id
stringlengths 3
8
| url
stringlengths 32
207
| title
stringlengths 1
114
| text
stringlengths 93
492k
|
---|---|---|---|
57539374 | https://en.wikipedia.org/wiki/ComTrade%20Group | ComTrade Group | Comtrade Group is a software & IT solutions company based in Belgrade, Serbia with divisional head offices in Boston, Dublin, Amsterdam and Ljubljana. Founded in 1996, its business focuses to developing hardware and large software storage systems for institutions and corporations, as well as games of chance.
History
Comtrade Group was founded in 1996 by Serbian businessman Veselin Jevrosimović. It designed the first Serbian desktop and notebook in 2006.
In 2015, the company joined CERN as an associate member and now manages the nuclear research lab's database. In 2016, the firm partnered with Citrix to develop management packs for their platforms. Additionally, ComTrade has the largest artificial intelligence division in South Eastern Europe for now.
Comtrade wrote the code for the warehouse robots used at Amazon.com. It also developed the software infrastructure at Ryanair and various luggage transport systems.
The company has offices in Belgrade, Sarajevo, New York, San Francisco, Budapest, Ireland and the Philippines. In 2008, it acquired the Slovenian software firm Hermes Softlab. In 2014, ComTrade Group launched the Tesla brand of tablets, smartphones, monitors and TVs. In 2016, ComTrade Software, a subsidiary of ComTrade Group, launched its US headquarters in Boston. In 2017, Jevrosimović opened the parent company's 18th office in the city of Dubai, as well as a technology center in Čačak. Comtrade employs 1,200 software engineers and has been a member of the World Economic Forum since 2009.
References
External links
Software companies of Serbia
Computer companies of Serbia
Companies based in Belgrade
Companies established in 1996
1996 establishments in Serbia |
1098971 | https://en.wikipedia.org/wiki/UnixODBC | UnixODBC | unixODBC is an open-source project that implements the ODBC API. The code is provided under the GNU GPL/LGPL and can be built and used on many different operating systems, including most versions of Unix, Linux, Mac OS X, IBM OS/2 and Microsoft's Interix.
The goals of the project include:
Provide developers with the tools to port Microsoft Windows ODBC applications to other platforms with the minimum of code changes.
Maintain the project as a vendor neutral interface database SDK
Provide people who write ODBC drivers the tools to port their drivers to non Windows platforms
Provide the user with a set of GUI and command line tools for managing their database access
Maintain links with both the free software community and commercial database vendors, to ensure interoperability
History
1999
The unixODBC project was first started in the early months of 1999 (by Peter Harvey) and was created as at that time the developers of iODBC (another open source ODBC implementation) were not then willing to LGPL the code, expand the API to include the current ODBC 3 API specification, and did not consider the addition of GUI based configuration tools worthwhile. iODBC now has these parts added, and applications that use the ODBC interface may use both iODBC and unixODBC, without change in most cases, as a result of both projects adhering to the single ODBC specification.
1999 July
The original driver manager was very basic. The driver manager was rewritten by Easysoft's Nick Gorham soon after the project started. Nick assumed leadership of the project in July 1999 with Peter Harvey continuing work on supporting code.
The development of unixODBC progressed since its origin, with contributions from many developers, both in the open source community and also from commercial database companies, including IBM, Oracle Corporation and SAP.
It is included as part of the standard installation of many Linux distributions.
2009
The unixODBC project was split into several projects (all hosted on SourceForge);
unixODBC ("Core" and "Dev" bits)
unixODBC-GUI-Qt (Qt based GUI bits)
unixODBC-Test (multiple test frameworks)
This split was done to allow faster releases of supporting work while maintaining focus on stability and consistency for the core code.
External links
unixODBC homepage
UnixODBC & MySQL Sample Program
Database APIs
SQL data access |
548425 | https://en.wikipedia.org/wiki/Format%20war | Format war | A format war is a competition between similar but mutually incompatible technical standards that compete for the same market, such as for data storage devices and recording formats for electronic media. It is often characterized by political and financial influence on content publishers by the developers of the technologies. Developing companies may be characterized as engaging in a format war if they actively oppose or avoid interoperable open-industry technical standards in favor of their own.
A format war emergence can be explained because each vendor is trying to exploit cross-side network effects in a two-sided market. There is also a social force to stop a format war: when one of them wins as de facto standard, it solves a coordination problem for the format users.
1800s
Rail gauge. The Gauge War in Britain pitted the Great Western Railway, which used broad gauge, against other rail companies, which used what would come to be known as standard gauge. Ultimately standard gauge prevailed.
Likewise, in the United States, Russian gauge vs. standard gauge. During the initial period of railroad building, standard gauge was adopted in most of the northeastern United States, while the wider gauge, later called "Russian", was preferred in most of the southern states. In 1886, the southern railroads agreed to coordinate changing gauge on all their tracks. By June 1886, all major railroads in North America were using approximately the same gauge.
Direct current vs. alternating current: The 1880s saw the spread of electric lighting with large utilities and manufacturing companies supplying it. The systems initially ran on direct current (DC) and alternating current (AC) with low voltage DC used for interior lighting and high voltage DC and AC running very bright exterior arc lighting. With the invention of the AC transformer in the mid 1880s, alternating current could be stepped up in voltage for long range transmission and stepped down again for domestic use, making it a much more efficient transmission standard now directly competing with DC for the indoor lighting market. In the U.S. Thomas Edison's Edison Electric Light Company tried to protect its patent controlled DC market by playing on the public's fears of the dangers of high voltage AC, portraying their main AC competitor, George Westinghouse's Westinghouse Electric Company, as purveyors of an unsafe system, a back and forth financial and propaganda competition that came to be known as the war of the currents. AC, with its more economic transmission would prevail, supplanting DC.
Musical boxes: Several manufacturers introduced musical boxes that utilised interchangeable steel disks that carried the tune. The principal players were Polyphon, Symphonion (in Europe) and Regina (in the United States). Each manufacturer used its own unique set of disc sizes (which varied depending on the exact model purchased). This assured that once the purchaser had bought a music box, they had to buy the music discs from the same manufacturer.
1900s
Player pianos: In stark contrast to almost every other entertainment medium of the 20th century and beyond, a looming format war involving paper roll music for player pianos was averted when industry leaders agreed upon a common format at the Buffalo Convention held in Buffalo, New York in 1908. The agreed-upon format was a roll wide. This allowed any roll of music to be played in any player piano, regardless of who manufactured it. As the music played, the paper winds onto the lower roll from the upper roll, which means any text or song lyrics printed on the rolls is read from the bottom to the top.
1910s
Early recording media formats: cylinder records versus disc records. In 1877 Thomas Edison invented sound recording and reproduction using tinfoil wrapped around a pre-grooved cylinder, and in 1888 he introduced the wax "Edison cylinder" as the standard record format. In the 1890s Emile Berliner began marketing disc records and players. By the late 1890s cylinders and discs were in competition. Cylinders were more expensive to manufacture and the wax was fragile, but most cylinder players could make recordings. Discs saved space and were cheaper and sturdier, but due to the constant angular velocity (CAV) of their rotation, the sound quality varied noticeably from the groove near the outer edge to the inner portion nearest the center; and disc record players could not make recordings.
1920s
Gramophone record formats: lateral versus vertical "hill-and-dale" groove cutting. When Edison introduced his "Diamond Disc" (played with a diamond stylus instead of a steel needle) record in 1912, it was cut "hill-and-dale", meaning that the groove was modulated along its vertical axis, as it had been on all cylinders—unlike other manufacturers' discs, which were cut laterally, meaning that their grooves were of constant depth and modulated along the horizontal axis. Machines designed to play lateral-cut discs could not play vertical-cut ones and vice versa. Pathé Records also adopted the hill-and-dale format for their discs, first issued in 1906, but they used a very wide, shallow groove, played with a small sapphire ball, which was incompatible with Edison products. In 1929 Thomas Edison quit the record industry, ceasing all production of both discs and cylinders. Pathé had been making a transition to the lateral format during the 1920s and in 1932 decisively abandoned the vertical format. There was no standard speed for all disc records until 78 rpm was settled on during the latter half of the 1920s, although because most turntables could be adjusted to run at a fairly wide range of speeds that did not really constitute a format war. Some Berliner Gramophone discs played at about 60 rpm. Some of Pathé's largest discs, which were 50 cm (nearly 20 inches) in diameter, played at 120 rpm. Diamond Discs were 80 rpm. Those makers aside, speeds in the mid-70s were more usual.
In addition, there were several more minor "format wars" between the various brands using various speeds ranging from 72 to 96 rpm, as well as needle or stylus radii varying from the current radius needle or stylus is a compromise as no company actually used this size. The most common sizes were , used by Columbia, and , used by HMV/Victor.
1930s
240-line versus 405-line television broadcasts. In 1936, the BBC Television Service commenced television broadcasting from Alexandra Palace in North London. They began by using two different television standards broadcasting in alternate weeks. The 240-line Baird sequential system was broadcast using a mechanical scanning apparatus. In the intervening weeks, EMI-Marconi broadcast in 405-line interlaced using fully electronic cameras. Early sets had to support both systems, adding to their complexity. It was the BBC's intention to run the two systems side by side for a six-month trial to determine which would be finally adopted. The BBC quickly discovered that the fully electronic EMI system had a superior picture quality and less flicker, and the camera equipment was much more mobile and transportable (Baird's intermediate-film cameras had to be bolted to the studio floor as they required a water supply and drainage). The trial concluded after only three months after Baird's studios had lost most of their equipment in a fire.
1940s
Vinyl records: Columbia Records' Long Play (LP) 33⅓ rpm microgroove record (introduced in 1948) versus RCA Victor's 45 rpm record, from 1949 (the introduction of the latter) into c. 1951. The battle ended because each format found a separate marketing niche (LP for classical music recordings, 45 for the pop "singles" market) and most new record players were capable of playing both types.
The National Television System Committee NTSC was formed to settle the existing format incompatibility between the original 441 scan line RCA system and systems designed by the DuMont Television Network and Philco. In March 1941 the committee issued its plan for what is now known as NTSC, which has been the standard for television signals in the United States and most countries influenced by the U.S. until the adoption of digital and HD television formats with the official adoption of ATSC on June 12, 2009.
1950s
The National Television System Committee NTSC was reconvened in January 1950 to decide the revision to their original format to allow for color broadcasting. There were competitive format options offered by the Columbia Broadcasting System that were not downwardly compatible with the existing NTSC format.
In the early 1950s, 12 volt electric systems were introduced to automobiles in an effort to provide more starting power for big engines which were getting popular at the time; while reducing the current. Six volt systems were still popular since they were commonplace prior to the decade. However, 12 volt systems became the de facto standard.
1960s
Portable audio formats: 8-track and four-track cartridges vs. Compact Cassette, vs the lesser known DC-International tape cassette (introduced by Grundig). While rather successful into the mid-to-late 1970s, the 8-track eventually lost out due to technical limitations, including variable audio quality and inability to be rewound. Similarly the smaller formats of microcassette, developed by Olympus, and minicassette, developed by Sony, were manufactured for applications requiring lower audio fidelity such as dictation and telephone answering machines.
FM radio stereo broadcast formats: The Crosby system and the GE/Zenith system. The Crosby system was technically superior, especially in transmitting clear stereo signals, due to its use of an FM subcarrier for stereo sound rather than the AM subcarrier employed by GE/Zenith. Many radios built in this period allowed the user to select Crosby or GE/Zenith listening modes. However the Crosby system was incompatible with the more lucrative SCA services such as in-store broadcasting and background music. FM station owners successfully lobbied the FCC to adopt the GE/Zenith system in 1961, which was SCA-compatible.
1970s
Various Quadraphonic encoding methods: CD-4, SQ, QS-Matrix, and others. The expense (and speaker placement troubles) of quadraphonic, coupled with the competing formats requiring various demodulators and decoders, led to an early demise of quadraphonic, though 8-track tape experienced a temporary boost from the introduction of the Q8 form of 8-track cartridge. Quadraphonic sound returned in the 1990s substantially updated as surround sound, but incompatible with old hardware.
JVC VHS vs. Sony Betamax vs. Philips Video 2000, the analog video videotape format war. The competition started in 1976 and by 1980, VHS controlled 70% of the North American market. VHS's main advantage was its longer recording time. From the consumer perspective, VHS blank media held more hours and therefore was less expensive. Betamax still found a niche in commercial video production.
The first small format video recording devices were open reel-to-reel 1/2" "portable" EIAJ-1 recorders, most of which came with television tuners to record TV broadcasts. These never caught on in the consumer market but did find their way into educational television and were the mainstays of early public-access television stations. The uniformity of the EIAJ-1 format was the result of a developmental format war between Sony and Panasonic, each of whom were aiming at this market. The existence of the Electronic Industries Association of Japan (EIAJ) was the Japanese electronics industry's answer to some potential format wars.
Capacitance Electronic Disc (CED) vs. LaserDisc (LD) vs. VHD (Video High-Density), non-recordable video disc formats. All of these ultimately failed to achieve widespread acceptance, although LD found a considerable videophile niche market that appreciated its high quality image, chapter select and widescreen presentation. The Laser Disc remained available until the arrival of the DVD. Mainstream consumers preferred the recordable videotape for capturing broadcast television and making home movies, and made VHS the de facto standard video format for almost 20 years (circa 1982 to 2002).
1980s
Home computers often had incompatible peripherals such as joysticks, printers, or data recording (tape or disk). For example, if a Commodore 64 user wanted a printer, they would need to buy a Commodore-compatible unit, or else risk not being able to plug the printer into their computer. Similarly, disk formats were not interchangeable without third party software since each manufacturer (Atari, IBM, Apple, et al.) used their own proprietary format. Gradually computer and game systems standardized on the Atari joystick port for joysticks and mice (during the 1980s), parallel port for printers (mid-1980s), the MS-DOS-derived FAT12 format for floppy disks (mid-1990s), and so on.
AM stereo was capable of fidelity equivalent to FM but was doomed in the United States by competing formats during the 1980s with Motorola's C-QUAM competing vigorously with three other incompatible formats including those by Magnavox, Kahn/Hazeltine, and Harris. It is still widely used in Japan, and sees sporadic use by broadcast stations in the United States despite the lack of consumer equipment to support it.
Video8 vs. VHS-C and later Hi8 vs. S-VHS-C tape formats (see camcorder). This is an extension of the VHS vs. Betamax format war, but here neither format "won" widespread acceptance. Video8 had the advantage in terms of recording time (4 hours versus 2 hours maximum), but consumers also liked VHS-C since it could easily play in their home VCRs, thus the two formats essentially split the camcorder market in half. Both formats were superseded by digital systems by 2011.
Several different versions of the Quarter Inch Cartridge used for data backup.
Composite video and RF (channel 3/channel 4) F-connectors were two ways of connecting entertainment devices to television sets. This was not so much of a format as the RF option was an adaptation necessary for plugging in such devices on television sets that did not come equipped with a composite video input. RF was a noticeably inferior substitute. The competition between options mainly manifested itself as competition between television set manufacturers and their individual models that offered composite video.
Micro Channel Architecture (MCA) vs. Extended Industry Standard Architecture (EISA). Up to the introduction of MCA, personal computers had relied on a 16 bit expansion system which was later christened 'Industry Standard Architecture' (ISA). IBM introduced a new range of personal computers featuring a new 32 bit expansion system which they called MCA. It was at this point that the rest of the personal computer industry named the existing expansion system as ISA. IBM wanted substantial royalties from any manufacturer wishing to adopt the MCA system (largely in an attempt to recover lost royalties that they believed that they were owed due to the wholesale cloning of their original 'PC', a task that was greatly simplified by the 'off the shelf' nature of the design). IBM's competitors jointly responded by introducing the EISA expansion system which, unlike MCA, was fully compatible with the existing ISA cards. Eventually, neither MCA nor EISA really caught on, and the PCI standard was adopted instead.
Home computer sound cards: Ad Lib vs. Roland MT-32 vs. Sound Blaster
1990s
Philips' Digital Compact Cassette (DCC) vs. Sony's MiniDisc (MD): both introduced in 1992. Since affordable CD-R was not available until about 1996, DCC and MD were an attempt to bring CD-quality recording to the home consumer. Restrictions by record companies fearful of perfect digital copies had limited an earlier digital system (DAT) to professional use. In response, Sony introduced the MiniDisc format which provided a copy control system that seemed to allay record companies' fears. Philips introduced their DCC system around the same time using the same copy control system. Philips' DCC was discontinued in 1996 but MD successfully captured the Asia Pacific market (e.g. Japan, Hong Kong, Singapore, etc.) and initially did well in parts of Europe. The consumers in other parts of the world chose neither format, preferring to stick with analog Compact Cassettes for home audio recording, and eventually upgrading to now affordable CD recordable discs and lossy-compressed MP3 formats. Production of MiniDisc systems and recordable discs finally ceased in 2013.
Rockwell X2 vs K56flex – In the race to achieve faster telephone line modem speeds from the then-standard 9.6 kbit/s, many companies developed proprietary formats such as V.32 Turbo (19.2 kbit/s) or TurboPEP (23.0 kbit/s) or V.FAST (28.8 kbit/s), hoping to gain an edge on the competition. The X2 and K56flex formats were a continuation of that ongoing battle for market dominance until the V.90 standard was developed in 1999. For some time, online providers needed to maintain two modem banks to provide dial-up access for both technologies. (See "modem" for a complete history.)
Medium-capacity removable magnetic media drives, with several incompatible formatsa small market of write-once optical drives (requiring the use of a protective, plastic jacket) and several more successful but also incompatible magnetic read-write cassette drives. The Iomega Zip format ultimately prevailed, with capacities of 100 and 250 megabytes, plus the rather less popular 750 MB system; but these media and their drives were quickly supplanted by the much slower but far cheaper recordable compact disc CD-R (early models use a caddy to ensure proper alignment and help protect the disc). The CD-R has the advantage of existing wide industry standards support (the Red Book CD-DA standard for audio discs and the Yellow Book CD-ROM standard for data read-only CD), with the low-level recording format based upon the popular and low-cost read-only compact disc used for audio and data. Sony tried to establish "MD Data" Discs as an alternative, based on their MiniDisc R&D, with two computer peripherals: MDH-10 and MDM-111.
External bus transfer protocols: IEEE 1394 (FireWire) vs. USB. The proliferation of both standards has led to the inclusion of redundant hardware adapters in many computers, unnecessary versioning of external hardware, etc. FireWire has been marginalized to high-throughput media devices (such as high-definition videocamera equipment) and legacy hardware.
3D graphics APIs: DirectX vs. OpenGL vs. Glide API. In the latter half of the 1990s, as 3D graphics became more common and popular, several video formats were promoted by different vendors. The proliferation of standards (each having many versions with frequent and significant changes) led to great complexity, redundancy, and frustrating hardware and software compatibility issues. 3D graphics applications (such as games) attempted to support a variety of APIs with varying results, or simply supported only a single API. Moreover, the complexity of the emerging graphics pipeline (display adapter -> display adapter driver -> 3D graphics API -> application) led to a great number of incompatibilities, leading to unstable, underperforming, or simply inoperative software. Glide eventually dropped out of the war due to the only manufacturer supporting it — that is, 3dfx — ceasing production of their video cards.
Video disc formats: MMCD versus SD. In the early 1990s two high-density optical storage standards were being developed: one was the MultiMedia Compact Disc (MMCD), backed by Philips and Sony, and the other was the Super Density disc (SD), supported by Toshiba, Matsushita and many others. MMCD was optionally double-layer while SD was optionally double-sided. Movie studio support was split. This format war was settled before either went to market, by unifying the two formats. Following pressure by IBM, Philips and Sony abandoned their MMCD format and agreed upon the SD format with one modification based on MMCD technology, viz. EFMPlus. The unified disc format, which included both dual-layer and double-sided options, was called DVD and was introduced in Japan in 1996 and in the rest of the world in 1997.
More video disc formats: Video CD versus the DVD. While the MMCD and SD war was going on, Philips developed their own video format called the Video CD. While the format quickly flopped in the U.S., in Europe and Japan the battle waged on fiercely, as the VideoCD's lower production cost (and thus sales price) versus the DVD's superior audiovisual quality and multimedia experience resulted in a split market audience, with one end wanting cheap media without minding the lower quality and multimedia richness, while the other willing to pay a premium for the better experience DVD offered. The battle was settled by the movie industry who rapidly refused to issue any more VCD discs once CD recorders became available. Unlike DVD, the VCD format had no copy protection mechanism whatsoever.
Digital video formats: DVD versus DIVX (not to be confused with DivX). DIVX was a rental scheme where the end consumer would purchase a $2–3 disc similar to DVD but could only view the disc for 48 hours after the first use. Each subsequent view would require a phoneline connection to purchase another $2–3 rental period. Several Hollywood studios (Disney, 20th Century-Fox, and Paramount Pictures) initially released their movies exclusively in the DIVX format. However, video rental services found the multi-use DVD more attractive, and videophiles who collected films rejected the idea of a pay-per-view disc.
Memory cards, with several implementations: CompactFlash vs. Memory Stick vs. MultiMediaCard (MMC) vs. Secure Digital card (SD) vs. SmartMedia vs. Miniature Card. The format war became even more confusing with introduction of xD-Picture Card, XQD card and CFast in the next decade. This ongoing contest is complicated by the existence of multiple variants of the various formats. Some of these, such as miniSD / microSD, are compatible with their parent formats, while later Memory Sticks break compatibility with the original format. After SD was introduced in 1999, it eventually won the war in the early 2000s decade when companies that had exclusively supported other formats in the past, such as Fujifilm, Olympus and Sony, began to use SD card in their products. The CF slots continued to be favoured for high-end cameras but there are adapters for SD cards to be used in them.
Hi-fi digital audio discs: DVD-Audio versus SACD. These discs offered all the advantages of a CD but with higher audio quality. The players and discs were reverse compatible (the new Hi-fi players could play most 12 cm optical disc formats) but listening to the newer formats require a hardware upgrade. SACD was acclaimed by Sony marketeers as offering slightly better technical quality through its new PDM "bitstream" system and a greater number of SACD titles available. However, the two formats continue to coexist due to "hybrid" players that play both formats with equal ease. Neither DVD-Audio nor SACD won a significant percentage of the recorded audio market. A significant reason was the customer preference for easy-to-transport lossy compressed formats such as MP3 and AAC. In 2013, music companies led by Universal Music Group have launched Blu-ray Discs with high-resolution PCM audio, branded as High Fidelity Pure Audio, as an alternative format with the same objectives.
Television auxiliary video inputs: Composite video vs. S-video. Composite video inputs had more widespread support since they used the ubiquitous RCA connector previously used only with audio devices, but S-video used a 4-pin DIN connector exclusively for the video bus.
Wireless communication standards: Through the late 1990s, proponents of Bluetooth (such as Sony-Ericsson) and WiFi competed to gain support for positioning one of these standards as the de facto computer-to-computer wireless communication protocol. This competition ended around 2000 with WiFi the undisputed winner (largely due to a very slow rollout of Bluetooth networking products). However, in the early 2000s, Bluetooth was repurposed as a device-to-computer wireless communication standard, and has succeeded well in this regard. Today's computers often feature separate equipment for both types of wireless communication.
Disk image formats for capturing digital versions of removable computer media (particularly CD-ROMs and DVD-ROMs): ISO vs. CUE/BIN vs. NRG vs. MDS vs. DAA, etc. Although the details of capturing images are complex (e.g., the oddities of various copy protection technologies applied to removable media), image formats have proliferated beyond reason - mainly because producers of image-creating software often like to create a new format with touted properties in order to bolster market share.
Streaming media formats: AVI, QuickTime (MOV), Windows Media (WMV), RealMedia (RA), Liquid Audio, MPEG, DivX, XviD, and a large host of other streaming media formats cropped up, particularly during the internet boom of the late 1990s. The wildly large number of formats is very redundant and leads to a large number of software and hardware incompatibilities (e.g., a large number of competing rendering pipelines are typically implemented in web browsers and portable video players.)
Single-serve coffee containers: Major players include Nestlé’s Nespresso which started in 1976, but became popular in late 1990s and was later joined by Senseo, Caffitaly, Keurig and Tassimo. These systems were created to give out a single serving of fresh ground coffee through a capsule. By the end of 2010s Nespresso came out on top as the system lost its patents, and rival companies can make cheaper capsules.
2000s
Recordable DVD formats: DVD+R versus DVD-R and DVD-RAM. DVD-RAM has largely relegated to a niche market, but both of the other recordable DVD formats remain available. Since practically all PC based DVD drives and most new DVD recorders support both formats (designated as DVD±R recorders), the 'war' is effectively moot.
Digital audio data compression formats: MP3 versus Ogg Vorbis versus MPEG4 Advanced Audio Coding versus HE-AAC/AACplus versus Windows Media Audio codecs versus Free Lossless Audio Codec (FLAC). Each format has found its own niche — MPEG1 audio layer 3, abbreviated MP3, was developed for audio encoding of the DVD and has remained a de facto standard for audio encoding. A technically better compression technique, MPEG4 (more commonly known as AAC) was subsequently developed and found favor with most commercial music distributors. The addition of Spectral Band Replication (AACplus or HE-AAC) allows the format to recreate high-frequency components/harmonics missing from other compressed music. Vorbis is most commonly used by game developers who have need for a high-quality audio, do not want to pay the licensing fees attached to other codecs, and did not need existing compatibility and name-recognition of MP3. Flac, a lossless format, emerged later and has become accepted by audiophiles. Consumer outcry against software incompatibility has prompted portable music player manufacturers such as Apple and Creative to support multiple formats.
High-definition optical disc formats: Blu-ray Disc versus HD DVD. Several disc formats that were intended to improve on the performance of the DVD were developed, including Sony's Blu-ray and Toshiba's HD DVD, as well as HVD, FVD and VMD. The first HD-DVD player was released in March 2006, followed quickly by a Blu-ray player in June 2006. In addition to the home video standalone players for each format, Sony's PlayStation 3 video game console offers a Blu-ray Disc player and its games use that format as well. The format war went largely in Blu-ray's favor after the largest movie studio supporting HD DVD, Warner Bros., decided to abandon releasing films on HD-DVD in January 2008. Shortly thereafter, several major North American rental services and retailers such as Netflix, Best Buy, Walmart, etc. and disc manufacturers such as CMC Magnetics, Ritek, Anwell, and others, announced the exclusive support for Blu-ray products, ending the format war.
Ultra-wideband networking technology — in early 2006, an IEEE standards working group disbanded because two factions could not agree on a single standard for a successor to Wi-Fi. (WiMedia Alliance, IEEE 802.15, WirelessHD)
Automotive interfaces for charging mobile devices: cigar lighter receptacles delivered 12 volts DC and USB 5 volts. The 5-volt system derived from PC data buses, while the 12 volt system derived from the automobile's electrical system. The popularity of cigar-lighter-to-USB adapters for charging cell phones is what led to this movement, and later automobiles were equipped with both (sometimes with USB on the car radio faceplate).
2010s
Digital video: H.264 and H.265 (patented standards that require royalty payments) versus royalty-free alternatives like VP8, VP9, and Theora that attempt to avoid patent infringement.
4G wireless broadband WiMAX versus LTE Advanced.
Power-line communication as an alternative to Wi-Fi or wired Ethernet for broadband home networking (LAN) purposes: IEEE 1901, branded as HomePlug AV/AV2 and commercially marketed by networking hardware brands such as Devolo, D-Link, TP-Link and Zyxel, vs. the more recent, but similar ITU standard G.hn promoted by some major ISPs and hardware manufacturers part of the HomeGrid Forum trade association.
Premium Large Format (PLF) cinema: IMAX versus Dolby Cinema versus Barco Escape versus China Film Giant Screen versus RPX versus Extra Experience versus UltraAVX.
Virtual reality headsets: Oculus Rift using Oculus' OVR API vs. HTC Vive's SteamVR
Wireless charging standard: Qi from Wireless Power Consortium versus WiPower from The Alliance for Wireless Power
Web browser plugin API: NPAPI versus PPAPI, championed by Google, which announced it was dropping NPAPI support from Chrome on September 1, 2015.
Combined Charging System versus CHAdeMO quick charging methods for battery electric vehicles.
The ITU-R Recommendation BT.2020 had defined 10 bit for each color channel for the future 8K UHDTV in 2012. Dolby developed an extension for Dolby Cinema in 2014 where the new Dolby Vision format has a 12 bit color depth per channel. Dolby Vision is not royalty free so that Samsung developed an alternative HDR10+ format for HDR video in 2017. Its rival LG does support Dolby Vision. With widespread availability of HDR television during 2018 it can be seen that products supporting Dolby Vision do also allow HDR10+ as input.
Modern Immersive Audio standards (formats with object tracks): Dolby Atmos vs DTS:X vs MPEG-H 3D Audio vs Auro-3D vs Sony 360 Reality Audio
See also
Browser war
Console war
Editor war
High definition optical disc format war
Not invented here
Total Hi Def
Vendor lock-in
References
External links
https://www.cnbc.com/id/23230252
Format Wars: A History of What-Could-Have-Been, From Betamax to Dvorak
Technological change
Mass media rivalries
Business rivalries |
263313 | https://en.wikipedia.org/wiki/NetBIOS%20Frames | NetBIOS Frames | NetBIOS Frames (NBF) is a non-routable network- and transport-level data protocol most commonly used as one of the layers of Microsoft Windows networking in the 1990s. NBF or NetBIOS over IEEE 802.2 LLC is used by a number of network operating systems released in the 1990s, such as LAN Manager, LAN Server, Windows for Workgroups, Windows 95 and Windows NT. Other protocols, such as NBT (NetBIOS over TCP/IP), and NBX (NetBIOS-over-IPX/SPX) also implement the NetBIOS/NetBEUI services over other protocol suites.
The NBF protocol is broadly, but incorrectly, referred to as NetBEUI. This originates from the confusion with NetBIOS Extended User Interface, an extension to the NetBIOS API that was originally developed in conjunction with the NBF protocol; both the protocol and the NetBEUI emulator were originally developed to allow NetBIOS programs to run over IBM's new Token Ring network. Microsoft caused this confusion by labelling its NBF protocol implementation NetBEUI. NBF is a protocol and the original NetBEUI was a NetBIOS application programming interface extension.
Overview
NBF protocol uses 802.2 type 1 mode to provide the NetBIOS/NetBEUI name service and datagram service, and 802.2 type 2 mode to provide the NetBIOS/NetBEUI session service (virtual circuit). NBF protocol makes wide use of broadcast messages, which accounts for its reputation as a chatty interface. While the protocol consumes few network resources in a very small network, broadcasts begin to adversely impact performance and speed when the number of hosts present in a network grows.
Sytek developed NetBIOS for IBM for the PC-Network program and was used by Microsoft for MS-NET in 1985. In 1987, Microsoft and Novell utilized it for their network operating systems LAN Manager and NetWare.
Because NBF protocol is unroutable it can only be used to communicate with devices in the same broadcast domain, but being bridgeable it can also be used to communicate with network segments connected to each other via bridges. This means that NBF is only well-suited for small to medium-sized networks, where it has such an advantage over TCP/IP that requires little configuration. The NetBIOS/NetBEUI services must be implemented atop other protocols, such as IPX and TCP/IP (see above) in order to be of use in an internetwork.
Services
NetBIOS/NetBEUI provides three distinct services:
Name service for name registration and resolution
Datagram distribution service for connectionless communication
Session service for connection-oriented communication
NBF protocol implements all of these services.
Name service
In order to start sessions or distribute datagrams, an application must register its NetBIOS/NetBEUI name using the name service. To do so, an "Add Name Query" or "Add Group Name Query" packet is broadcast on the network. If the NetBIOS/NetBEUI name is already in use, the name service, running on the host that owns the name, broadcasts a "Node Conflict" message on the network.
In addition, to start a session or to send a datagram to a particular host rather than to broadcast the datagram, NBF protocol has to determine the MAC address of the host with a given NetBIOS/NetBEUI name; this is done by sending a "Name Query" packet, the response to which will have the MAC address of the host sending the response, i.e. the host with that name.
Datagram distribution service
Datagram mode is "connectionless". A datagram is sent with a "Datagram" packet if it is being sent to a particular NetBIOS/NetBEUI name, or a "Datagram Broadcast" packet if it is being sent to all NetBIOS/NetBEUI names on the network.
Session service
Session mode lets two computers establish a connection for a "conversation," allows larger messages to be handled, and provides error detection and recovery.
Sessions are established by exchanging packets. The computer establishing the session sends a "Name Query" request, specifying that a session should be initialized. The computer with which the session is to be established will respond with a "Name Recognized" response indicating either that no session can be established (either because that computer is not listening for sessions being established to that name or because no resources are available to establish a session to that name) or that a session can be established (in which case the response will include a local session number to be used in subsequent packets). The computer that is starting the session will then send a "Session Initialize" request which will prompt a "Session Confirm" response.
Data is transmitted during an established session by data packets. IEEE 802.2 handles flow control and retransmission of data packets. Because NetBIOS/NetBEUI allows packets to be sent that are larger than the largest packet that could be transmitted on a particular MAC layer, a NetBIOS/NetBEUI packet might have to be transmitted as a sequence of "Data First Middle" packets and a "Data Only Last" packet; packets that do not need to be segmented in that fashion will be sent as a single "Data Only Last" packet. An acknowledgment will be sent for all "Data Only Last" packets that are successfully received; this will also acknowledge all preceding "Data First Middle" packets.
Sessions are closed by sending a "Session End" request.
Availability
NBF protocol – apart from DOS, OS/2 and Unix implementations – was officially supported by Microsoft on almost every version of Windows up to Windows 2000, but its use has decreased quickly since the development of NBT.
Microsoft officially dropped support starting with Windows XP, but it is included on the Windows XP CD-ROM and can be installed manually. Windows Vista does not include NetBEUI (means NBF) support at all, but the Windows XP NetBEUI support drivers can be used.
References
External links
LAN Technical Reference: 802.2 and NetBIOS APIs – includes NBF protocol specifications
Comparison of Windows NT Network Protocols
Windows communication and services
Network protocols |
42571268 | https://en.wikipedia.org/wiki/Ave%21Comics | Ave!Comics | Ave!Comics Production is a privately owned French company editing comics on smartphones, tablets and computers. It was founded in 2008 and it is a subsidiary of Aquafadas, a software development company in digital publishing owned by Kobo Inc.
AveComics is a comic book store for digital comic books that can be used on computers, tablets, and smartphones.(iOS, Android) Readers can buy and read comic books, manga and graphic novels in French, English and Spanish. AveComics uses a technology created by Aquafadas for comics transformation, distribution and reading, based around its AVE format.
The AveComics application was also a finalist in the BlackBerry Innovation Awards 2009, in the "Entertainment" category.
Company history
Aquafadas, a company working on creative software for Flash, HTML5, photo, and video editing, created the application MyComics to allow the reading of comics on mobile in 2006.
This application was made available in 2008, to enable the reading and storing of comics on iPhone and iPod Touch. A reading system adapted to low resolution screens was also available. In October of the same year, the company launched a comics library on both devices, in partnership with the Angoulême International Comics Festival, Fnac and SNCF. This library included the official selection of the festival, and was downloaded over 150 000 times.
In December 2008 "The Adventures of Lucky Luke n°3", at was published on both devices. The comic made a 50 000 € turnover. In April 2009, "Les Blondes" 10th volume was the top-selling comic for 10 months on the AppStore.
After, in August 2009, the AveComics application was launched on iPhone, iPod Touch and BlackBerry. The company's website was launched in September when more than 100 titles were available on smartphones and computers.
Catalogue
AveComics works with over 80 international publishers including Glénat, Marsu Productions, Delcourt, Casterman, Soleil, Ubisoft, Les Humanoïdes Associés and Mad Fabrik. Comics such as "Assassin's Creed", "Talisman", "Titeuf", and "Seoul District" are sold by the company.
Award
Grand Prix Software Venture Capital - Senate 2008.
References
External links
Comics publishing companies
Software companies of France
Software companies established in 2008
French companies established in 2008
Graphics software |
19759757 | https://en.wikipedia.org/wiki/Andrew%20Zisserman | Andrew Zisserman | Andrew Zisserman (born 1957) is a British computer scientist and a professor at the University of Oxford, and a researcher in computer vision. As of 2014 he is affiliated with DeepMind.
Education
Zisserman received the Part III of the Mathematical Tripos, and his PhD in theoretical physics from the Sunderland Polytechnic.
Career and research
In 1984 he started to work in the field of computer vision at the University of Edinburgh. Together with Andrew Blake they wrote the book Visual reconstruction published in 1987, which is considered one of the seminal works in the field of computer vision. According to Fitzgibbon (2008) this publication was "one of the first treatments of the energy minimisation approach to include an algorithm (called "graduated non-convexity") designed to directly address the problem of local minima, and furthermore to include a theoretical analysis of its convergence."
In 1987 he moved back to England to the University of Oxford, where he joined Mike Brady's newly founded robotics research group as a University Research Lecturer, and started to work on multiple-view geometry. According to Fitzgibbon (2008) his "geometry was successful in showing that computer vision could solve problems which humans could not: recovering 3D structure from multiple images required highly trained photogrammetrists and took a considerable amount of time. However, Andrew's interests turned to a problem where a six-year-old child could easily beat the algorithms of the day: object recognition."
Publications
Zisserman has published several articles, some of the most highly cited works in the field, and has edited a series of books. A selection:
1987. Visual reconstruction. With Andrew Blake.
1992. Geometric invariance in computer vision. Edited with Joseph Mundy.
1994. Applications of invariance in computer vision : second joint European-US workshop, Ponta Delgada, Azores, Portugal, 9–14 October 1993 : proceedings. With Joseph L. Mundy and David Forsyth (eds).
1996. ECCV '96 International Workshop (1996 : Cambridge, England) Object representation in computer vision II : ECCV '96 International Workshop, Cambridge, UK, 13–14 April 1996 : proceedings. With Jean Ponce, and Martial Hebert (eds.).
1999. International Workshop on Vision Algorithms (1999 : Corfu, Greece) Vision algorithms : theory and practice : International Workshop on Vision Algorithms, Corfu, Greece, 21–22 September 1999 : proceedings. With Bill Triggs and Richard Szeliski (eds.).
2000. Multiple view geometry in computer vision. With Richard Hartley. Second edition 2009.
2008. Computer vision – ECCV 2008 : 10th European conference on computer vision, Marseille, France, 12–18 October 2008, proceedings, part I. Edited with David Forsyth and Philip Torr.
Awards and honours
Zisserman is an ISI Highly Cited researcher. He is the only person to have been awarded the Marr Prize three times, in 1993, in 1998, and in 2003. He was elected Fellow of the Royal Society in 2007. In 2008 he was awarded BMVA Distinguished Fellowship. In 2013 he received the Distinguished Researcher Award at ICCV. Zisserman received the 2017 Royal Society Milner Award “in recognition of his exceptional achievements in computer programming which includes work on computational theory and commercial systems for geometrical images.”
References
1957 births
Living people
Computer vision researchers
Fellows of the Royal Society
Alumni of the University of Sunderland |
324364 | https://en.wikipedia.org/wiki/Glibc | Glibc | The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library. Despite its name, it now also directly supports C++ (and, indirectly, other programming languages). It was started in the 1980s by the Free Software Foundation (FSF) for the GNU operating system.
Released under the GNU Lesser General Public License, glibc is free software. The GNU C Library project provides the core libraries for the GNU system, as well as many systems that use Linux as the kernel. These libraries provide critical APIs including ISO C11, POSIX.1-2008, BSD, OS-specific APIs and more. These APIs include such foundational facilities as open, read, write, malloc, printf, getaddrinfo, dlopen, pthread_create, crypt, login, exit and more.
History
The glibc project was initially written mostly by Roland McGrath, working for the Free Software Foundation (FSF) in the 1980s as a teenager. In February 1988, FSF described glibc as having nearly completed the functionality required by ANSI C. By 1992, it had the ANSI C-1989 and POSIX.1-1990 functions implemented and work was under way on POSIX.2. In September 1995 Ulrich Drepper made his first contribution to the glibc and by 1997 most commits were made by him. Drepper held the maintainership position for many years and until 2012 accumulated 63% of all commits to the project.
In May 2009 glibc was migrated to a Git repository.
In 2010, a licensing issue was resolved which was caused by the Sun RPC implementation in glibc that was not GPL compatible. It was fixed by re-licensing the Sun RPC components under the BSD license.
In July 2017, 30 years after he started glibc, Roland McGrath announced his departure, "declaring myself maintainer emeritus and withdrawing from direct involvement in the project. These past several months, if not the last few years, have proven that you don't need me anymore".
Version history
For most systems, the version of glibc can be obtained by executing the lib file (for example, /lib/libc.so.6).
Forks and variants
In 1994, the developers of the Linux kernel forked glibc. Their fork, "Linux libc", was maintained separately until around 1998. Because the copyright attribution was insufficient, changes could not be merged back to the GNU Libc. When the FSF released glibc 2.0 in January 1997, the kernel developers discontinued Linux libc due to glibc 2.0's superior compliance with POSIX standards. glibc 2.0 also had better internationalisation and more in-depth translation, IPv6 capability, 64-bit data access, facilities for multithreaded applications, future version compatibility, and the code was more portable. The last-used version of Linux libc used the internal name (soname) . Following on from this, glibc 2.x on Linux uses the soname
In 2009, Debian and a number of derivatives switched from glibc to the variant eglibc. Eglibc was supported by a consortium consisting of Freescale, MIPS, MontaVista and Wind River. It contained changes that made it more suitable for embedded usage and had added support for architectures that were not supported by glibc, such as the PowerPC e500. The code of eglibc was merged back into glibc at version 2.20. Since 2014, eglibc is discontinued. The Yocto Project and Debian also moved back to glibc since the release of Debian Jessie.
Steering committee
Starting in 2001 the library's development had been overseen by a committee, with Ulrich Drepper kept as the lead contributor and maintainer. The steering committee installation was surrounded by a public controversy, as it was openly described by Ulrich Drepper as a failed hostile takeover maneuver by Richard Stallman.
In March 2012, the steering committee voted to disband itself and remove Drepper in favor of a community-driven development process, with Ryan Arnold, Maxim Kuvyrkov, Joseph Myers, Carlos O'Donell, and Alexandre Oliva holding the responsibility of GNU maintainership (but no extra decision-making power).
Functionality
glibc provides the functionality required by the Single UNIX Specification, POSIX (1c, 1d, and 1j) and some of the functionality required by ISO C11, ISO C99, Berkeley Unix (BSD) interfaces, the System V Interface Definition (SVID) and the X/Open Portability Guide (XPG), Issue 4.2, with all extensions common to XSI (X/Open System Interface) compliant systems along with all X/Open UNIX extensions.
In addition, glibc also provides extensions that have been deemed useful or necessary while developing GNU.
Supported hardware and kernels
glibc is used in systems that run many different kernels and different hardware architectures. Its most common use is in systems using the Linux kernel on x86 hardware, however, officially supported hardware includes: 32-bit ARM and its newer 64-bit ISA (AArch64), ARC, C-SKY, DEC Alpha, IA-64, Motorola m68k, MicroBlaze, MIPS, Nios II, PA-RISC, PowerPC, RISC-V, s390, SPARC, and x86 (old versions support TILE). It officially supports the Hurd and Linux kernels. Additionally, there are heavily patched versions that run on the kernels of FreeBSD and NetBSD (from which Debian GNU/kFreeBSD and Debian GNU/NetBSD systems are built, respectively), as well as a forked-version of OpenSolaris. It is also used (in an edited form) and named in BeOS and Haiku.
Use in small devices
glibc has been criticized as being "bloated" and slower than other libraries in the past, e.g. by Linus Torvalds and embedded Linux programmers. For this reason, several alternative C standard libraries have been created which emphasize a smaller footprint. However, many small-device projects use GNU libc over the smaller alternatives because of its application support, standards compliance, and completeness. Examples include Openmoko and Familiar Linux for iPaq handhelds (when using the GPE display software).
Compatibility layers
There are compatibility layers ("shims") to allow programs written for other ecosystems to run on glibc interface offering systems. These include libhybris, a compatibility layer for Android's Bionic, and Wine, which can be seen as a compatibility layer from Windows APIs to glibc and other native APIs available on Unix-like systems.
See also
Gnulib
Linux kernel API
Notes
References
External links
C standard library
Cross-platform free software
Free computer libraries
Free software programmed in C
C Library
Interfaces of the Linux kernel
Linux APIs |
28516912 | https://en.wikipedia.org/wiki/Virtual%20environment%20software | Virtual environment software | Virtual environment software refers to any software, program or system that implements, manages and controls multiple virtual environment instances (self definition). The software is installed within an organization's existing IT infrastructure and controlled from within the organization itself. From a central interface the software creates an interactive and immersive experience for administrators and users.
Uses
Virtual environment software can be purposed for any use, from advanced military training in a virtual environment simulator to virtual classrooms. Many Virtual Environments are being purposed as branding channels for products and services by enterprise corporations and non-profit groups.
Currently, virtual event and virtual tradeshow have been the early accepted uses of virtual event services. More recently, virtual environment software platforms have offered choice to enterprises – with the ability to connect people across the Internet. Virtual environment software enables organizations to extend their market and industry reach while reducing (all travel-related) costs and time.
Background
Providers of virtual environments have tended to focus on the early marketplace adoption of virtual events. These providers are typically software as a service (SaaS)-based. Most have evolved from the streaming media/gaming arena and social networking applications.
This early virtual event marketplace is now moving towards 3D persistent environments, where enterprises combine e-commerce, social media as core operating systems, and is evolving into virtual environments for branding, customer acquisition, and service centers. A persistent environment enables users, visitors and administrators to re-visit a part or parts of the event or session. Information gathered by attendees and end users is typically stored in a virtual briefcase typically including contact information and marketing materials.
Potential advantages
Virtual environment software has the potential to maximize the benefits of both online and on-premises environments. A flexible platform would allow companies to deploy the software in both environments while having the ability to run reports on data in both locations from a centralized interface. The advent of 'persistent environments' lends itself to a rich integration with enterprise technology assets which can be solved efficiently through the implementation of software.
Virtual environment software can be applied to virtual learning environments (also called learning management systems or LMS). In the US, universities, colleges and similar higher education institutions have adopted virtual learning environments to economize time, resources and course effectiveness.
Future
Virtual events, trade shows and environments are not projected to replace physical events and interactions. Instead they are seen as extensions and enhancements to these physical events and environments by increasing lead generation and reaching a wider audience while decreasing expenses. The virtual environments industry has been projected to reach a market size in the billions of dollars.
Market availability
Virtual environment software is an alternative to bundled services. Companies known to provide virtual environment software are UBIVENT, InterCall or vcopious.
See also
Active Worlds virtual reality multi-user 3D chat platform
Blaxxun virtual reality multi-user 3D chat platform
Flux, freely downloadable VRML/X3D editor/browser, released by authors of these standards
FreeWRL, free open source VRML/X3D browser
List of vector graphics markup languages
MeshLab open source mesh processing system that can export VRML/X3D
OZ Virtual
Seamless3d free Open Source 3D modeling software
Virtual tour
Web3D
References
External links
Virtual Reality In The Event Industry
3D computer graphics
Graphics standards
Vector graphics markup languages
Virtual reality |
22989201 | https://en.wikipedia.org/wiki/Pan-genome | Pan-genome | In the fields of molecular biology and genetics, a pan-genome (pangenome or supragenome) is the entire set of genes from all strains within a clade. More generally, it is the union of all the genomes of a clade. The pan-genome can be broken down into a "core pangenome" that contains genes present in all individuals, a "shell pangenome" that contains genes present in two or more strains, and a "cloud pangenome" that contains genes only found in a single strain. Some authors also refer to the cloud genome as "accessory genome" containing 'dispensable' genes present in a subset of the strains and strain-specific genes. Note that the use of the term 'dispensable' has been questioned, at least in plant genomes, as accessory genes play "an important role in genome evolution and in the complex interplay between the genome and the environment". The field of study of the pangenome is called pangenomics.
The genetic repertoire of a bacterial species is much larger than the gene content of an individual strain.
Some species have open (or extensive) pangenomes, while others have closed pangenomes. For species with a closed pan-genome, very few genes are added per sequenced genome (after sequencing many strains), and the size of the full pangenome can be theoretically predicted. Species with an open pangenome have enough genes added per additional sequenced genome that predicting the size of the full pangenome is impossible. Population size and niche versatility have been suggested as the most influential factors in determining pan-genome size.
Pangenomes were originally constructed for species of bacteria and archaea, but more recently eukaryotic pan-genomes have been developed, particularly for plant species. Plant studies have shown that pan-genome dynamics are linked to transposable elements. The significance of the pan-genome arises in an evolutionary context, especially with relevance to metagenomics, but is also used in a broader genomics context. An open access book reviewing the pangenome concept and its implications, edited by Tettelin and Medini, was published in the spring of 2020.
Etymology
The term 'pangenome' was defined with its current meaning by Tettelin et al. in 2005; it derives 'pan' from the Greek word παν, meaning 'whole' or 'everything', while the genome is a commonly used term to describe an organism's complete genetic material. Tettelin et al. applied the term specifically to bacteria, whose pangenome "includes a core genome containing genes present in all strains and a dispensable genome composed of genes absent from one or more strains and genes that are unique to each strain."
Parts of the pangenome
Core
Is the part of the pangenome that is shared by every genome in the tested set. Some authors have divided the core pangenome in hard core, those families of homologous genes that has at least one copy of the family shared by every genome (100% of genomes) and the soft core or extended core, those families distributed above a certain threshold (90%). In a study that involves the pangenomes of Bacillus cereus and Staphylococcus aureus, some of them isolated from the international spacial station, the thresholds used for segmenting the pangenomes were as follows: "Cloud," "Shell," and "Core" corresponding to gene families with presence in <10%, 10 to 95%, and >95% of the genomes, respectively.
The core genome size and proportion to the pangenome depends on several factors, but it is especially dependent on the phylogenetic similarity of the considered genomes. For example, the core of two identical genomes would also be the complete pangenome. The core of a genus will always be smaller than the core genome of a species. Genes that belong to the core genome are often related to house keeping functions and primary metabolism of the lineage, nevertheless, the core gene can also contain some genes that differentiate the species from other species of the genus, i.e. that may be related pathogenicity to niche adaptation.
Shell
Is the part of the pangenome shared by the majority of the genomes in a pangenome. There is not a universally accepted threshold to define the shell genome, some authors consider a gene family as part of the shell pangenome if it shared by more than 50% of the genomes in the pangenome. A family can be part of the shell by several evolutive dynamics, for example by gene loss in a lineage where it was previously part of the core genome, such is the case of enzymes in the tryptophan operon in Actinomyces, or by gene gain and fixation of a gene family that was previously part of the dispensable genome such is the case of trpF gene in several Corynebacterium species.
Dispensable
The dispensable genome are those gene families shared by a minimal subset of the genomes in the pangenome, it includes singletons or genes present in only one of the genomes. It is also known as the cloud or the peripheral genome. Gene families in this category are often related to ecological adaptation.
Classification
The pan-genome can be classified as open or closed based on the alpha value of the Heap law:
Number of gene families.
Number of genomes.
Constant of proportionality.
Exponent calculated in order to adjust the curve of number of gene families vs new genome.
if then the pangenome is considered open.
if then the pangenome is considered closed.
Usually, the pangenome software can calculate the parameters of the Heap law that best describe the behavior of the data.
Open pangenome
An open pangenome occurs when in one taxonomic lineage keeps increasing the number of new gene families and this increment does not seem to be asymptotic regardless how many new genomes are added to the pangenome. Escherichia coli is an example of a species with an open pangenome. Any E. coli genome size is in the range of 4000-5000 genes and the pangenome size estimated for this species with approximately 2000 genomes is composed by 89,000 different gene families. The pangenome of the domain bacteria is also considered to be open.
Closed Pangenome
A closed pangenome occurs in a lineage when only few gene families are added when new genomes are incorporated into the pangenome analysis, and the total amount of gene families in the pangenome seem to be asymptotic to one number. It is believed that parasitism and species that are specialists in some ecological niche tend to have closed pangenomes. Staphylococcus lugdunensis is an example of a commensal bacteria with closed pan-genome.
History
Pangenome
The original pangenome concept was developed by Tettelin et al. when they analyzed the genomes of eight isolates of Streptococcus agalactiae, where they described a core genome shared by all isolates, accounting for approximately 80% of any single genome, plus a dispensable genome consisting of partially shared and strain-specific genes. Extrapolation suggested that the gene reservoir in the S. agalactiae pan-genome is vast and that new unique genes would continue to be identified even after sequencing hundreds of genomes. The pangenome comprises the entirety of the genes discovered in the sequenced genomes of a given microbial species and it can change when new genomes are sequenced and incorporated into the analysis.
The pangenome of a genomic lineage accounts for the intra lineage gene content variability. Pangenome evolves due to: gene duplication, gene gain and loss dynamics and interaction of the genome with mobile elements that are shaped by selection and drift. Some studies point that prokaryotes pangenomes are the result of adaptive, not neutral evolution that confer species the ability to migrate to new niches.
Supergenome
The supergenome can be thought of as the real pangenome size if all genomes from a species were sequenced. It is defined as all genes accessible for being gained by a certain species. It cannot be calculated directly but its size can be estimated by the pangenome size calculated from the available genome data. Estimating the size of the dispensable genome can be troubling because of its dependence on the occurrence of rare genes and genomes. In 2011 genomic fluidity was proposed as a measure to categorize the gene-level similarity among groups of sequenced isolates.
In some lineages the supergenomes did appear infinite, as is the case of the Bacteria domain.
Metapangenome
'Metapangenome' has been defined as the outcome of the analysis of pangenomes in conjunction with the environment where the abundance and prevalence of gene clusters and genomes are recovered through shotgun metagenomes. The combination of metagenomes with pangenomes, also referred to as "metapangenomics", reveals the population-level results of habitat-specific filtering of the pangenomic gene pool.
Other authors consider that Metapangenomics expands the concept of pangenome by incorporating gene sequences obtained from uncultivated microorganisms by a metagenomics approach. A metapangenome comprises both sequences from metagenome-assembled genomes (MAGs) and from genomes obtained from cultivated microorganisms. Metapangenomics has been applied to assess diversity of a community, microbial niche adaptation, microbial evolution, functional activities, and interaction networks of the community. The Anvi'o platform developed a workflow that integrates analysis and visualization of metapangenomes by generating pangenomes and study them in conjunction with metagenomes.
Examples
Prokaryote pangenome
In 2018, 87% of the available whole genome sequences were bacteria fueling researchers interest in calculating prokaryote pangenomes at different taxonomic levels. In 2015, the pangenome of 44 strains of Streptococcus pneumoniae bacteria shows few new genes discovered with each new genome sequenced (see figure). In fact, the predicted number of new genes dropped to zero when the number of genomes exceeds 50 (note, however, that this is not a pattern found in all species). This would mean that S. pneumoniae has a 'closed pangenome'. The main source of new genes in S. pneumoniae was Streptococcus mitis from which genes were transferred horizontally. The pan-genome size of S. pneumoniae increased logarithmically with the number of strains and linearly with the number of polymorphic sites of the sampled genomes, suggesting that acquired genes accumulate proportionately to the age of clones. Another example of prokaryote pan-genome is Prochlorococcus, the core genome set is much smaller than the pangenome, which is used by different ecotypes of Prochlorococcus. Open pan-genome has been observed in environmental isolates such as Alcaligenes sp. and Serratia sp., showing a sympatric lifestyle. Nevertheless, open pangenome is not exclusive to free living microorganisms, a 2015 study on Prevotella bacteria isolated from humans, compared the gene repertoires of its species derived from different body sites of human. It also reported an open pan-genome showing vast diversity of gene pool.
Archaea also have some pangenome studies. Halobacteria pangenome shows the following gene families in the pangenome subsets: core (300), variable components (Softcore: 998, Cloud:36531, Shell:11784).
Eukaryote pangenome
Eukaryote organisms such as fungi, animals and plants have also shown evidence of pangenomes. In four fungi species whose pangenome has been studied, between 80 and 90% of gene models were found as core genes. The remaining accessory genes were mainly involved in pathogenesis and antimicrobial resistance.
In animals, the human pangenome is being studied. In 2010 a study estimated that a complete human pan-genome would contain ∼19–40 Megabases of novel sequence not present in the extant reference genome. In 2021 the Human Pangenome consortium has the goal to acknowledge the human genome diversity.
Among plants, there are examples of pangenome studies in model species, both diploid and polyploid, and a growing list of crops.
An emerging plant-based concept is that of pan-NLRome, which is the repertoire of nucleotide-binding leucine-rich repeat (NLR) proteins, intracellular immune receptors that recognize pathogen proteins and confer disease resistance.
Virus pangenome
Virus does not necessarily have genes extensively shared by clades such as is the case of 16S in bacteria, and therefore the core genome of the full Virus Domain is empty. Nevertheless, several studies have calculated the pangenome of some viral lineages. The core genome from six species of pandoraviruses comprises 352 gene families only 4.7% of the pangenome, resulting in an open pangenome.
Data structures
The number of sequenced genomes is continuously growing "simply scaling up established bioinformatics pipelines will not be sufficient for leveraging the full potential of such rich genomic data sets". Pangenome graphs are emerging data structures designed to represent pangenomes and to efficiently map reads to them. They have been reviewed by Eizenga et al
Software tools
As interest in pangenomes increased, there have been several software tools developed to help analyze this kind of data.
To start a pangenomic analysis the first step is the homogenization of genome annotation. The same software should be used to annotate all genomes used, such as GeneMark or RAST. In 2015, a group reviewed the different kinds of analyses and tools a researcher may have available. There are seven kinds of software developed to analyze pangenomes: Those dedicated to cluster homologous genes; identify SNPs; plot pangenomic profiles; build phylogenetic relationships of orthologous genes/families of strains/isolates; function-based searching; annotation and/or curation; and visualization.
The two most cited software tools for pangenomic analysis at the end of 2014 were Panseq and the pan-genomes analysis pipeline (PGAP). Other options include BPGA – A Pan-Genome Analysis Pipeline for prokaryotic genomes, GET_HOMOLOGUES, Roary. and PanDelos. In 2015 a review focused on prokaryote pangenomes and another for plant pan-genomes were published. Among the first software packages designed for plant pangenomes were PanTools. and GET_HOMOLOGUES-EST. In 2018 panX was released, an interactive web tool that allows inspection of gene families evolutionary history. panX can display an alignment of genomes, a phylogenetic tree, mapping of mutations and inference about gain and loss of the family on the core-genome phylogeny. In 2019 OrthoVenn 2.0 allowed comparative visualization of families of homologous genes in Venn diagrams up to 12 genomes. In 2020 Anvi'o was available as a multiomics platform that contains pangenomic and metapangenomic analyses as well as visualization workflows. In Anvi'o, genomes are displayed in concentrical circles and each radius represents a gene family, allowing for comparison of more than 100 genomes in its interactive visualization.
In 2020, a computational comparison of tools for extracting gene-based pangenomic contents (such as GET_HOMOLOGUES, PanDelos, Roary, and others) has been released. Tools were compared from a methodological perspective, analyzing the causes that lead a given methodology to outperform other tools. The analysis was performed by taking into account different bacterial populations, which are synthetically generated by changing evolutionary parameters. Results show a differentiation of the performance of each tool that depends on the composition of the input genomes.
See also
Metagenomics
Pathogenomics
Quasispecies
References
Evolutionary biology
Genomics
Microbiology
Pathogen genomics
Omics |
363695 | https://en.wikipedia.org/wiki/BLAST%20%28biotechnology%29 | BLAST (biotechnology) | In bioinformatics, BLAST (basic local alignment search tool) is an algorithm and program for comparing primary biological sequence information, such as the amino-acid sequences of proteins or the nucleotides of DNA and/or RNA sequences. A BLAST search enables a researcher to compare a subject protein or nucleotide sequence (called a query) with a library or database of sequences, and identify database sequences that resemble the query sequence above a certain threshold. For example, following the discovery of a previously unknown gene in the mouse, a scientist will typically perform a BLAST search of the human genome to see if humans carry a similar gene; BLAST will identify sequences in the human genome that resemble the mouse gene based on similarity of sequence.
Background
BLAST, which The New York Times called the Google of biological research, is one of the most widely used bioinformatics programs for sequence searching. It addresses a fundamental problem in bioinformatics research. The heuristic algorithm it uses is much faster than other approaches, such as calculating an optimal alignment. This emphasis on speed is vital to making the algorithm practical on the huge genome databases currently available, although subsequent algorithms can be even faster.
Before BLAST, FASTA was developed by David J. Lipman and William R. Pearson in 1985.
Before fast algorithms such as BLAST and FASTA were developed, searching databases for protein or nucleic sequences was very time consuming because a full alignment procedure (e.g., the Smith–Waterman algorithm) was used.
BLAST came from the 1990 stochastic model of Samuel Karlin and Stephen Altschul They proposed "a method for estimating similarities between the known DNA sequence of one organism with that of another", and their work has been described as "the statistical foundation for BLAST." Subsequently, Altschul, along with Warren Gish, Webb Miller, Eugene Myers, and David J. Lipman at the National Institutes of Health designed the BLAST algorithm, which was published in the Journal of Molecular Biology in 1990 and cited over 75,000 times.
While BLAST is faster than any Smith-Waterman implementation for most cases, it cannot "guarantee the optimal alignments of the query and database sequences" as Smith-Waterman algorithm does. The optimality of Smith-Waterman "ensured the best performance on accuracy and the most precise results" at the expense of time and computer power.
BLAST is more time-efficient than FASTA by searching only for the more significant patterns in the sequences, yet with comparative sensitivity. This could be further realized by understanding the algorithm of BLAST introduced below.
Examples of other questions that researchers use BLAST to answer are:
Which bacterial species have a protein that is related in lineage to a certain protein with known amino-acid sequence
What other genes encode proteins that exhibit structures or motifs such as ones that have just been determined
BLAST is also often used as part of other algorithms that require approximate sequence matching.
BLAST is available on the web on the NCBI website. Different types of BLASTs are available according to the query sequences and the target databases. Alternative implementations include AB-BLAST (formerly known as WU-BLAST), FSA-BLAST (last updated in 2006), and ScalaBLAST.
The original paper by Altschul, et al. was the most highly cited paper published in the 1990s.
Input
Input sequences (in FASTA or Genbank format), database to search and other optional parameters such as scoring matrix.
Output
BLAST output can be delivered in a variety of formats. These formats include HTML, plain text, and XML formatting. For NCBI's web-page, the default format for output is HTML. When performing a BLAST on NCBI, the results are given in a graphical format showing the hits found, a table showing sequence identifiers for the hits with scoring related data, as well as alignments for the sequence of interest and the hits received with corresponding BLAST scores for these. The easiest to read and most informative of these is probably the table.
If one is attempting to search for a proprietary sequence or simply one that is unavailable in databases available to the general public through sources such as NCBI, there is a BLAST program available for download to any computer, at no cost. This can be found at BLAST+ executables. There are also commercial programs available for purchase. Databases can be found from the NCBI site, as well as from Index of BLAST databases (FTP).
Process
Using a heuristic method, BLAST finds similar sequences, by locating short matches between the two sequences. This process of finding similar sequences is called seeding. It is after this first match that BLAST begins to make local alignments. While attempting to find similarity in sequences, sets of common letters, known as words, are very important. For example, suppose that the sequence contains the following stretch of letters, GLKFA. If a BLAST was being conducted under normal conditions, the word size would be 3 letters. In this case, using the given stretch of letters, the searched words would be GLK, LKF, KFA. The heuristic algorithm of BLAST locates all common three-letter words between the sequence of interest and the hit sequence or sequences from the database. This result will then be used to build an alignment. After making words for the sequence of interest, the rest of the words are also assembled. These words must satisfy a requirement of having a score of at least the threshold T, when compared by using a scoring matrix.
One commonly used scoring matrix for BLAST searches is BLOSUM62, although the optimal scoring matrix depends on sequence similarity. Once both words and neighborhood words are assembled and compiled, they are compared to the sequences in the database in order to find matches. The threshold score T determines whether or not a particular word will be included in the alignment. Once seeding has been conducted, the alignment which is only 3 residues long, is extended in both directions by the algorithm used by BLAST. Each extension impacts the score of the alignment by either increasing or decreasing it. If this score is higher than a pre-determined T, the alignment will be included in the results given by BLAST. However, if this score is lower than this pre-determined T, the alignment will cease to extend, preventing the areas of poor alignment from being included in the BLAST results. Note that increasing the T score limits the amount of space available to search, decreasing the number of neighborhood words, while at the same time speeding up the process of BLAST
Algorithm
To run the software, BLAST requires a query sequence to search for, and a sequence to search against (also called the target sequence) or a sequence database containing multiple such sequences. BLAST will find sub-sequences in the database which are similar to subsequences in the query. In typical usage, the query sequence is much smaller than the database, e.g., the query may be one thousand nucleotides while the database is several billion nucleotides.
The main idea of BLAST is that there are often High-scoring Segment Pairs (HSP) contained in a statistically significant alignment. BLAST searches for high scoring sequence alignments between the query sequence and the existing sequences in the database using a heuristic approach that approximates the Smith-Waterman algorithm. However, the exhaustive Smith-Waterman approach is too slow for searching large genomic databases such as GenBank. Therefore, the BLAST algorithm uses a heuristic approach that is less accurate than the Smith-Waterman algorithm but over 50 times faster. [8] The speed and relatively good accuracy of BLAST are among the key technical innovations of the BLAST programs.
An overview of the BLAST algorithm (a protein to protein search) is as follows:
Remove low-complexity region or sequence repeats in the query sequence.
"Low-complexity region" means a region of a sequence composed of few kinds of elements. These regions might give high scores that confuse the program to find the actual significant sequences in the database, so they should be filtered out. The regions will be marked with an X (protein sequences) or N (nucleic acid sequences) and then be ignored by the BLAST program. To filter out the low-complexity regions, the SEG program is used for protein sequences and the program DUST is used for DNA sequences. On the other hand, the program XNU is used to mask off the tandem repeats in protein sequences.
Make a k-letter word list of the query sequence.
Take k=3 for example, we list the words of length 3 in the query protein sequence (k is usually 11 for a DNA sequence) "sequentially", until the last letter of the query sequence is included. The method is illustrated in figure 1.
List the possible matching words.
This step is one of the main differences between BLAST and FASTA. FASTA cares about all of the common words in the database and query sequences that are listed in step 2; however, BLAST only cares about the high-scoring words. The scores are created by comparing the word in the list in step 2 with all the 3-letter words. By using the scoring matrix (substitution matrix) to score the comparison of each residue pair, there are 20^3 possible match scores for a 3-letter word. For example, the score obtained by comparing PQG with PEG and PQA is respectively 15 and 12 with the BLOSUM62 weighting scheme. For DNA words, a match is scored as +5 and a mismatch as -4, or as +2 and -3. After that, a neighborhood word score threshold T is used to reduce the number of possible matching words. The words whose scores are greater than the threshold T will remain in the possible matching words list, while those with lower scores will be discarded. For example, PEG is kept, but PQA is abandoned when T is 13.
Organize the remaining high-scoring words into an efficient search tree.
This allows the program to rapidly compare the high-scoring words to the database sequences.
Repeat step 3 to 4 for each k-letter word in the query sequence.
Scan the database sequences for exact matches with the remaining high-scoring words.
The BLAST program scans the database sequences for the remaining high-scoring word, such as PEG, of each position. If an exact match is found, this match is used to seed a possible un-gapped alignment between the query and database sequences.
Extend the exact matches to high-scoring segment pair (HSP).
The original version of BLAST stretches a longer alignment between the query and the database sequence in the left and right directions, from the position where the exact match occurred. The extension does not stop until the accumulated total score of the HSP begins to decrease. A simplified example is presented in figure 2.
To save more time, a newer version of BLAST, called BLAST2 or gapped BLAST, has been developed. BLAST2 adopts a lower neighborhood word score threshold to maintain the same level of sensitivity for detecting sequence similarity. Therefore, the possible matching words list in step 3 becomes longer. Next, the exact matched regions, within distance A from each other on the same diagonal in figure 3, will be joined as a longer new region. Finally, the new regions are then extended by the same method as in the original version of BLAST, and the HSPs' (High-scoring segment pair) scores of the extended regions are then created by using a substitution matrix as before.
List all of the HSPs in the database whose score is high enough to be considered.
We list the HSPs whose scores are greater than the empirically determined cutoff score S. By examining the distribution of the alignment scores modeled by comparing random sequences, a cutoff score S can be determined such that its value is large enough to guarantee the significance of the remaining HSPs.
Evaluate the significance of the HSP score.
BLAST next assesses the statistical significance of each HSP score by exploiting the Gumbel extreme value distribution (EVD). (It is proved that the distribution of Smith-Waterman local alignment scores between two random sequences follows the Gumbel EVD. For local alignments containing gaps it is not proved.). In accordance with the Gumbel EVD, the probability p of observing a score S equal to or greater than x is given by the equation
where
The statistical parameters and are estimated by fitting the distribution of the un-gapped local alignment scores, of the query sequence and a lot of shuffled versions (Global or local shuffling) of a database sequence, to the Gumbel extreme value distribution. Note that and depend upon the substitution matrix, gap penalties, and sequence composition (the letter frequencies). and are the effective lengths of the query and database sequences, respectively. The original sequence length is shortened to the effective length to compensate for the edge effect (an alignment start near the end of one of the query or database sequence is likely not to have enough sequence to build an optimal alignment). They can be calculated as
where is the average expected score per aligned pair of residues in an alignment of two random sequences. Altschul and Gish gave the typical values, , , and , for un-gapped local alignment using BLOSUM62 as the substitution matrix. Using the typical values for assessing the significance is called the lookup table method; it is not accurate. The expect score E of a database match is the number of times that an unrelated database sequence would obtain a score S higher than x by chance. The expectation E obtained in a search for a database of D sequences is given by
Furthermore, when , E could be approximated by the Poisson distribution as
This expectation or expect value "E" (often called an E score or E-value or e-value) assessing the significance of the HSP score for un-gapped local alignment is reported in the BLAST results. The calculation shown here is modified if individual HSPs are combined, such as when producing gapped alignments (described below), due to the variation of the statistical parameters.
Make two or more HSP regions into a longer alignment.
Sometimes, we find two or more HSP regions in one database sequence that can be made into a longer alignment. This provides additional evidence of the relation between the query and database sequence. There are two methods, the Poisson method and the sum-of-scores method, to compare the significance of the newly combined HSP regions. Suppose that there are two combined HSP regions with the pairs of scores (65, 40) and (52, 45), respectively. The Poisson method gives more significance to the set with the maximal lower score (45>40). However, the sum-of-scores method prefers the first set, because 65+40 (105) is greater than 52+45(97). The original BLAST uses the Poisson method; gapped BLAST and the WU-BLAST uses the sum-of scores method.
Show the gapped Smith-Waterman local alignments of the query and each of the matched database sequences.
The original BLAST only generates un-gapped alignments including the initially found HSPs individually, even when there is more than one HSP found in one database sequence.
BLAST2 produces a single alignment with gaps that can include all of the initially found HSP regions. Note that the computation of the score and its corresponding E-value involves use of adequate gap penalties.
Report every match whose expect score is lower than a threshold parameter E.
Parallel BLAST
Parallel BLAST versions of split databases are implemented using MPI and Pthreads, and have been ported to various platforms including Windows, Linux, Solaris, Mac OS X, and AIX. Popular approaches to parallelize BLAST include query distribution, hash table segmentation, computation parallelization, and database segmentation (partition). Databases are split into equal sized pieces and stored locally on each node. Each query is run on all nodes in parallel and the resultant BLAST output files from all nodes merged to yield the final output. Specific implementations include MPIblast, ScalaBLAST, DCBLAST and so on.
Program
The BLAST program can either be downloaded and run as a command-line utility "blastall" or accessed for free over the web. The BLAST web server, hosted by the NCBI, allows anyone with a web browser to perform similarity searches against constantly updated databases of proteins and DNA that include most of the newly sequenced organisms.
The BLAST program is based on an open-source format, giving everyone access to it and enabling them to have the ability to change the program code. This has led to the creation of several BLAST "spin-offs".
There are now a handful of different BLAST programs available, which can be used depending on what one is attempting to do and what they are working with. These different programs vary in query sequence input, the database being searched, and what is being compared. These programs and their details are listed below:
BLAST is actually a family of programs (all included in the blastall executable). These include:
Nucleotide-nucleotide BLAST (blastn) This program, given a DNA query, returns the most similar DNA sequences from the DNA database that the user specifies.
Protein-protein BLAST (blastp) This program, given a protein query, returns the most similar protein sequences from the protein database that the user specifies.
Position-Specific Iterative BLAST (PSI-BLAST) (blastpgp) This program is used to find distant relatives of a protein. First, a list of all closely related proteins is created. These proteins are combined into a general "profile" sequence, which summarises significant features present in these sequences. A query against the protein database is then run using this profile, and a larger group of proteins is found. This larger group is used to construct another profile, and the process is repeated.
By including related proteins in the search, PSI-BLAST is much more sensitive in picking up distant evolutionary relationships than a standard protein-protein BLAST.
Nucleotide 6-frame translation-protein (blastx) This program compares the six-frame conceptual translation products of a nucleotide query sequence (both strands) against a protein sequence database to find a protein-coding gene in a genomic sequence or to see if the cDNA corresponds to a known protein.
Nucleotide 6-frame translation-nucleotide 6-frame translation (tblastx) This program is the slowest of the BLAST family. It translates the query nucleotide sequence in all six possible frames and compares it against the six-frame translations of a nucleotide sequence database. The purpose of tblastx is to find very distant relationships between nucleotide sequences.
Protein-nucleotide 6-frame translation (tblastn) This program compares a protein query against the all six reading frames of a nucleotide sequence database. It may be used to map a protein to genomic DNA.
Large numbers of query sequences (megablast) When comparing large numbers of input sequences via the command-line BLAST, "megablast" is much faster than running BLAST multiple times. It concatenates many input sequences together to form a large sequence before searching the BLAST database, then post-analyzes the search results to glean individual alignments and statistical values.
Of these programs, BLASTn and BLASTp are the most commonly used. However, since protein sequences are better conserved evolutionarily than nucleotide sequences, tBLASTn, tBLASTx, and BLASTx, produce more reliable and accurate results when dealing with coding DNA. They also enable one to be able to directly see the function of the protein sequence, since by translating the sequence of interest before searching often gives you annotated protein hits.
Alternative versions
A version designed for comparing large genomes or DNA is BLASTZ.
CS-BLAST (Context-Specific BLAST) is an extended version of BLAST for searching protein sequences that finds twice as many remotely related sequences as BLAST at the same speed and error rate. In CS-BLAST, the mutation probabilities between amino acids depend not only on the single amino acid, as in BLAST, but also on its local sequence context. Washington University produced an alternative version of NCBI BLAST, called WU-BLAST. The rights have since been acquired to Advanced Biocomputing, LLC.
In 2009, NCBI has released a new set of BLAST executables, the C++ based BLAST+, and has released C versions until 2.2.26. Starting with version 2.2.27 (April 2013), only BLAST+ executables are available. Among the changes is the replacement of the blastall executable with separate executables for the different BLAST programs, and changes in option handling. The formatdb utility (C based) has been replaced by makeblastdb (C++ based) and databases formatted by either one should be compatible for identical blast releases. The algorithms remain similar, however, the number of hits found and their order can vary significantly between the older and the newer version.
Accelerated versions
TimeLogic offers an FPGA-accelerated implementation of the BLAST algorithm called Tera-BLAST that is hundreds of times faster.
Other formerly supported versions include:
FPGA-accelerated
Prior to their acquisition by Qiagen, CLC bio collaborated with SciEngines GmbH on an FPGA accelerator they claimed will give 188x acceleration of BLAST.
The Mitrion-C Open Bio Project was an effort to port BLAST to run on Mitrion FPGAs.
GPU-accelerated
GPU-Blast is an accelerated version of NCBI BLASTP for CUDA which is 3x~4x faster than NCBI Blast.
CUDA-BLASTP is a version of BLASTP that is GPU-accelerated and is claimed to run up to 10x faster than NCBI BLAST.
G-BLASTN is an accelerated version of NCBI blastn and megablast, whose speedup varies from 4x to 14x (compared to the same runs with 4 CPU threads). Its current limitation is that the database must fit into the GPU memory.
CPU-accelerated
MPIBlast is a parallel implementation of NCBI BLAST using Message Passing Interface. By efficiently utilizing distributed computational resources through database fragmentation, query segmentation, intelligent scheduling, and parallel I/O, mpiBLAST improves NCBI BLAST performance by several orders of magnitude while scaling to hundreds of processors.
CaBLAST makes search on large databases orders of magnitude faster by exploiting redundancy in data.
Paracel BLAST was a commercial parallel implementation of NCBI BLAST, supporting hundreds of processors.
QuickBLAST (kblastp) from NCBI is an implementation accelerated by prefiltering based on Jaccard index estimates with hashed pentameric fragments. The filtering slightly reduces sensitivity, but increases performance by an order of magnitude. NCBI only makes the search available on their non-redundant (nr) protein collection, and does not offer downloads.
Alternatives to BLAST
The predecessor to BLAST, FASTA, can also be used for protein and DNA similarity searching. FASTA provides a similar set of programs for comparing proteins to protein and DNA databases, DNA to DNA and protein databases, and includes additional programs for working with unordered short peptides and DNA sequences. In addition, the FASTA package provides SSEARCH, a vectorized implementation of the rigorous Smith-Waterman algorithm. FASTA is slower than BLAST, but provides a much wider range of scoring matrices, making it easier to tailor a search to a specific evolutionary distance.
An extremely fast but considerably less sensitive alternative to BLAST is BLAT (Blast Like Alignment Tool). While BLAST does a linear search, BLAT relies on k-mer indexing the database, and can thus often find seeds faster. Another software alternative similar to BLAT is PatternHunter.
Advances in sequencing technology in the late 2000s has made searching for very similar nucleotide matches an important problem. New alignment programs tailored for this use typically use BWT-indexing of the target database (typically a genome). Input sequences can then be mapped very quickly, and output is typically in the form of a BAM file. Example alignment programs are BWA, SOAP, and Bowtie.
For protein identification, searching for known domains (for instance from Pfam) by matching with Hidden Markov Models is a popular alternative, such as HMMER.
An alternative to BLAST for comparing two banks of sequences is PLAST. PLAST provides a high-performance general purpose bank to bank sequence similarity search tool relying on the PLAST and ORIS algorithms. Results of PLAST are very similar to BLAST, but PLAST is significantly faster and capable of comparing large sets of sequences with a small memory (i.e. RAM) footprint.
For applications in metagenomics, where the task is to compare billions of short DNA reads against tens of millions of protein references, DIAMOND runs at up to 20,000 times as fast as BLASTX, while maintaining a high level of sensitivity.
The open-source software MMseqs is an alternative to BLAST/PSI-BLAST, which improves on current search tools over the full range of speed-sensitivity trade-off, achieving sensitivities better than PSI-BLAST at more than 400 times its speed.
Optical computing approaches have been suggested as promising alternatives to the current electrical implementations. OptCAM is an example of such approaches and is shown to be faster than BLAST.
Comparing BLAST and the Smith-Waterman Process
While both Smith-Waterman and BLAST are used to find homologous sequences by searching and comparing a query sequence with those in the databases, they do have their differences.
Due to the fact that BLAST is based on a heuristic algorithm, the results received through BLAST, in terms of the hits found, may not be the best possible results, as it will not provide you with all the hits within the database. BLAST misses hard to find matches.
A better alternative in order to find the best possible results would be to use the Smith-Waterman algorithm. This method varies from the BLAST method in two areas, accuracy and speed. The Smith-Waterman option provides better accuracy, in that it finds matches that BLAST cannot, because it does not miss any information. Therefore, it is necessary for remote homology. However, when compared to BLAST, it is more time consuming, not to mention that it requires large amounts of computer usage and space. However, technologies to speed up the Smith-Waterman process have been found to improve the time necessary to perform a search dramatically. These technologies include FPGA chips and SIMD technology.
In order to receive better results from BLAST, the settings can be changed from their default settings. However, there is no given or set way of changing these settings in order to receive the best results for a given sequence. The settings available for change are E-Value, gap costs, filters, word size, and substitution matrix. Note, that the algorithm used for BLAST was developed from the algorithm used for Smith-Waterman. BLAST employs an alignment which finds "local alignments between sequences by finding short matches and from these initial matches (local) alignments are created".
BLAST output visualization
To help users interpreting BLAST results, different software is available. According to installation and use, analysis features and technology, here are some available tools:
NCBI BLAST service
general BLAST output interpreters, GUI-based: JAMBLAST, Blast Viewer, BLASTGrabber
integrated BLAST environments: PLAN, BlastStation-Free, SequenceServer
BLAST output parsers: MuSeqBox, Zerg, BioParser, BLAST-Explorer, SequenceServer
specialized BLAST-related tools: MEGAN, BLAST2GENE, BOV, Circoletto
Example visualisations of BLAST results are shown in Figure 4 and 5.
Uses of BLAST
BLAST can be used for several purposes. These include identifying species, locating domains, establishing phylogeny, DNA mapping, and comparison.
Identifying species With the use of BLAST, you can possibly correctly identify a species or find homologous species. This can be useful, for example, when you are working with a DNA sequence from an unknown species.
Locating domains When working with a protein sequence you can input it into BLAST, to locate known domains within the sequence of interest.
Establishing phylogeny Using the results received through BLAST you can create a phylogenetic tree using the BLAST web-page. Phylogenies based on BLAST alone are less reliable than other purpose-built computational phylogenetic methods, so should only be relied upon for "first pass" phylogenetic analyses.
DNA mapping When working with a known species, and looking to sequence a gene at an unknown location, BLAST can compare the chromosomal position of the sequence of interest, to relevant sequences in the database(s). NCBI has a "Magic-BLAST" tool built around BLAST for this purpose.
Comparison When working with genes, BLAST can locate common genes in two related species, and can be used to map annotations from one organism to another.
See also
PSI Protein Classifier
Needleman-Wunsch algorithm
Smith-Waterman algorithm
Sequence alignment
Sequence alignment software
Sequerome
eTBLAST
References
External links
BLAST+ executables — free source downloads
Bioinformatics algorithms
Computational phylogenetics
Bioinformatics software
Laboratory software
Public-domain software |
512826 | https://en.wikipedia.org/wiki/Ali%20al-Sistani | Ali al-Sistani | Grand Ayatollah Sayyid Ali al-Husayni al-Sistani (; Ali-ye Hoseyni-ye Sistāni , born 4 August 1930), commonly known as Ayatollah Sistani, is one of the most influential Iranian-Iraqi Shia Marja' of Iranian origins living in Iraq.
He is described as the leading spiritual leader of Iraqi Shia Muslims, and one of the most senior scholars in Shia Islam. He has been included in all editions of "The Muslim 500: The World's Most Influential Muslims" mostly in the top ten positions since 2009. He is one of the eight Maraji’ mentioned in the most recent edition. In 2005, al-Sistani was listed among the Top 100 intellectuals of the world. In 2005 and 2014, he was also nominated for Nobel Prize Award towards his efforts for establishing peace.
Biography
Early life
Sistani was born in Mashhad, to a family of religious clerics who claim descent from Husayn ibn Ali, the grandson of Muhammad. His father was Mohammad-Baqir al-Sistani and his mother was the daughter of Ridha al-Mehrebani al-Sarabi.
Sistani began his religious education as a child, first in Mashhad in his father's hawzah, and continuing later in Qom. In Qom he studied under Grand Ayatollah Hossein Borujerdi. Later in 1951, Sistani traveled to Iraq to study in Najaf under Grand Ayatollah Abu al-Qasim al-Khoei. Sistani rose to the rank of mujtahid in 1960, at the age of thirty-one.
Grand Ayatollah
When Khoei died in 1992, Abd al-A'la al-Sabziwari briefly became the leading marja'. However, when he died in 1993, al-Sistani ascended to the rank of Grand Ayatollah through traditional peer recognition of his scholarship. His role as successor to Khoei was symbolically cemented when he led funeral prayers for Khoei, he also inherited most of Khoei's network and following.
Baath Party
During the years of Saddam Hussein's rule of Iraq through the Baath Party, al-Sistani was untouched during the violent Baathist repression and persecution that killed many clerics including Mohammad al-Sadr in 1999, for which Saddam denied any involvement. Al-Sistani's mosque was forcefully shut down in 1994 and did not reopen until the 2003 US-led invasion of Iraq.
Role in contemporary Iraq
Since the overthrow of the Baath Party, Sistani has played an increasingly prominent role in regional religious and political affairs and he has been called the "most influential" figure in post-invasion Iraq.
Shortly after the US invasion began, Sistani issued a fatwa advising Shia clergy to become engaged in politics in order to better guide the Iraqi people toward "clearer decisions," and to fight "media propaganda." As the summer of 2003 approached, Sistani and his followers began to petition the occupying forces for a constitutional convention. Later, Sistani called for a democratic vote of the people for the purpose of forming a transitional government. Observers described the move as being a path leading directly to Shia political dominance over Iraq's government, as Shia Muslims make up approximately 65% of the total Iraqi population. Subsequently, Sistani criticized plans for an Iraqi government for not being democratic enough.
In early August 2004, Sistani experienced serious health complications related to a previously diagnosed heart condition. He traveled to London to receive medical treatment. It was, reportedly, the first time that Sistani had left Iraq in decades, and may have been due, in part, to growing concerns for his safety from sectarian violence. Though still recovering, Sistani returned later in the month to broker a military truce at the Imam Ali Mosque in Najaf where Muqtada al-Sadr and the Mahdi Army had been cornered by American and Iraqi forces. Sadr, who rose rapidly to prominence through a series of independent military actions beginning in 2004, has since actively challenged Sistani's more progressive influence over Shia in the region.
Sistani's edicts reportedly provided many Iraqi Shia cause for participating in the January 2005 elections—he urged, in a statement on October 1, 2004, that Iraqis recognize the election as an "important matter," additionally, Sistani asked that the elections be "free and fair ... with the participation of all Iraqis." Soon after, al-Sistani issued a fatwa alerting Shia women that they were religiously obligated to participate in the election, even if their husbands had forbidden them from voting. In an issued statement Sistani remarked that, "truly, women who go forth to the polling centers on election day are like Zaynab, who went forth to Karbala."
He has consistently urged the Iraqi Shia not to respond in kind to attacks from Sunni Salafists, which have become common in Sunni-dominated regions of Iraq like the area known as the "Triangle of Death," south of Baghdad. Even after the destruction of the Shia Al-Askari Mosque in Samarra in February 2006, his network of clerics and preachers continued to urge calm and told their followers that "it was not their Sunni neighbors who were killing them but foreign Wahhabis." Sistani's call for unity after the bombing of the mosque helped to control a potentially dangerous situation, preventing the country to enter in a bloody sectarian war. Sistani did the same when the same mosque was bombed again in 2007.
An alleged plot to assassinate Sistani was foiled on January 29, 2007, when three Jund al-Samaa gunmen were captured at a hotel near his office. It is believed to have been part of a larger attack against a number of targets in Najaf.
In an online open poll, 2005, Ali al-Sistani was selected as the 30th topmost intellectual person in the world on the list of Top 100 Public Intellectuals by Prospect (UK) and Foreign Policy (US).
On 13 June 2014 Sistani appealed that Iraqis should support the government against the Islamic State of Iraq and the Levant militant group which had taken over Mosul and Tikrit and was threatening Baghdad. Later in June 2014, Sistani revised his statement and issued a fatwa calling for "citizens to defend the country, its people, the honor of its citizens, and its sacred places," against the ISIL.
Sistani said the Iraqi government and police were liable for the killing of protestors during the 2019–20 Iraqi protests. He requested that the government prosecute those who gave the command to shoot protesters. The ayatollah rarely voices his opinion on politics except in extreme unrest. The protests have been described as Iraq's worst violence since ISIL was militarily defeated in 2017. A month later in November 2019, in response to the death of three Iraqi protesters, Sistani said "No person or group, no side with a particular view, no regional or international actor may seize the will of the Iraqi people and impose its will on them."
Shia patronage
As the leading cleric in Najaf, Sistani oversees sums amounting to millions of US dollars. His followers offer him a fixed part of their earnings (khums), which is used for educational and charitable purposes. Sistani's office has reported that it supports 35,000 students in Qom, 10,000 in Mashhad, and 4,000 in Isfahan. It also oversees a network of representatives (wakil) "who promote his views in large and small ways in neighborhoods, mosques, bazaars, and seminaries from Kirkuk to Basra."
In Iran, as a result of the post-invasion opening of the Iraqi cities of Najaf and Karbala to Iranians, many Iranians are said to return from pilgrimage in Iraq as supporters of Sistani.
Criticism and controversy
Al Jazeera
In May 2007, hundreds of Shias demonstrated publicly in Basra and Najaf to protest comments made by television presenter and journalist Ahmed Mansour during a Qatari broadcast of Al Jazeera television programming. While presenting Bela Hodod (a.k.a. Without Borders), Mansour voiced skepticism of al-Sistani's leadership credentials while directing questions about the Iraqi-born cleric to his guest, Shia cleric Jawad al-Khalsi. Mansour also suggested that al-Sistani was not aware of contemporary problems in Iraq or of prevailing post-war conditions, and he alleged that Sistani's edicts were, largely, written and disseminated by aides. At another point, Mansour asked Khalsi whether the United States was using Iraqi politicians, and also al-Sistani, to promote Western interests in Iraq.
Saudi scholar
In January 2010, during a Jumu'ah khutba (Friday sermon), Saudi scholar Mohamad al-Arefe vehemently criticized al-Sistani by referring to him as an atheist and by describing his behavior as "debauched". The remarks prompted protest by his followers in Iraq, Qom and Lebanon. Iraqi Prime Minister Nouri al-Maliki rebuked the Saudi religious authorities. Lebanon-based Islamist militant organization Hezbollah also condemned the attack on al-Sistani, calling the speech "inauspicious," while praising al-Sistani as one of Shia Islam's "most prominent religious references."
Nobel Peace Prize nomination
On 4 March 2014, The Daily Telegraph commentator Colin Freeman published an article naming Ali al-Sistani as the most appropriate Nobel Peace Prize candidate. He also reported that he had been nominated earlier in 2006, by a group of Iraqi Christians.
On 8 March 2014, the Tehran Times reported that a group of members of Iraqi parliament announced that they intended to nominate Ali al-Sistani for the 2014 Nobel Peace Prize.
Thomas L. Friedman, former bureau chief of The New York Times in Beirut and Jerusalem (1982–88), proposed Ayatollah al-Sistani for the prize in 2005 in a column published in The New York Times on 20 March 2005.
Guardianship of Islamic Jurists (Wilayat al-Faqih)
Like his predecessor Khoei, Sistani has not wholly embraced the post-Age-of-Occultation theory known as the Guardianship of the Islamic Jurists, which was espoused and supported by the late Iranian Grand Ayatollah Ruhollah Khomeini and which is currently extant and enforced by the Iranian government through its own constitution and by its supreme leader and highest religious authority Ali Khamenei. Sistani's scholarly views regarding guardianship resembles Khoei's views, but differs in several respects. Additionally, the primary difference between Sistani's interpretation and the interpretation of Khomeini and Khamenei is reportedly in the range of power that a Grand Ayatollah has in ruling the Islamic community. Sistani has publicly stated and maintained that his interpretation of the doctrine is one that grants more power to the Ayatollahs than al-Khoei, but less than either Khoemeini or Khamenei:
On the specific question of obedience to a supreme leader, Sistani has said that any pronouncement given by a supreme leader "supersedes all, (including those given by other Maraji') unless the pronouncements are proven to be wrong or the pronouncements are proven to be against what is in the Qur'an or in Religious Tradition."
Additionally, instead of advocating for the rule by Islamic clerics Sistani is said to favor a more relaxed perspective related to the provision of values and guidelines for social order (nizam al-mujama) as being the recognized, primary role of Islam.
Also, according to Sadegh Zibakalam, professor of political science at Tehran University, al-Sistani has consistently avoided supporting a strict interpretation of the theory, especially of absolute guardianship, nor has he explicitly offered any substantive affirmation of the theory as a whole (including limited guardianship); thereby creating "a major lacuna" in the "grand ideological scenario" of the Islamic Republic of Iran.
According to scholar Vali Nasr, despite Sistani's disagreements with Iran's ruling clerics, he has "never tried to promote a rivalry" between his religious center of Najaf and the Iranian center in Qom, and has never made any comments about the confrontations between reformists and conservatives in Qom or between clerics in Lebanon, a reflection, Nasr believes, of Sistani's reluctance to become involved in politics.
Works
Works translated into English
Current Legal Issues
A Code of practice for Muslims in the West
Hajj Rituals
Islamic Laws
Jurisprudence Made Easy
Contemporary Legal Rulings in Shia Law
Non-English
His office states that thirty-two other works exist, but have not been translated into English.
Internet
By working with Shia computer programmers and other specialists, al-Sistani sponsored the establishment of The Ahlulbayt (a.s.) Global Information Center, an international web-resource, and he has since been called "the electronic grand ayatollah par excellence."
Cyber attacks
On 18 September 2008, hackers attacked hundreds of Shia websites. The attacks were reportedly the work of a Muslim faction known as group-xp, based in the Arabian peninsula and which is linked to Salafi and Wahhabi, strict forms of Islam. They attacked an estimated three hundred Shia internet websites including The Ahlulbayt (a.s.) Global Information Center. It was later dubbed the "largest Wahhabi hacker attack" in recent years.
After the attack, visitors to the site were greeted by a red attack banner bearing the slogan "group-xp" paired with a message in Arabic denouncing Shia beliefs and officials. Hackers also replaced a video of Sistani with one of comedian Bill Maher mocking Sistani.
However, the attack led to the retaliatory hacking of more than nine hundred Wahhabi and Salafi websites. One such successful attack was documented on video and uploaded to YouTube on 3 October 2008. The hacker, a Shia from the United Arab Emirates using the handle "ShiaZone", was shown logging into email accounts of suspected members of group-xp. The hacked email accounts reportedly yielded group-xp's contact information, information that was subsequently posted on Shia websites.
