engaged. However, the investigation suggested these measures may be insufficient to deter some drivers from exiting their vehicles without selecting "PARK," so FCA US will enhance the warnings and transmission-shift strategy on these vehicles. The enhancements will combine warnings with a transmission-shift strategy to automatically prevent a vehicle from moving, under certain circumstances, even if the driver fails to select "PARK."
The final fix was Safety Recall S27 / NHTSA 16V-240, a software update that adds an "auto park" feature that will automatically put the vehicle in park if the driver's door is opened and the driver seatbelt is unlatched while the vehicle is stopped or moving slowly.
Jeep has now replaced the shifter with a conventional lever which stays in position for late-2016 models.
Other recalls
In July 2017, 2012–14 Jeep Grand Cherokee SUVs were recalled due to possible alternator failure. If the alternator fails, the vehicle may stall and/or if the alternator has a short circuit, a fire may occur.
In October 2017, 2011–14 model year Grand Cherokees were recalled due to improperly installed brake shields in some vehicles.
See also
Jeep Cherokee (SJ), the similarly named 1974–83 predecessor
Notes
References
Inline
General
External links
Jeep Grand Cherokee website
Grand Cherokee
All-wheel-drive vehicles
Mid-size sport utility vehicles
Rear-wheel-drive vehicles
2000s cars
2010s cars
2020s cars
Cars introduced in 1992
Motor vehicles manufactured in the United States |
354262 | https://en.wikipedia.org/wiki/Barry%20Boehm | Barry Boehm | Barry W. Boehm (born 1935) is an American software engineer, distinguished professor of computer science, industrial and systems engineering; the TRW Professor of Software Engineering; and founding director of the Center for Systems and Software Engineering at the University of Southern California. He is known for his many contributions to the area of software engineering.
In 1996, Boehm was elected as a member into the National Academy of Engineering for contributions to computer and software architectures and to models of cost, quality, and risk for aerospace systems.
Biography
Boehm received a B.A. in mathematics from Harvard University in 1957, and a M.S. in 1961, and Ph.D. from UCLA in 1964, both in mathematics as well. He has also received honorary Sc.D. in Computer Science from the U. of Massachusetts in 2000 and in Software Engineering from the Chinese Academy of Sciences in 2011.
In 1955 he started working as a programmer-analyst at General Dynamics. In 1959 he switched to the RAND Corporation, where he was head of the Information Sciences Department until 1973. From 1973 to 1989 he was chief scientist of the Defense Systems Group at TRW Inc. From 1989 to 1992 he served within the U.S. Department of Defense (DoD) as director of the DARPA Information Science and Technology Office, and as director of the DDR&E Software and Computer Technology Office. Since 1992 he is TRW Professor of Software Engineering, Computer Science Department, and director, USC Center for Systems and Software Engineering, formerly Center for Software Engineering.
He has served on the board of several scientific journals, including the IEEE Transactions on Software Engineering, Computer, IEEE Software, ACM Computing Reviews, Automated Software Engineering, Software Process, and Information and Software Technology.
Awards
Recent awards for Barry Boehm include the Office of the Secretary of Defense Award for Excellence in 1992, the ASQC Lifetime Achievement Award in 1994, the ACM Distinguished Research Award in Software Engineering in 1997, and the IEEE International Stevens Award. He is an AIAA Fellow, an ACM Fellow, an IEEE Fellow, and a member of the National Academy of Engineering (1996). He received the Mellon Award for Excellence in Mentoring in 2005 and the IEEE Simon Ramo Medal in 2010. He was appointed as a distinguished professor on January 13, 2014
He was awarded the INCOSE Pioneer Award in 2019 by the International Council on Systems Engineering for significant pioneering contributions to the field of systems engineering.
Work
Boehm's research interests include software development process modeling, software requirements engineering, software architectures, software metrics and cost models, software engineering environments, and knowledge-based software engineering.
His contributions to the field, according to Boehm (1997) himself, include "the Constructive Cost Model (COCOMO), the spiral model of the software process, the Theory W (win-win) approach to software management and requirements determination and two advanced software engineering environments: the TRW Software Productivity System and Quantum Leap Environment".
Software versus hardware costs
In an important 1973 report entitled "Ada - The Project : The DoD High Order Language Working Group" to the Defense Advanced Research Projects Agency (DARPA), Boehm predicted that software costs would overwhelm hardware costs. DARPA had expected him to predict that hardware would remain the biggest problem, encouraging them to invest in even larger computers. The report inspired a change of direction in computing.
Software economics
Barry Boehm's 1981 book Software Engineering Economics documents his Constructive Cost Model (COCOMO). It relates software development effort for a program, in Person-Months (PM), to Thousand Source Lines of Code (KSLOC).
Where A is a calibration constant based on project data and B is an exponent for the software diseconomy of scale.
Note: since man-years are not interchangeable with years, Brooks' Law applies:
Adding programmers to a late project makes it later.
Thus this formula is best applied to stable software development teams which have completed multiple projects.
Spiral model
Boehm also created the spiral model of software development, in which the phases of development are repeatedly revisited. This iterative software development process influenced MBASE and extreme programming.
Wideband Delphi
Boehm refined the Delphi method of estimation to include more group iteration, making it more suitable for certain classes of problems, such as software development. This variant is called the Wideband Delphi method.
Incremental Commitment Model
The Incremental Commitment Model (ICM) is a system design, developmental, and evolution process for 21 century systems. The systems' types cover a wide range from COTS based systems to "routine" Information Systems to human intensive and life or safety critical.