Public appearances
al-Sistani has notoriously avoided public appearances, despite his widespread fame and not shying away from attention. In practice, al-Sistani never delivers public sermons or speeches, and only releases official statements through "official representatives". The statements are later transcribed and posted on Sistani's official webpage, with the Grand Ayatollah's official stamp, indicating the authenticity of the remarks. Though al-Sistani has appeared in a few short videos, he does not say anything in these videos and is usually motionless. The only known public recording of Sistani's voice is a short, Persian-language lecture by al-Sistani to students. Another video depicts al-Sistani in the back of a room conversing with a fellow cleric, again in Persian, and faintly captures sparse bits of Sistani's vocalizations.
Sheikh Abdul-Mahdi Al-Karbalai is Sistani's foremost representative and gives speeches in Sistani's stead. Abdul-Mahdi Al-Karbalai is noted for having announced Sistani's famous fatwa (edict) obligating Iraqis to vote, and with the rise of terrorism, to join the military to oppose ISIS.
Meeting with Pope Francis
Pope Francis and Grand Ayatollah Ali al-Sistani met on 6 March 2021 during Pope Francis's visit to Iraq. They met for about 40 minutes in the Shiite cleric's home in Najaf. The visit was prepared with great care to details, such as how many meters the Pope will walk to al-Sistanis home or on what seating arrangements the two will take a seat.
Personal life
al-Sistani is married to the daughter of Muhammad-Hassan al-Shirazi (d. 1972), the grandson of Mirza Shirazi. He has two sons, Muhammad-Ridha and Muhammad-Baqir.
References
External links
Official Website (English, French, Urdu, فارسي, Türkçe, عربي)
20th-century Iranian people
20th-century Islamic religious leaders
21st-century Iranian people
21st-century Islamic religious leaders
1930 births
Descendants of Shia Imams
Iranian clerics
Iranian emigrants to Iraq
Iraqi grand ayatollahs
Iraqi religious leaders
Islamic democracy activists
Living people
People from Mashhad
Shia scholars of Islam |
30296057 | https://en.wikipedia.org/wiki/Gibson%20MaGIC | Gibson MaGIC | Media-accelerated Global Information Carrier (MaGIC) is an audio over Ethernet protocol developed by Gibson Guitar Corporation in partnership with 3COM. It allows bidirectional transmission of multichannel audio data, control data, and instrument power.
Revision 1.0 was introduced in 1999; the most current revision 3.0c was released in 2003.
MaGIC is used in several guitar products such as Gibson Digital Guitar.
Capabilities
Uses Category 5 UTP cables up to 100 m long
Frame-compatible with Fast Ethernet
32 channels, 192 kHz sampling rate
32-bit integer audio
32-bit floating point audio
24-bit integer audio with 4-bit channel status and 4-bit channel command
32-bit raw data
Supports line network topology, star topology, and a combination of the two
Network protocol
In terms of ISO OSI model, MaGIC can use physical and link layer (MAC/LLC) based on 100 Mbit Fast Ethernet signalling specified in IEEE 802.3/IEEE 802.3af and IEEE 802.2, however MaGIC implements proprietary network and application layers which can be used with different physical layers such as Gigabit Ethernet or optical media.
The frame consists of 1776 bytes. The network protocol encapsulates each frame application data (1506 bytes) into media payload (1024 bytes) and control payload (352 bytes) fields of the frame. The media payload is reserved for low-latency synchronous audio and video data, and control payload may encapsulate MaGIC control messages, MIDI data, and other protocols.
Media streams are transmitted synchronously without re-sampling or buffering, ensuring minimal latency; each stream has one source and one or more destinations. Control messages are generally broadcast to the entire network - each device processes the destination address and forwards to all neighbors if necessary.
Application protocol
A MaGIC device consists of the following logical entities:
Unit - an access point that sends and receives control messages;
Components - access points for control applications such as power on/off switches, volume controls, control surfaces, or graphical user interfaces;
Ports - represent either physical connections or user applications which send media to the network;
Media slot routers - route media data streams through the network.
Individual control capabilities of the device are exposed through the MaGIC Control Protocol (MCP), which allow communication with Components in other devices (a maximum of 65535 per device).
The network elects a System Timing Master (STM) which is the source of synchronization on for all devices. Timecode formats include MaGIC timecode and MIDI Time Code.
The control data in consist of 12-bit Control Message Code (CMC) 4-bit status field, 32-bit Source (Unit and Component, 16-bit each) and 32-bit Destination, and may contain up to 32 Kbytes of data in multiple frames.
The CMCs are defined into four classes:
Network Management Messages (0-127)
Well Known Application Protocols (128-511) - used for encapsulation of well-known high-level protocols or for transporting messages with well-known format and structure (like MIDI).
User Control Messages (512-1023) - proprietary user messages
Reserved (1024-4095).
Control links are bi-directional communication pipes between several MaGIC devices, intended for control applications. For example, a control link allows the knob on one device to regulate the remotely located volume on another device through the MaGIC network. Control links allow remote management from a computer with a sophisticated GUI which would act as a network supervisor that would manage other applications. Devices may also establish control links using proprietary mechanisms as long as they are compliant with this specification.
References
External links
Audio network protocols
Ethernet |
376486 | https://en.wikipedia.org/wiki/Halt%20and%20Catch%20Fire%20%28computing%29 | Halt and Catch Fire (computing) | In computer engineering, Halt and Catch Fire, known by the assembly mnemonic HCF, is an idiom referring to a computer machine code instruction that causes the computer's central processing unit (CPU) to cease meaningful operation, typically requiring a restart of the computer. It originally referred to a fictitious instruction in IBM System/360 computers (introduced in 1964), making a joke about its numerous non-obvious instruction mnemonics.
With the advent of the MC6800 (introduced in 1974), a design flaw was discovered by the programmers. Due to incomplete opcode decoding, two illegal opcodes, 0x9D and 0xDD, will cause the program counter on the processor to increment endlessly, which locks the processor until reset. Those codes have been unofficially named HCF. During the design process of MC6802, engineers originally planned to remove this instruction, but kept it as-is for testing purposes. As a result, HCF was officially recognized as a real instruction. Later, HCF became a humorous catch-all term for instructions that may freeze a processor, including intentional instructions for testing purposes, and unintentional illegal instructions. Some are considered hardware defects, and if the system is shared, a malicious user can execute it to launch a denial-of-service attack.
In the case of real instructions, the implication of this expression is that, whereas in most cases in which a CPU executes an unintended instruction (a bug in the code) the computer may still be able to recover, in the case of an HCF instruction there is, by definition, no way for the system to recover without a restart.
The expression "catch fire" is a facetious exaggeration of the speed with which the CPU chip would be switching some bus circuits, causing them to overheat and burn.
Origins
Apocryphal stories connect this term with an illegal opcode in IBM System/360. A processor, upon encountering the instruction, would start switching bus lines very fast, potentially leading to overheating.
In a computer's assembly language, mnemonics are used that are directly equivalent to machine code instructions. The mnemonics are frequently three letters long, such as ADD, CMP (to compare two numbers), and JMP (jump to a different location in the program). The HCF instruction was originally a fictitious assembly language instruction, said to be under development at IBM for use in their System/360 computers, along with many other amusing three-letter acronyms like XPR (Execute Programmer) and CAI (Corrupt Accounting Information), and similar to other joke mnemonics such as "SDI" for "Self Destruct Immediately" and "CRN" for Convert to Roman Numerals. A list of such mnemonics, including HCF, shows up as "Overextended Mnemonics" in the April 1980 Creative Computing flip-side parody issue.
The IBM System/360 already included numerous non-obvious mnemonics like ZAP (Zero and Add Packed), EDMK (EDit and MarK), TRT (TRanslate and Test), and Read Backward (an I/O channel command), and programmers began creating similarly cryptic, but fictitious, instructions in a humorous vein.
In a 1990 USENET discussion, it was claimed that HCF dated back to before 1977.
In Rick Cook's science fiction/fantasy novel, The Wizardry Compiled, about programmers transported to a universe where magic could be programmed, one of them refers to the command as HMCF, for "Halt, Melt and Catch Fire".
In TIS-100, a 2015 puzzle video game made by Zachtronics, there is an achievement called HALT_AND_CATCH_FIRE for crashing the machine with a hidden opcode.
In modern CPUs
CPU designers sometimes incorporate one or more undocumented machine code instructions for testing purposes, such as the IBM System/360 DIAGnose instruction.
Motorola 6800
The Motorola 6800 microprocessor was the first for which an undocumented assembly mnemonic HCF became widely known. The operation codes (opcodes—the portions of the machine language instructions that specify an operation to be performed) are hexadecimal 9D and DD, and were reported and given the unofficial mnemonic HCF in an article written by Gerry Wheeler in the December 1977 issue of BYTE magazine on undocumented opcodes. Wheeler noted that Motorola reported 197 valid operation codes for the M6800 processor, and so inferred that with 256 possible 8 bit combinations, there must be 59 "invalid instructions". He goes on to describe the HCF as a "big surprise", and saying of the Catch Fire portion of the moniker, "Well, almost":
The process is reviewed by David Agans, thus:
That is, either opcode made the processor enter a mode, continuously performing memory read cycles from successive addresses with no intervening instruction fetches. Hence, the address bus effectively became a counter, allowing the operation of all address lines to be quickly verified. Once the processor entered this mode, it was not responsive to interrupts, so normal operation could only be restored by a reset (hence the "Drop Dead" and "Halt and Catch Fire" monikers). These references were thus to the unresponsive behavior of the CPU in this state, and not to any form of erratic behavior.
Other HCF-like instructions were found later on the Motorola 6800 when executing undocumented opcodes FD (cycling twice slower than 9D/DD) or CD/ED (cycling at a human-readable very low frequency on a limited number of high-address lines).
The mnemonic HCF is believed to be the first built-in self-test feature on a Motorola microprocessor.
Intel x86
The Intel 8086 and subsequent processors in the x86 series had an HLT (halt) instruction, opcode F4, which stopped instruction execution and placed the processor in a HALT state. An enabled interrupt, a debug exception, the BINIT signal, the INIT signal, or the RESET signal resumed execution, which meant the processor could always be restarted. Some of the early Intel DX4 chips had a problem with the HLT instruction and could not be restarted after this instruction was used, which disabled the computer and turned HLT into more of an HCF instruction. The Linux kernel added a "no-hlt" option telling Linux to run an infinite loop instead of using HLT, which allowed users of these broken chips to use Linux.
The 80286 has the undocumented opcode 0F 04, causing the CPU to hang when executed. The only way out is CPU reset.
In some implementations, the opcode was emulated through BIOS as a halting sequence.
Many computers in the Intel Pentium line could be locked up by executing an invalid instruction (F00F C7C8), which caused the computer to lock up. This became known as the Pentium F00F bug. No compiler would create the instruction, but a malicious programmer could insert it into code to render an afflicted computer inoperable until the machine was power-cycled. Since its discovery, workarounds have been developed to prevent it from locking the computer, and the bug has been eliminated in subsequent Intel processors.
During Black Hat USA 2017, Christopher Domas showed that he has found a new currently unknown "Halt and Catch Fire" instruction on a particular x86 processor model using his own x86 processor fuzzer called sandsifter.
Other CPUs
The MOS Technology 6502 has 12 invalid instructions which will freeze the CPU.
On the Zilog Z80, executing DI (disable interrupts) followed by HALT (wait for an interrupt) results in the CPU staying frozen indefinitely, waiting for an interrupt that cannot happen. The similar Sharp processor core in the Game Boy's LR35902 system on chip contains a partial fix allowing it to recover from one HALT, like the 65C02's analogous WAI instruction, but it becomes frozen with three consecutive HALTs with interrupts disabled. The core itself contains no less than 11 opcodes that fully lock the CPU when executed.
The Z80 also supports a non-maskable interrupt. The /NMI signal is on Pin 17 of the original 40 pin DIP package. Since a non-maskable interrupt will regain control of the CPU even after executing the instruction sequence DI / HALT, that pair does not represent a true HCF. It will only result in a HCF condition if either the /NMI pin is connected directly to the +5V rail, making the generation of that signal impossible, or if the interrupt routine that services /NMI ends with a return, placing it back in the HALT state.
See also
Cyrix coma bug
Killer poke
lp0 on fire
Write-only memory (joke)
References
Computer errors
Computer folklore
Computer humor
Hardware bugs
Machine code |
2613984 | https://en.wikipedia.org/wiki/Object-oriented%20analysis%20and%20design | Object-oriented analysis and design | Object-oriented analysis and design (OOAD) is a technical approach for analyzing and designing an application, system, or business by applying object-oriented programming, as well as using visual modeling throughout the software development process to guide stakeholder communication and product quality.
OOAD in modern software engineering is typically conducted in an iterative and incremental way. The outputs of OOAD activities are analysis models (for OOA) and design models (for OOD) respectively. The intention is for these to be continuously refined and evolved, driven by key factors like risks and business value.
History
In the early days of object-oriented technology before the mid-1990s, there were many different competing methodologies for software development and object-oriented modeling, often tied to specific Computer Aided Software Engineering (CASE) tool vendors. No standard notations, consistent terms and process guides were the major concerns at the time, which degraded communication efficiency and lengthened learning curves.
Some of the well-known early object-oriented methodologies were from and inspired by gurus such as Grady Booch, James Rumbaugh, Ivar Jacobson (the Three Amigos), Robert Martin, Peter Coad, Sally Shlaer, Stephen Mellor, and Rebecca Wirfs-Brock.
In 1994, the Three Amigos of Rational Software started working together to develop the Unified Modeling Language (UML). Later, together with Philippe Kruchten and Walker Royce (eldest son of Winston Royce), they have led a successful mission to merge their own methodologies, OMT, OOSE and Booch method, with various insights and experiences from other industry leaders into the Rational Unified Process (RUP), a comprehensive iterative and incremental process guide and framework for learning industry best practices of software development and project management. Since then, the Unified Process family has become probably the most popular methodology and reference model for object-oriented analysis and design.
Overview
The software life cycle is typically divided up into stages going from abstract descriptions of the problem to designs then to code and testing and finally to deployment. The earliest stages of this process are analysis and design. The analysis phase is also often called "requirements acquisition".
In some approaches to software development—known collectively as waterfall models—the boundaries between each stage are meant to be fairly rigid and sequential. The term "waterfall" was coined for such methodologies to signify that progress went sequentially in one direction only, i.e., once analysis was complete then and only then was design begun and it was rare (and considered a source of error) when a design issue required a change in the analysis model or when a coding issue required a change in design.
The alternative to waterfall models are iterative models. This distinction was popularized by Barry Boehm in a very influential paper on his Spiral Model for iterative software development. With iterative models it is possible to do work in various stages of the model in parallel. So for example it is possible—and not seen as a source of error—to work on analysis, design, and even code all on the same day and to have issues from one stage impact issues from another. The emphasis on iterative models is that software development is a knowledge-intensive process and that things like analysis can't really be completely understood without understanding design issues, that coding issues can affect design, that testing can yield information about how the code or even the design should be modified, etc.
Although it is possible to do object-oriented development using a waterfall model, in practice most object-oriented systems are developed with an iterative approach. As a result, in object-oriented processes "analysis and design" are often considered at the same time.
The object-oriented paradigm emphasizes modularity and re-usability. The goal of an object-oriented approach is to satisfy the "openclosed principle". A module is open if it supports extension, or if the module provides standardized ways to add new behaviors or describe new states. In the object-oriented paradigm this is often accomplished by creating a new subclass of an existing class. A module is closed if it has a well defined stable interface that all other modules must use and that limits the interaction and potential errors that can be introduced into one module by changes in another. In the object-oriented paradigm this is accomplished by defining methods that invoke services on objects. Methods can be either public or private, i.e., certain behaviors that are unique to the object are not exposed to other objects. This reduces a source of many common errors in computer programming.
The software life cycle is typically divided up into stages going from abstract descriptions of the problem to designs then to code and testing and finally to deployment. The earliest stages of this process are analysis and design. The distinction between analysis and design is often described as "what vs. how". In analysis developers work with users and domain experts to define what the system is supposed to do. Implementation details are supposed to be mostly or totally (depending on the particular method) ignored at this phase. The goal of the analysis phase is to create a functional model of the system regardless of constraints such as appropriate technology. In object-oriented analysis this is typically done via use cases and abstract definitions of the most important objects. The subsequent design phase refines the analysis model and makes the needed technology and other implementation choices. In object-oriented design the emphasis is on describing the various objects, their data, behavior, and interactions. The design model should have all the details required so that programmers can implement the design in code.
Object-oriented analysis
The purpose of any analysis activity in the software life-cycle is to create a model of the system's functional requirements that is independent of implementation constraints.
The main difference between object-oriented analysis and other forms of analysis is that by the object-oriented approach we organize requirements around objects, which integrate both behaviors (processes) and states (data) modeled after real world objects that the system interacts with. In other or traditional analysis methodologies, the two aspects: processes and data are considered separately. For example, data may be modeled by ER diagrams, and behaviors by flow charts or structure charts.
Common models used in OOA are use cases and object models. Use cases describe scenarios for standard domain functions that the system must accomplish. Object models describe the names, class relations (e.g. Circle is a subclass of Shape), operations, and properties of the main objects. User-interface mockups or prototypes can also be created to help understanding.
Object-oriented design
During object-oriented design (OOD), a developer applies implementation constraints to the conceptual model produced in object-oriented analysis. Such constraints could include the hardware and software platforms, the performance requirements, persistent storage and transaction, usability of the system, and limitations imposed by budgets and time. Concepts in the analysis model which is technology independent, are mapped onto implementing classes and interfaces resulting in a model of the solution domain, i.e., a detailed description of how the system is to be built on concrete technologies.
Important topics during OOD also include the design of software architectures by applying architectural patterns and design patterns with object-oriented design principles.
Object-oriented modeling
Object-oriented modeling (OOM) is a common approach to modeling applications, systems, and business domains by using the object-oriented paradigm throughout the entire development life cycles. OOM is a main technique heavily used by both OOD and OOA activities in modern software engineering.
Object-oriented modeling typically divides into two aspects of work: the modeling of dynamic behaviors like business processes and use cases, and the modeling of static structures like classes and components. OOA and OOD are the two distinct abstract levels (i.e. the analysis level and the design level) during OOM. The Unified Modeling Language (UML) and SysML are the two popular international standard languages used for object-oriented modeling.
The benefits of OOM are:
Efficient and effective communication
Users typically have difficulties in understanding comprehensive documents and programming language codes well. Visual model diagrams can be more understandable and can allow users and stakeholders to give developers feedback on the appropriate requirements and structure of the system. A key goal of the object-oriented approach is to decrease the "semantic gap" between the system and the real world, and to have the system be constructed using terminology that is almost the same as the stakeholders use in everyday business. Object-oriented modeling is an essential tool to facilitate this.
Useful and stable abstraction
Modeling helps coding. A goal of most modern software methodologies is to first address "what" questions and then address "how" questions, i.e. first determine the functionality the system is to provide without consideration of implementation constraints, and then consider how to make specific solutions to these abstract requirements, and refine them into detailed designs and codes by constraints such as technology and budget. Object-oriented modeling enables this by producing abstract and accessible descriptions of both system requirements and designs, i.e. models that define their essential structures and behaviors like processes and objects, which are important and valuable development assets with higher abstraction levels above concrete and complex source code.
See also
ATLAS Transformation Language (ATL)
Class-Responsibility-Collaboration card (CRC cards)
Domain Specific Language (DSL)
Domain-driven design
Domain-specific modelling (DSM)
Meta-Object Facility (MOF)
Metamodeling
Model-driven engineering (MDE)
Model-based testing (MBT)
Object modeling language
Object-oriented modeling
Object-oriented programming
Object-oriented user interface
QVT
Shlaer-Mellor
Software analysis pattern
Story-driven modeling
Unified Modeling Language (UML)
XML Metadata Interchange (XMI)
References
Further reading
Grady Booch. "Object-oriented Analysis and Design with Applications, 3rd edition":http://www.informit.com/store/product.aspx?isbn=020189551X Addison-Wesley 2007.
Rebecca Wirfs-Brock, Brian Wilkerson, Lauren Wiener. Designing Object Oriented Software. Prentice Hall, 1990. [A down-to-earth introduction to the object-oriented programming and design.]
A Theory of Object-Oriented Design: The building-blocks of OOD and notations for representing them (with focus on design patterns.)
Martin Fowler. Analysis Patterns: Reusable Object Models. Addison-Wesley, 1997. [An introduction to object-oriented analysis with conceptual models]
Bertrand Meyer. Object-oriented software construction. Prentice Hall, 1997
Craig Larman. Applying UML and Patterns – Introduction to OOA/D & Iterative Development. Prentice Hall PTR, 3rd ed. 2005.,mnnm,n,nnn
Setrag Khoshafian. Object Orientation.
Ulrich Norbisrath, Albert Zündorf, Ruben Jubeh. Story Driven Modeling. Amazon Createspace. p. 333., 2013. .
External links
Article Object-Oriented Analysis and Design with UML and RUP an overview (also about CRC cards).
Applying UML – Object Oriented Analysis & Design tutorial
OOAD & UML Resource website and Forums – Object Oriented Analysis & Design with UML.
Software Requirement Analysis using UML article by Dhiraj Shetty.
Article Object-Oriented Analysis in the Real World
Object-oriented programming
Software design |
68493927 | https://en.wikipedia.org/wiki/Termux | Termux | Termux is a free and open source terminal emulator for Android which allows for running a Linux environment on an Android device. In addition, various software can be installed through the application's package manager.
Termux installs a minimal base system automatically, and additional packages are available using a package manager.
Most commands available in Linux are accessible as well as built-in Bash commands. There are also several other shells available, such as Zsh and tcsh.
Termux is the first Android terminal application to include a variety of software, unlike other terminal emulators, in which only small or limited utilities provided by Android are available.
Overview
Packages are cross-compiled with Android NDK and have compatibility patches to get them working on Android. Since all files are installed at the application directory, rooting is not required.
There are more than one thousand packages that can be downloaded and users can submit requests for new ones.
Alternatively, packages can be compiled from source as Termux supports a variety of build tools including CMake as well as compilers for C++, Rust, Go and several others.
Termux can also install interpreters for languages like Ruby, Python, JavaScript, etc.
Terminal-based text editors such as Emacs and Vim can be installed to edit and create files from the terminal.
It is also possible to execute GUI applications in Termux through a VNC server and installing a desktop environment (Xfce, LXQt, MATE) or window manager.
User interface
Termux's user interface is fairly simple and only displays extra keys row and the terminal output, managing sessions by swiping left and manipulating Terminal session by tap and holding and clicking more to bring 10 options. It is also possible to change the color scheme and font through Termux:Styling.
Extra keys row can also be customized. Users can add more function keys and controls within termux.properties file
Termux also has mouse/touch support which can be used to interact some programs that can be used with mouse such as htop and other ncurses-based applications, scrolling is also be done by swiping over terminal buffer.
Configuration
Users can configure the Terminal within termux.properties file. unlike other Terminal emulators, Termux's configuration is read within that file instead of using graphical settings which users will have to use a text editor.
Add-ons
Termux also includes 6 add-ons:
Termux:API: exposes Android functionality to CLI applications
Termux:Styling: allows to change the colorscheme and the font of the Terminal
Termux:Boot: executes Termux commands at boot
Termux:Widget: let's users to run scripts in a dedicated widget or a shortcut in Home screen
Termux:Float: runs Terminal session in a floating window
Termux:Tasker: Plugin to integrate Tasker app to Termux
Add-ons must be installed from same source, as add-ons signed with same signature key to use have same User ID between these apps
History
Termux was initially released in 2015. At its initial launch, it already included a variety of Linux software. Support for requesting packages and features was added through GitHub issues in the app's repository. People can also contribute to the project by adding new features and packages.
In January 2020. Termux development team ended support for devices running Android 5-6 and Termux required Android version 7 as a minimum OS requirement.
With the policy changes in Google play policies, updates to the app through playstore are no longer possible and as such, it is recommended to install the app through alternative sources.
As of 2021 Termux is maintained by collaborators and the current development were behind Fornwall's maintenance to the app
Installation
During the installation, it extracts the bootstrap archive from the APK file and set correct permissions for executable and sets up directories like home directory.
Package management and distribution
Packages in Termux are installed through the application's package manager (pkg) and uses the .deb format by default. But normal Debian packages cannot be installed as Termux is not FHS compliant.
Users can also build and submit packages.
Package availability
Termux has more than 1000+ packages available as of 2021. However, compared to other distributions packages in Termux is still relatively small and some packages can't be ported due to variety of reasons which involve compilation.
Package repositories
Termux has 3 repositories available. ones included in default Termux bootstrap installation include:
main is the main repository containing all CLI utilities and other popular Linux tools and language compilers/interpreters
x11-repo contains X11-based packages and graphical applications.
root-repo contains packages that is useful for rooted devices only. However, some packages can be used without root but functionality may be somewhat limited
Google Play Updates
Termux v0.101 is the last version to be updated in Google Play Store. Google Play enforced apps to target into API level 29 since November 2020 which breaks the execution of binaries on private application directory. according to Google:Untrusted apps that target Android 10 cannot invoke exec() on files within the app's home directory. This execution of files from the writable app home directory is a W^X violation. Apps should load only the binary code that's embedded within an app's APK file. Termux development team suggests to move to F-Droid in order to continue getting updates
Bintray shutdown
In May 2021, Bintray shut down their services, which has been the primary hosting for the Termux packages. Termux migrated to another hosting service and updating/installing packages leads to 403/404 errors in older Termux versions.
See also
Debian
Command-line interface
Package Manager
References
External links
Termux wiki
Free and open-source Android software
Free terminal emulators |
18083195 | https://en.wikipedia.org/wiki/TuneIn | TuneIn | TuneIn is an American audio streaming service delivering live news, radio, sports, music, and podcasts to over 60 million monthly active users. As of 2019, TuneIn has more than 75 million monthly active users.
TuneIn is operated by the company TuneIn Inc. which is based in San Francisco, California. The company was founded by Bill Moore in 2002 as RadioTime in Dallas, Texas. Users can listen to radio on the TuneIn website, use a mobile app, smart speaker, or another supported device. , TuneIn was also available on more than 55 vehicle models. In 2013, the company raised more than $47 million in venture funding from Institutional Venture Partners, Sequoia Capital, GV, General Catalyst Partners, and Icon Ventures.
Function
As of 2019, TuneIn's website and apps allows users to listen to more than 100,000 radio stations from around the world including AM, FM, HD, LP, digital and internet stations, and stream more than four million podcasts. TuneIn's directory lists various sports, news, talk, and music broadcasts from around the world. TuneIn's website is available in 22 languages, each with its own content tailored for the specific language or region. TuneIn also offers 5.7 million on-demand programs.
In August 2015, TuneIn launched a premium service, “TuneIn Premium", that includes audiobooks, sports content from MLB, NFL, NBA, news content from MSNBC, Al Jazeera, and more. Subscribers had been able to record anything played through the TuneIn service, the feature was first discontinued in the UK in early 2017, and the rest of the world on September 14, 2020, citing legal issues. However, that feature remains on older versions of the TuneIn Pro app.
In March 2018, TuneIn launched another premium live audio subscription called "TuneIn Live," which offers play-by-play calls from thousands of live sporting events, plus access to premium news stations, talks shows and other content. The company launched the subscription-based radio service exclusively for Alexa-enabled speakers and subscribers can prompt Alexa to stream news programs as well as play-by-play broadcasts of MLB, NFL, NBA, and NHL games. TuneIn Live marked the first time TuneIn premium content was available over a voice platform.
In October 2018, the company launched a commercial-free news offering through TuneIn Premium, which included new programs from such as CNBC, Fox News Talk, and MSNBC, as well as news podcasts from Progressive Voices, The Economist, and The Wall Street Journal.
In 2017, the company raised $50 million and was valued at $500 million.
Content
The service has more than 100,000 broadcast radio stations and four million on-demand programs and podcasts from around the world. TuneIn has deals with various broadcasters of sports, news, talk, and music worldwide like ESPN Radio, NPR, Public Radio Exchange (PRX), CBC / Radio-Canada, C-SPAN Radio, All India Radio, Emmis Communications, Hearst Radio, iHeartMedia, Urban One, mvyradio, Wu-Tang Radio (Wu World Radio), ABC Radio and Regional Content (Australia), Bonneville International, Sport Your Argument, talkSPORT, and Westwood One Podcast Network.
On June 25, 2018, Audacy, Inc. (then known as Entercom) announced that it would move online streaming of its stations from TuneIn to its then-named in-house Radio.com platform, with legacy stations removed July 6, and former CBS Radio stations removed on August 1. In turn, Cumulus Media joined the TuneIn platform on August 9, 2018.
On July 26, 2021, iHeartMedia owned-radio stations were added into TuneIn after the two sides agreed on a deal. The deal would also allow TuneIn to gain advertising from IHeartMedia's local sales.
Music
In May 2018, the company announced it would exclusively stream concerts from several summer music festivals including Outside Lands Music and Arts Festival in San Francisco, the Newport Jazz Festival in Newport, RI, the Hangout Fest in Gulf Shores, Alabama, the Firefly Music Festival in Dover, Delaware and the Newport Folk Festival.
Two months later Cathleen Robertson, better known as DJ Carisma of KRRL, joined TuneIn to head Hip-Hop/R&B curation and artist relations initiatives. During the winter of 2018, the company announced that John Legend and several other top musicians would take over its “Holiday Hits” station during the season.
Sports
In August 2015, TuneIn announced deals with MLB and Premier League and the Bundesliga for live play-by-play coverage. This also includes the ability to cover the minor league affiliates. In October 2015, NFL announced a deal with TuneIn to broadcast live, play-by-play coverage of all NFL games to its premium subscribers.
On December 22, 2015, the National Hockey League (NHL) announced that TuneIn would gain radio rights to the NHL. TuneIn would create an individual station for every NHL team to simulcast their home market broadcasts on. Additionally, TuneIn would create a replay channel for each team so fans could listen to the games archived. They would also create a 24/7 NHL Channel, and the NHL would embed TuneIn's player onto the NHL.com website. All TuneIn NHL items would be made available to the public for free. The first broadcasts for TuneIn began Jan. 1, 2016.
On February 15, 2019 the Oakland Athletics of Major League Baseball announced that TuneIn would be launching a 24/7 exclusive A's station which would include free streaming of all the team's games within the team's market as well as exclusive team programming. In 2020, it was planned for TuneIn to become the exclusive home of the A's in the Bay Area after the team abandoned radio in the market however the team later stuck a deal with iHeartMedia to have KNEW serve as the team's flagship station and A's Cast moved to the iHeartRadio app.
In August 2020, TuneIn removed MLB and NBA content from its platform with no explanation given. The next month, TuneIn also removed NFL content from its platform without explanation.
As of August 2021, NFL content returned on TuneIn's platform.
Audiobooks
In August 2015, the service launched deals with book publishers including Penguin Random House and HarperCollins to provide an audiobook library. In December 2017, TuneIn announced that it would remove audiobooks as of January 15, 2018.
Partnerships
In October 2018, TuneIn partnered with MSNBC to exclusively represent the sales rights of podcast, Bag Man: A Rachel Maddow Original Podcast. The also company partnered with Adobe Advertising Cloud in June 2018 to integrate targeted audio ads to consumers via smart speakers.
In January 2019 TuneIn announced a partnership with golfer Greg Norman to integrate its audio streaming platform in ‘Shark Experience,’ his line of connected golf carts.
Listenership
The company said that it generated more than half a billion hours of listening during December 2018 and that overall listening hours had risen 31% year-on-year. Also, they shared that its partnerships with third-party devices and apps increased unique listeners by more than 40%.
Litigation
In 2017, TuneIn was sued by Sony Music UK and Warner Music UK, alleging copyright infringement by offering access to international radio stations not licensed for distribution in the United Kingdom. The companies also took issue with a feature in its premium tier (which was later disabled in the country) that allowed users to record broadcasts. In November 2019, the English High Court ruled that despite its arguments that it was merely an aggregator similar to a search engine, the TuneIn service infringed the labels' rights by making streams not licensed in the country available to its users (an infringement of the exclusive right to communicate a work to the public, under EU copyright law). The court granted a request for an appeal.
In September 2020, TuneIn began to geoblock all international radio stations for users in the United Kingdom, citing the earlier court order. On March 29, 2021, the Court of Appeal upheld the High Court decision, ruling that TuneIn infringed the right of communication to the public.
References
External links
Internet radio stations in the United States
Android (operating system) software
BlackBerry software
IOS software
Windows Phone software
Multilingual websites
2002 establishments in California
Universal Windows Platform apps
Android Auto software
Music streaming services
Podcasting software |
68211860 | https://en.wikipedia.org/wiki/Aesymnus%20%28mythology%29 | Aesymnus (mythology) | In Greek mythology, Aesymnus or Aisymnos (Ancient Greek: Αἴσυμνόν) was a Greek warrior in the Trojan War.
Mythology
Aesymnus was slain by Hector just before the Trojans attack the Greek ship's camp in the tenth year of the battle."Who then was first to be slain, and who last by Hector, Priam's son, when Zeus vouchsafed him glory? Asaeus first, and Autonous, and Opites and Dolops, son of Clytius, and Opheltius, and Agelaus, and Aesymnus, and Orus, and Hipponous, staunch in fight. These leaders of the Danaans he slew and thereafter fell upon the multitude, and even as when the West Wind driveth the clouds of the white South Wind, smiting them with a violent squall, and many a swollen wave rolleth onward, and on high the spray is scattered beneath the blast of the wandering wind; even so many heads of the host were laid low by Hector."
Legacy
Aesymnus' name inspired 231666 Aisymnos, a Jupiter trojan.
Notes
References
Homer, The Iliad with an English Translation by A.T. Murray, Ph.D. in two volumes. Cambridge, MA., Harvard University Press; London, William Heinemann, Ltd. 1924. . Online version at the Perseus Digital Library.
Homer, Homeri Opera in five volumes. Oxford, Oxford University Press. 1920. . Greek text available at the Perseus Digital Library.
Achaeans (Homer)
Characters in the Iliad
Characters in Greek mythology |
62971006 | https://en.wikipedia.org/wiki/Literary%20feud | Literary feud | A literary feud is a conflict or quarrel between well-known writers, usually conducted in public view by way of published letters, speeches, lectures, and interviews. In the book Literary Feuds, Anthony Arthur describes why readers might be interested in the conflicts between writers: "we wonder how people who so vividly describe human failure (as well as triumph) can themselves fall short of perfection."
Feuds were sometimes based on conflicting views of the nature of literature as between C. P. Snow and F. R. Leavis, or on disdain for each other's work such as the quarrel between Virginia Woolf and Arnold Bennett. Some feuds were conducted through the writers' works, as when Alexander Pope satirized John Hervey in Epistle to Dr Arbuthnot. A few instances resulted in physical violence, such as the encounter between Sinclair Lewis and Theodore Dreiser, and on occasion involved litigation, as in the dispute between Lillian Hellman and Mary McCarthy.
History of literary feuds
A literary feud involves both a public forum and public reprisals. Feuds might begin in the public view through the quarterlies, newspapers, and monthly magazines, but frequently extended into private correspondence and in-person meetings. The participants are literary figures: writers, poets, playwrights, critics. Many feuds were based on opposing philosophies of literature, art, and social issues, although the disputes often devolved into attacks on personality and character. Feuds often have personal, political, commercial, and ideological dimensions.
In Lapham's Quarterly, Hua Hsu compares literary feuds with the one-upmanship of hip-hop artists, "animated...by antipathy, insecurity, jealousy" and notes that "Some of the great literary feuds of the past would have been perfect for the social media age, given their withering brevity." It is not uncommon for observers, particularly the press, to label writers' rivalries and deteriorations in friendships as feuds, such as the rivalry between sisters A. S. Byatt and Margaret Drabble or when Vargas Llosa punched Gabriel Garcia Marquez for an incident involving Llosa's wife.
During the Romantic era, feuds were encouraged by the Quarterly Review, Edinburgh Review, and Blackwood's Magazine as a marketing tactic. The Edinburgh editor, Francis Jeffrey, wanted a nasty review in each issue, as the responses and reprisals would attract readers. Reviewers were generally anonymous, often using the collective "we" in their reviews, although the actual authorship of reviews tended to be open secrets. Thomas Love Peacock said of the Edinburgh, "The mysterious we of the invisible assassin converts his poisoned dagger into a host of legitimate broadswords." Blackwood's attacked the Cockney School, much as Edinburgh attacked those it dubbed the Lake Poets. Lady Morgan boasted that the Quarterly'''s attacks on her work just increased her sales.
Coleridge described the Romantic era as "the age of personality" in which the public is preoccupied with the private lives of people in the public eye and accuses the periodicals of the time of having "a habit of malignity". In footnotes to his Biographia Literaria, Coleridge made accusations against Jeffrey without naming him but providing sufficient detail that others would easily know the person he meant. Through his responses, Jeffrey "magnifies a footnote into a feud", going so far as to sign his initials to his rebuttals despite the commonly accepted culture of reviewer anonymity at the time. Coleridge complained that media attention to his quarrel with the Edinburgh editor left him unable to escape from "the degrading Taste of the present Public for personal Gossip". The British Critic weighed in, siding with Coleridge, while Blackwood's launched its own attack on the poet.
Just as attacks could take the form of "persecution by association" in which a writer might be maligned for an actual or perceived allegiance to another writer, reprisals could bring in more participants to engage in "self-defense by association". Scholar John Sloan says of the late 19th century writers, "In the age of mass culture and the popular press, public rowing was regarded as a favourite device for the attention-seekers whose wish was to astonish and arrive."
Dr. Manfred Weidhorn, the Abraham and Irene Guterman Chair in English Literature and professor emeritus of English at Yeshiva University, says "At least one such major confrontation appears in a different country during each of the traditional major phases of Western culture — classical Greece, medieval Germany, Renaissance England, Enlightenment France and England, nineteenth-century Russia, modern America."
Classical Greece
In classical Greece, poets and playwrights competed at festivals such as City Dionysia and Lenaia. Weidhorn cites a conflict between Euripides and Sophocles as evidenced by the line in Aristotle's Poetics, "Sophocles said that he himself created characters such as should exist, whereas Euripides created ones such as actually do exist." Aristophanes notably caricatured Euripides in his plays. Centuries later, George Bernard Shaw and John Davidson would refer to themselves respectively as Aristophanes and Euripedes in correspondence, and their relationship would later deteriorate into a counterpart of the mythical ancient quarrel.
Medieval German
In medieval Germany, Gottfried von Strassburg's Tristan and Wolfram von Eschenbach's Parzival, which were published at the same time, differed on social, esthetic, and moral viewpoints, and resulted in what has been called "one of the more famous literary quarrels in medieval literature", although that characterization based on interpretations of fragments has been disputed by other scholars.
Renaissance England
For a major confrontation in Renaissance England, Weidhorn posits Shakespeare versus Ben Jonson, referring to the War of the Theatres, also known as the Poetomachia. Scholars differ over the true nature and extent of the rivalry behind the Poetomachia. Some have seen it as a competition between theatre companies rather than individual writers, though this is a minority view. It has even been suggested that the playwrights involved had no serious rivalry and even admired each other, and that the "War" was a self-promotional publicity stunt, a "planned ... quarrel to advertise each other as literary figures and for profit." Most critics see the Poetomachia as a mixture of personal rivalries and serious artistic concerns—"a vehicle for aggressively expressing differences...in literary theory...[a] basic philosophical debate on the status of literary and dramatic authorship."
Enlightenment France and England
The conflict between Voltaire and Rousseau in France would erupt whenever either of them published a major work, beginning with Voltaire's criticisms to Rousseau's Discourse on Inequality. When Voltaire published Poème sur le désastre de Lisbonne (English title: Poem on the Lisbon Disaster), Rousseau felt the poem "exaggerated man's misery and turned God into a malevolent being". Their various disagreements escalated to Rousseau revealing that Voltaire was the author of a pamphlet Voltaire had published anonymously to avoid arrest.
In England, Henry Fielding's novel Pamela; or, Virtue Rewarded and Samuel Richardson's novel Shamela posed opposing views on the purpose of novels and how realism and morals should be reflected. A portion of the subtitle to Shamela was In which the many notorious Falsehoods and Misrepresentations of a Book called Pamela are exposed and refuted. Literary critic Michael LaPointe suggests that Fielding's Shamela in response to Richardson's Pamela represents an exemplary literary feud: "a serious argument about the nature of literature that takes place actually within the literary medium."
A wider ranging literary quarrel became known as the Quarrel of the Ancients and the Moderns. In France at the end of the seventeenth century, a minor furor arose over the question of whether contemporary learning had surpassed what was known by those in Classical Greece and Rome. The "moderns" (epitomised by Bernard le Bovier de Fontenelle) took the position that the modern age of science and reason was superior to the superstitious and limited world of Greece and Rome. In Fontenelle's opinion, modern man saw farther than the ancients ever could. The "ancients," for their part, argued that all that is necessary to be known was to be found in Virgil, Cicero, Homer, and especially Aristotle. The dispute was satirized by Jonathan Swift in The Battle of the Books.
Nineteenth-century Russia
Both Tolstoy and Dostoyevsky were respected writers in Russia and initially thought well of each other's work. Then Dostoyevsky objected to War and Peace being referred to as an "act of genius", saying Pushkin was the real genius. The writers had opposing views during Russia's war with Turkey, and Tolstoy's view on the war as expressed in the final installment to Anna Karenina angered Dostoyevsky. Tolstoy, in turn, was critical of Dostoyevsky's work, describing The Brothers Karamazov as "anti-artistic, superficial, attitudinizing, irrelevant to the great problems" and said the dialog was ""impossible, completely unnatural.... All the characters speak the same language."
Modern America
Although Faulkner and Hemingway respected each other's work, Faulkner told a group of college students that he ranked himself higher than Hemingway among American writers because Hemingway was "too careful, too afraid of making mistakes in diction; he lacked courage". Faulkner's remarks were leaked and published in a New York newspaper, infuriating Hemingway. Especially troubled by the comments on his courage, Hemingway requested a letter from an Army general to attest to Hemingway's bravery. Although Faulkner apologized in a letter, he would continue to make similar statements about Hemingway as a writer. Their disputes continued over the years, with Faulkner refusing to review The Old Man and the Sea with what Hemingway took as a vicious insult, and Hemingway saying A Fable was "false and contrived".
Notable feuds
Germain de Brie and Thomas More
Germain de Brie's most famous work was Chordigerae navis conflagratio ("The Burning of the Ship Cordelière") (1512), a Latin poem about the recent destruction of the Breton flagship Cordelière in the Battle of Saint-Mathieu between the French and English fleets. The poem led to a literary controversy with the English scholar and statesman Sir Thomas More, in part because it contained criticisms of English leaders, but also because of its hyperbolic account of the bravery of the Breton captain Hervé de Portzmoguer. In his epigrams addressed to de Brie, More ridiculed the poem's description of "Hervé fighting indiscriminately with four weapons and a shield; perhaps the fact slipped your mind, but your reader ought to have been informed in advance that Hervé had five hands.
Stung by More's attacks, de Brie wrote an aggressive reply, the Latin verse satire Antimorus (1519), including an appendix which contained a "page-by-page listing of the mistakes in More's poems". Sir Thomas immediately wrote another hard-hitting pamphlet, Letter against Brixius, but Erasmus intervened to calm the situation, and persuaded More to stop the sale of the publication and let the matter drop.
Thomas Nashe and Gabriel Harvey
The feud between Thomas Nashe and Gabriel Harvey was conducted through pamphlet wars in 16th century England and was so well known that Shakespeare's play Love's Labour's Lost included references to the quarrel.
In 1590, Gabriel's brother Richard criticized Nashe in his work The Lamb of God.
In 1592, Robert Greene responded in A Quip for an Upstart Courtier with a satiric passage that ridicules a ropemaker and his three sons, which was taken to refer to Gabriel, Richard, and John Harvey, but then removed it in subsequent printings.
Nashe attacked Richard Harvey in Pierce Penniless, writing "Would you, in likely reason, gesse it were possible for any shame-swolne toad to have the spet-proofe face to out live this disgrace?"
Gabriel Harvey responded to Greene in Four Letters and in it criticized Nashe to defend his brother.
Nashe responded with Strange News of Intercepting Certain Letters attacking Gabriel at length.
Gabriel Harvey wrote Pierce's Supererogation, however before it is published, Nashe published a letter to Christ's Tears apologizing to Harvey.
Gabriel Harvey responded with A New Letter of Notable Content, rejecting reconciliation with Nashe.
Nashe revised his letter to Christ's Tears to respond angrily, then wrote a fuller response in Have with You to Saffron Walden in 1597, in which he claimed to continue the quarrel in order to salvage his own reputation.
In 1599, Archbishop Whitgift and Richard Bancroft, bishop of London, banned all works by Nashe and Harvey in an order against satiric and contentious publications.
Although it began as a controversy between factions of writers, it became a personal quarrel between Nash and Gabriel Harvey after John Harvey and Robert Greene both died and Richard Harvey withdrew from participation. There is some speculation that the controversy was encouraged to sell more books.
Molière and Edmé Boursault
The play Portrait of the Painter, or Criticisms of the School for Women Criticized (French: Le Portrait du Peintre ou La Contre-critique de L’École des femmes, September 1663) by Edmé Boursault was part of an ongoing literary quarrel over The School for Wives (1662) by Molière.
The original play had caricatured "male-dominated exploitative marital relationships", and became a target of criticism. Criticisms ranged from accusing Molière of impiety, to nitpicking over the perceived lack of realism in certain scenes. Molière had answered his critics with a second play, The School for Women Criticized (French: La Critique de L’École des femmes, June 1663).
Boursault wrote his play in answer to this second play. In The School for Women Criticized, Molière poked fun at his critics by having their arguments expressed on stage by comical fools, while the character defending the original play, a mouthpiece for the writer, is a straight man with serious and thoughtful replies. In his Portrait, Boursault imitates the structure of Molière's play but subjects the characters to a role reversal. In other words, the critics of Molière are featured as serious and his defenders as fools. Boursault probably included other malicious and personal attacks on Molière and his associates in the stage version, which were edited out in time for publication. The modern scholar can only guess at their nature by Molière's haste to respond.
Molière answered with a third play of his own, The Versailles Impromptu (French: L'Impromptu de Versailles, October 1663), which reportedly took him only eight days to write. It went on stage two weeks (or less) after the Portrait. This play takes place in the theatrical world, featuring actors playing actors on stage. Among jests aimed at various targets, Molière mocks Boursault for his obscurity. The characters have trouble even remembering the name of someone called "Brossaut". Molière further taunts the upstart as "a publicity-seeking hack".
Alexander Pope and John Hervey
John Hervey was the object of savage satire on the part of Alexander Pope, in whose works he figured as Lord Fanny, Sporus, Adonis and Narcissus. The quarrel is generally put down to Pope's jealousy of Hervey's friendship with Lady Mary Wortley Montagu. In the first of the Imitations of Horace, addressed to William Fortescue, Lord Fanny and Sappho were generally identified with Hervey and Lady Mary, although Pope denied the personal intention. Hervey had already been attacked in the Dunciad and the Peribathous, and he now retaliated. There is no doubt that he had a share in the Verses to the Imitator of Horace (1732) and it is possible that he was the sole author. In the Letter from a nobleman at Hampton Court to a Doctor of Divinity (1733), he scoffed at Pope's deformity and humble birth.
Pope's reply was a Letter to a Noble Lord, dated November 1733, and the portrait of Sporus in the Epistle to Dr Arbuthnot (1743), which forms the prologue to the satires. Many of the insinuations and insults contained in it are borrowed from Pulteney's A Proper Reply to a late Scurrilous Libel.
Ugo Foscolo and Urbano Lampredi
In 1810, Ugo Foscolo wrote a satirical essay, Ragguaglio d'un'adunanza dell'Accademia de' Pitagorici, that mocked a group of Milanese literary figures. One of those figures, Urbano Lampredi, responded harshly in the literary journal Corriere Milanese. Foscolo's response called Lampredi "King of the league of literary charlatans". The dispute extended to the Il Poligrafo and Annali di scienze e lettere journals.
Lord Byron and John Keats
Lord Byron disdained the poetry of John Keats, the son of a livery-stable keeper, calling Keats a "Cockney poet" and referring to "Johnny Keats' piss-a-bed poetry". In turn, Keats claimed the success of Bryon's work was due more to his pedigree and appearance than any merit.
Charles Dickens, Edmund Yates, and W. M. Thackeray
In the 1850s, Charles Dickens and William Makepeace Thackeray were considered competitors for novelist of the era. They were not friends, and it was well known among their fellow members of the Garrick Club that should one enter the room, the other would quickly make excuses and leave.
In 1858, Dickens and his wife were separating. He was made aware that Thackeray had commented to a third party that Dickens's marital discord was due to an actress. Edmund Yates, a friend of Dickens, published an unflattering profile of Thackeray in Town Talk. Thackeray accused Yates of writing a piece that was "slanderous and untrue", but Yates refused to apologize and replied that Thackeray's letter was the "slanderous and untrue document".
Thackeray requested that the Garrick Club take action against Yates for behaviour "intolerable in a Society of Gentlemen". The club leadership demanded that Yates apologize or quit the club; Yates refused to do either, and threatened to hire a barrister. Dickens offered to mediate the disagreement, which Thackeray refused. In describing his quarrel with Yates, Thackeray said, "I am hitting the man behind him", referring to Dickens.
William Dean Howells and Edmund Stedman
In 1886, William Dean Howells and Edmund Stedman traded verbal blows in the pages of Harper's Monthly and the New Princeton Review. Their disagreements on the origins of literary craftsmanship and the limits of historical knowledge were reported on by other periodicals, such as The Critic, the Boston Gazette, and the Penny Post. The conflict stemmed from Howell's promotion of literary realism against Stedman's defense of idealism.
Marcel Proust and Jean Lorrain
Jean Lorrain wrote an unfavorable review of Marcel Proust's Pleasures and Days in which he insinuated that Proust was having an affair with Lucien Daudet. Proust challenged Lorrain to a duel. The two writers exchanged shots from twenty-five paces on 5 February 1897, and neither was hit by a bullet.
Mark Twain and Bret Harte
Mark Twain and Bret Harte, both popular American writers in the nineteenth century, were colleagues, friends, and competitors. Harte, as the editor of a magazine called Overland Monthly, "trimmed and trained and schooled" Twain into becoming a better writer, as Twain put it. In late 1876, Twain and Harte agreed to collaborate on a play, Ah Sin, that featured the character Hop Sing from Harte's earlier play, Two Men of Sandy Bar. Neither writer was satisfied with the script that resulted, and both of them were dealing with other difficulties in their lives at the time: Harte with financial troubles and drinking, and Twain with his Huckleberry Finn manuscript. The biographer Marilyn Duckett dates the estrangement between Harte and Twain to their letters in 1877, when Twain suggested that he hire Harte to work on another play with him for $25 a week (rather than lend him any money), and Harte reacted with outrage. Harte also held Twain responsible for recommending a publisher who would then mishandle Harte's novel, and declared that because of the financial losses that resulted, he need not repay Twain money he had previously borrowed. Twain described Harte's letter as "ineffable ".
Twain reworked Ah Sin without Harte, and it opened on Broadway in July, although it was not a success. The final direct communication between the two writers was a telegram from Harte asking for his share of the box office receipts.
When some influential friends recommended Harte to then-President Rutherford B. Hayes for a diplomatic post, Twain contacted William Dean Howells, who was related by marriage to the President, to work against any such appointment, claiming that Harte would disgrace the nation. Twain's letter included "Wherever he goes his wake is tumultuous with swindled grocers & with defrauded innocents who have loaned him money...No man who has ever known him respects him." However, Harte would eventually win an appointment to Germany.
As Twain's fame as a writer grew and Harte's faded, Twain continued to comment on Harte's work and character, including the suggestion that Harte was homosexual. Even several years after Harte's death, in Twain's reminiscences which were published as Mark Twain in Eruption, Twain included derisive comments about Harte: "He hadn't any more passion for his country than an oyster has for its bed; in fact not so much, and I apologize to the oyster."
Edgar Allan Poe and Thomas Dunn English
Thomas Dunn English was a friend of author Edgar Allan Poe, but the two fell out amidst a public scandal involving Poe and the writers Frances Sargent Osgood and Elizabeth F. Ellet. After suggestions that her letters to Poe contained indiscreet material, Ellet asked her brother to demand the return of the letters. Poe, who claimed he had already returned the letters, asked English for a pistol to defend himself from Ellet's infuriated brother. English was skeptical of Poe's story and suggested that he end the scandal by retracting the "unfounded charges" against Ellet. The angry Poe pushed English into a fistfight, during which his face was cut by English's ring. Poe later claimed to have given English "a flogging which he will remember to the day of his death", though English denied it; either way, the fight ended their friendship and stoked further gossip about the scandal.
Later that year, Poe harshly criticized English's work as part of his "Literati of New York" series published in Godey's Lady's Book, referring to him as "a man without the commonest school education busying himself in attempts to instruct mankind in topics of literature". The two had several confrontations, usually centered around literary caricatures of one another. One of English's letters which was published in the 23 July 1846, issue of the New York Mirror caused Poe to successfully sue the editors of the Mirror for libel. Poe was awarded $225.06 as well as an additional $101.42 in court costs. That year English published a novel called 1844, or, The Power of the S.F. Its plot made references to secret societies, and ultimately was about revenge. It included a character named Marmaduke Hammerhead, the famous author of The Black Crow, who uses phrases like "Nevermore" and "lost Lenore." The clear parody of Poe was portrayed as a drunkard, liar, and domestic abuser. Poe's story "The Cask of Amontillado" was written as a response, using very specific references to English's novel. Years later, in 1870, when English edited the magazine The Old Guard, founded by the Poe-defender Charles Chauncey Burr, he found occasion to publish both an anti-Poe article (June 1870) and an article defending Poe's greatest detractor Rufus Wilmot Griswold (October 1870).
Edgar Allan Poe and Rufus Wilmot Griswold
The writer Rufus Wilmot Griswold first met Poe in Philadelphia in May 1841 while working for the Daily Standard. In a letter dated 29 March 1841, Poe sent Griswold several poems for The Poets and Poetry of America anthology, writing that he would be proud to see "one or two of them in the book". Griswold included three of these poems: "Coliseum", "The Haunted Palace", and "The Sleeper". In November of that year, Poe, who had previously praised Griswold in his "Autography" series as "a gentleman of fine taste and sound judgment", wrote a critical review of the anthology, on Griswold's behalf. Griswold paid Poe for the review and used his influence to have it published in a Boston periodical. The review was generally favorable, although Poe questioned the inclusion of certain authors and the omission of others. Griswold had expected more praise and Poe privately told others he was not particularly impressed by the book, even calling it "a most outrageous humbug" in a letter to a friend. In another letter, this time to fellow writer Frederick W. Thomas, Poe suggested that Griswold's promise to help get the review published was actually a bribe for a favorable review, knowing Poe needed the money.
Making the relationship even more strained, only months later, Griswold was hired by George Rex Graham to take up Poe's former position as editor of Graham's Magazine. Griswold, however, was paid more and given more editorial control of the magazine than Poe. Shortly after, Poe began presenting a series of lectures called "The Poets and Poetry of America". Poe openly attacked Griswold in front of his large audience and continued to do so in similar lectures. Another source of animosity between the two men was their competition for the attention of the poet Frances Sargent Osgood in the mid to late 1840s.
After Poe's death, Griswold prepared an obituary signed with the pseudonym "Ludwig". First printed in the 9 October 1849, issue of the New York Tribune, it was soon republished many times. Griswold asserted that "few will be grieved" by Poe's death as he had few friends. He claimed that Poe often wandered the streets, either in "madness or melancholy", mumbling and cursing to himself, was easily irritated, was envious of others, and that he "regarded society as composed of villains". Poe's drive to succeed, Griswold wrote, was because he sought "the right to despise a world which galled his self-conceit". Much of this characterization of Poe was copied almost verbatim from that of the fictitious Francis Vivian in The Caxtons by Edward Bulwer-Lytton.
Griswold claimed that "among the last requests of Mr. Poe" was that he become his literary executor "for the benefit of his family". Griswold, along with James Russell Lowell and Nathaniel Parker Willis, edited a posthumous collection of Poe's works published in three volumes starting in January 1850. He did not share the profits of his edition with Poe's surviving relatives. This edition included a biographical sketch titled "Memoir of the Author" which has become notorious for its inaccuracy. The "Memoir" depicts Poe as a madman, addicted to drugs and chronically drunk. Many elements were fabricated by Griswold using forged letters as evidence and it was denounced by those who knew Poe, including Sarah Helen Whitman, Charles Frederick Briggs, and George Rex Graham. Some of the information that Griswold asserted or implied was that Poe was expelled from the University of Virginia and that Poe had tried to seduce his guardian John Allan's second wife. Griswold's characterization of Poe and the false information he originated appeared consistently in Poe biographies for the next two decades.
Virginia Woolf and Arnold Bennett
Arnold Bennett wrote an article called "Is the Novel Decaying?" in 1923 in which, as an example, he criticized Virginia Woolf's characterizations in Jacob's Room. Woolf responded with "Mr. Bennett and Mrs. Brown" in the Nation and Athenaeum. In her piece, Woolf misquoted Bennett's article and displayed ill temper. She then significantly rewrote "Mr. Bennett and Mrs. Brown" "to ridicule, patronize, and actually distort Bennett's writing without raising her voice."
Though he didn't respond immediately, Bennett later began an anti-Woolf campaign in a weekly column in the Evening Standard, giving negative reviews of three of Woolf's novels. His reviews continued the attack on Woolf's characterizations, saying "Mrs. Woolf (in my opinion) told us ten thousand things about Mrs. Dalloway, but did not show us Mrs. Dalloway." His essay "The Progress of the Novel" for the journal The Realist was a refutation of "Mr. Bennett and Mrs. Brown". Of Woolf, he says ""I regard her alleged form as the absence of form, and her psychology as an uncoordinated mass of interesting details, none of which is truly original."
Although the two writers met socially and acted with civility, each recorded the meetings harshly in their respective journals. On Bennett's death, Woolf wrote in her diary, ""Queer how one regrets the dispersal of anybody who seemed—as I say—genuine; who had direct contact with life—for he abused me; and I yet rather wished him to go on abusing me; and me abusing him."
Vladimir Nabokov and Edmund Wilson
The feud between Vladimir Nabokov and Edmund Wilson began in 1965. After a twenty-five year friendship which was at times strained due to Nabokov's disdain for Wilson's political views and then later by Wilson's criticism of Lolita, the two writers ultimately fell out over the translation of Alexander Pushkin's Eugene Onegin.
In 1964, Nabokov published his translation of the Russian classic, which he felt conformed scrupulously to the sense of the poem while completely eschewing melody and rhyme. Wilson's review of Nabokov's translation in the New York Review of Books was cutting and disparaging. In his book The Feud, Alex Beam describes Wilson's review as "an overlong, spiteful, stochastically accurate, generally useless but unfailingly amusing hatchet job".
Rejoinders and rebuttals spread from New York Review to Encounter and the New Statesman. Other writers, such as Anthony Burgess, Robert Lowell, V. S. Pritchett, Robert Graves, and Paul Fussell joined in the dispute.
Years later, hearing that Wilson was ill, Nabokov wrote to him, saying that he no longer held a "grudge for your incomprehensible incomprehension of Pushkin's and Nabokov's Onegin."
Norman Mailer and Gore Vidal
In 1971, Gore Vidal compared Norman Mailer to Charles Manson in Vidal's review of The Prisoner of Sex. When the two writers were guests on the same episode of The Dick Cavett Show, Mailer punched Vidal in the hospitality room, then brought up the review again on the live show. Six years later at a party, Mailer threw a drink in Vidal's face and followed it with a punch. Vidal is said to have responded, "Norman, once again words have failed you."
Gore Vidal and Truman Capote
Gore Vidal and Truman Capote were competitive acquaintances who were, initially, cordial. Their first open argument began at a party hosted by Tennessee Williams. Williams said, "They began to criticize each other's work. Gore told Truman he got all of his plots out of Carson McCullers and Eudora Welty. Truman said 'Well, maybe you get all of yours from the Daily News.' And so the fight was on."
In 1975 Vidal sued Capote for slander over the accusation that he had been thrown out of the White House for being drunk, putting his arm around the first lady and then insulting Mrs. Kennedy's mother. Capote's defense was damaged when Lee Radziwill refused to testify on Capote's behalf. Despite her prior deposition, Radziwill said, "I do not recall ever discussing with Truman Capote the incident or the evening which I understand is the subject of this lawsuit." Ultimately, Capote offered a pro forma apology and the suit was settled out of court.
Vidal responded to news of Capote's death by calling it "a wise career move".
John Updike, Tom Wolfe, Norman Mailer, and John Irving
Because of the success of Tom Wolfe's best selling novel, Bonfire of the Vanities, there was widespread interest in his next book. This novel took him more than 11 years to complete; A Man in Full was published in 1998. The book's reception was not universally favorable, though it received glowing reviews in Time, Newsweek, The Wall Street Journal, and elsewhere. Noted author John Updike wrote a critical review for The New Yorker, complaining that the novel "amounts to entertainment, not literature, even literature in a modest aspirant form." His comments sparked an intense war of words in the print and broadcast media among Wolfe and Updike, and authors John Irving and Norman Mailer who also entered the fray, with Irving saying in a television interview, "He's not a writer...You couldn't teach that bleeping bleep to bleeping freshmen in a bleeping freshman English class!." In 2001, Wolfe published an essay referring to these three authors as "My Three Stooges" which he reprinted in his collection Hooking Up. In it, he implies that Updike, Mailer, and Irving were jealous of his success because their own recent books had not been bestsellers.
Sinclair Lewis and Theodore Dreiser
In 1927, Theodore Dreiser and Sinclair Lewis's soon-to-be wife Dorothy Thompson spent some time together while they were both visiting Russia. The next year, Thompson published The New Russia. Several months later, Dreiser published Dreiser Looks at Russia. Thompson and Lewis accused Dreiser of plagiarizing portions of Thompson's work, which Dreiser denied and claimed instead that Thompson had used material of his.
In June 1930, Lewis and Dreiser were in contention for the Nobel Prize in Literature. Lewis won, the first American to be awarded the prize. Several months after the ceremony, the writers encountered each other at the Metropolitan Club at a dinner honoring Boris Pilnyak. After much drinking, Lewis rose to give the welcome speech, but instead declared he "did not care to speak in the presence of a man who has stolen three thousand words from my wife's book."
After dinner, Dreiser approached Lewis and asked him to take back his statement. When Lewis repeated it, Dreiser recalls, "I smacked him. And I asked him if he wanted to say it again. He said it again. So I smacked him again." When another guest intervened, Dreiser left, saying "I'll meet you any time, anywhere. This thing isn't settled." The fight made headlines around the world, even being referred to as "the slap heard round the world".
C. P. Snow and F. R. Leavis
British scientist and novelist C. P. Snow delivered The Two Cultures, the first part of an influential 1959 Rede Lecture, on 7 May 1959 . Snow's lecture condemned the British educational system as having, since the Victorian era, over-rewarded the humanities (especially Latin and Greek) at the expense of scientific and engineering education, despite such achievements having been so decisive in winning the Second World War for the Allies. The literary critic F. R. Leavis was incensed by Snow's implication that, in the alliance between the sciences and the humanities, literary intellectuals were the "junior partner".
Leavis called Snow a "public relations man" for the scientific establishment in his essay Two Cultures?: The Significance of C. P. Snow, published in The Spectator in 1962 and wrote "as a novelist he doesn't exist...utterly without a glimmer of what creative literature is or why it matters." The article attracted a great deal of negative correspondence in the magazine's letters pages and some of Snow's friends suggested that he sue Leavis for defamation.
Although Snow chose not to engage with Leavis, others defended Snow. In the United States, a reviewer for The New Republic declared Leavis was acting out of "pure hysteria" and was displaying "persecution mania".
Lillian Hellman and Mary McCarthy
Mary McCarthy's feud with Lillian Hellman had simmered since the late 1930s over ideological differences, particularly the questions of the Moscow Trials and of Hellman's support for the "Popular Front" with Stalin. Then, in a 1979 television interview, McCarthy, long Hellman's political adversary and the object of her negative literary judgment, said of Hellman that "every word she writes is a lie, including 'and' and 'the'." Hellman responded by filing a US$2,500,000 defamation suit against McCarthy, interviewer Dick Cavett, and PBS. McCarthy in turn produced evidence she said proved that Hellman had lied in some accounts of her life. Cavett said he sympathized more with McCarthy than Hellman in the lawsuit, but "everybody lost" as a result of it. Norman Mailer attempted unsuccessfully to mediate the dispute through an open letter he published in the New York Times. At the time of her death, Hellman was still in litigation with McCarthy; her executors dropped the suit. Observers of the trial noted the resulting irony of Hellman's defamation suit is that it brought significant scrutiny, and decline of Hellman's reputation, by forcing McCarthy and her supporters to prove that she had lied.
Salman Rushdie and John le Carré
During The Satanic Verses controversy, le Carré stated that Rushdie's insistence on publishing the paperback was putting lives at risk. Eight years later, Rushdie criticized le Carré for overreacting when a reviewer claimed The Tailor of Panama contained anti-Semitism. Rushdie and le Carré then engaged in angry exchanges in The Guardian and The Times. They would not reconcile for fifteen years. Each has since said that they regretted engaging in the conflict.
Paul Theroux and V. S. Naipaul
Paul Theroux and V. S. Naipaul met in 1966 in Kampala, Uganda. Their friendship cooled when Theroux criticized Naipaul's work. Later, Theroux took offense when he found books he had inscribed to Naipaul offered for sale in a rare books catalog. Naipaul's biographer claimed that Naipaul belittled Theroux's writing. Then in 1998, Theroux portrayed Naipaul in an unattractive light in his memoir Sir Vidia's Shadow, saying that "his rejection of me meant I was...out of his shadow" after Naipaul had snubbed him because Theroux had expressed disapproval of Naipaul's second marriage. The feud lasted fifteen years, until the writers were reconciled at the 2011 Hay Literary Festival, although there is some speculation that the reconciliation was engineered by their agents and publishing houses to increase sales.
V. S. Naipaul and Derek Walcott
Derek Walcott and V. S. Naipaul were both from the West Indies, and each was a recipient of the Nobel Prize in Literature. Walcott was critical of Naipaul's work, viewing him as a sellout for crafting a persona that rejected his Indo-Caribbean roots. Walcott reviewed Naipaul's The Enigma of Arrival in 1987, writing "The myth of Naipaul...has long been a farce." Naipaul countered in 2007, praising Walcott's early work, then describing him as "a man whose talent had been all but strangled by his colonial setting" and saying "He went stale".
Walcott famously criticized Naipaul in his poem "Mongoose", which he read aloud at the Calabash International Literary Festival in 2008. One reviewer described the poem as "a savagely humorous demolition of Naipaul's later novels Half a Life and Magic Seeds".
Richard Ford and multiple writers
Alice Hoffman reviewed Richard Ford's novel Independence Day for The New York Times. The review contained some criticisms, which Ford described as "nasty things", and Ford claimed his response was to shoot one of Hoffman's books and send it to her. In an interview, Ford said "But people make such a big deal out of it - shooting a book - it's not like I shot her."
In 2001, Colson Whitehead wrote an unfavorable review of Ford's book A Multitude of Sins for The New York Times. When the two writers encountered each other at a party several years later, Ford told Whitehead, "You’re a kid, you should grow up", and then spat in Whitehead's face. Ford addressed the disagreement in a 2017 essay for Esquire'', writing "as of today, I don’t feel any different about Mr. Whitehead, or his review, or my response".
When it was announced in 2019 that Ford would be awarded the Hadada prize, other writers, including Viet Thanh Nguyen, Sarah Weinman, and Saeed Jones, criticized the decision, citing Ford's history of poor conduct.
See also
Mac Flecknoe
Isaac Bickerstaff
Fleshly School
Who Is the Bad Art Friend?
References
Literature
Feuds |
8506 | https://en.wikipedia.org/wiki/DirectX | DirectX | Microsoft DirectX is a collection of application programming interfaces (APIs) for handling tasks related to multimedia, especially game programming and video, on Microsoft platforms. Originally, the names of these APIs all began with "Direct", such as Direct3D, DirectDraw, DirectMusic, DirectPlay, DirectSound, and so forth. The name DirectX was coined as a shorthand term for all of these APIs (the X standing in for the particular API names) and soon became the name of the collection. When Microsoft later set out to develop a gaming console, the X was used as the basis of the name Xbox to indicate that the console was based on DirectX technology. The X initial has been carried forward in the naming of APIs designed for the Xbox such as XInput and the Cross-platform Audio Creation Tool (XACT), while the DirectX pattern has been continued for Windows APIs such as Direct2D and DirectWrite.
Direct3D (the 3D graphics API within DirectX) is widely used in the development of video games for Microsoft Windows and the Xbox line of consoles. Direct3D is also used by other software applications for visualization and graphics tasks such as CAD/CAM engineering. As Direct3D is the most widely publicized component of DirectX, it is common to see the names "DirectX" and "Direct3D" used interchangeably.
The DirectX software development kit (SDK) consists of runtime libraries in redistributable binary form, along with accompanying documentation and headers for use in coding. Originally, the runtimes were only installed by games or explicitly by the user. Windows 95 did not launch with DirectX, but DirectX was included with Windows 95 OEM Service Release 2. Windows 98 and Windows NT 4.0 both shipped with DirectX, as has every version of Windows released since. The SDK is available as a free download. While the runtimes are proprietary, closed-source software, source code is provided for most of the SDK samples. Starting with the release of Windows 8 Developer Preview, DirectX SDK has been integrated into Windows SDK.
Development history
In late 1994, Microsoft was ready to release Windows 95, its next operating system. An important factor in the value consumers would place on it was the programs that would be able to run on it. Microsoft employee Alex St. John had been in discussions with various game developers asking how likely they would be to bring their MS-DOS games to Windows 95, and found the responses mostly negative; programmers had found the Windows environment more difficult to develop for compared to MS-DOS or other gaming platforms. There were also strong fears of compatibility; a notable case of this was from Disney's Animated Storybook: The Lion King which was based on the WinG programming interface. Due to numerous incompatible graphics drivers from new Compaq computers that were not tested with the WinG interface which came bundled with the game, it crashed so frequently on many desktop systems that parents had flooded Disney's call-in help lines.
St. John recognized the resistances for game development under Windows would be a limitation, and recruited two additional engineers, Craig Eisler and Eric Engstrom, to develop a better solution to get more programmers to develop games for Windows. The project was codenamed the Manhattan Project, as in relation to the World War II project of the same name, the idea was to displace the Japanese-developed video game consoles with personal computers running Microsoft's operating system. It had initially used the radiation symbol as its logo but Microsoft asked the team to change the logo. Management did not agree to the project as they were already writing off Windows as a gaming platform, but the three committed towards this project's development. Their rebellious nature led Brad Silverberg, the senior vice president of Microsoft's office products, to name the trio the "Beastie Boys".
Most of the work by the three was done among other assigned projects starting near the end of 1994. Within four months and with input from several hardware manufacturers, the team had developed the first set of application programming interfaces (APIs) which they presented at the 1995 Game Developers Conference. The SDK included libraries such as DirectDraw for graphic routines, DirectSound for audio, and DirectPlay for networking communications. The "Direct" part of the library was named as these routines typically bypassed core Windows 95 routines and accessed the computer hardware directly. Though the team had named it the "Game SDK" (software development kit), the name "DirectX" came from one journalist that had mocked the naming scheme of the various libraries. The team opted to continue to use that naming scheme and call the project DirectX.
The first version of DirectX was released in September 1995 as the Windows Games SDK. It was the Win32 replacement for the DCI and WinG APIs for Windows 3.1. DirectX allowed all versions of Microsoft Windows, starting with Windows 95, to incorporate high-performance multimedia. Eisler wrote about the frenzy to build DirectX 1 through 5 in his blog.
To get more developers on board DirectX, Microsoft approached id Software's John Carmack and offered to port Doom and Doom 2 from MS-DOS to DirectX, free of charge, with id retaining all publishing rights to the game. Carmack agreed, and Microsoft's Gabe Newell led the porting project. The first game was released as Doom 95 in August 1996, the first published DirectX game. Microsoft promoted the game heavily with Bill Gates appearing in ads for the title.
DirectX 2.0 became a component of Windows itself with the releases of Windows 95 OSR2 and Windows NT 4.0 in mid-1996. Since Windows 95 was itself still new and few games had been released for it, Microsoft engaged in heavy promotion of DirectX to developers who were generally distrustful of Microsoft's ability to build a gaming platform in Windows. Alex St. John, the evangelist for DirectX, staged an elaborate event at the 1996 Computer Game Developers Conference which game developer Jay Barnson described as a Roman theme, including real lions, togas, and something resembling an indoor carnival. It was at this event that Microsoft first introduced Direct3D and DirectPlay, and demonstrated multiplayer MechWarrior 2 being played over the Internet.
The DirectX team faced the challenging task of testing each DirectX release against an array of computer hardware and software. A variety of different graphics cards, audio cards, motherboards, CPUs, input devices, games, and other multimedia applications were tested with each beta and final release. The DirectX team also built and distributed tests that allowed the hardware industry to confirm that new hardware designs and driver releases would be compatible with DirectX.
Prior to DirectX, Microsoft had included OpenGL on their Windows NT platform. At the time, OpenGL required "high-end" hardware and was focused on engineering and CAD uses. Direct3D was intended to be a Microsoft controlled alternative to OpenGL, focused initially on game use. As 3D gaming grew, OpenGL developed to include better support for programming techniques for interactive multimedia applications like games, giving developers choice between using OpenGL or Direct3D as the 3D graphics API for their applications. At that point a "battle" began between supporters of the cross-platform OpenGL and the Windows-only Direct3D. Incidentally, OpenGL was supported at Microsoft by the DirectX team. If a developer chose to use OpenGL 3D graphics API, the other APIs of DirectX are often combined with OpenGL in computer games because OpenGL does not include all of DirectX's functionality (such as sound or joystick support).
In a console-specific version, DirectX was used as a basis for Microsoft's Xbox, Xbox 360 and Xbox One console API. The API was developed jointly between Microsoft and Nvidia, which developed the custom graphics hardware used by the original Xbox. The Xbox API was similar to DirectX version 8.1, but is non-updateable like other console technologies. The Xbox was code named DirectXbox, but this was shortened to Xbox for its commercial name.
In 2002, Microsoft released DirectX 9 with support for the use of much longer shader programs than before with pixel and vertex shader version 2.0. Microsoft has continued to update the DirectX suite since then, introducing Shader Model 3.0 in DirectX 9.0c, released in August 2004.
As of April 2005, DirectShow was removed from DirectX and moved to the Microsoft Platform SDK instead.
DirectX has been confirmed to be present in Microsoft's Windows Phone 8.
Real-time raytracing was announced as DXR in 2018.
Logos
The original logo resembled a deformed radiation warning symbol. Controversially, the original name for the DirectX project was the "Manhattan Project", a reference to the US nuclear weapons initiative. Alex St. John, head of Microsoft DirectX evangelism at the time, claims that the connotation of the ultimate outcome of the Manhattan Project (the nuclear bombing of Japan) is intentional, and that DirectX and its sister project, the Xbox (which shares a similar logo), were meant to displace Japanese videogame-makers from their dominance of the video game industry. However, Microsoft publicly denies this account, instead claiming that the logo is merely an artistic design.
Components
DirectX is composed of multiple APIs:
Direct3D (D3D): Real-time 3D rendering API
DXGI: Enumerates adapters and monitors and manages swap chains for Direct3D 10 and later.
Direct2D: 2D graphics API
DirectWrite: Text rendering API
DirectCompute: API for general-purpose computing on graphics processing units
DirectX Diagnostics (DxDiag): A tool for diagnosing and generating reports on components related to DirectX, such as audio, video, and input drivers
XACT3: High-level audio API
XAudio2: Low-level audio API
DirectX Raytracing (DXR): Real-time raytracing API
DirectStorage: GPU-oriented file I/O API
DirectML: GPU-accelerated machine learning and artificial intelligence API
Microsoft has deprecated the following components:
DirectX Media: Consists of:
DirectAnimation for 2D/3D web animation, DirectShow for multimedia playback and streaming media
DirectX Media Objects: Support for streaming objects such as encoders, decoders, and effects (Deprecated in favor of Media Foundation Transforms; MFTs)
DirectX Transform for web interactivity, and Direct3D Retained Mode for higher level 3D graphics
DirectX plugins for audio signal processing
DirectX Video Acceleration for accelerated video playback (Deprecated in favor of Media Foundation)
DirectDraw: 2D graphics API (Deprecated in favor of Direct2D)
DirectInput: Input API for interfacing with keyboards, mice, joysticks, and game controllers (Deprecated after version 8 in favor of XInput for Xbox 360 controllers or standard WM_INPUT window message processing for keyboard and mouse input)
DirectPlay: Network API for communication over a local-area or wide-area network (Deprecated after version 8 in favor of Games for Windows Live and Xbox Live)
DirectSound: Audio API (Deprecated since DirectX 8 in favor of XAudio2 and XACT3)
DirectSound3D (DS3D): 3D sounds API (Deprecated since DirectX 8 in favor of XAudio2 and XACT3)
DirectMusic: Components for playing soundtracks authored in DirectMusic Producer (Deprecated since DirectX 8 in favor of XAudio2 and XACT3)
DirectX functionality is provided in the form of COM-style objects and interfaces. Additionally, while not DirectX components themselves, managed objects have been built on top of some parts of DirectX, such as Managed Direct3D and the XNA graphics library on top of Direct3D 9.
Microsoft distributes debugging tool for DirectX called "PIX".
Versions
DirectX 9
DirectX 9 was released in 2002 for Windows 98, Me, and XP, and currently is supported by all subsequent versions. Microsoft continues to make changes in DirectX 9.0c, causing support to be dropped for some of the aforementioned operating systems. As of January 2007, Windows 2000 or XP is required. This also introduced Shader Model 2.0 containing Pixel Shader 2.0 and Vertex Shader 2.0. Windows XP SP2 and newer include DirectX 9.0c, but may require a newer DirectX runtime redistributable installation for DirectX 9.0c applications compiled with the February 2005 DirectX 9.0 SDK or newer.
DirectX 10
A major update to DirectX API, DirectX 10 ships with and is only available with Windows Vista and later; previous versions of Windows such as Windows XP are not able to run DirectX 10-exclusive applications. Rather, programs that are run on a Windows XP system with DirectX 10 hardware simply resort to the DirectX 9.0c code path, the latest available for Windows XP computers.
Changes for DirectX 10 were extensive. Many former parts of DirectX API were deprecated in the latest DirectX SDK and are preserved for compatibility only: DirectInput was deprecated in favor of XInput, DirectSound was deprecated in favor of the Cross-platform Audio Creation Tool system (XACT) and additionally lost support for hardware accelerated audio, since the Vista audio stack renders sound in software on the CPU. The DirectPlay DPLAY.DLL was also removed and was replaced with dplayx.dll; games that rely on this DLL must duplicate it and rename it to dplay.dll.
In order to achieve backwards compatibility, DirectX in Windows Vista contains several versions of Direct3D:
Direct3D 9: emulates Direct3D 9 behavior as it was on Windows XP. Details and advantages of Vista's Windows Display Driver Model are hidden from the application if WDDM drivers are installed. This is the only API available if there are only XP graphic drivers (XDDM) installed, after an upgrade to Vista for example.
Direct3D 9Ex (known internally during Windows Vista development as 9.0L or 9.L): allows full access to the new capabilities of WDDM (if WDDM drivers are installed) while maintaining compatibility for existing Direct3D applications. The Windows Aero user interface relies on D3D 9Ex.
Direct3D 10: Designed around the new driver model in Windows Vista and featuring a number of improvements to rendering capabilities and flexibility, including Shader Model 4.
Direct3D 10.1 is an incremental update of Direct3D 10.0 which shipped with, and required, Windows Vista Service Pack 1. This release mainly sets a few more image quality standards for graphics vendors, while giving developers more control over image quality. It also adds support for cube map arrays, separate blend modes per-MRT, coverage mask export from a pixel shader, ability to run pixel shader per sample, access to multi-sampled depth buffers and requires that the video card supports Shader Model 4.1 or higher and 32-bit floating-point operations. Direct3D 10.1 still fully supports Direct3D 10 hardware, but in order to utilize all of the new features, updated hardware is required.
DirectX 11
Microsoft unveiled DirectX 11 at the Gamefest 08 event in Seattle, with the major scheduled features including GPGPU support (DirectCompute), and Direct3D 11 with tessellation support and improved multi-threading support to assist video game developers in developing games that better utilize multi-core processors. Direct3D 11 runs on Windows Vista, Windows 7, Windows 8 and Windows 10. Parts of the new API such as multi-threaded resource handling can be supported on Direct3D 9/10/10.1-class hardware. Hardware tessellation and Shader Model 5.0 require Direct3D 11 supporting hardware. Microsoft has since released the Direct3D 11 Technical Preview. Direct3D 11 is a strict superset of Direct3D 10.1 — all hardware and API features of version 10.1 are retained, and new features are added only when necessary for exposing new functionality. This helps to keep backwards compatibility with previous versions of DirectX.
Microsoft released the Final Platform Update for Windows Vista on October 27, 2009, which was 5 days after the initial release of Windows 7 (launched with Direct3D 11 as a base standard).
Since then, four updates for DirectX 11 were released:
DirectX 11.1 is included in Windows 8. It supports WDDM 1.2 for increased performance, features improved integration of Direct2D (now at version 1.1), Direct3D, and DirectCompute, and includes DirectXMath, XAudio2, and XInput libraries from the XNA framework. It also features stereoscopic 3D support for gaming and video. DirectX 11.1 was also partially backported to Windows 7, via the Windows 7 platform update.
DirectX 11.2 is included in Windows 8.1 (including the RT version) and Windows Server 2012 R2. It added some new features to Direct2D like geometry realizations. It also added swap chain composition, which allows some elements of the scene to be rendered at lower resolutions and then composited via hardware overlay with other parts rendered at higher resolution.
DirectX 11.X is a superset of DirectX 11.2 running on the Xbox One. It actually includes some features, such as draw bundles, that were later announced as part of DirectX 12.
DirectX 11.3 was announced along with DirectX 12 at GDC and released in 2015. It is meant to complement DirectX 12 as a higher-level alternative. It is included with Windows 10.
DirectX 12
DirectX 12 was announced by Microsoft at GDC on March 20, 2014, and was officially launched alongside Windows 10 on July 29, 2015.
The primary feature highlight for the new release of DirectX was the introduction of advanced low-level programming APIs for Direct3D 12 which can reduce driver overhead. Developers are now able to implement their own command lists and buffers to the GPU, allowing for more efficient resource utilization through parallel computation. Lead developer Max McMullen stated that the main goal of Direct3D 12 is to achieve "console-level efficiency on phone, tablet and PC". The release of Direct3D 12 comes alongside other initiatives for low-overhead graphics APIs including AMD's Mantle for AMD graphics cards, Apple's Metal for iOS and macOS and Khronos Group's cross-platform Vulkan.
Multiadapter support will feature in DirectX 12 allowing developers to utilize multiple GPUs on a system simultaneously; multi-GPU support was previously dependent on vendor implementations such as AMD CrossFireX or NVIDIA SLI.
Implicit Multiadapter support will work in a similar manner to previous versions of DirectX where frames are rendered alternately across linked GPUs of similar compute-power.
Explicit Multiadapter will provide two distinct API patterns to developers. Linked GPUs will allow DirectX to view graphics cards in SLI or CrossFireX as a single GPU and use the combined resources; whereas Unlinked GPUs will allow GPUs from different vendors to be utilized by DirectX, such as supplementing the dedicated GPU with the integrated GPU on the CPU, or combining AMD and NVIDIA cards. However, elaborate mixed multi-GPU setups requires significantly more attentive developer support.
DirectX 12 is supported on all Fermi and later Nvidia GPUs, on AMD's GCN-based chips and on Intel's Haswell and later processors' graphics units.
At SIGGRAPH 2014, Intel released a demo showing a computer generated asteroid field, in which DirectX 12 was claimed to be 50–70% more efficient than DirectX 11 in rendering speed and CPU power consumption.
Ashes of the Singularity was the first publicly available game to utilize DirectX 12. Testing by Ars Technica in August 2015 revealed slight performance regressions in DirectX 12 over DirectX 11 mode for the Nvidia GeForce 980 Ti, whereas the AMD Radeon R9 290x achieved consistent performance improvements of up to 70% under DirectX 12, and in some scenarios the AMD outperformed the more powerful Nvidia under DirectX 12. The performance discrepancies may be due to poor Nvidia driver optimizations for DirectX 12, or even hardware limitations of the card which was optimized for DirectX 11 serial execution; however, the exact cause remains unclear.
The performance improvements of DirectX 12 on the Xbox are not as substantial as on the PC.
In March 2018, DirectX Raytracing (DXR) was announced, capable of real-time ray-tracing on supported hardware, and the DXR API was added in the Windows 10 October 2018 update.
In 2019 Microsoft announced the arrival of DirectX 12 to Windows 7 but only as a plug-in for certain game titles.
DirectX 12 Ultimate
Microsoft revealed DirectX 12 Ultimate in March 2020. DirectX 12 Ultimate will unify to a common library on both Windows 10 computers and the Xbox Series X and other ninth-generation Xbox consoles. Among the new features in Ultimate includes DirectX Raytracing 1.1, Variable Rate Shading, which gives programmers control over the level of detail of shading depending on design choices, Mesh Shaders, and Sampler Feedback.
Version history
The version number as reported by Microsoft's DxDiag tool (version 4.09.0000.0900 and higher) use the x.xx.xxxx.xxxx format for version numbers. However, the DirectX and Windows XP MSDN page claims that the registry always has been in the x.xx.xx.xxxx format. Therefore, when the above table lists a version as '4.09.00.0904' Microsoft's DxDiag tool may have it as '4.09.0000.0904'.
Compatibility
Various releases of Windows have included and supported various versions of DirectX, allowing newer versions of the operating system to continue running applications designed for earlier versions of DirectX until those versions can be gradually phased out in favor of newer APIs, drivers, and hardware.
APIs such as Direct3D and DirectSound need to interact with hardware, and they do this through a device driver. Hardware manufacturers have to write these drivers for a particular DirectX version's device driver interface (or DDI), and test each individual piece of hardware to make them DirectX compatible. Some hardware devices have only DirectX compatible drivers (in other words, one must install DirectX in order to use that hardware). Early versions of DirectX included an up-to-date library of all of the DirectX compatible drivers currently available. This practice was stopped however, in favor of the web-based Windows Update driver-update system, which allowed users to download only the drivers relevant to their hardware, rather than the entire library.
Prior to DirectX 10, DirectX runtime was designed to be backward compatible with older drivers, meaning that newer versions of the APIs were designed to interoperate with older drivers written against a previous version's DDI. The application programmer had to query the available hardware capabilities using a complex system of "cap bits" each tied to a particular hardware feature. Direct3D 7 and earlier would work on any version of the DDI, Direct3D 8 requires a minimum DDI level of 6 and Direct3D 9 requires a minimum DDI level of 7.
However, the Direct3D 10 runtime in Windows Vista cannot run on older hardware drivers due to the significantly updated DDI, which requires a unified feature set and abandons the use of "cap bits".
Direct3D 10.1 introduces "feature levels" 10_0 and 10_1, which allow use of only the hardware features defined in the specified version of Direct3D API. Direct3D 11 adds level 11_0 and "10 Level 9" - a subset of the Direct3D 10 API designed to run on Direct3D 9 hardware, which has three feature levels (9_1, 9_2 and 9_3) grouped by common capabilities of "low", "med" and "high-end" video cards; the runtime directly uses Direct3D 9 DDI provided in all WDDM drivers. Feature level 11_1 has been introduced with Direct3D 11.1.
.NET Framework
In 2002, Microsoft released a version of DirectX compatible with the Microsoft .NET Framework, thus allowing programmers to take advantage of DirectX functionality from within .NET applications using compatible languages such as managed C++ or the use of the C# programming language. This API was known as "Managed DirectX" (or MDX for short), and claimed to operate at 98% of performance of the underlying native DirectX APIs. In December 2005, February 2006, April 2006, and August 2006, Microsoft released successive updates to this library, culminating in a beta version called Managed DirectX 2.0. While Managed DirectX 2.0 consolidated functionality that had previously been scattered over multiple assemblies into a single assembly, thus simplifying dependencies on it for software developers, development on this version has subsequently been discontinued, and it is no longer supported. The Managed DirectX 2.0 library expired on October 5, 2006.
During the GDC 2006, Microsoft presented the XNA Framework, a new managed version of DirectX (similar but not identical to Managed DirectX) that is intended to assist development of games by making it easier to integrate DirectX, HLSL and other tools in one package. It also supports the execution of managed code on the Xbox 360. The XNA Game Studio Express RTM was made available on December 11, 2006, as a free download for Windows XP. Unlike the DirectX runtime, Managed DirectX, XNA Framework or the Xbox 360 APIs (XInput, XACT etc.) have not shipped as part of Windows. Developers are expected to redistribute the runtime components along with their games or applications.
No Microsoft product including the latest XNA releases provides DirectX 10 support for the .NET Framework.
The other approach for DirectX in managed languages is to use third-party libraries like:
SlimDX, an open source library for DirectX programming on the .NET Framework
SharpDX, which is an open source project delivering the full DirectX API for .NET on all Windows platforms, allowing the development of high performance game, 2D and 3D graphics rendering as well as real-time sound applications
DirectShow.NET for the DirectShow subset
Windows API CodePack for .NET Framework, which is an open source library from Microsoft.
Alternatives
There are alternatives to the DirectX family of APIs, with OpenGL, its successor Vulkan, Metal and Mantle having the most features comparable to Direct3D. Examples of other APIs include SDL, Allegro, OpenMAX, OpenML, OpenAL, OpenCL, FMOD, SFML etc. Many of these libraries are cross-platform or have open codebases. There are also alternative implementations that aim to provide the same API, such as the one in Wine. Furthermore, the developers of ReactOS are trying to reimplement DirectX under the name "ReactX".
See also
DxDiag
Direct3D
Vulkan (API)
Simple DirectMedia Layer
Comparison of OpenGL and Direct3D
Graphics Device Interface (GDI)
Graphics pipeline
DirectX plugin
ActiveX
Timeout Detection and Recovery
References
External links
Microsoft's DirectX developer site
The State of DirectX 10 - Image Quality & Performance
1995 software
Application programming interfaces
Microsoft application programming interfaces
Virtual reality |
39399077 | https://en.wikipedia.org/wiki/Network%20virtualization%20platform | Network virtualization platform | A network virtualization platform decouples the hardware plane from the software plane such that the host hardware plane can be administratively programmed to assign its resources to the software plane. This allows for the virtualization of CPU, memory, disk and most importantly network IO. Upon such virtualization of hardware resources, the platform can accommodate multiple virtual network applications such as firewalls, routers, Web filters, and intrusion prevention systems, all functioning much like standalone hardware appliances, but contained within a single hardware appliance. The key benefit to such technology is doing all of this while maintaining the network performance typically seen with that of standalone network appliances as well as enabling the ability to administratively or dynamically program resources at will.
Server virtualization history
Server virtualization, a technology that has become mainstream, originally gained popularity when VMware entered the market in 2001 with its GSX server software. This technology gave IT organizations the ability to reduce the amount of rack space required to accommodate multiple servers and reduced the cost of powering and cooling data centers by consolidating server based applications onto a single piece of hardware. One of the problems with server virtualization is in how applications are networked together. Within a server virtualization environment, applications are interconnected by what is referred to as a virtual switch, which is very different from high-performing hardware-based network switches offered by the likes of Juniper Networks and Cisco Systems. Virtual switches are software-based switches and rely on the movement of packets up and down a software stack which relies on the same CPUs which are being used to drive the applications. Because of this software approach to switching, networking applications such as firewalls and routers, which require high levels of throughput and low levels of latency, were not ideal to operate within a server virtualized environment, while applications less sensitive to throughput and latency such as email and file sharing were ideal.
Network virtualization history
Initially, network virtualization only involved the separation of the control plane and the forwarding plane (management and packet transmission) within networking devices like switches. This has shifted to include the totality of virtualizing a network, including how the network is programmed, administered, and deployed, be it hardware, software, or management and packet transmission.
Network virtualization platforms
6WIND Virtual Accelerator – Provides high performance virtual networks from the underlying hardware acceleration and was pioneered on using fast path software and DPDK technologies
VMware / Nicira NVP – Separates virtual networks from the underlying hardware and was pioneered by Nick McKeown, Scott Shenker, and Martin Casado in 2007.
Embrane Heleos – Virtual appliances that leverage a distributed architecture and was pioneered by Dante Malagrinò and Marco Di Benedetto in 2009.
Cisco Nexus Virtual Services Appliance – A dedicated hardware platform for the deployment of services critical to virtualization infrastructure
Juniper Networks JunosV App Engine - Unifies application management, optimizes the network for application provisioning and performance
Barracuda Networks eoN – Powers software defined virtual appliances without performance drag.
References
Sources
6WIND Virtual Accelerator from SDxCentral
Barracuda Introduces Network Virtualization Platform
Nicira’s Network Virtualization Platform Release Raises Questions
Embrane’s virtual network appliances for an SDN world
Cisco Nexus 1010 and 1010-X Virtual Services Appliance Data Sheet
Juniper fortifies network edge with new routers
What are the benefits of NFV?
Computer networking |
44523926 | https://en.wikipedia.org/wiki/Shelia%20Guberman | Shelia Guberman | Shelia Guberman (born 25 February 1930, Ukraine, USSR) is a scientist in computer science, nuclear physics, geology, geophysics, medicine, artificial intelligence and perception. He proposed the D-waves theory of Earth seismicity, algorithms of Gestalt-perception (1980) and Image segmentation, and programs for the technology of oil and gas fields exploration (1985).
Life and career
He is the son of Aizik Guberman (writer, poet) and his wife Etya (teacher). From 1947 to 1952 Guberman studied at the Institute of Electrical Communications, Odessa, USSR, graduating in radio engineering. From 1952 to 1958 he worked as field geophysicist in the Soviet oil industry. From 1958 to 1961 he studied as a postgraduate at the Oil and Gas Institute in Moscow. In 1962 he received a PhD. in nuclear physics, followed by a PhD. in applied mathematics in 1971. In 1971 he was appointed for full professorship in computer science. After authoring the first applied pattern recognition program in 1962, Guberman specialized in artificial intelligence implementing principles of Gestalt perception in computer programs for geological data analysis. In 1966 he was invited by the outstanding mathematician of the XX century Prof. I. Gelfand to lead the Artificial Intelligence team in Keldysh Institute of Applied Mathematics of the Russian Academy of Sciences. He applied the pattern recognition technology to earthquake prediction, oil and gas exploration, handwriting recognition, speech compression, and medical imaging. From 1989 to 1992 Guberman held the chair professorship at Moscow Open University (Department of Geography). Since 1992 he is living in the US. Guberman is the inventor of the handwriting recognition technology implemented in the commercial product by the company "Paragraph International" founded by S. Pachikov, and used today by Microsoft in Windows CE. He is author of core technologies for five US companies, and owns a patent on speech compression.
Achievements
Handwriting recognition
The common approach to computer handwriting recognition was computer learning on a set of examples (characters or words) presented as visual objects. Guberman proposed that it is more adequate for the psycho-physiology of human perception to present the script as a kinematic object, a gesture, i.e. synergy of movements of the stylus producing the script. The handwriting consists of 7 primitives. The variations, which characters undergo during the writing, are restricted by the rule: each element can be transformed only into his neighbor in the ordered sequence of primitives. During the evolution of Latin-like writing acquired resistance to natural variations in character shape: when one of the primitives is substituted by his neighbor the interpretation of the character does not change to another one.
Based on this approach two USA companies Paragraph and Parascript developed the first commercial products for on-line and off-line free handwriting recognition, which were licensed by Apple, Microsoft, Boeing, Siemens and others. "Most commercially available natural handwriting software is based on ParaGraph or Parascript technology”.
The hypothesis that humans perceive the handwriting as well as other linear drawings (in general – the communication signals) not in visual modality but in the motor modality was later confirmed by the discovery of mirror neurons. The difference is that in the classical mirroring phenomena the motor response appears in parallel with the observed movement (“immediate action perception”), and during the handwriting recognition the static stimulus is transformed into a time process by tracing the path of the pen on the paper. In both cases the observer is trying to understand the intention of the correspondent: “the understanding of what the person is doing and why he is doing it, is acquired through a mechanism that directly transforms visual information into a motor format”.
Speech parallel coding
The speech is traditionally presented as a time sequence of phonemes - vowels and consonants. Each vowel is mainly determined by the relationship between the volume sizes of the front and the back of the voice tract. The ratio is defined by 1) horizontal position of tongue (back–forth), 2) the position of the lips (back-forth), and 3) the size of pharynx that can extend the cavity of the voice tract far back. Most consonants can be described with 3 parameters: 1) place of articulation (lips, teeth and so on), 2) time pattern of interaction with the voice tract (explosive or not), and 3) voiced or not voiced sound. Because of the inertia of the articulatory organs (tongue, lips, jaw) any phoneme interferes with the neighbors and changes its sounding (co-articulation). As a result, each phoneme sounds different in different context.
Guberman presents the parallel model of speech production. It states that vowels and consonants are generated not in sequence but in parallel. The two channels manage two different gropes of muscles, which together define the geometry of the voice tract, and, respectively, voice signal. The separation is possible because the generation of vowels and of consonants involves different muscles. For the vowels [o], [u] the lips are managed by muscles Mentalis and Orbicularis Oris for protrusion and rounding, and for [i], [e] by Buccinator and Risorius for retracting the lips. The tongue participate in creating the vowels by innervating Superior Longitudinal and Vertical for lifting and for moving the whole tongue back and forth, and Genioglossus for all consonants articulated in the front of the mouth )when jaw is fixed). For the lip consonant [p], [b], [v], [f] the lips are managed by Labii Inferioris and Orbicularis Oris muscles for moving the lips and the jaw up and down, and Zygomaticus Minor for moving the lower lip back for [v], [f].
From the hypothesis of Parallel Phonetic Coding follows:
1. Because the vowels are defined as a particular ratio of front and back volumes of voice tract, the vowels are present at any moment of the speech (even during silence – the neutral vowel [ə] when no muscle of the voice tract is innervated).
2. Any consonant in speech appears on the background of a vowel. The last consonant in the word, is pronounced on the background of the neutral vowel [ə]. In clusters the consonants are produced in parallel with [ə] except the last one. In the past in Russian writing after consonant at the end of the word has to be written a special character denoting the neutral vowel – Ъ (the rule was canceled in 1918).
3. The correct written code for words soda and word is shown in (N)
where the number of vowels in syllable reflects the relative duration of the vowel. Such coding is used in Hebrew: in the word יצֵירֵ (peace) two points under characters denote vowel [e]). In Arabic the two channels carry different functions: the consonant stream keeps the meaning, (the root), and the vowel stream either modify the meaning of the root, or expresses a grammatical category: kitab means “book”; katib “writer”; ia-ktub-u “he is writing”; ma-ktab “school”.
Giant oil/gas fields exploration
In the '70s and '80s Guberman developed an artificial intelligence software and the appropriate technology for geological applications, and used it for predicting places of giant oil/gas deposits.
In 1986 the team published a prognostic map for discovering giant oil and gas fields at the Andes in South America based on abiogenic petroleum origin theory. The model proposed by Prof. Yury Pikovsky (Moscow State University) assumes that petroleum moves from the mantel to the surface through permeable channels created at the intersection of deep faults. The technology uses 1) maps of morphostructural zoning (method proposed and developed by Prof. E.Rantsman), which outlines the morphostructural nodes (intersections of faults), and 2) pattern recognition program that identify nodes containing giant oil/gas fields. It was forecasted that eleven nodes, which had not been developed at that time, contain giant oil or gas fields. These 11 sites covered only 8% of the total area of all the Andes basins. 30 years later (in 2018) was published the result of comparing the prognosis and the reality. Since publication of the prognostic map in 1986, only six giant oil/gas fields were discovered in the Andes region: Cano–Limon, Cusiana, Capiagua, and Volcanera (Llanos basin, Colombia), Camisea (Ukayali basin, Peru), and Incahuasi (Chaco basin, Bolivia). All discoveries were made in places shown on the 1986 prognostic map as promising areas.
The result is convincingly positive, and this is a strong contribution in support of abiogenic theory of oil origin.
D-waves theory
In the middle of the 20th century, the attention of seismologists was attracted by the phenomenon of chains of earthquakes consistently arising along big faults. Later it was interpreted as waves of tectonic strain In 1975 Guberman proposed the D-waves theory that separates the local processes of stress accumulation and the triggering of earthquakes.
The basic postulates of this theory are:
a) a strong earthquake changes the distribution of mass in the Earth’s core and accordingly its rate of rotation ω;
b) at times when ω reaches a local minimum the disturbances occur at both poles, which propagate along meridians at a constant rate of 0.15°/year (D waves);
c) A strong earthquake occurs at the place where tectonic stresses have accumulated, and at a time when two D waves (from poles N and S) have met at that point. (Fig ).
This hypothesis and its consequences were supported by seismological data.
1. The postulate c) is presented at the plot ( ) where φ is a latitude of a strong earthquake, and T is its time of occurrence. Each line presents a D-wave travelling the Earth with constant speed 0.15°/year triggering along the way strong earthquakes. The dots present the strong earthquake in the Aleutian Islands and Alaska (magnitude M ≥ 7.0). Similar results were demonstrated for California, South-eastern Europe, Asia Minor, Southern Chile, South Sandwich Island, New Zealand, France and Italy The probability that this can happen by chance is < 0,025 in each case.
2. The source of irregularity in Earth rotation could be a strong earthquake, which displaced huge masses of rocks, and for keeping the rotational moment of the Earth constant the angular speed of rotation ω has to be changed Because of the low speed of the D-waves (0.15°/year), it takes more than 200 years after occurrence to reach the areas where earthquakes with magnitude M >8 occur. To test the postulate b) very long time interval of seismological records is needed. In China, the seismic history has been documented for a very long period of time (from 180 A.D.). The time-space relations between the 6 strongest documented earthquakes in China are presented at the plot. The earthquake #1 created at the poles two D-waves. The one moves from the North Pole, and in 332 years triggered the earthquake #2; the second wave moves from the South Pole, and in 858 years achieved the location of the earthquake #4, and so on (see the graph). In total, the average deviation of the position of the D-wave at the time of the event and the location of the triggered earthquake is 0.4°, which is less than the error in determining the position of the epicenter of the historical earthquakes.
3. From the hypothesis of D-waves it follows that epicenters of the strongest earthquakes can predominantly occur at the discrete D-latitudes (90/2n)·i (i = 0, 1, 2, …), with n ≤ 5. To test this statement the areas of high seismicity on the Earth were divided in stripes parallel to D-latitudes of order <= 4 each 5.625° width (see the map). In 43 regions earthquakes with M ≥ 8.0 occurred, in each region the strongest earthquake was chosen, and in 31 regions the epicenter of the strongest earthquake are located close to the D-latitude, i.e. located in the stripe around the D-latitude 1° wide. The stripe is 1° wide, and occupies 0.36 part of the area of each region, which is 5.625° wide. If the epicenters are randomly scattered over each of the 43 regions, the expected number of epicenters, which will occur close to the D-latitude would be 43 x 0.36 = 15, and the probability that 31 epicenter will be located inside the stripe is less than 0.005.
The earthquakes are an essential part of tectonic movements on the Earth. It was shown that strong earthquakes occur in the intersection of faults – morphostructural nodes. It means that not only the earthquakes are located near the D-latitudes, but also the big morphostructural knots do as well. Combining it with Prof Pikovsky’s hypothesis that the morphostructural knots are pipes that deliver the oil from the mantle to the crust of the Earth follows that big oil/gas fields has also be predominantly located at the discrete D-latitudes. It was proved in, and the appropriate parameter (distance to the D-latitude) was used in the search for giant oil/gas fields (see above). The fact that the strong earthquakes occur on discrete D-latitudes influences the tectonic configuration of the net of tectonic faults. It was also found that in the morphostructural knots happens most accidents on oil, gas, and water pipelines, and railroad rails.
Computer medical diagnosis
Two types of treatment exist for patients with hemorrhagic strokes: passive (medicamental) and active (surgical).Prof. E. Kandel(one of the pioneers in surgical treatment of hemorrhagic strokes) turned to the outstanding mathematician Prof. I.Gelfand for help in comparing the effectiveness of these two treatments. Guberman was chosen as the main architect of the project.
First, it was decided changing the goal: instead of choosing the best treatment in general finding the best treatment for a particular patient – conservative or operational (“treat the patient not the disease”). For this it was decided to use the pattern recognition technology developed in the past for geology (see above). Two decision rules have to be developed: 1) for predicting the outcome (life or death) of the conservative treatment of the particular patient, 2) for predicting the outcome (life or death) of the surgery of the same patient. The decisions are based on neurological and general symptoms collected at the first 12 hours after the patient arrived in the hospital.
The obtained decision rules were preliminary tested for two years: the collected data were send to the computer, and the two prognoses (forecasted outcomes of the operation and the conservative treatment) were placed in the patient’s file. A month later the computer predictions were compared with the outcomes. The overall result – 90% correct predictions. Then followed the clinical implementation: the computer decisions were immediately sent to the surgeon on duty who makes the final decision.
In five years 90 patients received computer forecasts. In 16 cases the computer strongly recommended the operation. 11 of them were operated and survived. For 5 patients the computer warning was neglected (for different reasons), and all 5 died. In 5 cases it was strongly recommended avoiding operation. 3 of them were treated accordingly and survive, 2 of them were operated contrary to the computer advice and died.
Positions
1966–1991 Chief scientist, Keldysh Institute of Applied Mathematics, Moscow (Russia)
1989–1992: Chaired Professorship, Russian Open University (Moscow), Department of Geography.
1989–1997 Chief Scientist, ParaGraph International, Campbell, CA, US
1995–1996 Visiting Scientist, Lawrence Berkeley National Laboratory, CA, US
1998–2007 Founder & CEO, Digital Oil Technologies, Cupertino, CA, US
Publications
More than 180 papers published in scientific journals in Russia, US, France, Germany, Italy and Austria.
Selected recent papers on computer science and psychology:
2017: , "Gestalt Theory Rearranged: Back to Wertheimer", in "Frontiers in Psychology", https://www.frontiersin.org
2015: "On Gestalt Theory Principles", Gestalt Theory, 37(1), 25 - 44.
2012 (with Vadim V. Maximov and Alex Pashintsev): "Gestalt and Image Understanding", Gestalt Theory, 34(2), 143 - 166.
2013: Critical review of Desolneux, Moisan & Morel (2008): From Gestalt Theory to Image Analysis. In: Gestalt Theory 35(2), 183-206.
2008: What is «self-organization»? A journey of a small child. 7th Congress of the UES Systems Science European Union Lisbon, Dec. 17-19, 2008.
2004: “Reflections on Ludwig Bertalanffy’s “General System Theory: Foundations, Development, Applications”. Gestalt Theory, 26(1), 45 – 57.
2002: “Clustering Analysis as a Gestalt Problem.” Gestalt Theory, 24(2), 143 – 158.
2001: “Reflections on M. Wertheimer`s "Productive Thinking": Lesson to Artificial Intelligence. Gestalt Theory, 23(2).
Selected paper on tectonophysics:
1972:
Books:
1987: “Non-formal data analysis in geology and geophysics”, Nedra, Moscow.
1962: “Theory of similarity and interpretation of nuclear well-log date”, Nedra, Moscow.
2007: with Gianfranco Minati “Dialogue about Systems”, Polimetrica, Italy.
2009: "Unorthodox Geology and Geophysics. Oil, Ores and Earthquakes", Polimetrica, Italy.
Sources about his work
http://www.immsp.kiev.ua/publications/articles/2009/2009_4/04_2009_Zueva.pdf
References
1930 births
Living people
Artificial intelligence researchers
Russian computer scientists
Russian geophysicists
Gestalt psychologists |
28260566 | https://en.wikipedia.org/wiki/GhostBSD | GhostBSD | GhostBSD is a Unix-like operating system based on FreeBSD, with MATE as its default desktop environment (GNOME was the previous desktop environment) and an Xfce-desktop community based edition. It aims to be easy to install, ready-to-use and easy to use. The project goal is to combine security, privacy, stability, usability, openness, freedom and to be free of charge.
Prior to GhostBSD 18.10, the project was based on FreeBSD. In May 2018 it was announced that future versions of the operating system would be based on TrueOS. In 2020, with the discontinuation of TrueOS, GhostBSD switched back to FreeBSD.
Version history
FreeBSD based releases (1.0 - 11.1)
TrueOS-based releases (18.10 - 21.01.20)
From GhostBSD 18.10 to 21.01.20, the project moved its base from FreeBSD to TrueOS. Following are TrueOS-based GhostBSD releases.
FreeBSD based releases (21.04.27 - present)
Beginning from GhostBSD 21.04.27, the project has moved its base back to FreeBSD.
License
GhostBSD was originally licensed under the 3-clause BSD license ("Revised BSD License", "New BSD License", or "Modified BSD License")
In 2014 Eric Turgeon re-licensed GhostBSD under 2-clause license ("Simplified BSD License" or "FreeBSD License"). GhostBSD contains some GPL-licensed software.
Recommended system requirements
The following are the recommended requirements.
64-bit processor
4 GB of RAM
15 GB of free hard drive space
Network access
See also
Comparison of BSD operating systems
List of BSD operating systems
FreeBSD
NomadBSD
TrueOS
MidnightBSD
DesktopBSD
HardenedBSD
BSD Router Project (BSDRP)
Darwin (operating system)
OpenBSD
NetBSD
References
External links
GhostBSD Wiki
GhostBSD on DistroWatch
GhostBSD on OpenSourceFeed Gallery
FreeBSD
2010 software |
29007827 | https://en.wikipedia.org/wiki/Next%20Steps%20in%20Signaling | Next Steps in Signaling | Next Steps in Signaling (NSIS) was an Internet Engineering Task Force working group focusing on the design of a next generation signaling protocol framework and protocol specifications.
The NSIS working group was chartered in late 2001 to work on a replacement for Resource Reservation Protocol (RSVP). Chairs included Jukka Manner and Martin Stiemerling. The overall framework of NSIS was presented in 2005. In 2006, the group submitted the first protocol specification for approval by the Internet Engineering Steering Group (IESG). In October 2010, the actual protocol specifications were finally approved and released within the Request for Comments (RFC) series.
The work concluded in 2011.
The NSIS protocol suite includes three primary protocols:
The General Internet Signalling Transport protocol (GIST)
The QoS signaling protocol QoS NSLP
The NAT/Firewall signaling protocol NAT/FW NSLP
The QoS NSLP seeks to replace the Resource Reservation Protocol (RSVP) for signaling resource reservations to Internet routers.
The NAT/Firewall NSLP provides a means to talk to network middleboxes, such as firewalls NATs, to punch holes and set up IP address mappings.
References
External links
Open source NSIS implementation from KIT
Open source NSIS implementation from University of Goettingen
Open source NSIS implementation from University of Coimbra
Internet governance organizations
Task forces
Network protocols |
12868569 | https://en.wikipedia.org/wiki/Silicon%20Disk%20System | Silicon Disk System | The Silicon Disk System was the first commercially available RAM disk for microcomputers.
It was written by Jerry Karlin in 1979/80. Karlin was joined by Peter Cheesewright, and their company Microcosm Research Ltd. marketed the product for a number of years. The product was available as a standalone and also bundled with a number of different microcomputers and RAM-board products. Later, the Silicon Disk System was sold by Microcosm Ltd. Initially, it was available for the CP/M operating system. Versions for the MP/M, CP/M-86, and MP/M-86 operating systems followed. Following the launch of the IBM PC, a version for the MS-DOS and PC DOS operating systems was produced.
References
Computer memory
Solid-state computer storage media |
59477783 | https://en.wikipedia.org/wiki/Schwimmen | Schwimmen | Schwimmen or Einunddreißig (in Germany also Knack, Schnauz, Wutz and Bull; in Austria as Hosen runter, Hosn obe, Hosn obi and Hosn owi; in Switzerland as Hosenabe) is a social card game for two to nine players, played with a 32-card Piquet pack, that is popular in Austria and Germany. Although it is also called Einunddreißig (Thirty-one or ), this should not be confused with a predecessor of Siebzehn und Vier (Twenty-One), also called Einunddreißig. Schwimmen is German for "swimming" which refers to the last chance that a player gets before they drop out.
Variants or similar games in the United States and Great Britain go under the names of Thirty-One, Blitz and Scat, but are played with a 52-card pack. Schwimmen is also played in tournament form.
History
According to Kastner, the game is not well recorded in the literature, but appears to go back to a French ancestor, Commerce, that was first mentioned in 1718 in the Academie des Jeux.
The game was included in the list of games prohibited in Austria-Hungary by the Ministry of Justice under the names Trente-un and Feuer – but whilst the former name can also refer to the aforementioned Siebzehn und vier ancestor, the name Feuer clearly refers to this game, because in the most common variation a hand of three Aces (Feuer) has special significance (see below).
Rules
General
Schwimmen is played in clockwise order with a pack of 32 French, Double German or German playing cards (Skat pack). A second pack may be used if there are more than 6 players. When on lead, each player aims to form a certain combination of cards in his hand by exchanging. The aim of the game is to avoid having the combination with the lowest point value.
Aim
There are two ways in which combinations can be formed. The first is where a player either collects cards of the same suit and adds their point values (c.f. the game of Einundvierzig), whereby:
An Ace scores 11 points,
the court cards – King, Queen and Jack – each score 10 points and
the pip cards – 10, 9, 8 and 7 – score their respective face values.
The highest possible number of points is thus thirty-one (Einunddreißig): a hand consisting of an Ace and 2 courts or an Ace, a court and a Ten of the same suit.
The second option is for a player to collect cards of the same rank, e.g. three 7s, three Queens, etc. (obviously of different suits). This combination always scores 30 ½ points.
Playing
In an 'open game' (offenes Spiel) the dealer deals three cards, face down and individually, to each player and then 2 packets of three cards to himself. He looks at the cards from one packet and decides whether or not to play with them. If he is happy to play with the cards from this first packet, he must lay the second packet face up in the middle of the table. If he does not want to play with the first packet, he lays these three cards face up in the middle of the table and must play with the cards in the second packet. The remaining cards are put to one side.
The player left of the dealer begins. He may either swap one card or all three from his hand with the cards in the middle – but not two cards. If he doesn't want to exchange, he may either say "I'll shove" ("Ich schiebe") or close the game by 'knocking', usually by rapping his knuckles on the table. In some areas players may say "I'm closing" ("Ich mache zu.") instead of knocking.
End of the deal
A deal may be ended in two ways:
If a player knocks or says "I'll close", all the others may swap or shove one last time and then the game ends. To close, a player needs at least 20 points in hand.
If a player holds 31 points (known variously as "Einunddreißig", "Schnauz", "Knack", "Hosn obi" etc.) or, in the case of the variant known as Feuer (c.f. below), if a player holds 3 Aces in his hand - she lays her cards face up on the table and the deal ends there and then. This can happen immediately after dealing. If, as is usual, there are several rounds of exchanging, the loser is determined at the end. A loser or losers are the player or players who have the card combinations with the fewest points.
Scoring
Players only score for pairs or prials of the same suit or for 3 of a kind (see illustration examples).
Swimming
If several deals are played, each player is symbolically given three 'lives'. These may be indicated by counters such as chips, matches or coins. Players have to give up a 'life' each time they lose, by placing one of the counters in the middle of the table.
If a player loses all three lives, he may continue to play but he is now 'swimming' (schwimmt) or a 'cow rider' (Kuhreiter), hence the name of the game. If he loses again, he 'goes under' (geht er unter) and drops out. So 'swimming' is effectively a fourth life and the player's last chance to avoid dropping out.
In this way, there is a form of tournament in which the individual players drop out one by one and eventually only one player is left, the overall winner. If the game is played for stakes, the winner wins the stakes of the losers (or their lives).
Variants and special rules
Schwimmen or Einunddreißig are played in many variations which differ in detail from the basic rules above. The rules given here are in no wise binding like the rules of chess, for example – before the start of a session, players should ascertain which rules are being used. The most important variations relate to:
Cards: for larger numbers of players the game may be played with a pack of 52 whist cards. In Switzerland, Jass packs of 36 cards are used and play is anti-clockwise.
Feuer or Blitz: a hand consisting of 3 cards of the same rank usually scores 30 ½ points. Often a hand of three Aces is counted as the highest combination and is called Feuer ("fire") or Blitz ("lightning"). If a player holds 3 Aces, he reveals his cards and the game ends immediately. In this case all the other players lose a life.
Losing: among many players the rule is that at the end of a round all players with 20 points or fewer and the player who has the lowest score over 20 points must pay. The winner of a round never has to pay, though, even if he is the only player with a score over 20. This rule not only accelerates the game, but offers additional finesses: if a player has 21 points and cannot significantly improve his hand by exchanging, he has to pay in any case. It is therefore to his advantage to worsen his hand by exchanging so that at least another player loses a life. This tactic is known as 'ripping' (reißen).
Shoving (schieben): if all players 'shove' in succession, the three cards in the middle of the table are placed to one side and replaced by three new cards from the stock. The player who started the shoving, then leads.
Passing is not always allowed, reducing a players options to exchanging or knocking.
Handeln: players may either add the point value from cards of the same suit or of the same rank (c.f. a bit like the game of Einundvierzig).
Closed Game (verdecktes Spiel): the player to the left of the dealer is dealt five cards in packets of 3 + 2. He retains three cards and gives the remaining two, face down, to the player on his left, who does likewise.
Literature
Claus D. Grupp: Glücksspiele mit Kugel, Würfel und Karten, Falken Verlag, Wiesbaden, 1976 (enthält das Spiel Handeln)
Sven Pieper, Bärbel Schmidt Kartenspiele, Reclams Universalbibliothek Band 4216, Stuttgart 1994
Peter Arnold, Editor: The Complete Book of Card Games, Chancellor Press, London 2002
Kastner, Hugo. "Hosen Runter" in Spielejournal, 2008.
Lawrence H. Dawson, Editor: The Complete Hoyle's Games, Wordsworth reference, London 1950, reprinted 1994
Albert H. Morehead, Geoffrey Mott-Smith: Hoyle’s Rules of Games, 2nd revised edition. A Signet Book, 1983
The United States Playing Card Company, Joli Quentin Kansil, Editor: Official Rules of Card Games, 90th Edition, 2004
References
French deck card games
German deck card games
Gambling games
German card games
Card games for children
Commerce group |
10051193 | https://en.wikipedia.org/wiki/Configure%20script | Configure script | A configure script is an executable script designed to aid in developing a program to be run on a wide number of different computers. It matches the libraries on the user's computer, with those required by the program before compiling it from its source code.
As a common practice, all configure scripts are named configure. Usually, configure scripts are written for the Bourne shell, but they may be written for execution in any desired shell.
Usage
Obtaining software directly from the source code is a common procedure on Unix computers, and generally involves the following three steps: configuring the makefile, compiling the code, and finally installing the executable to standard locations. A configure script accomplishes the first of these steps. Using configure scripts is an automated method of generating makefiles before compilation to tailor the software to the system on which the executable is to be compiled and run. The final executable software is most commonly obtained by executing the following commands in a shell that is currently pointing to the directory containing the source code:
./configure
make
make install
One must type ./configure rather than simply configure to indicate to the shell that the script is in the current directory. This is because, as a security precaution, Unix configurations don't search the current directory for executables. So, to execute programs in that directory, one must explicitly specify their location.
Upon its completion, configure prints a report to config.log. Running ./configure --help gives a list of command line arguments, for enabling or disabling additional features such as:
./configure --libs="-lmpfr -lgmp"
./configure --prefix=/home/user/local
The first line includes the mpfr and gmp libraries. The second line tells make to install the final version in /home/user/local.
Often, a document with instructions is included. This can be helpful if configure fails. This file is commonly named INSTALL.
Generating configure
Software developers simplify the challenge of cross-platform software development by using GNU Autotools. These scripts query the system on which they run for environment settings, platform architecture, and the existence and location of required build and runtime dependencies. They store the gathered information in configure.ac or the now deprecated configure.in to be read by configure during the installation phase.
Dependency checking
In new development, library dependency checking has been done in great part using pkg-config via the m4 macro, PKG_CHECK_MODULES. Before pkg-config gained popularity, separate m4 macros were created to locate files known to be included in the distribution of libraries depended upon.
History
The first program to come with a configure script was rn by Larry Wall in 1984. The script was written by hand and produced a jocular running commentary when executed. It still survives as part of the build system of the trn program.
Since then, an ecosystem of programs has grown up to automate the creation of configure scripts as far as possible, of which the most common is the GNU Autoconf system.
See also
Autoconf
Software build
GNU Build System
References
Compiling tools
Linux configuration utilities
Unix programming tools
configure |
58171810 | https://en.wikipedia.org/wiki/Little%20Catherine%20%281801%20ship%29 | Little Catherine (1801 ship) | Little Catherine was launched in 1801 at Bermuda, probably under another name. She was condemned in prize in May 1809 at Barbados and entered British registry that year. At that time she traded between Liverpool and Africa. In 1813 she became a temporary packet sailing for the Post Office Packet Service from Falmouth, Cornwall. In 1813 the French Navy captured her and abandoned her after taking off her crew. The Royal Navy recovered her three days later. In 1814 an American privateer captured her but the Royal Navy recaptured her within two weeks. Her owner refused to pay salvage and turned her over to the Post Office which returned her to use as a Falmouth packet but renamed her Blucher, in honour of Prince Blucher who had helped defeat Napoleon at the Battle of Leipzig in 1813. The government sold Blucher in 1823. New owners returned her to the name Little Catherine and she continued to sail widely until she was last listed in 1845, having been sold to a Chinese owner. She was wrecked in October 1847.
Little Catherine
Little Catherine was condemned in prize at Barbados on 9 May 1809. Some reports suggest that she had been a slave ship, though there is no record of a slaver by that name in the most complete database of the trans-Atlantic slave trade. She may have been sailing under another name and ostensibly under non-British colours, but have been captured and condemned for violating the Slave Trade Act 1807 that prohibited British vessels from engaging in the slave trade.
Little Catherine first entered Lloyd's Register in 1809 with C. Walker, master, Taylor & Co., owner, and trade Liverpool–Africa. In 1812 the Register of Shipping showed Little Catherine with Irvine, master, Bluet & Co., owner, but trade Liverpool–Africa. The 1813 Lloyd's Register showed Little Catherine with C. Walker, master, changing to Jeffrey, Taylor & Co., owner, and trade Liverpool–Africa, but changing to Falmouth packet. Lloyd's Register for 1814 showed Little Catherine with Jeffrey, master, changing to Richards, Blewett & Co. owners, and trade Falmouth packet.
However, the Post Office had engaged Little Catherine and appointed John Vivian as her captain on 13 March 1813. On 25 November the French frigates and captured Little Catherine as she was sailing from Passages. The French took off Little Catherines crew and abandoned her. On 28 November picked her up at sea. Hotspur found her plundered, all but two of her guns ecept two thrown overboard, with her sails set, but her rudder free so that she drifted at the mercy of wind and waves. Captain the Honourable Jocelny Percy of Hotspur put a crew on board who took her into Penzance. A gale on the 30th upset her and put her on her beam ends, where she lay waterlogged.
While Captain Vivian was on board Sultana a storm came up. Her crew consisted of untrained landsmen, many of whom were sea-sick. Sultanas captain appealed to Vivian for assistance. Vivian agreed that he and his men would navigate the frigate, handing back control when the weather moderated. In return, the frigate captain agreed to put the Englishmen aboard the next prize they took.
When the French captured the Falmouth packet on 12 December, they put Captain Vivian and Little Catherines crew aboard Duke of Montrose. Captain Vivian was senior in the Packet Service to Captain John Forster of Duke of Montrose and so assumed command. The French also put on board their prisoners from some other vessels they had taken. The British reached Falmouth on 20 December.
Captain John Richards was appointed captain of Little Catherine on 16 April 1814.
On 9 May Little Catherine sailed from Falmouth, bound for Madeira, Teneriffe, and . The privateer Herald, of New York, 17 guns and 110 men, captured her on 13 June at , off Oporto. Herald put Little Catherines crew aboard a Russian vessel that delivered them to Madeira.<ref>[https://hdl.handle.net/2027/uc1.c2735026?urlappend=%3Bseq=325 Lloyd's List' 10 June 1814.]</ref> carried them from Madeira to Penzance, where they landed in early June.
The British frigate recaptured Little Catherine on 25 June, within two miles of the Charlestown bar and sent her into Bermuda. She sailed from Bermuda on 18 July and arrived at Falmouth on 2 August.
The Court of Enquiry reprimanded Captain Richards, stating that he should have kept more to the wind and that he should have used the brass guns in his stern ports. It barred him from reappointment to command of packets. Mr. Blewitt, Little Catherines owner, refused to pay the salvage for her and handed her over to the Post Office.
BlucherBlucher first appeared in Lloyd's Register in the 1815 listing of Falmouth packets with Price, master, and Government Post Office as owner. The Post Office employed her for captains waiting until their new packets were launched.
There are readily accessible records of voyages across the North Atlantic.
On 15 August 1816 Blucher, Eddy, master, sailed from Falmouth. She reached Halifax, Nova Scotia, on 9 September. She next sailed to New York, and then arrived back at Falmouth on 9 December 1816.Blucher, Richards, master, sailed from Falmouth on 15 April 1819 and arrived at Halifax on 20 May. She sailed to New York, returned to Halifax, and arrived back at Falmouth on 10 August 1819.
On 12 July 1820 Blucher, Anderson, master (acting), sailed from Falmouth. She arrive at Halifax on 20 August. carried on to Bermuda the mails for Bermuda that Blucher had brought. Blucher sailed to New York, back to Halifax, and then arrived back at Falmouth on 19 November.
On 13 November 1820 Blucher, White, master, rescued the three survivors of the seven-man crew of the schooner Plover, which had foundered on 24 October at . Plover had been sailing from Newfoundland at the time of her loss. Blucher brought the survivors into Falmouth.Blucher also sailed to the Caribbean and South America.
On 10 March 1817 Blucher arrived at Barbados from Falmouth, and arrived at Jamaica on 20 March. On 23 May she arrived at Falmouth, having sailed from Jamaica on 7 April.Blucher sailed from Falmouth on 14 September and arrived at Madeira on 28 September and sailed the next day for Tenriffe. She arrived at Bahia from Pernambuco on 4 November 1817, sailed for Rio de Janeiro on the 6h, and arrived there on 16 November. She arrived back at Falmouth on 7 February 1818, having left Rio on 12 December 1817.Blucher arrived at Barbados on 12 April 1818 from Falmouth. She arrived back at Falmouth on 5 October 1818 from the Leeward Islands, having left St Thomas on 8 September.
Disposal: The "Principal Officers and Commissioners of His Majesty's Navy" offered the "Blucher Packet Vessel... lying at Falmouth" for sale on 16 December 1823.
Little CatherineLittle Catherine, of 185 tons burthen and built in Bermuda in 1802 [sic] appeared in the 1825 volume of LR.
On 16 April 1829 Arthur Hunt, merchant, administrator of the estate and effects of John Henry Hunt, merchant, Dartmouth, deceased, sold John Henry Hunt's full ownership of Little Catherine to C. and E. Hunt and Co. Little Catherine was registered at Bristol on 1 May 1829 with Edward Hunt, Charles Hunt, and Edward Henley, merchants and co-partners trading as C. and E. Hunt and Co., Bristol. Her masters were Thomas Wakeman (Dartmouth; 13 May 1829), Robert Larica (18 June 1830), James McLean (20 August 1831), and Philip Willis (16 April 1829).
On 23 September 1833 Little Catherine was sold to John Croft, merchant, of Liverpool. She was registered at Liverpool on 26 May 1834.
In 1834 Little Catherine was advertised to carry emigrants to the Swan River Colony, Hobart, and New South Wales. However, a dispute arose as to her age, origins, and condition. There were accusations that she was older than advertised, with poor accommodations for passengers, and partly rotten. She apparently did not sail on the proposed emigrant voyage. Instead she sailed to the Bahamas and possibly the South Seas.
In 1838 Little Catherine did sail to New South Wales. then in 1840 she was sold to the Trinidad and Sabine Company, which advertised that she was ready to take emigrants from England to Texas. Apparently instead she was sold again and chartered to carry a group of settlers to the Musquito Shore. She was at Deal on 10 March 1841, preparing to sail. She returned and around 10 August 1842 sailed for Hong Kong with Franklyn, master. Later she was reported in Singapore, having come from China and sailing to Bombay.
A court case in 1847 revealed that the voyage to the Mosquito Coast had been part of a scheme by the Segovia Company, a company ostensibly organized to establish a colony at Nueva Segovia (River Bluefields). The expedition was arrested on 31 August by the government of New Grenada, released on 22 October, and returned unsuccessful to England in June 1842.Though less flamboyant, the venture and its outcome were reminiscent of Gregor Macgregor's 1821 Poyais scheme.
FateLittle Catherine was last listed in LR'' in 1845. She had been sold to a Chinese owner who converted her to a lugger. She sailed in early September 1847 from Singapore for Hong Kong with an English master, Victor Howes, and local crew. By his account the local crew took control of the vessel and ran her ashore around Longitude 16½° in the Gulf of Tonquin on the coast of Cochinchina on 24 October. A survivor's account was that she struck a rock after she became unstearable in a gale.
Notes, citations, and references
Notes
Citations
References
1801 ships
Ships built in Bermuda
Captured ships
Age of Sail merchant ships of England
Packet (sea transport)
Falmouth Packets
Maritime incidents in October 1847 |
20355261 | https://en.wikipedia.org/wiki/Fontmatrix | Fontmatrix | Fontmatrix is a font manager for Linux desktop environments. It can manage fonts installed system-wide or for individual user accounts. It relies on FreeType to render font samples, and on Qt for its user interface. Bruce Byfield hailed the creation of Fontmatrix with an article concluding with: "Finally, the long wait for a GNU/Linux font manager is ending."
Fontmatrix lets users label a font with multiple tags (similar to Gmail labels), which may be activated or deactivated as sets. It also allows the user to toggle features of OpenType fonts for testing purposes. As of November 2008, the PANOSE classification present in fonts may also be used to select them by similarity.
See also
Font management software
References
Bruce Byfield (December 5, 2007), Fontmatrix: Font management for the desktop finally arrives, linux.com
Sachin Dhall (September 5, 2008), 25 Font Management Tools Reviewed, Smashing Magazine
Alexandre Prokoudine (July 17, 2009), Fontmatrix 0.6.0, libregraphicsworld.org
External links
Font managers
Software that uses Qt
Typography-related software for Linux |
50350863 | https://en.wikipedia.org/wiki/Boeing%20Orbital%20Flight%20Test | Boeing Orbital Flight Test | The Boeing Starliner Orbital Flight Test (also known as Boe-OFT) was the first orbital mission of the CST-100 Starliner spacecraft, conducted by Boeing as part of NASA's Commercial Crew Program. The mission was planned to be an eight-day test flight of the spacecraft, involving a rendezvous and docking with the International Space Station (ISS), and a landing in the western United States. The mission was launched on 20 December 2019 at 11:36:43 UTC or 06:36:43 AM EST; however an issue with the spacecraft's Mission Elapsed Time (MET) clock occurred 31 minutes into flight. This anomaly caused the spacecraft to burn into an incorrect orbit, preventing a rendezvous with the International Space Station (ISS). The mission was reduced to just two days, with the spacecraft successfully landing at White Sands Space Harbor on 22 December 2019.
On 6 April 2020, Boeing announced that it would do another Orbital Flight Test to prove and meet all of the test objectives. NASA accepted the proposal from Boeing to do another uncrewed test flight, Boeing Orbital Flight Test 2.
Payload
Instead of carrying astronauts, the flight carried an Anthropomorphic Test Device (ATD) wearing Boeing's custom flight suit. The ATD is named Rosie (aka "Rosie the Rocketeer" ), as a homage to all the women who helped contribute to the Starliner Program. The capsule was weighted similarly to missions with astronauts onboard and carried approximately of supplies and equipment including a plush toy of Snoopy and holiday presents for the Expedition 61 crew members. Due to the inability to dock with the ISS, this cargo was never delivered.
Mission
The first Atlas V N22, designated AV-080, launched the CST-100 Starliner spacecraft on an uncrewed test flight to the International Space Station. The capsule was intended to dock with the space station, then return to Earth to land in the Western United States after an orbital shakedown cruise ahead of Boeing Crewed Flight Test.
OFT is the first flight of an Atlas V without a payload fairing and its first flight with a dual-engine Centaur upper stage. The dual-engine Centaur utilizes two RL-10 and is required for Starliner flights in order to provide a launch trajectory that allows for a safe abort at any point in the mission.
The mission launched successfully on 20 December 2019 at 11:36:43 UTC, but thirty-one minutes after launch the mission elapsed timer (MET) clock made an error. During a later press conference, it was revealed that MET was offset by 11 hours. When it became obvious that the maneuver did not happen, NASA and Boeing tried sending commands to get Starliner back on track, but the position of the spacecraft switching communications between two TDRS satellites delayed the orbital insertion burn. This delay resulted in an abnormal orbit and excessive fuel use. The decision was made to scratch the ISS rendezvous/docking since the spacecraft burned too much fuel to reach orbit even after Mission control center fixed the MET clock issue. NASA and Boeing officials placed the spacecraft in a different orbit and the entire flight plan had to be redone and the mission was reduced from eight days to three flight days.
By 11:40 UTC, the Starliner was in a "stable orbit", though orbital insertion was not nominal. It was later confirmed that Starliner had placed itself into a 187 x 222 km orbit.
By 13:55 UTC, mission control center had realized that docking with the ISS was precluded. Despite not being able to dock and the MET anomaly, Jim Bridenstine stated during a press conference that "A lot of things went right. And this is in fact why we test".
On 22 December 2019, Starliner was cleared to reenter the Earth's atmosphere. After deorbiting, Starliner reentered the Earth's atmosphere, before successfully deploying all sets of parachutes. Starliner deployed airbags and successfully touched-down at White Sands Space Harbor at 12:58:53 UTC. Though the ISS rendezvous that was planned for the OFT did not happen, Jim Chilton, vice president for Boeing's space and launch division, estimated that Starliner has achieved over 60% of the flight objectives, and this could reach over 85% once all the data from the spacecraft is retrieved and analyzed.
The spacecraft will later be reused on mission Boeing Starliner-1. Its commander, Sunita Williams, informally dubbed the spacecraft "Calypso" after the famed oceanographic research ship and its eponymous John Denver song.
Anomalies
An issue with the spacecraft's Mission Elapsed Time (MET) clock occurred 31 minutes into flight. Due to intermittent space-to-ground communication issues flight controllers could not correct the issue. This anomaly caused the spacecraft's Orbital Maneuvering Thrusters (OMT) to burn into an incorrect orbit causing too much propellant to be burned. This precluded a rendezvous and docking with the ISS. The mission was reduced to just three days, with the spacecraft successfully landing at White Sands Space Harbor on 22 December 2019.
After the mission, it was revealed that another critical software bug was found in flight, which could have resulted in the service module bumping back into Starliner after separation. The bug was fixed two hours before the capsule re-entered. Had the bug not been discovered and fixed, it may have damaged Starliner and prevented a safe landing. Additionally, it was determined that had the first anomaly not occurred, the second would not have been detected.
Investigation
On 7 February 2020, NASA shared their preliminary findings about the Boeing OFT mission and discovered software problems with the Mission Elapsed Time (MET), which incorrectly polled time from the Atlas V booster nearly 11 hours prior to launch. Another software issue occurred within the Service Module (SM) Disposal Sequence, which incorrectly translated the SM disposal sequence into the SM Integrated Propulsion Controller (IPC). This could have made the service module crash into the capsule after separation, potentially leading to a catastrophic failure of the capsule. In addition, an Intermittent Space-to-Ground (S/G) forward link issue, which impeded the Flight Control team's ability to command and control the vehicle, was found. The current investigation was expected to last until end of February 2020, in addition a full-scale safety review was planned that would likely take months.
On 6 March 2020, NASA gave an update on the anomalies. They announced 61 corrective actions that addressed the MET and service module disposal software issues. The mission was declared a "high visibility close call" as there were two times where the spacecraft could have been lost. NASA found factors internally that led to the anomalies such as the oversight over software.
On 7 July 2020, NASA and Boeing announced the completion of the Space-to-Ground communication issue, marking the completion of the OFT review. The number of corrective actions was increased to 80 from the March 2020 update. 21 recommendations focused on a need for more testing and simulations; including the necessity to do full end to end tests prior to flights instead of testing in chunks as done in the OFT. 10 recommendations were made to cover software requirements such that they have proper coverage to catch errors during testing. 35 of the recommendations surrounded improvements over process and operations such as including more reviews and use of experts. 7 recommendations covered software updates that addresses the three main anomalies that occurred during the flight. The final 7 included "Knowledge Capture" and Boeing organizational changes to enable better safety reporting. They also included hardware changes to filter out radio interference and others to address the communication issue.
Internally within NASA the investigation found that the lack of oversight over Starliner software was from NASA's focus of resources on other high risk parts of the flight. In addition, NASA may have had less oversight due to Boeing's traditional systems development style compared to SpaceX; NASA had increased their oversight of SpaceX due to their different working practices. NASA made 6 recommendations internally to prevent similar occurrences in the future. This included the need for NASA to review and approve the contractors' "hazard verification tests plans" before the test.
See also
Crew Dragon
Crew Dragon Demo-1, SpaceX's first (uncrewed) orbital mission with Crew Dragon
Crew Dragon Demo-2, SpaceX's second orbital and first crewed mission with Crew Dragon
References
External links
Official Webpage of the CST-100 Starliner
NASA Live: Official Stream of NASA TV
Boeing Starliner
Spacecraft launched in 2019
Supply vehicles for the International Space Station
Spacecraft which reentered in 2019
December 2019 events in the United States
Spacecraft launched by Atlas rockets
Test spaceflights |
33923888 | https://en.wikipedia.org/wiki/Sony%20Tablet%20S | Sony Tablet S | The Tablet S (formerly named S1) is the first modern tablet computer released by Sony. Featuring a "unique asymmetric design", the Tablet S runs Google's Android Ice Cream Sandwich 4.0 operating system and features a multitouch display, 1 GHz Nvidia Tegra 2 dual core processor, Wi-Fi ability, front- and rear-facing cameras, Bluetooth, and an infrared sensor. It is also configured with access to the Sony Entertainment Network and is PlayStation Certified and Digital Living Network Alliance (DLNA) compatible. Tablet S was first released in September 2011. It was succeeded by the Xperia Tablet S, which would be created by Sony's new subsidiary Sony Mobile.
Design
The main distinguishing feature of the Tablet S is its "unique asymmetric design" in which the thickness of the device tapers from . This "wrap" effect is intended to evoke an "open paperback stuffed into the back pocket, or a magazine folded backward upon itself such that only a single page is visible to read," and reduces the amount of torque while being held. Sony claims that this "off-center of gravity design realizes stability and ease of grip as well as a sense of stability and lightness, offering comfortable use for hours."
Hardware
The Tablet S features a , 1280×800 pixel resolution, TFT LCD using Sony's proprietary TruBlack Display—the same technology as that used in the company's Bravia range of televisions.
It uses the Nvidia Tegra T20 system on a chip (SoC), which consists of a 1 GHz ARM Cortex-A9 dual core processor and a ULP GeForce graphics processing unit (GPU), with 1 GB RAM and either 16 or 32 GB internal storage and support for SD memory cards up to 32 GB.
Other onboard features include an accelerometer, 3-axis gyroscope, magnetometer (digital compass), GPS receiver, 802.11b/g/n Wi-Fi, Bluetooth v2.1 + EDR, infrared, Micro USB, microphone, 3.5 mm headphone jack and 0.3 MP front-facing and 5 MP rear-facing cameras.
Like other Android devices, the Tablet S has no hardware navigation buttons, which are all implemented via persistent on-screen buttons. The only physical buttons present on the device are the power button and volume rocker located in the recessed area on one side.
The tablet uses a proprietary power connector.
Software
The Tablet S1 was initially launched with Android 3.1 Honeycomb, but a 3.2 update was made available soon after its release. Also, it received an upgrade to Android 4.0.3 at the end of April (in Japan and the US). It uses a customized version of the operating system. Features and applications unique to the Sony device include:
A customizable row of most frequently used icons on the top-left of the screen
A "Favourites" bar at the top-right
A customized version of the Android web browser
A universal remote control app for the built-in IR transmitter
Apps for accessing Sony Entertainment Network (Music Unlimited and Video Unlimited)
An app for Sony Reader eBooks
Social Feed Reader—an application that aggregates Facebook and Twitter social media status updates
Crash Bandicoot and Pinball Heroes PlayStation Store games
Although Sony Tablet S is a PlayStation Certified device, an update to the PlayStation Store disabled all such devices from being able to purchase PS one classics. Instead, only original content will be available for purchase by Tablet S owners.
In September 2012, Sony Tablet S received a major update to Android 4.0.3 Release 5a, which brought the following notable changes:
Added Guest mode (before Google announced multiple-user accounts would be supported on Android 4.2 tablets)
Added Small Apps and supports widgets, and support for Support Development Kit
Added macro functionality to Remote Control App and skin change
Added input languages for Japanese (Hand-writing), Korean, Arabic, Thai, and Greek
Replaced Social Feed Reader Cloud app with Socialife
Replaced DLNA, Video Player and Music Player apps with Walkman, Album and Movies.
Renamed PersonalSpace to PlayMemories Online
Renamed Select to Sony select
Removed Favorite app
Added xLOUD and Clear Phase audio enhancers.
The Sony Tablet S was confirmed for an update to Android 4.1 Jelly Bean, which would have arrived in February 2013. However, the Jelly Bean 4.1 update was unofficially cancelled when Sony posted (and later removed) in their community message board stating "we do not have a roadmap to release the Jelly Bean update for the 1st Generation Tablet (Sony Tablet S)."
Reception
Reviewers have largely been positive towards the Sony Tablet S, praising its unique ("thoroughly renovated") design. The Wall Street Journal said that "the Tablet S will appeal to buyers who would like a distinctive tablet from a trusted company that doesn't look like an iPad wannabe" while PC World said "[Sony] has not lost its design mojo over the years, as this model brings Sony's originality and flair to a tablet market that desperately needs both." Asher Moses from the Sydney Morning Herald called it "best Android tablet yet."
Negative comments are directed at the device's high price and poor build quality. Tech blog Gizmodo called it "plasticky" and pointed out that Sony's use of inferior materials to save on weight led to their unit getting "seriously scratched during a totally routine photo shoot" and commented that it would "smash into a million pieces" if dropped. Time observed that the Tablet S falls short of Sony's aspirations to compete with the iPad, with reviewer Jared Newman quoting Sony CEO Howard Stringer's comments, and saying "if the Tablet S is what Stringer has in mind, I weep for Sony’s future." The ExpertReviews wrote that the absence of video output was an annoying drawback. Some reviewers criticize the tablet for Low-res screen and ageing software.
Recognition
The Tablet S was an honoree in the Consumer Electronics Association's CES Innovation Design and Engineering Awards 2012, in the "Tablets, E-Readers and Netbooks" category.
See also
Sony Tablet
Tablet computer
Comparison of tablet computers
Sony Reader, e-reader
Sony Vaio UX Micro PC, an older line that were sometimes called "tablets"
References
Tablet computers
Android (operating system) devices
Tablet computers introduced in 2011
Sony products |
7283182 | https://en.wikipedia.org/wiki/History%20of%20IBM | History of IBM | International Business Machines (IBM), nicknamed "Big Blue", is a multinational computer technology and IT consulting corporation headquartered in Armonk, New York, United States. IBM originated from the bringing together of several companies that worked to automate routine business transactions, including the first companies to build punched card based data tabulating machines and to build time clocks. In 1911, these companies were amalgamated into the Computing-Tabulating-Recording Company (CTR).
Thomas J. Watson (1874–1956) joined the company in 1914 as General Manager and became its President in 1915. In 1924 the company changed its name to "International Business Machines." IBM expanded into electric typewriters and other office machines. Watson was a salesman and concentrated on building a highly motivated, very well paid sales force that could craft solutions for clients unfamiliar with the latest technology. His motto was "THINK". Customers were advised to not "fold, spindle, or mutilate" the cardboard cards. IBM's first experiments with computers in the 1940s and 1950s were modest advances on the card-based system. Its great breakthrough came in the 1960s with its System/360 family of mainframe computers. IBM offered a full range of hardware, software, and service agreements, so that users, as their needs grew, would stay with "Big Blue." Since most software was custom-written by in-house programmers and would run on only one brand of computers, it was too expensive to switch brands. Brushing off clone makers, and facing down a federal anti-trust suit, the giant sold reputation and security as well as hardware and was the most admired American corporation of the 1970s and 1980s.
The late 1980s and early 1990s were difficult for IBMlosses in 1993 exceeded $8 billionas the mainframe giant failed to adjust quickly enough to the personal computer revolution. Desktop machines had the power needed and were vastly easier for both users and managers than multi-million-dollar mainframes. IBM did introduce a popular line of microcomputersbut it was too popular. Clone makers undersold IBM, while the profits went to chip makers like Intel or software houses like Microsoft.
After a series of reorganizations, IBM remains one of the world's largest computer companies and systems integrators. With over 400,000 employees worldwide as of 2014, IBM holds more patents than any other U.S. based technology company and has twelve research laboratories worldwide. The company has scientists, engineers, consultants, and sales professionals in over 175 countries. IBM employees have earned five Nobel Prizes, four Turing Awards, five National Medals of Technology, and five National Medals of Science.
Chronology
1880s–1924: The origin of IBM
The roots of IBM date back to the 1880s, tracing from four predecessor companies:
The Bundy Manufacturing Company was the first manufacturer of time clocks. The company was founded in 1889 by Harlow Bundy in Binghamton, New York.
The Tabulating Machine Company was the first manufacturer of punch card based data processing machines. Herman Hollerith started building the machines as early as 1884, and founded the Tabulating Machine Company in 1896 in Washington, D.C.
The International Time Recording Company was founded in 1900 by George Winthrop Fairchild in Jersey City, New Jersey, and reincorporated in 1901 in Binghamton. The company relocated in 1906 to nearby Endicott, New York.
The Computing Scale Company of America was founded in 1901 in Dayton, Ohio.
On June 16, 1911, these four companies were amalgamated into a new holding company named the Computing-Tabulating-Recording Company (CTR), based in Endicott. The amalgamation was engineered by noted financier Charles Flint. Flint remained a member of the board of CTR until his retirement in 1930.
At the time of the amalgamation, CTR had 1,300 employees and offices and plants in Endicott and Binghamton, New York; Dayton, Ohio; Detroit, Michigan; Washington, D.C.; and Toronto, Ontario.
After amalgamation, the individual companies continued to operate using their established names, as subsidiaries of CTR, until the holding company was eliminated in 1933. The divisions manufactured a wide range of products, including employee time-keeping systems, weighing scales, automatic meat slicers, coffee grinders, and punched card equipment. The product lines were very different; Flint stated that the "allied" consolidation:
... instead of being dependent for earnings upon a single industry, would own three separate and distinct lines of business, so that in normal times the interest and sinking funds on its bonds could be earned by any one of these independent lines, while in abnormal times the consolidation would have three chances instead of one to meet its obligations and pay dividends.
Of the companies amalgamated to form CTR, the most technologically significant was The Tabulating Machine Company, founded by Herman Hollerith, and specialized in the development of punched card data processing equipment. Hollerith's series of patents on tabulating machine technology, first applied for in 1884, drew on his work at the U.S. Census Bureau from 1879–82. Hollerith was initially trying to reduce the time and complexity needed to tabulate the 1890 Census. His development of punched cards in 1886 set the industry standard for the next 80 years of tabulating and computing data input.
In 1896, The Tabulating Machine Company leased some machines to a railway company but quickly focused on the challenges of the largest statistical endeavor of its day – the 1900 US Census. After winning the government contract, and completing the project, Hollerith was faced with the challenge of sustaining the company in non-Census years. He returned to targeting private businesses in the United States and abroad, attempting to identify industry applications for his automatic punching, tabulating and sorting machines. In 1911, Hollerith, now 51 and in failing health sold the business to Flint for $2.3 million (of which Hollerith got $1.2 million), who then founded CTR.
When the diversified businesses of CTR proved difficult to manage, Flint turned for help to the former No. 2 executive at the National Cash Register Company (NCR), Thomas J. Watson, Sr. Watson became General Manager of CTR in 1914 and President in 1915. By drawing upon his managerial experience at NCR, Watson quickly implemented a series of effective business tactics: generous sales incentives, a focus on customer service, an insistence on well-groomed, dark-suited salesmen, and an evangelical fervor for instilling company pride and loyalty in every worker. As the sales force grew into a highly professional and knowledgeable arm of the company, Watson focused their attention on providing large-scale tabulating solutions for businesses, leaving the market for small office products to others. He also stressed the importance of the customer, a lasting IBM tenet. The strategy proved successful, as, during Watson's first four years, revenues doubled to $2 million, and company operations expanded to Europe, South America, Asia, and Australia.
At the helm during this period, Watson played a central role in establishing what would become the IBM organization and culture. He launched a number of initiatives that demonstrated an unwavering faith in his workers. He hired the company's first disabled worker in 1914, he formed the company's first employee education department in 1916 and in 1915 he introduced his favorite slogan, "THINK", which quickly became the corporate mantra. Watson boosted company spirit by encouraging any employee with a complaint to approach him or any other company executive – his famed Open Door policy. He also sponsored employee sports teams, family outings, and a company band, believing that employees were most productive when they were supported by healthy and supportive families and communities. These initiatives – each deeply rooted in Watson's personal values system – became core aspects of IBM culture for the remainder of the century.
"Watson had never liked the clumsy hyphenated title of the CTR" and chose to replace it with the more expansive title "International Business Machines". First as a name for a 1917 Canadian subsidiary, then as a line in advertisements. Finally, on February 14, 1924, the name was used for CTR itself.
Key events
1890–1895: Hollerith's punched cards used for 1890 Census. The U.S. Census Bureau contracts to use Herman Hollerith's punched card tabulating technology on the 1890 United States Census. That census was completed in 6-years and estimated to have saved the government $5 million. The prior, 1880, census had required 8-years. The years required are not directly comparable; the two differed in: population size, data collected, resources (census bureau headcount, machines, ...), and reports prepared. The total population of 62,947,714, the family, or rough, count, was announced after only six weeks of processing (punched cards were not used for this tabulation). Hollerith's punched cards become the tabulating industry standard for input for the next 70 years. Hollerith's The Tabulating Machine Company is later consolidated into what becomes IBM.
1906: Hollerith Type I Tabulator. The first tabulator with an automatic card feed and control panel.
1911: Formation. Charles Flint, a noted trust organizer, engineers the amalgamation of four companies: The Tabulating Machine Company, the International Time Recording Company, the Computing Scale Company of America, and the Bundy Manufacturing Company. The amalgamated companies manufacture and sell or lease machinery such as commercial scales, industrial time recorders, meat and cheese slicers, tabulators, and punched cards. The new holding company, Computing-Tabulating-Recording Company, is based in Endicott. Including the amalgamated subsidiaries, CTR had 1,300 employees with offices and plants in Endicott and Binghamton, New York; Dayton, Ohio; Detroit, Michigan; and Washington, D.C.
1914: Thomas J. Watson arrives. Thomas J. Watson Sr., a one-year jail sentence pending – see NCR – is made general manager of CTR. Less than a year later the court verdict was set aside. A consent decree was drawn up which Watson refused to sign, gambling that there would not be a retrial. He becomes president of the firm Monday, March 15, 1915.
1914: First disabled employee. CTR companies hire their first disabled employee.
1915: "THINK" signs. "THINK" signs, based on the slogan coined by Thomas J. Watson, Sr. while at NCR and promoted by John Henry Patterson (NCR owner) are used in the companies for the first time.
1916: Employee education. CTR invests in its subsidiary's employees, creating an education program. Over the next two decades, the program would expand to include management education, volunteer study clubs, and the construction of the IBM Schoolhouse in 1933.
1917: CTR in Brazil. Premiered in Brazil in 1917, invited by the Brazilian Government to conduct the census, CTR opened an office in Brazil
1920: First Tabulating Machine Co. printing tabulator. With prior tabulators the results were displayed and had to be copied by hand.
1923: CTR Germany. CTR acquires majority ownership of the German tabulating firm Deutsche Hollerith Maschinen Groupe (Dehomag).
1924: International Business Machines Corporation. "Watson had never liked the clumsy hyphenated title of Computing-Tabulating-Recording Company" and chose the new name both for its aspirations and to escape the confines of "office appliance". The new name was first used for the company's Canadian subsidiary in 1917. On February 14, 1924, CTR's name was formally changed to International Business Machines Corporation (IBM). The subsidiaries' names did not change; there would be no IBM labeled products until 1933 (below) when the subsidiaries are merged into IBM.
1925–1929: IBM's early growth
Watson mandated strict rules for employees, including a dress code of dark suits, white shirts and striped ties, and no alcohol, whether working or not. He led the singing at meetings of songs such as "Ever Onward" from the official IBM songbook. The company launched an employee newspaper, Business Machines, which unified coverage of all of IBM's businesses under one publication. IBM introduced the Quarter Century Club, to honor employees with 25 years of service to the company, and launched the Hundred Percent Club, to reward sales personnel who met their annual quotas. In 1928, the Suggestion Plan program – which granted cash rewards to employees who contributed viable ideas on how to improve IBM products and procedures – made its debut.
IBM and its predecessor companies made clocks and other time recording products for 70 years, culminating in the 1958 sale of the IBM Time Equipment Division to Simplex Time Recorder Company. IBM manufactured and sold such equipment as dial recorders, job recorders, recording door locks, time stamps and traffic recorders.
The company also expanded its product line through innovative engineering. Behind a core group of inventors – James W. Bryce, Clair Lake, Fred Carroll, and Royden Pierce – IBM produced a series of significant product innovations. In the optimistic years following World War I, CTR's engineering and research staff developed new and improved mechanisms to meet the broadening needs of its customers. In 1920, the company introduced the first complete school time control system, and launched its first printing tabulator. Three years later the company introduced the first electric keypunch, and 1924's Carroll Rotary Press produced punched cards at previously unheard of speeds. In 1928, the company held its first customer engineering education class, demonstrating an early recognition of the importance of tailoring solutions to fit customer needs. It also introduced the 80-column punched card in 1928, which doubled its information capacity. This new format, soon dubbed the "IBM Card", became and remained an industry standard until the 1970s.
Key events
1925: First tabulator sold to Japan. In May 1925, Morimura-Brothers entered into a sole agency agreement with IBM to import Hollerith tabulators into Japan. The first Hollerith tabulator in Japan was installed at Nippon Pottery (now Noritake) in September 1925, making it IBM customer #1 in Japan.
1927: IBM Italy. IBM opens its first office in Italy in Milan, and starts selling and operating with National Insurance and Banks.
1928: A Tabulator that can subtract, Columbia University, 80-column card. The first Hollerith tabulator that could subtract, the Hollerith Type IV tabulator. IBM begins its collaboration with Benjamin Wood, Wallace John Eckert and the Statistical Bureau at Columbia University. The Hollerith 80-column punched card is introduced. Its rectangular holes are patented, ending vendor compatibility (of the prior 45 column card; Remington Rand would soon introduce a 90 column card).
1930–1938: The Great Depression
The Great Depression of the 1930s presented an unprecedented economic challenge, and Watson met the challenge head-on, continuing to invest in people, manufacturing, and technological innovation despite the difficult economic times. Rather than reduce staff, he hired additional employees in support of President Franklin Roosevelt's National Recovery Administration plan – not just salesmen, which he joked that he had a lifelong weakness for, but engineers too. Watson not only kept his workforce employed, but he also increased their benefits. IBM was among the first corporations to provide group life insurance (1934), survivor benefits (1935), and paid vacations (1936). He upped his ante on his workforce by opening the IBM Schoolhouse in Endicott to provide education and training for IBM employees. And he greatly increased IBM's research capabilities by building a modern research laboratory on the Endicott manufacturing site.
With all this internal investment, Watson was, in essence, gambling on the future. It was IBM's first ‘Bet the Company’ gamble, but the risk paid off handsomely. Watson's factories, running full tilt for six years with no market to sell to, created a huge inventory of unused tabulating equipment, straining IBM's resources. To reduce the cash drain, the struggling Dayton Scale Division (the food services equipment business) was sold in 1933 to Hobart Manufacturing for stock. When the Social Security Act of 1935 – labeled as "the biggest accounting operation of all time" – came up for bid, IBM was the only bidder that could quickly provide the necessary equipment. Watson's gamble brought the company a landmark government contract to maintain employment records for 26 million people. IBM's successful performance on the contract soon led to other government orders, and by the end of the decade, IBM had not only safely negotiated the Depression but risen to the forefront of the industry. Watson's Depression-era decision to invest heavily in technical development and sales capabilities, education to expand the breadth of those capabilities, and his commitment to the data processing product line laid the foundation for 50 years of IBM growth and successes.
His avowed focus on international expansion proved an equally key component of the company's 20th-century growth and success. Watson, having witnessed the havoc the First World War wrought on society and business, envisioned commerce as an obstacle to war. He saw business interests and peace as being mutually compatible. In fact, he felt so strongly about the connection between the two that he had his slogan "World Peace Through World Trade" carved into the exterior of IBM's new World Headquarters (1938) in New York City. The slogan became an IBM business mantra, and Watson campaigned tirelessly for the concept with global business and government leaders. He served as an informal, unofficial government host for world leaders when they visited New York, and received numerous awards from foreign governments for his efforts to improve international relations through the formation of business ties.
Key events
1931: The first Hollerith punched card machine that could multiply, the first Hollerith alphabetical accounting machine. The Hollerith 600 Multiplying Punch. The first Hollerith alphabetical accounting machine – although not a complete alphabet, the Alphabetic Tabulator Model B was quickly followed by the full alphabet ATC.
1931: Super Computing Machine. The term Super Computing Machine is used by the New York World newspaper to describe the Columbia Difference Tabulator, a one-of-a-kind special purpose tabulator-based machine made for the Columbia Statistical Bureau, a machine so massive it was nicknamed Packard. The Packard attracted users from across the country: "the Carnegie Foundation, Yale, Pittsburgh, Chicago, Ohio State, Harvard, California and Princeton."
1933: Subsidiary companies are merged into IBM. The Tabulating Machine Company name, and others, disappear as subsidiary companies are merged into IBM.
1933: Removable control panels. IBM introduces removable control panels.
1933: 40-hour week. IBM introduces the 40-hour week for both manufacturing and office locations.
1933: Electromatic Typewriter Co. purchased. Purchased primarily to get important patents safely into IBM hands, electric typewriters would become one of IBM's most widely known products. By 1958 IBM was deriving 8% of its revenue from the sale of electric typewriters.
1934 – Group life insurance. IBM creates a group life insurance plan for all employees with at least one year of service.
1934: Elimination of piece work. Watson, Sr., places IBM's factory employees on salary, eliminating piece work and providing employees and their families with an added degree of economic stability.
1934: IBM 801. The IBM 801 Bank Proof machine to clear bank checks is introduced. A new type of proof machine, the 801 lists and separates checks, endorses them, and records totals. It dramatically improves the efficiency of the check clearing process.
1935: Social Security Administration. During the Great Depression, IBM keeps its factories producing new machines even while demand is slack. When Congress passes the Social Security Act in 1935, IBM – with its overstocked inventory – is consequently positioned to win the landmark government contract, which is called "the biggest accounting operation of all time."
1936: Supreme Court rules IBM can only set punched card specifications. IBM initially required that its customers use only IBM manufactured cards with IBM machines, which were leased, not sold. IBM viewed its business as providing a service and that the cards were part of the machine. In 1932 the government took IBM to court on this issue. IBM fought all the way to the Supreme Court and lost in 1936; the court ruling that IBM could only set card specifications.
1937: Scientific computing. The tabulating machine data center established at Columbia University, dedicated to scientific research, is named the Thomas J. Watson Astronomical Computing Bureau.
1937: The first collator, the IBM 077 Collator.
1937: IBM produces 5 to 10 million punched cards every day. By 1937... IBM had 32 presses at work in Endicott, N.Y., printing, cutting and stacking five to 10 million punched cards every day.
1937: IBM 805 test scoring machine. IBM's Rey Johnson designs the IBM 805 Test Scoring Machine to greatly speed the process of test scoring. The 805's innovative pencil-mark sensing technology gives rise to the ubiquitous phrase, "Please completely fill in the oval".
1937: Berlin conference. As president of the International Chamber of Commerce, Watson Sr., presides over the ICC's 9th Congress in Berlin. While there he accepts a Merit Cross of the German Eagle with Star medal from the Nazi government honoring his activities on behalf of world peace and international trade (he later returned it).
1937: Paid holidays, paid vacation. IBM announces a policy of paying employees for six annual holidays and becomes one of the first U.S. companies to grant holiday pay. Paid vacations also begin."
1937: IBM Japan. Japan Wattoson Statistics Accounting Machinery Co., Ltd. (日本ワットソン統計会計機械株式会社, now IBM Japan) was established.
1938: New headquarters. When IBM dedicates its new World Headquarters on 590 Madison Avenue, New York, New York, in January 1938, the company has operations in 79 countries.
1939–1945: World War II
In the decades leading up to the onset of WW2 IBM had operations in many countries that would be involved in the war, on both the side of the Allies and the Axis. IBM had a lucrative subsidiary in Germany, which it was the majority owner of, as well as operations in Poland, Switzerland, and other countries in Europe. As with most other enemy-owned businesses in Axis countries, these subsidiaries were taken over by the Nazis and other Axis governments early on in the war. The headquarters in New York meanwhile worked to help the American war effort.
IBM in America
IBM's product line shifted from tabulating equipment and time recording devices to Sperry and Norden bombsights, Browning Automatic Rifle and the M1 Carbine, and engine parts – in all, more than three dozen major ordnance items and 70 products overall. Watson set a nominal one percent profit on those products and used the profits to establish a fund for widows and orphans of IBM war casualties.
Allied military forces widely utilized IBM's tabulating equipment for mobile records units, ballistics, accounting and logistics, and other war-related purposes. There was extensive use of IBM punched-card machines for calculations made at Los Alamos during the Manhattan Project for developing the first atomic bombs. During the War, IBM also built the Automatic Sequence Controlled Calculator, also known as the Harvard Mark I for the U.S. Navy – the first large-scale electromechanical calculator in the U.S..
In 1933 IBM had acquired the rights to Radiotype, an IBM Electric typewriter attached to a radio transmitter. "In 1935 Admiral Richard E. Byrd successfully sent a test Radiotype message 11,000 miles from Antarctica to an IBM receiving station in Ridgewood, New Jersey" Selected by the Signal Corps for use during the war, Radiotype installations handled up to 50,000,000 words a day.
To meet wartime product demands, IBM greatly expanded its manufacturing capacity. IBM added new buildings at its Endicott, New York plant (1941), and opened new facilities in Poughkeepsie, New York (1941), Washington, D.C. (1942), and San Jose, California (1943). IBM's decision to establish a presence on the West Coast took advantage of the growing base of electronics research and other high technology innovation in the southern part of the San Francisco Bay Area, an area that came to be known many decades later as Silicon Valley.
IBM was, at the request of the government, the subcontractor for the Japanese internment camps' punched card project.
IBM punched card equipment was used for cryptanalysis (code breaking) by US Army and Navy organizations, Arlington Hall and OP-20-G and similar Allied organizations, including the (Central Bureau and the Far East Combined Bureau).
IBM in Germany and Nazi Occupied Europe
The Nazis made extensive use of Hollerith equipment and IBM's majority-owned German subsidiary, Deutsche Hollerith Maschinen GmbH (Dehomag), supplied this equipment from the early 1930s. This equipment was critical to Nazi efforts to categorize citizens of both Germany and other nations that fell under Nazi control through ongoing censuses. This census data was used to facilitate the round-up of Jews and other targeted groups, and to catalog their movements through the machinery of the Holocaust, including internment in the concentration camps.
As with hundreds of foreign-owned companies that did business in Germany at that time, Dehomag came under the control of Nazi authorities prior to and during World War II. A Nazi, Hermann Fellinger, was appointed by the Germans as an enemy-property custodian and placed at the head of the Dehomag subsidiary.
Historian and author Edwin Black, in his best selling book on the topic, IBM and the Holocaust, maintains that the seizure of the German subsidiary was a ruse. He writes: "The company was not looted, its leased machines were not seized, and [IBM] continued to receive money funneled through its subsidiary in Geneva." In his book he argues that IBM was an active and enthusiastic supplier to the Nazi regime long after they should have stopped dealing with them. Even after the invasion of Poland, IBM continued to service and expand services to the Third Reich in Poland and Germany. The seizure of IBM came after Pearl Harbor and the US Declaration of War, in 1941.
IBM responded that the book was based upon "well-known" facts and documents that it had previously made publicly available and that there were no new facts or findings. IBM also denied withholding any relevant documents. Writing in the New York Times, Richard Bernstein argued that Black overstates IBM's culpability.
Key events
1942: Training for the disabled. IBM launches a program to train and employ disabled people in Topeka, Kansas. The next year classes begin in New York City, and soon the company is asked to join the President's Committee for Employment of the Handicapped.
1943: First female vice president. IBM appoints its first female vice president.
1944: ASCC. IBM introduces the world's first large-scale calculating computer, the Automatic Sequence Control Calculator (ASCC). Designed in collaboration with Harvard University, the ASCC, also known as the Mark I, uses electromechanical relays to solve addition problems in less than a second, multiplication in six seconds, and division in 12 seconds.
1944: United Negro College Fund. IBM President Thomas J. Watson, Sr., joins the Advisory Committee of the United Negro College Fund (UNCF), and IBM contributes to the UNCF's fund-raising efforts.
1945: IBM's first research lab. IBM's first research facility, the Watson Scientific Computing Laboratory, opens in a renovated fraternity house near Columbia University in Manhattan. In 1961, IBM moves its research headquarters to the T.J. Watson Research Center in Yorktown Heights, New York.
1946–1959: Postwar recovery, rise of business computing, space exploration, the Cold War
IBM had expanded so much by the end of the War that the company faced a potentially difficult situation – what would happen if military spending dropped sharply? One way IBM addressed that concern was to accelerate its international growth in the years after the war, culminating with the formation of the World Trade Corporation in 1949 to manage and grow its foreign operations. Under the leadership of Watson's youngest son, Arthur K. ‘Dick’ Watson, the WTC would eventually produce half of IBM's bottom line by the 1970s.
Despite introducing its first computer a year after Remington Rand's UNIVAC in 1951, within five years IBM had 85% of the market. A UNIVAC executive complained that "It doesn't do much good to build a better mousetrap if the other guy selling mousetraps has five times as many salesmen". With the death of Founding Father Thomas J. Watson, Sr. on June 19, 1956 at age 82, IBM experienced its first leadership change in more than four decades. The mantle of chief executive fell to his eldest son, Thomas J. Watson, Jr., IBM's president since 1952.
The new chief executive faced a daunting task. The company was in the midst of a period of rapid technological change, with nascent computer technologies – electronic computers, magnetic tape storage, disk drives, programming – creating new competitors and market uncertainties. Internally, the company was growing by leaps and bounds, creating organizational pressures and significant management challenges. Lacking the force of personality that Watson Sr. had long used to bind IBM together, Watson Jr. and his senior executives privately wondered if the new generation of leadership was up to challenge of managing a company through this tumultuous period. "We are," wrote one longtime IBM executive in 1956, "in grave danger of losing our "eternal" values that are as valid in electronic days as in mechanical counter days."
Watson Jr. responded by drastically restructuring the organization mere months after his father died, creating a modern management structure that enabled him to more effectively oversee the fast-moving company. He codified well known but unwritten IBM practices and philosophy into formal corporate policies and programs – such as IBM's Three Basic Beliefs, and Open Door and Speak Up! Perhaps the most significant of which was his shepherding of the company's first equal opportunity policy letter into existence in 1953, one year before the U.S. Supreme Court decision in Brown vs. Board of Education and 11 years before the Civil Rights Act of 1964.
He continued to expand the company's physical capabilities – in 1952 IBM San Jose launched a storage development laboratory that pioneered disk drives. Major facilities would later follow in Rochester, Minnesota; Greencastle, Indiana; Kingston, New York; and Lexington, Kentucky. Concerned that IBM was too slow in adapting transistor technology Watson requested a corporate policy regarding their use, resulting in this unambiguous 1957 product development policy statement: "It shall be the policy of IBM to use solid-state circuitry in all machine developments. Furthermore, no new commercial machines or devices shall be announced which make primary use of tube circuitry."
Watson Jr. also continued to partner with the United States government to drive computational innovation. The emergence of the Cold War accelerated the government's growing awareness of the significance of digital computing and drove major Department of Defense supported computer development projects in the 1950s. Of these, none was more important than the SAGE interceptor early detection air defense system.
In 1952, IBM began working with MIT's Lincoln Laboratory to finalize the design of an air defense computer. The merger of academic and business engineering cultures proved troublesome, but the two organizations finally hammered out a design by the summer of 1953, and IBM was awarded the contract to build two prototypes in September. In 1954, IBM was named as the primary computer hardware contractor for developing SAGE for the United States Air Force. Working on this massive computing and communications system, IBM gained access to pioneering research being done at Massachusetts Institute of Technology on the first real-time, digital computer. This included working on many other computer technology advancements such as magnetic core memory, a large real-time operating system, an integrated video display, light guns, the first effective algebraic computer language, analog-to-digital and digital-to-analog conversion techniques, digital data transmission over telephone lines, duplexing, multiprocessing, and geographically distributed networks. IBM built fifty-six SAGE computers at the price of US$30 million each, and at the peak of the project devoted more than 7,000 employees (20% of its then workforce) to the project. SAGE had the largest computer footprint ever and continued in service until 1984.
More valuable to IBM in the long run than the profits from governmental projects, however, was the access to cutting-edge research into digital computers being done under military auspices. IBM neglected, however, to gain an even more dominant role in the nascent industry by allowing the RAND Corporation to take over the job of programming the new computers, because, according to one project participant, Robert P. Crago, "we couldn't imagine where we could absorb two thousand programmers at IBM when this job would be over someday, which shows how well we were understanding the future at that time." IBM would use its experience designing massive, integrated real-time networks with SAGE to design its SABRE airline reservation system, which met with much success.
These government partnerships, combined with pioneering computer technology research and a series of commercially successful products (IBM's 700 series of computer systems, the IBM 650, the IBM 305 RAMAC (with disk drive memory), and the IBM 1401) enabled IBM to emerge from the 1950s as the world's leading technology firm. Watson Jr. had answered his self-doubt. In the five years since the passing of Watson Sr., IBM was two and a half times bigger, its stock had quintupled, and of the 6000 computers in operation in the United States, more than 4000 were IBM machines.
Key events
1946: IBM 603. IBM announces the IBM 603 Electronic Multiplier, the first commercial product to incorporate electronic arithmetic circuits. The 603 used vacuum tubes to perform multiplication far more rapidly than earlier electromechanical devices. It had begun its development as part of a program to make a "super calculator" that would perform faster than 1944's IBM ASCC by using electronics.
1946: Chinese character typewriter. IBM introduces an electric Chinese ideographic character typewriter, which allowed an experienced user to type at a rate of 40 to 45 Chinese words a minute. The machine utilizes a cylinder on which 5,400 ideographic type faces are engraved.
1946: First black salesman. IBM hires its first black salesman, 18 years before the Civil Rights Act of 1964.
1948: IBM SSEC. IBM's first large-scale digital calculating machine, the Selective Sequence Electronic Calculator, is announced. The SSEC is the first computer that can modify a stored program and featured 12,000 vacuum tubes and 21,000 electromechanical relays.
1950s: Space exploration. From developing ballistics tables during World War II to the design and development of intercontinental missiles to the launching and tracking of satellites to manned lunar and shuttle space flights, IBM has been a contractor to NASA and the aerospace industry.
1952: IBM 701. IBM throws its hat into the computer business ring by introducing the 701, its first large-scale electronic computer to be manufactured in quantity. The 701, IBM President Thomas J. Watson, Jr., later recalled, is "the machine that carried us into the electronics business."
1952: Magnetic tape vacuum column. IBM introduces the magnetic tape drive vacuum column, making it possible for fragile magnetic tape to become a viable data storage medium. The use of the vacuum column in the IBM 701 system signals the beginning of the era of magnetic storage, as the technology becomes widely adopted throughout the industry.
1952: First California research lab. IBM opens its first West Coast lab in San Jose, California: the area that decades later will come to be known as "Silicon Valley." Within four years, the lab begins to make its mark by inventing the hard disk drive.
1953: Equal opportunity policy letter. Thomas J. Watson, Jr., publishes the company's first written equal opportunity policy letter: one year before the U.S. Supreme Court decision in Brown vs. Board of Education and 11 years before the Civil Rights Act of 1964.
1953: IBM 650. IBM announces the IBM 650 Magnetic Drum Data-Processing Machine, an intermediate size electronic computer, to handle both business and scientific computations. A hit with both universities and businesses, it was the most popular computer of the 1950s. Nearly 2,000 IBM 650s were marketed by 1962.
1954: NORC. IBM develops and builds the fastest, most powerful electronic computer of its time: the Naval Ordnance Research Computer (NORC): for the U.S. Navy Bureau of Ordnance.
1956: First magnetic Hard disk drive. IBM introduces the world's first magnetic hard disk for data storage. The IBM 305 RAMAC (Random Access Method of Accounting and Control) offers an unprecedented performance by permitting random access to any of the million characters distributed over both sides of 50 two-foot-diameter disks. Produced in California, IBM's first hard disk stored about 2,000 bits of data per square inch and cost about $10,000 per megabyte. By 1997, the cost of storing a megabyte had dropped to around ten cents.
1956: Consent decree. The United States Justice Department enters a consent decree against IBM in 1956 to prevent the company from becoming a monopoly in the market for punched-card tabulating and, later, electronic data-processing machines. The decree requires IBM to sell its computers as well as lease them and to service and sell parts for computers that IBM no longer owned.
1956: Corporate design. In the mid-1950s, Thomas J. Watson, Jr., was struck by how poorly IBM was handling corporate design. He hired design consultant Eliot Noyes to oversee the creation of a formal Corporate Design Program and charged Noyes with creating a consistent, world-class look and feel at IBM. Over the next two decades, Noyes hired a host of influential architects, designers, and artists to design IBM products, structures, exhibits, and graphics. The list of Noyes contacts includes such iconic figures as Eero Saarinen, Marcel Breuer, Mies van der Rohe, John Bolles, Paul Rand, Isamu Noguchi and Alexander Calder.
1956: First European research lab. IBM opens its first research lab outside the United States, in the Swiss city of Zurich.
1956: Changing hands. Watson Sr. retires and hands IBM to his son, Watson Jr. Senior dies soon after.
1956: Williamsburg conference. Watson Jr. gathered some 100 senior IBM executives together for a special three-day meeting in Williamsburg, Virginia. The meeting resulted in a new organizational structure that featured a six-member corporate management committee and delegated more authority to business unit leadership. It was the first major meeting IBM had ever held without Thomas J. Watson Sr., and it marked the emergence of the second generation of IBM leadership.
1956: Artificial intelligence. Arthur L. Samuel of IBM's Poughkeepsie, New York, laboratory programs an IBM 704 to play checkers (English draughts) using a method in which the machine can "learn" from its own experience. It is believed to be the first "self-learning" program, a demonstration of the concept of artificial intelligence.
1957: FORTRAN. IBM revolutionizes programming with the introduction of FORTRAN (Formula Translator), which soon becomes the most widely used computer programming language for technical work. FORTRAN is still the basis for many important numerical analysis programs.
1958: SAGE AN/FSQ-7. The SAGE (Semi-Automatic Ground Environment) AN/FSQ-7 computer is built under contract to MIT's Lincoln Laboratory for the North American Air Defense System.
1958: IBM domestic Time Equipment Division sold to Simplex. IBM announces the sale of the domestic Time Equipment Division (clocks et al.) business to Simplex Time Recorder Company. The IBM time equipment service force will be transferred to the Electric Typewriter Division.
1958: Open Door program. First implemented by Watson, Sr., in the 1910s, the Open Door was a traditional company practice that granted employees with complaints hearings with senior executives, up to and including Watson Sr. IBM formalized this practice into policy in 1958 with the creation of the Open Door Program.
1959: Speak up! A further example of IBM's willingness to solicit and act upon employee feedback, the Speak Up! Program was first created in San Jose.
1959: IBM 1401. IBM introduces 1401, the first high-volume, stored-program, core-memory, transistorized computer. Its versatility in running enterprise applications of all kinds helped it become the most popular computer model in the world in the early 1960s.
1959: IBM 1403. IBM introduces the 1403 chain printer, which launches the era of high-speed, high-volume impact printing. The 1403 will not be surpassed for print quality until the advent of laser printing in the 1970s.
1960–1969: The System/360 era, Unbundling software and services
On April 7, 1964, IBM introduced the revolutionary System/360, the first large "family" of computers to use interchangeable software and peripheral equipment, a departure from IBM's existing product line of incompatible machines, each of which was designed to solve specific customer requirements. The idea of a general-purpose machine was considered a gamble at the time. Within two years, the System/360 became the dominant mainframe computer in the marketplace and its architecture became a de facto industry standard. During this time, IBM transformed from a medium-sized maker of tabulating equipment and typewriters into the world's largest computer company.
In 1969 IBM "unbundled" software and services from hardware sales. Until this time customers did not pay for software or services separately from the very high price for the hardware. Software was provided at no additional charge, generally in source code form. Services (systems engineering, education and training, system installation) were provided free of charge at the discretion of the IBM Branch office. This practice existed throughout the industry. IBM's unbundling is widely credited with leading to the growth of the software industry. After the unbundling, IBM software was divided into two main categories: System Control Programming (SCP), which remained free to customers, and Program Products (PP), which were charged for. This transformed the customer's value proposition for computer solutions, giving a significant monetary value to something that had hitherto essentially been free. This helped enable the creation of the software industry. Similarly, IBM services were divided into two categories: general information, which remained free and provided at the discretion of IBM, and on-the-job assistance and training of customer personnel, which were subject to a separate charge and were open to non-IBM customers. This decision vastly expanded the market for independent computing services companies.
The company began four decades of Olympic sponsorship with the 1960 Winter Games in Squaw Valley, California. It became a recognized leader in corporate social responsibility, joining federal equal opportunity programs in 1962, opening an inner-city manufacturing plant in 1968, and creating a minority supplier program. It led efforts to improve data security and protect privacy. It set environmental air/water emissions standards that exceeded those dictated by law and brought all its facilities into compliance with those standards. It opened one of the world's most advanced research centers in Yorktown, New York. Its international operations grew rapidly, producing more than half of IBM's revenues by the early 1970s and through technology transfer shaping the way governments and businesses operated around the world. Its personnel and technology played an integral role in the space program and landing the first men on the moon in 1969. In that same year, it changed the way it marketed its technology to customers, unbundling hardware from software and services, effectively launching today's multibillion-dollar software and services industry. See unbundling of software and services, below. It was massively profitable, with a nearly fivefold increase in revenues and earnings during the 1960s.
In 1967 Thomas John Watson, Jr., who had succeeded his father as chairman, announced that IBM would open a large-scale manufacturing plant at Boca Raton to produce its System/360 Model 20 midsized computer. On March 16, 1967, a headline in the Boca Raton News announced “IBM to hire 400 by year’s end.” The plan was for IBM to lease facilities to start making computers until the new site could be developed. A few months later, hiring began for assembly and production control trainees. IBM's Juan Rianda moved from Poughkeepsie, New York, to become the first plant manager at IBM's new Boca operations. To design its new campus, IBM commissioned internationally renowned architect Marcel Breuer (1902–1981), who worked closely with American architect Robert Gatje (1927–2018). In September 1967, the Boca team celebrated a milestone, shipping its first IBM System/360 Model 20 to the City of Clearwater – the first computer in its production run. A year later, IBM 1130 Computing Systems were being produced and shipped from the 203 building. By 1969, IBM's Boca workforce had reached 1,000. That employment number grew to around 1,300 in the next year as a Systems Development Engineering Laboratory was added to the division's operations.
Key events
1961: IBM 7030 Stretch. IBM delivers its first 7030 Stretch supercomputer. Stretch falls short of its original design objectives, and is not a commercial success. But it is a visionary product that pioneers numerous revolutionary computing technologies which are soon widely adopted by the computer industry.
1961: Thomas J. Watson Research Center. IBM moves its research headquarters from Poughkeepsie, NY to Westchester County, NY, opening the Thomas J. Watson Research Center which remains IBM's largest research facility, centering on semiconductors, computer science, physical science, and mathematics. The lab which IBM established at Columbia University in 1945 was closed and moved to the Yorktown Heights laboratory in 1970.
1961: IBM Selectric typewriter. IBM introduces the Selectric typewriter product line. Later Selectric models feature memory, giving rise to the concepts of word processing and desktop publishing. The machine won numerous awards for its design and functionality. Selectrics and their descendants eventually captured 75 percent of the United States market for electric typewriters used in business. IBM replaced the Selectric line with the IBM Wheelwriter in 1984 and transferred its typewriter business to the newly formed Lexmark in 1991.
1961: Report Program Generator. IBM offers its Report Program Generator, an application that allows IBM 1401 users to produce reports. This capability was widely adopted throughout the industry, becoming a feature offered in subsequent generations of computers. It played an important role in the successful introduction of computers into small businesses.
1962: Basic beliefs. Drawing on established IBM policies, Thomas J. Watson, Jr., codifies three IBM basic beliefs: respect for the individual, customer service, and excellence.
1962: SABRE. Two IBM 7090 mainframes formed the backbone of the SABRE reservation system for American Airlines. As the first airline reservation system to work live over phone lines, SABRE linked high-speed computers and data communications to handle seat inventory and passenger records.
1964: IBM System/360. In the most important product announcement in company history to date, IBM introduces the IBM System/360: a new concept in computers which creates a "family" of small to large computers, incorporating IBM Solid Logic Technology (SLT) microelectronics and using the same programming instructions. The concept of a compatible "family" of computers transforms the industry.
1964: Word processing. IBM introduces the IBM Magnetic Tape Selectric Typewriter, a product that pioneered the application of magnetic recording devices to typewriting, and gave rise to desktop word processing. Referred to then as "power typing," the feature of revising stored text improved office efficiency by allowing typists to type at "rough draft" speed without the pressure of worrying about mistakes.
1964: New corporate headquarters. IBM moves its corporate headquarters from New York City to Armonk, New York.
1965: Gemini space flights. A 59-pound onboard IBM guidance computer is used on all Gemini space flights, including the first spaceship rendezvous. IBM scientists complete the most precise computation of the Moon's orbit and develop a fabrication technique to connect hundreds of circuits on a silicon wafer.
1965: New York World's Fair. The IBM Pavilion at the New York World's Fair closes, having hosted more than 10 million visitors during its two-year existence.
1966: Dynamic Random-Access Memory (DRAM). IBM invents one-transistor DRAM cells which permit major increases in memory capacity. DRAM chips become the mainstay of modern computer memory systems: the "crude oil" of the information age is born.
1966: IBM System/4 Pi. IBM ships its first System/4Pi computer, designed to meet U.S. Department of Defense and NASA requirements. More than 9000 units of the 4Pi systems are delivered by the 1980s for use in the air, sea, and space.
1966: IBM Information Management System (IMS). IBM designed the Information Management System (IMS) with Rockwell and Caterpillar starting in 1966 for the Apollo program, where it was used to inventory the very large bill of materials (BOM) for the Saturn V moon rocket and Apollo space vehicle.
1967: Fractal geometry. IBM researcher Benoit Mandelbrot conceives fractal geometry – the concept that seemingly irregular shapes can have identical structure at all scales. This new geometry makes it possible to mathematically describe the kinds of irregularities existing in nature. The concept greatly impacts the fields of engineering, economics, metallurgy, art, health sciences, and computer graphics and animation.
1968: IBM Customer Information Control System (CICS). IBM introduces the CICS transaction monitor. CICS remains to this day the industry's most popular transactions monitor.
1969: Antitrust. The United States government launches what would become a 13-year-long antitrust suit against IBM. The suit becomes a draining war of attrition, and is eventually dropped in 1982, after IBM's share of the mainframe market declined from 70% to 62%.
1969: Unbundling. IBM adopts a new marketing policy that charges separately for most systems engineering activities, future computer programs, and customer education courses. This "unbundling" gives rise to a multibillion-dollar software and services industry.
1969: Magnetic stripe cards. The American National Standards Institute makes the IBM-developed magnetic stripe technology a national standard, jump starting the credit card industry. Two years later, the International Organization for Standardization adopts the IBM design, making it a world standard.
1969: First moon landing. IBM personnel and computers help NASA land the first men on the Moon.
1970–1974: The challenges of success
The Golden Decade of the 1960s was a hard act to follow, and the 1970s got off to a troubling start when CEO Thomas J. Watson Jr. suffered a heart attack and retired in 1971. For the first time since 1914 – nearly six decades – IBM would not have a Watson at the helm. Moreover, after just one leadership change over those nearly 60 years, IBM would endure two in two years. T. Vincent Learson succeeded Watson as CEO, then quickly retired upon reaching the mandatory retirement age of 60 in 1973. Following Learson in the CEO office was Frank T. Cary, a 25-year IBMer who had run the very successful data processing division in the 1960s.
Datamation in 1971 stated that "the perpetual, ominous force called IBM rolls on". The company's dominance let it keep prices high and rarely update products, all built with only IBM components. During Cary's tenure as CEO, the IBM System/370 was introduced in 1970 as IBM's new mainframe. The S/370 did not prove as technologically revolutionary as its predecessor, the System/360. From a revenue perspective, it more than sustained the cash cow status of the 360. A less successful effort to replicate the 360 mainframe revolution was the Future Systems project. Between 1971 and 1975, IBM investigated the feasibility of a new revolutionary line of products designed to make obsolete all existing products in order to re-establish its technical supremacy. This effort was terminated by IBM's top management in 1975. But by then it had consumed most of the high-level technical planning and design resources, thus jeopardizing progress of the existing product lines (although some elements of FS were later incorporated into actual products). Other IBM innovations during the early 1970s included the IBM 3340 disk unit – introduced in 1973 and known as "Winchester" after IBM's internal project name – was an advanced storage technology which more than doubled the information density on disk surfaces. Winchester technology was adopted by the industry and used for the next two decades.
Some 1970s-era IBM technologies emerged to become familiar facets of everyday life. IBM developed magnetic stripe technology in the 1960s, and it became a credit card industry standard in 1971. The IBM-invented floppy disk, also introduced in 1971, became the standard for storing personal computer data during the first decades of the PC era. IBM Research scientist Edgar 'Ted' Codd wrote a seminal paper describing the relational database, an invention that Forbes magazine described as one of the most important innovations of the 20th century. The IBM 5100, 50 lbs. and $9000 of personal mobility, was introduced in 1975 and presaged – at least in function if not size or price or units sold – the Personal Computer of the 1980s. IBM's 3660 supermarket checkout station, introduced in 1973, used holographic technology to scan product prices from the now-ubiquitous UPC bar code, which itself was based a 1952 IBM patent that became a grocery industry standard. Also in 1973, bank customers began making withdrawals, transfers and other account inquiries via the IBM 3614 Consumer Transaction Facility, an early form of today's Automatic Teller Machines.
IBM had an innovator's role in pervasive technologies that were less visible as well. In 1974, IBM announced Systems Network Architecture (SNA), a networking protocol for computing systems. SNA is a uniform set of rules and procedures for computer communications to free computer users from the technical complexities of communicating through local, national, and international computer networks. SNA became the most widely used system for data processing until more open architecture standards were approved in the 1990s. In 1975, IBM researcher Benoit Mandelbrot conceived fractal geometry – a new geometrical concept that made it possible to describe mathematically the kinds of irregularities existing in nature. Fractals had a great impact on engineering, economics, metallurgy, art and health sciences, and are integral to the field of computer graphics and animation.
A less successful business endeavor for IBM was its entry into the office copier market in the 1970s, after turning down the opportunity to purchase the xerography technology. The company was immediately sued by Xerox Corporation for patent infringement. Although Xerox held the patents for the use of selenium as a photoconductor, IBM researchers perfected the use of organic photoconductors which avoided the Xerox patents. The litigation lasted until the late 1970s and was ultimately settled. Despite this victory, IBM never gained traction in the copier market and withdrew from the marketplace in the 1980s. Organic photoconductors are now widely used in copiers.