It was only in 1998, after the development of the ICM that Barry Boehm along with A Winsor Brown started to focus on reconciling it with the WinWin Spiral Model and its incarnation in MBASE and the follow-on Lean MBASE, and working towards an Incremental Commitment Model for Software (ICMS) by adapting the existing WinWin Spiral Model support tools.
In 2008, the evolving ICM for Software with its risk-driven anchor point decisions, proved very useful to several projects which ended up having unusual life cycle phase sequences.
Publications
Barry Boehm has published over 170 articles and several books. Books, a selection:
1978. Characteristics of Software Quality. With J.R. Brown, H. Kaspar, M. Lipow, G. McLeod, and M. Merritt, North Holland.
1981. Software Engineering Economics. Englewood Cliffs, NJ : Prentice-Hall, 1981 .
1996. Ada and Beyond: Software Policies for the Department of Defense. National Academy Press.
2007. Software engineering: Barry Boehm's lifetime contributions to software development, management and research. Ed. by Richard Selby. Wiley/IEEE press, 2007. .
2004. Balancing Agility and Discipline: A Guide for the Perplexed. With Richard Turner. Person Education, Inc 2004 .
2014. The Incremental Commitment Spiral Model: Principles and Practices for Successful Systems and Software. B. Boehm, J. Lane, S. Koolmanojwong, R. Turner. Addison-Wesley Professional, 2014. .
Articles
1996. "Anchoring the Software Process",. In: IEEE Software, July 1996.
1997. "Developing Multimedia Applications with the WinWin Spiral Model," with A. Egyed, J. Kwan, and R. Madachy. In: Proceedings, ESEC/FSE 97 and ACM Software Engineering Notes, November 1997.
References
External links
Barry Boehm home page
"A View of 20th and 21st Century Software Engineering" — talk by Barry Boehm
1935 births
American computer scientists
Fellows of the Association for Computing Machinery
Fellow Members of the IEEE
Harvard College alumni
Living people
American software engineers
Software engineering researchers
University of Southern California faculty
University of California, Los Angeles alumni
Members of the United States National Academy of Engineering |
13984263 | https://en.wikipedia.org/wiki/OrthoGraph | OrthoGraph | OrthoGraph I is a building survey and floorplan creation application for iOS and Android mobile operating systems, developed by OrthoGraph, a software developer based in Budapest, Hungary. The software can be used to support building information modeling processes.
Product history
The first version of OrthoGraph was released in 2004 for PDA devices. An iPad version of the application was released in 2011.
In 2013, a cooperation agreement was established between OrthoGraph and Leica, so that several Leica laser distance meters were supported by OrthoGraph's application. Bluetooth support for the Bosch GLM 100 C laser distance meter also became available. OrthoGraph also developed its own cloud computing services.
In 2014, the number of OrthoGraph users reached 4,500, and, in August 2014, the OrthoGraph Architect App won App of the Year and was silver winner in the Most Innovative Product of the Year—SMB category in Best in Biz Awards 2014 international business awards program.
In 2015 OrthoGraph began developing its Android version. In September 2016, a multi-platform version of the app was published, called OrthoGraph I, with a new user interface, more accurate measurement, and faster workflows. OrthoGraph I won silver qualification in the "Best New Version of the Year" category of Best in Biz Awards 2016.
Software overview
OrthoGraph I can capture data from third-party distance measuring devices (from Leica, Bosch and Stabila). Data is transferred via Bluetooth, with floorplan outputs shareable with users on other devices.
Supported formats include DXF (AutoCAD), PDF (Adobe), IFC (Industrial Foundation Classes), JPEG, and PNG. Data can also be exported to ArchiCAD using a separate module.
Version history
2011 – OrthoGraph Architect 3D for iPad - first iPad version
2013 – launch of OrthoGraph Cloud
2014 – OrthoGraph 9.0
2015 – OrthoGraph Architect 3D 10.0
2016 – OrthoGraph I multi-Platform release
References
Computer-aided design software
Computer-aided manufacturing software
Software companies of Hungary
Surveying |
11551644 | https://en.wikipedia.org/wiki/International%20Information%20and%20Communication%20Technology%20Council%20Certification%20Program | International Information and Communication Technology Council Certification Program | The International ICT Council has been building up ICT certifications in the form of the International Information and Communication Technology Council Certification Program. The program has been adopting an open process, in which volunteers of communities can participate. It is believed that the adopted open process enhances both the quality and recognition of the certification program.
Certifications
Up to the date of updating this article, the certification program has the following series:
Information Security Officer
There are two certifications including the Information Security Penetration Testing Professional (ISP²) and the Computer Information Forensics Investigator (CIFI).
Intellectual and Digital Property Management
There is currently one examination — The Intellectual and Digital Property Management (MIP).
Linux Administrator
There are four levels of the certification. Beginning from the foundation level to the advanced level, namely they are Linux Administration Associate (LAA), Linux Administration Professional (LAP), Linux Administration Expert (LAE), and Linux Administration Master (LAM). For the Master level, there are several specializations including Higher Availability, Performance Tuning.
Linux System Programmer
There are two levels: Linux System Programmer Associate(LSPA)and the Linux System Programmer Professional (LSPP)
Embedded Linux Developer
As of now no certifications exist
Software Testing
There are three levels including Software Testing Associate (STA), Software Testing Professional (STP) and Software Testing Expert (STE)
Examination taking
The Council appoints authorized examination proctors.
References
Official website on certifications
Open Training Content Project (OTCP)
Government Technology Research Alliance (GTRA) Partners
Information technology qualifications |