Throughout this period, IBM was litigating the antitrust suit filed by the Justice Department in 1969. But in a related bit of case law, the landmark Honeywell v. Sperry Rand U.S. federal court case was concluded in April 1973. The 1964 patent for the ENIAC, the world's first general-purpose electronic digital computer, was found both invalid and unenforceable for a variety of reasons thus putting the invention of the electronic digital computer into the public domain. Further, IBM was ruled to have created a monopoly via its 1956 patent-sharing agreement with Sperry-Rand.
American antitrust laws did not affect IBM in Europe, where it had fewer competitors and more than 50% market share in almost every country. Customers preferred IBM because it was, Datamation said, "the only truly international computer company", able to serve clients almost anywhere. Rivals such as ICL, CII, and Siemens began to cooperate to preserve a European computer industry.
Key events
1970: System/370. IBM announces System/370 as successor to System/360.
1970: Relational databases. IBM introduces relational databases which call for information stored within a computer to be arranged in easy-to-interpret tables to access and manage large amounts of data. Today, nearly all database structures are based on the IBM concept of relational databases.
1970: Office copiers. IBM introduces its first of three models of xerographic copiers. These machines mark the first commercial use of organic photoconductors which since grew to become the dominant technology.
1971: Speech recognition. IBM achieves its first operational application of speech recognition, which enables engineers servicing equipment to talk to and receive spoken answers from a computer that can recognize about 5,000 words. Today, IBM's ViaVoice recognition technology has a vocabulary of 64,000 words and a 260,000-word back-up dictionary.
1971: Floppy disk. IBM introduces the floppy disk. Convenient and highly portable, the floppy becomes a personal computer industry standard for storing data.
1973: Winchester storage technology. The IBM 3340 disk unit – known as "Winchester" after IBM's internal project name – is introduced, an advanced technology which more than doubled the information density on disk surfaces. It featured a smaller, lighter read/write head that was designed to ride on an air film only 18 millionths of an inch thick. Winchester technology was adopted by the industry and used for the next two decades.
1973: Nobel Prize. Dr. Leo Esaki, an IBM Fellow who joined the company in 1960, shares the 1973 Nobel Prize in physics for his 1958 discovery of the phenomenon of electron tunneling. His discovery of the semiconductor junction called the Esaki diode finds wide use in electronics applications. More importantly, his work in the field of semiconductors lays a foundation for further exploration in the electronic transport of solids.
1974: SNA. IBM announces Systems Network Architecture (SNA), a networking protocol for computing systems. SNA is a uniform set of rules and procedures for computer communications to free computer users from the technical complexities of communicating through local, national, and international computer networks. SNA becomes the most widely used system for data processing until more open architecture standards were approved in the 1990s.
1975–1992: Information revolution, rise of software and PC industries
President of IBM John R. Opel became CEO in 1981. His company was one of the world's largest and had a 62% share of the mainframe computer market that year. While frequently relocated employees and families still joked that IBM stood for "I've Been Moved", and employees of acquisitions feared that hordes of formal IBM employees would invade their more casual offices, IBM no longer required white shirts for male employees, who still wore conservative suits when meeting customers. Former employees such as Gene Amdahl used their training to found and lead many competitors and suppliers.
Expecting Japanese competition, IBM in the late 1970s began investing in manufacturing to lower costs, offering volume discounts and lower prices to large customers, and introducing new products more frequently. The company also sometimes used non-IBM components in products, and sometimes resold others' products as its own. In 1980 it introduced its first computer terminal compatible with non-IBM equipment, and Displaywriter was the first new product less expensive than the competition. IBM's share of the overall computer market, however, declined from 60% in 1970 to 32% in 1980. Perhaps distracted by the long-running antitrust lawsuit, the "Colossus of Armonk" completely missed the fast-growing minicomputer market during the 1970s, and was behind rivals such as Wang, Hewlett-Packard (HP), and Control Data in other areas.
In 1979 BusinessWeek asked, "Is IBM just another stodgy, mature company?" By 1981 its stock price had declined by 22%. IBM's earnings for the first half the year grew by 5.3% – one third of the inflation rate – while those of minicomputer maker Digital Equipment Corporation (DEC) grew by more than 35%. The company began selling minicomputers, but in January 1982 the Justice Department ended the antitrust suit because, The New York Times reported, the government "recognized what computer experts and securities analysts had long since concluded: I.B.M. no longer dominates the computer business".
IBM wished to avoid the same outcome with the new personal computer industry. The company studied the market for years and, as with UNIVAC, others like Apple Computer entered it first; IBM did not want a product with a rival's logo on corporate customers' desks. The company opened its first retail store in November 1980, and a team in the Boca Raton, Florida office built the IBM PC using commercial off-the-shelf components. The new computer debuted on August 12, 1981 from the Entry Systems Division led by Don Estridge. IBM immediately became more of a presence in the consumer marketplace, thanks to the memorable Little Tramp advertising campaign. Though not a spectacular machine by technological standards of the day, the IBM PC brought together all of the most desirable features of a computer into one small machine. It had 128 kilobytes of memory (expandable to 256 kilobytes), one or two floppy disks and an optional color monitor. And it had the prestige of the IBM brand. It was not cheap, but with a base price of US$1,565 it was affordable for businesses – and many businesses purchased PCs. Reassured by the IBM name, they began buying microcomputers on their own budgets aimed at numerous applications that corporate computer departments did not, and in many cases could not, accommodate. Typically, these purchases were not by corporate computer departments, as the PC was not seen as a "proper" computer. Purchases were often instigated by middle managers and senior staff who saw the potential – once the revolutionary VisiCalc spreadsheet, the killer app, had been surpassed by a far more powerful and stable product, Lotus 1-2-3.
IBM's dominance of the mainframe market in Europe and the US encouraged existing customers to buy the PC, and vice versa; as sales of what had been an experiment in a new market became a substantial part of IBM's financials, the company found that customers also bought larger IBM computers. Unlike the BUNCH and other rivals IBM quickly adjusted to the retail market, with its own sales force competing with outside retailers for the first time. By 1985 IBM was the world's most profitable industrial company, and its sales of personal computers were larger than that of minicomputers despite having been in the latter market since the early 1970s.
By 1983 industry analyst Gideon Gartner warned that IBM "is creating a dangerous situation for competitors in the marketplace". The company helped others by defining technical standards and creating large new software markets, but the new aggressiveness that began in the late 1970s helped it dominate areas like computer leasing and computer-aided design. Free from the antitrust case, IBM was present in every computer market other than supercomputers, and entered communications by purchasing Rolm – the first acquisition in 18 years – and 18% of MCI. The company was so important to component suppliers that it urged them to diversify. When IBM (61% of revenue) abruptly reduced orders from Miniscribe shares of not only Miniscribe but that of uninvolved companies that sold to IBM fell, as investors feared their vulnerability. IBM was also vulnerable when suppliers could not fulfill orders; customers and dealers also feared becoming overdependent.
The IBM PC AT's 1984 debut startled the industry. Rivals admitted that they did not expect the low price of the sophisticated product. IBM's attack on every area of the computer industry and entry into communications caused competitors, analysts, and the press to speculate that it would again be sued for antitrust. Datamation and others said that the company's continued growth might hurt the United States, by suppressing startups with new technology. Gartner Group estimated in 1985 that of the 100 largest data-processing companies, IBM had 41% of all revenue and 69% of profit. Its computer revenue was about nine times that of second-place DEC, and larger than that of IBM's six largest Japanese competitors combined. The 22% profit margin was three times the 6.7% average for the other 99 companies. Competitors complained to Congress, ADAPSO discussed the company with the Justice Department, and European governments worried about IBM's influence but feared affecting its more than 100,000 employees there at 19 facilities.
However, the company soon lost its lead in both PC hardware and software, thanks in part to its unprecedented (for IBM) decision to contract PC components to outside companies like Microsoft and Intel. Up to this point in its history, IBM relied on a vertically integrated strategy, building most key components of its systems itself, including processors, operating systems, peripherals, databases and the like. In an attempt to accelerate the time-to-market for the PC, IBM chose not to build a proprietary operating system and microprocessor. Instead, it sourced these vital components from Microsoft and Intel respectively. Ironically, in a decade which marked the end of IBM's monopoly, it was this fateful decision by IBM that passed the sources of its monopolistic power (operating system and processor architecture) to Microsoft and Intel, paving the way for rise of PC compatibles and the creation of hundreds of billions of dollars of market value outside of IBM.
John Akers became IBM's CEO in 1985. During the 1980s, IBM's significant investment in building a world class research organization produced four Nobel Prize winners in physics, achieved breakthroughs in mathematics, memory storage and telecommunications, and made great strides in expanding computing capabilities. In 1980, IBM Research legend John Cocke introduced Reduced Instruction Set Technology (RISC). Cocke received both the National Medal of Technology and the National Medal of Science for his innovation, but IBM itself failed to recognize the importance of RISC, and lost the lead in RISC technology to Sun Microsystems. In 1984 the company partnered with Sears to develop a pioneering online home banking and shopping service for home PCs that launched in 1988 as Prodigy. Despite a strong reputation and anticipating many of the features, functions, and technology that characterize the online experience of today, the venture was plagued by extremely conservative management decisions, and was eventually sold in the mid-1990s. The IBM token-ring local area network, introduced in 1985, permitted personal computer users to exchange information and share printers and files within a building or complex. In 1988, IBM partnered with the University of Michigan and MCI Communications to create the National Science Foundation Network (NSFNet), an important step in the creation of the Internet. But within five years the company backed away from this early lead in Internet protocols and router technologies in order to support its existing SNA cash cow, thereby missing a boom market of the 1990s. Still, IBM investments and advances in microprocessors, disk drives, network technologies, software applications, and online commerce in the 1980s set the stage for the emergence of the connected world in the 1990s.
But by the end of the decade, IBM was clearly in trouble. It was a bloated organization of some 400,000 employees that was heavily invested in low margin, transactional, commodity businesses. Technologies IBM invented and or commercialized – DRAM, hard disk drives, the PC, electric typewriters – were starting to erode. The company had a massive international organization characterized by redundant processes and functions – its cost structure couldn't compete with smaller, less diversified competitors. And then the back-to-back revolutions – the PC and the client-server – did the unthinkable. They combined to dramatically undermine IBM's core mainframe business. The PC revolution placed computers directly in the hands of millions of people. It was followed by the client/server revolution, which sought to link all of those PCs (the "clients") with larger computers that labored in the background (the "servers" that served data and applications to client machines). Both revolutions transformed the way customers viewed, used and bought technology. And both fundamentally rocked IBM. Businesses' purchasing decisions were put in the hands of individuals and departments – not the places where IBM had long-standing customer relationships. Piece-part technologies took precedence over integrated solutions. The focus was on the desktop and personal productivity, not on business applications across the enterprise. As a result, earnings – which had been at or above US$5 billion since the early 1980s, dropped by more than a third to US$3 billion in 1989. A brief spike in earnings in 1990 proved illusory as corporate spending continued to shift from high-profit margin mainframes to lower margin microprocessor-based systems. In addition, corporate downsizing was in full swing.
Akers tried to stop the bleeding – desperate moves and radical changes were considered and implemented. As IBM assessed the situation, it was clear that competition and innovation in the computer industry were now taking place along segmented, versus vertically integrated lines, where leaders emerged in their respective domains. Examples included Intel in microprocessors, Microsoft in desktop software, Novell in networking, HP in printers, Seagate in disk drives and Oracle Corporation in database software. IBM's dominance in personal computers was challenged by the likes of Compaq and later Dell. Recognizing this trend, management, with the support of the Board of Directors, began to implement a plan to split IBM into increasingly autonomous business units (e.g. processors, storage, software, services, printers, etc.) to compete more effectively with competitors that were more focused and nimble and had lower cost structures.
IBM also began shedding businesses that it felt were no longer core. It sold its typewriter, keyboard, and printer business – the organization that created the popular "Selectric" typewriter with its floating "golf ball" type element in the 1960s – to the investment firm of Clayton, Dubilier & Rice Inc. and became an independent company, Lexmark Inc.
These efforts failed to halt the slide. A decade of steady acceptance and widening corporate growth of local area networking technology, a trend headed by Novell Inc. and other vendors, and its logical counterpart, the ensuing decline of mainframe sales, brought about a wake-up call for IBM. After two consecutive years of reporting losses in excess of $1 billion, on January 19, 1993, IBM announced a US$8.10 billion loss for the 1992 financial year, which was then the largest single-year corporate loss in U.S. history. All told, between 1991 and 1993, the company posted net losses of nearly $16 billion. IBM's three-decade-long Golden Age, triggered by Watson Jr. in the 1950s, was over. The computer industry now viewed IBM as no longer relevant, an organizational dinosaur. And hundreds of thousands of IBMers lost their jobs, including CEO John Akers.
Key events
mid-1970s: IBM VNET. VNET was an international computer networking system deployed in the mid-1970s, providing email and file-transfer for IBM. By September 1979, the network had grown to include 285 mainframe nodes in Europe, Asia, and North America.
1975: Fractals. IBM researcher Benoit Mandelbrot conceives fractal geometry – the concept that seemingly irregular shapes can have identical structure at all scales. This new geometry makes it possible to describe mathematically the kinds of irregularities existing in nature. Fractals later make a great impact on engineering, economics, metallurgy, art, and health sciences, and are also applied in the field of computer graphics and animation.
1975: IBM 5100 Portable computer. IBM introduces the 5100 Portable Computer, a 50 lb. desktop machine that put computer capabilities at the fingertips of engineers, analysts, statisticians, and other problem-solvers. More "luggable" than portable, the 5100 can serve as a terminal for the System/370 and costs from $9000 to $20,000.
1976: Space Shuttle. The Enterprise, the first vehicle in the U.S. Space Shuttle program, makes its debut at Palmdale, California, carrying IBM AP-101 flight computers and special hardware built by IBM.
1976: Laser printer. The first IBM 3800 printer is installed. The 3800 is the first commercial printer to combine laser technology and electrophotography. The technology speeds the printing of bank statements, premium notices, and other high-volume documents, and remains a workhorse for billing and accounts receivable departments.
1977: Data Encryption Standard. IBM-developed Data Encryption Standard (DES), a cryptographic algorithm, is adopted by the U.S. National Bureau of Standards as a national standard.
1979: Retail checkout. IBM develops the Universal Product Code (UPC) in the 1970s as a method for embedding pricing and identification information on individual retail items. In 1979, IBM applies holographic scanner technology in IBM's supermarket checkout station to read the UPC stripes on merchandise, one of the first major commercial uses of holography. IBM's support of the UPC concept helps lead to its widespread acceptance by retail and other industries around the world.
1979: Thin film recording heads. Instead of using hand-wound wire structures as coils for inductive elements, IBM researchers substitute thin film "wires" patterned by optical lithography. This leads to higher performance recording heads at a reduced cost and establishes IBM's leadership in "areal density": storing the most data in the least space. The result is higher-capacity and higher-performance disk drives.
1979: Overcoming barriers to technology use. Since 1946, with its announcement of Chinese and Arabic ideographic character typewriters, IBM has worked to overcome cultural and physical barriers to the use of technology. As part of these ongoing efforts, IBM introduces the 3270 Kanji Display Terminal; the System/34 Kanji System with an ideographic feature, which processes more than 11,000 Japanese and Chinese characters; and the Audio Typing Unit for sight-impaired typists.
1979: First multi-function copier/printer. A communication-enabled laser printer and photocopier combination was introduced, the IBM 6670 Information Distributor. This was the first multi-function (copier/printer) device for the office market.
1980: Thermal conduction modules. IBM introduces the 3081 processor, the company's most powerful to date, which features Thermal Conduction Modules. In 1990, the Institute of Electrical and Electronics Engineers, Inc., awards its 1990 Corporate Innovation Recognition to IBM for the development of the Multilayer Ceramic Thermal Conduction Module for high performance computers.
1980: Reduced instruction set computing (RISC) architecture. IBM successfully builds the first prototype computer employing IBM Fellow John Cocke's RISC architecture. RISC simplified the instructions given to computers, making them faster and more powerful. Today, RISC architecture is the basis of most workstations and widely viewed as the dominant computing architecture.
1981: IBM PC. The IBM Personal Computer goes mass market and helps revolutionize the way the world does business. A year later, Time Magazine gives its "Person of the Year" award to the Personal Computer.
1981: LASIK surgery. Three IBM scientists invent the excimer laser surgical procedure that later forms the basis of LASIK and PRK corrective eye surgeries.
1982: Antitrust suit. The United States antitrust suit against IBM, filed in 1969, is dismissed as being "without merit."
1982: Trellis-coded modulation. Trellis-coded modulation (TCM) is first used in voice-band modems to send data at higher rates over telephone channels. Today, TCM is applied in a large variety of terrestrial and satellite-based transmission systems as a key technique for achieving faster and more reliable digital transmission.
1983: IBM PCjr. IBM announces the widely anticipated PCjr., IBM's attempt to enter the home computing marketplace. The product, however, fails to capture the fancy of consumers due to its lack of compatibility with IBM PC software, its higher price point, and its unfortunate ‘chiclet’ keyboard design. IBM terminates the product after 18 months of disappointing sales.
1984: IBM 3480 magnetic tape system. The industry's most advanced magnetic tape system, the IBM 3480, introduces a new generation of tape drives that replace the familiar reel of tape with an easy-to-handle cartridge. The 3480 was the industry's first tape system to use "thin-film" recording head technology.
1984: Sexual discrimination. IBM adds sexual orientation to the company's non-discrimination policy. IBM becomes one of the first major companies to make this change.
1984: ROLM partnership/acquisition. IBM acquires ROLM Corporation for $1.25 billion. Based in Santa Clara, CA (subsequent to an existing partnership), IBM intended to develop digital telephone switches to compete directly with Northern Telecom and AT&T. Two of the most popular systems were the large scale PABX coined ROLM CBX and the smaller PABX coined ROLM Redwood. ROLM is later acquired by Siemens AG in 1989–1992.
1985: MCI. IBM acquires 18% of MCI Communications, the United States's second-largest long-distance carrier, in June 1985.
1985: RP3. Sparked in part by national concerns over losing its technology leadership crown in the early 1980s, IBM re-enters the supercomputing field with the RP3 (IBM Research Parallel Processor Prototype). IBM researchers worked with scientists from the New York University's Courant Institute of Mathematical Science to design RP3, an experimental computer consisting of up to 512 processors, linked in parallel and connected to as many as two billion characters of main memory. Over the next five years, IBM provides more than $30 million in products and support to a supercomputer facility established at Cornell University in Ithaca, New York.
1985: Token Ring Network. IBM's Token Ring technology brings a new level of control to local area networks and quickly becomes an industry standard for networks that connect printers, workstations and servers.
1986: IBM Almaden Research Center. IBM Research dedicates the Almaden Research Center in California. Today, Almaden is IBM's second-largest laboratory focused on storage systems, technology and computer science.
1986: Nobel Prize: Scanning tunneling microscopy. IBM Fellows Gerd K. Binnig and Heinrich Rohrer of the IBM Zurich Research Laboratory win the 1986 Nobel Prize in physics for their work in scanning tunneling microscopy. Drs. Binnig and Rohrer are recognized for developing a powerful microscopy technique which permits scientists to make images of surfaces so detailed that individual atoms may be seen.
1987: Nobel Prize: High-Temperature Superconductivity. J. Georg Bednorz and IBM Fellow Alex Müller of the IBM Zurich Research Laboratory receive the 1987 Nobel Prize for physics for their breakthrough discovery of high-temperature superconductivity in a new class of materials. They discover superconductivity in ceramic oxides that carry electricity without loss of energy at much higher temperatures than any other superconductor.
1987: Antivirus tools. As personal computers become vulnerable to attack from viruses, a small research group at IBM develops, practically overnight, a suite of antivirus tools. The effort leads to the establishment of the High Integrity Computing Laboratory (HICL) at IBM. HICL goes on to pioneer the science of theoretical and observational computer virus epidemiology.
1987: Special needs access. IBM Researchers demonstrate the feasibility for blind computer users to read information directly from computer screens with the aid of an experimental mouse. And in 1988 the IBM Personal System/2 Screen Reader is announced, permitting blind or visually impaired people to hear the text as it is displayed on the screen in the same way a sighted person would see it. This is the first in the IBM Independence Series of products for computer users with special needs.
1988: IBM AS/400. IBM introduces the IBM Application System/400, a new family of easy-to-use computers designed for small and intermediate-sized companies. As part of the introduction, IBM and IBM Business Partners worldwide announce more than 1,000 software packages in the biggest simultaneous applications announcement in computer history. The AS/400 quickly becomes one of the world's most popular business computing systems.
1988: National Science Foundation Network (NSFNET). IBM collaborates with the Merit Network, MCI Communications, the State of Michigan, and the National Science Foundation to upgrade and expand the 56K bit per second NSFNET to 1.5M bps (T1) and later 45M bps (T3). This partnership provides the network infrastructure and lays the groundwork for the explosive growth of the Internet in the 1990s. The NSFNET upgrade boosts network capacity, not only making it faster, but also allowing more intensive forms of data, such as the graphics now common on the World Wide Web, to travel across the Internet.
1989: Silicon germanium transistors. The replacing of expensive and exotic materials like gallium arsenide with silicon germanium (known as SiGe), championed by IBM Fellow Bernie Meyerson, creates faster chips at lower costs. Introducing germanium into the base layer of an otherwise all-silicon bipolar transistor allows for significant improvements in operating frequency, current, noise and power capabilities.
1990: System/390. IBM makes its most comprehensive product announcement in 25 years by introducing the System/390 family. IBM incorporates complementary metal oxide silicon (CMOS) based processors into System/390 Parallel Enterprise Server in 1995, and in 1998 the System/390 G5 Parallel Enterprise Server 10-way Turbo model smashed the 1,000 MIPS barrier, making it the world's most powerful mainframe.
1990: RISC System/6000. IBM announces the RISC System/6000, a family of nine workstations that are among the fastest and most powerful in the industry. The RISC System/6000 uses Reduced instruction set computing technology, an innovative computer design pioneered by IBM that simplifies processing steps to speed the execution of commands.
1990: Moving individual atoms. Donald M. Eigler, a physicist and IBM Fellow at the IBM Almaden Research Center demonstrated the ability to manipulate individual atoms using a scanning tunneling microscope, writing I-B-M using 35 individual xenon atoms.
1990: Environmental programs'. IBM joins 14 other leading U.S. corporations in April to establish a worldwide program designed to achieve environmental, health and safety goals by continuously improving environmental management practices and performance. IBM has invested more than $1 billion since 1973 to provide environmental protection for the communities in which IBM facilities are located.
1991: Services business. IBM reenters the computer services business through the formation of the Integrated Systems Solution Corporation. Still in compliance with the provisions of the 1956 Consent Decree, in just four ISSC becomes the second largest provider of computer services. The new business becomes one of IBM's primary revenue streams.
1992: Thinkpad. IBM introduces a new line of notebook computers. Housed in a distinctive black case and featuring the innovative TrackPoint device nestled in the middle of the keyboard, the ThinkPad is an immediate hit and goes on to collect more than 300 awards for design and quality.
1993–2018: IBM's near disaster and rebirth
In April 1993, IBM hired Louis V. Gerstner, Jr. as its new CEO. For the first time since 1914 IBM had recruited a leader from outside its ranks. Gerstner had been chairman and CEO of RJR Nabisco for four years, and had previously spent 11 years as a top executive at American Express. Gerstner brought with him a customer-oriented sensibility and the strategic-thinking expertise that he had honed through years as a management consultant at McKinsey & Co. Recognizing that his first priority was to stabilize the company, he adopted a triage mindset and took quick, dramatic action. His early decisions included recommitting to the mainframe, selling the Federal Systems Division to Loral in order to replenish the company's cash coffers, continuing to shrink the workforce (reaching a low of 220,000 employees in 1994), and driving significant cost reductions within the company. Most importantly, Gerstner decided to reverse the move to spin off IBM business units into separate companies. He recognized that one of IBM's enduring strengths was its ability to provide integrated solutions for customers – someone who could represent more than piece parts or components. Splitting the company would have destroyed that unique IBM advantage.
These initial steps worked. IBM was in the black by 1994, turning a profit of $3 billion. Stabilization was not Gerstner's endgame – the restoration of IBM's once great reputation was. To do that, he needed to devise a winning business strategy. Over the next decade, Gerstner crafted a business model that shed commodity businesses and focused on high-margin opportunities. IBM divested itself of low margin industries (DRAM, IBM Network, personal printers, and hard drives). The company regained the business initiative by building upon the decision to keep the company whole – it unleashed a global services business that rapidly rose to become a leading technology integrator. Crucial to this success was the decision to become brand agnostic – IBM integrated whatever technologies the client required, even if they were from an IBM competitor. IBM augmented this services business with the 2002 acquisition of the consultancy division of PricewaterhouseCoopers for $3.5 billion US.
Another high margin opportunity IBM invested heavily in was software, a strategic move that proved equally visionary. Starting in 1995 with its acquisition of Lotus Development Corp., IBM built up its software portfolio from one brand, DB2, to five: DB2, Lotus, WebSphere, Tivoli, and Rational. Content to leave the consumer applications business to other firms, IBM's software strategy focused on middleware – the vital software that connects operating systems to applications. The middleware business played to IBM's strengths, and its higher margins improved the company's bottom line significantly as the century came to an end.
Not all software that IBM developed was successful. While OS/2 was arguably technically superior to Microsoft Windows 95, OS/2 sales were largely concentrated in networked computing used by corporate professionals. OS/2 failed to develop much penetration in the consumer and stand-alone desktop PC segments. There were reports that it could not be installed properly on IBM's own Aptiva series of home PCs. Microsoft made an offer in 1994 where if IBM ended development of OS/2 completely, then it would receive the same terms as Compaq for a license of Windows 95. IBM refused and instead went with an "IBM First" strategy of promoting OS/2 Warp and disparaging Windows, as IBM aimed to drive sales of its own software and hardware. By 1995, Windows 95 negotiations between IBM and Microsoft, which were difficult, stalled when IBM purchased Lotus Development whose Lotus SmartSuite would have directly competed with Microsoft Office. As a result, IBM received their license later than their competitors which hurt sales of IBM PCs. IBM officials later conceded that OS/2 would not have been a viable operating system to keep them in the PC business.
While IBM hardware and technologies were relatively de-emphasized in Gerstner's three-legged business model, they were not relegated to secondary status. The company brought its world-class research organization to bear more closely on its existing product lines and development processes. While Internet applications and deep computing overtook client servers as key business technology priorities, mainframes returned to relevance. IBM reinvigorated their mainframe line with CMOS technologies, which made them among the most powerful and cost-efficient in the marketplace. Investments in microelectronics research and manufacturing made IBM a world leader in specialized, high margin chip production – it developed 200 mm wafer processes in 1992, and 300 mm wafers within the decade. IBM-designed chips were used in PlayStation 3, Xbox 360, and Wii game consoles. IBM also regained the lead in supercomputing with high-end machines based upon scalable parallel processor technology.
Equally significant in IBM's revival was its successful reentry into the popular mindset. Part of this revival was based on IBM technology. On October 5, 1992, at the COMDEX computer expo, IBM announced the first ThinkPad laptop computer, the 700C. The ThinkPad, a premium machine which then cost US$4350, included a 25 MHz Intel 80486SL processor, a 10.4-inch active matrix display, removable 120 MB hard drive, 4 MB RAM (expandable to 16 MB) and a TrackPoint II pointing device. The striking black design by noted designer Richard Sapper made the ThinkPad an immediate hit with the digerati, and the cool factor of the ThinkPad brought back some of the cachet to the IBM brand that was lost in the PC wars of the 1980s. Instrumental to this popular resurgence was the 1997 chess match between IBM's chess-playing computer system Deep Blue and reigning world chess champion Garry Kasparov. Deep Blue's victory was a historic first for a computer over a reigning world champion. Also helping the company reclaim its position as a technology leader was its annual domination of supercomputer rankings and patent leadership statistics. Ironically, a serendipitous contributor in reviving the company's reputation was the Dot-com bubble collapse in 2000, where many of the edgy technology high flyers of the 1990s failed to survive the downturn. These collapses discredited some of the more fashionable Internet-driven business models that stodgy IBM was previously compared against.
Another part of the successful reentry into the popular mindset was the company's revival of the IBM brand. The company's marketing during the economic downturn was chaotic, presenting many different, sometimes discordant voices in the marketplace. This brand chaos was attributable in part to the company having 70 different advertising agencies in its employ. In 1994, IBM eliminated this chaos by consolidating its advertising in one agency. The result was a coherent, consistent message to the marketplace.
As IBM recovered its financial footing and its industry leadership position, the company remained aggressive in preaching to the industry that it was not the Old IBM, that it had learned from its near-death experiences, and that it had been fundamentally changed by them. It sought to redefine the Internet age in ways that played to traditional IBM strengths, couching the discussion in business-centric manners with initiatives like e-commerce and On Demand. And it supported open source initiatives, forming collaborative ventures with partners and competitors alike.
Change was manifested in IBM in other ways as well. The company revamped its varied philanthropic practices to bring a sharp focus on improving K-12 education. It ended its 40-year technology partnership with the International Olympic Committee after a successful engagement at the 2000 Olympic Games in Sydney, Australia. On the human resources front, IBM's adoption and integration of diversity principles and practices was cutting edge. It added sexual orientation to its non-discrimination practices in 1984, in 1995 created executive diversity task forces, and in 1996 offered domestic partner benefits to its employees. The company is routinely listed as among the best places for employees, employees of color, and women to work. And in 1996, the Women in Technology International Hall of Fame inducted three IBMers as part of its inaugural class of 10 women: Ruth Leach Amonette, the first woman to hold an executive position at IBM; Barbara Grant, PhD, first woman to be named an IBM site general manager; and Linda Sanford, the highest – placed technical woman in IBM. Fran Allen – an early software pioneer and another IBM hero for her innovative work in compilers over the decades – was inducted in 1997.
Gerstner retired at the end of 2002, and was replaced by long-time IBMer Samuel J. Palmisano.
Key events
1993: Billion-dollar losses. IBM misreads two significant trends in the computer industry: personal computers and client-server computing: and as a result loses more than $8 billion in 1993, its third straight year of billion-dollar losses. Since 1991, the company has lost $16 billion, and many feel IBM is no longer a viable player in the industry.
1993: Louis V. Gerstner, Jr.. Gerstner arrives as IBM's chairman and CEO on April 1, 1993. For the first time since the arrival of Thomas J. Watson, Sr., in 1914, IBM has a leader pulled from outside its ranks. Gerstner had been chairman and CEO of RJR Nabisco for four years and had previously spent 11 years as a top executive at American Express.
1993: IBM Scalable POWERparallel system. IBM introduces the Scalable POWERparallel System, the first in a family of microprocessor-based supercomputers using RISC System/6000 technology. IBM pioneers the breakthrough scalable parallel system technology of joining smaller, mass-produced computer processors rather than relying on one larger, custom-designed processor. Complex queries could then be broken down into a series of smaller jobs that are run concurrently ("in parallel") to speed their completion.
1994: Turnaround. IBM reports a profit for the year, its first since 1990. Over the next few years, the company successfully charts a new business course, one that focuses less on its traditional strengths in hardware, and more on services, software, and its ability to craft technology solutions.
1994: IBM RAMAC Array Storage Family. The IBM RAMAC Array Family is announced. With features like highly parallel processing, multi-level cache, RAID 5, and redundant components, RAMAC represents a major advance in information storage technology. Consisting of the RAMAC Array Direct Access Storage Device (DASD) and the RAMAC Array Subsystem, the products become one of IBM's most successful storage product launches ever, with almost 2,000 systems shipped to customers in its first three months of availability.
1994: Speech recognition. IBM releases the IBM Personal Dictation System (IPDS), the first wave of speech recognition products for the personal computer. It is later renamed VoiceType, and its capabilities are expanded to include control of computer applications and desktops simply by talking to them, without touching a keyboard. In 1997 IBM announces ViaVoice Gold, software that gives people a hands-free way to dictate text and navigate the desktop with the power of natural, continuous speech.
1995: Lotus Development Corporation acquisition. IBM acquires all of the outstanding shares of the Lotus Development Corporation, whose pioneering Notes software enables greater collaboration across an enterprise and whose acquisition makes IBM the world's largest software company.
1995: Glueball calculation. IBM scientists complete a two-year calculation – the largest single numerical calculation in the history of computing – to pin down the properties of an elusive elementary particle called a "glueball." The calculation was carried out on GF11, a massively parallel computer at the IBM Thomas J. Watson Research Center.
1996: IBM Austin Research Laboratory opens. Based in Austin, Texas, the lab is focused on advanced circuit design as well as new design techniques and tools for very high performance microprocessors.
1996: Atlanta Olympics. IBM suffers a highly public embarrassment when its IT support of the Olympic Games in Atlanta experiences technical difficulties.
1996: Domestic partner benefits. IBM announces Domestic Partner Benefits for gay and lesbian employees.
1997: Deep Blue. The 32-node IBM RS/6000 SP supercomputer, Deep Blue, defeats World Chess Champion Garry Kasparov in the first known instance of a computer vanquishing a reigning world champion chess player in a tournament-style competition.
1997: eBusiness. IBM coins the term and defined an enormous new industry by using the Internet as a medium for real business and institutional transformation. e-business becomes synonymous with doing business in the Internet age.
1998: CMOS Gigaprocessor. IBM unveils the first microprocessor that runs at 1 billion cycles per second. IBM scientists develop new Silicon on insulator chips to be used in the construction of a mainstream processor. The breakthrough ushers in new circuit designs and product groups.
1999: Blue Gene. IBM Research starts a computer architecture cooperative project with the Lawrence Livermore National Laboratory, the United States Department of Energy (which is partially funding the project), and academia to build new supercomputers (4) capable of more than one quadrillion operations per second (one petaflop). Nicknamed "Blue Gene," the new supercomputers perform 500 times faster than other powerful supercomputers and can simulate folding complex proteins.
2000: Quantum mirage nanotechnology. IBM scientists discover a way to transport information on the atomic scale that uses electrons instead of conventional wiring. This new phenomenon, called the Quantum mirage effect, enables data transfer within future nanoscale electronic circuits too small to use wires. The quantum mirage technique is a unique way of sending information through solid forms and could do away with wiring that connects nanocircuit components.
2000: IBM ASCI White – Fastest supercomputer. IBM delivers the world's most powerful computer to the US Department of Energy, powerful enough to process an Internet transaction for every person on Earth in less than a minute. IBM built the supercomputer to accurately test the safety and effectiveness of the nation's aging nuclear weapons stockpile. This computer is 1,000 times more powerful than Deep Blue, the supercomputer that beat Garry Kasparov in chess in 1997.
2000: Flexible transistors. IBM created flexible transistors, combining organic and inorganic materials as a medium for semiconductors. This technology enables things like an "electronic newspaper", so lightweight and inexpensive that leaving one behind on the airplane or in a hotel lobby is no big deal. By eliminating the limitations of etching computer circuits in silicon, flexible transistors make it possible to create a new generation of inexpensive computer displays that can be embedded into curved plastic or other materials.
2000: Sydney Olympics. After a successful engagement at the 2000 Olympic games in Sydney, IBM ends its 40-year technology partnership with the International Olympic Committee.
2001: Holocaust controversy. A controversial book, IBM and the Holocaust: The Strategic Alliance Between Nazi Germany and America's Most Powerful Corporation by Edwin Black, accuses IBM of having knowingly assisted Nazi authorities in the perpetuation of the Holocaust through the provision of tabulating products and services. Several lawsuits are filed against IBM by Holocaust victims seeking restitution for their suffering and losses. All lawsuits related to this issue were eventually dropped without recovery.
2001: Carbon nanotube transistors. IBM researchers build the world's first transistors out of carbon nanotubes – tiny cylinders of carbon atoms that are 500 times smaller than silicon-based transistors and 1,000 times stronger than steel. The breakthrough is an important step in finding materials that can be used to build computer chips when silicon-based chips can't be made any smaller.
2001: Low power initiative. IBM launches its low-power initiative to improve the energy efficiency of IT and accelerates the development of ultra-low power components and power-efficient servers, storage systems, personal computers and ThinkPad notebook computers.
2001: Greater density & chip speeds. IBM is first to mass-produce computer hard disk drives using a revolutionary new type of magnetic coating – "pixie dust" – that eventually quadruples data density of current hard disk drive products. IBM also unveils "strained silicon," a breakthrough that alters silicon to boost chip speeds by up to 35 percent.
2002: The Hard disk drive business is sold to Hitachi.
2003: Blue Gene/L. The BLUE GENE team unveils a proto-type of its Blue Gene/L computer roughly the size of a standard dishwasher that ranks as the 73rd most powerful supercomputer in the world. This cubic meter machine is a small scale model of the full Blue Gene/L built for the Lawrence Livermore National Laboratory in California, which will be 128 times larger when it's unveiled two years later.
2005: Crusade Against Cancer. IBM joins forces with Memorial Sloan-Kettering Cancer Center (MSKCC), the Molecular Profiling Institute and the CHU Sainte-Justine Research Center to collaborate on cancer research by building state-of-the-art integrated information management systems.
2005: The PC division is sold. The PC division (including Thinkpads) is sold to Chinese manufacturer, Lenovo.
2006: Translation software. IBM delivers an advanced speech-to-speech translation system to U.S. forces in Iraq using bidirectional English to Arabic translation software that improves communication between military personnel and Iraqi forces and citizens. The breakthrough software offsets the current shortage of military linguists.
2007: Renewable energy. IBM is recognized by the US EPA for its leading green power purchases in the US and for its support and participation in EPA's Fortune 500 Green Power Challenge. IBM ranked 12th on the EPA's list of Green Power Partners for 2007. IBM purchased enough renewable energy in 2007 to meet 4% of its US electricity use and 9% of its global electricity purchases. IBM's commitment to green power helps cut greenhouse gas emissions.
2007: River watch using IBM Stream Computing. In a unique collaboration, The Beacon Institute and IBM created the first technology-based river monitoring network. The River and Estuary Observatory Network (REON) allows for minute-to-minute monitoring of New York's Hudson River via an integrated network of sensors, robotics and computational technology. This first-of-its-kind project is made possible by IBM's "Stream Computing," a fundamentally new computer architecture that can examine thousands of information sources to help scientists better understand what is happening as it happens.
2007: Patent power. IBM has been granted more US patents than any other company. From 1993 to 2007, IBM was awarded over 38,000 US patents and has invested about $5 billion a year in research, development, and engineering since 1996. IBM's current active portfolio is about 26,000 patents in the US and over 40,000 patents worldwide is a direct result of that investment.
2008: IBM Roadrunner No.1 Supercomputer. For a record-setting ninth consecutive time, IBM takes the No.1 spot in the ranking of the world's most powerful supercomputers with the IBM computer built for the Roadrunner project at Los Alamos National Laboratory. It is the first in the world to operate at speeds faster than one quadrillion calculations per second and remains the world speed champion for over a year. The Los Alamos system is twice as energy-efficient as the No. 2 computer at the time, using about half the electricity to maintain the same level of computing power.
2008: Green power. IBM opens its "greenest" data center in Boulder, Colorado. The energy-efficient facility is part of a $350 million investment by IBM in Boulder to help meet customer demand for reducing energy costs. The new data center features leading-edge technologies and services, including high-density computing systems with virtualization technology. Green Power centers allow IBM and its customers to cut their carbon footprint.
2011: Watson. IBM's supercomputer Watson competed on the TV show Jeopardy! against Ken Jennings and Brad Rutter and won convincingly. The competition was presented by PBS.
June 16, 2011: IBM founded 100 years ago. Mark Krantz and Jon Swartz in USA Today state It has remained at the forefront through the decades... the fifth-most-valuable U.S. company [today] ... demonstrated a strength shared by most 100-year-old companies: the ability to change. ... survived not only the Depression and several recessions, but technological shifts and intense competition as well.
October 28, 2018 Red Hat acquisition for $34 billion On October 28, 2018, IBM announced its intent to acquire Red Hat for US$34 billion, in one of its largest-ever acquisitions. The company will operate out of IBM's Hybrid Cloud division.
2019–present
The 2019 acquisition of Red Hat enabled IBM to change its focus on future platforms, according to IBM Chief Executive Arvind Krishna.
In October 2020, IBM announced it is splitting itself into two public companies. IBM will focus on high-margin cloud computing and artificial intelligence, built on the foundation of the 2019 Red Hat acquisition. The legacy Managed Infrastructure Services unit will be spun off into a new public company Kyndryl to manage clients’ IT infrastructure and accounts, and have 4,600 clients in 115 countries, with a backlog of $60 billion.
On January 21, 2022, IBM announced that it would sell Watson Health to the private equity firm Francisco Partners.
This new focus on hybrid cloud, separating IBM from its other business units, will be larger than any of its previous divestitures, and welcomed by investors.
Twentieth-century market power and antitrust
IBM dominated the electronic data processing market for most of the 20th century, initially controlling over 70 percent of the punch card and tabulating machine market and then achieving a similar share in the computer market. IBM asserted that its successes in achieving and maintaining such market share were due to its skill, industry and foresight; governments and competitors asserted that the maintenance of such large shares was at least in part due to anti-competitive acts such as unfair prices, terms and conditions, tying, product manipulations and creating FUD (Fear, Uncertainty and Doubt) in the marketplace. IBM was thus the defendant in more than twenty government and private antitrust actions during the 20th century. IBM lost only one of these matters but did settle others in ways that profoundly shaped the industry as summarized below. By the end of the 20th century, IBM was no longer so dominant in the computer industry. Some observers suggest management's attention to the many antitrust lawsuits of the 1970s was at least in part responsible for its decline.
1936 Consent Decree
In 1932 U.S. Government prosecutors asserted as anti-competition tying IBM's practice of requiring customers who leased its tabulating equipment to purchase punched cards used on such equipment. IBM lost and in the resulting 1936 consent decree, IBM agreed to no longer require only IBM cards and agreed to assist alternative suppliers of cards in starting production facilities that would compete with IBM's; thereby create a separate market for the punched cards and in effect for subsequent computer supplies such as tapes and disk packs.
1956 Consent Decree
On January 21, 1952 the U.S. Government filed a lawsuit which resulted in a consent decree entered as a final judgment on January 25, 1956. The government's goal to increase competition in the data processing industry was effected through several provisions in the decree:
IBM was required to sell equipment on terms that would place purchasers at a disadvantage with respect to customers leasing the same equipment from IBM. Prior to this decree, IBM had only rented its equipment. This created markets both for used IBM equipment and enabled lease financing of IBM equipment by third parties (leasing companies).
IBM was required to provide parts and information to independent maintainers of purchased IBM equipment, enabling and creating a demand for such hardware maintenance services.
IBM was required to sell data processing services through a subsidiary that could be treated no differently than any company independent of IBM, enabling competition in the data processing services business.
IBM was required to grant non-exclusive, non-transferable, worldwide licenses for any and all patents at reasonable royalty rates to anyone, provided the licensee cross-licensed its patents to IBM on similar terms. This removed IBM patents as a barrier to competition in the data processing industry and enabled the emergence of manufacturers of equipment plug compatible to IBM equipment.
While the decree did little to limit IBM's future dominance of the then-nascent computer industry, it did enable competition in segments such as leasing, services, maintenance, and equipment attachable to IBM systems and reduced barriers to entry through mandatory reasonable patent cross-licensing.
The decree's terms remained in effect until 1996; they were phased out over the next five years.
1968–1984 Multiple Government and Private Antitrust Complaints
In 1968 the first of a series of antitrust suits against IBM was filed by Control Data Corp (CDC). It was followed in 1969 by the US government's antitrust complaint, then by 19 private US antitrust complaints and one European complaint. In the end IBM settled a few of these matters but mainly won. The US government's case sustained by four US Presidents and their Attorneys General was dropped as “without merit” in 1982 by William Baxter, US President Reagans’ Assistant Attorney General in charge of the Antitrust Division of the Department of Justice.
1968–1973 Control Data Corp. v. IBM
CDC filed an antitrust lawsuit against IBM in Minnesota's federal court alleging that IBM had monopolized the market for computers in violation of section 2 of the Sherman Act by among other things announcing products it could not deliver. A 1965 internal IBM memo by an IBM attorney noted that Control Data had publicly blamed its declining earnings on IBM, "and its frequent model and price changes. There was some sentiment that the charges were true." In 1973 IBM settled the CDC case for about $80 million in cash and the transfer of assets including the IBM Service Bureau Corp to CDC.
1969–1982 U.S. v. IBM
On January 17, 1969, the United States of America filed a complaint in the United States District Court for the Southern District of New York, alleging that IBM violated the Section 2 of the Sherman Antitrust Act by monopolizing or attempting to monopolize the general-purpose electronic digital computer system market, specifically computers designed primarily for business. Subsequently, the US government alleged IBM violated the antitrust laws in IBM's actions directed against leasing companies and plug-compatible peripheral manufacturers.
In June 1969 IBM unbundled its software and services in what many observers believed was in anticipation of and a direct result of the 1969 US Antitrust lawsuit. Overnight a competitive software market was created.
Among the major violations asserted were:
Anticompetitive price discrimination such as giving away software services.
Bundling of software with "related computer hardware equipment" for a single price.
Predatorily priced and preannounced specific hardware "fighting machines".
Developed and announced specific hardware products primarily for the purpose of discouraging customers from acquiring competing products.
Announced certain future products knowing that it was unlikely to be able to ship such products within the announced time frame.
Engaged in below cost and discount conduct in selected markets in order to injure peripheral manufacturers and leasing companies.
It was in some ways one of the great single firm monopoly cases of all times. IBM produced 30 million pages of materials during discovery; it submitted its executives to a series of pretrial depositions. Trial began six years after the complaint was filed and then it battled in court for another six years. The trial transcript contains over 104,400 pages with thousands of documents placed in the record. It ended on January 8, 1982 when William Baxter, the then Assistant Attorney General in charge of the Antitrust Division of the Department of Justice dropped the case as “without merit.”
1969–1981 Private antitrust lawsuits
The U.S.'s 1969 antitrust lawsuit was followed by about 18 private antitrust complaints all but one of which IBM ultimately won. Some notable lawsuits include:
Greyhound Computer Corp.
Greyhound a leasing company filed a case under Illinois’ state antitrust law in Illinois state court. This case went to trial in federal court in 1972 in Arizona with a directed verdict for IBM on the antitrust claims; however, the court of appeals in 1977 reversed the decision. Just before the retrial was to start in January 1981, IBM and Greyhound settled the case for $17.7 million.
Telex Corp.
Telex, a peripherals equipment manufacturer filed suit on January 21, 1972, charging that IBM had monopolized and had attempted to monopolize the worldwide manufacture, distribution, sales, and leasing of electronic data processing equipment including the relevant submarket of plug-compatible peripheral devices. After a non-jury trial in 1973, IBM was found guilty “possessing and exercising monopoly power” over the “plug-compatible peripheral equipment market,” and ordered to pay triple damages of $352.5‐million and other relief including disclosure of peripheral interface specifications. Separately Telex was found guilty of misappropriated IBM trade secrets. The judgment against IBM was overturned on appeal and on October 4, 1975, both parties announced they were terminating their actions against each other.
Other private lawsuits
Other private lawsuits ultimately won by IBM include California Computer Products Inc., Memorex Corp., Marshall Industries, Hudson General Corp., Transamerica Corporation and Forro Precision, Inc.
1980–1984 European Union
The European Economic Communities Commission on Monopolies initiated proceedings against IBM under article 86 of the Treaty of Rome for exploiting its domination of the continent's computer business and abusing its dominant market position by engaging in business practices designed to protect its position against plug-compatible manufacturers. The case was settled in 1984 with IBM agreeing to change its business practices with regard to disclosure of device interface information.
Products and technologies
See List of IBM products
Evolution of IBM's computer hardware
The story of IBM's hardware is intertwined with the story of the computer industry – from vacuum tubes, to transistors, to integrated circuits, to microprocessors and beyond. The following systems and series represent key steps:
IBM mainframe – overview
IBM SSEC – 1948, the first operational machine able to treat its instructions as data
IBM Card Programmed Calculator – 1949
IBM 700 series – 1952–1958
IBM NORC – 1954, the first supercomputer
IBM 650 – 1954, the world's first mass-produced computer
SAGE AN/FSQ-7 – 1958, half an acre of floor space, 275 tons, up to three megawatts, ... the largest computers ever built
IBM 7000 series – 1959–1964, transistorized evolution of IBM 700 series
IBM 1400 series – 1959, "... by the mid-1960s nearly half of all computer systems in the world were 1401-type systems."
IBM System/360 – 1964, the first family of computers designed to cover the complete range of applications, small to large, commercial and scientific
IBM System/3
IBM System/370
IBM System/38
IBM Series/1
IBM 801 RISC processor
IBM PC
PowerPC
IBM AS/400, later IBM eServer iSeries, then IBM System i
IBM RS/6000
IBM zSeries was earlier IBM System/390
Cell processor
IBM Watson (computer)
Components
History of IBM magnetic disk drives
Magnetic tape data storage#IBM formats
Evolution of IBM's operating systems
IBM operating systems have paralleled hardware development. On early systems, operating systems represented a relatively modest level of investment, and were essentially viewed as an adjunct to the hardware. By the time of the System/360, however, operating systems had assumed a much larger role, in terms of cost, complexity, importance, and risk.
Mainframe operating systems include:
OS family, including: OS/360, OS/MFT, OS/MVT, OS/VS1, OS/VS2, MVS, OS/390, z/OS
DOS family, including: DOS/360, DOS/VS, DOS/VSE, z/VSE
VM family, including: CP/CMS (See: History of CP/CMS), VM/370, VM/XA, VM/ESA, z/VM
Special purpose systems, including: TPF, z/TPF
Other significant operating systems include:
IBM AIX
IBM i (previously known as OS/400 and i5/OS)
PowerLinux, Linux on IBM Z
High-level languages
Early IBM computer systems, like those from many other vendors, were programmed using assembly language. Computer science efforts through the 1950s and early 1960s led to the development of many new high-level languages (HLL) for programming. IBM played a complicated role in this process. Hardware vendors were naturally concerned about the implications of portable languages that would allow customers to pick and choose among vendors without compatibility problems. IBM, in particular, helped create barriers that tended to lock customers into a single platform.
IBM had a significant role in the following major computer languages:
FORTRAN – for years, the dominant language for mathematics and scientific programming
PL/I – an attempt to create a "be all and end all" language
COBOL – eventually the ubiquitous, standard language for business applications
APL – an early interactive language with a mathematical notation
PL/S – an internal systems programming language proprietary to IBM
RPG – an acronym for 'Report Program Generator', developed on the IBM 1401 to produce reports from data files. General Systems Division enhanced the language to HLL status on its midrange systems to rival with COBOL.
SQL – a relational query language developed for IBM's System R; now the standard RDBMS query language
Rexx – a macro and scripting language based on PL/I syntax originally developed for Conversational Monitor System (CMS) and authored by IBM Fellow Mike Cowlishaw
IBM and AIX/UNIX/Linux/SCO
IBM developed a schizophrenic relationship with the UNIX and Linux worlds. The importance of IBM's large computer business placed strange pressures on all of IBM's attempts to develop other lines of business. All IBM projects faced the risk of being seen as competing against company priorities. This was because, if a customer decided to build an application on an RS/6000 platform, this also meant that a decision had been made against a mainframe platform. So despite having some excellent technology, IBM often placed itself in a compromised position.
A case in point is IBM's GFIS products for infrastructure management and GIS applications. Despite long having a dominant position in such industries as electric, gas, and water utilities, IBM stumbled badly in the 1990s trying to build workstation-based solutions to replace its old mainframe-based products. Customers were forced to move on to new technologies from other vendors; many felt betrayed by IBM.
IBM embraced open source technologies in the 1990s. It later became embroiled in a complex litigation with SCO group over intellectual property rights related to the UNIX and Linux platforms.
BICARSA (Billing, Inventory Control, Accounts Receivable, & Sales Analysis)
1983 saw the announcement of the System/36, the replacement for the System/34. And in 1988, IBM announced the AS/400, intended to represent a point of convergence for both System/36 customers and System/38 customers. The 1970s had seen IBM develop a range of Billing, Inventory Control, Accounts Receivable, & Sales Analysis (BICARSA ) applications for specific industries: construction (CMAS), distribution (DMAS), and manufacturing (MMAS), all written in the RPG II language. By the end of the 1980s, IBM had almost completely withdrawn from the BICARSA applications marketplace. Because of developments in the antitrust cases against IBM brought by the US government and European Union, IBM sales representatives were now able to work openly with application software houses as partners. (For a period in the early 1980s, a 'rule of three' operated, which obliged IBM sales representatives, if they were to propose a third-party application to a customer, to also list at least two other third-party vendors in the IBM proposal. This caused some amusement to the customer, who would typically have engaged in intense negotiations with one of the third parties and probably not have heard of the other two vendors.)
Non-computer lines of business
IBM has largely been known for its overtaking UNIVAC's early 1950s public fame, then leading in the computer industry for much of the latter part of the century. However, it has also had roles, some significant, in other industries, including:
IBM was the largest supplier of unit record equipment (punched cards, keypunches, accounting machines, ...) in the first part of the 20th century.
Food services (meat and coffee grinders, computing cheese slicers, computing scales) – founding to 1934, sold to Hobart Manufacturing Co.
Time recorders (punch clocks, school, and factory clocks) – founding to 1958, sold to Simplex Time Recorder Company. See IBM: History of the Time Equipment Division and its Products and this 1935 catalog – International Time Recording Catalog
Typewriters, personal printers. See IBM Electric typewriter, IBM Selectric typewriter. IBM divested in 1991, now part of Lexmark.
Copiers – 1970 to 1988. Sold to Eastman Kodak in 1988.
Other office products such as dictation machines, word processors.
Military products (Browning Automatic Rifle, bombsights) – IBM's World War II production
Digital telephone switches – partnership (1983), acquisition (1984), and sale (1989–1992) of ROLM to Siemens AG
Stadium scoreboards
Real estate (at one time owning vast tracts of undeveloped land on the U.S. east coast)
Medical instruments: heart-lung machine, prostheses, IBM 2991 Blood Cell Washer, IBM 2997 Blood Cell Separator, IBM 5880 Electrocardiograph System
Organization
CEOs, Notable IBMers
List of IBM CEOs
IBM Fellow
For IBM's corporate biographies of former CEOs and many others see: IBM Archives Biographies Builders reference room
IBM Global Services
IBM Research
See also History of IBM research in Israel
IBM Federal Systems Division (FSD)
A significant part of IBM's operations were FSD's contracts with the U.S. Federal Government for a wide range of projects ranging from the Department of Defense to the National Security Agency. These projects spanned mundane administrative processing to top-secret supercomputing. In NASA's Apollo Program, the "brains" of each Saturn rocket was the Instrument Unit built by the IBM Space Systems Center in Huntsville, Alabama. Founded in 1957, FSD was sold to Loral in 1994.
International subsidiaries growth
IBM had subsidiaries and operations in 70 countries in its early years. They included Austria, Belgium, Bulgaria, Czechoslovakia, France, Germany, Italy, Japan, the Netherlands, Norway, Poland, Romania, the Soviet Union, Sweden, Switzerland, Yugoslavia, and others.
IBM service organizations
IBM's early dominance of the computer industry was in part due to its strong professional services activities. IBM's advantage in building software for its own computers eventually was seen as monopolistic, leading to antitrust proceedings. As a result, a complex, artificial "arms-length" relationship was created separating IBM's computer business from its service organizations. This situation persisted for decades. An example was IBM Global Services, a huge services firm that competed with the likes of Electronic Data Systems or Computer Sciences Corporation.
See also
Category IBM articles
Notes and references
Further reading
Commentary, General Histories
For more recent IBM subject books see: IBM#Further reading
Boyett, Joseph H.; Schwartz, Stephen; Osterwise, Laurence; Bauer, Roy (1993) The Quality Journey: How winning the Baldrige sparked the remaking of IBM, Dutton
Engelbourg, Saul (1954) International Business Machines: A Business History, 385pp (doctoral dissertation). Reprinted by Arno, 1976
Foy, Nancy (1975) The Sun Never Sets on IBM, William Morrow, 218pp (published in UK as The IBM World)
IBM (1936) Machine Methods of Accounting This book is constructed from 18 pamphlets, the first of which (AM-01) is Development of International Business Machines Corporation – a 12-page 1936 IBM-written history of IBM.
Malik, R. (1975) And Tomorrow the World: Inside IBM, Millington, 496pp
Mills, D. Quinn (1988) The IBM Lesson: the profitable art of full employment, Times Books, 216pp
Richardson, F.L.W. Jr.; Walker, Charles R. (1948). Human Relations in an Expanding Company. Labor and Management Center Yale University. Reprinted by Arno, 1977.
– A paperback reprint of IBM: Colossus in Transition.
Technology
For Punched card history, technology, see: Unit record equipment#Further reading
For Herman Hollerith see: Herman Hollerith#Further reading
Baker, Stephen (2012) Final Jeopardy: The Story of Watson, the Computer That Will Transform Our World, Mariner Books
Baldwin, Carliss Y; Clark, Kim B. (2000) Design Rules: The Power of Modularity, vol.1, MIT. unique perspective on the 360 (Tedlow p. 305)
Bashe, Charles J.; Pugh, Emerson W.; Johnson, Lyle R./Palmer, John H. (1986). IBM's Early Computers. MIT Press. .
Chposky, James; Leonsis, Ted (1988). Blue Magic: The People, Power, and Politics Behind The IBM Personal Computer. Facts on File.
Dell, Deborah; Purdy, J. Gerry. ThinkPad: A Different Shade of Blue. Sams. .
Hsu, Feng-hsiung (2002). Behind Deep Blue: Building the Computer that Defeated the World Chess Champion. Princeton University Press. .
Kelly, Brian W. (2004) Can the AS/400 Survive IBM?, Lets Go
Killen, Michael (1988) IBM: The Making of the Common View, Harcourt Brace Jovanovich
Mills, H.D., O’Neill, D., Linger, R.C., Dyer, M., Quinnan, R.E. (1980) The Management of Software Engineering, IBM Systems Journal (SJ), Vol. 19, No. 4, 1980, pp. 414–77 http://www.research.ibm.com/journal/sj/
Pugh, Emerson W. (1995). Building IBM: Shaping and Industry and Its Technology. MIT Press. .
Pugh, Emerson W.; Johnson, Lyle R.; Palmer, John H. (1991). IBM's 360 and Early 370 Systems. MIT Press. .
Soltis, Frank G. (2002) Fortress Rochester: The Inside Story of the IBM iSeries, 29th Street Press
Yost, Jeffrey R. (2011) The IBM Century: Creating the IT Revolution, IEEE Computer Society
Locations – Plants, Labs, Divisions, Countries
DeLoca, Cornelius E.; Kalow, Samuel J. (1991) The Romance Division ... a different side of IBM , D & K Book, 223pp (history, strategy, key people in Electric Typewriter and successor Office Products Div)
France, Boyd (1961) IBM in France, Washington National Planning Assoc
Harvey, John (2008) Transition The IBM Story, Switzer (IBM IT services in Australia)
Heide, Lars (2002) National Capital in the Emergence of a Challenger to IBM in France
Jardine, Diane (ed) (2002) IBM @ 70: Blue Beneath the Southern Cross. Celebrating 70 Years of IBM in Australia, Focus
Joseph, Allan (2010) Masked Intentions: Navigating a Computer Embargo on China, Trafford, 384pp
Meredith, Suzanne; Aswad, Ed (2005) IBM in Endicott, Arcadia, 128pp
Norberg, Arthur L.; Yost, Jeffrey R. (2006) IBM Rochester: A Half Century of Innovation, IBM
Robinson, William Louis (2008) IBM's Shadow Force: The Untold Story of Federal Systems, The Secretive Giant that Safeguarded America, Thomas Max, 224pp
Biographies, Memoirs
For IBM's corporate biographies of former CEOs and many others see: IBM Archives Biographies Builders reference room
Amonette, Ruth Leach (1999). Among Equals, A Memoir: The Rise of IBM's First Woman Vice President. Creative Arts Book Company. .
Beardsley, Max (2001) International Business Marionettes: An IBM Executive Struggles to Regain His Sanity after a Brutal Firing, Lucky Press
Birkenstock, James W. (1999). Pioneering: On the Frontier of Electronic Data Processing, A Personal Memoir, self-published, 72pp
Lewis M. Branscomb#Books by Lewis Branscomb
Drandell, Milton (1990) IBM: The Other Side, 101 Former Employees Look Back, Quail
Charles Ranlett Flint#Bibliography
Louis V. Gerstner, Jr.#References
Gould, Heywood (1971). Corporation Freak, Tower, 174pp ("...hired as an audio-visual consultant by the Advanced Systems Development Division ...")
Herman Hollerith#Further reading
Lamassonne, Luis A. (2001). My Life With IBM. Protea. .
Maisonrouge, Jacques (1985). Inside IBM: A Personal Story. McGraw Hill. .
William W. Simmons#Selected publications
Ulrich Steinhilper#IBM and later life
Thomas, Charles (1993) Black and Blue: Profiles of Blacks in IBM, Atlanta Aaron, 181pp
Thomas J. Watson#Further reading
Thomas Watson, Jr.#Further reading
Williamson, Gordon R. (2009) Memoirs of My Years with IBM: 1951–1986, Xlibris, 768pp
External links
IBM Archives, History of IBM
IBM at 100 – IBM reviews and reflects on its first 100 years
THINK: Our History of Progress; 1890s to 2001. IBM
Oral History with James W. Birkenstock, Charles Babbage Institute, University of Minnesota. Birkenstock was an adviser to the president and subsequently as Director of Product Planning and Market Analysis at IBM. In this oral history, Birkenstock discusses the metamorphosis of the company from leader of the tabulating machine industry to leader of the data processing industry. He describes his involvement with magnetic tape development in 1947, the involvement of IBM in the Korean War, the development of the IBM 701 computer (known internally as the Defense Calculator), and the emergence of magnetic core memory from the SAGE project. He then recounts the entry of IBM into the commercial computer market with the IBM 702. The end of the interview concerns IBM's relationship with other early entrants in the international computer industry, including litigation with Sperry Rand, its cross-licensing agreements, and cooperation with Japanese electronics firms.
History
History of computer companies
History of computing hardware
History of companies of the United States |
18451329 | https://en.wikipedia.org/wiki/Mindjet | Mindjet | Mindjet is a mind mapping and innovation management software company headquartered in San Francisco, California. Mindjet's software products, including its flagship product MindManager and SpigitEngage, are designed to visually and collaboratively manage information and tasks. , Mindjet had approximately sixteen million users.
Company history
Mindjet was founded in 1998 by computer programmer Mike Jetter and his wife, Bettina Jetter, in order to support the development of their mind mapping software, MindManager. Jetter conceived of the idea for the first product while recovering from an illness in hospital, and began developing the program while living in Germany in 1994, aiming to simplify the creation and sharing of mind maps for business users. In August 2001, Mindjet received approximately $5 million in venture capital from London-based investment group 3i, which the company used to market MindManager in the U.S. and Europe. Scott Raskin, the former chief operating officer for Telelogic, was named CEO of Mindjet in 2006.
In 2011, the company acquired Thinking Space, an Android-based information mapping application, and Cohuman, a social task management service. The acquisition of Cohuman enabled Mindjet to launch a new collaborative working service called Mindjet Connect on September 22, 2011.
Mindjet had 270 employees. The company's headquarters are located in San Francisco; it also has offices in Australia, France, Germany, Japan, Switzerland and the United Kingdom. The company is led by a board of directors including founder Mike Jetter, managing director of Investor Growth Capital, Noah Walley, and former Visio Corporation CEO, Jeremy Jaech.
In 2013, Mindjet acquired innovation management company Spigit, and adopted their software product SpigitEngage into their product suite.
Products and services
Mindjet develops mind mapping and innovation management software for Microsoft Windows and Mac OS, and for both Apple iOS and Android mobile devices.
Until 2012, the company's products focused on mind mapping, collaboration and project management. The company's MindManage ]] displayed information in mind maps using colors, words, images and spatial relationships. Following the acquisition of Cohuman in 2011, Mindjet launched Mindjet Connect, a cloud-based service for collaborative working.
In December 2011, Mindjet reported 350,000 downloads for its iOS app and 1.1 million downloads for its Android-based app.
In September 2012, the company combined its existing products into a single product named |Mindjet and changed from a purchase-based model to a subscription-based model. N
In September 2013, Mindjet acquired Pleasanton, California–based startup Spigit, and added their SpigitEngage enterprise innovation management software to the Mindjet product suite.
References
External links
Official Mindjet website
Official Mindjet blog
Business software companies
Collaborative software
Mind-mapping software
1998 establishments in California
Software companies established in 1998
Companies based in San Francisco
Corel
2016 mergers and acquisitions
American subsidiaries of foreign companies |
60458211 | https://en.wikipedia.org/wiki/Springboard%20Software | Springboard Software | Springboard Software, inc. was a software company founded in 1982 known primarily for its line of non-curriculum based educational software. It was bought by Spinnaker Software in 1990.
Titles
Early Games for Young Children (1982: Atari 8-bit, 1983: Apple II, Commodore 64, TRS-80, CoCo, 1984: MS-DOS, 1986: Macintosh)
Fraction Factory (1984: Apple II, Commodore 64, MS-DOS)
Easy as ABC (1984: Apple II, Commodore 64, MS-DOS, Macintosh)
Quizagon (1984: Commodore 64)
Stickers (Apple II, Commodore 64, MS-DOS)
Puzzle Master (Apple II)
Rainbow Painter (Apple II, Commodore 64)
Mask Parade (Apple II, MS-DOS)
Piece of Cake Math (1983: Apple II, Atari 8-bit, Commodore 64, MS-DOS)
Graphics Expander vol. 1 (Apple II, Commodore 64, MS-DOS)
Certificate maker (1986)
Certificate Library vol. 1
Certificate Expander vol. 1
The Newsroom (1984: Apple II, MS-DOS, 1985: Commodore 64, 1987: Atari 8-bit)
The Newsroom Pro (1988)
Clip Art Collection vol. 1
Clip Art Collection vol. 2
Clip Art Collection vol. 3
Springboard Publisher (1987: Apple II, MS-DOS, 1989: Macintosh)
Springboard Publisher Style Sheets - Newsletters
Springboard Publisher Laser Driver
Springboard Publisher Fonts
Works of Art Assortment Series
Works of Art Education Series
Works of Art Holiday Series
Top Honors (Macintosh)
Works of Art Laser Fonts vol. 1 (Macintosh)
Works of Art Laser Art Business Selection vol. 1 (Macintosh)
Works of Art Samplers (Apple II, MS-DOS, Macintosh)
Art a la Mac (Macintosh)
Family Matters (Apple II, MS-DOS, Macintosh)
Atlas Explorer (Apple II, MS-DOS, Macintosh)
Hidden Agenda (1988: MS-DOS, Macintosh)
References
Defunct educational software companies
Defunct software companies of the United States
Software companies based in Minnesota
Defunct video game companies of the United States
Software companies established in 1982
Software companies disestablished in 1990
1982 establishments in Minnesota |
1060945 | https://en.wikipedia.org/wiki/AVG%20AntiVirus | AVG AntiVirus | AVG AntiVirus (previously known as AVG, an abbreviation of Anti-Virus Guard) is a line of antivirus software developed by AVG Technologies, a subsidiary of Avast. It is available for Windows, macOS and Android.
History
The brand AVG comes from Grisoft's first product, Anti-Virus Guard, launched in 1992 in the Czech Republic. In 1997, the first AVG licenses were sold in Germany and the UK. AVG was introduced in the US in 1998.
The AVG Free Edition helped raise awareness of the AVG product line. In 2006, the AVG security package grew to include anti-spyware as AVG Technologies acquired ewido Networks, an anti-spyware group. AVG Technologies acquired Exploit Prevention Labs (XPL) in December 2007 and incorporated that company's LinkScanner safe search and surf technology into the AVG 8.0 security product range released in March 2008. In January 2009, AVG Technologies acquired Sana Security, a developer of identity theft prevention software. This software was incorporated into the AVG security product range in March 2009.
According to AVG Technologies, the company has more than 200 million active users worldwide, including more than 100 million who use their products and services on mobile devices.
On 7 July 2016, Avast announced an agreement to acquire AVG for $1.3 billion.
Platform support
AVG provides AVG AntiVirus Free for Windows, AVG AntiVirus for Mac for macOS and AVG AntiVirus for Android for Android devices. All are freemium products: They are free to download, install, update and use, but for technical support a premium plan must be purchased.
AVG stopped providing new features for Windows XP and Windows Vista in January 2019. New versions require Windows 7 or later; virus definitions are still provided for previous versions.
Features
AVG features most of the common functions available in modern antivirus and Internet security programs, including periodic scans, scans of sent and received emails (including adding footers to the emails indicating this), the ability to repair some virus-infected files, and a quarantine area (virus vault) in which infected files are held.
LinkScanner
The patent pending LinkScanner technology acquired from Exploit Prevention Labs and built into most AVG products, provides real-time updated protection against exploits and drive-by downloads. LinkScanner includes: Search-Shield – a safe search component that places safety ratings next to each link in Google, Yahoo! and MSN search results; plus Active Surf-Shield – a safe surf component that scans the contents of a web site in real-time to ensure it's safe being opened. Concerns regarding web analytics have made LinkScanner a controversial component (see "LinkScanner concerns" below).
LinkScanner concerns
When AVG 8.0 was first released, its LinkScanner safe search feature was shown to cause an increase in traffic on websites that appear high in search engine results pages. Since LinkScanner disguises the scans as coming from an Internet Explorer 6 browser when it prescans each site listed in the search results, website usage logs showed incorrect and overinflated site visitor statistics. The prescanning of every link in search results also caused websites to transfer more data than usual, resulting in higher bandwidth usage for web site operators and slow performance for users. AVG initially said that site administrators would be able to filter the LinkScanner traffic out of their site statistics, leaving the problem of excess bandwidth usage still to be solved. Pay-per-click advertising was not affected by the increase in traffic.
AVG Online Shield
AVG Online Shield is a feature designed to check files and ensure that they are safe. AVG Online Shield also ensures the safety of exchanging files via instant messengers and VoIP clients.
In response to complaints, AVG announced that as of 9 July 2008 "Search-Shield will no longer scan each search result online for new exploits, which was causing the spikes that webmasters addressed with us", releasing a new build on that date that applies a local blacklist, then prefetches and scans only those links clicked on by the user.
Controversy
As of 2014, there are numerous reports dating back to 2012 that the AVG SafeGuard Toolbar installs itself without the consent of the user, as a side effect of installing other applications. The toolbar program appears to cause significant RAM issues and can be considered an intrusive potentially unwanted program (PUP). Once installed, the AVG toolbar is virtually impossible to remove. The toolbar uninstaller does not function, instead re-installing the add-on if manually removed. Consequently, many discussions and blog posts have described complex procedures for removal of the AVG toolbar, each with very mixed results.
In September 2015, AVG announced that it would start tracking users for profit, analyzing their data for sale to the advertising industry. This measure received criticism from consumers, the press and security industry, as many users intended to use the software in order to protect themselves from spyware and would not expect the functions of spyware to be "hidden" in security software.
In December 2015, the AVG Web TuneUp Google Chrome extension (automatically installed with AVG AntiVirus) was revealed to contain multiple critical security vulnerabilities. Most notably, Chrome users' browsing history could be exposed to any website, cookies from any site the user has visited could be read by an attacker, and trivial cross-site scripting (XSS) issues could allow any website to execute arbitrary code (as another domain).
The XSS vulnerability allowed a user's mail from "mail.google.com" to be read by any website, or financial information to be read from the user's online banking site. The AVG team fixed this by only allowing "mysearch.avg.com" and "webtuneup.avg.com" to execute these scripts. Despite this remediation, attackers could leverage any of these attacks if an XSS vulnerability was found on the AVG sites. As of April 2016, Web TuneUp was still not available for download from the AVG website.
Reception
AVG Antivirus Free 2012 was selected as PC Magazine Editors' Choice in the free antivirus category. AVG AntiVirus Free 2015 received the Editor Choice badge of SoftChamp.
See also
Internet Security
Comparison of antivirus software
Comparison of firewalls
References
External links
1992 software
Antivirus software
Freeware
Windows security software |
2396410 | https://en.wikipedia.org/wiki/OpenBSM | OpenBSM | OpenBSM is an open source implementation of Sun's Basic Security Module (BSM) Audit API and file format. BSM, which is a system used for auditing, describes a set of system call and library interfaces for managing audit records as well as a token stream file format that permits extensible and generalized audit trail processing.
OpenBSM includes system include files appropriate for inclusion in an operating system implementation of Audit, libbsm, an implementation of the BSM library interfaces for generating, parsing, and managing audit records, auditreduce and praudit, audit reduction and printing tools, API documentation, and sample configuration files. Works in progress include extensions to the libbsm API to support easier audit trail analysis, including a pattern matching library.
OpenBSM is derived from the BSM audit implementation found in Apple's open source Darwin operating system, which upon request, Apple relicensed under a BSD licence to allow for integration into FreeBSD and other systems. The Darwin BSM implementation was created by McAfee Research under contract to Apple, and has since been extensively extended by the volunteer TrustedBSD team. OpenBSM is included in FreeBSD as of version 6.2 and later, and has been announced as a Mac OS X Snow Leopard feature.
External links
TrustedBSD: OpenBSM
FreeBSD Handbook: Security Event Auditing
Apple Computer: Common Criteria
BSD software
Operating system security
Software using the BSD license |
12778 | https://en.wikipedia.org/wiki/Group%20velocity | Group velocity | The group velocity of a wave is the velocity with which the overall envelope shape of the wave's amplitudes—known as the modulation or envelope of the wave—propagates through space.
For example, if a stone is thrown into the middle of a very still pond, a circular pattern of waves with a quiescent center appears in the water, also known as a capillary wave. The expanding ring of waves is the wave group, within which one can discern individual waves that travel faster than the group as a whole. The amplitudes of the individual waves grow as they emerge from the trailing edge of the group and diminish as they approach the leading edge of the group.
Definition and interpretation
Definition
The group velocity is defined by the equation:
where is the wave's angular frequency (usually expressed in radians per second), and is the angular wavenumber (usually expressed in radians per meter). The phase velocity is: .
The function , which gives as a function of , is known as the dispersion relation.
If is directly proportional to , then the group velocity is exactly equal to the phase velocity. A wave of any shape will travel undistorted at this velocity.
If ω is a linear function of k, but not directly proportional , then the group velocity and phase velocity are different. The envelope of a wave packet (see figure on right) will travel at the group velocity, while the individual peaks and troughs within the envelope will move at the phase velocity.
If is not a linear function of , the envelope of a wave packet will become distorted as it travels. Since a wave packet contains a range of different frequencies (and hence different values of ), the group velocity will be different for different values of . Therefore, the envelope does not move at a single velocity, but its wavenumber components () move at different velocities, distorting the envelope. If the wavepacket has a narrow range of frequencies, and is approximately linear over that narrow range, the pulse distortion will be small, in relation to the small nonlinearity. See further discussion below. For example, for deep water gravity waves, , and hence . This underlies the Kelvin wake pattern for the bow wave of all ships and swimming objects. Regardless of how fast they are moving, as long as their velocity is constant, on each side the wake forms an angle of 19.47° = arcsin(1/3) with the line of travel.
Derivation
One derivation of the formula for group velocity is as follows.
Consider a wave packet as a function of position and time .
Let be its Fourier transform at time ,
By the superposition principle, the wavepacket at any time is
where is implicitly a function of .
Assume that the wave packet is almost monochromatic, so that is sharply peaked around a central wavenumber .
Then, linearization gives
where
and
(see next section for discussion of this step). Then, after some algebra,
There are two factors in this expression. The first factor, , describes a perfect monochromatic wave with wavevector , with peaks and troughs moving at the phase velocity within the envelope of the wavepacket.
The other factor,
,
gives the envelope of the wavepacket. This envelope function depends on position and time only through the combination .
Therefore, the envelope of the wavepacket travels at velocity
which explains the group velocity formula.
Higher-order terms in dispersion
Part of the previous derivation is the Taylor series approximation that:
If the wavepacket has a relatively large frequency spread, or if the dispersion has sharp variations (such as due to a resonance), or if the packet travels over very long distances, this assumption is not valid, and higher-order terms in the Taylor expansion become important.
As a result, the envelope of the wave packet not only moves, but also distorts, in a manner that can be described by the material's group velocity dispersion. Loosely speaking, different frequency-components of the wavepacket travel at different speeds, with the faster components moving towards the front of the wavepacket and the slower moving towards the back. Eventually, the wave packet gets stretched out. This is an important effect in the propagation of signals through optical fibers and in the design of high-power, short-pulse lasers.
History
The idea of a group velocity distinct from a wave's phase velocity was first proposed by W.R. Hamilton in 1839, and the first full treatment was by Rayleigh in his "Theory of Sound" in 1877.
Other expressions
For light, the refractive index , vacuum wavelength , and wavelength in the medium , are related by
with the phase velocity.
The group velocity, therefore, can be calculated by any of the following formulas,
Relation to phase velocity, refractive index and transmission speed
In three dimensions
For waves traveling through three dimensions, such as light waves, sound waves, and matter waves, the formulas for phase and group velocity are generalized in a straightforward way:
One dimension:
Three dimensions:
where means the gradient of the angular frequency as a function of the wave vector , and is the unit vector in direction k.
If the waves are propagating through an anisotropic (i.e., not rotationally symmetric) medium, for example a crystal, then the phase velocity vector and group velocity vector may point in different directions.
In lossy or gainful media
The group velocity is often thought of as the velocity at which energy or information is conveyed along a wave. In most cases this is accurate, and the group velocity can be thought of as the signal velocity of the waveform. However, if the wave is travelling through an absorptive or gainful medium, this does not always hold. In these cases the group velocity may not be a well-defined quantity, or may not be a meaningful quantity.
In his text “Wave Propagation in Periodic Structures”, Brillouin argued that in a dissipative medium the group velocity ceases to have a clear physical meaning. An example concerning the transmission of electromagnetic waves through an atomic gas is given by Loudon. Another example is mechanical waves in the solar photosphere: The waves are damped (by radiative heat flow from the peaks to the troughs), and related to that, the energy velocity is often substantially lower than the waves' group velocity.
Despite this ambiguity, a common way to extend the concept of group velocity to complex media is to consider spatially damped plane wave solutions inside the medium, which are characterized by a complex-valued wavevector. Then, the imaginary part of the wavevector is arbitrarily discarded and the usual formula for group velocity is applied to the real part of wavevector, i.e.,
Or, equivalently, in terms of the real part of complex refractive index, , one has
It can be shown that this generalization of group velocity continues to be related to the apparent speed of the peak of a wavepacket. The above definition is not universal, however: alternatively one may consider the time damping of standing waves (real , complex ), or, allow group velocity to be a complex-valued quantity. Different considerations yield distinct velocities, yet all definitions agree for the case of a lossless, gainless medium.
The above generalization of group velocity for complex media can behave strangely, and the example of anomalous dispersion serves as a good illustration.
At the edges of a region of anomalous dispersion, becomes infinite (surpassing even the speed of light in vacuum), and may easily become negative
(its sign opposes Re) inside the band of anomalous dispersion.
Superluminal group velocities
Since the 1980s, various experiments have verified that it is possible for the group velocity (as defined above) of laser light pulses sent through lossy materials, or gainful materials, to significantly exceed the speed of light in vacuum . The peaks of wavepackets were also seen to move faster than .
In all these cases, however, there is no possibility that signals could be carried faster than the speed of light in vacuum, since the high value of does not help to speed up the true motion of the sharp wavefront that would occur at the start of any real signal. Essentially the seemingly superluminal transmission is an artifact of the narrow band approximation used above to define group velocity and happens because of resonance phenomena in the intervening medium. In a wide band analysis it is seen that the apparently paradoxical speed of propagation of the signal envelope is actually the result of local interference of a wider band of frequencies over many cycles, all of which propagate perfectly causally and at phase velocity. The result is akin to the fact that shadows can travel faster than light, even if the light causing them always propagates at light speed; since the phenomenon being measured is only loosely connected with causality, it does not necessarily respect the rules of causal propagation, even if it under normal circumstances does so and leads to a common intuition.
See also
Wave propagation
Dispersion (water waves)
Dispersion (optics)
Wave propagation speed
Group delay
Group velocity dispersion
Group delay dispersion
Phase delay
Phase velocity
Signal velocity
Slow light
Front velocity
Matter wave#Group velocity
Soliton
References
Notes
Further reading
Crawford jr., Frank S. (1968). Waves (Berkeley Physics Course, Vol. 3), McGraw-Hill, Free online version
External links
Greg Egan has an excellent Java applet on his web site that illustrates the apparent difference in group velocity from phase velocity.
Maarten Ambaum has a webpage with movie demonstrating the importance of group velocity to downstream development of weather systems.
Phase vs. Group Velocity – Various Phase- and Group-velocity relations (animation)
Radio frequency propagation
Optics
Wave mechanics
Physical quantities
Mathematical physics |
53151479 | https://en.wikipedia.org/wiki/List%20of%20amateur%20radio%20software | List of amateur radio software | This is a list of software for amateur radio.
Software tools
Logging Software
Operating systems
The Debian project maintains a pure blend that includes ham radio software. The HamBSD project is a variation of OpenBSD.
See also
Amateur radio station § Computer-control software
List of amateur radio modes
Software-defined radio
References
External links
DXZone Amateur Radio Software - An exhaustive directory of amateur radio software
Software
Amateur radio-related lists
Lists of software |
30860066 | https://en.wikipedia.org/wiki/Index%20of%20articles%20related%20to%20BlackBerry%20OS | Index of articles related to BlackBerry OS | A list of BlackBerry-related topics
3
3G
4G
A
Accelerometer
Advanced Wireless Services#BlackBerry
ALX (Application Loader File)
Amazon MP3
Appcelerator
Application development
Application programming interface
Application software
Architel
ARM architecture
B
Barcode
Bedrock
Biblical software
BlackBerry Alliance Program
BlackBerry App World
BlackBerry Desktop Software
BlackBerry Enterprise Server
BlackBerry Internet Service
BlackBerry Messenger
BlackBerry OS
BlackBerry Planet
BlackBerry PlayBook
BlackBerry Tablet OS
BlackBerry thumb
Bluetooth profile
C
C++
CamelCase
Cloud computing
COD (file format)
Comparison of netbooks
Comparison of smartphones
Computing platform
D
Db4o (object database)
Digital camera
Digital distribution
Digital newspaper technology
Documents To Go
DragonRAD
DriveSafe.ly
E
E-book
Eclipse (software)
Email
F
Adobe Flash Lite
Flash memory
Foursquare (service)
Free software license
Funambol
G
Geolocation
Google Maps
Google Talk
Graphical user interface
H
Handango
HTML5
I
imeem
Inter@ctive Pager
Internet tablet
Iris Browser
J
JAD (file format)
JMango
L
LastPass
List of BlackBerry applications
List of BlackBerry products
List of BlackBerry 10 devices
List of digital distribution platforms for mobile devices
List of operating systems
List of rich web application frameworks
Location awareness
Location-based game
Location-based service
Lotus Domino
M
Microsoft Exchange
MIDP
Mobile app development
Mobile browser
Mobile game
Mobile Internet device (MID)
Mobile operating system
Mobile OS
Multiple phone web based application framework
Mobile TV
Mobile Web
Mobitex
Moblyng
MXit
N
Nettop
Novell GroupWise
NTP, Inc. (Patent litigation)
O
OpenGL ES
P
PaltalkScene
PBKDF2
Personal communicator
Personal digital assistant (PDA)
PhoneGap
PocketMac
Portable media player
Proprietary software
Push e-mail
Push technology
Q
Qik
QNX
QNX4FS
QR Code
Qt (software)
QWERTY
R
Real-time operating system (RTOS)
Reduced instruction set computing
Research In Motion (RIM)
S
Screenshot
SDRAM
Shazam (service)
Skia Graphics Engine
Smartface
Smartphone
SMS
SQLite
SureType
SyncML
T
Tablet computer
Touchscreen
Trackball
Trackpad
Trackwheel
Trapster (speed trap sharing system)
Triangulation
Truphone
U
Unlicensed Mobile Access (UMA)
Ultra-Mobile PC
V
Vlingo
Visual voicemail
Voice dialing
W
Wattpad
WebKit
Wireless
Where.com
WorkLight Mobile Platform
See also
BlackBerry
Blackberry OS-related topics |
1613907 | https://en.wikipedia.org/wiki/Dorothy%20E.%20Denning | Dorothy E. Denning | Dorothy Elizabeth Denning, born August 12, 1945, is a US-American information security researcher known for lattice-based access control (LBAC), intrusion detection systems (IDS), and other cyber security innovations. She published four books and over 200 articles. Inducted into the National Cyber Security Hall of Fame in 2012, she is now Emeritus Distinguished Professor of Defense Analysis, Naval Postgraduate School.
Early life
Dorothy Elizabeth Robling, daughter of C. Lowell and Helen Watson Robling, grew up in Grand Rapids, Michigan. She earned a mathematics B.A. (1967) and M.A. (1969) at the University of Michigan. While working on her Ph.D. in computer science at Purdue University, she married Prof. Peter J. Denning in 1974. Her thesis on "Secure Information Flow in Computer Systems" secured her doctorate in 1975.
Career
Dr. Dorothy Denning began her academic career at Purdue University as assistant professor from 1975 to 1981. While associate professor at Purdue (1981-1983), she wrote her first book, Cryptography and Data Security in 1982. She joined SRI International as computer scientist from 1983 to 1987, working on the first intrusion detection system and on database security. After a stint as principal software engineer at Digital Equipment Corporation's Palo Alto Systems Research Center (1987-1991), she returned to academe as chair of the Computer Science Department at Georgetown University. She later became Georgetown's Patricia and Patrick Callahan Family Professor of Computer Science and director of the Georgetown Institute of Information Assurance. In 2002 Dorothy Denning became professor in the Department of Defense Analysis at the Naval Postgraduate School, Monterey, California, then distinguished professor in 2009, retiring as emeritus distinguished professor at the end of 2016.
Throughout her career, Denning anticipated and addressed the cyber security issues of the day. She was the first president of the International Association for Cryptologic Research (1983-1986). With husband Peter in 1997 she edited Internet Besieged: Countering Cyberspace Scofflaws, a comprehensive collection of essays on cyber security. In 1998 she wrote Information Warfare and Security. She testified multiple times before various congressional subcommittees studying technology, infrastructure, intellectual property, and cyberterrorism. Her innovations won awards, and her opinions stirred up controversy. A full list of publications is available on her full vita at the Naval Postgraduate School website.
Innovations
Denning has received over 20 awards for her innovations in computer security. Key contributions are described below.
"A Lattice Model of Secure Information Flow" presented in 1975 provided a method for controlling access to data which is still used today.
Detecting intruders is key to protecting computer systems. While at SRI International Dorothy Denning and Peter G. Neumann developed an intrusion detection system (IDS) model using statistics for anomaly detection that is still the basis for intrusion detection systems today. SRI's Intrusion Detection Expert System (IDES) ran on Sun workstations and considered both user and network level data. It combined a rule-based Expert System to detect known types of intrusions with a statistical anomaly-detection component based on profiles of users, host systems, and target systems. (An artificial neural network was proposed as a third component; All three components would then report to a resolver). SRI followed IDES in 1993 with the Next-generation Intrusion Detection Expert System (NIDES). The Multics Intrusion Detection and Alerting System (MIDAS), which protected NSA's Dockmaster System from 1998–2001, is an example of a fielded expert-system-based IDS.
Denning improved data security via encryption technology. She introduced timestamps in key distribution protocols, cryptographic checksums for multilevel database security, and a method for improving the security of digital signatures with RSA and other public key crypto systems. She considered key escrow systems, Internet crime and hacking. Her book Cryptography and Data Security became an ACM Classic, introducing cryptography to many.
In database security, Denning found ways to reduce inference threats in multilevel databases. She reported on the problems of working with data across different classification levels.
With L. Scott, Denning wrote two papers on using Global Positioning Systems for geo-encryption to enhance data security.
Although she remained a technical expert, Denning's interests evolved to consider legal, ethical, and social issues. She addressed wiretapping, the growth of the Internet, cyber terrorism and cyber warfare. Her most recent papers focused on current cyber threats and defenses.
Controversy
Denning interviewed hackers for her research on hacking and "hactivism". She was criticized when she found positive things to say about their actions and wrote a 1995 postscript.
Denning was widely criticized for her role in NSA's controversial Clipper chip initiative to give the government authorized access to encrypted private communications through a key escrow system. At the government's request Denning privately reviewed the classified Skipjack block cipher, and testified in Congress that general publication of the algorithm would enable someone to build a hardware or software product that used SKIPJACK without escrowing keys. In public forums, such as the Usenet forum comp.risks, she defended the Clipper chip and other approaches to key escrow that offered strong security while enabling law enforcement to decrypt without a warrant. However, she did not advocate making key escrow mandatory. Eventually, Clipper was dropped and Skipjack was declassified and published.
Denning served as an expert witness in the 1990 trial of United States v. Riggs. Her testimony helped lead the government to drop charges against defendant Craig Neidorf, who had taken an electronic 911 directory across state lines.
In 1992, Denning challenged the existing national standard for evaluating trusted systems (TCSEC), noting that "By the time a system is evaluated it is obsolete." She maintained that "trust is not a property but an assessment" by the real world market. This was not the only criticism, and the TCSEC has since been replaced.
Lack of product liability for software is a contentious topic. When Denning proposed software vendors accept liability for errors in their products, industry pushed back. Steve Lipner, charged with software security at Microsoft, argued that companies with deep pockets like Microsoft would be sued to death, even if they proved repeatedly that they followed the best secure software development practices. A few large vendors, such as Volvo, have announced plans to accept both hardware and software liability in their future autonomous cars when national product liability standards are established.
Key awards
In 1995 Denning was named a fellow of the Association for Computing Machinery.
The 1999 National Computer Systems Security Award recognized her "outstanding contributions to the field of computer security".
Time magazine named her a security innovator in 2001.
The 2001 Augusta Ada Lovelace Award from the Association for Women in Computing acknowledged "her outstanding in computer security and cryptography as well as her extraordinary contributions to national policy debates on cyber terrorism and information warfare".
The 2004 Harold F. Tipton Award recognized "Sustained excellence throughout [her] outstanding information security career".
In 2008 ACM's special interest group on security, audit and control (ACM SIGSAC) bestowed their Outstanding Innovator Award upon Dr. Denning.
She was named a fellow of the International Information Security Certification Consortium (ISC2).
In 2010 she was named a distinguished fellow of the Information Systems Security Association (ISSA).
In 2012 she was among the first inductees into the National Cyber Security Hall of Fame.
Other honors
New Jersey City University named its new security center the Dr. Dorothy E. Denning Center of Academic Excellence in Information Assurance Education.
Bibliography
Denning, Dorothy E. and Denning Peter J., editors, Internet Besieged: Countering Cyberspace Scofflaws, publisher ACM Press, Addison-Wesley, 1997,
Notes
External links
Dorothy Denning's Home Page at Naval Postgraduate School
Dorothy Denning oral history, Charles Babbage Institute, University of Minnesota.
The Future of Cryptography, a 1996 essay in which Denning gave her view of the future
Afterward to The Future of Cryptography, a 1999 essay in which Denning updated her view
Dorothy Denning's Home Page at Georgetown University, not updated since 2002
The Silver Bullet Security Podcast interview of Denning by Gary McGraw
Gifts of Speech Testimony Concerning Computer Encryption by Dorothy Denning
Ruritania, a classic Internet satire of Denning's opposition to citizen cryptography
Declaration on Encryption Policy, a 1997 declaration in which Denning said that she did not recommend domestic restrictions on the use encryption within the United States, so long as all crypto keys are legally required to be accessible to the government by court order.
1945 births
American computer scientists
Computer systems researchers
Living people
University of Michigan College of Literature, Science, and the Arts alumni
Naval Postgraduate School faculty
Fellows of the Association for Computing Machinery
Computer security academics
American women computer scientists
American women academics
21st-century American women |
21020366 | https://en.wikipedia.org/wiki/George%20Ledin | George Ledin | George Ledin, Jr. is an American computer scientist and professor of computer science at Sonoma State University. Ledin's teaching of computer security at Sonoma State has been controversial for its inclusion of material on how to write malware. Ledin is a strong critic of the antivirus software industry, whose products he considers almost useless. Ledin also helped found the computer science program at the University of San Francisco, and published several books on computing in the 1970s and 1980s.
Education and career
Ledin is a 1967 graduate of the University of California, Berkeley.
He started teaching computer science at the University of San Francisco in 1965, as the second computer scientist at the university, five years before the university's computer science department itself was founded. In 1970, he served as vice-president of The Fibonacci Association, and host of its annual meeting. In 1973, as a researcher in the Institute of Chemical Biology and instructor in computer science at the university, he was the chair of the first national conference on ALGOL, By 1980 he was head of the computer science department at the university.
He earned a Juris Doctor at the University of San Francisco in 1982, and moved to the Sonoma State faculty in 1984.
Books
Ledin is author or co-author of books including:
Programming the IBM 1130 (with Robert K. Louden, 2nd ed., Prentice-Hall, 1972)
A Structured Approach to General BASIC (Boyd & Fraser, 1978)
The Programmer's Book of Rules (Lifetime Learning / Wiley, 1979)
Understanding Pascal (Alfred Publishing, 1981)
Pascal (Mayfield Publishing, 1982)
The Personal Computer Glossary (Alfred Publishing, 1983)
The COBOL Programmer's Book of Rules (with Victor Ledin and Michael D. Kudlick, Lifetime Learning / Wiley, 1983).
Personal life
Ledin was born in Austria. He and his co-author Victor Ledin are brothers, both sons of Georgii Grigorievich Ledin (1921–2019), an immigrant from the Georgian city of Sukhumi.
References
External links
Dr. Ledin page @ Sonoma State University.
"Not teaching malware is harmful" @ Sonoma State University.
Year of birth missing (living people)
Living people
American computer scientists
University of California, Berkeley alumni
University of San Francisco alumni
Sonoma State University faculty
Computer security specialists
20th-century American scientists
21st-century American scientists |
3190888 | https://en.wikipedia.org/wiki/RDM%20%28lighting%29 | RDM (lighting) | Remote Device Management (RDM) is a protocol enhancement to USITT DMX512 that allows bi-directional communication between a lighting or system controller and attached RDM compliant devices over a standard DMX line. This protocol will allow configuration, status monitoring, and management of these devices in such a way that does not disturb the normal operation of standard DMX512 devices that do not recognize the RDM protocol.
The standard was originally developed by the Entertainment Services and Technology Association - Technical Standards (ESTA) and is officially known as "ANSI E1.20, Remote Device Management Over DMX512 Networks.
Technical Details
RDM Physical layer
The RDM protocol and the RDM physical layer were designed to be compatible with legacy equipment. All compliant legacy DMX512 receivers should be usable in mixed systems with an RDM controller (console) and RDM responders (receivers). DMX receivers and RDM responders can be used with a legacy DMX console to form a DMX512 only system. From a user’s point of view the system layout is very similar to a DMX system. The controller is placed at one end of the main cable segment. The cable is run receiver to receiver in a daisy-chain fashion. RDM enabled splitters are used the same way DMX splitters would be. The far end (the non console or splitter end) of a cable segment should be terminated.
RDM requires two significant topology changes compared to DMX. However, these changes are generally internal to equipment and therefore not seen by the user.
First, a controller’s (console’s) output is terminated. Second, this termination must provide a bias to keep the line in the ‘marking state’ when no driver is enabled.
The reason for the additional termination is that a network segment will be driven at many points along its length. Hence, either end of the segment, if unterminated, will cause reflections.
A DMX console’s output drivers are always enabled. The RDM protocol is designed so that except during discovery, there should never be data collisions. To assure this lack of collisions, while making possible implementation on different platforms, there are times when all line drivers are required to be disabled. If nothing more than the termination was done, the line would float to some unknown level. In that case one or more random changes might be read on the line. These random changes greatly decrease system accuracy. So the biasing of the line is required
To assure this, section 2.4.1 (Line Bias Networks) of the standard says;
“The command port shall provide a means to bias the termination of the data link to a value of at
least 245 mV and verified by using the test circuit described in Appendix F.”
The standard further states that, the biasing mean “shall be polarized such that Data+ of the data link is positive with respect to Data- the data link. The Line Biasing network shall maintain this bias when the data link is loaded with the equivalent of 32 unit loads and common mode voltage is varied over the range of +7 volts to -7 volts DC.”
The standard does not require any particular circuit for providing the basis and termination; however, the simplest method is often a passive pull apart network.
Whatever method is used must be tested with the chosen driver chip to see that the design combination still meets the requirement of E1.20. Tests are given in Appendix F of the standard. These tests are for design verification and are not required as production testing. Experience has shown many EIA485 drivers designed for 5 volt operation will pass the required tests. It is not so clear that all 3.3 volt parts will pass. In either case this performance must be verified. Details of the pull apart network and the tests can be found in ANSI E1.20 - 2006.
Protocol
RDM packets are interspersed with the existing DMX data packets being used to control the lighting. The DMX 512 specification requires that DMX packets begin with the start code. The default Start Code is 0x00(also known as the Null Start Code). By using the start code 0xCC, RDM packets can be safely inserted between DMX data packets without older non-RDM aware devices attempting to read them.
The DMX 512 specification required DMX connectors to be a 5-pin XLR type, with only the first 3 pins being used (pins 4 and 5 were reserved for "future use"). Unfortunately, various manufacturers started using the final two pins for various, proprietary purposes, such as low-voltage power or proprietary talk-back protocols. As a result, the decision was made to have all RDM communication on pins 2 and 3. This raises data collision concerns.
The RDM standard addresses this problem by ensuring that in all cases (except discovery) only one device is authorized to be transmitting at any given time. Only the controller (of which there can be only one) can start an RDM exchange. Responders can speak only if spoken to. The controller will always initiate all RDM communication.
All RDM devices have a unique identifier (UID) that consists of a manufacturer ID and serial number.
RDM communication can be broken down into three types:
Discovery
Unicast communication
Broadcast communication
Discovery
Discovery is the only situation in which data collisions can occur assuming all connected devices behave correctly. The controller will broadcast a discovery command to all devices and await a response. If there are more than one device connected, the simultaneous responses will likely result in a data collision, and the controller will not receive a correctly formatted response. The controller will then refine its search to a smaller range of UIDs according to a binary search pattern. Once the controller receives a correct response it will attempt to mute the responding device. After a successful mute, the device is no longer allowed to respond to discovery messages, and the controller can continue searching for other devices. Once all devices have been muted (no responses are received to discovery commands), the discovery process is finished and the controller will hold a list of all connected devices.
The controller will need to periodically perform searches for new devices and assert that already discovered devices are still connected.
Unicast communication
General communication with a specific fixture occurs in a request-response pattern. The controller sends the request to the device, addressing it by the device's UID. When the request has been sent, the controller relinquishes control of the DMX line for a given period of time, so the device can transmit its response. Unicast communication is the only way in which data can be retrieved from a fixture (other than its UID which can be obtained using the discovery mechanism mentioned above). If the device does not respond within a given period of time, the controller can assume communication has failed, and may retry.
Broadcast communication
To quickly send instructions to multiple fixtures, RDM allows for broadcast communication. This allows the controller to send an instruction to all devices, or all devices from one manufacturer. As more than one device might be receiving the message, responses are not permitted in broadcast communication except during the Discovery process.
Uses for RDM
Since the RDM protocol travels on top of the DMX512 protocol, most of its uses will be in the fields of architectural and stage lighting.
This protocol will change the way that Lighting Technicians setup and maintain their lighting rigs, It can provide:
Identification and classification of connected devices (Fixtures, Dimmers, Splitters, etc...)
Addressing of devices controllable by DMX512
Status reporting of fixtures or other connected devices
Configuration of fixtures and other DMX devices
Compatibility with existing DMX hardware
RDM was designed from the outset to work with existing DMX devices. The use of a different start code ensures all DMX-compliant devices that do not support RDM will simply ignore any RDM messages, however not all DMX devices have been made strictly to the DMX specification, and so devices that do not check the start code of incoming DMX packets will try to interpret RDM messages as DMX packets, which can result in flicker or other types of misbehavior.
Any devices that provide galvanic isolation or buffering on the DMX line (such as DMX splitters) have traditionally been designed to allow transmission in one direction: from the controller to the devices. As RDM requires bi-directional communication these devices will typically fail. Only devices that have been designed with RDM compatibility as a feature will typically work. Older DMX splitters that are not RDM compatible should still reliably send the DMX data, and block RDM communication.
Adoption
RDM was ratified in 2006. It took a while for it to be widely adopted. There are now several mainstream lighting consoles supporting RDM as well as a growing list of RDM “responders” such as colour scrollers, dimmers, various LED Stage Lighting fixtures, and moving lights. Data distribution products including wireless DMX/RDM links are now available.
Support
DMX512 / RDM testers and configuration tools are available. With these tools a system containing RDM responders can be addressed, configured, and monitored without requiring a RDM console. The introduction of test tools has greatly increased the ability to design and evaluate RDM controllers and responders. Some companies make RDM-injector devices that go between the DMX controller and the responders. They inject RDM packets into the DMX data stream.
Cross-compatibility
As with any relatively new protocol, some inter manufacturer compatibility issues have and will crop up. To overcome these problems the DMX community has taken several actions. The RDM Protocol Developer and User Forum exists to allow implementers to ask questions and work through potential problems. PLASA is holding RDM plugfests several times a year. These allow RDM manufacturers to interface gear from other manufacturers with their own. This has led to greater inter-operability. For RDM responders there is an open source suite of Automated Responder Tests.
Compatibility with new technologies
RDM has been designed with the traditional DMX-512 serial interface in mind. It relies heavily on a few assumptions that could affect its compatibility with other lighting technologies.
RDM relies on there being only one controller on a single line, to manage its collision prevention. A number of products exist to allow multiple DMX streams from multiple controllers being merged into one DMX stream. While this is fairly trivial in a unidirectional environment, it becomes much more complex when RDM is involved, as it can quickly get very difficult to route the RDM responses from devices back to the correct controller.
RDM relies on devices replying within a given time-frame of a response completing. If a device does not begin responding in the correct time-frame, the controller will most likely retry its request or give up. In a DMX-only environment this is not a problem as the delay between the device and the controller is likely to be very, very short. If the DMX is being routed down an intermediary medium (such as down a TCP/IP (Ethernet) network or wireless interface) then this can cause some problems. In general, if the manufacturer has control over the intermediary interface (as they do for protocols such as wireless DMX), it is possible to forward on the RDM responses as they are being received, along with a proxy system for the discovery process to provide the illusion of the RDM communication occurring as normal.
If the manufacturer does not have control over the implementation of the intermediary interface (such as when using an Ethernet network) then it is virtually impossible to send RDM messages back to a DMX-based RDM controller. It is possible, however, to maintain RDM communication with DMX-based devices and an Ethernet-based controller. Since lighting controllers are already rapidly heading towards being entirely Ethernet-based, this is the form DMX/RDM devices are most likely going to be seen in the future. With both RDM and DMX communication originating on the Ethernet medium, being converted through an Ethernet-to-DMX output device, and then proceeding to DMX-based devices.
See also
Dimmer
Lighting control console
Lighting control system
External links
Specifications
ANSI E1.20 RDM-Remote Device Management over USITT DMX512 Networks specification
Other
RDM Protocol Developer and User Forums
What is RDM?
What does RDM mean for the rest of us? (ESTA Protocol Article)
RDM Parameter Index
Open Source RDM Testing Software
RDM community
Stage lighting
Network protocols
American National Standards Institute standards |
6242170 | https://en.wikipedia.org/wiki/AmpliFIND | AmpliFIND | AmpliFIND is an acoustic fingerprinting service and a software development kit developed by the US company MusicIP.
MusicIP first marketed their fingerprinting algorithm and service as MusicDNS. In 2006, MusicIP reported that the MusicDNS database had more than 22 million fingerprints of digital audio recordings. One of their customers was MetaBrainz Foundation, a non-profit company that used MusicDNS in their MusicBrainz and MusicBrainz Picard software products.
Even so, MusicIP dissolved in 2008. The company's CEO, Andrew Stess, bought the rights to MusicDNS, renamed the software to AmpliFIND, and started a new company called AmpliFIND Music Services. In 2011, Stess sold AmpliFIND to Sony, who incorporated it into the digital music service offerings of their Gracenote division. Tribune Media subsequently purchased Gracenote, including the MusicDNS software.
How MusicDNS identifies a recording
To use the MusicDNS service, software developers write a computer program that incorporates an open-source software library called LibOFA. This library implements the Open Fingerprint Architecture, a specification developed during 2000–05 by MusicIP's previous incarnation, Predixis Corporation.
Through LibOFA, a program can fingerprint a recording, and submit the fingerprint to MusicDNS via the Internet. MusicDNS attempts to match the submission to fingerprints in its database. If the MusicDNS service finds an approximate match, it returns a code called a PUID (Portable Unique Identifier). This code does not contain any acoustic information; rather, it enables a computer program to retrieve identifying information (such as the song title and recording artist) from the MusicDNS database. The PUID code is a short, alphanumeric string based on the universally unique identifier standard.
The source code for LibOFA is distributed under a dual license: the GNU General Public License and the Adaptive Public License. The MusicDNS software that makes the fingerprints is proprietary.
See also
Acoustic fingerprint
Automatic content recognition
References
External links
Online music and lyrics databases
Acoustic fingerprinting |
22168373 | https://en.wikipedia.org/wiki/Bryopolia | Bryopolia | Bryopolia is a genus of moths of the family Noctuidae. The genus was erected by Charles Boursin in 1954.
Species
Bryopolia bryoxenoides Gyulai & Varga, 1998 Kyrgyzstan
Bryopolia boursini Plante, 1983 Afghanistan
Bryopolia chamaeleon (Alphéraky, 1887) Turkestan
Bryopolia chrysospora Boursin, 1954 Turkestan
Bryopolia holosericea Boursin, 1960 Afghanistan
Bryopolia monotona Varga, Ronkay & Hacker, 1990 Afghanistan
Bryopolia orophasma Boursin, 1960 Afghanistan
Bryopolia ronkayorum Hacker & Kautt, 1996
Bryopolia tenuicornis (Alphéraky, 1887) Turkestan
Bryopolia thomasi Varga, Ronkay & Hacker, 1990 Ladakh, Pakistan
Bryopolia tsvetaevi Varga & Ronkay, 1990 Afghanistan, Pamir
Bryopolia tribulis Plante, 1983 Afghanistan
Bryopolia virescens (Hampson, 1894) Kashmir
References
Cuculliinae |
16133471 | https://en.wikipedia.org/wiki/Torch%20Computers | Torch Computers | Torch Computers Ltd was a computer hardware company with origins in a 1982 joint venture between Acorn Computers and Climar Group that led to the development of the Communicator or C-series computer, a system based on the BBC Micro with a Z80 second processor and integral modem, intended as a viewdata terminal.
Establishing itself in Great Shelford, near Cambridge, UK, the company became well known for its computer peripherals for the Commodore VIC-20 and BBC Micro. Torch produced an expansion unit originally developed by Arfon Microelectronics for the VIC-20, having acquired Arfon, and several second processor units for the BBC Micro, many with integrated floppy disk or hard disk drives.
History
Arfon acquisition and financing
Arfon Microelectronics was a producer of a cartridge expansion system for the Commodore VIC-20 and a speech generator expansion for the VIC-20 and other microcomputers. Arfon had been founded by Kerr Borland, former North American Semi managing director, in Caernarfon, North Wales, around the end of 1980 with assistance from the Welsh Development Agency.
Towards the end of 1982, Torch acquired the assets of Arfon, taking on some of the "defunct" company's staff. This deal secured a reported quarter of a million pound investment from the Welsh Development Agency.
GEC acquisition plans and refinancing
During 1983, Torch had been set to be acquired by GEC, but with this acquisition abandoned, the company was refinanced by its shareholders for £1 million and two of its directors resigned, one of them being founder Martin Vlieland-Boddy who subsequently established a company called Data Technologies which developed the Graduate product that would eventually be sold by Torch.
Acorn Computers acquisition plans
In 1984, Acorn Computers announced an initial agreement to acquire Torch, apparently initiated by discussions from August 1983 on Torch's plans to sell Unix-based products and the potential for cooperation in selling into the US market. The takeover was supposed to have been finalised by June 1984, with Torch effectively becoming "effectively the business arm" of Acorn. Acorn and Torch had previously had "close ties" with plans for Torch to be "the business arm" of Acorn, but policy disagreements had led to the relationship being limited to Acorn supplying BBC Micro boards to Torch under contract for products such as the C-series.
Commentators noted the duplication between Acorn and Torch product lines post-acquisition in areas such as second processors (with 6000 of Torch's Z80 disc packs having been sold before Acorn's Z80 second processor had launched and with Torch already offering the HDP68K second processor product in competition to the then-unreleased Acorn 32016 second processor), hard disk systems and networking (with Torchnet being "an expansion of Acorn's Econet"). Nevertheless, Torch chairman Bob Gilkes noted "an exceptionally high degree of compatibility in products, in strategic thinking and in management style", whereas Acorn director Alex Reid indicated that "a rationalisation of the two companies' development efforts" would give a "substantial boost" to both companies' prospects. Torch was to retain its name and operate as a separate entity within Acorn. Subsequently, Gilkes was reported to have been replaced with Acorn's sales director, Peter O'Keefe, as chairman and managing director of Torch after complaints were made by Acorn to Torch's then-owners, Newmarket Venture Capital, about Gilkes' decision to manufacture and market the Graduate product from Data Technologies, this decision having been seen to be in conflict with Acorn's own strategy.
Evidently, the takeover was never completed, with Torch reported to have pulled out of the merger as Acorn's financial situation appeared to deteriorate, the reported £5 million deal being abandoned due to a "divergence of their future plans". By the time of the introduction of the BBC Model B+ in 1985, reportedly being "actively evaluated" by Torch for future products, Torch was described in one review as being "the largest third-party supplier of peripherals for the BBC Micro". Torch would later offer new firmware for its BBC Micro expansions making them compatible with the BBC Master series. Despite Acorn's situation, Torch continued to promote the Graduate as "the ultimate upgrade" for the BBC Micro, signing a deal with computer retailer Lasky's to make the product available in its stores.
Unix workstation vendor
In 1986, Torch introduced the Triple X workstation, based on the Motorola 68010 processor running Uniplus+ Unix System V with 1 MB RAM, 20 MB (or 40 MB) hard disk, 720 KB floppy drive, supporting Ethernet and X25 networking. Unlike previous products, it was not based on the BBC Micro but did provide a 1 MHz bus connector. Launched in January 1986 and aimed at the same market at the AT&T UNIX PC, a number of these were sold but never reached critical mass, and the Triple X was overshadowed in the market by other vendors such as Sun Microsystems. In 1988, Torch introduced an upgraded system, the Quad X, based on the 68020, but few were sold.
In 1989 Torch were developing a further enhancement, codenamed Quad Y, based on the 68030, but ran out of money and went into receivership. Acorn, having entered the Unix workstation market with the RISC iX-based R140 workstation (and having partnered with Torch and other companies in a general UK-based collaboration around the X Window System), apparently recruited industry marketing manager Warwick Hirst from Torch, where in his role as marketing manager he had "specialised in selling Unix systems based on Torch Triple X and Quad X machines to both government and industry".
Some of the software technology used in Torch's workstations was licensed to NeXT, although apparently not used in any of NeXT's own products. IXI Limited, founded by Torch's Ray Anderson, developed the general approach further with its X.desktop product that was ultimately licensed by workstation vendors.
Sale of assets
In 1990, parts of the company were sold to various buyers, including Unipalm and Control Universal Ltd. In 1991, Control Universal also went into receivership, and its Torch assets were bought by Worldmark Computers Ltd, which then started to trade under the name Torch Computers, changing its name to Torch Computers Ltd. in 1999.
Some Quad X boards obtained by Worldmark were sold but the company concentrated on PC technology and began to specialise in small form-factor computers. The main emphasis is now on enclosure products and large LCD displays for digital signage and art installations.
Products
The company provided a range of expansions for the BBC Micro under the Unicorn brand, although this name was also applied to a particular variant of the HDP68K product. The Z80-based products including the HDP68K were bundled with the Perfect suite of applications to run under Torch's CPN operating system (a clone of CP/M). The UCSD p-System was also offered as an option for the Unicorn range. The Torch Graduate was a separate development aimed at the MS-DOS market. Later, various Unix workstation products were released or planned, most notably the Torch Triple X.
Although Torch acquired Arfon, a producer of expansions for the Commodore VIC-20, the company reportedly ceased support for this range in 1983.
C-Series (Communicator)
Initially referred to by reviewers (and perhaps even by its manufacturer) simply as the Torch, the Communicator or C-series was a combination of BBC Micro with Z80 second processor running the CP/M-compatible CPN, modem and disk storage, also providing many of the ports familiar from the BBC Micro including RGB and UHF video outputs, RS-423 serial and Centronics parallel ports, analogue port, a cassette port, and an Econet/Torchnet port.
In a 1983 review of the BBC Micro and Torch Communicator by a US publication, the Communicator was described as "an assembly of all the desirable options connected to a BBC Computer" and "the best illustration of the BBC Computer’s potential". The $6,500 price was regarded as competitive given the features provided, with the dual processor architecture, the additional memory available to the CP/M-compatible environment, and particularly the connectivity features (Prestel and Torchmail) attracting enthusiastic commentary.
To augment the existing capabilities of the Communicator and 700 series models running CPN, Torch released a program called Torch Mail Plus, this offering electronic mail facilities along with file transfer, short message sending and remote login support between Torch machines via the telephone network. A variety of automation features were provided including the ability to schedule operations at certain times, with a scripting language called Tobey used to describe operations to be executed on local or remote machines, this potentially making it possible to coordinate activities performed across a number of different systems. The package was priced at £690 and described by one reviewer as potentially having the same impact for sales of Torch systems as VisiCalc had achieved for Apple systems.
The C-500 models provided the base 6502-based BBC system augmented with a Z80A second processor having its own 64 KB RAM, whereas the C-68000 models upgraded the Z80 CPU to a Z80B device and added a Motorola 68000 CPU plus 256 KB RAM, supporting the UCSD p-System and Unix System III (as with the Torch HDP68K/Unicorn). Pricing (in 1986) ranged from around £3000 for the entry-level C-500 to around £6000 for the top-level C-68000.
The mainboard for the C-68000 is apparently distinct from the Atlas board used in the HDP68K/Unicorn.
One review of the Z80-based C-series noted problems with one of the Tandon floppy disk drives in one review unit. In 1983, Torch filed a lawsuit against Tandon claiming $10 million of lost business due to defective Tandon drives. Another dispute arose between Torch and HH Computers over the design of the latter's Tiger computer, obliquely alleging some kind of misappropriation of technical information related to the C-series, despite the Tiger apparently originating within Tangerine Computer Systems and being sold to HH Computers for further development and manufacture.
Of the many CP/M machines available at the time of the Communicator, one with similar communications facilities was the Wren by Prism Microproducts, announced in early 1984 and featuring 64 KB of RAM (expandable to 256 KB), a built-in 7-inch amber monitor (in contrast to the Communicator's 12-inch colour monitor), twin floppy disk drives, and built-in modem. Designed by Prism and Transam and sold through a joint venture, Wren Computers, with manufacturing undertaken by Thorn EMI, the Wren ran CP/M Plus and was bundled with the Perfect applications suite, M-Tec Computer Services' BBC BASIC, the Executive Desktop suite (offering a range of personal organiser and accessory tools), and communications software. The complete system sold for £1000 plus VAT and also included a three month subscription to the online services Prestel and Micronet 800. Regarded as a transportable machine, the Wren was seen as "proven technology" but "good value for money" at its release in 1984, in contrast to the Communicator which was seen as "impressive" little more than a year earlier at a much higher price. Prism would eventually enter receivership in early 1985.
Floppy and Hard Disc Packs
The Twin Floppy Disc Pack (FDP240) provided two 400 KB floppy drives and supported the standard Acorn disc filing systems. The Hard Disc Pack (HDP240) combined a 400 KB floppy drive with a 20 MB hard disk, connecting to both the disc and 1 MHz bus connectors on the BBC Micro. Both products could be upgraded with Torch's Z80 second processor expansion to provide a complete CP/M-based system.
The Z80 Disc Pack was designed to sit beneath the BBC Micro itself and use short cables to connect the two units together, this raising the height of the keyboard by approximately three inches and making typing "a little difficult". One cable connected the expansion to the computer using the external connector provided for the disk interface, whereas a power cable also needed to be used to connect the expansion's own power supply to the computer, this replacing the computer's own supply which had to be physically disconnected by opening up the case and unplugging cables. The Z80 second processor supplied as part of the product, also available as the ZEP100, was connected to the Tube expansion connector but actually fitted internally within the computer. Available at a cost of around £800, the product also required Acorn's DFS to be fitted, this potentially costing another £100. The Perfect suite of business software was included in the package.
Z80 Second Processors
The Z80 Disc Pack (ZDP) and Z80 Extension Processor (ZEP) expansions for the BBC Micro each provided a Z80 second processor running CPN. The ZDP240 was effectively the combination of the FDP240 (providing floppy drives) with the ZEP100.
One stated benefit of Torch's Z80 expansions was that they offered more memory to CP/M-based software than typical CP/M systems, 63 KB instead of 53 KB, having Torch's CPN operating system in ROM and taking advantage of the capabilities of the host system for input/output functions.
Unicomm
A product known as Unicomm was released for BBC Micro systems upgraded with the Z80 Disc Pack offering the communications software of the C-series (Uniview viewdata terminal, Uniterm terminal emulator, Unimail electronic mail) and a modem.
Torch Graduate
The Torch Graduate provided a 5 MHz 8088 second processor for the BBC Micro running MS-DOS 2.11, fitted with 256 KB of RAM expandable to 640 KB, also providing dual 320 KB (formatted) floppy disk drives. Unlike many BBC Micro second processor solutions, it connected to the host computer using the 1 MHz bus expansion port.
Originally developed and announced by Data Technologies, a company founded by Torch founder Martin Vlieland-Boddy, and set for launch on 14th June 1984, two principal product variants were to be offered - the G400 with only one floppy disk drive costing about £690 (or £600 plus VAT), the G800 with two drives costing about £1000 (or £869 plus VAT) and bundled with the Thorn-EMI Perfect software suite - each configured with either 128 KB or 256 KB of RAM. After considerable delays in bringing the product to market, the product was eventually completed and offered by Torch under licence from Data Technologies in only the dual-drive 256 KB configuration for £1000 plus VAT, bundled with the Psion Xchange software suite.
One of the Graduate's designers went on to start a company, Soft Options, offering support and additional software for the Graduate. During the development of the Graduate, rumours that the product would be made available for the Acorn Electron were dismissed by Data Technologies who indicated that there were "no plans" for such a variant.
HDP68K and Torch Unicorn
The HDP68K provided a BBC Micro second processor solution offering a 68000 processor capable of running UNIX System III if acquired as the Unicorn product variant, together with a Z80 processor capable of running CPN, fitted with 256 KB of RAM (but upgradable to 512 KB or 1 MB), a 20 MB hard disk, and a 5.25-inch floppy drive. It connected multiple ports of the host BBC Micro: the Tube for inter-processor communications, the 1 MHz bus for hard disk transfers, and the disc port for the included floppy drive. The Unicorn name was apparently "originally derived from 'UNIX for Acorns'". The initial 256 KB version cost £2,895 plus VAT.
By featuring two processors, the product was intended to offer backwards compatibility to CPN or CP/M users, featuring a faster 6 MHz Z80B processor than other Z80 second processor products (including Torch's own) due to the use of faster memory to support the 8 MHz 68000 processor. Providing two second processors in the same box also allowed users to switch between them without having to unplug one and plug in the other. The Z80 processor was able to address 64 KB of the RAM when active, whereas the 68000 was able to address 256 KB (provided by 64-kilobit devices) up to 1 MB (provided by 256-kilobit devices). The dual-processor board used in the HDP68K was known as Atlas.
The Unix implementation for the HDP68K was provided by a collaboration of UniSoft Incorporated, Root Computers Limited and Torch, providing "genuine Unix System III with the Berkeley enhancements", with the complete set of programs and documentation being delivered on 24 floppy disks. Hardware support for the memory management typically needed by Unix implementations was provided by "a memory management unit to allow multi-tasking without interference between tasks", being interfaced to the CPU via interrupt handling logic, this dealing with timer and communications events, with such communications events originating from the bidirectional channels provided by an Am2950 communicating with the host BBC Micro at a stated 160 KB per second.
Reviewers were generally positive about the Unix functionality provided, with compilers, linkers, editors and other tools being included with the system. However, such praise was tempered by a disappointment with the responsiveness of the system, one reviewer calling "the frequent short pauses fatiguing", another lamenting the "four minutes (no less!) to log on" and that "[w]hen using the screen editor 'vi' , the regular transfer of data to disc, unnoticeable on most systems, takes about three seconds on the Unicorn". Such performance issues were identified as being consequences of the architecture of the expansion, with the hard and floppy drives not being directly connected to the Unicorn hardware, but instead being accessed via the 1 MHz bus connection to the BBC Micro to which the drives were connected. With the initial configuration of 256 KB of RAM, insufficient memory was available to cache data transferred from the hard disk, with the larger configurations of 512 KB and 1 MB being anticipated as potentially alleviating such issues. Another concern was the behaviour of the key, this reported as losing the Unix session. Despite reservations, the impression of using the Unicorn was described as follows: "If you forget that the processor is next to you, instead of in the basement, it feels like Unix on a VAX. It responds at about the same speed, and at times I couldn't believe a 68000 was in there."
The Unix-based Unicorn product was the basis of a multi-user network solution connecting four or eight BBC Micros together over an Econet local area network, offering electronic mail connectivity between sites over the telephone network, with Torch emphasising the use of System III as opposed to Xenix as a way of benefiting more directly from AT&T's support for the operating system. With Torch having upgraded the Unicorn to support a 10 MHz 68000 and more memory, with 512 KB of RAM supporting a single user, or with 1 MB of RAM supporting multiple users, the Unicorn effectively offered Unix as an option for the BBC Micro for around £3500, with the ability to host other BBC Micros for an additional £500 for the extra RAM and around another £1000 for additional software.
Pursuing a similar market approach to that also pursued by the Acorn Cambridge Workstation, the HDP68K was aimed at and apparently bought by "big customers" like universities and companies wanting to "take the load off the mainframes". In contrast to the Acorn Cambridge Workstation never offering the Unix system promised by Acorn, the HDP68K only appears to have been advertised as supporting Unix or the UCSD p-System. However, CP/M 68K and Tripos were mentioned as possible alternatives.
By the time of the introduction of the Torch Triple X workstation, the Unicorn was reportedly "the UK's best UNIX seller".
Torch 700 series
The Torch 725 was effectively a repackaging of the Torch Unicorn and C-68000 systems as a complete workstation with high-resolution monitor, and 102-key keyboard. Pricing (in 1986) ranged from £5650 for the base model to £6050 for the 725/U including Unix. The 725 was one model in Torch's 700 series of Unix-based workstations, with Torch's 300 series being a range of network terminals.
Torch Triple X
The Triple X workstation was a Unix-based system based on an 8 MHz Motorola 68010 CPU with 68451 memory management unit and 68450 direct memory access controller, fitted with 1 MB of RAM (expandable to 7 MB), a 720 KB floppy disk drive, a 20 MB hard disk drive, and network interfaces, powered by a single cable also supplying the accompanying 10-inch high-resolution colour monitor. The machine itself employed a modular construction where the base functionality on the main processor/memory board was augmented with a "ring" providing the power supply, fan and disks, and this could be augmented with additional rings providing extra drives or VME bus peripherals, or it could be removed to provide a diskless workstation.
The modular design of the machine had been informed by a process begun early in the development of Torch's "revolutionary new product family, coded XXX" in 1984, after Torch's chairman, Bob Gilkes, received an unsolicited letter from industrial designer John Hawker of Design Technology who convinced Gilkes, who subsequently left Torch, and then technical director, Ray Anderson, of the merits of engaging a designer early in the product development process. Alongside leveraging benefits in the practical aspects of cost management, production and maintenance, the design sought to communicate "a watershed product" in the company's history that would provide "a corporate style for future products" and would accommodate different product configurations.
Alongside the main processor system, and reminiscent of Torch's previous products involving the BBC Micro, a service processor (a 6303 with on-chip RAM and ROM) controlled the video and sound systems, keyboard and mouse, serial and 1 MHz bus, and the real-time clock. A total of 64 KB of video memory was provided, separate from the main system memory, part of which was used to act as a dual-ported communications channel between the main and system processors. The system offered a choice of display resolutions: 720×512 pixels in 2 colours, 720×256 in 4 colours, and 360×256 in 16 colours, with the 4-colour mode being the default. Colours could be chosen from a 256-colour (RGB332) palette, dynamically adjusted, and the software supported halftones to give the impression of a wider range of colours.
The Unix implementation delivered with the system was a UniSoft Systems' UniPlus+ Unix System V, ported for Torch by Root Computers Limited, offering System V compatibility with Berkeley enhancements, together with enhancements by Root to provide direct memory access for disk transfers and code sharing between processes. Torch's enhancements included bitmapped display support and the MMI (man-machine interface), parts of which augmented the kernel with "manager modules" that provided support for window management, keyboard and mouse interaction, fonts, menus, graphics, and so on. The desktop manager offering the graphical environment was a separate process.
Various applications were available for the Triple X including Torch's own Telecomms Manager and the Informix relational database system. To support graphical interaction with the Unix-based system, the OpenTop environment offered a "Macintosh-style desk-top" featuring a menu bar, desktop icons, and multiple overlapping resizable windows, with windows supporting existing terminal-based applications as well as applications written to take advantage of the OpenTop facilities.
Notable aspects of the hardware, at least for the era, included the "soft" power switch: a touch-sensitive button monitored by the service processor that would initiate the shutdown procedure that, upon completion, would result in the power being switched off under software control. The machine was also the first microcomputer to include an X25 data communications port, this being provided alongside Ethernet, RS423 and telephone ports, with the latter being provided to support an internal telephone expansion offering data and voice functionality. This expansion, having been designed for earlier Torch systems, relied on the provision of the 1 MHz bus in the machine.
A CPU upgrade board featuring a 68020 and floating point co-processor was available, utilising the 68010 socket, albeit limiting the external data path of the CPU to the 16-bit bus supported by the system board. Pricing of the base system without monitor was £3995, with 10-inch and 13-inch colour displays, made by Sony but using a case specially designed for the Triple X, being supplied for £699 and £799 respectively.
Initial sales projections for the machine were conservatively estimated at 5000 units per year. The Triple X found sales in a subsidiary of BT called BT Fulcrum, with a £500,000 order being placed in 1986 to supply workstations to other BT divisions. BT Fulcrum, who were manufacturing small Unix-based computers in Birmingham under licence from Bleasdale Computer Systems Limited, negotiated similar manufacturing rights for the Triple X. BT would eventually produce its own 68020- and 68030-based Unix systems - the M6320 (a "desk-top model"), M6520 and M6530 - comprising the M6000 range, apparently mostly aimed at multi-user timesharing as opposed to the workstation emphasis of the Triple X.
Torch Quad X
The Quad X workstation upgraded the Triple X specification to a 16.67 MHz 68020 CPU, 68881 floating-point unit, 68851 memory management unit, and a Torch-developed RISC-based direct memory access microcontroller known as OpenChip implemented using a gate array, fitted with 4 MB of RAM (expandable to 16 MB) and an 80 MB hard drive. Similar display capabilities to the Triple X were provided, with a system upgraded to a 20 MHz CPU supporting a higher 1024×768 pixel resolution. SCSI, Ethernet and X.25 interfaces were provided. The Unix system provided by the Quad X was based on Unix System V release 2.2, and although the OpenTop user interface was provided, the X Window System version 11 release 2 was available together with the X-Desktop desktop manager. Pricing started at £6995 with monitors from £1000.
Torch QS and QM series
A similar combination of Motorola chipset, OpenChip DMA controller, VME bus, storage, and network interfaces was marketed by Torch Technology in 1990 as the QS product family. The QS1000 was a 68010-based system reminiscent of the Triple X with 2 MB of RAM, 80 MB hard drive and 720 KB 5.25-inch floppy drive running the OpenTop environment, and the QS2000 was a 68020-based system (upgradeable to the 68030) with 4 MB of RAM, 80 MB hard drive and 720 KB 5.25-inch floppy drive running the Y-OpenTop environment on top of the X Window System. On such systems, Torch's Unix product offered demand-paged virtual memory and BSD enhancements.
A server product, the QM2000, was largely similar to the QS2000 but emphasised multi-user facilities, offering ten RS-232C serial ports and aiming to support "the processing needs of two to 10 concurrent users", ostensibly providing a X Window System interface on every user terminal. Pricing started at £2,000 for the QS1000, £4,000 for the QS2000, and £5,500 for the QM2000.
X-OpenTop and X-Sun
Trading as Torch Technology, the company made an X Window System server product for Sun workstations, X-Sun, based on X11 release 2 and eventually release 3 for Sun-3 and Sun-4 workstations. This product was complemented by an X-based version of the OpenTop desktop manager as a separate product known as X-OpenTop.
RSVP
The RSVP (Raster Scan Video Processor) board, introduced for £1400 in 1988, was a video processing board for the Apple Macintosh II computer, featuring support for 8 bpp (bits per pixel) video input, a frame store, overlaying, and general image processing using a TMS320C25 digital signal processor, with 8 bpp video output employing a 24 bpp palette. Three cards could be combined to support 24 bpp output.
Popular culture
The Torch 300 series featured in the episode Wheelman of the British TV detective series Dempsey and Makepeace.
References
Notes
Other references
External links
Torch Computers website
Defunct computer companies of the United Kingdom
Defunct companies based in Cambridgeshire
Science and technology in Cambridgeshire
South Cambridgeshire District |
49801965 | https://en.wikipedia.org/wiki/1918%20New%20Year%20Honours | 1918 New Year Honours | The 1918 New Year Honours were appointments by King George V to various orders and honours to reward and highlight good works by citizens of the British Empire. The appointments were published in The London Gazette and The Times in January, February and March 1918.
Unlike the 1917 New Year Honours, the 1918 honours included a long list of new knights bachelor and baronets, but again the list was dominated by rewards for war efforts. As The Times reported: "The New Year Honours represent largely the circumstances of war, and, perhaps, as usual, they also reflect human nature in an obvious form. The list is one of the rare opportunities for the public to scan the names of soldiers who have distinguished themselves in service."
The recipients of the Order of the British Empire were not classified as being within Military or Civilian divisions until following the war.
The recipients of honours are displayed here as they were styled before their new honour, and arranged by honour, with classes (Knight, Knight Grand Cross, etc.) and then divisions (Military, Civil, etc.) as appropriate.
United Kingdom and British Empire
Viscount
Lord Marmaduke Furness, by the name, style, and title of Viscount Furness, of Grantley, in the West Riding of the county of York. Chairman of Messrs.Furness Withy, and Co., who have rendered valuable services to the State with reference to shipping and have rendered possible immense economies. Interested in other shipping, shipbuilding, steel and iron, and colliery undertakings, and director of several important industrial concerns. Obtained an appointment in the Remount Dept. with the rank of captain in 1915. Maintains a hospital of 250 beds for officers.
Baron
The Rt. Hon. Sir Frederick Cawley by the name, style and title of Baron Cawley, of Prestwich, in the county Palatine of Lancaster. Chancellor of the Duchy of Lancaster, and MP for Prestwich Division of Lancashire since 1895, Chairman of the Liberal War Committee and a member of the Dardanelles Commission.
Sir John Brownlee Lonsdale by the name, style and title of Baron Armaghdale, of Armagh, in the County of Armagh. MP for Mid Armagh since 1900. Honorary Sec. to the Irish Unionist Party. Has many business interests in the north, being a director of the Lancashire and Yorkshire Bank and vice-chairman of the Manchester Ship Canal Warehousing Company. High Sheriff of County Armagh in 1895.
Almeric Hugh Paget, by the name, style and title of Baron Queenborough, of Queenborough, in the County of Kent. At the outbreak of war founded the Almeric Paget Military Hospital Massage Corps. Elected MP for Cambridge in January 1910, and retained his seat until a few months ago, when he resigned to create a vacancy for Sir Eric Geddes, on his appointment as First Lord of the Admiralty.
Sir James Woodhouse by the name, style and title of Baron Terrington, of Hudderefield, in the County of York. Has been a Railway Commissioner since 1906, and was previously for 11 years Liberal member for Huddersfield. Was Mayor of Hull in 1891. Knighted in 1895.
Privy Councillor
The King appointed the following to His Majesty's Most Honourable Privy Council:
Lord Hugh Cecil
Sir Henry Craik
Sir Gordon Hewart
Maj. Sir Henry Norman
Tom Richards
Lord Edmund Talbot
Baronetcies
The Hon. Justice Dunbar Plunket Barton Retiring Judge, Chancery Division, Ireland. Sat as MP for Mid Annagh from 1891 to 1900. Solicitor-General for Ireland.
Alec Black. Supported local charities and efforts to encourage food production; has assisted the Government in the promotion of the fishing industry.
Edward Tootal Broadhurst, Chairman of Tootal Broadhurst, LCC. (Ltd.), cotton spinners, manufacturers, and merchants, Manchester, which firm has allocated large sums for research and education. Leader in all local war movements.
James Craig Lt.-Col. Craig represented East Down as a Unionist since 1906. He served in the South African War and was Q.M. General, 36th Ulster Division, from 1915 to 1916.
Thomas Cope, Chairman of Leicestershire County Council since 1908. An original member of the local Territorial Force Association, and a leading Unionist
The Rt. Hon. Sir Henry Dalziel MP for Kirkcaldy Burghs since 1892. Managing director of Reynolds's Newspaper.
Alfred Herbert Dixon, Chairman of the Cotton Control Board. Chairman and managing director of the Fine Cotton Spinners and Doublers' Association (Limited), and a director of other companies. His services have always been freely placed at the disposal of the Board of Trade on matters connected with the cotton industry.
The Rt. Hon. Ellis Jones Ellis-Griffith MP for Anglesey since 1895. Was Under-Sec. to the Home Office from 1912 to 1915, before which he was chairman of the Welsh Liberal Party in the House of Commons.
Sir Joseph Lawrence. Chairman of Linotype and Machinery (Limited) and of International Linotype (Limited). One of the pioneers of the Manchester Ship Canal; Sheriff of the City of London, 1900–1. Unionist MP for Monmouth Boroughs, 1901–6.
John Leigh. A leading figure in the Lancashire cotton trade. Has been a generous supporter of war efforts and last year gave a memorial hospital at Altrincham to the British Red Cross Society for the use of 100 wounded officers and donated 50,000 to the Minister of Pensions to provide institutional treatment for disabled soldiers.
Frederick William Lewis. Deputy-chairman of Furness Withy, and Co., Chairman of many other shipping companies, and director of 20 shipping, shipbuilding, and insurance companies.
Sir Francis Lowe Unionist member for the Edgbaston Division of Birmingham since 1898.
Sir George Riddell Director of the News of the World, George Newnes, Ltd. and other publishing firms. Knighted in 1909. As vice-chairman of the Newspaper Conference, Newspaper Proprietors' Association and Newspaper Society he has rendered important services in focusing correspondence between the Government and the Press.
Sir James Ritchie, Lord Mayor of London. (His name already appeared in some works of reference as a baronet, and his inclusion in the present honours list is intended to regularize an informality in the previous title.)
The Rt. Hon. Sir Frederick Edwin Smith Attorney-General since 1915. Elected MP for Walton Division of Liverpool, 1906; took silk and became a bencher of Gray's Inn, 1908.
Col. Alexander Sprot Commanded Carabiniers (6th Dragoon Guards) in the South African War, having previously served in the Afghan War, 1879–80. Also mentioned in dispatches during the present war. Contested East Fife twice in 1910 as a Unionist.
John Stewart-Clark Director of Clark and Co. (Limited) and of the Scottish Provident Institution. Member of the Royal Company of Archers. Chairman of the local War Pensions Committee and of the local Red Cross Society in Linlithgowshire.
Thomas Edward Watson Has been three times President of the Cardiff Chamber of Commerce. President of the South Wales District Committee for home supplies of coal and coke, and of the Committee for war supplies of coal to France.
Herbert James Whiteley Unionist member for Mid-Worcestershire since 1916, and for Ashton-under-Lyne 1895–1906. Ex-Mayor of Blackburn and High Sheriff of Worcestershire, 1913–14.
John Wood Unionist MP for Stalybridge since 1910. High Sheriff of Herefordshire in 1900. Strong supporter of the Unionist cause in North Derbyshire.
Knight Bachelor
Robert N. Anderson, Mayor of Derry and a member of the Irish Convention
William Nicholas Atkinson, lately Divisional Inspector of Mines. A leading mining engineer who has contributed largely to a knowledge of the dangers of coal dust in mines. Joint author of a well-known book on explosions in coal mines.
Dr. Barclay Josiah Baron Twice Lord Mayor of Bristol and an energetic promoter of the War Loan.
James Bird, Clerk of the London County Council
James Boyton Unionist MP for East Marylebone since 1910. Member of the London County Council, 1907–10, and a past president of the Auctioneers' and Estate Agents' Institute
Edmond Browne, standing counsel to a number of trade unions who has rendered important services in regard to the Insurance Acts.
Robert Bruce, Editor of The Glasgow Herald, London and Parliamentary correspondent
James Campbell, Chairman of the North of Scotland College of Agriculture and a governor of the Technical College, Aberdeen. Member of the General Committee of the Church of Scotland.
Emsley Carr, Editor and part proprietor of the News of the World and vice-chairman of The Western Mail.
William Henry Clemmey, Mayor of Bootle.
David S. Davies, formerly High Sheriff of Denbighshire; Chairman of the County Appeal Tribunal and Pensions Committee. Treasurer of the King Edward VII Welsh National Memorial Association.
Arthur Fell MP for Great Yarmouth. Author of pamphlets on fiscal question. Chairman of House of Commons Channel Tunnel Committee.
John Galsworthy, novelist and playwright of much distinction. Since the war, he has written in the public service on behalf of various patriotic and humanitarian objects. (Declined knighthood.)
S. Archibald Garland, Mayor of Chichester 1912–18.
Charles Henry Gibbs, Mayor of Lambeth in 1907-08 and 1914–16. Leader of the Unionist Party in Lambeth since 1900.
Ernest W. Glover, worked at the Ministry of Shipping since its formation, having previously been a member of the Admiralty Transport Advisory Committee.
William Henry Hadow Principal of Armstrong College, Newcastle upon Tyne. Member of the Council of the Royal College of Music. Edited, and wrote one volume of the Oxford History of Music. Member of the Commission on Welsh Education.
Anthony Hope Hawkins, novelist and playwright, known as "Anthony Hope" to his readers
Thomas Jeeves Horder Has made valuable contributions to science in bacteriology.
John Morris-Jones Professor of Welsh at the University College of North Wales, Bangor. A member of the Carnarvonshire Education Committee and the Anglesey County Council Has written extensively on Welsh language and literature.
William F. Jury, Organized a supply of cinema films of the war on the Western front and did work for the last War Loan and in organizing war charities.
John Scott Keltie Well-known geographer. President of the Geographical Section of the British Association; awarded the Cullun Gold Medal of the American Geographical Society and the gold medals of the Paris and Royal Scottish Geographical Societies. Received the Victoria Medal of the Royal Geographical Society (1917).
John Lavery Member of the Royal Scottish Academy. the Royal Hibernian Academy, the Société Nationale des Beaux-Arts, Paris. Chevalier of the Crown of Italy and of Leopold of Belgium. His works appear in the National Galleries of Dublin, Rome, Berlin, and Brussels, and in the Corporation Galleries of Glasgow, Manchester, and Bradford.
John Lithiby Legal Adviser to the Local Government Board. A member of the South-Eastern Circuit.
Sidney James Low Lecturer on Imperial and Colonial History, University of London. A well-known author and journalist; editor of the St. James's Gazette, 1888–1897, and for some time literary editor of The Standard. Has done much important work as special correspondent at home and abroad.
George Lunn, Lord Mayor of Newcastle upon Tyne. Has given valuable help in the organization of labour for the manufacture of munitions and the promotion of the War Loan at Newcastle.
Edwin Landseer Lutyens Architect and artist. Member of committee appointed to advise the Government of India on the site of Delhi in 1912.
James William McCraith, Manager for 40 years of the Nottingham Savings Bank and since 1904 leader of the Unionist Party in Nottingham.
G. Charles Mandleberg, Chairman and managing director of J. Mandleberg and Co. Ltd., Manchester, and chairman of the Salford War Savings Committee and Food Economy Committee.
Thomas Rogerson Marsden, Managing director of Platt Brothers, Oldham, a firm which has had many war contracts.
Henry Milner-White A prominent citizen of Southampton and Treasurer of University College there.
Alpheus Cleophas Morton Architect and surveyor educated in Canada. MP for Sutherlandshire since 1906. Has been a member of the Corporation of the City of London since 1882
Edward M. Mountain, Chairman of the Eagle Star and British Dominion Company. Has been of service to the Government in connection with War Loans and Insurance.
David Murray President of the Royal Institute of Painters in Water Colours.
Herbert Nield Recorder of York. MP for the Ealing Division, Deputy Chairman of Middlesex magistrates; Chairman of Middlesex Appeal Tribunal
James George Owen, Mayor of Exeter for the fourth successive year. Has taken an active part in local war work, and is chairman of many committees. Has given a fleet of ambulances to Devon battalions in France and Salonika
John Phillips Professor Emeritus of Obstetric Medicine, King's College, London, and Consulting Obstetric Physician, King's College Hospital
Edmund Bampfylde Phipps Principal Assistant Sec. of the Elementary Education Branch of the Board of Education, and late General Sec. to the Ministry of Munitions
Philip Edward Pilditch, Head of the firm of Pilditch, Chadwick, and Co., architects. Member of the London County Council since 1907, and vice-chairman, 1913–14. Chairman of the Parliamentary and Local Government Committees
Thomas Putnam, Managing director of the Darlington Forge Company. Founder and chairman of Darlington Sailors and Soldiers' Welfare Bureau. A leader of the local Unionist Party
Stephen B. Quinn Mayor of Limerick
Patrick Rose-Innes Recorder of Sandwich and Rampate since 1905. Comm. of Assize, S.E. Circuit, 1914–15
William Watson Rutherford Unionist MP for West Derby Division of Liverpool since 1903. Head of the firm of Rutherfords of Liverpool and London. Elected to the Liverpool City Council in 1895. Lord Mayor of Liverpool, 1902-3
William Henry Seager, Vice-Chairman of the Cardiff and Bristol Channel Shipowners' Association. Governor of King Edward VII and other hospitals, and chairman of the Cardiff Association for the Blind
Robert Russell Simpson, of Edinburgh, for over 40 years deputy-clerk of the Free and United Free Church, Scotland. One of the founders of tho Edinburgh Industrial Brigade for working lads. Writer to the Signet.
George Frederick Sleight, of Grimsby. One of tho largest trawler owners in the world; he has rendered valuable national services in the promotion of the fish supply.
Arthur Spurgeon Managing director of Messrs. Cassell and Co., publishers, and chairman of the Croydon magistrates; special Parliamentary representative of the National Press Agency in London
Lt.-Col. Harold Jalland Stiles, RAMC. Surgeon to the Royal Edinburgh Hospital for Sick Children and to the Chalners Hospital, Edinburgh
Edmund Stonehouse, three-time Mayor of Wakefield. Has done much valuable work locally on various committees
Henry Tozer, Alderman of the City of Westminster. One of the leaders of the variety theatre industry. Chairman of the Unionist Party in the Strand Division.
Leslie Ward, "Spy" of Vanity Fair from 1873–1909. A member of the Royal Society of Portrait Painters
Howard Kingsley Wood, Member for Woolwich of the London County Council; a prominent Wesleyan; Deputy-Chairman of the London Pension Authority, and chairman of the London Insurance Committee
Alfred William Yeo MP for Poplar since 1914. Has represented Limehouse on the L.C.C. for seven years.
British India
Arthur Robert Anderson
Edward Fairless Barber, Additional Member of the Council of the Governor of Madras for making Laws and Regulations
Thomas William Birkett, of Bombay
Col. Harry Albert Lawless Hepper, Major, Royal Engineers, retired.
Thomas Frederick Dawson-Miller Chief Justice of the High Court of Judicature at Patna
Binod Chunder Mitter, Barrister-at-Law, lately Officiating Advocate General, Bengal, and a Member of the Council of the Governor for making Laws and Regulations
Henry Adolphus Byden Rattigan, Chief Judge of Chief Court, Punjab
Colonies, Protectorates, etc.
Maj. Andrew Macphail, Canadian Army Medical Corps (Overseas Forces), Professor of the History of Medicine, McGill University, Montreal
Maj.-Gen. Donald Alexander Macdonald Q.M.-General, Canadian Militia
Admiral Charles Edmund Kingsmill (Retired), Director of Naval Service in the Dominion of Canada
William James Gage, of Toronto
The Hon. Charles Gregory Wade Agent-General in London for the State of New South Wales
Frederick William Young Agent General in London for the State of South Australia
The Hon. Simon Fraser, formerly a Member of the Senate of the Commonwealth of Australia
The Hon. William Fraser, Minister of Public Works of the Dominion of New Zealand
John Robert Sinclair, representative of New Zealand on the Royal Commission on the Natural Resources, Trade and Legislation of certain portions of His Majesty's Dominions
The Hon. John Carnegie Dove-Wilson Judge President, Natal Provincial Division, Supreme Court of South Africa
Maj. William Northrup McMillan, 25th (Service) Battalion, The Royal Fusiliers
Bartle Henry Temple Frere, the Chief Justice of Gibraltar
Victoria Cross (VC)
Maj. John Sherwood-Kelly Norfolk Reg., comd. A Battalion, Royal Inniskilling Fusiliers.
Capt. George Randolph Pearkes Canadian Mounted Rifles.
Capt. John Fox Russell late RAMC, attd. Royal Welsh Fusiliers.
Lt. Robert Gee Royal Fusiliers.
Lt. Christopher Patrick John O'Kelly Canadian Inf..
2nd Lt. (acting Lt.-Col.) Philip Eric Bent late Leicestershire Reg..
2nd Lt. (acting Capt.) Arthur Moore Lascelles, Durham Light Inf..
Sgt. John MacAulay Scots Guards (Stirling).
Sgt. George Harry Mullin Inf..
Sgt. Charles Edward Spackman, Border Reg. (Fulham).
Cpl. Colin Barron, Canadian Inf..
L. Cpl. Robert McBeath, Seaforth Highlanders (Kinlochbervie, Lairg, Sutherland).
Pte. George William Clare, late Lancers (Plumstead).
Pte. Thomas William Holmes, Canadian Mounted Rifles.
Pte. Cecil John Kinross, Canadian Inf..
Pte. Henry James Nicholas, New Zealand Inf..
Pte. James Peter Robertson, late Canadian Inf..
Lance Dafadar Gobind Singh, Indian Cav..
The Most Honourable Order of the Bath
Knight Grand Cross of the Order of the Bath (GCB)
Military Division
Army
Gen. Sir Herbert Charles Onslow Plumer
Indian Army
Gen. Sir Robert Irvin Scallon
Honorary Knight Grand Cross
Hon. Lt.-Gen. His Highness Maharaja Bahadur, Sir Pertab Singh of Jodhpur, in recognition of the services rendered by the native States of India during the War
Knight Cmdr. of the Order of the Bath (KCB)
Military Division
Royal Navy
Vice-Admiral Sir Cecil Fiennes Thursby
Rear-Admiral Alexander Ludovic Duff
Col. David Mercer Royal Marine Light Inf.
Army
Maj.-Gen. James Aylmer Lowthorpe Haldane
Maj.-Gen. Alexander Hamilton Gordon
Maj.-Gen. Herbert Edward Watts
Lt.-Gen. George Francis Milne
Maj.-Gen. Edmund Guy Tulloch Bainbridge
Maj.-Gen. Hugh Montague Trenchard
Maj.-Gen. William Hickie
Maj.-Gen. Sydney Turing Barlow Lawford
Maj.-Gen. The Hon. William Lambton
Maj.-Gen. George Montague Harper
Lt.-Gen. Frederick Rudolph Lambart, Earl of Cavan
Maj.-Gen. Arthur Edward Aveling Holland
Maj.-Gen. Harold Bridgwood Walker
Maj.-Gen. Charles Patrick Amyatt Hull
Maj.-Gen. Victor Arthur Couper
Lt.-Gen. Henry Merrick Lawson
Surg.-Gen. Sir David Bruce late Army Medical Service
Maj.-Gen. Edward Stanislaus Bulfin Col., Yorkshire Reg., for valuable services rendered in connection with the Military Operations culminating in the capture of Jerusalem
Maj.-Gen. Sir Philip Walhouse Chetwode for valuable services rendered in connection with the Military Operations culminating in the capture of Jerusalem
Australian Imperial Force
Maj.-Gen. John Monash
Col. Joseph John Talbot Hobbs
Canadian Force
Col. Sir Arthur William Currie
Col. David Watson
Maj.-Gen. Sir Richard Ernest William Turner General Ofc. Commanding Canadian Forces in the United Kingdom
New Zealand Force
Tmp Maj.-Gen. Sir Andrew Hamilton Russell
South African Force
Hon. Col. Henry Timson Lukin
Honorary Knight Cmdr.
Hon. Maj.-Gen. His Highness Maharaja Sir Ganga Singh Bahadur of Bikaner, in recognition of the services rendered by the native States of India during the War
Civil Division
Surg-Gen. William Henry Norman
Eng. Vice-Admiral George Goodwin Goodwin
Surg.-Gen. George Lenthal Cheatle
Paymaster-in-Chief John Henry George Chapple
Hon. Col. Thomas Ainslie Lunham late Cork Royal Garrison Arty. Militia
Alfred Daniel Hall, Sec. to the Board of Agriculture
Sir George Newman Principal Medical Ofc. to the Board of Education
Companion of the Order of the Bath (CB)
Military Division
Royal Navy
Rear-Admiral Thomas Dawson Lees Sheppard
Rear-Admiral James Andrew Fergusson
Rear-Admiral Allen Thomas Hunt
Rear-Admiral Vivian Henry Gerald Bernard
Rear-Admiral Edmund Hyde Parker
Capt. George Holmes Borrett
Capt. George Henry Baird
Capt. Edward Reeves
Capt. Thomas Drummond Pratt
Capt. William Wordsworth Fisher
Capt. Robert Nesham Bax
Capt. William Henry Dudley Boyle
Army
Surg.-Gen. Richard Henry Stewart Sawyer late Army Medical Service
Maj.-Gen. Reginald Byng Stephens
Maj.-Gen. Herbert Crofton Campbell Uniacke
Maj.-Gen. Philip Geoffrey Twining
Maj.-Gen. William Charles Giffard Heneker
Maj.-Gen. Thomas Herbert John Chapman Goodwin Director-General, Army Medical Service
Col. and Hon. Brig.-Gen.-General Cecil Vernon Wingfield-Stratford
Col. Robert Hammill Firth Army Medical Service
Col. Ernest Reuben Charles Butler
Col. and Hon. Surg.-Gen. Bruce Morland Skinner Army Medical Service
Lt.-Col. and Bt. Col. Frederick Smith late RAMC
Col. William John Chesshyre Butler
Col. Richard Orlando Kellett
Col. Thomas Wyatt Hale Army Ordnance Depot
Col. Herbert de Touffreville Phillips
Surg.-Gen. Henry Neville Thompson Army Medical Service
Col. Colquhoun Scott Dodgson
Col. Edwin Henry de Vere Atkinson
Lt.-Col. and Bt. Col. James Wilfred Stirling Royal Arty.
Col. Percy Agnew Bainbridge Army Ordnance Depot
Col. Anthony John Luther, Army Medical Service
Col. James Matthew Forrest Shine, Army Medical Service
Col. James Barnett Wilson Army Medical Service
Col. Foster Reuss Newland Army Medical Service
Col. Hugh Champneys Thurston Army Medical Service
Col. Hugh Gilbert Casson
Col. Cecil Lothian Nicholson
Col. The Hon. Charles Strathavon Heathcote-Drummond-Willoughby Reserve of Ofc.s
Hon. Col. Charles Loftus Bates Yeomanry
Tmp Col. Alfred Herbert Tubby Army Medical Service
Tmp Col. Sidney Maynard Smith Army Medical Service
Lt.-Col. and Bt. Col. Cecil Edward Pereira Coldstream Guards
Maj. and Bt. Col. Seymour Hulbert Sheppard Royal Engineers
Lt.-Col. and Bt. Col. John Ponsonby Coldstream Guards
Lt.-Col. and Bt. Col. Edward Douglas, Lord Loch Grenadier Guards
Lt.-Col. and Bt. Col. Hamilton Lyster Reed Royal Arty.
Lt.-Col. and Bt. Col. Edward Henry Willis Royal Arty.
Lt.-Col. and Bt. Col. Robert James Bridgford Shropshire Light Inf.
Lt.-Col. and Bt. Col. The Hon. John Francis Gathorne-Hardy Grenadier Guards
Maj. and Bt. Col. Arthur Crawford Daly, West Yorkshire Reg.
Maj. and Bt. Col. James Ronald Edmondstone Charles Royal Engineers
Lt.-Col. and Bt. Col. Alexander Ernest Wardrop Royal Arty.
Maj. and Bt. Col. Warren Hastings Anderson, Cheshire Reg.
Lt.-Col. and Bt. Col. Arthur Ernest John Perkins, Royal Arty.
Lt.-Col. and Bt. Col. Frederick Cuthbert Poole Royal Arty.
Maj. and Bt. Col. Thomas Herbert Shoubridge Northumberland Fusiliers
Lt.-Col. and Bt. Col. John Campbell Cameron Highlanders
Lt.-Col. and Bt. Col. Cyril Maxwell Ross-Johnson Royal Arty.
Lt.-Col. and Bt. Col. John Guy Rotton Royal Arty.
Lt.-Col. and Bt. Col. Edward Spencer Hoare Nairne Royal Arty.
Lt.-Col. and Bt.-Col. Percy Orr Hazelton Army Service Corps
Lt.-Col. and Bt. Col. Hugo Douglas de Pree Royal Arty.
Lt.-Col. and Bt. Col. Henry Hugh Tudor Royal Arty.
Lt.-Col. and Bt. Col. Hugh Maude de Fellenberg Montgomery, Royal Arty.
Maj. and Bt. Col. Nelson Graham Anderson Army Service Corps
Lt.-Col. and Bt. Col. George Jasper Farmar Worcestershire Reg.
Lt.-Col. and Bt. Col. Harry Dudley Ossulston Ward Royal Arty.
Lt.-Col. and Bt. Col. George Sidney Clive Grenadier Guards
Lt.-Col. and Bt. Col. Ben Atkinson Royal Arty.
Lt.-Col. and Bt. Col. Percy Pollexfen de Blaquiere Radcliffe Royal Arty.
Lt.-Col. and Bt. Col. Alexander Anderson McHardy Royal Arty.
Lt.-Col. and Bt. Col. Julian McCarty Steele Coldstream Guards
Maj. and Bt. Col. Samuel Herbert Wilson Royal Engineers
Lt.-Col. and Bt. Col. Charles William Gwynn Royal Engineers
Maj. and Bt. Col. Cyril John Deverell, West Yorkshire Reg.
Lt.-Col. and Bt. Col. Louis James Lipsett Royal Irish Reg.
Lt.-Col. and Bt. Col. Neville John Gordon Cameron Cameron Highlanders
Lt.-Col. and Bt. Col. Robert Clement Gore Argyll and Sutherland Highlanders
Maj. and Bt. Col. Bartholomew George Price Royal Fusiliers
Lt.-Col. and Hon. Col. Charles Joseph Trimble Reserve
Lt.-Col. Arthur Russell Aldridge RAMC
Lt.-Col. Wilfred Spedding Swabey Army Service Corps
Lt.-Col. Edward Charles Massy Royal Arty.
Lt.-Col. Percy Douglas Hamilton Royal Arty.
Lt.-Col. Charles William Compton Somerset Light Inf.
Tmp Lt.-Col. Alexander Gibb, Royal Engineers
Maj. and Bt. Lt.-Col. Hugh Jamieson Elles Royal Engineers, and Tank Corps
Maj. Stanley Fielder Mott, King's Royal Rifle Corps
Maj. James Gilbert Shaw Mellor
Tmp Brig.-Gen.-General Raymond de Candolle, Special List
Col. Alexander Dunstan Sharp RAMC
Lt.-Col. Thomas Finlayson Dewar, RAMC
Surg.-Gen. Francis John Jencken Army Medical Services
Col. Stewart Dalrymple Cleeve, late Royal Engineers
Lt.-Col. and Bt. Col. Arthur James Kelly, late Royal Engineers
Col. Bridges George Lewis
Col. Reynell Hamilton Bayley Taylor, Army Ordnance Depot
Col. Frederick Charles Lloyd
Col. Richard William Breeks
Col. George Francis Henry le Breton-Simmons
Col. Geoffrey Dominic Close, Royal Engineers
Col. Dudley Howard Ridout
Col. William Coates RAMC
Col. Arthur Cecil Currie
Lt.-Col. and Bt. Col. Meade James Crosbie-Dennis, Royal Arty.
Col. Claude John Perceval Royal Arty.
Col. George Fraser Phillips
Lt.-Col. and Hon. Col. William Charles Wright (retired), Royal Arty.
Maj. and Bt. Col. Robert Hutchison Dragoon Guards
Tmp Col. Howard Henry Tooth Army Medical Service
Maj. and Bt. Col. Basil Ferguson Burnett-Hitchcock Nottinghamshire and Derbyshire Reg.
Lt.-Col. William George Sackville Benson, Army Pay Dept.
Lt.-Col. Achilles Samut Army Ordnance Depot
Lt.-Col. Reginald Seward Ruston, Army Pay Dept.
Lt.-Col. and Bt. Col. Julian John Leverson late Royal Engineers
Tmp Honorary Lt.-Col. George Seaton Buchanan RAMC
Maj. and Bt. Lt.-Col. Harry Osborne Mance Royal Engineers
Tmp Lt.-Col. Andrew Balfour RAMC
Maj. and Bt. Lt.-Col. Robert Markham Carter, Indian Medical Service
Col. Knightley Stalker Dunsterville, late Indian Ordnance Dept.
Col. Andrew Laurie Macfie, late Liverpool Reg.
Col. Patrick William Hendry, late Highland Light Inf. and Volunteer Force
Lt.-Col. Ernest William Greg, Cheshire Reg.
Lt.-Col. Walter Robert Ludlow late Royal Warwickshire Reg.
Col. William Charles Douglas late Royal Highlanders
Lt.-Col. George Llewellen Palmer, late Yeomanry
Australian Imperial Force
Col. Henry Gordon Bennett
Col. Charles Henry Brand
Col. Thomas William Glasgow
Col. James Heane
Col. Granville de Laune Ryrie
Col. Alfred Sutton Australian Army Medical Corps
Canadian Force
Col. Frederick Gault Finley, Canadian Army Medical Service
Col. Alexander McDougall, Canadian Forestry Corps
Lt.-Col. Edward Whipple Bancroft Morrison Canadian Arty.
New Zealand Force
Col. Charles Mackie Begg New Zealand Medical Corps
Indian Army
Lt.-Col. and Bt. Col. Herbert Campbell Holman
Lt.-Col. and Bt. Col. William Bernard James
Lt.-Col. and Bt. Col. Alfred William Fortescue Knox
Lt.-Col. and Bt. Col. Frederic George Lucas Gurkhas
Maj.-Gen. Henry John Milnes MacAndrew
Col. Francis Clifton Muspratt
Col. Charles Gordon Prendergast
Col. Charles Wyndham Somerset
Lt.-Col. and Bt. Col. Robert Edward Vaughan
Civil Division
Rear-Admiral The Hon. Edward Stafford Fitzherbert
Surg.-Gen. Arthur Edmunds
Surg.-Gen. William Wenmoth Pryn
Surg.-Gen. James Lawrence Smith
Eng. Rear-Admiral William Frederick Pamphlett
Eng. Rear-Admiral Edouard Gaudin
Capt. Sir Douglas Egremont Robert Brownrigg
Col. Commandant Charles Ernest Curtoys, Royal Marine Light Inf.
Capt. Stanley Talbot Dean-Pitt
Capt. Frank Osborne Creagh-Osborne
Deputy Surg.-Gen. Daniel Joseph Patrick McNabb
Paymaster-in-Chief James Bramble
Col. Charles Grisborne Brittan, Royal Marine Light Inf.
Eng. Capt. Robert Bland Dixon
Frederick William Kite
Maj. Arthur Handley, retired pay, Reserve of Ofc.s Assistant Director of Arty., War Office
Charles Henry Wellesley, Baron Nunburnholme HM Lt. for the East Riding of Yorkshire, President, East Riding Territorial Force Association
Charles Mackinnon Douglas Chairman, Lanarkshire Territorial Force Association
Col. Henry Whistler Smith-Rewse Retired pay, Sec., Devonshire Territorial Force Association
Col. Richard Thompson, retired pay, Sec., Cheshire Territorial Force Association
Maj. Godfrey Richard Conyngham Stuart Retired pay, Sec., Suffolk and Cambridgeshire Territorial Force Associations
Capt. Henry Littleton Wheeler Retired pay, Sec., Staffordshire Territorial Force Association
John Anderson, Sec. of the National Health Insurance Commission, England, now Sec. to the Ministry of Shipping
Horace Perkins Hamilton, Private Sec. to the Chancellor of the Exchequer
Arthur Henry Payne, Comptroller of Companies Dept., Board of Trade
Basil Alfred Kemball-Cook, Admiralty
Francis Lewis Castle Floud, Assistant Sec. to the Board of Agriculture, now acting as Director of Local Organisation Division of Food Production Dept.
Lt.-Col. Walter Edgeworth-Johnstone, Chief Comm., Dublin Metropolitan Police
Ewan Francis Macpherson, Legal Member of the Local Government Board for Scotland
Arthur Hamilton Norway, Assistant Sec. to the General Post Office
William Sanger, Assistant Sec. to The Ministry of Pensions
Maurice Lyndham Waller, Prison Comm., Head of Prisoners of War Division
Mark Manley Waller, Director of Stores, Admiralty
The Most Exalted Order of the Star of India
Knight Cmdr. (KCSI)
George Rivers Lowndes an Ordinary Member of the Council of the Governor-General of India
His Highness Maharajadhiraja Maharawal Jawahir Singh Bahadur of Jaisalmer, Rajputana
Sir Archdale Earle Indian Civil Service, Chief Comm. of Assam
Stuart Mitford Fraser Indian Civil Service, Political Dept., Resident at Hyderabad
John Stratheden Campbell Indian Civil Service, Junior Member, Board of Revenue, United Provinces of Agra and Oudh, and a Member of the Council of the Lieutenant-Governor for making Laws and Regulations
Frank George Sly Indian Civil Service, Comm., Central Provinces
In recognition of the services rendered by the native States of India during the War
His Highness Maharaja Lakendra Govind Singh Bahadur of Datia
His Highness Maharajadhiraja Sri Sawai Maharaj Rana Udai Bhan Singh Lokindar Bahadur of Dholpur
Companion (CSI)
Henry Cecil Ferard Indian Civil Service, Comm. of Allahabad, United Provinces, and a Member of the Council of the Lieutenant-Governor for making Laws and Regulations
Charles Evelyn Arbuthnot William Oldham, Indian Civil Service, Comm., Patna Division, Bihar and Orissa, and an Additional Member of the Council of the Lieutenant-Governor for making Laws and Regulations
Evan Maconochie, Indian Civil Service, Agent to the Governor, Kathiawar, Bombay Presidency
Francis Coope French, Indian Civil Service, Comm., Dacca Division, Bengal
Lt.-Col. and Bt. Col. Charles William Grant Richardson, Indian Army, Deputy Q.M.-General in India, lately Deputy Adjutant-General, Army Headquarters
Maj. Arthur Prescott Trevor Indian Army, Deputy Political Resident, Persian Gulf
Horatio Norman Bolton Indian Civil Service, Political Dept., Deputy Comm., Peshawar, North-West Frontier Province
Louis James Kershaw Indian Civil Service (retired), Sec., Revenue and Statistics Dept., India Office
The Most Distinguished Order of Saint Michael and Saint George
Knight Grand Cross of the Order of St Michael and St George (GCMG)
Lt.-Gen. Sir Cecil Frederick Nevil Macready Adjutant-General to the Forces
Lt.-Gen. Sir John Steven Cowans Q.M.-General to the Forces
Tmp Surg.-Gen. Sir George Henry Makins
The Hon. Sir Francis Hyde Villiers His Majesty's Envoy Extraordinary and Minister Plenipotentiary to His Majesty the King of the Belgians
Knight Cmdr. of the Order of St Michael and St George (KCMG)
Vice-Admiral Frederick Charles Tudor Tudor
Rear-Admiral Edward Francis Benedict Charlton
Rear-Admiral Sir Osmond de Beauvoir Brock
Rear-Admiral Richard Fortescue Phillimore
Maj.-Gen. Charles Tyrwhitt Dawkins
Maj.-Gen. Sir George Frederick Gorringe late Royal Engineers
Col. Robert Whyte Melville Jackson Army Ordnance Depot
Col. and Hon. Maj.-Gen. Harold Daniel Edmund Parsons Army Ordnance Depot
Surg.-Gen. William Grant Macpherson Army Medical Service
Maj.-Gen. William Henry Rycroft
Col. and Hon. Brig.-Gen.-General Francis Sudlow Garratt
Gen. Sir Henry Seymour Rawlinson
Lt.-Gen. Sir Charles Fergusson
Lt.-Gen. Sir Ronald Charles Maxwell late Royal Engineers
Lt.-Gen. Sir Launcelot Edward Kiggell
Lt.-Gen. Sir Henry Sinclair Horne
Maj.-Gen. Sir Charles St. Leger Barter
Maj.-Gen. John Adye
Maj.-Gen. Sir Edward Ritchie Coryton Graham Cheshire Reg.
Maj.-Gen. Sir Henry Fuller Maitland Wilson
Maj.-Gen. Sir Richard Cyril Byrne Haking
Maj.-Gen. Harvey Frederic Mercer
Maj.-Gen. Frederic Manley Glubb
Maj.-Gen. Charles James Briggs
Maj.-Gen. Sir George Henry Fowke
Maj.-Gen. Sir John Joseph Asser
Maj.-Gen. Richard Harte Keatinge Butler
Maj.-Gen. Richard Henry Ewart
Maj.-Gen. James Frederick Noel Birch
Maj.-Gen. John Sharman Fowler
Tmp Maj.-Gen. Philip Arthur Manley Nash
Col. and Hon. Surg.-Gen. James Murray Irwin late Army Medical Service
Col. and Hon. Surg.-Gen. James Maher late Army Medical Service
Tmp Col. James Purves Stewart Army Medical Service
Tmp Col. Thomas Crisp English Army Medical Service
Col. George James Butcher Army Ordnance Depot
Hon. Maj.-Gen. Fred Smith Royal Army Veterinary Corps
Tmp Col. Archibald Edward Garrod Army Medical Service
Lt.-Gen. Sir Herbert Eversley Belfield Col., West Riding Reg.
Maj.-Gen. The Hon. Cecil Edward Bingham
Maj.-Gen. Frederick Barton Maurice
Maj.-Gen. The Hon. Francis Richard Bingham
Col. and Hon. Surg.-Gen. Michael William Russell late Army Medical Service
Tmp Col. Charles Alfred Ballance Army Medical Service
Maj.-Gen. Louis Jean Bols For services rendered in connection with the Military Operations culminating in the capture of Jerusalem.
Australian Imperial Force
Maj.-Gen. The Hon. James Whiteside McCay Australian Imperial Force
Colonial List
His Honour Frank Stillman Barnard, Lieutenant-Governor of the Province of British Columbia
Horace Archer Byatt Civil Administrator, German East Africa
Maj.-Gen. Samuel Benfield Steele Canadian Militia
Herbert James Read Assistant Under-Sec. of State, Colonial Office
The Hon. John Mark Davies, President of the Legislative Council of the State of Victoria
Honorary Knight Cmdr.
Adly Yeghen Pasha, Minister of Education in the Egyptian Government
Companion of the Order of St Michael and St George (CMG)
Capt. Henry George Glas Sandeman
Capt. James William Combe
Capt. George Bingham Powell
Capt. Frederic Godfrey Bird
Capt. David Murray Anderson
Capt. Percy Molyneux Rawson Royds
Capt. Charles Samuel Wills
Capt. Charles Laverock Lambe
Eng. Capt. Archie Russell Emdin
Cmdr. Harold Escombe
Cmdr. Donald John Munro
Cmdr. Fitzmaurice Acton
Cmdr. Ferdinand Halford Elderton
Cmdr. Archibald Cochrane
Fleet-Paymaster Charles Edward Allen Woolley
Paymaster Tom Seaman
Fleet-Paymaster Charles Henry Rowe
Fleet-Paymaster Charles Ernest Batt
Fleet-Surgeon Edward Henry Meaden
Lt.-Col. Francis Doveton Bridges, Royal Marine Light Inf.
Maj. Henry Cleeve Benett, Royal Marine Light Inf.
Lt.-Cmdr. David George Hogarth, Royal Naval Volunteer Reserve
Col. Jonas Hamilton du Boulay Travers
Col. William Arthur Murray Thompson
Col. Cyril Henry Leigh James
Col. St. John William Topp Parker
Col. Charles Marling Cartwright Indian Army
Col. Arthur Herbert Hussey
Col. John Gordon Geddes
Lt.-Col. and Bt.-Col. Thomas James Atherton
Lt.-Col. and Bt. Col. Alexander Vaughan Payne, late Wiltshire Reg.
Col. Edward Ranulph Kenyon
Col. Walter Charteris Ross
Col. Acton Lemuel Schreiber Royal Engineers
Col. Disney John Menzies Fasson Royal Arty.
Col. George Strachan Cartwright
Col. Gardiner Humphreys
Lt.-Col. and Bt. Col. Godfrey Massy
Col. Charles Cunliffe-Owen
Col. Arundel Martyn, General List
Col. Philip Cecil Harcourt Gordon, Army Medical Service
Col. Charles Joseph MacDonald Army Medical Service
Col. Edward George Browne Army Medical Service
Col. Samuel Guise Moores Army Medical Service
Lt.-Col. and Bt. Col. Howard Ensor RAMC
Col. Colin Lawrence Macnab
Lt.-Col. and Bt. Col. Charles Stuart Wilson Royal Engineers
Lt.-Col. and Bt. Col. Herbert Edward John Brake Royal Arty.
Col. Martin Newman Turner
Maj. and Bt. Col. Clement Yatman Northumberland Fusiliers
Lt.-Col. and Bt. Col. Pomeroy Holland-Pryor Indian Army
Lt.-Col. and Bt. Col. Sydney Fortescue Metcalfe Royal Arty.
Lt.-Col. and Bt. Col. Geoffrey Herbert Anthony White Royal Arty.
Lt.-Col. and Bt. Col. Arthur Wharton Peck, Indian Cav.
Maj. and Bt. Lt.-Col. Walter Mervyn St. George Kirke Royal Arty.
Tmp Col. William Pasteur Army Medical Service
Maj. and Bt. Col. Gerald Farrell Boyd Royal Irish Reg.
Lt.-Col. and Bt. Col. Thomas Stanton Lambert, East Lancashire Reg.
Lt.-Col. and Bt. Col. John Samuel Jocelyn Percy East Lancashire Reg.
Maj. and Bt. Col. Percival Otway Hambro, Hussars
Lt.-Col. Charles Tilson Hudson, Indian Medical Service
Lt.-Col. William Bromley-Davenport Reserve
Lt.-Col. Philip John Joseph Radcliffe, Royal Engineers
Lt.-Col. Maurice Spencer, Army Ordnance Depot
Lt.-Col. George Ambrose Cardew Royal Field Arty.
Lt.-Col. Ernest Carden Freeth Gillespie Army Service Corps
Lt.-Col. Daniel Davis Shanahan RAMC
Lt.-Col. Walter Ernest Onslow Campbell Blunt, Army Pay Dept.
Lt.-Col. Henry Jenkins Brock Royal Arty.
Lt.-Col. Edward John Russell Peel Royal Field Arty.
Lt.-Col. Cecil William Davy, Royal Engineers
Lt.-Col. George Augustus Stewart Cape, Royal Field Arty.
Lt.-Col. Arthur Cecil Lowe Royal Field Arty.
Lt.-Col. Ulric Oliver Thynne Yeomanry
Lt.-Col. and Hon. Col. William Dutton Burrard, Royal Field Arty.
Tmp Lt.-Col. Edward Henry Charles Patrick Bellingham General List
Col. Ernest William Bliss Army Medical Service
Col. Alfred Ernest Conquer Keble Army Medical Service
Tmp Honorary Lt.-Col. Nathan Raw RAMC
Tmp Lt.-Col. Cecil Walter Paget Royal Engineers
Lt.-Col. Philip Leveson Gower Nottinghamshire and Derbyshire Reg.
Lt.-Col. James Anderson Highland Light Inf.
Hon. Lt.-Col. Percy George Davies, Army Ordnance Depot
Lt.-Col. Edward William Saurin Brooke Royal Arty.
Capt. and Bt. Lt.-Col. Ernest Frederick Orby Gascoigne Grenadier Guards
Maj. and Bt. Lt.-Col. Thomas Herbert Francis Price Duke of Cornwall's Light Inf.
Lt.-Col. George Birnie Mackenzie Royal Garrison Arty.
Lt.-Col. Charles Frederick Moores Army Service Corps
Col. Charles William Profeit Army Medical Service
Col. Robert James Blackham Army Medical Service
Lt.-Col. Horace Giesler Lloyd Royal Arty.
Lt.-Col. Percy Cyriac Burrell Skinner Northamptonshire Reg.
Lt.-Col. William Charles Eric Rudkin Royal Field Arty.
Lt.-Col. Bertram Hewett Hunter Cooke Rifle Brigade
Maj. and Bt. Lt.-Col. Edward Nicholson Broadbent King's Own Scottish Borderers
Maj. and Bt. Lt.-Col. Arthur Richard Careless Sanders Royal Engineers
Lt.-Col. Robert Gabbett Parker Royal Lancaster Reg.
Lt.-Col. Arthur Thackeray Beckwith Hampshire Reg.
Lt.-Col. Edward Harding Newman Royal Field Arty.
Lt.-Col. Francis Arthur Wynter Royal Garrison Arty.
Lt.-Col. John Francis Innes Hay Doyle Royal Arty.
Tmp Lt.-Col. Cyril Aubrey Blacklock General List
Lt.-Col. Edward Evans Wiltshire Reg.
Lt.-Col. Francis Douglas Logan Royal Arty.
Maj. and Bt. Lt.-Col. George Ayscough Armytage King's Royal Rifle Corps
Maj. and Bt. Lt.-Col. John Vaughan Campbell Coldstream Guards
Maj. and Bt. Lt.-Col. William Harry Verelst Darell Coldstream Guards
Maj. and Bt. Lt.-Col. Stuart William Hughes Rawlins Royal Field Arty.
Maj. and Bt. Lt.-Col. Charles Michael Browne Royal Engineers
Maj. and Bt. Lt.-Col. Llewelyn Alberic Emilius Price-Davies King's Royal Rifle Corps
Maj. and Bt. Lt.-Col. Herbert Cecil Potter Liverpool Reg.
Lt.-Col. Edward Arthur Fagan Indian Army
Tmp Lt. Col. John Anselm Samuel Gray Special List
Lt.-Col. Manners Ralph Wilmott Nightingale Indian Army
Tmp Lt.-Col. Geoffrey Harnett Harrisson Royal Engineers
Lt.-Col. Walter Bagot Pearson, Lancashire Fusiliers
Tmp Lt.-Col. Frank Percy Crozier General List
Lt.-Col. Charles William Wilkinson Royal Engineers
Lt.-Col. Arthur Ellershaw Royal Garrison Arty.
Lt.-Col. Charles Richard Newman Royal Arty.
Maj. and Bt. Lt.-Col. Reginald Seaburne May Royal Fusiliers
Maj. and Bt. Lt.-Col. Guy Hamilton Boileau Royal Engineers
Maj. and Bt. Lt.-Col. Edmund William Costello Indian Army
Maj. and Bt. Lt.-Col. Robert Harvey Kearsley Dragoon Guards
Maj. and Bt. Lt.-Col. Edward Lacy Challenor Leicestershire Reg.
Maj. and Bt. Lt.-Col. Francis James Marshall Seaforth Highlanders
Maj. and Bt. Lt.-Col. Frank Graham Marsh, Indian Army
Maj. and Bt. Lt.-Col. Sir William Algernon Ireland Kay King's Royal Rifle Corps
Maj. and Bt. Lt.-Col. Frederick William Lawrence Sheppard Hart Cavendish Lancers
Maj. and Bt. Lt.-Col. Thomas Wolryche Stansfeld Yorkshire Reg.
Maj. and Bt. Lt.-Col. John Edward Spencer Brind Royal Arty.
Maj. and Bt. Lt.-Col. George Henry Addison Royal Engineers
Maj. and Bt. Lt.-Col. William Edmund Ironside Royal Arty.
Maj. and Bt. Lt.-Col. Robert Gordon-Finlayson Royal Arty.
Maj. and Bt. Lt.-Col. Alan Thomas Paley Rifle Brigade
Maj. and Bt. Lt.-Col. James Keith Dick-Cunyngham Gordon Highlanders
Maj. and Bt. Lt.-Col. Francis Stewart Montague-Bates East Surrey Reg.
Capt. and Bt. Lt.-Col. Guy Payan Dawnay late Coldstream Guards
Tmp Lt.-Col. Ernest Henry Starling RAMC
Tmp Lt.-Col. Leonard Stanley Dudgeon RAMC
Lt.-Col. Francis William Gosset Royal Arty.
Lt.-Col. John Hamilton Hall Middlesex Reg.
Lt.-Col. Herbert Norwood Blakeney Middlesex Reg.
Maj. and Bt. Lt.-Col. Arthur Jervois Turner Royal Arty.
Maj. and Bt. Lt.-Col. Henry Clifford Rodes Green King's Royal Rifle Corps
Maj. and Bt. Lt.-Col. George Dominic Price, West Yorkshire Reg.
Maj. and Bt. Lt.-Col. Charles George Lewes Essex Reg.
Maj. and Bt. Lt.-Col. Gerald Edward Bayley York & Lancaster Reg.
Lt.-Col. William Kaye Legge Essex Reg.
Maj. and Bt. Lt.-Col. Robert Emile Shepherd Prentice Highland Light Inf.
Maj. and Bt. Lt.-Col. Sir Hereward Wake King's Royal Rifle Corps
Maj. and Bt. Lt.-Col. Rodolph Ladeveze Adlercron Cameron Highlanders
Maj. and Bt. Lt.-Col. Charles Howard Foulkes Royal Engineers
Maj. and Bt. Lt.-Col. Edward Weyland Martin Powell Royal Field Arty.
Lt.-Col. Clennell William Collingwood Royal Garrison Arty.
Maj. and Bt. Lt.-Col. Percival Suther Royal Garrison Arty.
Maj. and Bt. Lt.-Col. Harold St. John Loyd Winterbotham Royal Engineers
Maj. and Bt. Lt.-Col. Arthur Wollaston Bartholomew Royal Arty.
Maj. and Bt. Lt.-Col. Cecil Percival Heywood Coldstream Guards
Maj. and Bt. Lt.-Col. Harry Beauchamp Douglas Baird Indian Army
Maj. and Bt. Lt.-Col. Tom Ince Webb-Bowen, Bedfordshire Reg.
Maj. and Bt. Lt.-Col. Hugh Roger Headlam York & Lancaster Reg.
Maj. and Bt. Lt.-Col. Norman William Webber Royal Engineers
Maj. and Bt. Lt.-Col. Walter William Pitt-Taylor Rifle Brigade
Maj. and Bt. Lt.-Col. Robert John Collins Royal Berkshire Reg.
Maj. and Bt. Lt.-Col. Charles Ogston Gordon Highlanders
Maj. and Bt. Lt.-Col. Gervase Thorpe Argyll and Sutherland Highlanders
Maj. and Bt. Lt.-Col. Winston Joseph Dugan Worcestershire Reg.
Maj. and Bt. Lt.-Col. Lewis James Comyn Connaught Rangers
Maj. and Bt. Lt.-Col. Charles Samuel Owen Royal Welsh Fusiliers
Maj. and Bt. Lt.-Col. Clifton Inglis Stockwell Royal Welsh Fusiliers
Maj. and Bt. Lt.-Col. Charles Harry Lyon North Staffordshire Reg.
Maj. and Bt. Lt.-Col. Arthur Hardwicke Spooner Lancashire Fusiliers
Maj. and Bt. Lt.-Col. Henry Pelham Burn Gordon Highlanders
Maj. and Bt. Lt.-Col. John Greer Dill Leinster Reg.
Maj. and Bt. Lt.-Col. Henry Courtenay Hawtrey Royal Engineers
Tmp Lt.-Col. Brodie Haldane Henderson, Royal Engineers
Tmp Lt.-Col. Edward Hyde Hamilton Gordon General List
Lt.-Col. Arthur Clement Wilkinson Royal Garrison Arty.
Maj. and Bt. Lt.-Col. Herbert Edward Trevor Yorkshire Light Inf.
Maj. Francis Jenkins, Coldstream Guards
Maj. Percy Gerald Parker Lea Army Service Corps
Maj. Henry Warburton Hill Royal Field Arty.
Maj. Roger Gordon Thomson Royal Field Arty.
Maj. and Bt. Lt.-Col. Gerald Carew Sladen Rifle Brigade
Tmp Lt.-Col. Christopher D'Arcy Bloomfield Saltern Baker-Carr Tank Corps
Maj. John Edmund Hugh Balfour late Hussars
Maj. Alexander James King late Royal Lancaster Reg.
Tmp Major George Simpson Pitcairn, Royal Engineers
Maj. Vaughan Randolph Hine-Haycock late Royal Arty.
Capt. and Bt. Major Rudolph Edmund Aloysius, Viscount Feilding Coldstream Guards
Capt. and Bt. Major Cyril Edward Wilson late East Lancashire Reg.
Capt. Bryan Charles Fairfax, New Armies
Col. The Rt. Hon. John Edward Bernard Seely Yeomanry
Lt.-Col. Arthur Saxby Barham, London Reg.
Lt.-Col. William Elliott Batt, Royal Field Arty.
Lt.-Col. Frederick William Duffield Bendall, Middlesex Reg.
Lt.-Col. Lionel Leonard Bilton, Worcestershire Reg.
Lt.-Col. Hugh Delabere Bousfield West Yorkshire Reg.
Lt.-Col. Robert Chapman Royal Field Arty.
Lt.-Col. Robert Joyce Clarke Royal Berkshire Reg.
Lt.-Col. Charles Clifford, Royal Field Arty.
Lt.-Col. Hugh Charles Copeman Suffolk Reg. (late Essex Reg.)
Lt.-Col. Clarence Isidore Ellis, RAMC
Lt.-Col. Archibald Stewart Leslie, Yeomanry
Lt.-Col. Frederick William Schofield, Oxfordshire & Buckinghamshire Light Inf.
Lt.-Col. John William Slater, Liverpool Reg.
Lt.-Col. Francis Henry Douglas Charlton Whitmore Yeomanry
Maj.-Gen. Raymond Northland Revell Reade
Col. William Pitt
Col. Thomas Ryder Main
Col. Arthur Henry Bagnold
Col. William Hodgson Suart
Col. Henry Richard Beadon Donne
Lt.-Col. and Bt. Col. Alfred Keene late Royal Arty.
Lt.-Col. and Bt. Col. William Augustus Edmund St. Clair, late Royal Engineers
Col. Frederick Rainsford-Hannay
Col. Charles Henry Darling
Lt.-Col. and Bt. Col. Percy Rice Mockler, late Royal Warwickshire Reg.
Hon. Col. Sir Herbert Merton Jessel London Reg. and Remount Service
Col. and Hon. Brig.-Gen.-General Hugh James Archdale
Maj. and Bt. Col. Edward Bell, late Worcestershire Reg.
Lt. Joseph Griffiths RAMC
Col. Charles Edwin Nuthall
Col. Guy William Fitton, Army Pay Dept.
Col. George Francis Milner
Col. Arnaud Clarke Painter
Col. and Hon. Brig.-Gen.-General Frank Grimshaw Lagier Lamotte
Col. Louis Peile Carden
Col. Arthur Ludovic Molesworth
Col. Charles Pye Oliver RAMC
Col. and Hon. Brig.-Gen.-General Philip Thomas Buston
Col. Edward Bickford
Col. Ernest Augustus Tudor Tudor
Col. Frederick Charlton Meyrick Late Major, Hussars
Col. Harold Stephen Langhorne Army Ordnance Depot
Lt.-Col. and Bt. Col. Wilkinson Dent Bird
Col. Charles Henderson Melville Army Medical Service
Col. Malcolm David Graham Assistant Military Sec., War Office
Tmp Honorary Col. Sir John Collie Army Medical Service
Lt.-Col. John George Adamson, late King's Own Yorkshire Light Inf.
Lt.-Col. John Arthur Coghill Somerville, late Royal Sussex Reg.
Lt.-Col. Arthur de Courcy Scanlan, RAMC
Lt.-Col. William Denziloe Sanderson North Lancashire Reg.
Tmp Honorary Lt.-Col. Harry Richard Kenwood RAMC
Tmp Honorary Lt.-Col. John Robertson RAMC
Lt.-Col. John Ward Middlesex Reg.
Tmp Lt.-Col. John Charles Grant Ledingham RAMC
Lt.-Col. and Hon. Col. Alfred Briffa, King's Own Malta Reg. of Militia
Maj. Frederick Knight Essell, late East Kent Reg.
Maj. Henry Charles Bulkeley
Tmp Lt.-Col. Charles Morley Wenyon RAMC
Maj. and Bt. Lt.-Col. Henry Andrew Micklem Retired pay
Maj. and Bt. Lt.-Col. Charles Monk Gibbon, Royal Irish Fusiliers
Maj. and Bt. Lt.-Col. Robert May Wetherell, Duke of Cornwall's Light Inf.
Lt.-Col. Henry Godfrey Howorth, Royal Arty.
Tmp Lt.-Col. Arthur Treharne Andrews, Royal Engineers
Tmp Lt.-Col. George Basil Price RAMC
Maj. and Bt. Lt.-Col. Duncan le Geyt Pitcher, Indian Army
Lt.-Col. Stanley Clarence Halse, Royal Garrison Arty.
Maj. and Bt. Lt.-Col. William Dundas Dooner, Army Ordnance Depot
Maj. and Bt. Lt.-Col. Frederick Walter Radcliffe Dorsetshire Reg.
Lt.-Col. Arthur John Bromley Church, Army Pay Dept.
Lt.-Col. Hamlet Bush Toller, Army Pay Dept.
Lt.-Col. Cecil de Sausmarez Royal Garrison Arty.
Lt.-Col. Henry Stewart Anderson, RAMC
Lt.-Col. William Parry, Army Pay Dept.
Tmp Lt.-Col. Sir William Henry Houghton-Gastrell Army Service Corps
Lt.-Col. William Egerton Edwards, Royal Arty.
Maj. and Bt. Lt.-Col. Kenneth Marten Body, Army Ordnance Depot
Lt.-Col. Frederick Lindsay Lloyd
Hon. Lt.-Col. Alfred James Foster, Northumberland Fusiliers, late Royal Garrison Arty., Militia
Lt.-Col. Charles Richard Blackstone Owen, Royal Arty.
Maj. and Bt. Lt.-Col. Lewis Frederick Renny Royal Dublin Fusiliers
Tmp Lt. Robert Henry More, late Imperial Yeomanry, Assistant Military Sec., War Office
Maj. Charles Edward Norton, late Royal Engineers
Maj. the Honorauble Alexander Victor Frederick Villiers Russell Grenadier Guards
Maj. Lionel George Tempest Stone, Royal Fusiliers
Maj. John Sedley Newton de Joux, South Staffordshire Reg.
Maj. Francis Vernon Willey, Yeomanry
Maj. James George Weir, Royal Field Arty.
Tmp Major Arthur John Allen-Williams Royal Engineers
Capt. Cecil Henry Whittington, Royal Flying Corps
Lt.-Col. and Hon. Col. Hugh Henry John Williams Drummond, late Yeomanry
Lt.-Col. and Hon. Col. Lionel Richard Cavendish Boyle late Honourable Arty. Company
Lt.-Col. Stanley Hatch Page, Royal Field Arty.
Maj. Osmond Robert McMullen, Royal Garrison Arty.
Lt.-Col. John Fred Keen, Royal Engineers
Maj. Thomas Wardrop Griffith RAMC
Lt.-Col. William Mitchell Roocroft, RAMC
Australian Imperial Force
Maj.-Gen. Cyril Brudenell Bingham White
Col. George Walter Barber Medical Corps
Col. Thomas Albert Blamey Inf.
Col. Charles Frederick Cox Commonwealth Military Forces
Col. Walter Adams Coxen Commonwealth Military Forces
Col. Robert Rupert Major Downes, Medical Corps
Col. Walter Ramsay McNicoll Inf.
Col. Robert Smith Inf.
Lt.-Col. Harold Edward Cohen Field Arty.
Lt.-Col. Ernest Arthur Kendall, Royal Army Veterinary Corps
Lt.-Col. Raymond Lionel Leane Inf.
Lt.-Col. Edward Fowell Martin Inf.
Lt.-Col. Athelstan Markham Martyn Engineers
Lt.-Col. Charles Gordon Norman Miles Field Arty.
Lt.-Col. Alexander Windeyer Ralston Inf.
Lt.-Col. William Henry Scott Light Horse Reg.
Lt.-Col. George Cattell Somerville
Lt.-Col. Walter Howard Tunbridge Army Service Corps
Lt.-Col. Arthur Thomas White, Army Medical Corps
Lt.-Col. Cyril Tracy Griffiths
Senior Chaplain James Green
Lt.-Col. John Gordon, Army Medical Corps
Tmp Lt.-Col. Lionel James Hurley, attd. Australian Imperial Force
Lt.-Col. George Hodges Knox
Lt.-Col. Douglas Murray McWhae, Army Medical Corps
Hon. Lt.-Col. James Anderson Murdoch, Army Medical Corps
Lt.-Col. Kenneth Smith, Army Medical Corps
Canadian Force
Lt.-Col. Hugh Marshall Dyer Inf.
Lt.-Col. William Antrobus Griesbach Inf.
Lt.-Col. Frederic William Hill Inf.
Maj. and Bt. Lt.-Col. James Howden MacBrien Dragoons
Lt.-Col. Charles Henry MacLaren Arty.
Maj. Howard Lionel Bodwell Pioneers
Maj. Édouard de Bellefeuille Panet Arty.
Col. John Alexander Armstrong
Col. Ernest Charles Ashton
Col. Kenneth Cameron, Army Medical Corps
Col. George Septimus Rennie, Army Medical Corps
Col. Wallace Arthur Scott, Army Medical Corps
Col. Walter Langmuir Watt, Army Medical Corps
Lt.-Col. James Louis Regan, Royal Army Pay Corps
Maj. John Andrew Amyot, Army Medical Corps
Maj. Bernard Rickert Hepburn, Forestry Corps
Tmp Honorary Major George Anderson Wells, Chaplain Services
New Zealand Force
Lt.-Col. Norris Stephen Falla New Zealand Field Arty.
Lt.-Col. George Thompson Hall, Army Service Corps
Maj. Thomas Henry Dawson, Inf.
Maj. Thomas Mill Medical Corps
Maj. Norton Francis, Motor Service Corps
South African Force
Col. Stanley Archibald Markham Pritchard, Native Labour Corps
Colonial List
Philip Arnold Anthony, General Manager of the Federated Malay States Railways
Algernon Edward Aspinall, Sec., The West India Committee
Lt.-Col. Louis Edward Barnett, New Zealand Medical Corps
Harry Fagg Batterbee, of the Colonial Office, Private Sec. to the Sec. of State for the Colonies
Rodolphe Boudreau, Clerk of the Privy Council for Canada
Peter Joseph McDermott Under-Sec., Chief Sec.'s Dept., State of Queensland
Arthur Mews, Deputy Colonial Sec., Newfoundland
The Hon. William Bispham Propsting, Attorney-General and Minister for Railways of the State of Tasmania
Theodorus Gustaff Truter, Comm. of Police, Union of South Africa
Robert Walter, Colonial Sec. of the Colony of British Honduras
Jeremiah Wilson, Postmaster-General, Union of South Africa
Diplomatic and Overseas Residents
John Charles Tudor Vaughan Counsellor at His Majesty's Embassy at Madrid
James William Ronald Macleay, Counsellor of Embassy in His Majesty's Diplomatic Service
Dayrell Eardley Montague Crackanthorpe, Counsellor to His Majesty's Legation at Athens
Edward Henry John Leslie, of the Foreign Office
Hugh Gurney First Sec. to His Majesty's Legation at Copenhagen
Guy Harold Locock, of the Foreign Office, attached to the Dept. of Commercial Intelligence
Honorary Companions
His Highness Daudi Chwa, Kabaka of Buganda
Louis Antonio Andrade, District Comm. for the Island of Zanzibar
The Most Eminent Order of the Indian Empire
Knight Grand Cmdr. (GCIE)
His Highness Maharajadhiraja Sawai Tukoji Rao Holkar Bahadur, of Indore, in recognition of the Services rendered by the Native States of India during the War
Knight Cmdr. (KCIE)
John Barry Wood Indian Civil Service, Political Sec. to the Government of India in the Foreign and Political Dept., and an Additional Membei of the Council of the Governor-General for making Laws and Regulations
Bertram Sausmarez Carey Burma Commission, Comm., Sagaing, Burma, and a Member of the Council of the Lieutenant-Governor for making Laws and Regulations
Alfred Hamilton Grant Indian Civil Service, Foreign Sec. to the Government of India in the Foreign and Political Dept., and an Additional Member of the Council of the Governor-General for making Laws and Regulations
His Highness Raja Bir Indra Singh, of Rajgarh.
His Highness Raja Sir Bhure Singh of Chamba
His Highness Raja Bhim Sen, of Suket
Capt. His Highness Rana Ranjit Singh, of Barwani Majaraja
Bir Mitradaya Singh Deo, of Sonpur Raja Han Singh, Cmdr.-in-Chief of the Kashmir Army
Honorary Knight Cmdr.
Abdul Karim Fadthli bin Ah, Sultan of Al Hauta (Lahej)
Companion (CIE)
Arthur Herbert Ley, Indian Civil Service, Officiating Sec., Commerce and Industry Dept., Government of India
Peter Henry Clutterbuck Indian Forest Service, Chief Conservator of Forests, United Provinces, and a Member of the Council of the Lieutenant-Governor for making Laws and Regulations
James Donald, Indian Civil Service, Sec. to Government of Bengal, Financial Dept., and an Additional Member of the Council of the Governor for making Laws and Regulations
William Woodward Hornell, Indian Educational Service, Director of Public Instruction, Bengal, and an Additional Member of the Council of the Governor for making Laws and Regulations
Harchandrai Vishandas, Pleader, Karachi, President of the Municipal Corporation and an Additional Member of the Council of the Governor of Bombay for making Laws and Regulations
Thomas Ryan, Finance Accounts Dept., Sec. to the Indian Munitions Board
Arthur William Botham, Indian Civil Service, Second Sec. to the Chief Comm., Assam, and a Member of the Council of the Chief Comm. for making Laws and Regulations
Lt.-Col. and Bt. Col. Henry Francis Cleveland, Indian Medical Service, Deputy Director-General, Indian Medical Service
Augustus Henry Deane His Majesty's Consul for Pondicherry and Karikal
Lt.-Col. Bawa Jiwan Singh, Indian Medical Service, Inspector-General of Prisons, Bihar and Orissa, and an Additional Member of the Councilof the Lieutenant-Governor for making Laws and Regulations
Lt.-Col. William Byan Lane, Indian Medical Service, Inspector-General of Prisons, Central Provinces
Harry Nelson Heseltine, Civil Accounts Dept., Accountant-General for Railways, India
Alexander Langley, Indian Civil Service, Deputy Comm. of Hoshiarpur, Punjab
Lt.-Col. Henry Smith Indian Medical Service, Civil Surgeon, Amritsar, Punjab
Lt.-Col. Francis William Hallowes, Supply and Transport Corps, Director of Farms, India
Maj. Henry Coddington Brown, Indian Medical Service, Assistant Director, Central Research Institute, Kasauli
Robert Colquhoun Boyle, Indian Police, Commandant, Frontier Constabulary, North-West Frontier Province
Lewis Wynne Hartley, Income-Tax Comm., Bombay
Raja Sayyid Abu Jafar, Taluqdar of Pirpur, in the Fyzabad District of Oudh, United Provinces
Rai Bahadur Pandit Gopinath, Member of Council, Jaipur State, Rajputana
Jhala Sri Mansinghji Suraj Sinhji, Dewan of Dhrangadhra, Kathiawar, Bombay Presidency
Khan Bahadur Khan Ahmad Shah, Honorary Sub-Judge and Hon. Magistrate, Jullundur, Punjab
Assistant Surgeon Kedar Nath Das Professor of Midwifery, Campbell Medical School, Calcutta
Brig.-Gen.-General John Latham Rose, Indian Army, Officiating Inspector-General, Imperial Service Troops
Lt.-Col. Roger Lloyd Kennion, Indian Army, Political Dept., Consul at Kermanshah
Lt.-Col. Hugh Augustus Keppel Gough, Indian Army, Political Dept., Consul at Shiraz, Persian Gulf
Temporary Major John Arnold Wallinger Indian, Police
Capt. Edward William Charles Noel, Indian Army, His Britannic Majesty's Vice-Consul, Ahwaz, and Assistant to Political Resident in Persian Gulf
His Highness Maharaja Tashi Naingyal, of Sikkim Sao Kawn Kiao Intaleng, Sawbwa of Kengtung
Imperial Order of the Crown of India
Her Highness Maji Sahiba Girraj Kaur, of Bharatpur
The Royal Victorian Order
Knight Grand Cross of the Royal Victorian Order (GCVO)
His Highness Maharaja Maharana Sir Fateh Singh Bahadur, of Udaipur
The Rt. Hon. James, Viscount Bryce
Sir Bertrand Edward Dawson (dated 22 December 1917)
Knight Cmdr. of the Royal Victorian Order (KCVO)
Sir Charles Edward Troup
Lt.-Col. Hugh Mallinson Rigby RAMC (dated 22 December 1917)
Cmdr. of the Royal Victorian Order (CVO)
Sidney West Harris
Matthew Walter Gibson
John Leonard Bolden
Member of the Royal Victorian Order, 4th class (MVO)
Lt.-Col. Wyndham Raymond Portal (dated 20 December 1917)
Staff Surgeon Louis Greis, Royal Navy (dated 22 December 1917)
Lt.-Col. John Cyril Giffard Alers Hankey
Capt. Augustus Frederick Liddell, late Royal Arty.
The Most Excellent Order of the British Empire
Dame Grand Cross of the Order of the British Empire (GBE)
Civil Division
Her Majesty, Queen Alexandra
Margaret, Baroness Ampthill President of the Bedfordshire Branch of the British Red Cross Society; Member of Council, British Red Cross Society; Head of the Voluntary Aid Detachment Dept., Devonshire House
Edith Isabel Benyon, President of the Berkshire Branch of the British Red Cross Society; Commandant of Englefield House Hospital, near Reading
Aimee Evelyn, Lady Dawson, Joint Honorary Sec., Queen Mary's Needlework Guild
Violet Hermione, Duchess of Montrose, President of the Scottish Branch of the British Red Cross Society
Mary Elizabeth, Viscountess Northcliffe, Member of the Joint Committee of the British Red Cross-Society and Order of St. John of Jerusalem; Donor and Administrator of Lady Northcliffe's Hospital for Ofc.s
Dominion of New Zealand
Her Excellency Annette Louise, Countess of Liverpool
British India
Her Highness Nawab Sultan Jahan Begum of Bhopal, in recognition of Services rendered by the Native States of India during the War.
Knight Grand Cross of the Order of the British Empire (GBE)
Civil Division
Sir Thomas Dunlop Lord Provost of Glasgow
William Henry Ellis, Master Cutler of Sheffield
Sir Richard Charles Garton, Founder of the Garton Foundation for Promoting the Study of International Policy and Economics; Honorary Treasurer of the Trust Fund Committee of Queen Mary's Hostel
The Rt. Hon. Sir David Harrel Chairman of the Committee on Production
Sir Robert Arundell Hudson, Treasurer and Financial Director of the Joint Committee of the British Red Cross Society and the Order of St. John of Jerusalem in England
Col. Sir Arthur Hamilton Lee Director-General of Food Production
Sir William Plender
Egypt and the Sudan
Gen. Sir Francis Reginald Wingate His Majesty's High Comm. for Egypt
British India
In recognition of Services rendered by the Native States of India during the War —
Lt.-Gen. His Highness Maharajadhiraja Sir Pratap Singh Bahadur of Jammu and Kashmir
Maj.-Gen. His Highness Maharajadhiraja Sir Sawai Madho Singh Bahadur of Jaipur
Lt.-Col. His Highness Maharao Sir Umed Singh Bahadur of Kotah
Lt.-Col. His Highness Maharahadhiraja Sri Sir Bhupindar Singh Mahindar Bahadur of Patiala
Dame Cmdr. of the Order of the British Empire (DBE)
Civil Division
The Hon. Eva Isabella Henrietta Anstruther, Organiser of Soldiers Libraries
Caroline, Lady Arnott, Vice-President, Soldiers and Sailors Help Society, Dublin
Maud Burnett, Town Councillor of Tynemouth
Alice Mary Godman
Agnes Lowndes, Lady Jekyll, Head of Stores Dept., Order of St. John of Jerusalem
Adelaide Livingstone, Sec. of the Government Committee on the Treatment by the Enemy of British Prisoners of War
Ethel Locke King, Vice-President of North Surrey Division and Assistant County Director, Surrey, British Red Cross and Order of St. John of Jerusalem
Flora, Lady Lugard, Joint Founder of the War Refugees Committee, and Founder of the Lady Lugard Hospitality Committee
Margaret Ker Pryse-Rice, President, Carmarthenshire Branch of the British Red Cross Society
Rosamond Cornelia Gwladys, Viscountess Ridley, Donor and Administrator, Lady Ridley's Hospital for Ofcs
Edith Harriet, Lady Sclater, President of Lady Sclater's Work Room and Smokes Fund
Olive Crofton, Lady Smith-Dorrien, President of the Hospital Bag Fund
Janet Stancomb-Wills
May Webster, Chairman of the British Women's Hospitals Committee; Chairman of the Three Arts Women's Employment Fund
Commonwealth of Australia
Madame Melba, for services in organising patriotic work
Newfoundland
Margaret Agnes, Lady Davidson, for services in connection with the Women's Patriotic Association
Knight Cmdr. of the Order of the British Empire (KBE)
Military Division
Army
Col. James Galloway Army Medical Service, Chief Comm. for Medical Services, Ministry of National Service
Brig.-Gen.-General Louis Charles Jackson Late Controller of the Trench Warfare Research Dept., Ministry of Munitions
Col. John Seymour Lloyd Director General of Recruiting, Royal Army Service Corps
Civil Division
Francis Arthur Aglen, Inspector-General of the Chinese Maritime Customs
Frank Baillie, Director of National Aeroplane Factory, Toronto
Clement Anderson Montague-Barlow
John Field Beale, Vice-Chairman, Royal Commission on Wheat Supplies; Chairman of Allied Wheat Executive
Col. Sir George Thomas Beatson Chairman, Scottish Branch, British Red Cross Society
Walter Becker
Andrew Caird, Administrator, New York Headquarters of the British War Mission to the United States of America
James Cantlie Member of Council and of Executive Committee, British Red Cross Society
Col. Charles Frederick Close Director-General of the Ordnance Survey of the United Kingdom
Alfred Thomas Davies Founder and Hon. Director of the British Prisoners of War Book Scheme
Joseph Davies, Representative for Wales and Monmouthshire of the Cabinet Committee for Prevention of Unemployment and Distress
William Henry Davison
Alfred Hull Dennis Assistant Treasury Solicitor
The Rt. Hon. Willoughby Hyett Dickinson Chairman of the Soldiers Dependants' Assessment Appeals Committee
William Don, Lord Provost of Dundee
Arthur John Dorman, Chairman of Messrs. Dorman, Long and Co., of Middlesbrough
Bignell George Elliott
Herbert Trustram Eve, Chairman of the Forage Committee
Walter Morley Fletcher Sec. of the Medical Research Committee
Sir William Bower Forwood
Lt.-Col. Henry Fowler Chief Mechanical Engineer to the Midland Railway; Superintendent of the Royal Aircraft Factory, Farnborough
Col. Alexander Gibb, Royal Engineers, of the firm of Messrs. Easton, Gibb and Son
Kenneth Weldon Goadby Member of the War Office Committee for the Study of Tetanus
Arthur Home Goldfinch, Director of Raw Materials, Dept. of the Surveyor-General of Supply, War Office
William Athelstane Meredith Goode, Honorary Sec. of the National Committee for Relief in Belgium
Alexander Gracie Managing Director of the Fairfield Shipbuilding and Engineering Company, Ltd.
Sir William Grey-Wilson Chairman of the Central Committee for Patriotic Organisations
Connop Guthrie, Representative of the Director of Transports in the United States of America
Lt.-Col. Frederick Hall
Arthur Ambrose Hall Harris, Acting Director of Overseas Transport to the Canadian Government; Representative of the Director of Transports in Canada
Frederick Ness Henderson, Member of the Admiralty Shipbuilding Council
Philip Gutterez Henriques, Deputy Controller of Munitions Finance
Ernest Varvill Hiley, Late Deputy Director of the National Service Dept.
Col. Arthur Richard Holbrook
Lt.-Col. Robert Stevenson Horne Royal Engineers, Director of Materials and Priority, Controller's Dept., Admiralty
George Burton Hunter Chairman of Messrs. Swan, Hunter & Wigham Richardson & Company, Ltd., Newcastle upon Tyne
Gustave Jarmay, Managing Director of Messrs. Brunner, Mond & Co., Ltd.
Edgar Rees Jones Superintendent, Priority Dept., Ministry of Munitions
Roderick Jones, Managing Director, Reuter's Telegram Company, Ltd.
Charles Halestaff Kenderdine, Honorary Sec. and Treasurer, Queen Mary's Convalescent Auxiliary Hospitals, Roehampton
Harry Livesey, Director of Navy Contracts, Admiralty; formerly Deputy Director of Inland Water Transport and Docks, War Office
John Mann, Controller of Contracts, Ministry of Munitions
Arthur Harold Marshall Chairman of the Central Building Board, of the Parliamentary Munitions Committee, and of the Parliamentary Recruiting Committee
George Ernest May, Sec. to the Prudential Assurance Company; Manager of the American Dollar Securities Committee
Peter Hannay McClelland, Member of Advisory Board, Surveyor General of Supply Dept., War Office
James McKechnie, Managing Director of Messrs. Vickers, Ltd., Barrow
Col. Andrew Muter John Ogilvie Royal Engineers, Director of Army Signals (Home Defence); Second Sec. to the Post Office
Thomas Henry Penson, Chairman of the War Trade Intelligence Dept.
Edward Penton, Junior, in charge of Boot Section, Royal Army Clothing Dept.
Frederick George Panizzi Preston, Chairman of Messrs. J. Stone & Company, Ltd., Deptford
Sir Frederick Alexander Robertson, Chairman of the Central Council of United Alien Relief Societies
Robert Robertson Superintending Chemist, Research Dept., Woolwich Arsenal
Herbert Babington Rowell, Member of the Admiralty Shipbuilding Council
Harry Smith, Chairman of the Keighley Board of Management, Ministry of Munitions
Charles John Stewart, Public Trustee
Thomas James Storey, Member of the Committee and Chairman of the Classification Committed of Lloyd's Register of Shipping
Percy Kendall Stothert, Chairman of the West of England Board of Management, Ministry of Munitions
The Rt. Hon. Sir Thomas Vezey Strong Chairman, City of London Tribunal
Lt.-Col. Campbell Stuart, Vice-Chairman of London Headquarters of British Mission to the United States of America
Charles Sykes, Director of Wool Textile Production and Chairman of the Board of Control of the Worsted Woollen Trades
William Henry Thompson Scientific Adviser to the Ministry of Food
William Rowan-Thomson, Director of Auxiliary Ships Engines, Controller's Dept., Admiralty
Frank Warner, President of the Silk Association
Lt.-Col. Alfred Cholmeley Earle Welby, Sec. of the Royal Patriotic Fund Corporation
British India
Maj. His Highness Raj Rajeshwar Maharajadhiraja Sumer Singh Bahadur, of Jodhpur
Commonwealth of Australia
James William Barrett for services in connection with the Australian Branch of the British Red Cross Society in Egypt, etc.
Rear-Admiral William Clarkson Royal Australian Navy, for services in connection with the control and reorganisation of coastal shipping
Edward Owen Cox, Chairman, Overseas Shipping Committee
Lt.-Col. George Steward, for services to the Commonwealth Government
Dominion of New Zealand
Sir William Lee, Baron Plunket for services in connection with the New Zealand War Contingent Association
Egypt and the Sudan
Maj. Lee Oliver FitzMaurice Stack Reserve of Ofc.s, Acting Sirdar and Governor-General of the Sudan
Newfoundland
The Hon. Patrick Thomas McGrath President of the Legislative Council, Food Controller, Sec. of the Patriotic Fund, and Chairman of the Pensions and Disabilities Board
Crown Colonies, Protectorates, etc.
The Most Reverend Maurus Caruana, Archbishop, Bishop of Malta
Sir Everard Ferdinand im Thurn Vice-Chairman, King George and Queen Mary's Club for the Oversea Forces
Brig.-Gen.-General Sir William Henry Manning Capt.-General and Governor-in-Chief of the Island of Jamaica
Lawrence Aubrey Wallace Administrator of Northern Rhodesia
Sir Arthur Henderson Young Governor and Cmdr.-in-Chief of the Straits Settlements
Honorary Knight Cmdr.
His Highness Ibrahim, Sultan of the State and Territory of Johor
Cmdr. of the Order of the British Empire (CBE)
Military Division
Lt.-Col. John Hubback Anderson, Assistant Director of Medical Services, Australian Imperial Force
Col. Frederick John Angell, Assistant Director of Ordnance Services, Southern Command
Lt.-Col. James Forrest Halkett Carmichael, Assistant Controller, Raw Materials (Non-Ferrous), Ministry of Munitions
Maj. Augustus Basil Holt Clerke, Royal Field Arty., Director, Messrs. Hadfields, Ltd., Sheffield
Maj. The Hon. Leonard Harrison Cripps, 4th Hussars; Assistant Controller, Stores Dept., Ministry of Munitions
Col. Stuart Davidson, Royal Engineers, Chief Technical Examiner for Works Services, War Office
Lt.-Col. Robert Maxwell Dennistoun Deputy Judge Advocate General, Canadian Forces
Col. Sir William Yorke Foster Late Assistant Adjutant General, Southern Command
Col. Joseph Gaskell Vice-Chairman (Acting Chairman), Glamorgan Territorial Force Association
Brevet Col. St. John Corbet Gore
Lt.-Col. Geoffrey Gladstone Helbert, Staff of High Comm. for South Africa
Maj. Thomas Gerard Hetherington, Services in connection with the origination of Tanks
Lt.-Col. John Tweedy Lewtas, Comm. for Medical Services, Ministry of National Service
Col. James Reynolds McLean, Deputy Director-General of Recruiting
Col. Valentine Matthews Inspector of Rest Houses, London District
Col. Robert Dawson Rudolf, Consultant in Medicine, Canadian Army Medical Corps
Col. The Hon. George John Smith, Assistant Director of Contracts, Admiralty; New Zealand Military Forces
Col. Robert Ward Tate, Adjutant-General to the New Zealand Forces
Lt.-Col. Francis William Towle, Royal Army Service Corps; Inspector of Q.M. General's Services; Member of the Tobacco and Matches Control Board
Col. Gerald Verner White, Director of Timber Operations, Canadian Forestry Corps
Lt.-Col. John Williams, Australian Imperial Force; Commanding Anzac Provost Corps
For services in connection with the War in France, Egypt and Salonika —
Hugh Garvin Goligher, Financial Adviser, British Expeditionary Force
Helen Charlotte Isabella Gwynne-Vaughan, Chief Controller, Queen Mary's Army Auxiliary Corps
Lt.-Col. Edward William Horne
Lt.-Col. Sydney George Partridge, Army Printing and Stationery Services, General Headquarters, France
Civil Division
John Arthur Aiton, Chairman, Derbyshire Munitions Board of Management
Maj. Charles Aldington, Superintendent of the Line, Great Western Railway
Ernest Joshua Allen, Director, Railway Materials, Ministry of Munitions
Ernest King Allen, Assistant Public Trustee
Richard William Allen Director and Manager of Messrs. W. H. Allen, Son & Company, Bedford
Lawrence Alma-Tadema, Joint Founder of the Polish Relief Fund for Great Britain
Adelaide Mary Anderson, Principal Lady Inspector of Factories
William James Anderson, Honorary Treasurer, Scottish Branch, British Red Cross Society
Mildred Harriet, Lady Anstruther
John Apsey, Manager, Constructive Dept., H.M. Dockyard, Portsmouth
Cecil Henry Armitage County Director, Derbyshire, British Red Cross and Order of St. John of Jerusalem
George Henry Ashdown Deputy Director of Stores, Admiralty
Maj. Frank Ashley, British Red Cross Comm., Malta
Ellen, Lady Askwith, Ladies Auxiliary Committee (Munitions Section), Y.M.C.A.
Frederick Joseph Bacon Treasury Valuer and Inspector of Rates
Bernal Bagshawe, Chairman, Leeds Forge Company Ltd., Leeds
David Bain, Controller of Timber Supplies for Gun Ammunition Filling Dept., Ministry of Munitions
Frank Baines Principal Architect, H.M. Office of Works
James Alan Noel Barlow, Deputy Controller, Labour Supply Dept., Ministry of Munitions
Benjamin Barrios, Oscar Theodore Barrow Assistant Controller of Finance, Ministry of Munitions
Col. Thomas Elwood Lindesay Bate Late County Sec., County of London, British Red Cross and Order of St. John of Jerusalem
John Harper Bean, Director, Messrs. A. Harper, Sons and Bean Ltd., Dudley
Gerald Bellhouse, Deputy Chief Inspector of Factories
Blanche Vere, Countess of Bessborough, Honorary Sec., Y.M.C.A. Auxiliary Committee for France
Alfred Carleton Blyth, Managing Director, Hayes Filling Factory, Ministry of Munitions
Hereward Kenius Brackenbury, Manager of Torpedo Shops, Messrs. Sir W. G. Armstrong, Whitworth & Company, Ltd.
Thomas John Bradley, Principal Clerk, Exchequer and Audit Dept.
Benjamin Broadbent
Lt.-Col. Alfred Claude Bromhead
Arthur David Brooks, Lord Mayor of Birmingham; Chairman of Birmingham Local Tribunal
James Brown, Deputy Chairman and Managing Director, Scott's Shipbuilding and Engineering Company, Ltd.
Francis Morgan Bryant Sec. of H.M. the King's Private Sec.'s Office
James Herbert Brydon, Acting County Director, Honorary County Sec. and Treasurer, Cheshire, British Red Cross and Order of St. John of Jerusalem
Lindsay Budd, Chairman, Virgin Metals Committee, Ministry of Munitions
Kathleen Burke
Capt. Sydney Bernard Burney, Assistant Director General of Voluntary Organizations
Geoffrey Butler, Dept. of Information, Foreign Office
Thomas Sivewright Catto, Ministry of Shipping
Fernley John Chamberlain, Assistant Sec. and Chief of Staff to the National Council of Young Men's Christian Associations
Brig.-Gen.-General Harry Anthony Chandos-Pole-Gell, Chairman, Derbyshire War Agricultural Executive Committee
Professor Frederic John Cheshire, Adviser on Scientific Side of Optical Munitions Branch, Ministry of Munitions
Clementine Churchill, Ladies Auxiliary Committee (Munitions Section), Y.M.C.A.
Maynard Willoughby Colchester-Wemyss Acting Chief Constable of Gloucestershire
Maj. Charles John Bowen Cooke, Chief Mechanical Engineer, London and North Western Railway
Maj. Edwin Charles Cox, Superintendent of the Line, South Eastern and Chatham Railway
Maj. Edward Yorke Daniel, Sec. of the Historical Section of the Committee of Imperial Defence
Albert Davidson, Managing Director, Messrs. Hattersley and Davidson Ltd., Sheffield
Charles Llewelyn Davies, Assistant Paymaster-General
Ernest Davies, Deputy Inspector under the Aliens Act
Henry William Carless Davis, Deputy Chairman, War Trade Intelligence Dept.
John Samuel Champion Davis County Director, Devonshire, British Red Cross and Order of St. John of Jerusalem
Howard d'Egville, Honorary Sec. of the United Kingdom Branch of the Empire Parliamentary Association; Comm. under the Military Service (Civil Liabilities) Committee
Rafael Chioquetti
Pedro Costa
Edward Evershed Dendy, Chairman, Semi-manufactured Metals Committee, Ministry of Munitions
Arthur Lewis Dixon, Assistant Sec., Home Office
Capt. The Hon. Charles Joseph Thaddeus Dormer, Royal Navy, Chairman of the Admiralty Licensing Sub-Committee, War Trade Dept.
Col. Charles William Ernest Duncombe County Director, West Yorkshire, British Red Cross and Order of St. John of Jerusalem
Frances Hermia Durham, Chief Woman Inspector at Central Offices of Employment Dept., Ministry of Labour
Arthur James Dyke, Assistant Sec., Board of Customs and Excise
Agnes Murray Ebden, Deputy President, Hastings Division, British Red Cross and Order of St. John of Jerusalem
Ethel Edgar, Ladies Auxiliary Committee (Munitions Section), Y.M.C.A.
George Edwards, Auditor and Controller, Imperial Munitions Board, Canada
William James Evans, Principal Clerk, Sec.'s Dept., Admiralty
Peter Dewar Ewing, General Manager, Ailsa Shipbuilding Company, Troon
John Edward Ferard, Assistant Sec. (Officiating Sec.), Judicial and Public Dept., India Office
Capt. Matthew Benjamin Dipnall Ffinch Assistant Chief Constable in Charge of Special Constabulary, Essex
William John Fieldhouse
Edward FitzGerald, Assistant to Chairman, Imperial Munitions Board, Canada
William Joseph Fitzherbert-Brockholes Chairman, Lancashire War Agricultural Executive Committee
Lt.-Col. Herbert Lindsay Fitzpatrick, Red Cross Comm., Salonika
Horace Shepherd Folker, Head of Equipment Dept., Headquarters Staff, British Red Cross Society, London
Maj. John Henry Follows, Acting General Superintendent, Midland Railway
Edward Rodolph Forber, Sec., Military Service (Civil Liabilities) Committee
George Herbert Fowler, Hydrographic Dept., Admiralty
Capt. George Charles Frederick, Royal Navy, Shipping Intelligence Ofc., Liverpool
George Samuel Fry, Formerly Accountant-General of the Board of Trade; Member of the Coal Exports Committee
Thomas Alexander Fyfe, Sheriff Substitute of Lanarkshire; Chairman, Glasgow Munitions Tribunal
Frank Walls Garnett President of the Royal College of Veterinary Surgeons
Lt.-Col. Frank Garrett Chairman, Messrs. Garrett and Sons, Leiston
Heathcote William Garrod, Deputy Controller, Labour Regulation Dept., Ministry of Munitions
Laura Gwendolen Gascoigne, Commandant, Lotherton Hall Auxiliary Hospital, Aberford, West Yorkshire
Stephen Gaselee, Dept. of Information, Foreign Office
Mager Frederic Gauntlett Late Sec., Shipyard Labour Dept., Admiralty
loan Gwilym Gibbon, Principal of the Dept. dealing with Military Service Tribunals, Local Government Board
Victoria Florence de Burgh Gibbs, Vice-President, Long Ashton Division of Somersetshire, British Red Cross and Order of St. John of Jerusalem
David Gilmour, Formerly Resident Engineer, now Member of Board of Management, H.M. Factory, Gretna, Ministry of Munitions
Henry Glendinning, Chemical Director, Messrs. Brunner Mond and Co., Limited, Northwich
Lewis Gordon, Deputy Controller, Small Arms Ammunition, Ministry of Munitions
Col. George Joachim, Viscount Goschen, Director of Labour Division, Food Production Dept.
Robert Ernest Graves, Deputy Comm. of Trade Exemptions Dept., Ministry of National Service
Maj. William Wylie Grierson, Chief Engineer, Great Western Railway
Rosamund, Lady Henry Grosvenor, Ladies Auxiliary Committee (Munitions Section), Y.M.C.A.
Maj. Anselm Verner Lee Guise, Director of Stores, British Red Cross Society, Boulogne
Frances Bett, Lady Hadfield, Donor and Administrator, No. 5 Hospital, Wimereux, France
Arthur Edward Hadley, Assistant Controller of Inspection of Munitions, Ministry of Munitions
Ernest Varley Haigh, Controller, Trench Warfare Supply Dept., Ministry of Munitions
Arthur Henry Hall, Director of Torpedoes and Mines Production, Controller's Dept., Admiralty
John Harrison, Chairman of the City of Edinburgh Local Tribunal
Ralph Endersby Harwood, Sec. of the War Trade Statistical Dept.
William Hawk Chairman, Cornwall War Agricultural Executive Committee
Alfred Ernest William Hazel Deputy Controller, Priority Dept., Ministry of Munitions
Alexander Pearce Higgins Lecturer on International Law at Cambridge, and President of the Society of Public Teachers of Law
Professor William Richard Hodgkinson Professor of Chemistry and Metallurgy, Ordnance College, Woolwich
Arthur William Holmes, Director of Contracts, Royal Commission on Wheat Supplies
Collingwood Hope Chairman, Essex Appeal Tribunal
John Wilson Hope, Chairman of the Committee for the Purchase of Army Camp Refuse
Leonard Thomas Horne, Assistant Sec., Ministry of Pensions
Lancelot Worthy Horne, Superintendent of the Line, London & North Western Railway
George Henry Hunt Accountant, Treasury
Summers Hunter, Member of the Admiralty Shipbuilding Council
Cyril William Hurcomb, Deputy Director of Commercial Services, Ministry of Shipping
Rear-Admiral Edward Fitzmaurice Inglefield, Royal Navy, Sec. of Lloyd's Register of Shipping
Daniel Jackson, Partner and Head of Shipyard, Messrs. Denny Brothers, Dumbarton
Lt.-Cmdr. Basil Oliver Jenkins Member in charge of Aviation, British War Mission, United States of America
Walter St. David Jenkins, Assistant Director of Contracts, Admiralty
Harry Marshall Jonas, Member of Valuation Advisory Committee, Controlled Establishment Branch, Ministry of Munitions
Charles Henry Jones, Registrar-General of Shipping and Seamen
Frederick McCulloch Jowitt
Harold Godfrey Judd, Deputy Controller, Contracts Dept., Ministry of Munitions
Walter George Kent, of Messrs. George Kent, Ltd., Luton
Robert Killin, Superintendent of the Line, Caledonian Railway
Alfred Clive Lawrence, Head of the Intelligence Branch of the Procurator-General's Dept.
Florence Edith Victoria Leach, Controller of Inspections, Women's Army Auxiliary Corps
Rudolf Gustav Karl Lempfert Superintendent of the Forecast Division, Meteorological Office
Norman Alexander Leslie, Ministry of Shipping
Edgar Stanford London, Deputy Chief Inspector of Taxes, Inland Revenue
Arthur Lucas, Deputy Director, Dept. of Import Restrictions, Board of Trade
William Joseph Luke, Shipyard Director, Messrs. John Brown & Company, Ltd., Clydebank
William Royse Lysaght Technical Adviser, Non-Ferrous Materials Dept., Ministry of Munitions
Horacio George Arthur Mackie, His Majesty's Consul-General, Buenos Aires
James Borrowman MacLean, Controller, Gun Manufacture, Ministry of Munitions
William Turner MacLellan Assistant Controller, Iron and Steel Production, Ministry of Munitions
Frederick Larkins MacLeod, Adviser on Foreign Iron Ores, Ministry of Munitions
Terence Charles Macnaghten, Principal Clerk, Colonial Office
Charles Cornelius Maconochie Sheriff of the Lothians and Peebles; Chairman of the Lothian Appeal Tribunal
Edmund John Maginness Manager, Constructive Dept., H.M. Dockyard, Chatham
James Rochfort Maguire, Ladies Auxiliary Committee (Munitions Section), Y.M.C.A.
George Malcolm
Alfred Mansfield, Director of Oils and Fats
James Marr Member of the Admiralty Shipbuilding Council
Thomas Rodgerson Marsden, Managing Director, Messrs. Platt Brothers & Company, Oldham
Wing-Capt. Edward Alexander Dimsdale Masterman, Royal Naval Air Service
Arthur Stanley Mather Chairman, Lancashire (West Derby Hundred) Appeal Tribunal
Richard Edward Lloyd Maunsell, Mechanical Engineer, South Eastern and Chatham Railway
Oliver Hill McCowen Sec. in Charge of Y.M.C.A. work in France
The Hon. Henry Duncan McLaren Director, Area Organisation, Ministry of Munitions
William Bentley McMillan Provost of Greenock
Harry Bell Measures Director of Barrack Construction, War Office
His Honour Judge Francis Hamilton Mellor Chairman, Lancashire (Salford Hundred) Appeal Tribunal
Frank Herbert Mitchell, Assistant Director, Official Press Bureau
Maj. Robert Mitchell, Director of Training, Ministry of Pensions
William Mitchell-Thomson Director of the Restriction of Enemy Supplies Dept.
Col. James Alexander Lawrence Montgomery, British Red Cross Comm., East Africa
Lt.-Col. Charles Langbridge Morgan, Late Chief Engineer, London, Brighton and South Coast Railway
Hopkin Morgan Chairman, Glamorganshire County Council; Mayor of Neath; Chairman, West Glamorganshire Appeal Tribunal
Thomas Harry Mottram, Divisional Inspector of Mines; Chairman of Colliery Recruiting Courts, Yorkshire and North Midlands Division
William Arthur Mount Civil Member of Claims Commission, War Office
Conrad James Naef, Deputy Accountant-General of the Navy
Daniel Neylan, Chief Accountant, War Office; late Financial Adviser to the Salonika Expeditionary Force
Thomas Norton Chairman, Yorkshire West Riding Appeal Tribunal
Arthur Eugene O'Neill, Ministry of Shipping
Lt.-Col. Claude Bowes Palmer County Director, Northumberland and Durham, British Red Cross and Order of St. John of Jerusalem
Maj. Edward Howard Thornbrough Parsons, Chief Constable, Metropolitan Police
James Peech, Adviser on Shell Steel, Ministry of Munitions
His Honour Judge George Bettesworth Piggott, Chairman of Special Local Tribunal for London and Member of London Appeal Tribunal
Henry Howard Piggots, Assistant Sec., Parliamentary and General, Ministry of Munitions
Charles Ralph Pinder, Resident Engineer, H.M. Factory, Oldbury; formerly Construction Manager, H.M. Factory, Queensferry, and H.M. Factory, Avonmouth, Ministry of Munitions
Henry Pledge, Assistant Director of Naval Construction, Admiralty
William Jackson Pope Professor of Chemistry, University of Cambridge; Member of Panel of Board of Invention and Research, Admiralty
Helen Matilda, Lady Procter, Chairman, Munition Workers Welfare Committee, Y.W.C.A.
James Railton, Partner in the Firm of Messrs. Topham, Jones and Railton
Harry Rawson Chairman, City of Edinburgh Territorial Force Association
George Grey Rea Member of the President of the Board of Agriculture's Committee Food Production Advisory
Lt.-Col. Hugh Reid Member of War Executive and of the Scottish National Red Cross and Ralston Hospital Committee of the Scottish Branch, British Red Cross Society
Arthur John Relton, Member of the Aircraft Insurance Committee
Brevet Lt.-Col. Thomas Duncan Rhind, Controller of Statistics, Ministry of National Service
John Richie Richmond, Managing Director of Messrs. J. M. Weir, Ltd., Cathcart
Gervase Henry Roberts, Superintendent, Mechanical Engineering Dept., Woolwich Arsenal
John Robertson, Provost of the Burgh of Paisley; Chairman of the local National Service and Food Control Committees; Member of Appeal Tribunal
William Robinson, Financial Sec., India Office
William Arthur Robinson Assistant Sec., H.M. Office of Works
Corisande Evelyn Vere, Baroness Rodney, Y.M.C.A. Worker
Archibald John Campbell Ross, Member of the Admiralty Shipbuilding Council
John Rowland Late Chief Comm. of National Service, Wales
Matthew Adkins Rundell, Government representative on the London group of War Risks Associations; Government representative on the Fishing Vessels War Risks Insurance Association
Edward Russell Clarke Expert Adviser to the Naval Staff on Wireless Telegraphy
Nils Percy Patrick Sandberg, Director of Inspection of Steel (Land Service), Ministry of Munitions, and Associate Member of Ordnance Committee
Charles John Ough Sanders, Superintendent for Wrecks and Loss of Life at Sea; in the Marine Dept., Board of Trade
Capt. William Stephen Sanders, Sec. to the British Section of the International Socialist Party
William Samuel Sarel, Assistant Accountant-General of the Navy
Maj. Finlay Forbes Scott, Superintendent of the Line, London, Brighton and South Coast Railway
Col. John Scott-Riddell Red Cross Comm. for North Eastern District of Scotland
Albert Senior Principal Partner, Messrs. G., Senior & Sons, Ltd., Sheffield
John Davenport Siddeley, Managing Director of the Siddeley-Deasy Co., Ltd.
William Anker Simmons Agricultural Adviser, Ministry of Food
Arthur William Smallwood
Frederick Smith, Assistant Director of Materials and Priority, Controller's Dept., Admiralty, New Zealand Expeditionary Force
Launcelot Eustace Smith, Chairman and Managing Director, Messrs. Smith's Dock Company, Ltd., Tyne Branch
Thomas Octave Murdoch Sopwith, Chairman and Test and Experimental Manager of Sopwith Aviation Co., Ltd.
William Spens, Foreign Trade Dept.
Ernest Edward William Squires, General Manager, Metropolitan Carriage, Wagon & Finance Company, Ltd., Birmingham
Josiah Charles Stamp Assistant Sec. to the Board of Inland Revenue
Lockhart Stephens County Director, Hampshire British Red Cross and Order of St. John of Jerusalem
Frances Louise Stevenson, Private Sec. to the Prime Minister
Thomas Henry Craig Stevenson Superintendent of Statistics, General Register Office
Mary Margaret Stewart-Mackenzie
William Chester Still, Senior Partner of Messrs. W. M. Still and Sons
John William Stone, Surveyor of Lands, Director of Works Dept., Admiralty
Lucy Granville Streatfeild, Member of Soldiers Dependants Assessment Appeals Committee
John Stuart, Managing Director, Messrs. Ross, Ltd., London
The Hon. Violet Stuart-Wortley, Ladies Sec. to the Headquarters Committee, Y.M.C.A.
The Hon. Reginald Gilbert Murray Talbot, Chairman, London Munitions Tribunal
Frank Tatlow, Deputy General Manager, Midland Railway
Lt.-Col. Percy Crosland Tempest, Chief Engineer, South Eastern and Chatham Railway
Capt. William Hugh Tomasson Chief Constable of Nottinghamshire and Acting Inspector of Constabulary
Wynn Harold Tregoning, Ministry of Shipping; a Membef of the Ship Licensing Committee
Joseph Harling Turner
John James Virgo, National Field Sec. to the Y.M.C.A.
Lt.-Col. David Wallace Red Cross Comm. for Eastern District of Scotland
Hugh Walpole
Evelyn Mayura Walters, Honorary Sec., Kensington Division, British Red Cross and Order of St. John of Jerusalem; Organiser of the Weir Hospital, Balham
Lady Susan Elizabeth Clementine Waring, Donor and Administrator, Auxiliary Hospital for Convalescent Ofc.s, Lennel, Coldstream, Berwick
Maj. Henry Angus Watson, General Superintendent, North Eastern Railway
Alexander Strahan Watt, Lawrence WeaverDirector of Supplies Division, Food Production Dept.
Harry James Webb, Royal Corps of Naval Constructors; Chief Constructor and Superintendent, Dockyard Branch, Controller's Dept., Admiralty
Philip George Lancelot Webb, Deputy Controller of Petrol Dept., Board of Trade
Wilfred Howard Williams, Director of Inland Transport, Ministry of Munitions
Col. Frederic Herbert Williamson, Royal Engineers, Director of Army Postal Service (Home); Principal Clerk, Sec.'s Office, General Post Office
John William Willis-Bund Chairman, Worcestershire County Council; Chairman, Worcestershire Appeal Tribunal; Chairman, Worcestershire National Relief Fund
Horace John Wilson, Sec. to Committee on Production, Ministry of Labour
John James Withers
Humbert Wolfe, Controller, Labour Regulation Dept., Ministry of Munitions
Edith Amelia, Baroness Wolverton, Ladies Auxiliary Committee (Munitions Section), Y.M.C.A.
Professor Thomas Barlow Wood, Drapers Professor of Agriculture in the University of Cambridge; Adviser on Meat Production to the President of the Board of Agriculture, and Chief Executive Ofc., Army Cattle Purchase Scheme
Alfred Woodgate, Assistant Sec. to the Ministry of Shipping
Raymond Wybrow Woods, Chief Clerk, Treasury Solicitor's Dept.
Thomas Worthington, Late Head of the Commercial Intelligence Dept. of the Board of Trade
Maj. Lionel Maling Wynch Sec. to Red Cross Comm., France
Lt.-Col. Charles John Wyndham, Late County Director, Sussex, British Red Cross and Order of St. John of Jerusalem
Harold Edgar Yarrow, Director of Messrs. Yarrow & Company
John Horatio Yolland, Chief of Staff of County Director, Kent, British Red Cross and Order of St. John of Jerusalem
George Udny Yule, Director of Requirements, Ministry of Food
For services in connection with the War in France, Egypt and Salonika —
Arthur Beagley Beavis, Financial Adviser, British Salonika Force
Rachel, Countess of Dudley, Honorary Superintendent, No. 32 Stationary Hospital, France; Honorary Superintendent, Expeditionary Force, Ofc.s' Clubs and Rest Houses
Lady Mabelle Annie Egerton, in charge of Station Coffee Stall, Rouen
Robert Godfrey Peckitt, Chief Mechanical Engineer, Egyptian State Railways
British India
Jeanie, Lady Meston, Head of the branch of the Red Cross in Allahabad
Lt.-Col. Frank Popham Young Indian Army, Comm., Rawalpindi Division, Punjab
Sir Robert Swan Highet, Agent, East Indian Railway, Calcutta
Nawab Sir Faridoon Daula Bahadur Assistant Political Minister to His Highness the Nizam's Government
Montagu de Pomeroy Webb Manager, Forbes, Forbes, Campbell and Co., Karachi, Bombay Presidency
Commonwealth of Australia
Mary Antill, Organiser, War Chest Fund, Sydney
Henry Ebenezer Budden, Organiser, Overseas Australian Comforts Funds
Guillaume Daniel Delprat, for services in connection with steel supplies, etc.
Mary, Lady Hennessy, Organiser, Victorian Branch, Australian Comforts Fund
Beatrice Henty, Sec., Australian Comforts Fund, Melbourne
Maj. Frank de Villiers Lamb, for services in connection with the Australian Branch of the British Red Cross Society in England and Egypt
Clare Lyle
Hugh Victor McKay, for services in connection with war industries
Orme Masson
Eliza Fraser Mitchell, for services in connection with the Australian Branch of the British Red Cross Society in England and Australia
Lt.-Col. William James Norman Oldershaw, for services in connection with the Commonwealth Shipping Board
Frances Mary Woolcott, Honorary Organiser of the Button Fund
William James Young, for services in connection with Shipping
Dominion of New Zealand
Jacobina Luke
Christina Allan Massey
Robert Howard Nolan, Honorary Sec., New Zealand Soldiers' Club
Theresa Dorothea, Lady Ward
Oriana Fanny Wilson
Egypt and the Sudan
Ernest Macleod Dowson, Director-General of Survey Dept.
Cecil Gordon Crawley, in charge of the Government Arsenals
Wasey Sterry, Chief Justice in the Sudan
George Eustace Burnett-Stuart, Director of Personnel in Ministry of Interior
Newfoundland
The Hon. James Augustus Clift Acting Minister of Agriculture and Mines, Vice-Chairman of the Standing Committee of the Patriotic Association, Member of the Recruiting Committee and the Pensions Board
Union of South Africa
Hester Marion Carter, of the Red Cross and Comforts Committee, Cape Town
Ernest Chappell, Chairman of the Johannesburg Branch of the Comforts Committee
Douglas Christopherson, Vice-Chairman, Johannesburg Local Committee, Governor-General's Fund, and Chairman of the Disabled Soldiers Board, Johannesburg
The Hon. Eleanor Birch Wilson-Fox, Chairman, South African Comforts Committee in London
Jessie Dodd, Lady Rose-Innes
Thomas Slingsby Nightingale Sec. to the High Comm. in London for the Union of South Africa
Evelyn Ashley Wallers, President of the Transvaal Chamber of Mines
Crown Colonies, Protectorates, etc.
Andrew Agnew, Chairman of River Craft Committee, Member of Food Control and Shipping Committee, and Commandant of the Civil Guard, Straits Settlements
Thomas Alexander Vans Best Administering the Government of the Leeward Islands
Ethel Dorothy Bowring, for services to the East African Expeditionary Force
Francis George Bury, Honorary Treasurer, King George and-Queen Mary's Club for the Oversea Forces
Thomas Fraser Burrowes, Comptroller of Customs and Receiver of Enemy Estates, Nigeria
William Morris Carter, Chief Justice of His Majesty's High Court of Uganda, and Chairman of the Uganda Supplies Board
Elizabeth Lydia Rosabelle, Lady Clifford, for charitable services in the Gold Coast Colony
Henry Lawson De Mel, for services to the Government of Ceylon
Sir Frederick Evans for services to the Government of Gibraltar
Henry Cowper Gollan Attorney-General and Chairman of the Food Committee of the Colony of Trinidad and Tobago
Richard Allmond Jeffrey Goode, Sec. to the Administration, Northern Rhodesia
Francis.Charles Jenkin, Deputy Superintendent, Special Police Reserve, Hong Kong
Reginald Fleming Johnston, District Ofc. and Magistrate, Weihaiwei
Joseph Horsford Kemp, Attorney-General of the Colony of Hong Kong
Albert Ernest Kitson, Director, Geological Survey Dept., Gold Coast Colony
Henry Marks, Member of the Executive and Legislative Councils of the Colony of Fiji; for services to various patriotic funds
Mary Ethel, Baroness Methuen, for services to the sick and wounded in Malta
Alice, Lady Miles, President of the-Red Cross and other funds, Gibraltar
Nana Ofori Atta, Paramount Chief of Akin Abuakwa; for services to the Government of the Gold-Coast Colony
Alexander Ransford Slater Colonial Sec. of the Gold Coast Colony, for special services in connection with recruiting
Hippolyte Louis Wiehe du Coudray Souchon, Representative in London of the Mauritius' Chamber of Agriculture
Honorary Cmdrs of the said Most Excellent Order
Abubakar Garbai, Shehu of Borno, for services in connection with the Cameroon Campaign
Sheikh Ali bin Salim, Assistant Liwali, Mombasa
Muhammadu Abba, Emir of Yola, for services in connection with the Cameroon Campaign
Officer of the Order of the British Empire (OBE)
Member of the Order of the British Empire (MBE)
Royal Red Cross
First Class (RRC)
Millicent Acton, Matron, Territorial Force Nursing Service (T.F.N.S.)
Margaret Anderson, Head Sister, Australian Army Nursing Service
Edith Elizabeth Appleton, Acting Sister, Civil Hospital Reserve, St. Bartholomew's
Ellen Elizabeth Baldrey, Sister, Queen Alexandra's Imperial Military Nursing Service Reserve (Q.A.I.M.N.S.R.)
Marian Winfield Bannister, Sister, Q.A.I.M.N.S.R.
Frederickke Wilhelmina Christopherson, Assistant Matron, Q.A.I.M.N.S.R.
Mary Constance Clark, Superintending Sister, Queen Alexandra's Royal Naval Nursing Service (Q.A.R.N.N.S.)
Grace Corder, Sister, Q.A.I.M.N.S.R.
Helen Cousins, Matron, 10, Palace Green, W. London
Elizabeth Joan Cumming, Matron, Army Nursing Service Reserve
Nora Dalrymple, Sister, Q.A.I.M.N.S.R.
Ethel Sarah Davidson, Matron, Australian Army Nursing Service (A.A.N.S)
Annie Blackley Denton, Acting Matron, Q.A.I.M.N.S.R.
Helen Dey, Acting Sister, Queen Alexandra's Imperial Military Nursing Service (Q.A.I.M.N.S.)
Clarice Molyneux Dickson, Sister, Australian Army Nursing Service
Maud Alice Dunn, Sister, T.F.N.S.
Nora Easby, Acting Sister, Civil Hospital Reserve, St. Thomas Hospital
Lily Agnes Ephgrave, Staff Nurse, Q.A.I.M.N.S. (retired)
Gertrude Annie Flood, Matron, Military Orthopaedic Hospital, Shepherd's Bush
Mary. Gladys Connie Foley, Sister, Q.A.I.M.N.S.
Dorothy Penrose Foster, Sister, T.F.N.S.
Myra Goodeve, Matron, Canadian Army Medical Corps
Frances Mary Hall, Acting Matron, Q.A.I.M.N.S. (retired)
Jane Anne Hannah, Sister, T.F.N.S.
Elsie Emma Harlow, Sister, Q.A.I.M.N.S.R.
Ethel Harwood, Sister, Q.A.I.M.N.S.R.
Katie Payne Hodge, Sister, Q.A.I.M.N.S.R., Australia
Minnie Holmes, Sister, T.F.N.S.
Ethel Julia Marion Keene, Q.A.I.M.N.S.
Estelle Venner Keogh, Staff Nurse, Q.A.I.M.N.S.R., Australia
Mary Walker Langlands, Sister, T.F.N.S.
Dorothy Ann Laughton, Sister, T.F.N.S.
Gertiude Lulham, Sister, T.F.N.S.
Margaret Joan Leonara Lyons, Acting Sister, Q.A.I.M.N.S.R.
Elizabeth Lusk Macaulay, Acting Sister, Civil Hospital Reserve, Edinburgh Mental Hospital
Cordelia MacKay, Acting Matron, Q.A.I.M.N.S.
Janet McGregor McDonald, Nursing Sister, Canadian Army Medical Corps
Katherine Violet Saile Merriman, Sister, T.F.N.S.
Isabel Muirhead Muir, Sister, T.F.N.S.
Gertrude Napper, Staff Nurse, Q.A.I.M.N.S.R.
Alice Nye, Matron, Nursing Service
Ida O'Dwyer, Head Sister, Australian Army Nursing Service
Mildred Alice Oakley, Sister, Acting Matron, T.F.N.S.
Elizabeth Orr, Assistant Matron, Q.A.I.M.N.S.R.
Rachel Patterson, Matron, Nyasaland Nursing Service
Kathleen Agnes Prendergast, Acting Matron, Q.A.I.M.N.S.R.
Minnie Farquharson Proctor, Sister, Australian Army Nursing Service
Elizabeth Rogers, Acting Sister, Q.A.I.M.N.S.R.
Violet Rogers, Sister, T.F.N.S.
Alice Rowe, Sister, Q.A.I.M.N.S.
Amelia Julia, Lady Sargant Commandant and Matron, St. Anselm's Hospital, Walmer
Eva Owen Schofield, Acting Sister, Civil Hospital Reserve, Edinburgh Royal Infirmary
Helen Donaldson Shearer, Nursing Sister, Canadian Army Medical Corps
Margaret Helen Smyth, Sister, Q.A.I.M.N.S.
Alice Violet Stewart, Senior Nursing Sister, Nursing Service
Louisa Stobo, Head Sister, Australian Army Nursing Service
Marky Minto Tait, Acting Sister, Civil Hospital Reserve, Glasgow Western Infirmary
Jean Urquhart, Matron, Canadian Army Medical Corps
Margaret Whitson, Matron, British Red Cross Society
Maude Willes Sister, Q.A.I.M.N.S.
Eva Florence Wilson, Staff Nurse, Q.A.I.M.N.S.R.
Nella Myrtle Wilson, Assistant Matron, Canadian Army Medical Corps
Adelaide Anne Wood, Sister, Q.A.I.M.N.S.R.
Second Class (Associate RRC)
Maud Alice Abraham, Acting Sister, Civil Hospital Reserve, Middlesex Hospital
Louisa Joyce Acton, Town Hall Hospital, Torquay
Helen Addison, Sister, Q.A.I.M.N.S.R.
Betty Angel, Acting Sister, Civil Hospital Reserve, Royal Free Hospital
Esther Lydia Ashby, Sister, T.F.N.S.
Ellen Atkinson, Staff Nurse, Q.A.I.M.N.S.R.
Alfreeda Jean Attrill, Nursing Sister, Canadian Nursing Service
Frances Ethel Bach, Acting Sister, Civil Hospital Reserve, David Lewis Hospital, Liverpool
Annie Baillie, Nursing Sister, Canadian Army Medical Corps
Geraldine Catherine Ball, Acting Sister, Q.A.I.M.N.S.R.
Annie Barns, Acting Sister, Civil Hospital Reserve, London Hospital
Florence Marion Bartleet, Acting Matron, Q.A.I.M.N.S.R.
Francis Ethel Barwell, Acting Sister, Q.A.I.M.N.S.R.
Henrietta Bauman, Sister, South African Medical Nursing Service
Susan Baxter, Acting Sister, Civil Hospital Reserve, Mile End Infirmary
Mary du Caurroy, The Duchess of Bedford, Woburn Auxiliary Hospital, Bedford
Beatrice Emily Beeson, Special Probationers Nursing Service
Louisa Bennett, Sister, British Red Cross Society
Marianne Ballingall Bennett, Assistant Matron, Q.A.I.M.N.S.R.
Mother Mary Berckmans, Matron, Military Hospital, Waterloo Park, Lancashire
Louisa Harriett Berry, Staff Nurse, T.F.N.S.
Elizabeth May Best, Nursing Sister, Canadian Army Medical Corps, Nursing Service
Florence Ethel Bickmore, Sister, British Red Cross Society
Frances May Billington, Acting Sister, Q.A.I.M.N.S.R., New Zealand
Annie Blackburn, Staff Nurse, T.F.N.S.
Ada Blackmail, London Hospital
Emily Coleclough Blake, Nursing Sister, South African Medical Nursing Service
Elsie Blest, Voluntary Aid Detachment
Constance Boschoff, Staff Nurse, Clandon Park, Guildford
Emily Caroline Clifford Bramwell, Matron, The Red House Auxiliary Hospital, Leatherhead
Margaret Allen Brander, Sister, T.F.N.S.
May Gertrude Broadbent, Voluntary Aid Detachment
Katharine Alice Broade, Sister, Q.A.I.M.N.S. (retired)
Flora McDonald Browning, Acting Sister, Civil Hospital Reserve, Royal Infirmary, Sunderland
Mabel Emma Bruce, Nursing Sister, Canadian Army Medical Corps, Nursing Service
Amy Ada Bryant, Matron, Benfleet Hall Auxiliary Hospital, Sutton
Mathilde Bull, Sister, T.F.N.S.
Marguerite Eveline Bunyard, Voluntary Aid Detachment
Ellen Josephine Burke, Staff Nurse, Civil Hospital Reserve, Royal Victoria Hospital, Belfast
Georgia Burke-Roche, Sister, Nursing Service
Helen Caig, Acting Sister, Civil Hospital Reserve, Queens Hospital, Birmingham
Nina Cairns, Sister, Q.A.I.M.N.S.R.
Alexine Cameron, Sister, T.F.N.S.
Edith Clare Cameron, Sister, Australian Army Nursing Service (AANS)
Helen Margaret Cameron, Sister, Q.A.I.M.N.S.R.
Eve Mary Campbell, The Hon. Nursing Sister, East Africa Nursing Service
Mary Roslyn Carr, Matron, British Red Cross Society
Edith Emma Dorothy Carter, Acting Sister, Q.A.I.M.N.S.R.
Stella Caulfield, Voluntary Aid Detachment
Kathleen Cawler, Staff Nurse, Q.A.I.M.N.S.R.
Sarah E. Chadwick, Sister, St. Johns Hospital, Southport
Lily Langshaw Chapman, Sister, T.F.N.S.
Julie Mary Clancy, Staff Nurse, Civil Hospital Reserve, London Hospital
Marguerite Gérard-Clément, Sister (late A.N.S.), Military Hospital, Newcastle upon Tyne
Mary Fynes Clinton, Voluntary Aid Detachment
Lynda Mary Coates, Acting Sister, Civil Hospital Reserve, Royal Devon and Exeter Hospital
Jessie Alexander Connal, Sister, T.F.N.S.
Isabel Connor, Nursing Sister, Australian Army Medical Corps, Nursing Service
Ianthe Constantinides, Voluntary Aid Detachment
Edith Marie Cooper, Acting Sister. Q.A.I.M.N.S.R.
Amy Isabel Coward, Sister, T.F.N.S.
Margaret Rosetta Cox, Sister, T.F.N.S.
Isobella Craig, Acting Sister, Civil Hospital Reserve, Glasgow Royal Infirmary
Mary Craig, Staff Nurse, South African Medical Nursing Service
Helen Patterson Crawford, Sister, T.F.N.S.
Mary Matthewson Crichton, Acting Sister, Civil Hospital Reserve, Manchester Royal Infirmary
Annie Crooks, Acting Sister, Civil Hospital Reserve, London Hospital
Jean P. Cullen, Nursing Sister, Queen Alexandra's Royal Naval Nursing Service Reserve (Q.A.R.N.N.S.R.)
Ethel Mary Cumberledge, Acting Sister, Civil Hospital Reserve, St. Bartholomew's
Agnes Elizabeth Cummings, Acting Sister, Q.A.I.M.N.S.R.
Constance Cundell, Voluntary Aid Detachment
Mary Curran, Acting Sister, Civil Hospital Reserve, Royal City of Dublin Hospital
Elsie Frances Curtis, Sister, Q.A.I.M.N.S.R.
Clare Daglish, Voluntary Aid Detachment
May Dale, Nursing Sister, East Africa Nursing Service
Henrietta Daly, Acting Sister, Civil Hospital Reserve, London Hospital
Marianne Emaline Dann, Matron, Red Cross Hospital, Hillfield, Reigate
Christina Anderson Davidson, Staff Nurse, T.F.N.S.
Mary Anne Davies, Sister, Q.A.I.M.N.S.R.
Isabel May Day, Acting Sister, Q.A.I.M.N.S.R.
Alma Margaret Mary Denny, Sister, Q.A.I.M.N.S.R.
Christina McI. Dewar, Nursing Sister, Q.A.R.N.N.S.R.
Gertrude Marion Doherty, Staff Nurse, Australian Army Nursing Service
Edith Victoria Donaldson, Acting Sister, Q.A.I.M.N.S.R., Australia
Helen Louise Drinkwater, Sister, T.F.N.S.
Mary Annie Earp, Voluntary Aid Detachment
Alice Mary Eastes, Acting Sister, Q.A.I.M.N.S.R.
Mary Richmond Easton, Matron, Headquarters, London
Mary Eksteen, Staff Nurse, South African Medical Nursing Service
Christabel Mary Ellis, Voluntary Aid Detachment
Mary Emerson, Sister, Hildens Military Hospital, Haslemere
Bessie Ernest, Voluntary Aid Detachment
Eliza Ann Everett, Nurse, Regents Park Hospital, Southampton
Margaret Fanny Fell, Sister, T.F.N.S.
Helen Mary Fergusson, Sister, T.F.N.S.
Charlotte Fitzmayer, Sister, Q.A.I.M.N.S. (T)
Nora Fitzpatrick, Nurse (Nursing Services), Dublin
May Armstrong Fletcher, Staff Nurse, Q.A.I.M.N.S.R.
Jean Forbes, Staff Nurse, Q.A.I.M.N.S.R.
Ella Foskett, Sister, T.F.N.S.
Helen Leila Fox, Acting Sister, Q.A.I.M.N.S.R.
Winifred Heath Fray, Nursing Sister, Canadian Army Medical Corps
Jessica Lillington Freshfield, Sister, British Red Cross Society
Kleo Friend, Commandant, The Castle Auxiliary Hospital, Ryde, Isle of Wight
Mary Furdham, Staff Nurse, Q.A.I.M.N.S.R.
Jean Fyfe, Asst Matron, Q.A.I.M.N.S.R.
Margaret Mary Galbraith, Asst Matron, Canadian Army Medical Corps, Nursing Service
Margaret Gall, Sister, T.F.N.S.
Elsie Vera Orby Gascoigne, Acting Sister, Civil Hospital Reserve, St. Bartholomew's Hospital
Mabel Emily Gascoine, Acting Sister, Civil Hospital Reserve, West Hertfordshire Hospital
Elsie Georgina Gawith, Voluntary Aid Detachment
Kathleen Gawler, Staff Nurse, Q.A.I.M.N.S.R.
Janet Elizabeth Giles, Matron, British Red Cross Society
Charlotte Mary Gooding, Sister, Kingston, Surbiton and District Red Cross Hospital, New Maiden
Katherine Marsh Gordon, Voluntary Aid Detachment Member
Edith Mary Goss, Lady Superintendent, Palace Auxiliary Hospital, Gloucester
Jemima Helen Grant, Acting Sister, Q.A.I.M.N.S.R.
Dora Granville Grayson, Acting Sister, Q.A.I.M.N.S.R.
Dorothy Greig, Special Probationers Nursing Service
Mary Ellen Grow, Sister, Oakenshaw Hospital, Surbiton
Edith Hadfield, Acting Sister, Civil Hospital Reserve, Hull Royal Infirmary
Mary Beatrice Hall, Staff Nurse, Q.A.I.M.N.S.R.
Jessie Jean Halliday, Staff Nurse, T.F.N.S.
Florence Harley, Sister, Q.A.I.M.N.S.R.
Eliza Agnes Harrison, Assistant Matron, T.F.N.S.
Sybil M. Harry, Sister, Headquarters, London
Lizzie Haxell, Acting Sister, Q.A.I.M.N.S.R.
Sarah Heaney, Nursing Sister, Canadian Army Medical Corps
Frances Henderson, Voluntary Aid Detachment
Dorothy Henderson, Nursing Sister, Q.A.R.N.N.S.
Helen Catherine Henry, Special Probationer Nursing Service
Georgina Hester, Acting Sister, Civil Hospital Reserve, University College Hospital
Ruth Hewlett, Voluntary Aid Detachment
Margaret Agnes Hilhard, Acting Sister, Civil Hospital Reserve, Guy's Hospital
Elizabeth Bridges Hill, Acting Sister, Q.A.I.M.N.S.R.
Norah Hill, Voluntary Aid Detachment
Gertrude Hind, Sister, T.F.N.S.
Ethel Madeline Gertrude Hirst, Nursing Sister, Q.A.R.N.N.S.
Jennie Holford, Sister, T.F.N.S.
Olive Kathleen Holmes, Nursing Sister, British Red Cross Society
Edith Hounslow, Voluntary Aid Detachment
Amy Howard, Nursing Sister, Canadian Army Nursing Service, Canadian General Hospital, Orpington
Edith Hudson, Nursing Member, Canadian Nursing Service
Ethel Hutchings, Sister, Nursing Service
Florance Hyndman, Acting Sister, Civil Hospital Reserve, Sir Patrick Dun's Hospital, Dublin
Georgina Swinton Jacob, Sister, Q.A.I.M.N.S.
Sybil Ada Catherine Jarvis, Acting Sister, Civil Hospital Reserve, St. Bartholomew's Hospital
Lilian Maud Jeans, Acting Sister, Civil Hospital Reserve, Charing Cross Hospital
Dorothy Jobson, Voluntary Aid Detachment
Isobella Kate Jobson, Staff Nurse, Q.A.I.M.N.S.R., Australia
Nora Johnson, Voluntary Aid Detachment
Sarah Persis Johnson, Nursing Sister, Canadian Army Medical Corps Nursing Service
Mary Ann Jones, Voluntary Aid Detachment
Kate Elizabeth Jones, Matron, Kingston, Surbiton District Red Cross Hospital, New Maiden
Nellie Ida Jordan, Sister, Q.A.I.M.N.S.
Mabel Kaberry, Acting Matron, Q.A.I.M.N.S.
Alicia Mary Kelly, Sister, Australian Army Nursing Service
Evelyn Stewart Killery, Sister, Q.A.I.M.N.S.
Charlotte Grace Kirkpatrick, Sister, T.F.N.S.
Annie Knox, Sister, T.F.N.S.
Jean Knox, Sister, Q.A.I.M.N.S.R.
Helen Lamb, Staff Nurse, T.F.N.S.
Anne Ardagh Langley, Acting Sister, Q.A.I.M.N.S.R.
Harriet Lascell, Matron, Kasr-el-Aine Hospital
The Hon. Margaret Cecilia Lawley, Voluntary Aid Detachment
The Hon. Ursula Mary Lawley, Voluntary Aid Detachment
Lorna Priscilla Leatham, Voluntary Aid Detachment
Annie Norrish Lee, Staff Nurse, Q.A.I.M.N.S.R.
Mary Anderson Linton, Staff Nurse, Civil Hospital Reserve, London Hospital
Constance Little, Voluntary Aid Detachment
Janet McFarlane Livingston, Acting Sister, Q.A.I.M.N.S.R.
Mary Frances Looney, Staff Nurse, New Zealand Army Medical Corps Nursing Service
Daisy Lynch, Acting Sister, Civil Hospital Reserve, Leicester Royal County Hospital
Edith Macarthy, Voluntary Aid Detachment
Ella Marie Louise MacFadden, Sister, Q.A.I.M.N.S.R.
Nellie Mackenzie, Sister, Q.A.I.M.N.S.R.
Annie Forguil Macleod, Staff Nurse, Q.A.I.M.N.S.R.
Jean Mair, Acting Sister, Q.A.I.M.N.S.R.
Letitia Mary Manley, Acting Sister, Civil Hospital Reserve, Middlesex Hospital
Louise Grace Mannell, Staff Nurse, Q.A.I.M.N.S.R.
Marion S. Marshall, Nursing Sister, Q.A.R.N.N.S.R.
Bertha Martin, Staff Nurse, Q.A.I.M.N.S.R.
Elizabeth Martin, Nursing Sister, Canadian Army Medical Corps
Mary Barbara Martin, Sister, Q.A.I.M.N.S.R.
Esther Chisholme Masterton, Staff Nurse, Civil Hospital Reserve, Glasgow Royal Infirmary
Beatrice Matthews, Staff Nurse, T.F.N.S.
Margaret Ballantyre McBride, Sister, T.F.N.S.
Madeline McCarthy, Voluntary Aid Detachment
Marion McCormick, Sister, Q.A.I.M.N.S.
Margaret McCort, Nursing Sister, Canadian Army Medical Corps
Mary Scott McDonald, Staff Nurse, Q.A.I.M.N.S.R.
Susannah Josephine McGann, Staff Nurse, New Zealand Army Nursing Service
Jessie McGillivray, Sister, Q.A.I.M.N.S.R.
Mary S. McHugh, Acting Sister, Q.A.I.M.N.S.R.
Caroline Amelia McIlrath, Staff Nurse, Q.A.I.M.N.S.R.
Florence McKellar, Staff Nurse, T.F.N.S.
Joan Davina Carstairs McPherson, Sister, Q.A.I.M.N.S.
Margaret Meikle, Matron, Cadland Auxiliary Hospital, New Forest, Hampshire
Ebba Wendell de Merrall, Nursing Sister, Canadian Army Nursing Service, Canadian General Hospital, Taplow
Mary Merrill, Voluntary Aid Detachment
Agnes Midgley, Matron, British Red Cross Society
Janet Mitchell, Staff Nurse, T.F.N.S.
Kate Mildred Moore, Matron, Headquarters, London
Grace Morgan, Matron, Arrowe Hall Hospital, Woodchurch, near Birkenhead
Gertrude Daisy Morris, Acting Matron, Q.A.I.M.N.S. (retired)
Martha Reid Morrison, Sister, T.F.N.S.
Helena Morrough, Sister, T.F.N.S.
Elizabeth Mosey, Sister, Australian Army Nursing Service
Ellen Murray, Acting Sister, Q.A.I.M.N.S.R.
Anne Elizabeth Musson, Sister, T.F.N.S.
Amy Augusta Neville, Voluntary Aid Detachment
Dorothy Jane Louisa Newton, Sister, Australian Army Nursing Service
Elizabeth Scott Newton, Acting Sister, Civil Hospital Reserve, Leith General Hospital
Eliza Jane Nicol, Sister, T.F.N.S.
Helena Nisbett, Voluntary Aid Detachment
Millicent Mary Nix, Nurse, The Princess Christian Hospital, Weymouth
Adeline Annie Pallot, Nursing Sister, Nyasaland Nursing Service
Janet Parry, Sister, T.F.N.S.
Violetta Chancha Paschah, Sister, Q.A.I.M.N.S. (retired)
Marian Paterson, Acting Sister, Civil Hospital Reserve, St. Bartholomew's
Margaret Brand Paterson, Nursing Sister, Q.A.R.N.N.S.
Mary Paul, Sister, T.F.N.S.
Edith Payne, Voluntary Aid Detachment
Geraldine Platt, Voluntary Aid Detachment
Sophie Eleanor Pollard, Lady Superintendent, Auxiliary Military Hospital, Thirsk
Mary Pool, Sister, T.F.N.S.
Edith Mary Porter, Assistant Matron, T.F.N.S.
Mary Potts, Acting Matron, Q.A.I.M.N.S.R.
Florence Catharine Puddicombe, Acting Sister, Q.A.I.M.N.S.R.
Elsie Evelyn Quilter, Acting Sister, Civil Hospital Reserve, Guy's Hospital
Annie Mary Raine, Sister, T.F.N.S.
Katharine Rapson, Matron, St. George's Hill Auxiliary Hospital, Surrey
Ethel Reade, Sister, South African Medical Nursing Service
Anne Victoria Reay, Acting Sister, Q.A.I.M.N.S.R., Australia
Helena Kate Repton, Matron, British Red Cross Society
Maud Reynolds-Knight, Acting Sister, Civil Hospital Reserve, Westminster Hospital
Kate Ianthe Richardson, Acting Sister, Civil Hospital Reserve, Guy's Hospital
Sarah Jane Robley, Nursing Sister, Canadian Army Medical Corps, Nursing Service
Amy Frances Rohde, Voluntary Aid Detachment
Mary Francis Ronaldson, Acting Sister, Civil Hospital Reserve, Nottingham General Hospital
Mary Ellen Ruck, Sister, T.F.N.S.
Margaret Rudland, Sister, British Red Cross Society
Dorothea Rudman, Acting Sister, Civil Hospital Reserve, Manchester Royal Infirmary
Alice Mary Sampson, Acting Matron, T.F.N.S.
Mabel Scholes, Voluntary Aid Detachment
Elizabeth Sear, Staff Nurse, Q.A.I.M.N.S.R.
Margaret Ion Pierson, Special Probationers Nursing Service
Jeanie Fitzpatrick (Nursing Services), Dublin
Ethel L. Shute (Sister Ignatius), Matron, St. Andrew's Hospital, Dollis Hill, London
Lilian Sidebotham, Sister, T.F.N.S.
Mary Simon, Matron, Wykeham Abbey Auxiliary Military Hospital, York
Angela Ford Sister, Nursing Service
Mary Skinner, Voluntary Aid Detachment
Dorothy Carmynow Sloggett, Voluntary Aid Detachment
Ann Smith, Sister, T.F.N.S.
Dora Shanklie Smith, Sister, Q.A.I.M.N.S.R.
Ethel Smith, Sister, Q.A.I.M.N.S.R.
Mabel Basden Smith, Nursing Sister, Q.A.R.N.N.S.
Elizabeth Smith, Sister, Camberley Auxiliary Military Hospital
Ethel Margaret Spicer, Acting Sister Civil Hospital Reserve, London Hospital
Hilda Frances Starbuck, Acting Sister, Q.A.I.M.N.S.R.
Ethel Fowler Stephenson, Sister, Q.A.I.M.N.S.
Ellenor Stevenson, Matron, Auxiliary Hospital, Henley-in-Arden, Warwick
Mary Ramsay Stewart-Richardson, Acting Sister, Q.A.I.M.N.S.R.
Annie Maud Stirling, Nursing Sister, Canadian Army Medical Corps
Emma Jane Stokes, Sister, T.F.N.S.
Isabella Lyle Storar, Sister, T.F.N.S.
Aileen Yvonne Swann, Voluntary Aid Detachment
Dorothy Maud Sweet, Voluntary Aid Detachment
Matilda Goodall Tate, Staff Nurse, Q.A.I.M.N.S.R.
Lavinia Taylor, Sister, T.F.N.S.
Sophie Isabel Thomson, Sister, T.F.N.S.
Jean Todd, Sister, Q.A.I.M.N.S.
Constance Robina Townend, Assistant Matron, Q.A.I.M.N.S.
Lucy Mary Trumble, Staff Nurse, New Zealand Army Nursing Service
Sadie Tyler, Acting Sister, Q.A.I.M.N.S.
Ethel Frances Upton, Nursing Sister, Canadian Army Medical Corps
Mabel Vivian, Matron, The Princess Christian Hospital, Weymouth
Ellen Constance Wadling, Acting Sister, Civil Hospital Reserve, St. Thomas's Hospital
Agnes Walker, Sister, T.F.N.S.
Ann Wilson Wallace, Nursing Sister, South African Medical Nursing Service
Dorothy Ward, Sister, T.F.N.S.
Phyllis Mary Waterland, Assistant Matron, British Red Cross Society
Amy Waterman, Acting Sister, Civil Hospital Reserve, Middlesex Hospital
Ethel Frances Watkins, Acting Sister, Q.A.I.M.N.S.R.
Agnes Colthart Watson, Sister, T.F.N.S.
Helena Hendrina Weise, Sister, South African Medical Nursing Service
Jean Wells, Acting Sister, Q.A.I.M.N.S.R.
Gertrude Whitehurst, Voluntary Aid Detachment
Cicely Wicksteed, Voluntary Aid Detachment
Clarice Malvenie Williams, Sister, Q.A.I.M.N.S.
Margaret Williams, Sister, T.F.N.S.
Edith Mary Williams, Matron, Red Cross Hospital, Brecon, South Wales
Ida Grace Willis, Assistant Matron, New Zealand Army Nursing Service
Annie Paterson Wilson, Acting Sister, Q.A.I.M.N.S.
Isabella Wilson, Sister, Q.A.I.M.N.S.R.
Eleanor Miriam Woodhouse, Sister, T.F.N.S.
Mary Gertrude Woodrow, Matron, Caenshill Auxiliary Hospital, Weybridge
Elizabeth Ann Woodward, Sister, Q.A.I.M.N.S. (T)
Violet Isobel Wotton, Voluntary Aid Detachment
Elizabeth Young-Scott, Voluntary Aid Detachment
Awarded a Bar to the Royal Red Cross (RRC*)
Ethel Hope Becher Matron-in-Chief, Q.A.I.M.N.S.
Sidney Jane Brown Matron-in-Chief, T.F.N.S. (Retired, Q.A.I.M.N.S.)
Jane Hoadley Matron, Q.A.I.M.N.S.
Beatrice Isabel Jones Matron, Q.A.I.M.N.S.
Emma Maud McCarthy Matron-in-Chief, Q.A.I.M.N.S.
Sarah Elizabeth Oram Principal Matron, Q.A.I.M.N.S.
Annie Beadsmore Smith Principal Matron, Q.A.I.M.N.S.
Mary Wilson Principal Matron, Q.A.I.M.N.S.
Medal of the Order of the British Empire
For services in connection with the War in which great courage or self-sacrifice has been displayed.
Robert Adair. For courage in continuing to work his engine while molten metal was falling round him.
Mary Adams. For courage in assisting others, at great personal risk, in a fire.
Charles Alford. For courage in removing a large quantity of high explosives during a fire.
Arthur Ernest Allen. For courage in rescuing a fellow-worker at great personal risk.
Arthur Joseph Allen. For courage and resource in assisting to extinguish a fire at an explosives factory at great personal risk.
James Andrew. For courage in remaining at his work during a fire which resulted in a very serious explosion.
John Andrewartha, Fitter, Devonport Dockyard. For courage on the occasion of the trials of a submarine.
Edwin Bolwell Andrews. For courage in extinguishing a fire in chemical works under circumstances of grave personal danger.
John Edward Andrews. For courage in keeping up steam immediately after an explosion when another explosion seemed imminent.
Charles Armes, Cable Foreman, General Post Office. Employed on cable ships and small craft in connection with war work in dangerous waters.
F. W. Assirati, Postman. Devotion to duty under specially difficult and dangerous circumstances.
Jesse Attrill, Boatswain, For coolness and resource in averting a serious accident to one of H.M. Ships.
Ethel Alice Auger. For courage and high example in remaining at her post on a tram, and thus preventing severe casualties to fellow-workers. In doing so she was severely injured.
Sidney Aylward. For courage and resource in subduing a fire at imminent personal risk.
George Badger. For courage and self-sacrifice in attempting to save life, in spite of severe personal injuries.
George William Badsey. For courage in fighting, at very great personal risk, a fire caused by an explosion.
John Baillie, Chargeman of Engine Fitter, Northern Base. For courage and perseverance in carrying out work involving much exposure and risk.
George Baird. For courage in saving a child from drowning at the works and returning at once to his work.
Daniel Ball. For courage in having several times effected temporary repairs to important plant in an explosives factory at considerable risk to his life.
George Charles Bannister, For great courage in clearing a man-hole at great personal risk.
John Thomas Barber, Carpenter, General Post Office. Employed on cable ships and small craft in connection with war work in dangerous waters.
Henry Barnard. For courage in fighting a fire at great personal risk while many bags of explosives were being removed.
Thomas Henry Bashford, For great courage on two occasions, entering a tank to recover a fellow-workman who was gassed, and entering a tar still heater.
Robert Baxter. For courage and resource in saving the life of a fellow-worker at great personal risk.
Beatrice Oxley Beaufort. For courage and high example in continuing to do very dangerous experimental work in spite of injuries received in consequence.
Fanny Elizabeth Beaumont, Sorting Clerk and Telegraphist. Displayed great courage and devotion to duty during air-raids.
John Finnis Beer, Cable Hand. Employed on cable ships and small craft in connection with war work in dangerous waters.
Thomas Bond Bellis. For courage and resource in assisting, at great personal risk, to extinguish a fire at an explosives factory.
Samuel Hall Bennett. For courage in returning to work within an hour of breaking his thumb whilst at work at age 69.
Myra Grace Bessent, Telephonist. Displayed great courage and devotion to duty during air-raids.
Sydney Rome Black, Assistant Draughtsman. For courage on the occasion of the trials of a submarine.
James Elias Bloomfield. For courage in extricating living and dead from ruined buildings under circumstances of great danger.
Emmanuel Bloxam, For great courage displayed on the occasion of a serious explosion, when he assisted in extinguishing a fire and saved the life of a fellow-worker at very great personal danger.
Robert Leach Boal. For courage in keeping down a fire in an explosives factory.
Edward Bond. For courage in closing a main valve on a steam boiler at great personal risk of scalding and suffocation.
Francis Booker, Leading Man, Works Dept., Portsmouth Dockyard, For perseverance in carrying out certain difficult works in the face of grave risks due to bad weather.
John Booth. For courage in extinguishing a fire on two occasions at very great personal risk.
Lilian Ada Bostock, Telephonist. Displayed great courage and devotion to duty during air-raids.
Arthur Bradbury. For courage in dealing with fires in an explosives factory and remaining at work in a poisonous atmosphere in order to ensure the safety of plant.
George Arthur Bradbury. For courage in assisting to extinguish a fire in an explosives factory at great personal risk.
Martha Bramhall. For courage in remaining continuously afc a very dangerous task in spite of the occurrence of several explosions.
J. H. Brelsford. For courage in assisting, though severely injured, to rescue fellow-workers and to extinguish a fire which resulted in a very serious explosion.
Amelia Brisley. For courage and high example in cases of explosion in a factory.
Emily Brooke, For great courage shown at an outbreak of fire in an explosives factory.
Andrew Brown, For conspicuous courage in stopping a fire and giving the alarm, under circumstances of the gravest personal danger, after he had been injured by the explosion and rendered unconscious.
Edwin Brown. For courage in extinguishing a fire after an explosion in which he lost the sight of an eye, and enabling 600 of his fellow-workers to get clear.
Ethel Brown. For courage on the occasion of a fire in an explosives factory.
Harry Brown. For courage in working continuously under circumstances of very great danger.
Mary Brown. For courage and high example in getting work started again under circumstances of considerable danger.
William Bryant. For courage in preventing further serious explosion in a filling factory, at very great personal risk.
John Buckley. For courage and self-sacrifice in carrying out dangerous experiments.
Margaret Winifred Burdett-Coutts. For courage in that, after losing a finger and badly lacerating her hand in a circular saw, she went away quietly to have it treated, in. order not to unnerve her fellow workers.
Marion Burrell, Sorting Clerk and Telegraphist. Displayed great courage and devotion to duty during air-raids.
James Burton, For great courage in rescuing workers from burning explosives shops, at great personal risk.
Louisa Busby. For courage in returning to work after an accident resulting in loss of right hand and other injuries.
Edith Butler. For courage, resource, and high example. Has saved the lives of at least two workers, and has displayed exceptional skill and courage in several serious accidents.
Gertrude Elizabeth Butler. For courage and high example in continuing at her work during a fire, under circumstances of great danger.
George Patrick Campbell, Carpenter, General Post Office. Employed on cable ships and small craft, in connection with war work in dangerous waters.
Richard Cardo. For courage and resource shown on several occasions under circumstances of great personal danger.
Louisa Margaret Carlton, Supervisor, Telephones. Displayed great courage and devotion to duty during air-raids and bombardment from the sea.
Samuel Carter. For courage and resource in saving the life of a chemist and three workers who were overcome by fumes in an explosives factory.
Florence Marie Cass, Telephonist. Displayed great courage and devotion to duty while in charge of a telephone exchange during a serious explosion at a neighbouring munition works.
Sydney Chambers, For great courage in rescuing workers from burning explosives shops at great personal risk.
William Frank Chorley. For courage in removing a large quantity of high explosives during a fire.
Annie Clarke. For courage in keeping workers together under circumstances of great danger.
Mabel Eleanor Clarke, Telephonist. Displayed great courage and devotion to duty during air-raids.
Alexander Clelland. For courage and resource under circumstances of great danger.
Gertrude Coles. For courage in returning to work after her hand had been mutilated by an explosion.
John Oorder. For courage in fighting a fire caused by an explosion, at very great personal risk.
Alexander Cornelius. For courage in having, on two occasions, saved a large amount of raw material in an explosives factory at the risk of his life.
Thomas Cosby, Fitter, Devonport Dockyard. For courage on the occasion of the trials of a new submarine.
Herbert Luigi Costa. For courage in continuing to work under circumstances of great danger.
Mabel Rosa Cox, Chargewoman, Royal Naval Cordite Factory, For devotion to duty and great presence of mind in averting an explosion when in charge of a guncotton press.
May Victoria Croucher. For courage and high example on the occasion of a fire at an explosives factory.
Thomas Crutchley. For courage in entering a gas main and saving the lives of two workers who were gassed, at very great personal risk.
Sophia Cunningham. For courage and high example in continuing her duties immediately after a severe explosion.
John Cuskearn. For courage in making a determined attempt to recover a valuable instrument from the cooling pond, in consequence of which he contracted blood poisoning and nearly died.
Lucie Jane Dartnell, Sorting Clerk and Telegraphist. Displayed great courage and devotion to duty during air-raids.
James Davidson, Bricklayer's Labourer. For courage in rescuing a fellow-workman who had been overcome by gas inside a gas apparatus.
Ben Davies. For courage and high example in remaining at work for an hour after being painfully burnt on his hands, face and neck, and returning to duty for another five hours immediately after treatment.
James Henry Davies, Skilled Workman, General Post Office. Showed habitual courage in carrying out repairs to submarine cables in difficult and dangerous waters.
Robert John Davies, Electrical Fitter, Devonport Dockyard. For courage and self-sacrifice on the occasion of an explosion on a submarine boat, on which he was at work.
Violet Annie Davies. For courage in remaining at her post at the telephone during a severe explosion. Age 15.
William Dixon. For courage in rescuing a fellow-worker at great personal risk.
Joseph Doran. For courage and resource in preventing a fire in an explosives factory, under exceptionally dangerous circumstances.
James Downie, Engine Fitter. For courage and prompt action in helping to extinguish fires which had broken out in the stokeholds of two patrol vessels fitting out.
John Duff. For courage in preventing a serious explosion under circumstances of great danger.
James Duffy. For courage in attempting to stop a fire in an explosives factory under exceptionally dangerous circumstances.
Peter Dunbabin. For courage and self-sacrifice in carrying out dangerous experiments.
Lucien Duncombe. For courage in removing a large quantity of high explosives during a fire.
Albun Dunn. For courage in saving the life of a fellow worker after an explosion, and giving the alarm, although himself injured by an explosion.
Bertha Annie Florence Easter, Telephonist. Displayed great courage and devotion to duty during air-raids.
Nicholas Edghill. For courage in helping to subdue fire at great personal risk.
Mabel Ann Edwards. For courage and high example on the occasion of a fire at an explosives factory.
Nora Egan, For great courage shown at an outbreak of fire in an explosives factory.
Henry Etheridge, Skilled Workman, General Post Office. Employed on cable ships and small craft in connection with war work in dangerous waters.
Frank Cyril Evans, For self-sacrifice in continuing to work, though blind in one eye and the other affected, caused by an accident at work, and in spite of constant pain.
Fred Evans. For courage and self-sacrifice in carrying out dangerous experiments.
James Evans. For courage and self-sacrifice in carrying out dangerous experiments.
May Evans. For courage in assisting to stop a fire in an explosives factory at considerable danger to her life.
Francis Fagan, Special Constable, For rescuing a drowning man from Holyhead Harbour in circumstances of difficulty and danger.
Alfred William James Fautley. For courage and resource in stopping a fire in highly inflammable material, at the risk of his life and at the cost of severe injuries.
Rosa Frances Finbow. For courage in returning to work after serious injury to her face through an explosion.
Jane Fisher. For courage in assisting to stop a fire in an explosives factory at considerable danger to her life.
Maude Fisher, For great courage shown at an outbreak of fire in an explosives factory.
Michael Fitzpatrick. For courage in attempting to save part of an explosives factory at great risk of his life.
Bertha Flintoff, Telephonist. Displayed great courage and devotion to duty during an air-raid.
James Harold Foster. For courage in helping to extinguish a fire at cost of serious injuries to himself.
Bernard John Francis. For courage and resource in saving the life of a fellow worker.
Frank Charles Frazer. For courage in preventing an explosion in a filling factory at great personal risk, though partly blinded and suffering considerable pain from explosion.
William Gilchrist, For self-sacrifice and high example in persisting in work which is often dangerous, though suffering from an incurable disease and often suffering great pain.
Margaret Annie Louise Godfrey, Telephonist. Displayed great courage and devotion to duty during an air-raid.
Robert William Godfrey, Diver, Admiralty Salvage Section. For courage and devotion to duty in Gallipoli, diving on many occasions when the beaches were being shelled.
William Gommersall, For several acts of great courage and self-sacrifice.
Edna Goodenough, For continuing to work after suffering serious injuries through an explosion, resulting in loss of right eye.
James Gosling. For courage in removing a large quantity of high explosives during a fire.
James Grainger. For courage in having, on two occasions, continued at his work in an explosives factory under circumstances of great danger, thereby stopping further damage.
Frank Wallis Green. For courage and resource in subduing a fire at imminent personal risk.
John Green. For courage and self-sacrifice in dealing with acid and poisonous fumes.
Thomas Edwin Ernest Griffiths. For courage in removing a large quantity of high explosives during a fire.
Frederick Thomas Grigsby. For courage and high example in continuing at his duty during a series of severe explosions.
Frederick Edward Hall. For courage in carrying out very dangerous experiments in a highly-poisonous atmosphere.
James Hamilton. For courage and resource in preventing a fire in an explosives factory under exceptionally dangerous circumstances.
Alice Hanson, For great courage shown at an outbreak of fire in an explosives factory.
James Harley, Assistant Foreman Ironworker. For courage in entering a confined space in a vessel, which was full of noxious fumes, and plugging holes in the structure.
Elsie Lilian Harman, Supervisor, Telephones. Displayed great courage and devotion to duty during air-raids.
John David Harris
Doris Hirst, Telephonist. For courage in fighting a fire caused by an explosion, at very great personal risk.
Mary Hartley. For courage and high example: in remaining at her engine and controlling it after having been badly wounded by breakage, of the governor and returning to her work a week later.
Thomas Havery, Chancery Servant at the British Embassy, Petrograd. Courageous conduct in the discharge of has duties during the revolutionary disturbances in March 1917.
E. James Hawkins. For courage in preventing an explosion and fire at great personal risk.
William Henry Hayden, For great courage at very great personal risk on the occasion of several fires in a filling factory.
Ethel Head. For courage and high example in rescuing fellow workers after an explosion.
Alice Ann Healey, Telephonist. Displayed great courage and devotion to duty during air-raids.
William Heather, Cable Foreman, General Post Office. Employed on cable ships and small craft in connection with war work in dangerous waters.
William Hemmingsley. For courage and resource in saving the life of a fellow worker.
Harry Hepworth, For great courage shown at an outbreak of fire in an explosion factory.
Gladys Elizabeth Herrington. For courage in volunteering to undertake dangerous work after a fatal accident.
Amos Freke Hesman. For courage in preventing an explosion and fire, at great personal risk.
William Hewitt. For courage in saving the life of a fellow worker, who was overcome by poisonous fumes, at great personal risk.
Ethel Nora Elizabeth Hickey, Telephonist. Displayed great courage and devotion to duty during air-raids and on the occasion of a fire.
Thomas Hickey, Skilled Workman, General Post Office. Has displayed great courage while carrying out telegraph work under dangerous conditions.
William Charles Hicks, Skilled Workman, General Post Office. Has rendered valuable service since the beginning of the war. Has remained at his post absolutely alone day and night, in spite of danger from submarine or other attacks.
Alfred Higgs. For courage and resource in saving the lives of two of his fellow workers, at great personal risk.
Frederick Higham, Special Constable. Swam to an airship which had fallen into a river and assisted two of the crew to reach the bank.
Edward Hill, Steel Smelter. For courage and endurance on many occasions. Remained at her post until relieved, on the occasion of a very serious explosion at munition works, notwithstanding the fact that the explosions were almost, continuous, and that the police advised the Ofc.s on duty to leave the building.
George William Hobbs, Boatswain, General Post Office. Employed on cable ships in connection with war work in dangerous waters.
Thomas William Hobbs, Chargeman of Engine Fitters, Devonport Dockyard. For courage on the occasion of the trials of a new submarine.
Frank Hodgkinson. For courage in assisting to extinguish a fire in an explosives factory, at great personal risk.
George Hogan. For courage and resource in subduing a fire, at imminent personal risk.
Victoria Irene Holdsworth. For courage and resource in preventing serious injuries to a fellow worker.
Annie Holly. For courage in continuing at work, though suffering from severe injuries to eye, caused by an explosion.
Janet Holmes. For courage and resource on the occasion of an explosion in a filling factory.
Mrs Holttum. For courage in assisting to save the lives of fellow workers during a fire which resulted in a serious explosion, though sustaining severe injuries herself.
G. Hulley. For courage in assisting to extinguish a fire, which resulted in a very serious explosion.
William Hulme. For courage in assisting to extinguish a fire in an explosives factory, at great personal risk.
Mabel Hunt, Telephonist. Displayed great courage and devotion to duty during an air raid.
Walter William Hunt. For courage in saving the life of a fellow worker.
William Hunt. For courage and resource on two occasions in preventing serious fires. Age 66.
Frederick Innes, For high courage and resource in closing the outlet valve of a collapsed gas-holder, in which the gas was alight.
Horace Ivin, Skilled Workman, General Post Office. Has done valuable service under dangerous conditions, repairing submarine cables carrying naval and military wires.
Florence Jackson. For courage displayed during a time of great danger in a filling factory.
William Jackson. For courage and resource in saving the life of a fellow worker at very great risk to himself.
Herbert Janes. For courage in returning to work immediately after his hand had been dressed on account of his losing three fingers in a shearing machine.
Jack Lane Jeffery. For courage connected with production and testing of exceptionally dangerous materials.
Charles William Johnson. For courage and resource shown on several occasions under circumstances of great personal danger.
Charles William James Johnson. For courage in carrying out repairs to plant in explosives factory in the presence of dangerous gases.
Ellen Johnson, Sorting Clerk and Telegraphist. Displayed great courage and devotion to duty during air-raids.
Alfred Frank Jones, For great courage and high example shown on the occasion of a severe ex-plosion in an explosives factory.
John Richard Jones. For courage and resource in assisting to extinguish a fire at an explosives factory at great personal risk.
Maurice Jones, Inspector, Engineering Dept., General Post Office. Has carried out two very dangerous missions, successfully passing through hostile lines at great personal risk.
Robert Jones. For courage and resource in assisting to extinguish a fire at a filling factory, at imminent risk of serious explosion.
Thomas Jones. For courage and high example in doing hard work for long hours in spite of his age (79 years).
George Henry Jordan. For courage in fighting a fire caused by an explosion, at very great personal risk.
John Kane. For courage in saving the lives of several fellow-workers who were buried in the lining of a furnace which they were repairing.
W. A. Keeling. For courage in remaining at his work during a fire which resulted in a very serious explosion.
Mary Keenan. For courage and high example on the work after sustaining severe injury to face and eyes, on account of an explosion.
Mary Kiaer. For courage and high example on the occasion of a fire at a filling factory.
Herbert John King. For courage in extinguishing a fire in an explosives factory at very great risk to his life.
Rosa Kate Kipling. For courage in returning to her work after seven and a half months serious illness and several operations caused by an explosion.
James Kirby, Ship Fitter, Portsmouth Dockyard, For self-sacrifice in helping to extricate an injured fellow-workman from a place of danger, though he himself was dangerously injured.
Walter Reginald Knight. For courage in assisting to extinguish a fire in an explosives factory and removing explosives from the burning building.
John Knox. For courage in saving the lives of several fellow-workers who were buried in the lining of a furnace which they were repairing.
Robert Lake, Fitter and Outside Erector. For courage on board a submarine in dangerous circumstances.
Patrick Lambe, Skilled Workman, General Post Office. Rendered very valuable service in picking up and repairing wires which had been shotdown.
Charles Henry Lambert, Master Mariner, Examination Service and Rescue Tugs, Dover Dockyard. For courage and skill displayed in towing cargo and other ships out of a minefield after they had been mined.
Albert Frederick Lane. For courage and high example on the occasion of a fire in an explosives factory.
Philip C. Langridge, Inspector, Engineering Dept., General Post Office. Displayed great courage and devotion to duty during air-raids.
Michael Lavelle. For courage and self-sacrifice in carrying out dangerous experiments.
Ada Mary Laws, Telephonist. Displayed great courage and devotion to-duty during air-raids.
Ethel Mary Leeds, Telephonist. Displayed great courage and devotion to duty during, air-raids.
Mabel Lethbridge. For courage and high example shown on the occasion of an accident in a filling factory, causing loss of one leg and severe injuries to the other.
John James Lewes, Skilled Labourer, Works Dept., Portsmouth Dockyard, For great skill and daring in the performance of difficult and dangerous work in connection with certain works at Portsmouth.
Frederick John Lewis, Leading Man (Diver), Chatham Dockyard. For courage, skill and resource exhibited in a marked degree.
Alfred Leyland. For courage and self-sacrifice in carrying, out dangerous experiments.
Albert Lickess, For great courage and high example shown in dealing with a fire at an explosives factory under circumstances of very exceptional danger.
Arthur Lipscombe. For courage in stopping a fire in a powder factory under circumstances of exceptional danger to his life.
Robert Andrew Lockwood, Skilled Workman, General Post Office. Has done exceptional service during rough weather in effecting repairs to submarine cables carrying naval and military wires.
Tom Oliver Lodder, Skilled Workman, General Post Office. Showed great courage and devotion while in charge of a telegraph station, carrying out his duties under fire.
Albert James Lowe. For courage in removing a large quantity of high explosives during a fire.
Alice Ludlow. For courage and high example on the occasion of an explosion and prompt return to work.
William Me Alpine. For courage and self-sacrifice in returning to work after losing, three fingers of right, hand owing to an accident and before the wounds were properly healed.
Agnes McCann. For courage and resource in saving the life of a fellow-worker entangled in dangerously running machinery, at great risk to her life.
James McDonald. For courage in attempting to save the life of a fellow-worker who was gassed in a gas main by entering it at very great personal risk.
James McDonald, Ironwork Erector. For courage in the rescue of fellow workmen who were overcome by gas.
George McDougall. For courage in saving the lives of several fellow-workers who were buried in the lining of a furnace which they were repairing.
Edward McFarlane. For courage in saving the lives of two of his fellow-workers by entering an ash receiver full of monoxide gas.
James McGhie, Under Foreman Joiner, For bravery at the cost of serious personal injury in saving a half-blind labourer from being run over by a locomotive.
Michael McGrath. For courage in ascending a furnace under conditions so dangerous that all others had refused to do so.
May Louise Mclntyre. For courage and high example on the occasion of an accident at a filling factory.
John McMaddocks, For great courage on the occasion of a fire in an explosives factory. He brought the drenchers into action, and used his own body to prevent draught fanning the flames in stoves. Male, Albert Herbert. For courage on the occasion of a fire in an explosives factory.
Daisy Marsh. For courage and resource in utilising emergency fire appliances on the occasion of an explosion at an explosives factory.
Thomas Martin. For courage displayed on two occasions in dealing with an explosion and a fire at works producing highly inflammable liquids under circumstances of exceptional danger.
Mollie Josephine Mason, Munition Worker, Chatham Dockyard. For courage and presence of mind in averting panic among women workers who were occupants of an overturned railway carriage.
Robert Massey. For courage and self-sacrifice in carrying out dangerous experiments.
John Master. For courage in preventing an explosion and fire at great personal risk.
Edith Blanche Maw, Supervisor, Telephones. Displayed great courage and devotion to duty during air-raids.
William Alfred Mayall. For courage and high example on the occasion of a fire in an explosives factory.
Edward Medine. For courage in saving the lives of several fellow workers who, were buried in the lining of a furnace which they were repairing.
Walter Mee. For courage and resource in dealing with a fire at the cost of bodily injury.
James Menzies. For courage and high example on the occasion of a serious explosion.
William Meredith. For courage in saving the life of a fellow workman who had been rendered unconscious by foul gas.
Annie Dyer Merralls, Supervisor, Telephones. Displayed great courage and devotion to duty during air-raids.
Robert Miller. For courage in saving the life of a fellow worker who was overcome by poisonous fumes, at great personal risk.
Rose Mills. For courage displayed on the occasion of an explosion, at great personal risk.
G. Mitchell. For courage in assisting to extinguish a fire which resulted in a very serious explosion.
George Edgar Mitchell. For courage and high, example on several occasions of explosion and fire in a shell filling; factory.
John Joseph Christopher Monks, Skilled Workman, General Post Office. On many occasions continued his work under fire, displaying great zeal and courage
Margaret Moody, Telephonist. Displayed great courage and devotion to duty during air-raids.
David George Morgan. For courage and high example in picking up and drowning a shell which had become accidentally ignited.
William Morgan. For courage and resource in assisting to extinguish a fire at a filling factory, at imminent risk of serious explosion.
Nora Morphet. For courage and high example in continuously working long hours in a poisonous atmosphere which habitually affected her health.
Frederick Thomas Morris. For courage on the occasion of a fire in an explosives factory.
Maggie Mulholland. For courage and very high example in her behaviour when in charge of a canteen adjoining a store of explosives which was on fire.
George Myers. For courage and self-sacrifice in carrying out dangerous experiments.
Abraham Naar, Sorter. Devotion to duty under specially difficult and dangerous circumstances.
Thomas Nadin, Engineer of Yard Craft, Sheexness Dockyard. For courage, self-sacrifice and exceptional skill in the salvage of a merchant ship in a minefield.
Arthur John Neal. For courage in a serious accident due to bursting of crucible of melted metal. Though, severely injured; he kept the others calm and had them attended to first, though they were in less danger.
Joan Nelson. For courage in continuing to work in an explosives factory, under circumstances of grave danger.
George William Newson. For courage in fighting a fire caused by an explosion, at very great personal risk.
Violet Newton. For courage in returning to work after a serious accident in which two workers were killed, and she was severely injured.
G. R. Norris. For courage in remaining at his wort during a fire which resulted in a very serious explosion, from which he suffered bodily injuries.
James Joseph O'Callaghan. For courage in extinguishing a fire on the wooden roof of part of a filling factory, under exceptionally dangerous circumstances. O'Keefe, Percy. For courage in assisting to extinguish a fire in an explosives factory, and removing explosives from the turning building.
Edward Henry Lewis Owen, Cable Hand, General Post Office. Employed on cable ships and small craft in connection with war work in dangerous waters.
Roland Basset Paine. For courage displayed on the occasion of a severe accident resulting in serious mutilation of his hand. He insisted on returning to his dangerous occupation as soon as bandages were removed.
Nellie Ena Ann Palmer, Telephonist. Displayed great courage and devotion to duty during air-raids.
Charles Parker, Skilled Labourer, Devonport Dockyard, For self-sacrifice and distinguished conduct whilst engaged on salvage operations.
William Parker. For courage (1) in helping to extinguish a fire in tar works contiguous to filling factory at great personal risk; (2) in attempting to rescue a surveyor and workman gassed in a sewer, at great risk to his life.
George Parkinson. For courage and resource in preventing a serious explosion at an explosives factory.
Frederick Payne. For courage in dealing with a fire caused by an explosion, under exceptionally dangerous circumstances.
Agnes Pearson, Telephonist. On the occasion of a very serious explosion at munition works she remained at her post until relieved, notwithstanding the fact that the explosions were almost continuous and that the police advised the Ofc.s on duty to leave the building.
Georgina Peeters. For courage and resource in saving the life of a fellow-worker by stopping a machine at great risk to herself.
Wilfred Edward Pendray. For courage in recovering the plug of a cock under circumstances of grave.danger.
Mary Pendreigh. For courage and high example on the occasion of an accident at a filling factory.
Frederick William Pepper, For great courage in rescuing workers from burning explosives shops at great personal risk.
Robert Charles Percy, Acting Inspector of Shipwrights (formerly Chargeman), Northern Base, For devotion to duty in effecting repairs under dangerous conditions.
Agnes Mary Peters, For great courage and high example in continuing to do work of an exceptionally dangerous nature, which finally resulted in an accident, by which she was totally blinded and otherwise injured.
Daniel Plume. For courage shown on the occasion of an explosion and at several minor fires, at great personal risk.
Walter Plummer, Skilled Labourer, Portsmouth Dockyard. For courage and perseverance in the performance of his duties during an explosion.
Walter Poll. For courage and high example in dealing with a serious fire at a gas works.
John Thomas Poole, Master of Yard Craft, Chatham Dockyard, For perseverance and conspicuous skill under conditions of extreme difficulty and danger.
Henry William John Porter, Skilled Workman, General Post Office. Showed courage and devotion to duty during repeated air-raids. On one occasion he set to work on the restoration of naval circuits while explosions were taking place fifty yards away.
Ellen Lenora Potter. For courage and resource in extinguishing a fire, at great personal risk.
James Pound, For self-sacrifice in working long hours in a highly poisonous atmosphere, where he was several times burnt by acid, and at times almost overcome by fumes.
Harry Price. For courage and self-sacrifice in carrying out dangerous experiments.
William Henry Price. For courage in attempting to stop a fire in an explosives factory under exceptionally dangerous circumstances. He lost four fingers and practically the use of both hands, while his face was permanently disfigured.
William Thomas Pugh. For courage on the occasion of a fire in an explosives factory.
Florence Pullen. For courage in continuing to work in spite of serious suffering from an accident caused by an explosion.
Ethel Mary Pullinger, Telephonist. Displayed great courage and devotion to duty during air-raids.
Richard Hayward Purser. For courage and self-sacrifice in working long hours in spite of severe physical disabilities brought about by hardships incurred in the retreat from Mons.
Robert Rae, Coastwatcher, Machrihanish, Kintyre, For rendering valuable assistance to one of H.M. Ships under conditions of great difficulty.
William H. Rawlin. For courage and high example in saving workers and maintaining order on the occasion of an explosion in a filling factory.
William Dennis Eeardon, Sorter. Devotion to duty under specially difficult and dangerous circumstances.
Albert Edward Reeves. For courage in recovering the plug of a cock under circumstances of grave danger.
Donald Renfrew, Chief Draughtsman, Kelvin, Bottomley & Baird, Ltd. For courage on the occasion of the trials of a submarine.
Robert Roberts. For courage in saving the life of a fellow worker at a fire in an explosives factory, under exceptionally dangerous circumstances.
George Robinson. For courage and self-sacrifice in carrying out dangerous experiments.
Maggie Rock. For courage and high example on the occasion of an accident at a filling factory.
Charles William Beaver Roll. For courage in attempting to rescue his foreman, by entering an ash receiver full of carbon monoxide gas.
James Gordon Ross, Skilled Workman, General Post Office. Displayed courage and resource in maintaining telephonic communication during, an air-raid.
Alfred Rudge. For courage in extinguishing a fire in an explosives factory at very great risk to his life.
Thomas William Rudge, Millwright. For courage and coolness whilst engaged on dangerous work.
John Ryan, Mate of Yard draft, Haulbowline Dockyard, For his splendid example of pluck and discipline during, salvage operations.
Thomas Ryan. For courage in removing a large quantity of high explosives during a fire.
Alfred Salenger. For courage and self-sacrifice in volunteering for work on dangerous experiments, in the course of which he lost four fingers.
John Frederick Sams. For courage and high example in remaining at his post on a tram, and thus preventing severe casualties to fellow-workers. In doing so he was severely injured.
Richard Sanders, Engine Fitter, Devonport Dockyard. For courage on the occasion of the trials of a new submarine.
William Saunders. For courage in attempting to save the lives of workers who were gassed in a gas main, at very great personal risk.
Edward Scott. For courage in averting a serious accident in a mill, at grave risk to his own life. His arm was badly crushed, and has since had to be amputated.
Percy Sears. For courage and his example in preventing a fire in an explosives factory, at grave risk to his life.
Charlie Shaw. For courage and resource in dealing with a fire at an explosives factory, at great personal risk.
Leonard Short, Engine Fitter, Portsmouth Dockyard. For courage and self-sacrifice during salvage operations.
Lawrence Simpson. For courage in extinguishing a fire on two occasions, at very great personal risk.
Sydney Simpson, Skilled Workman, General Post Office. Showed great courage as well as resource on the occasion of a very severe explosion at adjoining munition works. He sent away to a safe place the women operators, and himself maintained uninterrupted telephonic communication.
William Sinclair. For courage in rescuing a driver who was underneath a railway engine which had begun to move.
Harry Skinner. For courage and resource (1) in extinguishing a fire in a filling factory at imminent risk of serious explosion, (2) in rescuing two fellow-workers gassed in a sewer, at very great personal risk.
Laurence Skinner. For courage in attempting to stop a fire in an explosives factory under exceptionally dangerous circumstances.
Frank Slater, For great courage shown during a fire in an explosives factory.
Minnie Sleeford, Assistant Supervisor, Telephones. Displayed great courage and devotion to duty during air raids.
Beatrice Evelyn Smith. For courage in returning to her post at the risk of her life in order to avert danger to the works.
Francis Emily Esther Smith, Supervisor, Telephones. Displayed great courage and devotion to duty during air raids.
John Smith. For courage in assisting to extinguish a fire in an explosives factory at great personal risk.
Thomas William Fletcher Smith, Tug Master, Dover Dockyard. For courage, initiative and perseverance on salvage operations.
James Snape. For courage and high example in quelling fires during an explosion at great personal risk.
William Snead. For courage in entering a gas main and saving the lives of two workers who were gassed, at very great personal risk.
Sidney Charles Soley. For courage and resource in dealing with a hand grenade about to explode, whereby he saved several lives.
Hannah Spash. For courage and high example in continuing her work in a filling factory, after having been on three separate occasions injured by explosions.
Edward Spencer. For courage and high example in continuing at work in an explosives factory under circumstances of grave danger.
Sidney Arthur Stammers, Cable Hand, General Post Office. Employed on cable ships and small craft in connection with war work in dangerous waters.
Lily Stanyon. For courage and resource in saving the life of a crane driver at considerable risk to herself.
Edith Steed. For courage and high example in volunteering immediately after a fatal accident to undertake the more dangerous work in the Dept. concerned.
Florence Eliza Steggel, Telephonist. Displayed great courage and devotion to duty during air raids.
Fanny Eleanor Steward, Assistant Supervisor, Telephones. Displayed great courage and devotion to duty during air raids.
John Stewart. For courage in remaining at work and seeing his job through after being severely shaken by an explosion at an explosives factory.
George William Stocks, Leading Cable Hand. Employed on cable ships and small craft in connection with war work in dangerous waters.
Walter Stokes. For courage in attempting to save the lives of two workers who were gassed in a gas main by entering it at very great personal risk.
William Leverington Stokes. For courage in volunteering to extinguish a fire at cost of serious injuries.
George Robert Stone, Master of Yard Craft, Sheerness Dockyard. For courage, self-sacrifice and exception, all in skill in the salvage of a merchant ship in a minefield.
Maggie Storey. For courage and high example in extinguishing a dangerous fire at an explosives factory under exceptionally risky circumstances.
Ernest Stubley. For courage in remaining at his post in circumstances of considerable danger in order to safeguard the works.
Robert Studbohne. For courage and resource in preventing a serious explosion at an explosives factory.
Gilbert George Sutcliffe, Inspector, Engineering Dept., General Post Office. Rendered valuable service in the construction and maintenance of telephones under fire.
Herbert Sykes. For courage in testing aircraft in spite of severe accidents.
Walter William James Symons, Shipwright Apprentice. For courage and presence of mind in the rescue of a fellow-workman from drowning.
Samuel William Tabb, Acting Mate of Yard Craft, Devonport Dockyard. For courage and skill in handling his tug in assisting to rescue a torpedoed merchant ship from a dangerous position in heavy weather.
Joseph Edward Talbot. For courage in continuing to work in a poisonous atmosphere, even though suffering seriously from effects.
Alfred Tansom, Chargeman of Baggers, Portsmouth Dockyard. For courage and coolness in urgent salvage operations.
Frederick Francis Taylor. For courage in fighting a fire at great personal risk while many bags of explosives were being removed.
George Terry. For courage in working continuously under circumstances of very great danger.
Charles William Thome, Engineer, For perseverance and devotion to duty in trying circumstances, often attended by considerable danger.
Samuel George Thorneycroft. For courage on the occasion of a fire in an explosives factory.
Thomas Tickner. For courage and resource in dealing with an outbreak of fire at a filling factory.
William John Tidey. For courage in fighting a fire, caused by an explosion, at very great personal risk.
Joseph Henry Trask, Special Constable. For courage in rescuing injured men from a burning and collapsed building at great personal risk.
Walter Trebble, Skilled Labourer, Works Dept., Portsmouth Dockyard, For great skill and daring in the performance of difficult and dangerous work in connection with certain works at Portsmouth.
William Trotman, Engine Fitter, Devonport Dockyard. For courage on the occasion of the trials of a new submarine.
Ella Trout, While fishing, accompanied only by a boy of ten, she saw that a steamer had been torpedoed and was sinking. Though fully realising the danger she ran from enemy submarines, she pulled rapidly to the wreck and succeeded in rescuing a drowning sailor.
Alfred Clifford George Valentine. For courage and resource in dealing with a shell in which the top ring of the fuse had fired.
E. Vass. For courage in stopping a fire in an explosives factory at grave risk to his life.
Edith Emily Venus, Supervisor, Telephones. Displayed great courage and devotion to duty during air raids.
Robert George Vicary. For courage displayed on the occasion of an explosion. He continued to work, though permanently injured by the accident.
Mary Walker. For courage in continuing to work in an explosives factory under circumstances of grave danger.
Ernest Wall, For two acts: of courage and self-sacrifice in clearing a choked acid main, and on the occasion of a fire in an explosives factory.
John M. Wallace, Electrical Fitter. For courage, initiative and devotion to duty in trying circumstances.
Lilian Blanche Wallace. For courage displayed during a time of great danger in a filling factory.
Amelia Jane Ward, Telephonist. Displayed great courage and devotion to duty during air raids and bombardments from the sea.
Daniel Vincent Ward, Inspector, Engineering Dept., General Post Office. Displayed courage and resource while Controlling Ofc. in a neighbourhood exposed to many bombardments by sea-craft and aeroplanes.
George Frederick Ward. For courage in shutting off outlet master valve of a gasholder during a fire caused by explosion, at serious personal risk.
Nellie Ward, Supervisor, Telephones. Displayed great courage and devotion to duty during air raids.
Frances Mary Watson. For courage on the occasion of a serious explosion and assisting a fellow-worker to escape at great personal danger.
Frank Watson. For courage in removing a large quantity of high explosives during a fire.
John Watson. For courage in attempting to rescue his foreman by entering an ash receiver full of carbon monoxide gas.
Ada Watt. For courage in continuing to work in an explosives factory under circumstances of grave danger.
Arthur Webber. For courage and resource in giving valuable assistance on the occasion of an explosion at an explosives factory.
Dorothy Kate West, Telephonist. Displayed great courage and devotion to duty during air raids.
George Whatton. For courage and resource in subduing a fire at imminent personal risk.
Dorothy Florence Whibley, Telephonist. Displayed great courage and devotion to duty during an air raid.
Robert Leonard White. For courage in remaining at his work after being very seriously injured.
Mary Agnes Wilkinson, Telephonist. Rendered invaluable service at a telephone exchange on the occasion of a fire and serious explosion at a munition works close by, proceeding to her post through the danger zone at grave personal risk.
William Williams. For courage and resource in extinguishing a fire under circumstances of exceptional danger.
James Winter, Inspector, Engineering Dept., General Post Office. Rendered special services in repairing wires under very dangerous conditions and was frequently under fire.
Gertrude Wood, Supervisor, Telephones. Displayed great courage and devotion to duty during air raids.
Alfred Charles Wright, For great courage in rescuing workers from burning explosives shops at great personal risk.
William Wyatt, Skilled Labourer (Stoker), Sheerness Dockyard, For his self-sacrifice and devotion to duty in a time of danger.
James You'll. For courage in saving the life of a fellow workman who had been rendered unconscious by foul gas.
Alfred Charles Wright Young. For great courage in rescuing workers from burning explosives shops at great personal risk.
Distinguished Service Order (DSO)
Vice-Admiral Evelyn Robert le Marchant
Rear-Admiral Reginald Arthur Allenby
Rear-Admiral Cyril Everard Tower
Rear-Admiral Herbert Arthur Stevenson Fyler
Wing Cmdr. Peregrine Forbes Morant Fellowes
Engr. Cmdr. Mark Rundle
Staff Paymaster Hugh Miller
Staff Surgeon Henry Cooper
Lt.-Cmdr. Charles Mahon Redhead Royal Naval Reserve
Flight Cmdr. Alexander MacDonald Shook Royal Naval Air Service
Maj. Henry Shafto Adair, Cheshire Reg.
Maj. Henry Rainier Adams, Royal Garrison Arty.
Col. John Ainsworth Royal Arty. Forces
Rev. Michael Adler, Royal Army Chaplains' Dept.
Maj. Nigel Woodford Aitken Royal Garrison Arty.
Capt. William Philip Jopp Akerman Royal Field Arty.
Capt. Edmund Alderson RAMC
Maj. and Bt. Lt.-Col. Percy Stuart Allan, Gordon Highlanders
Capt. Stanley Guy Allden, Army Service Corps
Lt.-Col. Lewis Arthur Allen, Army Service Corps
Maj. Henry Irving Rodney Allfrey Somerset Light Inf.
Capt. Arthur Emilius David Anderson King's Own Scottish Borderers
Maj. Charles Abbot Anderson, Manchester Reg.
Maj. and Bt. Lt.-Col. Cecil Ford Anderson, Royal Engineers
Tmp Capt. John Anderson, RAMC
Capt. Walter Alexander Armitage, York & Lancaster Reg., and Machine Gun Corps
Maj. Bening Mourant Arnold, Royal Garrison Arty.
Maj. Francis Anson Arnold-Foster, Royal Field Arty.
Capt. Kenneth Hugh Lowden Arnott East Lancashire Reg.
Maj. James Arnold Arrowsmith-Brown, Royal Engineers
Lt.-Col. Sydney William Louis Aschwanden, Royal Field Arty.
Maj. Frederic St. John Atkinson, Horse, Indian Army
Capt. Henry Lancelot Aubrey-Fletcher Grenadier Guards
Capt. Eric William Fane Aylwin-Foster, Army Service Corps
Lt.-Col. Stafford Charles Babington, Royal Engineers
Maj. Edward Alec Horsman Bailey, Royal Field Arty.
Rev. Charles Frederick Baines Royal Army Chaplains' Dept.
Maj. Sir Randolf Littlehales Baker Yeomanry
Tmp Major Robert Cecil Bamford, West Yorkshire Reg.
Capt. Kenneth Barge Cav., Indian Army
Lt.-Col. Frederic Edward Lloyd Barker, Royal Field Arty.
Maj. Archibald Stonham Barnwell, Royal Field Arty.
Tmp Capt. Robert McGowan Barrington-Ward General List
Lt.-Col. Netterville Guy Barron, Royal Garrison Arty.
Lt.-Col. Harold Percy Waller Barrow RAMC
Capt. and Bt. Major Alfred James Napier Bartlett, Oxfordshire & Buckinghamshire Light Inf.
Maj. John Channon Bassett, Royal Garrison Arty.
Capt. Harold Henry Bateman Royal Engineers
Capt. Austin Graves Bates Royal Field Arty.
Maj. Cecil Robert Bates Royal Field Arty.
Maj. Lancelot Richmond Beadon, Army Service Corps
Maj. Robert Longfield Beasley, Gloucestershire Reg.
Capt. Lancelot Edward Becher, Royal Engineers
Lt.-Col. William Thomas Clifford Beckett, North Lancashire Reg.
Tmp Major Charles Thomas Cook Beecroft, Army Service Corps
Capt. Hugh Maurice Bellamy Lincolnshire Reg.
Tmp Major Robert Benzie, South Wales Borderers
Tmp Lt.-Col. Julian Falvey Beyts, Durham Light Inf.
Maj. Harold Francis Bidder, Royal Sussex Reg., attd. Machine Gun Corps
Capt. and Bt. Major George Travers Biggs, Royal Engineers
Capt. David Anderson Bingham, Liverpool Reg.
Lt.-Col. Alexander Harry Colvin Birch, Royal Arty.
Rev. Richard Bird, Royal Army Chaplains' Dept.
Tmp Capt. Benedict Birkbeck Coldstream Guards
Capt. Norman Pellew Birley South Staffordshire Reg.
Lt.-Col. Arthur Birtwistle Royal Field Arty.
Capt. Charles Gamble Bishop, Royal Engineers
Rev. Harry William Blackburne Royal Army Chaplains' Dept.
Capt. Frederick St. John Blacker, Rifle Brigade
2nd Lt. Richard Graham Blomfield, Guards, and Royal Flying Corps
Lt.-Col. Herbert Richard Blore, King's Royal Rifle Corps
Maj. George Percy Cosmo Blount, Royal Arty.
Maj. Andrew George Board, South Wales Borderers and Royal Flying Corps
Maj. Edward Leslie Bond, Royal Garrison Arty.
Lt.-Col. Francis Henry Borthwick, Royal Welsh Fusiliers
Capt. Malcolm Berwick, Dragoons
Lt.-Col. and Bt. Col. Francis Wilford Boteler, Royal Arty.
Maj. Raymond Walter Harry Bourchier, Royal Field Arty.
Tmp Major Aubrey Henry Bowden, Machine Gun Corps
Maj. and Bt. Lt.-Col. Lionel Boyd Boyd-Moss South Staffordshire Reg.
Capt. Charles Roger Cavendish Boyle, Oxfordshire & Buckinghamshire Light Inf.
Capt. Francis Lyndon Bradish, RAMC
Capt. Frederick Hoysted Bradley RAMC
Capt. Samuel Glenholme Lennox Bradley London Reg.
Tmp 2nd Lt. Albert Newby Braithwaite General List
Tmp Lt.-Col. Francis Powell Braithwaite Royal Engineers
Capt. Douglas Stephenson Branson York & Lancaster Reg.
Capt. Charles Stuart Brebner RAMC
Capt. Geoffrey Sydney Brewis, Welsh Reg.
Maj. The Hon. Henry George Orlando Bridgeman Royal Arty.
Capt. Havard Noel Bridgwater, Norfolk Reg.
Lt.-Col. Edgar William Brighton Bedfordshire Reg.
Tmp Major Francis Edward Briscoe, Yorkshire Reg.
Tmp Major Dyson Brock-Williams, Welsh Reg.
Maj. Nevile Pattullo Brooke, Leinster Reg.
Lt.-Col. John Brown, 1/4th Battalion Northamptonshire Regiment.
Tmp Major George Edward Allenby Browne Liverpool Reg.
Capt. Hugh Swinton Browne, Royal Field Arty.
Company Charles William Brownlow, Royal Garrison Arty.
Capt. William Fox Bruce Royal Engineers
Lt.-Col. Thomas Bruce, Royal Arty.
Capt. and Bt. Lt.-Col. Herbert Bryan Manchester Reg.
Maj. Leonard Corfield Bucknall, Yeomanry
Tmp Capt. Christopher Victor Bulstrode RAMC
Maj. Richard Seymour Bunbury, Royal Garrison Arty.
Capt. Harold Burchall, Royal Flying Corps Spec. Reserve
Maj. Hubert George Richard Burges-Short, Somerset Light Inf.
Lt.-Col. Arnold Robinson Burrowes Royal Irish Fusiliers
Capt. Christopher Bushell, Royal West Surrey Reg.
Maj. and Bt. Lt.-Col. Bernard Arnold Barrington Butler, Royal Field Arty.
Tmp Major The Hon. Robert Thomas Rowley Probyn Butler Tank Corps
Maj. William Erdeswick Ignatius Butler-Bowdon, Duke of Cornwall's Light Inf.
Lt.-Col. Charles Norman Buzzard, Royal Garrison Arty.
Tmp Capt. Walter Roderick Griffith Bye General List
Tmp Lt.-Col. The Hon. Antony Schomberg Byng General List and Royal Flying Corps
Tmp Major Alexander Francis Somerville Caldwell, North Lancashire Reg.
Maj. Felix Call, Royal Irish Reg.
Tmp Lt.-Col. Ewen Allan Cameron, North Lancashire Reg.
Rev. Edward Fitzhardinge Campbell Royal Army Chaplains' Dept.
Maj. Hector Campbell Indian Army
Maj. The Hon. Ian Malcolm Campbell, Lovat's Scouts
Maj. William Robert Campion Royal Sussex Reg.
Lt.-Col. Fernand Gustave Eugene Cannot Army Service Corps
Maj. Alan Douglas Garden, Royal Engineers, and Royal Flying Corps
Tmp Lt. D'Arcy Vandeleur Garden, Royal Field Arty.
Rev. Douglas Falkland Carey Royal Army Chaplains' Dept.
Capt. John Charles Denton Carlisle London Reg.
Tmp Capt. Thomas Hamilton Carlisle, Royal Engineers
Capt. Thomas Carnwath RAMC
Tmp Major Vincent Henry Cartwright, Royal Marine Arty.
Lt.-Col. Trevor Carus-Wilson, Duke of Cornwall's Light Inf.
Tmp Major Frank Cassels, Royal Sussex Reg.
Capt. Geoffrey Cheetham Royal Engineers
Maj. Lawrence Chenevix-Trench, Royal Engineers
Maj. William Francis Christian, Royal Garrison Arty.
Capt. Archibald Christie, Royal Arty., and Royal Flying Corps
Maj. Henry Robert Stark Christie, Royal Engineers
Maj. Herbert Nicholls Clark, Royal Field Arty.
Maj. Frederick Arthur Stanley Clarke, London Reg.
Tmp Capt. Denzil Harwood Clarke Durham Light Inf.
Lt.-Col. Robert Clarke, Army Service Corps
Maj. and Bt. Lt.-Col. Reginald Graham Clarke, Royal West Surrey Reg., and Machine Gun Corps
Tmp Major Gerald Malcolm Clayton, Liverpool Reg.
Maj. Francis Alfred Worship Cobbold, Royal Garrison Arty.
Maj. Herbert Philip Gordon Cochran, Middlesex Reg.
Lt.-Col. Edward Webber Warren Cochrane RAMC
Maj. Douglas Fanley Colson, Royal Engineers
Maj. Richard Coffey, RAMC
Maj. and Bt. Lt.-Col. Edward Sacheverell d'Ewes Coke King's Own Scottish Borderers
Maj. Alfred Methven Collard, Duke of Cornwall's Light Inf.
Capt. Richard Hamilton Collier, Royal Flying Corps Spec. Reserve
Maj. Reginald Thomas Collins, RAMC
Tmp Major William Alexander Collins, Army Service Corps
Capt. Henry Gordon Comber, unattd. List
Rev. John Morgan Connor Royal Army Chaplains' Dept.
Maj. Dudley Cookes, Royal Field Arty.
Rev. James Ogden Coop Royal Army Chaplains' Dept.
Maj. Frank Sandiford Cooper, Suffolk Reg.
Tmp Lt.-Col. William Coote-Brown, Royal Sussex Reg.
Capt. Edward Roux Littledale Corballis, Royal Dublin Fusiliers, and Royal Flying Corps
Maj. Geoffrey Ronald Codrington, Yeomanry
Capt. and Bt. Major Gordon Philip Lewes Cosens, Dragoons
Maj. Reginald Foulkes Cottrell, Royal Garrison Arty.
Maj. Miles Rafe Ferguson Courage, Royal Arty.
Maj. Robert Blaster Cousens, Royal Arty.
Maj. Arthur James Cowan, Royal Field Arty.
Tmp Major William Henry Coysh, Royal Engineers
Maj. James Craik, Indian Army Lancers
Maj. George Craster, Indian Army Cav.
Maj. and Bt. Lt.-Col. Arthur Julius Craven, Royal Engineers
Tmp Major Edward William Crawford, Royal Inniskilling Fusiliers
Capt. William Loftus Crawford, Lancashire Fusiliers
Rev. Canon Thomas Emerson Crawhall, Royal Army Chaplains' Dept.
Q.M. and Hon. Major Hugh Cressingham, Bedfordshire Reg.
Maj. The Hon. Frederick Heyworth Cripps, Yeomanry
Maj. Sir Morgan George Crofton Life Guards
Maj. John Frank Crombie, RAMC
Maj. Arthur Edwin Cronshaw, Manchester Reg.
Maj. Bernard Cruddas, Northumberland Fusiliers
Capt. Arthur Ludlam Cruickshank, Royal Garrison Arty.
Tmp Major Bertram Stephen Rowsell Cunningham, Army Service Corps
Capt. Richard Robinson Curling, Royal Arty.
Capt. Hubert Montague Cotton-Curtis, North Staffordshire Reg.
Maj. and Bt. Lt.-Col. Evan Campbell da Costa, East Lancashire Reg.
Tmp Major Thomas William Daniel Nottinghamshire and Derbyshire Reg.
Capt. Neville Reay Daniell, Duke of Cornwall's Light Inf.
Maj. William Augustus Bampfylde Daniel, Royal Horse Arty.
Capt. Markham David, Monmouthshire Reg., Royal Engineers
Maj. Thomas Jenkins David, Royal Horse Arty.
Maj. Alan Hier Davies, Royal Field Arty.
Tmp Lt.-Col. John Edward Henry Davies, RAMC
Tmp Major Gilbert Davidson, Army Service Corps
Capt. Owen Stanley Davies, Royal Engineers
2nd Lt. Thomas Henry Davies Royal Engineers
Tmp Major William Hathaway Davis Machine Gun Corps
Capt. Hugh Frank Dawes Royal Fusiliers
Capt. Harold John Dear, London Reg.
Capt. Philip de Fonblanque, Royal Engineers
Tmp Major Thomas Lyttleton de Havilland, Royal Scots Fusiliers (Major, South African Def. Force)
Maj. John Nathael de la Perrelle Royal Fusiliers
Capt. James Finlay Dempster, Manchester Reg.
Tmp Capt. Eustace Charles de Neufville, Royal Garrison Arty.
Capt. and Bt. Major Henry Denison Denison-Pender Dragoons
Lt. Col. Bertie Coore Dent, Leicestershire Reg., Cheshire Reg.
Maj. John Neston Diggle, Royal Field Arty.
Lt. Francis Ivan Leslie Ditrcaet Durham Light Inf.
Maj. Peter Doig, Royal Garrison Arty.
Capt. Harry Cecil Dolphin, Hampshire Reg.
Tmp Capt. Frederick Langloh Donkin, Royal Field Arty.
Maj. Alan Sydney Whitehom Dore, Worcestershire Reg., and Royal Flying Corps
Maj. Francis Holland Dorling, Manchester Reg.
Capt. Edward Cecil Doyle, Royal Army Veterinary Corps
Capt. and Bt. Major Reginald John Drake, North Staffordshire Reg.
Maj. Harold Bruce Dresser, Royal Field Arty.
Capt. Cecil Francis Drew, Scottish Rifles
Maj. George Barry Drew, West Yorkshire Reg.
Maj. Horace Robert Bawley Drew, Northamptonshire Reg.
Lt. William Stuart Gordon Drummond, Army Service Corps
Maj. Ralph Duckworth, South Staffordshire Reg.
Maj. Robert Maxwell Dudgeon Cameron Highlanders
Maj. William Marshall Dugdale, Royal Welsh Fusiliers
Capt. Donald Duncan Gloucestershire Reg.
Maj. (Temporary Lt. Col.) Horace Adrian Duncan, Argyll and Sutherland Highlanders
Maj. Norman Edwin Dunkerton, RAMC
Capt. Thomas Spence Dunn, Royal Army Medical Service
Maj. Guy Edward Jervoise Durnford, Royal Engineers
Maj. Bernard Alfred Saunders Dyer, Army Service Corps
Maj. and Bt. Lt.-Col. Percyvall Hart Dyke, Baluchis, Indian Army
Maj. Gerald Lang Dymott, Royal Field Arty.
Capt. Bruce Lindsay Eddis, Royal Engineers
Capt. Harold Walter Edwards Royal Warwickshire Reg.
Tmp Major Richard Prior Ferdinand Edwards, Army Service Corps
Capt. William Egan RAMC
Capt. Horace Anson Eiloart London Reg.
Maj. William Gardiner Eley
Capt. Garrard Elgood, Royal West Kent Reg.
Capt. Edward Charles Ellice (retired), Grenadier Guards
Maj. Edward Halhed Hugh Elliot, Royal Field Arty.
Tmp Lt.-Col. Thomas Renton Elliott, RAMC
Capt. Arthur Addison Ellwood Lincolnshire Reg., attd. Machine Gun Corps
Tmp Lt.-Col. Wilfred Elston Manchester Reg.
Maj. Sir Francis Napier Elphinstone-Dalrymple Royal Arty.
2nd Lt. Charles Adrian Ashfoord Elton, Royal Warwickshire Reg.
Maj. Robert Emmet, Sr., Yeomanry
Lt.-Gol Cuthbert Evans Royal Arty.
Capt. William Harry Evans, Royal Engineers
Maj. Alfred Howell Evans-Gwynne, Royal Field Arty.
Capt. Eliott Nial Evelegh Royal Engineers
Capt. Thomas, Swan Eves RAMC
Maj. Charles Nicholson. Ewart, Royal Garrison Arty.
Maj. William Turner Ewing, Royal Scots
Tmp Major John Knox Ewart, Army Service Corps
Tmp Major Cresswell John Eyres, Royal Garrison Arty.
Maj. Bernard Joseph Fagan, Inf., Indian Army
Capt. Harold Arthur Thomas Fairbank RAMC
Lt.-Col. Brereton Fairclough South Lancashire Reg.
Capt. Arthur Wellesley Falconer RAMC
Tmp Lt.-Col. Ronald Dundas Falconar-Stewart, Argyll and Sutherland Highlanders
Capt. Arthur Thomas Falwasser, RAMC
Maj. William Alexander Farquhar, Royal Scots Fusiliers
Capt. John Arthur Joseph Farrell, Leinster Reg.
Maj. Paul John Fearon, Royal West Surrey Reg.
Tmp Major Francis Hood Fernie, Tank Corps
Maj. Maurice Christian Festing, Royal Marine Light Inf.
Capt. Linwood Field Royal Arty.
Maj. Harold Stuart Filsell, Royal Warwickshire Reg.
Maj. John Alexander Findlay, Highland Light Inf.
Maj. Walter Taylor Finlayson, Indian Medical Service
Maj. David Leonard Fisher RAMC
Maj. James Thackeray Fisher, Royal Engineers
Tmp Major Arthur Stanley Fitzgerald, Royal Warwickshire Reg.
Capt. Edward Herbert Fitzherbert Army Service Corps
Capt. Terrick Charles Fitzhugh Royal Irish Reg.
Capt. and Bt. Major Noel Trew Fitzpatrick Royal Engineers
Lt.-Col. Archibald Nicol Fleming Indian Medical Service
Lt.-Col. Frank Fleming, Royal Field Arty.
Capt. Percy Beresford Fleming, Army Service Corps
Capt. The Hon. Gerald William Frederick Savile Foljambe, late Oxfordshire & Buckinghamshire Light Inf.
Maj. Richard Mildmay Foot Royal Inniskilling Fusiliers
Lt. Stephen Henry Foot, Royal Engineers
Maj. Nowell Barnard de Lancey Forth Manchester Reg.
Tmp Capt. William Nelson Foster, Army Service Corps
Maj. Cecil Fowler, Royal Field Arty.
Tmp Major George Fox, General List
Rev. Henry Watson Fox, Royal Army Chaplains' Dept.
Capt. The Hon. Alastair Thomas Joseph Fraser, Lovat's Scouts (Cameron Highlanders)
Lt. John Alexander Fraser, Dragoon Guards
Lt.-Col. Thomas Fraser RAMC
Capt. The Hon. William Fraser Gordon Highlanders
Tmp Major The Hon. Edward Gerald French, General List
Capt. John Roberts Frend, Leinster Reg.
Maj. Charles Gibson Fulton, Royal Field Arty.
Lt.-Col. Willoughby Furnivall, Royal Field Arty.
Maj. William Fleetwood Fuller, Yeomanry
Capt. Edward Keith Byrne Furze Royal West Surrey Reg.
Maj. Edgar David Galbraith, Indian Army
Maj. Aylmer George Galloway, Army Service Corps
Maj. Robert Leech Galloway, Royal Field Arty.
Maj. Charles Edward Galwey, late Royal Irish Reg.
Capt. William Boss Gardner RAMC
Maj. William Garforth Royal Engineers
Maj. John Reginald Garwood, Royal Engineers
Maj. Henry Percy Garwood, Royal Garrison Arty.
Tmp Lt.-Col. Cecil Claud Hugh Orby Gascoigne, Worcestershire Reg.
Capt. Eric Gerald Gauntlett RAMC
Capt. Cyril Herbert Gay, Royal Arty.
2nd Lt. Frederick George Peter Gedge, Royal Engineers
Capt. William Charles Coleman Gell Royal Warwickshire Reg.
Capt. Alfred Joseph Gibbs Royal Field Arty.
Maj. Hugh Edward Gibbs, Royal Army Veterinary Corps
Capt. Alexander John Gibson, RAMC
Capt. Harold Gibson, RAMC
Tmp Major Joseph Gibson, Army Service Corps
Maj. Lewis Gibson, Royal Highlanders
Tmp Major Donald Hope Gibsone, Royal Engineers
Capt. John Galbraith Gill RAMC
Maj. Reynold Alexander Gillam, Royal Engineers
Lt.-Col. John Gilmour, Jr., Royal Highlanders
Tmp Capt. Sydney Elliot Glendenning, Royal Engineers
Lt. Kenneth Bruce Godsell Royal Engineers
Maj. and Bt. Lt.-Col. Charles Alexander Campbell Godwin, Indian Army Cav.
Maj. George Edward Goldsmith, Army Service Corps
Tmp Lt.-Col. William Richard Goodwin, Royal Irish Rifles
Maj. Alexander Robert Gisborne Gordon, Royal Irish Reg.
Lt.-Col. George Hamilton Gordon, Royal Field Arty.
Maj. Granville Cecil Douglas Gordon, Welsh Guards
Maj. Richard Glegg Gordon, Lowland Royal Garrison Arty.
Maj. William Gordon, Royal Garrison Arty.
Maj. and Bt. Lt.-Col. Lord Esmé Charles Gordon-Lennox Scots Guards
Capt. and Bt. Major Eric Gore-Browne, London Reg.
Lt.-Col. Michael Derwas Goring-Jones Durham Light Inf.
Rev. Thomas Sydney Goudge, Royal Army Chaplains' Dept.
2nd Lt. Arthur Ernest Gould Royal Engineers
Maj. John Maxwell Gover RAMC
Capt. Malise Graham, Lancers
Maj. Roland Cecil Douglas Graham, Royal Garrison Arty.
Maj. Hubert Francis Grant-Suttie Royal Arty.
Maj. Bernard Granville, Yeomanry
Lt.-Col. Henry William Grattan, RAMC
Capt. and Bt. Major Stafford Henry Green West Yorkshire Reg.
Maj. Wilfrith Gerald Key Green, Indian Army
Tmp Major Frederick Harry Greenhough, Royal Engineers
Maj. William Basil Greenwell, Durham Light Inf.
Maj. Charles Francis Hill Greenwood, London Reg.
Tmp Major Richard Hugo Gregg Royal Fusiliers
Capt. William Thornton Huband Gregg, Royal Irish Fusiliers
Capt. George Pascoe Grenfell, Royal Flying Corps
Rev. John Wesley Elnox Griffin Royal Army Chaplains' Dept.
Tmp Lt.-Col. Edward Waldegrave Griffith, Royal Arty.
Lt. Edward William Macleay Grigg Grenadier Guards
Tmp 2nd Lt. Hugh Noel Grimwade General List
Capt. Ewart Scott Grogan, Unattd. List, East African Forces
Maj. and Bt. Lt.-Col. Herbert Watkins Grubb, Border Reg.
Tmp Major Frederick Henry Wickham Guard, Royal Scots
Lt.-Col. Frederick Gordon Guggisberg Royal Engineers
Lt. Eric Cecil Guinness, Royal Irish Reg.
Maj. Hamilton Bruce Leverson. Gower Gunn Royal Garrison Arty.
Capt. Arthur Henry Habgood RAMC
Lt.-Col. Bernard Haigh, Army Service Corps
Wing Cmdr. Frederick Crosby Halahan Royal Naval Air Service
Tmp Lt.-Col. Frederick Hall Royal Field Arty.
Lt.-Col. Robert Sydney Hamilton Army Ordnance Depot
Capt. Denys Huntingford Hammonds Royal Engineers
Tmp Major Claude Hancock, Gloucestershire Reg.
Maj. John Haig, Yeomanry
Maj. Mortimer Pawson Hancock, Royal Fusiliers
Tmp Capt. William Charles Hand Royal Garrison Arty.
Maj. and Bt. Lt.-Col. Edward Barnard Hanley, Worcestershire Reg., attd. Tank Corps
Capt. Hubert Arthur Oldfield Hanley, Middlesex Reg.
Lt.-Col. Cathcart Christian Hannay, Dorsetshire Reg.
Capt. Frank Stephen Hanson Royal Warwickshire Reg.
Tmp Major Cecil Claud Alexander Hardie, Royal Engineers
Tmp Capt. George Richardson Harding, Royal Engineers
Capt. Thomas Hubert Harker, King's Royal Rifle Corps
Capt. Charles Harry Hart Army Service Corps
Tmp Capt. Owen Hart, Royal Field Arty.
Maj. Charles Darby Harvey, Nottinghamshire and Derbyshire Reg.
Maj. Cosmo George Sinclair Harvey, Royal Field Arty.
Maj. Gardiner Hassell Harvey, Army Service Corps
Capt. and Hon. Major John Harvey (retired)
Capt. Percy Lovell Clare Haslam, Hussars, attd. Tank Corps
Maj. Randal Plunkett Taylor Hawksley, Royal Engineers
Capt. James George Hay, late Gordon Highlanders
Capt. Geoffrey Hayes, Durham Light Inf.
Maj. William Burrell Hayley, Royal Horse Arty.
Tmp Lt.-Col. George William Hayward, Royal Field Arty., Riding Master and Hon. Major (retired)
Lt. Eustace Fellowes Sinclair Hawkins, Army Service Corps
Maj. Thomas Hazelrigg, Army Service Corps
Capt. Cuthbert Morley Headlam, Bedford Yeomanry
Maj. Arthur Basset Hearle, Royal Garrison Arty.
Maj. GeorgeNoah Heath, Cheshire Reg.
Capt. Joseph Thomas Heath Royal Engineers
Maj. Vincent James Heather, Royal Arty.
Capt. Alfred George Hebblethwaite, RAMC
Maj. Fercival John Beresford Heelas, Royal Field Arty.
Lt.-Col. Harry Dal ton Henderson, Army Service Corps
Lt.-Col. Lionel Lees Hepper, Royal Garrison Arty.
Maj. and Bt. Lt.-Col. William Francis Hessey, Royal Inniskilling Fusiliers
Capt. Charles Caulfield Hewitt Royal Inniskilling Fusiliers, and Machine Gun Corps
Maj. Gerald Heygate, Royal Field Arty.
Lt.-Col. Sir Graham Percival Heywood 1st Staffordshire Yeomanry
Tmp Lt. Herbert John Hill, Royal Engineers
Maj. Rowland Clement Ridley Hill, Royal Engineers
Maj. Francis Barrett Hills, Royal Garrison Arty.
Lt.-Col. Harry Alexander Hinge RAMC
Capt. and Temp Major Charles Faunce Hitchins, Royal West Kent Reg.
Col. Reginald Hoare, 4th Hussars
Tmp Major Harry Roy Hobson, Army Service Corps
Capt. Adam Hodgins, Royal Army Veterinary Corps
Lt.-Col. William Holdsworth Holdsworth Hunt, Royal Garrison Arty.
Lt. Henry Arthur Hollond, Royal Garrison Arty.
Tmp Major Francis John Courtenay Hood, York & Lancaster Reg.
Maj. John Charles Hooper, Shropshire Light Inf.
Capt. and Bt. Major Robert Victor Galbraith Horn Royal Scots Fusiliers
Maj. George John Houghton, RAMC
Lt.-Col. John William Hobart, Houghton RAMC
Capt. Charles Kenneth Howard-Bury, King's Royal Rifle Corps Spec. Reserve
Lt.-Col. Walter Howell Jones, Royal Garrison Arty.
Q.M. and Hon. Major James Thomas Harold Hudson, Middlesex Reg.
Tmp Capt. Henry Moore Hudspeth Royal Engineers
Capt. Basil Hughes RAMC
Maj. Edward William Hughes London Reg.
Maj. William Hughes London Reg.
Maj. Henry Horne Hulton, Royal Field Arty.
Maj. Walter Vernon Hume, South Lancashire Reg.
Maj. George Noel Humphreys, Army Service Corps
Maj. Rochford Noel Hunt RAMC
Maj. Reginald Seager Hunt, Dragoon Guards
Capt. Cecil Stuart Hunter, Royal Arty.
Tmp Major Hugh Blackburn Hunter, Army Service Corps
Maj. Henry Noel Alexander Hunter, Royal West Surrey Reg.
Tmp Lt.-Col. Arthur Reginald Hurst, Royal Field Arty.
Maj. Ralph Hamer Husey London Reg.
Capt. Colin Ross Marshall Hutchison Royal Field Arty.
Q.M. and Hon. Major Thomas Charles Ibbs, London Reg.
Lt.-Col. Henry Wilson Iles, Royal Garrison Arty.
Capt. Bernhardt Basil von Brumsy im Thurn Hampshire Reg.
Maj. Charles Elliott Inglis, Royal Garrison Arty.
Tmp Major Richard Inglis, King's Royal Rifle Corps
Maj. Thomas Stewart Inglis, Royal Field Arty.
Tmp Lt.-Col. Arthur Innes Irons, Middlesex Reg.
Capt. Noel Mackintosh Stuart Irwin Essex Reg.
Maj. William Rennie Izat, Royal Engineers
Capt. Edward Darby Jackson, King's Own Scottish Borderers
Tmp Major Frank Whitford Jackson, Army Service Corps
Maj. and Bt. Lt.-Col. Herbert William Jackson, Indian Army
Maj. Richard Rolt Brash Jackson, Army Service Corps
Maj. Arthur Lawrence Baldwin Jacob, Royal Garrison Arty.
Tmp Major Archibald Hugh James, Northumberland Fusiliers, West Yorkshire Reg.
Maj. and Bt. Lt.-Col. Ralph Ernest Haweis James North Lancashire Reg.
Maj. Cyril Jarrett, Middlesex Reg.
Tmp Capt. Arthur Alfred Jayne Royal Engineers
Maj. Richard Griffith Bassett Jeffreys, Royal Dublin Fusiliers
Maj. Leoline Jenkins Dorset, Royal Garrison Arty. and Royal Flying Corps
Maj. Sir Walter Kentish William Jenner late 9th Lancers
Lt.-Col. Arthur Stawell Jenour Royal Garrison Arty.
Maj. Arthur Baynes Johnson, Lincolnshire Reg.
Lt.-Col. Allen Victor Johnson, Royal Fusiliers, King's Royal Rifle Corps
Tmp Major Benjamin Sandford Johnson, Army Service Corps
Maj. Victor Neville Johnson, Gloucestershire Reg.
Tmp Lt.-Col. Frederick Campbell Johnston, Royal Arty.
Maj. George Bernard Johnson, Royal Field Arty.
Tmp Lt.-Col. William Hamilton Hall Johnston Middlesex Reg.
Maj. Harry Haweis Joll Royal Arty.
Maj. Archibald Nelson Gavin Jones, Indian Army
Lt.-Col. John Josselyn, Suffolk Reg.
Capt. Edward James Kavanagh RAMC
Maj. Thomas Kay RAMC
Maj. Gerard Ainslie Kompthorne, RAMC
Capt. and Bt. Major Edward Holt Kendrick, Royal Dublin Fusiliers
Maj. William Kennedy, East African Veterinary Corps
Lt. Albert Edmund Kent Leicestershire Reg.
Maj. John Kent, Royal Field Arty.
Maj. Herbert Edward Kenyon, Royal Garrison Arty.
Tmp Major John Victor Kershaw, East Lancashire Reg.
Maj. Sidney Hardinge Kershaw, Northumberland Fusiliers
Lt. Francis Percy Kindell Royal Arty.
Maj. Charles Harold Kilner, Royal Field Arty.
Maj. Robert Edgar Kilvert, Royal Marine Arty.
Tmp Capt. Charles Francis King Cheshire Reg.
Capt. Frank King, 4th Hussars
Tmp Major John Bussell King, Army Service Corps
Tmp Major Wentworth Alexander King-Harman (retired) List, late Royal Irish Rifles
Maj. Guy Thornhill Kingsford, Royal Engineers
Capt. John Lawson Kinnear Liverpool Reg. and Royal Flying Corps
Tmp Lt.-Col. Lewis Hawker Kirkness, Special List
Maj. Harry Fearnley Kirkpatrick, East Kent Reg.
Tmp Major Leonard Knapman, Army Service Corps
Maj. Charles Leycester Knyvett Royal Field Arty.
Tmp Lt.-Col. Robert Kyle, Highland Light Inf.
Maj. Wilham Frederick Robert Kyngdon, Royal Garrison Arty.
Maj. Roderick Laing Seaforth Highlanders
Maj. James Laird, Royal Field Arty.
Capt. Ronald Dewe Lake, Northamptonshire Reg.
Tmp Major George Moorsom Lagier Lamotte, Royal Engineers
Capt. John du Plessis Langrishe RAMC
Maj. John Henry Langton, Royal Welsh Fusiliers
Maj. Percy Edward Langworthy Parry, London Reg.
Maj. Sir Thomas Perceval Larcom Royal Arty.
Capt. Stanley Dermott Large RAMC
Capt. The Hon. Edward Cecil Lascelles Rifles Brigade
Mag Charles Trevor Lawrence, Royal Field Arty.
Maj. Geoffrey Lawrence, Royal Field Arty.
Maj. Hervey Major Lawrence, Scottish Rifles
Capt. Arthur Bertram Layton, South Lancashire Reg.
Tmp Major Ralph le Butt, Machine Gun Corps
Capt. Victor Carmichael Leckie, Royal Army Veterinary Corps
Maj. Guy Lee East Kent Reg.
Capt. George Maconchy Lee Royal Fusiliers
Maj. Harry Romer Lee, 20th Hussars
Maj. Edward Frederick William Lees, Royal Engineers
Maj. Alexander Leggat RAMC
Capt. Charles Edward Lembcke, Northumberland Fusiliers
Maj. Frederick Joseph Lemon, West Yorkshire Reg.
Tmp Major Dudley Lewis York & Lancaster Reg.
Lt.-Col. Philip Edward Lewis, Royal Arty.
Capt. Wilfrid Gordon Lindsell Royal Arty.
Capt. Christopher George Ling Royal Engineers
Maj. Harold Cronshaw Lings, Manchester Reg.
Tmp Lt. The Hon. Charles Christopher Josceline Littleton, Middlesex Reg.
Lt. William Howard Livens Royal Engineers
Maj. Evan Henry Llewellyn, King's African Rifles
Maj. Evan Colclough Lloyd, Royal Irish Reg.
Lt. Ormond Maxwell Loggie Royal Garrison Arty.
Tmp Capt. Kenneth Thurston Lomas, Royal Engineers
Maj. Thomas Longbottom, West Yorkshire Reg.
Capt. and Bt. Lt.-Col. Charles Alexander Holcombe Longcroft, Welsh Reg.
Capt. Henry Kerr Longman late Gordon Highlanders
Lt.-Col. William Loring, Royal Garrison Arty.
2nd Lt. Stuart Gilkinson Love
Maj. John Gordon Lowndes, late North Lancashire Reg.
Capt. Henry Charles Loyd Coldstream Guards
Tmp Major Lowes Dalbiac Luard, Army Service Corps
Maj. Williams Ludgate, Royal Army Veterinary Corps
Capt. and Bt. Major Edgar Rainey Ludlow-Hewitt Royal Irish Rifles
Maj. Cecil St. John Lynch, Royal Engineers
Capt. Jasper Beverley Lynch, late 12th Cav., Indian Army
Local Major Frank Sanderson Lyster, Special List
Maj. Archibald Laird MacConnell, Argyll and Sutherland Highlanders
Capt. Harold Symes MacDonald Royal Field Arty.
Tmp Major James Leslie Auld Macdonald, Royal Scots
Lt.-Col. Reginald James Macdonald, Royal Garrison Arty.
Maj. John Buchanan MacFarlan, Royal Field Arty.
Lt. Fane Andrew James Macfarlane, London Reg.
Maj. Walter Macfarlane, Glasgow Yeomanry
Capt. Fraoicis Burnett Mackenzie Royal Scots
Maj. Pierse Joseph Mackesy Royal Engineers
Capt. and Bt. Major William Alexander Onslow Churchill Mackintosh, Royal Arty.
Maj. and Bt. Lt.-Col. Charles Alexander Hugh MacLean, Argyll and Sutherland Highlanders
Maj. Charles Wilberforce MacLean, Cameron Highlanders
Tmp Major Adam Gordon MacLeod, Army Service Corps
Capt. Donald Macleod North Staffordshire Reg.
Maj. Malcolm Neynoe MacLeod Royal Engineers
Lt. Mind en Whyte Melville MacLeod, Royal Garrison Arty.
Capt. and Bt. Major Patrick Dalmahoy McCandlish, Argyll and Sutherland Highlanders
Maj. William McCall RAMC
Maj. Robert Singleton McClintock, Royal Engineers
Tmp Capt. Ivor Herbert McClure, Intelligence Corps
Lt. Hamilton McCombie Worcestershire Reg.
Capt. William McKim Herbert McCullagh RAMC
Capt. and Bt. Major James Innis Aikin McDiarmid, Royal Garrison Arty.
Tmp Capt. Gordon Archibald McLarty RAMC
Maj. Norman Macdonald McLeod Royal Field Arty.
Capt. Hugh McMaster Royal Arty.
Capt. Donald Jay McMullen, Royal Engineers
Capt. John William McNee RAMC
Tmp Capt. George Maitland Edwards, Royal Engineers
Lt.-Col. George Alexander Malcolm, Reserve, attd. London Reg.
Tmp Capt. Stuart Sydney Mallinson Royal Engineers
Capt. John Alexander Manifold RAMC
Capt. Lionel Manton, Royal Engineers
Maj. and Bt. Lt.-Col. Arthur Henry Marindin, Royal Highlanders
Maj. and Bt. Lt.-Col. Cecil Colvile Marindin, Royal Garrison Arty.
Capt. Bryan Lister Marrmer, Royal Field Arty.
Capt. John Francis Harnsor Marsh, Hampshire Reg.
Capt. Alfred Russel Marshall Royal Engineers
Capt. Charles Frederick Kelk Marshall Royal Field Arty.
Hon. Major Henry Alfred Marshall, Army Ordnance Depot
Tmp Major Ernest Brasewhite Martin, Royal Engineers
Maj. Daniel Johnstone Mason, Royal Field Arty.
Maj. Malcolm Forty Mason, Suffolk Reg.
Capt. Charles Walter Massy Royal Field Arty.
Maj. Reginald Cosway Matthews, Royal Army Veterinary Corps
Tmp Lt.-Col. William Riddell Matthews, RAMC
Lt. Hugh Patrick Guarm Maule Honourable Arty. Company
Maj. William John Maule, Essex Reg.
Lt.-Col. Herbert Blair Mayne, Royal Garrison Arty.
Capt. John Maxwell Rifle Brigade
Lt.-Col. James McCall Maxwell Royal Field Arty.
Tmp Lt.-Col. Robert David Perceval-Maxwell, Royal Irish Rifles
Maj. Sydmey Manvers Woolner Meadows, RAMC
Maj. Cyril Frankland Meares, Royal Irish Fusiliers
Maj. Teignmouth Philip Melvil, Lancers
Tmp Major David Kinloch Michie, Highland Light Inf.
Capt. George Waterston Miller, RAMC
Maj. Hubert Garrett Blair Miller Royal Scots Fusiliers
Rev. William Herbert Latimer Miller Royal Army Chaplains' Dept.
Maj. John Williamson Milligan, East Africa Supply Corps
Capt. George Ernest Millner London Reg.
Rev. Eric Milner Milner-White, Royal Army Chaplains' Dept.
Maj. Cecil Francis Milsom, Army Service Corps
Tmp Col. Thomas Herbert Minshall, General List
Maj. Arthur Mitchell, Royal Garrison Arty.
Maj. Archibald Madame Mitchell, Royal Scots
Capt. Charles Mitchell, Grenadier Guards
Capt. William Gore Sutherland Mitchell Highland Light Inf.
Tmp Major Thomas Hassard Montgomery, Army Service Corps
Maj. Edward Duke Moore, East Riding Yeomanry
Maj. Edward Henry Milner Moore, RAMC
Lt.-Col., George Abraham Moore RAMC
Maj. Charles Robert Faulconer Morgan, Army Service Corps
Maj. Thomas Bettesworth Moriarty, RAMC
Lt.-Cmdr. Edward N. Groves Morris, Royal Naval Volunteer Reserve, attd. Royal Naval Air Service
Maj. Jolm Hugh Morris, Army Service Corps
Lt.-Col. and Bt. Col. Frederick Lansdowne Morrison Highland Light Inf.
Tmp Capt. Robert Charles Stuart Morrison-Scott, Royal Marine Arty.
Lt.-Col. Sidney Pelham Morter, Royal Field Arty.
Tmp Major Albert Isaac Mossop, attd. Oxfordshire & Buckinghamshire Light Inf.
Lt.-Col. Hugh Crawford Moultrie, Royal Arty.
Lt.-Col. Charles Carter Moxon Yorkshire Light Inf.
Tmp Major John Carr Muriel, Royal Inniskilling Fusiliers
Capt. Edward Lionel Mussor Manchester Reg.
Maj. Lenox Arthur Dutton, Naper, Royal Field Arty.
Maj. Henry Edmund Palmer-Nash, Royal Scots
Maj. Roderick Macaulay Bernard Needhan, Suffolk Reg.
Capt. Duncan Ferguson Dempsterr Neill, Royal Engineers
Capt. Redmond Barry Neill, Royal Irish Fusiliers
Lt.-Col. Richard Austin Nevill, Royal Engineers
Maj. Gervys Charles Nevile, Royal Field Arty.
Maj.-Thomas Clifford Newbold, Nottinghamshire and Derbyshire Reg.
Maj. Edward Hills Nicholson, Royal Fusiliers
Capt. Hugh Blomfield Nicholson, King's Royal Rifle Corps
Maj. Cecil Paterson Nickalls, Royal Field Arty.
Maj. John, Scott Nimmo, Royal Army Veterinary Corps
Maj. Samuel Richard Normand, Royal Garrison Arty.
Maj. Arthur Ernest Norton, West Indian Reg.
Tmp Lt.-Col. William Kilminster Notley
Tmp Major Allan Vaughan Nutt, York & Lancaster Reg.
Tmp Major Norman Henry Nutt, Tank Corps
Lt.-Col. William Coope Gates, Nottinghamshire and Derbyshire Reg.
Tmp Lt.-Col. Henry Rogham O'Brien, Royal Engineers
Lt.-Col. William Tasker Odam, Royal Field Arty.
Tmp Major Richard John Lanford O'Donoghue, Army Service Corps
Tmp Lt.-Col. Robert James Leslie Ogilby, London Reg.
Maj. David Ogilvy, Royal Engineers
Tmp Major Bernardine O'Gorman, General List
Maj. and Bt. Lt.-Col. Gerald Maxwell Orr, Lancers
Lt.-Col. Lewis James Osborn, Royal Arty., Royal Field Arty.
Capt. George Cecil Rudall Overton, Royal Fusiliers
Capt. Lindsay Cunliffe Owen, Royal Engineers
Tmp Major Norman Henry Oxenham, Machine Gun Corps
Capt. and Bt. Major Bernard Charles Tolver-Paget Oxfordshire & Buckinghamshire Light Inf.
Rev. Reginald Palmer Royal Army Chaplains' Dept.
Maj. Thomas Kenyon Pardoe, Worcestershire Reg.
Maj. James Dove Park, Royal Engineers
Tmp Capt. Albert Chevallier-Parker, Special List
Capt. George Singleton Parkinson, RAMC
Maj. Henry Evan Pateshall, Herefordshire Reg.
Maj. Sir Everard Philip Digby Pauncefort-Duncombe Buckinghamshire Yeomanry
Maj. Denys Whitmore Payne Royal Garrison Arty.
Tmp Capt. Herbert Gerald Payne, General List
Maj. Hugh Drummond Pearson, Royal Engineers
Maj. Thomas William Pearson, Royal Field Arty.
Lt.-Col. William Carmichael Peebles, Royal Scots
Capt. Home Peel London Reg.
Local Major Willoughby Ewart Peel, Camel Transport Corps
Tmp Capt. Albert James Pelling Royal Engineers
Rev. Douglas Raymond Pelly, Royal Army Chaplains' Dept.
Hon. Lt. Bertie Howard Penn, Army Ordnance Depot
Lt.-Col. Frederick Septimus Penny RAMC
Tmp Major William Petty, Seaforth Highlanders
Capt. Ernest Cyril Phelan RAMC
Lt.-Col. Henry Ramsay Phipps, Royal Field Arty.
Tmp Major William John Phythian-Adams Royal Fusiliers
Capt. Jocelyn Arthur Adair Pickard, Royal Engineers
Maj. Frederick Alfred Pile Royal Arty.
Capt. John Ryland Pisent, Royal Engineers
Maj. and Bt. Lt.-Col. William Richard Pinwill, Liverpool Reg.
Tmp Major Oswald Bertram Fisher Planck, Army Service Corps
Lt. Ian Stanley Ord Playfair Royal Engineers
Maj. Thomas Herman Plummer, Royal Garrison Arty.
Lt. James Frederick Plunkett Royal Irish Reg.
Capt. Alexander Morton Pollard, RAMC
Capt. Robert Valentine Pollok, Irish Guards
Maj. and Bt. Lt.-Col. Cyril Lachlan Porter, East Kent Reg.
Capt. James Herbert Porter, North Staffordshire Reg.
Maj. Edward Charles Pottinger, Royal Arty.
Maj. Eden Bernard Powell, Rifles
Brig Lt.-Col. Edgar Elkin Powell, RAMC
Tmp Major Randolph MacHattie Powell, Royal Garrison Arty.
Maj. Thomas Power, M.L.B.
Maj. Henry Royds Pownall Royal Field Arty.
Tmp Major Albert Ernest Prescott, Royal Engineers
Maj. Classon O'Driscoll Preston, Royal Field Arty.
Maj. Walter Clavel Herbert Prichard, Royal Engineers
Maj. Peregrine Prince, Shropshire Light Inf.
Tmp Major Edward Robert Seymour Prior South Lancashire Reg.
Lt. Percy William Prockter, Army Service Corps
Maj. Demson Pudsey, Royal Field Arty.
Capt. Richard Brownlow Purey-Cust Royal Field Arty.
Maj. Alfred Hutton Radice, Gloucestershire Reg., South Wales Borderers
Capt. Rowan Scrope Rait Kerr Royal Engineers
Capt. Gerard Marland Rambaut, Royal Field Arty.
Maj. James Gordon Ramsay, Cameron Highlanders
Capt. and Bt. Major Algernon Lee Ransome Dorsetshire Reg.
Maj. and Bt. Lt.-Col. Cecil Godfrey Rawling Somerset Light Inf.
Capt. John George Grey Rea, Yeomanry
Maj. Robert Clanmalier Reeves, Royal Field Arty.
Maj. Charles Savile Reid, Royal Engineers
Lt. Henry Thomas Rendell, Army Service Corps
Tmp Major John Walter Keyell, Royal Engineers
Capt. John Phillip Rhodes, Royal Engineers
Maj. Ernest Evelyn Rich, Royal Horse Arty.
Tmp Capt. John Frederick Gwyther Richards RAMC
Maj. Gerald Arthur Richards Royal Arty.
Maj. George Carr Richardson Royal Arty.
Lt.-Col. Robert Buchanan Riddell, Royal Garrison Arty.
Tmp Major The Hon. Harold Ritchie, Scottish Rifles
Lt.-Col. Colin McLeod Robertson, Royal Garrison Arty.
Maj. Frank Mansfield Boileau Robertson, Royal Highlanders
Maj. William Cairnes Robertson, Royal Garrison Arty.
Capt. Robert William Barrington Robertson-Eustace, East African Forces
Maj. Annesley Craven Robinson, Army Service Corps
Maj. John Armstrong Purefoy Robinson, Royal Garrison Arty.
Maj. Thomas Chambers Robinson, East Lancashire Reg.
Maj. Cyril Edmund Alan Spencer Rocke, Irish Guards
Maj. Harold Bowyer Roffey, Lancashire Fusiliers
Tmp Major Myles Herbert Roffey, Welsh Reg.
Maj. Walter Lacy Yea Rogers, Royal Horse Arty.
Tmp Major Norman Thomas Rolls, Royal West Surrey Reg.
Maj. and Bt. Lt.-Col. Claudo Stuart Rome, 11th Hussars
Maj. Everard Howe Rooke, Royal Engineers
Capt. Edward Ridgill Roper Royal Field Arty.
Capt. Robert Knox Ross Royal West Surrey Reg.
Maj. William Edward Rothwell, Royal Inniskilling Fusiliers
Maj. Wilfred Barton Rowe, Royal Garrison Arty.
Lt.-Col. Frank George
Mathias Rowley Middlesex Reg.
Lt. Albert Russell, Royal Engineers
Col. Bruce Bremner Russell
Maj. Noel Hunsley Campbell Russell, Leinster Reg., and Worcestershire Yeomanry
Tmp Major William Malcolm Russell, General List
Maj. William Thomas Cutler Rust, Army Service Corps
Maj. Hugh Thomas Ryan, Royal Army Veterinary Corps
Capt. Julian Neil Oscar Rycroft Royal Highlanders
Maj. Harold Francis Salt, Royal Arty.
Maj. Edward Vipan Sarson, Royal Field Arty.
Maj. Lionel Robert Schuster, Liverpool Reg.
Tmp Major Albert Edward Scothern, Nottinghamshire and Derbyshire Reg.
Capt. John Davie Scott, Royal Irish Reg.
Capt. John Walter Lennox Scott, RAMC
Maj. William Scott-Elliot, Army Service Corps
Maj. Hugh Forde Searight, 1st Dragoon Guards
Tmp Major Frank Searle, Tank Corps
Maj. Thomas Byrne Sellar late King's Own Scottish Borderers
Capt. Hugh Garden Seth-Smith, Army Service Corps
Capt. Reginald Henry Napier-Settle 19th Hussars
Maj. Evelyn Francis Edward-Seymour, Royal Dublin Fusiliers
Maj. Roger Cecil Seys, Royal Arty.
Capt. Arthur Talbot Shakespear Royal Engineers
Capt. and Bt. Major George Frederick Cortland Shakespear Indian Army
Maj. Charles Schmidt Sharpe, York & Lancaster Reg.
Tmp Major William Shaw, Army Service Corps
Maj. Henry Francis Shea RAMC
Capt. Charles Edward Gowran Shearman Bedfordshire Reg.
Tmp Major Robert Austin Shebbeare, Army Service Corps
Capt. John Reginald Vivian Sherston Cav. Indian Army
Capt. William John Townsend Shorthose, South Staffordshire Reg., and King's African Rifles
Maj. Cecil Barrow Simonds, Royal Garrison Arty.
Capt. William ArthurJohn Simpson Royal Field Arty.
Maj. James Robert Simson, Highland Light Inf.
Rev. Patrick Sinclair Royal Army Chaplains' Dept.
Maj. Alexander Baird Skinner, Indian Army Cav.
Q.M. and Hon. Major Edmund William Skinner, Lincolnshire Reg.
Lt.-Col. Edward Wheeler Slayter RAMC
Maj. Arthur John Henry Sloggett, Rifle Brigade
Capt. Lovell Francis Smeathman Hertfordshire Reg.
Capt. Arthur Francis Smith Coldstream Guards
Capt. Isham Percy Smith, Royal Garrison Arty.
Capt. William Selwyn Smith, Royal Field Arty.
Maj. Gerald James Watt Smyth, Royal Engineers
Lt.-Col. Henry Smyth, Cheshire Reg.
Lt.-Col. George Abraham Smyth, Royal Field Arty.
Maj. Rupert Caesar Smythe, Royal Inniskilling Fusiliers
Lt. William Fulton Somervail Scottish Rifles
Capt. Herbert George Sotheby, Argyll and Sutherland Highlanders
Lt.-Col. Charles Louis Spencer, Royal Engineers
Capt. Hugh Baird Spens, Scottish Rifles
Tmp Capt. Alfred William Speyer, General List, late West Yorkshire Reg.
Capt. Sidney Stallard, London Reg.
Hon. Capt. Alfred Richard Stamford, Army Ordnance Depot
Maj. The Hon. Oliver Hugh Stanley, Royal Arty.
Tmp Major William Alan Stanley, Machine Gun Corps
Capt. Arthur Christopher Lancelot Stanley-Clarke, Scottish Rifles
Maj. William Lockhart St. Clair, Royal Field Arty.
Tmp Major William Jones Steele, Royal Engineers
Tmp Lt.-Col. Arthur Stephenson Royal Scots
Lt.-Col. Henry Kenyon Stephenson Royal Field Arty.
Capt. Charles Knowles Steward South Wales Borderers
Tmp Major Albert Lewis Stewart, Machine Gun Corps
Maj. William Murray Stewart, Cameron Highlanders
Capt. and Bt. Major Walter Robert Stewart Rifle Brigade
Capt. Alexander Dickson Stirling RAMC
Capt. Colin Robert Hoste Stirling Scottish Rifles
Maj. Walter Andrew Starling Royal Arty.
Maj. William Eustace St. John, Yeomanry
Maj. Ashton Alexander St. Hill, West Riding Reg.
Capt. Hugh Morton Stobart, Yeomanry
Tmp Capt. Adrian Stokes RAMC
Cat Henry Howard Stoney, North Staffordshire Reg.
Maj. Martyn Rogers Strover, Royal Garrison Arty.
Maj. Edward Lisle Strutt, Royal Scots
Maj. Francis Cyril Rupert Studd, East Kent Reg.
Tmp Major Montague Alfred Sliney Sturt, Army Service Corps
Lt.-Col. Charles William Swinton, Royal Garrison Arty.
Maj. William Frederick John Symonds, London Reg.
Tmp Major Henry Leslie Aldersey Swann, Army Service Corps
Capt. Ernest John Bocart Tagg, Royal Marine Light Inf.
Tmp 2nd Lt. Bruce Mitchell Taylor Duke of Cornwall's Light Inf.
Maj. Charles Lancaster Taylor, South Wales Borderers
Maj. Glenleigh John Schill Taylor, Royal Field Arty.
Capt. George Pritchard Taylor RAMC
Maj. Henry Jeffreys Taylor, Durham Light Inf.
Capt. George Harris Teall, Lincolnshire Reg.
Capt. and Bt. Major Richard Durand Temple, Worcestershire Reg.
Capt. James Hugh Thomas RAMC
Lt.-Col. Henry Melville Thomas Royal Arty.
Tmp Major Basil Thomas, Gloucestershire Reg.
Tmp Lt.-Col. Albert Charles Thompson, Royal Dublin Fusiliers
Tmp Lt. Claude Ernest Thompson South Lancashire Reg.
Maj. Cyril Henry Farrer Thompson, London Reg.
Maj. James George Coulthered Thompson, Royal Field Arty.
Capt. William Irwin Thompson RAMC
Capt. George Thomson Yorkshire Light Inf.
Maj. George Edward Mervyn Thorneycroft, Royal Arty.
Maj. Cudbert John Massey Thornhill, Indian Army
Lt.-Col. Arthur Hugh Thorp, Royal Garrison Arty.
Lt.-Col. John Claude Thorp, Army Ordnance Depot
Lt. Alexander Tillett Devonshire Reg.
Maj. Clement Thurstan Tomes Royal Warwickshire Reg.
Capt. Julian Latham Tomlin, Royal Engineers
Lt.-Col. Francis William Towsey West Yorkshire Reg.
Maj. Edmund Francis Tarlton Traill, Army Service Corps
Maj. John Brereton Owst Trimble Yorkshire Reg.
Tmp Major Frederick George Trobridge, General List
Capt. Gerald Louis Johnson Tuck, Unattd. List, attd. Suffolk Reg.
Lt.-Col. Donald Fiddes Tulloch, Royal Arty.
Maj. Canning Turner, Leicestershire Reg.
Capt. Reginald Aubrey Turner Royal Engineers
Tmp Capt. Clifford Charles Horace Twiss, East Yorkshire Reg.
Maj. Weratwarth Francis Tyndale RAMC
Capt. William Tyrrell RAMC
Maj. Thurlo Richardson Ubsdell, late Royal Arty.
Maj. John Salusbury Unthank, Durham Light Inf.
Lt. James Alastair Berry Urquhart, Royal Garrison Arty.
Rev. George Ross Vallings, Royal Army Chaplains' Dept.
Tmp Capt. Sir Harry Calvert Williams Verney General List
Maj. Leonard Morris Verney Royal Army Veterinary Corps
Q.M. and Hon. Major George Edward Vickers, Manchester Reg.
Lt. Oliver G. G. Villiers, Royal Naval Volunteer Reserve, attd. Royal Naval Air Service
Maj. Patrick Villiers-Stuart, Royal Fusiliers
Maj. Ernest Blechynden Waggett RAMC
Lt.-Col. Arthur Reginald Wainewright, Royal Arty.
Maj. Roland Henry Waithman, Royal Sussex Reg.
Tmp Capt. George Goold Walker Royal Garrison Arty.
Capt. and Bt. Major Charles John Wallace Highland Light Inf.
Tmp Capt. James Hardress de Warrenne Waller, Royal Engineers
Maj. Hubert de Lansey Walters, Royal Garrison Arty.
Maj. Harold Mathias Arthur Ward Royal Garrison Arty.
Maj. Joseph Ward, RAMC
Maj. George William Webb Ware RAMC
Maj. Henry Archibald Waring, Royal West Kent Reg.
Maj. Lionel Edward Warren, Royal Field Arty.
Maj. Edward Robert Cabell Warrens, Royal Field Arty.
Maj. Philip Huskinson Warwick, Yeomanry
Maj. James Way Royal Arty.
Tmp Major Harry Reginald Bland Wayman, Northumberland Fusiliers
Maj. Adrian Barclay Wayte, Nottinghamshire and Derbyshire Reg.
Q.M. and Hon. Major Walter Edward Webb, London Reg.
Capt. Ronald Moree Weeks South Lancashire Reg.
Maj. Barrington Clement Wells, Essex Reg.
Capt. Richard Annesley West, Yeomanry
Lt.-Col. Frederick Malcolm Westropp, Royal Engineers
Maj. Frederick Whalley RAMC
Tmp Major Wynn Powell Wheldon, Royal Welsh Fusiliers
Maj. William Stobart Whetherly, Hussars
Capt. Arthur Percy Buncombe Whitaker, Army Service Corps
Charles Richardson White, Army Medical Corps
Maj. and Bt. Lt.-Col. Frank Augustin Kinder, White, Royal Engineers
Tmp Lt. Noel Blanco White General List
Maj. and Bt. Lt.-Col. The Hon. Robert White Reserve of Ofc.s
Lt.-Col. Edmund l'Estrange Whitehead, Royal Arty.
Tmp Major Hector Fraser Whitehead, East Lancashire Reg.
Lt.-Col. Edward Nathan Whitley Royal Arty.
Maj. Everard le Grice Whitting Royal Arty.
Tmp Major Alan Roderick Whittington, Army Service Corps
Lt. William Henry Whyte, Royal Dublin Fusiliers
Capt. Harold Hartley Wilberforce, Army Service Corps
Maj. Edward Harold Wildblood, Leinster Reg.
Lt. Cyril Francis Wilkins Royal Irish Rifles
Tmp Major Harris Vaughan Wilkinson, Machine Gun Corps
Capt. James Lugard Willcocks Royal Highlanders
Capt. Henry Beresford Dennitts Willcox Nottinghamshire and Derbyshire Reg.
Maj. George Arthur Seccombe Williams, South Staffordshire Reg. (Spec. Reserve)
Maj. Herbert Mamwanng Williams, Royal Army Veterinary Corps
Rev. Ronald Charles Lambert Williams, Royal Army Chaplains' Dept.
Lt.-Col. Frederick George Willock, Royal Field Arty.
Maj. Albert Edward Jacob Wilson, Somerset Light Inf.
Maj. Donald Clitheroe Wilson, Royal Field Arty.
Tmp Capt. Douglas Hamilton Wilson, General List
Maj. James Herbert Roche Winder RAMC
Capt. Gordon Bluett Winch, Royal Field Arty.
Maj. and Bt. Lt.-Col. Godfrey Harold Fenton Wingate, Royal Scots
Tmp Lt.-Col. Ernest Arthur Winter Royal Fusiliers
Lt.-Col. William Maunder Withycombe Yorkshire Light Inf.
Maj. James Wood, RAMC
Capt. Wilfred James Woodcock, Lancashire Fusiliers
Capt. William Talbot Woods Manchester Reg.
Maj. Robart James Wordsworth, Nottinghamshire and Derbyshire Reg.
Maj. Percy Reginald Worrall Devonshire Reg.
Maj. Stephen Henry Worrrall, Border Reg.
Capt. Andrew Rae Wright RAMC
Maj. Hubert Howard Wright, Army Service Corps
Maj. and Bt. Lt.-Col. Wallace Duffield Wright Royal West Surrey Reg.
Maj. William Oswald Wright, Royal Lancaster Reg.
Lt.-Col. Arthur Oliver Bird Wroughton, RAMC
Capt. Jasper William George Wyld Oxfordshire & Buckinghamshire Light Inf.
Maj. Guy George Egerton Wylly Indian Army
Tmp Major Charles Sandford Wynne-Eyton, General List, and Royal Flying Corps
Maj. Cecil McGrigor Yates, Royal Arty.
Maj. Robert James Burton Yates, Indian Army Cav.
Maj. Richard Lister York, Royal Field Arty.
Maj. Arthur Allan Shakespear Younger, Royal Field Arty.
2nd Lt. James Allardyce London Reg.
Maj. Arthur Harold Bibby, Royal Field Arty.
Tmp Capt. Patrick Dick Booth Royal Field Arty.
Capt. and Bt. Major Austin Hanbury Brown Royal Engineers
Lt. Frederick Arthur Montague Browning, Grenadier Guards
Tmp Capt. Ferguson Fitton Carr-Harris RAMC
2nd Lt. Joseph Percy Castle, West Riding Reg.
Tmp Major Vernon Douglas Robert Conlan, Army Service Corps
Maj. Anthony Courage Hussars
Maj. Murray Heathneld Dendy Royal Arty.
Lt. Andrew May Duthie, London Reg.
Lt. William Maurice Evans, South Wales Borderers
Capt. Charles Robert Gerard, Grenadier Guards
Capt. Philip Mannock Glasier, London Reg.
Lt. Tom Goodall, West Riding Reg.
2nd Lt. Guthrie Hallsmith, Suffolk Reg.
Lt. John Steven Hamilton, West Yorkshire Reg.
Tmp Lt. John Eliot Hancock, Norfolk Reg.
Capt. James Francis Harter Royal Fusiliers
Lt. Cyril Walter Holcroft, Worcestershire Reg.
Capt. Herbert Selwyn Jackson, West Riding Reg.
Tmp 2nd Lt. William George James, Yorkshire Light Inf.
2nd Lt. William Joffe, Yorkshire Light Inf.
Capt. Kenneth Alfred Johnston, Hampshire Reg.
2nd Lt. Edward Spurin Knight, London Reg.
Tmp Capt. Charles Robert Lucas, Royal Lancaster Reg.
Lt. Alfred Cecil Lynn, Yorkshire Light Inf.
2nd Lt. John Francis Maginn, London Reg.
Tmp Capt. Francis Morgan Mathias, Welsh Reg.
2nd Lt. James Thomas Byford McCudden General List, and Royal Flying Corps
2nd Lt. Andrew Edward McKeever Royal Flying Corps
Tmp Major David Watts Morgan, Labour Corps
Capt. and Bt. Major The Hon. Thomas George
Breadalbane TVtorgan-Grenville-Gavin Rifle Brigade
Lt. Charles Stone Moxon, West Riding Reg.
Maj. Sir Christopher William Nixon Royal Arty.
2nd Lt. James Partridge Notman, Seaforth Highlanders
2nd Lt. Gerald O'Brien, Royal Munster Fusiliers
Maj. Cecil Henry Pank, Middlesex Reg.
2nd Lt. William Paul West Yorkshire Reg.
2nd Lt. James Peel Royal Fusiliers
Maj. Gilbert Sandford Poole, Yeomanry
Maj. Rowland Edward Power, East Kent Reg.
Tmp Major John Brenchley Rosher Durham Light Inf.
Maj. Charles Frank Rundall, Royal Engineers
Lt.-Col. George Gray Russell, King Edward's Horse
Lt.-Col. Cecil John Herbert Spence-Jones, Yeomanry
Maj. Charles Arthur Algernon Stidson RAMC
Capt. and Bt. Major John Alexander Stirling Scots Guards
Tmp Major Leycester Penrhyn Storr, Liverpool Reg.
Lt. Gerald Fitzgerald-Stuart, West Yorkshire Reg.
Tmp 2nd Lt. John Edwin Tillotson, West Yorkshire Reg.
2nd Lt. Elliot Clarke Tuckey, Royal Field Arty.
Tmp 2nd Lt. William Arthur Upton, Wiltshire Reg.
Tmp Lt.-Col. Herbert Lawton Warden, East Surrey Reg.
Lt. Guy Randolph Westmacott, Grenadier Guards
Capt. and Bt. Major Bevil Thomson Wilson, Royal Engineers
Australian Imperial Force
Maj. Alan Sinclair Durvall Barton, Army Medical Corps
Maj. Thomas Harold Bird, Light Horse Reg.
Lt.-Col. Jaanes Jamison Black, Army Medical Corps
Lt.-Col. William Brazenor, Inf.
Maj. William Francis Noel Bridges, Inf.
Lt.-Col. Samuel Roy Burston, Army Medical Corps
Maj. David Duncan Jade, Army Medical Corps
Lt.-Col. Herbert Gordon Carter, Pioneer Battalion
Maj. Richard Gardiner Casey Inf.
Maj. Clement Lorne Chapman, Army Medical Corps
Maj. Alexander Chisholm, Light Horse Reg.
Maj. Walter Churchus, Field Arty.
Maj. Eric Winfield Connelly, Inf.
Tmp Lt.-Col. James Montague Christian Corlette, Engineers
Maj. John Joseph Corngan, Inf.
Maj. Tannatt William Edgeworth David Engineers
Lt.-Col. William Joihn Stevens Davidson, Field Arty.
Lt.-Col. Michael Henry Downey, Army Medical Corps
Lt.-Col. Richard Dowse, Staff
Lt.-Col. Edmund Alfred Drake Broekman Inf.
Lt.-Col. Bernard Oscar Charles Duggan, Inf.
Maj. Percy Malcolm Edwards, Field Arty.
Maj. William Gordon Farquhar, Engineers
Maj. Hubert Cedric Ford, Inf.
Maj. William Reginald Rogers Ffrench Machine Gun Corps
Maj. Vivian Harold Gatliff, Field Arty.
Maj. Richard Stewart Gee, Field Arty.
Capt. Henry James Hill Glover, Field Arty.
Lt.-Col. Henry Arthur Goddard, Inf.
Maj. John Leslie Hardie, General List
Maj. James Douglas Henry, Engineers
Lt.-Col. Ernest Edward Herrod, Inf.
Lt.-Col. William Alexander Henderson, Pioneer Battalion
Maj. Max Henry, Royal Army Veterinary Corps
Maj. Basil Holmes, Inf.
Col. Alexander Jobson, Inf.
Maj. Robert Kerr, Provost Company
Maj. William Selwyn King, Army Service Corps
Lt.-Col. Giffard Hamilton Macarthur King Field Arty.
Maj. Robert Edward Jackson, Inf.
Lt.-Col. John Dudley Lavarack, Arty.
Maj. Frederick Washington Lawson, Engineers
Lt.-Col. Henry Dundas Keith Macartney, Field Arty.
Maj. Patrick John McCormack, Field Arty.
Maj. Roy Stanley McGregor, Army Medical Corps
Maj. Louis Evander McKenzie, Royal Army Veterinary Corps
Q.M. and Hon. Major Charles Francis Minagall, Inf.
Lt.-Col. John Wesley Mitchell, Inf.
Maj. David Henry Moore, Field Arty.
Lt.-Col. Arthur Henry Moseley, Army Medical Corps
Maj. Edric Noel Mulligan, Australian Engineers
Lt.-Col. Henry Simpson Newland, Army Medical Corps
Lt.-Col. Edward Creer Nome, Inf.
Maj. Edwin Andrew Olding, Field Arty.
Maj. John Joseph Power, Army Medical Corps
Lt.-Col. Edgar Maurice Ralph, General List
Lt.-Col. George Arthur Read, Inf.
Maj. John Dalyell Richardson, Light Horse Reg.
Maj. Harold William Riggall, Field Arty.
Maj. Septimus Godorphin Rowe, Field Arty.
Maj. Edward Irvine Charles Scott, Pioneer Battalion
Maj. Herbert James Shannon, Light Horse Reg.
Lt.-Col. Joseph Lexden Shellshear, Field Artv
Lt.-Col. James Charles Francis Slane, Inf.
Maj. Dudley Wallace Arabin Smith, Light Horse Reg.
Maj. William Smith, Provost Corps
Lt.-Col. William Stansfield, Army Service Corps
Lt.-Col. John Mitchell Young Stewart, Army Medical Corps
Maj. Harold Bourne Taylor, Field Arty.
Lt.-Col. Alexander Hopkins Thwaites, Army Medical Service
Maj. Claude John Tozer, Army Medical Corps
Lt.-Col. Hugh Venables Vernon, Field Arty.
Tmp Lt.-Col. Charles Ernest Wassell, Army Medical Corps
Lt.-Col. Ernest Morgan Williams, Light Horse Reg.
Maj. Henry James Williams, Army Medical Corps
Maj. Eric Arundel Wilton, Machine Gun Corps
Lt.-Col. Percy William Woods Inf.
Lt.-Col. Arthur Raff Woolcock, Inf.
Maj. Malwyn Hayley à Beckett, Inf.
Lt.-Col. Murray William James Bourchier, Light Horse Reg.
Tmp Lt.-Col. Donald Cameron, Light Horse Reg.
Capt. George Vernon Davies, Army Medical Corps
Capt. Robert Derwent Dixon, Australian Inf.
Maj. Cuthbert Murchison Fetherstonhaugh, Light Horse Reg.
Maj. Reginald Norris Franklin, Light Horse Reg.
Lt.-Col. Robert Oswald Henderson, Inf.
Maj. Eric Montague Hyman, Light Horse Reg.
Maj. James Lawson, Light Horse Reg.
Maj. Leslie Herbert Payne, Inf.
Maj. Jeremiah Charles Selmes, Field Arty.
Maj. Roy Meldrum Thompson Field Arty.
Canadian Force
Capt. Samuel Buttrey Birds Inf.
Lt.-Col. Allison Hart Borden, Inf.
Maj. Alexander Grant, Inf.
Maj. John Alexander McEwan, Inf.
Lt.-Col. Andrew George Latta McNaughton, Field Arty.
Maj. Frederick Jackson Alderson, Field Arty.
Lt.-Col. Carleton Woodford Allen, Pioneer Battalion
Maj. Alexander Alderson Anderson, Engineers
Maj. Thomas Victor Anderson, Engineers
Maj. Alfred Turner Bazin, Army Medical Corps
Maj. Percy George Bell, Army Medical Corps
Maj. Charles Corbishley Bennett, Inf.
Maj. Robert Bickerdike, Inf.
Maj. Alfred Sidney Buttenshaw, Ordnance Company
Lt.-Col. Glen Campbell, Pioneer Battalion
Lt.-Col. Robert Percy Clark Inf.
Lt.-Col. Frederick Fieldhouse Clarke, Railway Troops
Maj. George Alton Cline, Engineers
Maj. Frederick Thomas Coghlan, Field Arty.
Lt.-Col. James Kennedy Cornwall, Railway Troops
Maj. Ian Laurie Crawford, Inf.
Lt.-Col. James Edgar Davey, Army Medical Corps
Lt.-Col. Charles Harold Dickson, Army Medical Corps
Maj. Robert Loggie Masterson Donaldson, Ordnance Company
Lt.-Col. John Badenoch Donnelly, Forestry Company
Lt.-Col. William Henry Pferinger Elkins, Horse Arty.
Maj. Thomas Francis Elmitt, Inf.
Tmp Major Royal Lindsay Hamilton Ewing Inf.
Maj. James Johnston Fraser, Army Medical Corps
Maj. Thomas Gibson, Labour Battalion
Maj. Edward Crosby Goldie, Army Service Corps
Lt.-Col. Atholl Edwin Griffin, Railway Troops
Tmp Major The Hon. Francis Egerton Grosvenor Inf.
Lt.-Col. Edwin Gerald Hanson, Field Arty.
Maj. Edward Montgomery Harris, Army Service Corps
Lt.-Col. William Henry Harrison, Field Arty.
Maj. Harry Cecil Hatch, Inf.
Maj. Halfdan Fenton Harboe Hertzberg Engineers
Lt.-Col. Chilion Longley Hervey, Railway Troops
Lt.-Col. Charles Rapelje Hill, Inf.
Maj. Walter Court Hyde, Field Arty.
Lt.-Col. George Chalmers Johnston Mounted Rifles
Maj. George Knight Killam, Inf.
Maj. Charles Ernest King, Inf.
Tmp Lt.-Col. Thomas McCrae Leask, Army Medical Corps
Lt.-Col. William Bethune Lindsay Engineers
Maj. Edison Franklin Lynn Engineers
Maj. William Broder McTaggart, Field Arty.
Maj. Donald John Macdonald Cav.
Lt.-Col. James Brodie Lauder Macdonald, Railway Troops
Maj. Frederick Thomas McKean, Army Service Corps
Capt. William Gordon MacKendrick, Engineers
Maj. James Frederick McParland, Field Arty.
Lt. Charles Kirwan Craufurd Martin, Field Arty.
Lt.-Col. Lawrence Thomas Martin, Railway Troops
Maj. Robert Frank Massie, Field Arty.
Lt. Arthur Clinton Maund, Inf. and Royal Flying Corps
Lt.-Col. Lionel Herbert Millen, Inf.
Lt. Frederick Frank Minchin Inf., attd. Royal Flying Corps
Maj. Percival John Montague Inf.
Lt.-Col. Walter Hill Moodie, Railway Troops
Maj. John Aubrey Morphy, Pioneer Battalion
Maj. George Sidney Mothersill, Army Medical Corps
Lt.-Col. Thomas Joseph Francis Murphy, Army Medical Corps
Tmp Capt. Robert Henry Neeland, Labour Company
Maj. Daniel Jerome O'Donahoe, Inf.
Capt. Garnet Lehrle Ord, Pioneer Battalion
Maj. Richard Francis Parkinson, Inf.
Maj. Eric Pepler, Engineers
Lt.-Col. Charles Ayre Peters, Army Medical Corps
Capt. John Downey Pitman, Ordnance Company
Maj. Alan Torrence Powell, Inf.
Lt. Kenneth Alan Ramsay, Railway Troops
Maj. James Sabiston Rankin, Inf.
Maj. Clifford Hamilton Reason, Army Medical Corps
Maj. William Roy Reirdon, Field Arty.
Lt.-Col. Blair Ripley, Railway Troops
Maj. Donald Edward Allan Rispin, Inf.
Maj. Robert Percy Rogers, Engineers
Lt.-Col. James Sclater, Inf.
Capt. Morris Alexander Scott, Machine Gun Corps
Lt.-Col. Samuel Simpson Sharpe, Inf.
Maj. John Ham Sills, Inf.
Maj. Henry Denne St. Alban Smith, Engineers
Capt. Richard Winslow Stayner Mounted Rifles
Maj. Henry Arthur Stewart, Army Service Corps
Maj. Cecil Valentine Stockwell, Field Arty.
Maj. Joseph Murray Syer, Field Arty.
Capt. David Sobey Tamblyn, Royal Army Veterinary Corps
Maj. Harold Lyndridge Trotter, Engineers
Tmp Col. John Burton White, Forestry Corps
Hon. Lt.-Col. Rev. Albert William Woods, Royal Army Chaplains' Dept.
Maj. Gordon Harold Aikins, Mounted Rifles
Lt. Walter Hartley Burgess, Inf.
Lt. John Angus Cameron, Inf.
Lt. William Francis Jamieson, Inf.
Lt. Hector Kennedy, Inf.
Maj. William Thewles Lawless, Inf.
Lt. Ronald Frederick Macnaghten, Inf.
Capt. Ronald Wilfred Pearson Inf.
Maj. Harold Murchinson Savage, Field Arty.
Capt. William Keating Walker Machine Gun Corps
Maj. William Douglas Wilson, Field Arty.
Tmp Capt. Harvey Gordon Young, Canadian Army Medical Corps
Tmp Capt. Archibald Stirling Kennedy Anderson RAMC
Capt. Rupert Henry Anderson-Morshead, Devonshire Reg.
Lt.-Col. Duncan Gus Baillie, Yeomanry
Maj. Walter Agar Thomas Barstow Royal Field Arty.
Maj. Richard Maul Birkett, Royal Sussex Reg., attd. Royal West Surrey Reg.
Tmp Capt. James Thornely Bowman RAMC
Capt. Henry Fergusson Brace, Hussars
Tmp Capt. John Edouard Marsdeu Bromley, Royal Field Arty.
Tmp Capt. John Jackson Cameron, South Staffordshire Reg., attd. Royal Lancaster Reg.
Maj. James Francis Fraser-Tytler, Yeomanry, attd. Cameron Highlanders
Tmp Capt. Howard Boyd Graham RAMC
2nd Lt. Charles Ernest Henderson, London Reg.
Capt. and Bt. Major Henry Francis
Leonard Hilton-Green Gloucestershire Reg., attd. A.C. Corps
Lt. Percy Frank Knightley, Royal Welsh Fusiliers
Capt. Arthur McDougall, Yeomanry
Lt. Herbert Dryden Home Yorke Nepean, Indian Army
Maj. John Gordon Rees, Yeomanry, attd. Royal Welsh Fusiliers
Capt. Robert Thin Craig Robertson RAMC
Capt. Richard Adair Rochfort Royal Warwickshire Reg., attd. Royal Berkshire Reg.
Capt. Alan Patrick Rodgerson, Indian Army
Maj. Leigh Pemberton Stedall, Yeomanry
Maj. Gerald Gane Thatcher, Royal Garrison Arty., attd. Royal Field Arty.
Capt. and Bt. Major Gerald Lawrence Uniacke, Royal Lancaster Reg.
Newfoundland Force
Capt. Bertram Butler Newfoundland Reg.
New Zealand Force
Lt.-Col. Stephen Shepherd Allen, Inf.
Maj. Frederick Cameron New Zealand Medical Corps
Lt.-Col. Alexander Burnet Charters Inf.
Maj. William Oliver Ennis, Pioneers Major David John Gibbs, Engineers
Maj. Halbert Cecil Glendining, Field Arty.
Maj. Edward James Hulbert, Mounted Rifles
Lt.-Col. James Neil McCarroll, Mounted Rifles
Maj. John McCare, Inf.
Lt.-Col. George Mitchell, Inf.
Maj. Donald Sinclair Murchison, Mounted Rifles
Maj. Clarence Nathaniel Newman, Field Arty.
Lt.-Col. Charles Treweck Hand-Newton New Zealand Medical Corps
Maj. Edward Puttick, Rifle Brigade
Tmp Major Harry McKellar White Richardson Rifle Brigade
Maj. James Macdonald Richmond Field Arty.
Lt.-Col. Robert Amos Row, Inf.
Maj. James Stafford, New Zealand Veterinary Corps
Maj. Alan Duncan Stitt Inf.
Maj. Hugh Vickerman, Engineers
Lt.-Col. Claude Horace Weston, Inf.
South African Force
Tmp Major Charles Agnew Anderson, South African Water Supply Corps
Tmp Major Thomas William Armitage, South African Service Corps
Tmp Major George Edwin Brink, South African Force
Maj. Peter Skinner Clarke, South African Medical Corps
Tmp Lt.-Col. Thomas Harry Blew, Heavy Arty.
Lt.-Col. Ewan Christian, Inf.
Tmp Lt.-Col. Francis Richard Collins, Engineers
Maj. Fred Haselden, Inf.
Maj. Theophilus Edward Liefeldt, Native Labour Corps
Maj. John James Mulvey, Pioneer Battalion
Tmp Capt. Hugh Brindley Owen Uganda Medical Service
Brig.-Gen.-General William Ernest Collins Tanner Inf.
Maj. David Morris Tomory, South African Medical Corps
Capt. Charles Frederick Bernard Viney, Mounted Rifles
Lt.-Col. Arthur Blackwood Ward South African Medical Corps
Tmp Lt.-Col. Gilbert Neville Williams, South African Forces
Awarded a Bar to the Distinguished Service Order (DSO*)
Cmdr. William Marshall Royal Naval Reserve
Maj. William Nathaniel Stuart Alexander Connaught Rangers
Capt. and Bt. Major Michael George Henry Barker Lincolnshire Reg.
Maj. Thomas Andrew Dunlop Best Royal Inniskilling Fusiliers
Capt. and Bt. Major John Dopping Boyd Royal West Surrey Reg.
Lt. Charles Henry Dowden King's Royal Rifle Corps
Maj. Archibald Jenner Ellis Border Reg.
Maj. and Bt. Lt.-Col. Henry Gaspard de Lavalette Ferguson attd. Norfolk Reg.
Maj. Marmion Carr Ferrers-Guy Lancashire Fusiliers
Maj. Ronald Foster Forbes Highland Light Inf.
Maj. and Bt. Lt.-Col. Sidney Goodall Francis West Yorkshire Reg.
Lt.-Col. John Malise Anne Graham Royal Lancaster Reg.
Maj. William Green Royal Highlanders
Tmp Capt. James Robertson Campbell Greenlees RAMC
Capt. Cecil Champagne Herbert-Stepney King's Royal Rifle Corps
Maj. and Bt. Lt.-Col. Charles Graeme Higgins Oxfordshire & Buckinghamshire Light Inf.
Maj. Clifford Hill East African Mounted Rifles
Maj. and Bt. Lt.-Col. Sir Thomas Dare Jackson Royal Lancaster Reg.
Capt. and Bt. Major Alexander Colin Johnston Worcestershire Reg.
Maj. and Bt. Lt.-Col. Alexander Fraser Campbell Maclachlan King's Royal Rifle Corps
Maj. Samuel McDonald Gordon Highlanders
Maj. Reginald George Maturin Royal Field Arty.
Maj. Arthur Maxwell London Reg.
Maj. Herbert Milward Milward Nottinghamshire and Derbyshire Reg.
Maj. Noel Ernest Money Shropshire Yeomanry
Maj. Hubert Horatio Shirley Morant Durham Light Inf.
Lt.-Col. Ronald Ernest Murray British South Africa Police
Tmp Major Sholto Stuart Ogilvie Wiltshire Reg.
Maj. George Parsons British South Africa Police
Tmp Lt.-Col. Warren John Peacocke Royal Inniskilling Fusiliers
Maj. William Moore Bell Sparkes RAMC
Capt. and Bt. Major Gerald Lawrence Uniacke Royal Lancaster Reg., and 2nd Nigeria Reg.
Capt. Lancelot Edward Seth Ward late Oxfordshire & Buckinghamshire Light Inf.
Maj. and Bt. Lt.-Col. Donald Munro Watt Gurkha Rifles, Indian Army
Capt. and Bt. Major Bertram Charles Maximilian Western East Lancashire Reg.
Maj. Stuart Lumley Whatford Yorkshire Reg.
Maj. Thomas Edmund Palmer Wickham Royal Arty.
Capt. Frank Worthington RAMC
Maj. Kenneth Duncan Royal Field Arty.
Maj. George Scott Jackson Northumberland Fusiliers
Tmp Surgeon William James McCracken
Maj. Horace Somerville Sewell Dragoon Guards
Maj. Baptist Johnson Barton Yorkshire Light Inf.
Lt.-Col. Guy Archibald Hastings Beatty Indian Cav.
Maj. Alfred Morey Boyall West Yorkshire Reg.
Maj. Hugh Annesley Gray-Cheape Yeomanry
Maj. John Hardress-Lloyd Tank Corps
Capt. Charles Hervey Hoare Yeomanry
Capt. Edward Darby Jackson King's Own Scottish Borderers
Tmp Major Charles Kennett James Border Reg.
Maj. George Knowles Indian Cav.
Arthur Campden Little Hussars
Maj. Arthur Mordaunt Mills Indian Cav.
Maj. Arthur Carr Osburn RAMC
Lt. James Frederick Plunkett Royal Irish Reg.
Capt. Geoffrey Taunton Raikes South Wales Borderers
Australian Imperial Force
Lt.-Col. William Grant Australian Light Horse
Lt.-Col. Thomas John Todd Light Horse Reg.
Lt.-Col. Reginald John Albert Travers Inf.
Canadian Force
Lt.-Col. Denis Colburn Draper Mounted Rifles Battalion
Lt.-Col. John Mervyn Prower Inf.
Lt.-Col. John Munro Ross Inf.
Maj. Lawrence Vincent Moore Cosgrave Canadian Arty.
Lt.-Col. William Wasbrough Foster Canadian Inf.
Maj. George Waters MacLeod Canadian Inf.
Maj. Hugh Wilderspin Niven Canadian Inf.
New Zealand Force
Lt.-Col. George Augustus King Canterbury Reg.
Lt.-Col. Hugh Stewart Canterbury Reg.
Lt. Col. James Henry Whyte Wellington Mounted Rifles
Awarded a Second Bar to the Distinguished Service Order (DSO**)
Tmp Lt.-Cmdr. Arthur Holland Asquith Royal Naval Volunteer Reserve
Military Cross (MC)
Distinguished Conduct Medal (DCM)
C.S. Maj. S. Aberdeen, Durham Light Inf. (Durham)
C.S. Maj. D. Adair, East Yorkshire Reg. (Durham)
Sgt. A. L. Adams, Royal Engineers (Edinburgh)
Sgt. J. H. Adams, Royal Engineers (Brislington)
Sgt. J. Adamson, Yorkshire Reg. (East Ramton)
Dvr. H. F. Addington, Royal Field Arty. (Church Brampton, Northampton)
C.S. Maj. W. H. Albutt, Royal Welsh Fusiliers (Sparkbrook)
Sgt. F. G. Aldridge, Royal Engineers (Evesham, Worcester)
Petty Ofc. J. Allan, Royal Naval Volunteer Reserve (Annitsford)
Cpl. A. Allen, Royal Garrison Arty. (Belfast)
C.S. Maj. W. T. Alloway, Oxfordshire & Buckinghamshire Light Inf. (Marlow)
Pte. C. Andrews, Royal West Kent Reg. (Poplar, London)
Sgt. A. H. Annear, Royal Garrison Arty. (Plymouth, Devon)
Sgt. C. F. Ash, Royal Garrison Arty. (Chatham)
L. Cpl. H. P. Ashton, Royal Engineers (Moorhurst, Hamps.)
Sgt. W. Askew, King's Royal Rifle Corps (Kenilworth)
Gnr. C. H. G. Anthony, Royal Field Arty. (Aston, Birmingham)
C.Q.M.S. A. J. Appleby, Royal Engineers (Clapton Park)
Sgt. W. J. Avis, Machine Gun Corps (Lewes)
L. Cpl. J. F. Bagshaw, Royal Warwickshire Reg. (Walsall)
Cpl. G. Bailey, Royal Field Arty. (Bristol)
Sgt. F. J. Baker, Royal Field Arty. (Wdlworth)
C.S. Maj. H. T. Baldwin, Hampshire Reg. (Wimbledon, London)
Battery Sergeant Major J. H. Barlow, Royal Field Arty. (Woolwich)
Battery Sergeant Major J. Barnes, Royal Field Arty. (Ramsey, Huntingdon)
Pte. S. Barnes, Manchester Reg. (Oldham)
C.S. Maj. J. Barraclough, Yorkshire Light Inf. (Wakefield)
Capt. J. C. S. Barron, Royal Engineers (North Shields)
Act. C.S. Maj. J. Bartlett, Royal Sussex Reg. (Eastbourne)
Sgt. H. Barton, Royal Irish Fusiliers (Jerrettspas, Newry)
Cpl. J. S. Bastick, Norfolk Reg. (Bethnal Green, London)
Gnr. S. Bate, Royal Field Arty. (Hartlepool)
Sgt. J. Bates, Royal Inniskilling Fusiliers (Liemaskea, County Fermanagh)
Bombr. A. H. Baylis, Royal Field Arty. (Worcester)
C.S. Maj. J. Beaton, Scottish Rifles (Balmain, N.S.W.)
Pte. I. Beaty, Royal Scots (Manchester)
Sgt. W. Bee, Manchester Reg. (Harlesden, London)
Pte. J. Bell, West Riding Reg. (Greenfield)
Act. R.S. Maj. G. F. Bennett, Tank Ops (Leicester)
Pte. W. Bennett, Manchester Reg. (Handforth, Cheshire)
L. Sgt. M. Berkley, Cheshire Reg. (Hirst Ashington, Northumberland)
Sgt. J. Berwick, Border Reg. (Workingdon)
L. Sgt. A. Bickerstaffe, South Lancashire Reg. (St. Helens)
Cpl. F. Birch, Leicestershire Reg. (Hinckley, Leics.)
Gnr. E. Blackwood, Royal Garrison Arty. (Coatbridge)
C.Q.M.S. C. J. Bland, Middlesex Reg. (Upper Holloway, London)
Battery Sergeant Major A. J. Blowers, Royal Field Arty. (Lowestoft)
Battery Sergeant Major J. Blundell, Royal Garrison Arty. (Cork)
Bombr. H. Blythe, Royal Field Arty. (Mansfield, Notts)
Act. Bombr. S. A. Blythe, Royal Garrison Arty. (Melton, Norfolk)
Sgt. H. Bottomley, RAMC (Colchester)
Battery Sergeant Major J. T. Boughen, Royal Field Arty. (Netley)
Sgt. F. Bowcock, Royal Field Arty. (Leek, Staffs.)
2nd Cpl. F. Bownasa, Royal Engineers (E. Bradford)
Sgt. C. H. Boyle, Royal Garrison Arty. (Kingston Hill, Surrey)
L. Sgt. G. T. Boynes, North Lancashire Reg. (Preston)
Sgt. J. Bracegirdle, Royal Garrison Arty. (Carnarvon)
Sgt. S. Bradshaw, Manchester Reg. (Manchester)
Cpl. S. G. Brain, Royal Warwickshire Reg. (Banbury)
C.S. Maj. E. Brake, Somerset Light Inf. (Bath)
Gnr. W. Breakey, Tank Corps. (Edinburgh)
Sgt. H. G. Bridges, Royal Horse Arty. (St. Leonards-on-Sea)
C.S. Maj. E. J. Briffet, Royal Engineers (Bristol)
Act. Staff Sergeant A. Briggs, Army Ordnance Corps (Walworth)
Sgt. B. Briggs, Labour Corps. (Kennington Park, London)
Cpl. F. Briggs, North Lancashire Reg. (Bolton)
Cpl. of Horse W. H. E. Briton, Dragoon Guards (Hereford)
Cpl. A. T. Brooker, Royal Horse Arty.
Battery Sergeant Major F. A. Broomfield, Royal Field Arty. (Stratford, London)
C.S. Maj. A. Broomhead, Nottinghamshire and Derbyshire Reg. (Derby)
C.S. Maj. G. Browell, Northumberland Fusiliers (Newcastle)
Sgt. A. (Brown, York & Lancaster Reg. (Thurnscoe, near Barnsley)
Sgt. A. Brown, Royal Field Arty. (Padiham, Lancaster)
Sgt. J. Brown, Royal Engineers (Mulrkirk)
C.S. Maj. G. Brown, Norfolk Reg. (Thixendale, Malton, Yorkshire)
Cpl. G. D. Brown, King's Royal Rifle Corps (Newton, Yorkshire)
Cpl. W. Brunton, Royal Garrison Arty. (Edinburgh)
C.S. Maj. R. H. Bryan, Royal Warwickshire Reg. (Coventry)
Sgt. F. C. Bryson, Royal Garrison Arty. (Temple Ewell)
C.S. Maj. J. F. Buchanan, Gordon Highlanders (Aberdeen)
Sgt. E. Bullock, Machine Gun Corps (Broseley)
L. Cpl. L. J. Burden, Tank Corps. (Bridgtown)
Cpl. A. Burnett, Royal Field Arty. (Preston)
C.S. Maj. W. Burndge, Royal Welsh Fusiliers (Swansea)
Cpl. H. Burrows, Royal Garrison Arty. (North Waisliam)
Sgt. W. Burrows, Royal Field Arty. (Forest Gate)
Sgt. W. C. Burton, Royal Engineers (Hackney)
Cpl. A. C. Caiger, Oxfordshire & Buckinghamshire Light Inf. (Malvern)
Sgt. J. Cairney, Royal Engineers (Glasgow)
C.S. Maj. A. W. Calder, Seaforth Highlanders (Carr Bridge)
Far. Sergeant W. W. Canham, Royal Field Arty. (Kilkenny)
B.Q.M. Sgt. T. W. Carefoot, East Lancashire Reg. (Burnley)
Battery Sergeant Major J. Carlyle, Royal Field Arty. (Manchester)
Sgt. J. Carmichael, King's Own Scottish Borderers (Chorlton-cum-Hardy)
C.Q.M.S. W. H. Carnie, Welsh Reg. (Cardiff)
Sgt. J. Cassidy, West Yorkshire Reg. (Lincoln)
L. Sgt. L. Chalk, Northamptonshire Reg. (Abbot Langley)
Pte. E. Chambers, North Staffordshire Reg. (Cambefley, Surrey)
C.S. Maj. J. Chance, Worcestershire Reg. (Ryde, Isle of Wight)
C.S. Maj. G. Chandler, Leicestershire Reg. (Cheadle, Staffs.)
Sgt. T. Chapman, Lincolnshire Reg. (Hognaby, Spilsby)
Battery Sergeant Major G. Chappell, Royal Field Arty. (E. London)
Pte. H. Charlton, Nottinghamshire and Derbyshire Reg. (Awsworth)
Sgt. J. C. Charlton, Yorkshire Reg. (Middlesbrough)
C.Q.M.S. J. E. Cherry, East Lancashire Reg. (Colne)
L. Cpl. A. Chesters, Royal Lancaster Reg. (E. Lancaster)
Sgt. E. Chidgey, Royal Engineers (North Petherton)
Far. Q.M.S. W. A. Chmery, Royal Horse Arty. (Frimley, Surrey)
B.Q.M. Sgt. W. H. Christy, Manchester Reg. (Wigan)
Sgt. W. Chrystall, Royal Field Arty. (Aberdeen)
Sgt. W. Churchill, Northumberland Fusiliers (Wallsend)
Sgt. W. B. Churchman, Royal Engineers (College Park, London)
Act. Cpl. G. Clark, Royal Highlanders (Kirkcaldy)
L. Cpl. J. W. Clark, Durham Light Inf. (Easington Colliery)
L. Cpl. R. C. Clark, Royal Engineers (Leytonstone)
C.S. Maj. A. W. Clarke, Army Cyclist Corps (Basington)
Pte. W. L. Claydon, Royal West Surrey Reg. (Colchester)
Sgt. W. Clayton, Royal Garrison Arty. (Uxbridge)
Cpl. W. E. Clayton, Royal Garrison Arty. (Poplar, London)
Reg.al Q.M.S. J. H. Code, Manchester Reg. (Manchester)
C.S. Maj. W. Coldwell, Lincolnshire Reg. (Sheffield)
Sgt. A. J. Cole, Somerset Light Inf. (Henhin, near Bristol)
Sgt. A. Coles, South Wales Borderers (Withington Station, near Hereford)
R.S. Maj. J. T. Colver, Yorkshire Reg. (Leicester)
Pte. E. A. Comer, Dragoon Guards (Addlebourne)
Battery Sergeant Major H. F. Conway, Royal Field Arty. (Uxbridge)
C.S. Maj. J. B. Cook, Royal Lancaster Reg. (Walney)
Sgt. F. J. Cooper, East Surrey Reg. (Shoeburyness)
Sgt. J. Cooper, Gordon Highlanders (Glasgow)
Sgt. T. Cooper, Essex Reg. (Swaffam, Buibeck, Camb.)
C.S. Maj. E. Copping, Grenadier Guards (Clapham Junction)
Cpl. W. Cornell, Royal Field Arty. (Saffron Walden)
Sgt. W. H. Couldwell, Oxfordshire & Buckinghamshire Light Inf. (Reading)
Warrant Ofc. Class 2 W. J. Coward, Gloucestershire Reg. (Stroud, Glouc.)
Pte. J. Cowell, Welsh Reg. (Llandudno)
B.Q.M. Sgt. A. J. Cowley, Royal Field Arty. (Glanworth, County Cork)
Far. Staff Sergeant L. Crabtree, Royal Field Arty. (Exeter)
Sgt. J. Croft, Royal Irish Rifles (Dunmurry)
B.Q.M. Sgt. W. Crombie, King's Own Scottish Borderers (Carlow)
A. Bombardier A. W. Crook, Royal Garrison Arty. (Stamford)
Sgt. C. E. Crooks, Nottinghamshire and Derbyshire Reg. (Mansfield Woodhouse)
Sgt. J. W. Crosby, Royal Garrison Arty. (Wickford, Essex) Royal Marine Arty.
Cpl. F. Cross, Royal Marine Arty.
Cpl. C. H. Crowlie, Royal Field Arty. (Fulbam, London)
C.Q.M.S. G. Crump, Worcestershire Reg. (Worcester)
Sgt. W. Cryer, Lancashire Fusiliers (Facit, Lancaster)
Sgt. W. Cunniugton, Royal Field Arty. (Huddersfield)
C.S. Maj. F. Currey, Durham Light Inf. (Darlington)
B.Q.M. Sgt. J. Currie, Royal Garrison Arty. (Barrow-in-Furness)
C.S. Maj. G. Cuswoxth, West Yorkshire Reg. (Leeds)
Sgt. R. Cuthall, Royal Field Arty. (Arbroath)
C.S. Maj. W. F. Dachtier, London Reg. (London)
Battery Sergeant Major H. Daft, Royal Garrison Arty. (Clayton)
Battery Sergeant Major W. G. Dagg, Royal Field Arty. (Emsworth)
Sgt. J. Diare, South Wales Borderers (Llanhilleth, Mon.)
Act. R.S. Maj. P. Darroch, Royal Scots (Prestonpans)
Sgt. E. N. Davey, Royal Engineers (Wimbledon Park)
L. Sergeant H. V. Davey, Army Cyclist Corps (Hamworth)
Act. R.S. Maj. J. C. Davidge, Welsh Reg. (Abergavemiy)
2nd Cpl. J. H. Davies, Royal Engineers (Softball)
R.S. Maj. W. Davies, South Wales Borderers (Poanswick, Glouc.)
Pte. G. Davis, Border Reg. (Bishopstake)
Sgt. L. Dawe, Royal Field Arty. (Walthamstow)
Sgt. M. Dawes, Royal Field Arty. (Burnley)
Gnr. F. G. C. Dawson, Royal Garrison Arty. (Blackheath)
Battery Sergeant Major E. Day, Royal Horse Arty. (Great Staughton, near St. Neots)
Sgt. F. C. Debenham, Royal Field Arty. (Bergholt, near Colchester)
C.S. Maj. C. J. Deeprose, Royal Sussex Reg. (Rye)
L. Cpl. A. Devenish, Northumberland Fusiliers (Cornsay, County Durham)
C.S. Maj. E. Dickinson, Machine Gun Corps (Grimsby)
Sgt. F. Dickinson, Middlesex Reg. (Leith, Scotland)
Pte. M. Dixon, Shropshire Light Inf. (Gelli, Rhondda)
Cpl. Fitter, W. Dixon, Royal Field Arty. (Leeds)
L. Cpl. G. W. H. Dobson, Military Mounted Police (Whiteleafe, Surrey)
Sgt. G. Donaldson, Yorkshire Light Inf. (Milford)
Sgt. E. J. Donhou, Royal Engineers (Hanwell, London)
Sgt. J. Douglas, King's Own Scottish Borderers (Greenlaw)
Sgt. H. Driver, West Riding Reg. (Bingley)
Sgt. A. W. Duffield, Royal Garrison Arty. (Middlesbrough)
Pte. D1 Duncan, Royal Scots Fusiliers (Kilmarnock)
Cpl. F. Duncan, Royal Engineers (Tayport, Fife)
Battery Sergeant Major S. Eardley, Royal Garrison Arty. (Newcastle, Staffs.)
C.S. Maj. M. Earls, Welsh Reg. (Swansea)
Battery Sergeant Major F. W. Eastley, Royal Garrison Arty. (Southampton)
Cpl. O. J. Edwardes, Royal Engineers (Byfleet)
Battery Sergeant Major A. Elliott, Royal Field Arty. (Southampton)
L. Cpl. J. W. Elliott, Northumberland Fusiliers (Darlington)
Sgt. P. G. Elpiuck, Royal Sussex Reg. (Newick)
C.S. Maj. F. Emmott, Machine Gun Corps (Leeds)
L. Cpl. W. Etchells, Manchester Reg. (Manchester)
Sgt. A.H Evans, Welsh Guards (Marshfield, near Cardiff)
Mechanist Sergeant Major G. A. L. Evans, Army Service Corps (East London)
Sgt. H. V. Evans, West Yorkshire Reg. (Stoke, Staffs.)
Gnr. T. Evans, Royal Horse Arty. (Barnfurlong, near Wigan)
Act. Bombr. H. Eyre, Royal Field Arty. (Chesterfield)
Sgt. A. Falconer, Machine Gun Company (Walthamstow)
Battery Sergeant Major F. Farlie, Royal Horse Arty. (Plumstead)
Sgt. P. Fiarrell, Manchester Reg. (Huddersfield)
Sgt. G. Feast, South Wales Borderers (Eastney, Portsmouth)
Sgt. W. R. Feaver, Middlesex Reg. (Marden, Kent)
Spr. W. J. Feman, Royal Engineers (Liverpool)
C.S. Maj. A. Ferrier, Royal Highlanders (Perth)
Cpl. F. S. Fisher, Royal Field Arty. (Netley, Hamps.)
Sgt. J. Fletcher, Royal Garrison Arty. (Oxford)
C.S. Maj. R. Fletcher, Northumberland Fusiliers (Walker-on-Tyne)
Sgt. J. Flett, Argyll and Sutherland Highlanders (Greenock)
Sgt. W. Flynn, Lancashire Fusiliers (Salford)
R.S. Maj. J. H. Foley, Royal Warwickshire Reg. (Barmingham)
Cpl. C. Ford, Scottish Rifles (Hamilton)
Act. Cpl. F. Forster, Middlesex Reg. (Heaton Bark, Manchester)
Battery Sergeant Major J. W. Foster, Royal Field Arty. (Hull)
Sgt. G. Fowler, North Lancashire Reg. (Dartford, Kent)
Sgt. W. Fraser, Highland Light Inf. (Glasgow)
Pte. E. P. Freeman, Coldstream Guards (Goswell-road, London, EC)
Cpl. C. J. French, Royal Flying Corps (Watford, Herts.)
L. Cpl. R. H. Froude, Royal Engineers (Curraghmore, County Waterford)
Sgt. W. H. Fryer, Machine Gun Corps (Paddington)
Sgt. E. W. Fulford, Royal Engineers (Bedford)
L. Cpl. E. Gaddes, Lancashire Fusiliers (Longtown)
Sgt. J. Galvin, Royal Garrison Arty. (Cork)
Sgt. L. Galvin, West Riding Reg. (Marlborough)
Cpl. G. C. Gane, Somerset Light Inf. (Shepton Mallet)
Cpl. A. Gardner, Royal Scots (Irlam o' th' Heights, Lancaster)
Siapr W. T. Garner, Royal Engineers (Blefaohley)
Sgt. P. Garrod, Royal Fusiliers (Stevenage)
Pte. J. Geoghan, Lancashire Fusiliers (E. West Hartlepool)
Sgt. F. Gibbs, Royal Welsh Fusiliers (Birmingham)
Sgt. C. E. Gillott, Royal Engineers (Sheffield)
Sgt. W. Gilmore, Northumberland Fusiliers (Hull)
2nd Cpl. G. A. Glover, Royal Engineers (Paddington)
Sgt. F. Godley, King's Royal Rifle Corps (Whitwell, Derby)
Battery Sergeant Major P. F. Golding, Royal Garrison Arty. (Kensington)
Sgt. A. T. Goodey, South Staffordshire Reg. (Clapham Common, London)
Sgt. M. Goodwin, Lancashire Fusiliers (Winton Pairieroft)
Sgt. W. J. Goodwin, Rifle Brigade (Brightlingsea)
Sgt. E. Gordon, Royal Engineers (S.R) (Newton-le-Willows, Lancaster)
Cpl. J. Gorman, Royal Engineers (Liverpool)
Sgt. H. Gouldthorpe, Lincolnshire Reg. (Barton-on-Humber)
Pte. J. H. Govan, Scots Guards (Prestonkirk, E. Lothian)
Dvr. C. S. Gowing, Royal Garrison Arty. (Close, near Bristol)
Sgt. W. M. Graham, Royal Garrison Arty. (Peckham)
C.S. Maj. G. R. Graves, Machine Gun Company (Ashted, Birmingham)
Battery Sergeant Major P. E. Gray, Royal Field Arty. (Leicester)
Lance Seaman D. H. Green, Royal Naval Volunteer Reserve (Falkirk)
Cpl. G. H. Green, Royal Field Arty. (Tideswell)
L. Sgt. E. Grey, Welsh Reg. (Swansea)
Sgt. R. A. B. Griffiths, Royal Garrison Arty. (Blackburn)
Sgt. S. Grover, Welsh Reg. (Poitslade)
C.S. Maj. H. R. Groves, East Lancashire Reg. (Poplar, London)
C.Q.M.S. H. Haigh, West Riding Reg. (Greetland, Yorkshire)
Pte. H. Haigh, West Riding Reg. (Lindley, Haddersfield)
Sadd. Staff Sergeant A. Hall, Royal Field Arty. (Brighton)
Sgt. A. E. Hall, Royal Garrison Arty. (Old Walsoken)
Sgt. E. Hall, Middlesex Reg. (Preston, Lancaster)
C.S. Maj. E. W. Hall, Machine Gun Corps (Norwich)
Cpl. L. Hall, West Riding Reg. Stalybridge)
Sgt. S. E. Hall, King's Own Scottish Borderers (Cockerham)
Ftr Cpl. P. Hampson, Royal Garrison Arty. (Birmingham)
C.S. Maj. R. Hanley, Rifle Brigade (Virginia Water)
Spr. J. Hannah, Royal Engineers (Clydeburgh)
C.Q.M.S. G. Hardie, Royal Engineers (Glasgow)
Gnr. C. Harding, Royal Field Arty. (Cardiff)
Gnr. E. Hardman, Royal Garrison Arty. (Waterfoot)
Sgt. P. Hardy, Royal Engineers (Durham)
Cpl. W. H. Harris, Royal Garrison Arty. (Grosvenorroad, London)
Spr. R. G. Harrison, Royal Engineers (Notting Hill)
Sgt. J. R. Harrop, Nottinghamshire and Derbyshire Reg. (Worksop)
Battery Sergeant Major J. Hart, Royal Field Arty. (Hebburn)
C.Q.M.S. C. Hartley, West Yorkshire Reg. (Keighley)
Gnr. M. Hartley, Royal Garrison Arty. (Burnley)
Sgt. A. R. Hervey-Bathurst, Royal Flying Corps (London)
C.Q.M.S. S. M. Haydon, Royal West Kent Reg. (Sandwich)
Sgt. F. J. Haynes, Lancashire Fusiliers (Openshaw, Manchester)
Sgt. J. H. Heath, Middlesex Reg. (Hove, Brighton)
Battery Sergeant Major W. Heath Royal Garrison Arty. (Woodford, Essex)
C.S. Maj. J. Helhwell, Yorkshire Light Inf. (Pontefract)
Dvr. H. Henthorne, Royal Field Arty. (Oldham)
L. Cpl. W. J. Herring, King's Royal Rifle Corps (King's Cross, London)
Sgt. H. E. Hibbard, Honourable Arty. Company (Stoke Newington)
Pte. C. H. Hill, East Lancashire Reg. (Barlowford, Nelson)
Sgt. W. Hill, North Staffordshire Reg. (Wooton, Staffs.)
C.S. Maj. F. Hillier, South Wales Borderers (Newport)
Act. Cpl. G. Hnidle (Preston)
C.S. Maj. A. G. Hiron, London Reg. (Limehouse, London)
Sgt. H. Hirst, West Riding Reg. (Batley)
Dvr. A. G. Hobbs, Royal Field Arty. (Birmingham)
B.Q.M. Sgt. A. Hodgson, Northumberland Fusiliers (Annfield Plain, County Durham)
Sgt. W. W. Hogben, Royal Welsh Fusiliers (Portsmouth)
Sgt. J. Holbrook, Manchester Reg. (Manchester)
Sgt. F. Holliday, Royal Garrison Arty. (Cottingliam)
Act. Battery Sergeant Major Major E. Hollidge, Royal Field Arty. (Upper Tooting)
Sgt. A. E. Holmes, Royal Irish Rifles (Carrickfergus)
L. Cpl. B. Holmes, Royal Warwickshire Reg. (Rugby)
Sgt. F. G. Holmes, Hussars (Candahar Barracks, Tidworth)
C.Q.M.S. F. Holt, Royal Engineers (Wmnick, Northants)
Sgt. J. Holton, Royal Irish Fusiliers (Clonaslea, Queens County)
Sgt. J. Hook, Durham Light Inf. (Durham)
Spr. J. W. Howarth, Royal Engineers (Bolton)
Battery Sergeant Major G. Howell, Royal Field Arty. (Blakeley)
C.S. Maj. W. Howes, Durham Light Inf. (Stockton, Durham)
Dvr. F. T. Howitt, Royal Field Arty. (Aberdeen)
Tmp R.S. Maj. R. A. Hoyle, Lancashire Fusiliers (Bury)
Pte. A. H. Hudson, Royal Warwickshire Reg. (Coventry)
C.S. Maj. R. Hudson, Yorkshire Light Inf. (Normanton)
Pte. J. Hughes, RAMC (Manchester)
Sgt. T. Hughes, Royal Garrison Arty. (Sheerness, Kent)
Sgt. J. E. Humphreys, Royal Field Arty. (Tunstall, Staffs.)
Act. Sgt. G. W. Hunt, Nottinghamshire and Derbyshire Reg. (Nottingham)
Battery Sergeant Major J. Hunt, Royal Garrison Arty. (Higher Broughton, Manchester)
Spr. J. Hunt, Royal Engineers (High Wycombe)
L. Cpl. D. Hunter, Yorkshire Reg. (Bradford)
C.S. Maj. B. H. D. Hurst, Royal Engineers (Bath)
Sgt. E. Hutchms, Machine Gun Corps (Manchester)
Battery Sergeant Major J. C. Ihffe, Royal Garrison Arty. (Wakefield)
Act. C.S. Maj. E. Irving, Coldstream Guards (Walworth, London)
C.Q.M.S. G. Irving, Border Reg. (Waberthwaite)
C.Q.M.S. J. Jacks, Royal Munster Fusiliers (Leeds)
Sgt. J. J. Jackson, Yorkshire Reg. (Stockton-on-Tees)
C.S. Maj. T. Jackson, Machine Gun Corps (Birmingham)
L. Cpl. W. C. Jacobs, Royal Warwickshire Reg. (Stow-on-the-Wold)
Pte. E. Jaoobson, Monmouthshire Reg. (Bristol)
C.S. Maj. G. Jaggs, Essex Reg. (Boxted, near Colchester)
C.S. Maj. A. Jenkins, Worcestershire Reg. (Worcester)
C.S. Maj. E. H. Johns, Royal Engineers (Norwich)
Sgt. E. A. Johnson, Royal Garrison Arty. (Walthamstow)
Cpl. F. W. Johnson, Royal Engineers (Mildmay Park, London)
Pte. T. Johnson, Rifle Brigade (Stockton)
Sgt. S. Johnstone, Scottish Rifles (Whiteinch)
Sgt. A. Jones, Royal Welsh Fusiliers (Wrexham)
Sgt. A. Jones, Machine Gun Corps (Stoke-under-Ham)
L. Cpl. . G. Jones, Duke of Cornwall's Light Inf. (Plaistow)
L. Cpl. J. Jones, Manchester Reg. (Henfeod, S. Wales)
Cpl. J. P. Jones, Royal Garrison Arty. (Birmingham)
R.S. Maj. J. R. Jones Royal Welsh Fusiliers (Straff ord)
Spr. R. Jones, Royal Engineers (Merioneth)
Act. Staff Sergeant S. Jones, Army Ordnance Corps (Birmingham)
Cpl. T. Jones, West Yorkshire Reg. (Bradford)
Sgt. W. Jones, Machine Gun Corps (Bermondsey, London)
Sqn. S. M. H. Jordison (Northampton)
C.S. Maj. J. Joshua, Welsh Reg. (Maesteg
Sgt. J. W. Judd, Middlesex Reg. (Kingston upon Thames)
C.S. Maj. H. Julsing, Northumberland Fusiliers (Newcastle upon Tyne)
C.S. Maj. J. Kellock, Highland Light Inf. (Glasgow)
Pte. A. Kelly, Manchester Reg. (Manchester)
Pte. E. Kelly, Royal Dublin Fusiliers (Fencehouses, Durham)
Sgt. J. Kelly, Royal Garrison Arty. (Cork)
Sgt. J. S. Kelly, Seaforth Highlanders (Springburn, Glasgow)
Sgt. H. Kendal, Royal Engineers (Bradford)
Sgt. A. Kendall, Royal Garrison Arty. (Brixton)
Battery Sergeant Major C. A. Kendall, Royal Field Arty. (Ilford)
Battery Sergeant Major J. Kennelly, Royal Garrison Arty. (Edinburgh)
Sgt. H. Kent, Royal Garrison Arty. (Malmesbury, Wiltshire)
Pte. A. Kerr, Royal Scots Fusiliers (E. Dumbarton)
Dvr. H. Kirby, Royal Field Arty. (Woodville Derby)
Cpl. H. S. Kirk, Highland Light Inf. (Whiteinch, Glasgow)
Battery Sergeant Major F. A. J. Knight, Royal Field Arty. (Bristol)
L. Cpl. J. W. Knight, Royal Engineers (Southampton)
Cpl. C. Knowles, Duke of Cornwall's Light Inf. (Victoria Park)
L. Cpl. W. Knowlson, West Yorkshire Reg. (Leeds)
Q.M.S. W. Lamkin, RAMC (Ventnor, Isle of Wight)
Fitter Sergeant T. Lancaster, Royal Field Arty. (Workington, Cumberland)
Sgt. J. R. Lang, Shropshire Light Inf. (Edgwareroad, London)
C.S. Maj. E. Langley, Lancashire Fusiliers (Chadderton)
C.Q.M.S. W. T. Large, Cheshire Reg. (Northwich)
C.S. Maj. H. Larkman (Norwich)
C.S. Maj. A. Laurence, Nottinghamshire and Derbyshire Reg. (E. Derby)
L. Cpl. L. C. G. T. Lawford, Mil. Police (Keyhaven, near Lymington, Hampshire)
Spr. R. Lawson, Royal Engineers (Glasgow)
R.S. Maj. O. Lead, North Staffordshire Reg. (Wolstanton, Staffs.)
Sgt. J. W. Leamon, Hampshire Reg. (Woolwich)
Sgt. E. Ledgard, West Yorkshire Reg. (York)
Sgt. S. G. Lee, West Riding Reg. (Marsh, Huddersfield)
Q.M.S. R. G. Leggett, RAMC (Aldershot)
L. Cpl. M. Lennard, Northumberland Fusiliers (Burnhope Co Durham)
Pte. W. Lennon, Lancashire Fusiliers (Piestwick)
Pte. J. Leverton, Duke of Cornwall's Light Inf. (St. Columb, Cornwall)
Pte. J. Lifford, Liverpool Reg. (Fulham)
Sgt. E. Lilley, King's Royal Rifle Corps (New Nuttall, Nottinghamshire)
Sgt. J. S. Lindsay, Army Cyclist Corps (Auchenairn, Bishopbriggs)
Sgt. A. P. Lincoln, Royal Field Arty. (Greater Yarmouth)
Pte. W. C. T. Lloyd, Royal Welsh Fusiliers (Holywell)
R.S. Maj. G. Lockie, South Wales Borderers (Farringdon Rd., London)
Sgt. E. E. Loosemore, Royal Engineers (Bournemouth)
Sgt. J. F. Love, Royal Field Arty. (Parkstone, Dorset)
Cpl. C. E. Lowe, Royal West Surrey Reg. (Barkingside, London)
Cpl. A. G. Ludlow, Royal Fusiliers (Tottenham)
Bombr. W. G. Mabbutt, Headquarters, Royal Field Arty. (Shipston-on-Stour)
Act. Sgt. A. Macaulay, Machine Gun Company (Peith)
Pte. C. E. V. Macdonald, Cav. S.R. (Fort Rose, Ross-shire)
C.S. Maj. B. Maddock, Nottinghamshire and Derbyshire Reg. (Repton, Derby.)
Sgt. A. Macdonald, Seaforth Highlanders (Alness)
C.S. Maj. W. Hackerell, Royal Engineers (Norwich)
Sgt. W. R. MacQueen, Machine Gun Corps (E. London)
Sgt. G. W. Marriott, Royal Field Arty. (Homerton, London)
Sgt. E. Marritt, East Yorkshire Reg. (Hull)
Sgt. H. G. Marsh, Royal West Kent Reg. (Deal)
Act. B.Q.M. Sgt. D. Marshall, Royal Field Arty. (Blackpool)
Sgt. L. T. Marson, Military Mounted Police (Biggleswade, Bedford)
Sgt. J. Martin, Royal Field Arty. (Streatham Hill)
C.S. Maj. J. Martin, Lancashire Fusiliers (Manchester)
Cpl. T. Martin, Royal Engineers (West Hartlepool)
R.S. Maj. B. H. Mathews, Cambridgeshire Reg. (Cambridge)
Gnr. T. C. Matthews, Royal Horse Arty.
Sgt. J. H. Mason, Royal Garrison Arty. (Birkenhead)
Sgt. W. E. Mawbey, Machine Gun Corps (Pimlico, London)
Cpl. R. May, Manchester Reg.
Fitter Sergeant R. Maynard, Royal Field Arty. (Camborne, Cornwall)
C.S. Maj. S. Mayers, Machine Gun Corps (Newport, Isle of Wight)
Sgt. P. McAleavey, Royal Field Arty. (Cleator Moor, Whitehaven)
Cpl. J. McAllister, Royal Engineers (Stirlingshire)
Sgt. D. McAlpine, Highland Light Inf. (Partick/Glasgow)
Pte. F. McCann, Royal West Surrey Reg. (Hammersmith)
Sgt. J. McCarthy, Leinster Reg. (Cork)
Sgt. T. McClure, Royal Garrison Arty. (Thornastown, County Kilkenny)
C.S. Maj. A. A. McDonald, Royal Engineers (Highams Park)
C.S. Maj. J. McDonald, Argyll and Sutherland Highlanders (Argyllshire)
L. Cpl. H. McCann, Royal Engineers (Glasgow)
Pte. J. McEwan, Gordon Highlanders (Dumfries)
Sgt. D. A. McFarlane, Welsh Reg. (Canada)
R.S. Maj. E. McGarry, Lancashire Fusiliers (Oldham)
Act. Bdr E. McGinms, Royal Field Arty. (Springburn, Glasgow)
Sgt. O. McGuinness, Irish Guards (Edgwareroad, London)
Sgt. S. McInnes, Royal Engineers (Thomaby)
C.S. Maj. J. McIntosh, Highland Light Inf. (Newton Grange)
Sgt. S. McIntyre, Royal Garrison Arty. (Millport)
Sgt. W. McKeown, Machine Gun Corps (Glasgow)
Sgt. J. McKintosh, Gordon Highlanders (Aberdeen)
R.S. Maj. J. McLean, Royal Scots Fusiliers (Aberdeen)
Sgt. T. McLeod, Northumberland Fusiliers (Achington)
Sgt. E. McNary, Royal Field Arty. (Wexford)
Staff Sergeant T. McNicol, RAMC (Derby)
Battery Sergeant Major H. Meathrel, Royal Horse Arty. (Devon)
Battery Sergeant Major G. Menzies, Royal Garrison Arty. (Dumbarton)
B.Q.M. Sgt. F. J. Mersh, Hatnps. R. Anerley, London)
Sgt. E. Miles, Royal Engineers (Pontyffym)
C.S. Maj. S. Mills, Worcestershire Reg. (Dudley)
Sgt. C. R. Milton, Scottish Rifles (Ramsgate)
C.S. Maj. R. M. Mitchell, Royal Highlanders (Perth)
Sgt. W. Mitchell, Cameron Highlanders (Taynuilt, Argyll)
Sgt. F. Moles, Machine Gun Corps (New Southgate, London)
Sgt. J. Moody, Machine Gun Corps (Newcastle)
Sgt. J. H. Moody, Rifle Brigade (Rochdale)
Sgt. J. Mooney, King's Own Scottish Borderers (Johnstone)
Sgt. A. T. Moore, Essex Reg. (Leyton)
Pte. F. Moore, Royal Dublin Fusiliers
Cpl. J. Moran, RAMC (Longsight, Manchester)
Cpl. J. F. Morgan, Liverpool Reg. (Liverpool)
Sgt. E. Morris, Lancashire Fusiliers (Higher Ince, Wigan)
Sgt. S. Morris, Royal Engineers (Stafford)
C.S. Maj. G. Moss, Manchester Reg. (Leigh)
Sgt. J. E. Moss, Liverpool Reg. (Liverpool)
Cpl. W. G. Mould, Lancers (Aberaman)
Sgt. W. J. Mulrooney, Royal Engineers (Stoke-on-Trent)
Gnr. F. Munday, Royal Garrison Arty. (Woking)
Battery Sergeant Major J. Munn, Royal Garrison Arty. (Southend)
B.Q.M. Sgt. Major P. S. Munro, Seaforth Highlanders (Edinburgh)
C.S. Maj. F. G. Murphy, Lancashire Fusiliers (Bury)
C.S. Maj. G. Murphy, Labour Corps (Birmingham)
Spr. A. J. Murray, Royal Engineers (Bristol)
Sgt. J. L. Murray, Royal Engineers (Chelsea)
C.S. Maj. H. J. S. Neate, Royal Engineers (Southsea)
Sgt. E. G. Newman, Royal Field Arty. (Boio Green, Kent)
C.S. Maj. T. P. Newman, Royal West Surrey Reg.
C.S. Maj. M. Newton, Royal Lancaster Reg. (Broughton-in-Furness)
C.S. Maj. J. Nicholson, Royal Irish Rifles (Carrickfergus)
Sgt. A. Nickson, North Lancashire Reg. (Preston, Lancaster)
C.S. Maj. J. Norns, Hampshire Reg. (Martyr Worthy, near Winchester)
C.S. Maj. J. O'Brien, Royal Fusiliers (Moirtlake)
Pte. J. Odell, Seaforth Highlanders (Amptjnll)
C.S. Maj. A. O'Nious, South Lancashire Reg. (Douglas, Isle of Man)
Sgt. B. St. C. Owen, Royal Engineers (Bristol)
C.S. Maj. G. Owens, Royal Welsh Fusiliers (Wrexham)
Act. Staff Sergeant H. Owen, Army Ordnance Corps (Bolton)
C.S. Maj. C. E. W. Parish, Machine Gun Corps (Brecon)
Battery Sergeant Major A. Parker, Royal Field Arty. (Clonmel)
C.S. Maj. W. B. Parker, Durham Light Inf. (Bishopwearmouth)
Sgt. W. W. Pass, East Kent Reg. (Darlaston, Staffs.)
C.S. Maj. J. B. Pearce, Royal Engineers (Ilford)
Pte. P. Pearson, Royal Dublin Fusiliers (Dublin)
Sgt. E. Pegg, North Staffordshire Reg. (Fenton, Staffs.)
C.Q.M.S. L. Pegg, Lancashire Fusiliers (Salford)
Pte. H. R. Penan, Machine Gun Corps (Romford, London)
Sgt. W. G. Perkins, Royal Field Arty. (Bristol)
Tmp Staff Sergeant Major J. Peiks, Army Service Corps (Henley-n-Arden)
Cpl. S. Petty, Royal Engineers (Hanogale)
Sgt. J. Phillips, Northumberland Fusiliers (Seaton DeLaval)
Bombr. P. W. Phillips, Royal Garrison Arty. (Walton, Radnorshire)
Cpl. H. O. Pike, Nottinghamshire and Derbyshire Reg. (Manchester)
Sgt. W. Pilkington, East Lancashire Reg. (Accrington)
Sgt. H. Pinder, Royal Engineers (Darwen)
C.S. Maj. E. Pink, Essex Reg. (Enfield)
C.S. Maj. C. B. Plenderleith, Royal Warwickshire Reg. (Birmingham)
L. Cpl. P. Pocock, Military Mounted Police (Edenbridge, Kent)
B.Q.M. Sgt. J. H. Poste, Royal Warwickshire Reg. (Birmingham)
Sgt. H. W. Potter, Manchester Reg. (Fliston)
L. Sgt. J. TPotter, South Lancashire Reg. (St. Helens)
R.S. Maj. W. J. Potter, Manchester Reg. (E. Woolwich)
Sgt. A. Price, Royal Garrison Arty. (Caversham, Oxon.)
Sgt. J. Price, South Lancashire Reg. (Warrington)
Sgt. W. Price, RAMC (Brookend, Glouc.)
Cpl. E. Proctor, Liverpool Reg. (Milnthorpe)
C.S. Maj. Puchas, South Staffordshire Reg. (Brownhills, near Walsall)
C.S. Maj. H. Pugh, Liverpool Reg. (Sandhurst, Cheshire)
R.S. Maj. G. Pullan, Northumberland Fusiliers (Farnley)
2nd Cpl. C. Purdy, Royal Engineers (Langley Hill, Derby)
Battery Sergeant Major W. J. Pye, Royal Field Arty. (Colchester)
Sgt. J. Rands, Royal Field Arty. (Sheffield)
Gnr. A. H. Rankin, Royal Garrison Arty. (Thornhill)
Sgt. W. Banner, Essex Reg. (Southend)
B.Q.M. Sgt. C. Ratcliffe, Royal Field Arty. (Leek, Staffs.)
Pte. W. J. Rawlings, Duke of Cornwall's Light Inf. (St. Austell)
Cpl. F. Read, Royal Engineers (Chippenham)
B.Q.M. Sgt. A. H. Reed, Royal Field Arty. (Lowe-Clapton, London)
Sgt. J. Reeves, Royal Garrison Arty. (Brixton, London)
Sgt. W. Revell, Leicestershire Reg. (Bavenstone, Leics.)
C.S. Maj. W. H. Ricketts, South Wales Borderers (Pontypool)
Bin. A. Richards, King's Royal Rifle Corps (Southampton)
Sgt. D. Richards, Labour Corps (Egremont)
Sgt. W. J. Richards, North Staffordshire Reg. (Rugeley)
Sgt. A. Richardson, Coldstream Guards (Birmingham)
C.S. Maj. C. W. Richardson, Northumberland Fusiliers (Newcastle)
Sgt. G. Richardson, Machine Gun Corps (Ipswich)
Sgt. H. Rider, Royal Field Arty. (Sheffield)
Sgt. S. L. Ridgway, West Riding Reg. (Hadfield, Glossop)
Sgt. G. W. Ridyard, Lancashire Fusiliers (Hightown)
Battery Sergeant Major A. Rimmer, Royal Field Arty. (St. Helens)
Sgt. A. Roberts, Yorkshire Light Inf. (Sheffield)
Sgt. J. Roberts, Monmouthshire Reg. (Talywain, Poratypool, Mon.)
C.S. Maj. W. J. Roberts, Manchester Reg. (Manchester)
Sgt. D. Robertson, Tank Corps (Aberfeldy)
Sgt. W. E. Robertson, Royal Marine Field Arty. (Carlisle)
Act. C.S. Maj. F. Robinson Tank Corps (Bridlington)
Sgt. T. Robinson, Durham Light Inf. (Durham)
Rfn. A. Roe, King's Royal Rifle Corps (Balderton, Newark)
2nd Cpl. J. Rogers, Royal Engineers (Todmorden)
Cpl. S. Rogers, Royal Field Arty. (Wealdstone)
Sgt. H. Rollinson, South Staffordshire Reg. (Bilston, Staffs.)
Sgt. E. A. Rose, Royal Engineers (Thornton Heath)
C.S. Maj. R. Rowan, Highland Light Inf. (Glasgow)
Cpl. W. Rowe, Mil Mounted Police (Castleford, Yorkshire)
Gnr. F. H. Rundle, Royal Garrison Arty. (Plymouth)
Sgt. S. Russell, East Yorkshire Reg. (Elloughton, near Brough, Yorkshire)
C.Q.M.S. S. Salmon, Monmouthshire Reg. (Hammersmith)
Gnr. J. J. Salkeld, Royal Garrison Arty. (Cockermouth)
B.Q.M. Sgt. G. Samson, Worcestershire Reg. (Worcester)
C.S. Maj. F. Sanditson, Royal Fusiliers (Twickenham)
C.S. Maj. A. H. Sands, Royal Marine Light Inf. (Storehouse, Plymouth)
Cpl. J. W. Savage, Royal Engineers (Birmingham)
Cpl. J. W. Savin, Royal Field Arty. (Sedgley, near Dudley)
L. Cpl. J. Scott, Royal Engineers (Liverpool)
C.S. Maj. R. Scott, Middlesex Reg. (Stroud Green, London)
Sgt. H. Scrimshaw, Nottinghamshire and Derbyshire Reg. (Mansfield)
C.Q.M.S. M. A. Searle, Highland Light Inf. (Worrnit, Fifeshire)
C.S. Maj., S. Searle, South Wales Borderers (Peckham, London)
Cpl. E. Seed, Lancashire Fusiliers (Blackburn)
Sgt. J. Seton, Argyll and Sutherland Highlanders (Glasgow)
Sgt. C. J. Shale, Duke of Cornwall's Light Inf. (Coventry)
Cpl. Shoeing-Smith J. Sharp, Royal Field Arty. (Kilmarnock)
Sgt. H. Shaw, Royal Engineers (Musselburgh)
Fitter J. A. Shearer, Royal Field Arty. (Glasgow)
Sgt. F. J. Sheldon, Royal Garrison Arty. (Croydon)
Sgt. J. Shimmings, Coldstream Guards (Holsworthy, Devon.)
Petty Ofc. H. J. Simon, Royal Naval Volunteer Reserve (Hurst, Bixley)
Pte. W. Simpson, Northumberland Fusiliers (West Sleekburn, Bedlington)
B.Q.M. Sgt. R. Sinclair, Royal Garrison Arty. (Leith)
Cpl. H. Singleton, Royal Horse Arty. (Manchester)
Gnr. J. J. R. Singleton, Royal Garrison Arty. (Manchester)
Cpl. S. C. Sircombe, Royal Engineers (Bristol)
Pte. G. Slater, Dragoon Guards (Wmsford)
C.S. Maj. T. W. Slater, Nottinghamshire and Derbyshire Reg. (Matlock, Bath)
Spr. P. A. Sly, Royal Engineers (Sheale)
Sgt. Major H. Smart, Yorkshire Light Inf. (Worcestershire)
Cpl. A. G. Smith, Royal Warwickshire Reg. (Birmingham)
Sgt. A. S. Smith, Royal Field Arty. (Notting Hill Gate)
R.S. Maj. G. F. W. Smith, Dragoon Guards (Battersea)
Cpl. J. H. Smith, Royal Engineers (Peterborough)
Bombr. L. E. Smith, Royal Garrison Arty. (Hanworth)
Act. Cpl. R. Smith, Royal Scots (Armadale)
C.S. Maj. W. Smith, Gordon Highlanders (Clydebank, Glasgow)
Cpl. W. Smith, Royal Engineers (Newport, Mon.)
Sgt. J. V. Solari, Nottinghamshire and Derbyshire Reg., attd. Machine Gun Corps
Sgt. A. Speake, Welsh Reg. (Trealaw)
C.S. Maj. C. Spence, West Yorkshire Reg. (Leeds)
Cpl. C. Spivey, Yorkshire Reg. (Pocklington)
Sgt. E. J. Spriggs, Royal Engineers (Burnham, Somerset)
C.S. Maj. S. Sole, Leicestershire Reg. (Leicester)
Battery Sergeant Major N. F. Spratley, Royal Garrison Arty. (Paddington, London)
Battery Sergeant Major A. Sprott, Royal Field Arty. (Glasgow)
Bombr. W. E. Stay, Royal Garrison Arty. (Rugby)
Sgt. L. Stewart, Royal Field Arty. (Stony Stratford)
Gnr. D. B. Stirling, Machine Gun Corps (Arclgour Wish aw)
2nd Cpl. C. M. Stone, Royal Engineers (Seaford)
C.Q.M.S. R. V. Stone, Royal Engineers (Birmingham)
C.S. Maj. T. A. Stuart, Lincolnshire Reg. (Ashton-under-Lyne)
Cpl. J. Swift, Machine Gun Corps (Wimbledon, Liondon)
L. Cpl. H. Sykes, Yorkshire Light Inf. (Batley)
C.S. Maj. T. Sykes, Yorkshire Light Inf. (Leeds)
Sgt. C. R. Taylor, Royal Garrison Arty. (Highgate Road)
C.Q.M.S. T. Templeton, Royal Engineers (Glengarnock, Ayr)
C.S. Maj. F. A. Terrill, Royal Engineers (Wealds)
Sgt. H. W. Terry, Royal West Kent Reg. (Sevenoaks)
C.S. Maj. W. R. Thomas, Scottish Rifles (Battersea)
Cpl. H. Thompson, Royal Garrison Arty. (Liverpool)
B.Q.M. Sgt.A. C. Thorpe, Royal Field Arty. (Petersfield)
Cpl. C. V. Tighe, Middlesex Reg. (Walthamstow, Essex)
Sgt. W. Timility, Lancashire Fusiliers (Seedley Manchester)
Pte. C. E. Torr, West Yorkshire Reg. (Rotherham)
C.S. Maj. J. R. Tose, West Yorkshire Reg. (York)
B.Q.M. Sgt. P. W. Tranter, Royal Field Arty. (Carlow)
Cpl. A. Travi, Middlesex Reg. (Islington)
Sgt. P. W. Treacher, Royal Garrison Arty. (New-Maiden)
Pte. T. H. Tregunna, Welsh Reg. (Swansea)
Sgt. W. H. Trim, Royal Garrison Arty. (Lambeth)
Sgt. W. G. Trindef, Royal Berkshire Reg. (Windsor)
Sgt. H. Troke, Royal Engineers (Bournemouth)
Sgt. J. W. Trotter, Durham Light Inf. (Durham)
Sgt. F. H. TVyman, North Staffordshire Reg. (Abergavenny)
R.S. Maj. T. G. Upton, Hussars (Preston, Lancaster)
Sgt. A. Utton, East Yorkshire Reg. (Hull)
Sgt. G. Veitch, Machine Gun Corps (Edinburgh)
Sgt. H. C. Vmer, Somerset Light Inf. (London)
Act. Colour Sergeant G. Vyse, East Yorkshire Reg.
Cpl. -Sergeant A. Waddell, Argyll and Sutherland Highlanders (Bothkennar, Stirlingshire)
Gnr. M. J. Wagner, Royal Field Arty. (Liverpool)
C.S. Maj. C. F. Walker, Bedfordshire Reg. (Hitchin)
C.S. Maj. J. Wallis, Lincolnshire Reg. (Grimsby)
Sgt. G. Walmesley, Machine Gun Corps (Bradford)
Sgt. J. Wareing, North Lancashire Reg. (Bolton)
Cpl. E. J.Warwick, Royal Engineers (Pontycymmer)
Sgt. J. A. Wassell, Royal Engineers (Fareham, Hampshire)
Sgt. J. Waters, Northumberland Fusiliers (Gosforth)
Pte. G. Watson, Scots Guards (Kirkonhill-by-Montrose)
Sgt. W. Watson, Highland Light Inf. (Dundee)
Sgt. F. W. Watt, Tank Corps (Aberdeen)
L. Cpl. H. Watts, Traffic Control Squadron (Dovercourt, Essex)
L. Cpl. P. Wearn, Wiltshire Reg. (Brockenhurst, Hampshire)
Cpl. G. Webster, South Lancashire Reg. (St. Helens)
Sgt. W. Webster, Royal Engineers (Ashby-de-la-Zouch)
C.S. Maj. H. Weedon, Royal Fusiliers (Homerton)
Cpl. H. F. Welfare, Northumberland Fusiliers (Newcastle)
L. Cpl. W. J. Welham, East Lancashire Reg. (Willesden, London)
2nd Cpl. W. Wells, Royal Engineers (Alford, Surrey)
Sgt. A. G. Wenden, Royal Garrison Arty. (Kingston, Portsmouth)
Sgt. G. White, Royal Field Arty. (Liverpool)
Sgt. H. Whitmore, Royal Garrison Arty. (W. Hampstead)
Sgt. H. A. White, Tank Corps (Reading)
Sgt. H. Whitfield, Yorkshire Reg. (Sledmere)
Air Mechanic Sergeant Major F. Whittaker, Tank Corps (Manchester)
Sgt. F. Whittaker, Royal Field Arty. (Sowerby Bridge, Yorkshire)
Sgt. T. Whitton, Machine Gun Corps (Edinburgh)
C.S. Maj. J. Wicken, Royal West Kent Reg. (North Woolwich)
Sgt. H. G. Wickington, East Kent Reg. (Haggerston, London)
Sgt. P. Wicks, Royal Horse Arty. (Wellhall, London)
Cpl. A. Widdowson, Royal Field Arty. (E. Wakefield)
Sgt. L. C. Wildig, Royal Field Arty. (Bethnal Green, London)
R.S. Maj. A. Wileman, North Lancashire Reg.
Sgt. J. Wilkinson, East Lancashire Reg. (Burnley)
C.S. Maj. W. S. Wilkinson, West Riding Reg. (Holmfirth, Huddersfield)
C.S. Maj. E. G.Williams, Duke of Cornwall's Light Inf. (Brixton)
Cpl. F. Williams, North Lancashire Reg. (Horwich)
L. Cpl. F. Williams, Royal Engineers (Manchester)
L. Sgt. I. Williams, Welsh Reg. (Bridgend)
C.Q.M.S. P. Williams, Royal Munster Fusiliers (Abertndwr)
Cpl. S. A. Williams, Royal Engineers (Smethwick)
Sgt. W. T. Williams, Middlesex Reg. (Hornsey, London)
L. Cpl. H. Willicombe, Rifle Brigade (Camberwell)
Dvr. A. A. Willis, Royal Garrison Arty. (Apperley, near Tewkesbury)
B.Q.M. Sgt. J. Willis, Royal Garrison Arty. (Kensington)
Sgt. H. Willmer, Royal Garrison Arty. (Homerton, London)
Sgt. W. Willows, West Riding Reg. (Colne)
L. Sgt. H. Wilshaw, Nottinghamshire and Derbyshire Reg. (Chapel-en-le-Frith)
Sgt. A. P. Wilson, Bedfordshire Reg. (Luton)
R.S. Maj. J. W. Windmill, Royal Warwickshire Reg. (Brierley Hill)
Cpl. H. Withers, Royal Field Arty. (Muswell Hill, London)
Sgt. A. Wood, Essex Reg. (Warley)
Cpl. H. Wood, Royal Field Arty.
C.S. Maj. H. C. Woodger, East Lancashire Reg. (Banning, Kent)
Sgt. H. Woodhams, East Kent Reg. (Northampton)
Battery Sergeant Major E. Woodruff, Royal Field Arty. (Blackburn)
Cpl. F. Woode, Royal Engineers (Maidenhead, Bucks)
Battery Sergeant Major J. H. Woods, Royal Field Arty. (Battersea)
Sgt. C. E. K. Wordingham, Suffolk Reg. (Railway, Cambs)
Fitter Q.M.S. J. W.Worth, Royal Field Arty. (Newcastle upon Tyne)
Sgt. F. E. Wright, Royal Engineers (Darlington)
Cpl. F. W. Wright, Royal Scots (Edinburgh)
Sgt. W. J. Wright, Royal Field Arty. (Pembroke)
C.S. Maj. T. G. Yearsley, Monmouthshire Reg. (Aberearn, Mon.)
Sgt. W. H. Zanazi, Royal Engineers (Plymouth)
Sgt. J. R. Adamson, Yorkshire Reg. (East Rainton)
Petty Ofc. J. Allan, Royal Naval Volunteer Reserve (Annitsford)
Act. Bombr. S. A. Blyth, Royal Garrison Arty. (Melton, Norfolk)
2nd Cpl. F. Bownas, Royal Engineers (E. Bradford)
L. Cpl. L. J. Burden, Tank Corps (Bridgtown)
Sgt. A. Cole, South Wales Borderers (Withington Station, near Hereford)
L. Cpl. M. Dixon, Shropshire Light Inf. (Gelli, Rhondda)
Battery Sergeant Major F. W. H. Eastley, Royal Garrison Arty. (Southampton)
Spr. W. J. Feeman, Royal Engineers (Liverpool)
R.S. Maj. A. Ferrier, Royal Highlanders (Perth)
Cpl. F. Fisher, Royal Field Arty. (Wetley, Hampshire)
Cpl. G. C. Gane, Somerset Light Inf. (Shepton Mallet)
Spr. W. I. Garner, Royal Engineers (Bletchley)
C.S. Maj. E. Hall, Middlesex Reg. (Preston, Lancaster)
L. Cpl. G. Hardie, Royal Engineers (Glasgow)
Spr. R. Harrison, Royal Engineers (Notting Hill)
Sgt. R. Harrop, Nottinghamshire and Derbyshire Reg. (Worksop)
Dvr. H. Henthorn, Royal Field Arty. (Oldham)
Cpl. G. Hindle, East Lancashire Reg. (Preston)
L. Sgt. W. W. Hogben, Royal Welsh Fusiliers (Portsmouth)
C.S. Maj. E. Irving, Coldstream Guards (Walworth, London)
C.Q.M.S. I. Jacks, Royal Munster Fusiliers (Leeds)
Act. Cpl. F. G. Jones, Duke of Cornwall's Light Inf. (Plaistow)
C.S. Maj. H. Larkman, Essex Reg. (Norwich)
Sgt. L. T. Marsom, Military Mounted Police (Biggleswade, Bedford)
Sgt. J. McIntosh, Gordon Highlanders (Aberdeen)
Sgt. S. S. Morris, Royal Engineers (Stafford)
Pte. H. R. Periam, Machine Gun Corps (Romford, London)
Sgt. A. Roberts, Yorkshire Light Inf. (Talywain, Pontypool, Mon.)
L. Cpl. I. Scott, Royal Engineers (Liverpool)
Sgt. J. V. Solari, Nottinghamshire and Derbyshire Reg., attd. Machine Gun Corps
Battery Sergeant Major H. F. Spratley, Royal Garrison Arty. (Paddington, London)
R.S. Maj. A. Utton, East Yorkshire Reg. (Hull)
Clr.Sergeant G. Vyse, East Yorkshire Reg.
C.S. Maj. C. F. Walker, Bedfordshire Reg. (Hitchin)
C.Q.M.S. H. G. Wickington, East Kent Reg. (Haggerston, London)
Sgt. P. J. Wicks, Royal Horse Arty. (Wellhall, London)
L. Cpl. F. E. Wright, Royal Engineers (Darlington)
Australian Imperial Force
Pte. A. J. Breen, Inf.
Tmp Cpl. B. W. Rickwo, Inf.
E. H. Wiber, T.M. Brigade
Sgt. E. A. W. Adams, Inf.
C.S. Maj. A. E. Adams, Inf.
Sgt. V. J. Barkell, Inf.
Spr. E. L. Barrett, Engineers
Pte. T. Bayne, Inf.
Pte. H. Beaird, Inf.
Sgt. D. F. Berman, Inf.
V. Berriman, Arty.
Cpl. L. Berry, Inf.
Sgt. J. R. Birthisel, Inf.
Pte. S. H. Brazil, Inf.
Pte. J. A. Breen, Inf.
Gnr. D. G. Brough, Field Arty.
Sgt. J. R. Butler, Inf.
Sgt. R. A. F. Campbell, Inf.
C.S. Maj. H. M. Cook, Inf.
Cpl. H. F. Eagle, Field Arty.
Sgt. A. W. Farmer, Inf.
Sgt. R. P. Farris, Inf.
Cpl. A. Flavell, Inf.
Sgt. S. Fountain, Engineers
Sgt. C. E. Free, Inf.
R.S. Maj. R. Gray, Inf.
Sgt. L. G. Howe, Engineers
Sgt. L. G. Jarvis, Inf.
Sgt. J. H. Leach, Inf.
2nd Cpl. L. T. J. Marshall, Engineers
Sgt. Major A. E. McDonald, Field Arty.
Staff Sergeant A. V. D. Moody, Engineers
2nd Cpl. J. L. Mounsey, Eng
Sgt. B. F. Murphy, Inf.
Sgt. D. T. W. Neville, Inf.
L. Cpl. F. J. Perry, Inf.
Cpl. J. Printer, Salvage Company
Cpl. T. G. Purdue, Gar. Arty.
L. Cpl. J. Reilly, Inf.
Bombr. W. H. Ramsden, Field Arty.
Tmp Cpl. W. B. Rickwood, Inf.
Sgt. H. Shatwell, Inf.
Pte. T. Smith, Inf.
Sgt. G. Taylor, Pioneer Battalion
Spr. R. G. Thomas, Engineers
Sgt. F. T. Trevaskis, Pioneer Battalion
R.S. Maj. A. J. Vallis, Inf.
C.Q.M.S. F. Walker, Machine Gun Corps
Cpl. C. G. Watson, Inf.
L. Sgt. F. A. Wheaton, Inf.
Cpl. H. E. Wiber, T. M. Brigade
Pte. J. D. Walks, Army Medical Corps
C.S. Maj. S. Wilson, Inf.
Canadian Force
Sgt. P. H. Law, Field Arty.
C.S. Maj. H. Adam, Inf.
Cpl. J. D. Aird, Mounted Rifles
C.S. Maj. C. Baker, Inf.
Sgt. W. J. Bassey, Inf.
Sgt. H. M. Bennett, Engineers
C.S. Maj. R. Blair, Inf.
C.S. Maj. F. J. Bonner, Inf.
Sgt. E. J. Bridgwater, Engineers
Cpl. J. Bullock, Inf.
Sgt. J. Burns, Inf.
C.S. Maj. H. T. Carter, Inf.
Sgt. C. L. Cooling, Engineers
Sgt. J. Craig, Engineers
R.S. Maj. R. Dalrymple, Inf.
Bombr. F. Donald, Gar. Arty.
Sgt. T. A. Dunseath, Inf.
Act. C.S. Maj. G. W. Durran, Inf.
Sgt. E. Ensor, Inf.
C.S. Maj. E. Evans, Inf.
Battery Sergeant Major S. C. Evans, Arty.
Sgt. E. J. Field, Inf.
Sgt. A. H. Frame, Field Arty.
Sgt. J. Goulding, Railway Troops
Pte. J. H. Gulliver, Inf.
Sgt. J. M. Hay, Machine Gun Corps
Spr. J. W. Holmes, Engineers
C.S. Maj. G. L. Howard, Mounted Rifles
R.S. Maj. W. T. Johnson, Inf.
B.Q.M. Sgt. D. McN. Johnstone, Inf.
Sgt. A. J. Kirouac, Inf.
Act. Sgt. H. W. Langdon, Inf.
Sgt. P. H. Law, Field Arty.
Sgt. J. N. Lyons, Gar. Arty.
C.S. Maj. A. MacAlay, Inf.
Battalion Scout Sergeant J. L. MacCoubrey, Mounted Rifles
L. Cpl. J. Mackay, Inf.
Battery Sergeant Major A. K. McDonald, Field Arty.
Sgt. W. L. McLean, Mounted Rifles
Sgt. D. McLellan, Pioneer Battalion
L. Cpl. W. J. Mead, Mounted Rifles
T. P. Melvin, Field Arty.
Sgt. W. A. Millen, Inf.
Cpl. H. L. Montgomery, Cyclist Battalion
Sgt. T. W. Morgan, Inf.
Pte. W. R. Mowll, Inf.
C.S. Maj. J. Mutimer, Inf.
Sgt. C. H. Olson, Railway Troops
C.S. Maj. J. H. Patton, Machine Gun Corps
Sgt. W. L. Paul, Inf.
Cpl. C. E. Penrod, Field Arty.
Sgt. A. Powell, Engineers
C.S. Maj. D. M. Robinson, Inf.
C.S. Maj. J. Shefly, Inf
Sgt. Warrant Ofc. Simpson, Engineers
Sgt. W. D. Street, Inf.
Pte. R. Taylor, Machine Gun Corps
Sgt. Major J. Turner, Army Medical Corps
Sgt. J. A. Ware, Gar. Arty.
Sgt. J. Watson, Army Medical Corps
C.S. Maj. J. H. Wyatt, Inf.
Sgt. G. M. Young, Inf.
New Zealand Force
Pte. N. D. Bowman, Inf.
Cpl. W. W. Bullock, Inf.
Pte. V. Cruickshank, Inf.
L. Sgt. J. Densem, Rifle Brigade
Gnr. A. S. Driver, Field Arty.
Sgt. F. Greig, Field Arty.
R.S. Maj. W. A. Gustafson, Pioneers
L. Sgt. S. N. Managh, Rifle Brigade
Sgt. J. McCreanor, Inf.
Cpl. K. McKenzie, Inf.
Sgt. A. W. M. Ohlson, Rifle Brigade
Sgt. H. W. Price, Machine Gun Corps
L. Cpl. L. R. Ritchie, Inf.
Dvr. S. Wade, Field Arty.
Newfoundland Contingent
C.S. Maj. A. Taylor, Newfoundland Reg.
South African Force
Bombr. E. C. Tys, Royal Marine Arty.
Meritorious Service Medal (MSM)
Military Medal (MM)
Indian Order of Merit (IOM)
Second Class
Lance Dafadar Anokh Singh, Cav.
Dafadar Puran Singh, Cav.
Indian Distinguished Service Medal (IDSM)
Dvr. Alia Dad, Royal Horse Arty.
Dvr. Lehna Singh, Royal Horse Arty.
Sowar Man Singh Cav.
Sowar Mool Singh, Cav.
Dafadar Bhoor Singh, Cav.
Lance Dafadar Ali Hassan, Cav.
Dafadar Atta Muhammad Khan, Cav.
Act. Lee Dafadar Sobha Singh, Cav.
Sowar Rati Ram, Cav.
Risaldar Khurshed Muhammad Khan, Cav.
Act. Dafadar Parbhu Dayal, Cav.
Sowar Jaimal Singh, Cav.
Lance Dafadar Niadar Singh, Cav.
Jemadar Kale Khan, Cav.
Risaldar Tek Singh, Cav.
Jemadar Habib Gul, Cav.
Jemadar Sardar Khan, Cav.
Dafadar Abdul Satar Khan, Cav.
Lance Dafadar Nawab All Khan, Cav.
Sowar Sarain Singh, Cav.
Dafadar Sangar Khan, Cav.
Sowar Fauja Singh, Cav.
Jemadar Alam Sher, Cav.
Jemadar Adalat Khan, Cav.
Jemadar Khuda Baksh Khan, Cav.
Dafadar Alia Ditta Khan, Cav.
Sowar Muhammad Jan, Cav.
Act. Lance Dafadar Bur Singh, Cav.
Act. Lance Dafadar Musali Khan, Cav.
Dafadar Ram Sarup, Cav.
Sowar Mir Ronak All, Cav.
Sowar Autar Singh, Cav. Ward Ordly
Mahmud Ali Khan, Cav.
Sowar Asta Buddin, Cav. Ressalder Balwant Singh, Cav.
Dafadar Abdur Rahim Khan, Cav.
Dafadar Dale Ram, Cav.
Dafadar Pirthi Singh, Cav. Jemadar Anno Khan, Cav.
Jemadar Taj Muhammad Khan, Cav.
Dafadar Sher Bahadur Khan, Cav.
Dafadar Jehan Khan, Cav.
Lance Dafadar Akram Khan, Cav.
Dafadar Khandara Singh, Cav.
Dafadar Labh Singh, Cav.
Act. Lee. Dafadar Arjan Singh, Cav.
Sowar Nand Singh, Cav.
Havildar Kala Singh, Royal Garrison Arty., Indian Army
Ward Ordly. Umrao Singh, Inf.
1st Grade Hospital Store Keeper Rup Chand Khana, Supply and Transport Corps
Sub. Asst Surg Parmanand Misra, Indian Sub. Medical Service
1st Class Sub. Asst Surg George Julian Ferris, Indian Sub. Medical Service
1st Class Sub Asst Surgeon Ram Lai Abrole, Indian Sub. Medical Service
Lance Havildar Budhoo, Army Bearer Corps
Bearer Binda, Army Bearer Corps
King's Police Medal (KPM)
England and Wales
Police Forces
Lt.-Col. The Hon. George Augustus Anson Chief Constable of Staffordshire
George Morley, Chief Constable of Hull
James Anniwell, Superintendent and Deputy Chief Constable of the Bedfordshire Constabulary
Henry Hand, Superintendent and Deputy Chief Constable of the Breconshire Police
Superintendent John H. Gillbanks, of the Somersetshire Police
Superintendent Patrick Quinn of the Metropolitan Police Force
Sgt. Staple, of the Somersetshire Police Force
Constable Alfred Bence, of the Metropolitan Police Force
Constable Herbert Bradbury, of the Lancashire Constabulary
Constable Charles Dednum, of the Metropolitan Police Force
Constable James Hardacre, of the Lancashire Constabulary
Constable James Hardy, of the Metropolitan Police Force
Constable John Nelson Kent, of the Blackpool Police Force
Constable Ambrose Jolleys, of the Lancashire Constabulary
Constable Matthew Landy, of the Metropolitan Police Force
Constable George Legrove, of the City of London Police Force
Constable Charles Penn, of the Metropolitan Police Force
Constable Augustus Ralph, of the Metropolitan Police Force
Constable Robert George Wilson, of the Metropolitan Police Force
Fire Brigades
Chief Ofc. Edward James Abbott, of the Barking Fire Brigade
Fireman James Joseph Betts, West Ham Fire Brigade
Station Ofc. Samuel Scott Betts, West Ham Fire Brigade
Fireman Henry Chappie, West Ham Fire Brigade
Sub-Ofc. Landias Mathunn, West Ham Fire Brigade
First-Class Fireman Ernest Milsted, West Ham Fire Brigade
Fireman Frederick Charles Sell, West Ham Fire Brigade
Fireman James Henry Rich Yabsley, West Ham Fire Brigade
Sub-Ofc. Henry Vickers, West Ham Fire Brigade
Scotland
Police Forces
Constable William Tair Brown, of the Glasgow City Police Force
Charles George, Chief Constable of Kincardine
Fire Brigades
Firemaster William Inkster, of the City of Aberdeen
Ireland
Police Forces
Robert John O'Sullivan, Acting Sergeant of the Royal Irish Constabulary
John Fitzhugh Gelston, County Inspector of the Royal Irish Constabulary
Fergus Quinn, Assistant Comm., Dublin Metropolitan Police
William P. Bannon, Superintendent of the Dublin Metropolitan Police
Sgt. James Gunn, of the Royal Irish Constabulary
Constable Michael Barry, of the Royal Irish Constabulary
Constable Daniel Brennan, of the Dublin Metropolitan Police
Constable Patrick Downing, of the Dublin Metropolitan Police
Constable Alexander McDonald, of the Royal Irish Constabulary
Awarded a Bar to the King's Police Medal
Sgt. John Barton, of the Dublin Metropolitan Police
British India
Police Forces
Walter Henry Wright, Assistant Superintendent of Police, Madras Police
Golla Simhachellam, Sub-Inspector of Police, Godavari district, Madras Police
Abdul Aziz Sahib, Inspector of Police, Godavari district, Madras Police
Nandi Kishora Padhi, Inspector of Police, Vizagapatam district, Madras Police
Roy Havelock Haslam, Assistant Superintendent, Agency Police, Kathiawar, Bombay Police
Rajabkhan Daudkhan, Fourth Grade Head Constable in the Kaira District Police, Bombay Police
Peter Sullivan, Superintendent of the Criminal Investigation Dept., Bombay City Police
Abdul Satar Khan walad Sobdar Khan, Inspector of Police, Fourth Grade, Karachi District (acting Third Grade), Bombay Police
MalayActing Ganpat, Acting Second Grade Inspector of Police in the Poona District, Bombay Police
Khan Saheb Imam Muhammad, a Third Grade Inspector of Police, Criminal Investigation Dept., Bombay Presidency
Gerald Sidney Wilson, Deputy Comm. of Police for the part of Bombay
Ganu Dhansrng, a Second Grade Head Constable, District East Khandesh (retired)
Nalini Nath Mazumdar, Inspector, Calcutta Police, Bengial Police
Sashi Bhusan Bhattacharji, Inspector of Police, Bengal
Rajemdra Nath Basu, Inspector of Police, Bengal
Narendra Nath Mukharji, Sub-Inspector of Police, Bengal
Jamir Khan, Constable, Bengal Police
Robert Martin Wright, Superintendent of Police, Bengal
Amrita Lai Singh, Head Constable, Calcutta Police
Azam Khan, Head Constable, Bengal Police
Ram Sakal Gosain, Head Constable, Bengal Police
Jogendra Chandra Gupta, Sub-Inspector of Police, Intelligence Branch, Criminal Investigation Dept., Bengal Police
Ala Ahmad, Constable of the Budaun district, United Provinces Police
Bhagwant Singh, Sub-Inspector, Station Ofc. of Islamnagarthana, Budaun District, United Provinces Police
Muhammad Khan, Constable of the Kheri district, United Provinces Police
George Grosvenor Bruce Iver, Superintendent of Police, Jheilum district, Punjab Police
Mohammad Rashid, Head Constable, Ferozepore district, Punjab Police
Haider Ali, Sub-Inspector, Ludhiana district, Punjab Police
Faiz-ul-Hassan, Sub-Inspector, Punjab Police
Mirza Muraj-ud-Din, Inspector, Punjab Police
Malcolm James Chisholm, Deputy Inspector-General of Police for Railways and Criminal Investigation, Burma Civil Police
Charles Arthur Reynell, District Superintendent of Police Henzada, Burma Civil Police
Sita Ram, Deputy Superintendent of Police, Burma Civil Police
Maung Kyaung Ba Inspector of Police (retired), Burma Civil Police
Pahalman Chettri, 1st Grade Jemadar, Arakan Hill Tracts Military Police Battalion, Burma Military Police
Arratoon Catchick, Deputy Superintendent of Police, Officiating District Superintendent of Police, Kathia, Burma Civil Police
Henry St. John Morrison, Deputy Superintendent of Police, Bihar and Orissa, Civil Police
Swarup Narayan Singh, Jamadar, Military Police Company, Bhagalpur, Bihar and Orissa Military Police
Khwaja Muhammad Akram Khan, Deputy Superintendent, Central Provinces Police
Singfair Gharti, Subadar Lushai Hills Military Police Battalion, Assam Military Police
Khan Sahib Helimulla, Officiating Deputy Superintendent of Police, Sylhet district, Assam Civil Police
Jangbir Lama, Subadar, Lakhimpur Military Police Battalion, Assam Military Police
Eric Charles Handyside, Superintendent of Police, 4th Grade, North-West Frontier Province Police
Zabhir Gul Khan, Inspector, 4th grade, North-West Frontier Province Police
Malik Mazaffar Khan, Inspector, 3rd grade, North-West Frontier Province Police
Thomas Henry Morony, District Superintendent of Police, 4th grade, Indian Police (Indore State Police)
Samuel Thomas Hollins, Superintendent of Police, 5th grade, Inspector-General of Tonk State Police
Adalat Khan, Head Constable, Baluchistan Police
Ernest Woodburn Trotter, District Superintendent, Burma Civil Police
Reginald Charles Whiting, District Superintendent, Burma Civil Police
Overseas Dominions
Police Forces
James Frendo Azopardi Senior Assistant Superintendent of Police, Malta
William Kilmuster Notley, Comm. of Police, East Africa Protectorate
Lt.-Col. Charles Riddick, Comm. of Police and Prisons, Uganda Protectorate
Robert Evans Lett, Staff Instructor, Gold Coast Police
Col. William Eden Clark, Inspector-General of Police and Commandant of local forces, British Guiana
Imperial Service Medal (ISM)
Home Civil Service
William Addis, Overseer, London Postal Service
Walter Alfred Barnes, First Class Messenger, Treasury
Frederick John Bayfield, Detail Plotter, Publication Division, Ordnance Survey, Southampton
George Bennett, Postman, Mitcham
Alfred Biffen, Overseer, London Postal Service
John Blackwood, Postman, Kinross
William Thomas Blake, Foreman, Army Ordnance Dept., Woolwich
Samuel Francis Boden, Postman, Birmingham
Owen Sylvester Bond, Shipwright, Portsmouth Dockyard
Frederick William Bucknell, Overseer (Telegraphs), London Postal Service
Valentine Pike Burbidge, Assistant Head Postman, London Postal Service
Alma Ephraim Austin Burden, Second Class Draughtsman (Overseer), Portsmouth Dockyard
James Burke, Preventive Ofc., Liverpool
Francis Burns, Postman, Portadown
Thomas Butland, Assistant Inspector of Postmen, Torquay
John Butler, Leading Man of Wharf, Royal Clarence Yard, Gosport
William Woodward Butler, Postman, Ganstead, S.O. Hull
Duncan Urquhart Brown, First Engineer (Yardcraft), Portsmouth Dockyard
Alfred John Carter, Assistant Inspector of Postmen, Exeter
John Caryl, Postman, Cowley SO., Exeter
George Chadwick, Assistant London Postal Service Head Postman
Benjamin Walter Samuel Chambers, Telegraphist, Central Telegraph Office
Richard William Chapman, Sorting Clerk and Telegraphist, Leeds
Christopher Byatt Comben, Warder, Portland Prison
Ellen Cooke, Matron, Class IV, Shrewsbury Prison
Richard John Cooper, Principal Warder, Portland Prison
Thomas John Cooper, Patternmaker, Chatham Dockyard
James Crone, Chief Worktaker, Central Office, Ministry of Munitions
Stephen Richard Davey, Shipwright, Devon-port Dockyard
Emily Rosa Davies, Assistant Supervisor, Class II, Central Telegraph Office
Ernest John Edward Davis, Postman, Portsmouth
John Dixon, Postman, Preston
Frederick William Drew, Examiner of Drawings, Control Division, Ordnance Survey, Southampton
Joseph Drinkwater, Postman, Gloucester
William Berry Dyson, Assistant Inspector of Postmen, Huddersfield
James Farrar, Assistant Inspector, Post Office, Blackburn
Arthur Fewell, Assistant Inspector, Post Office, Sutton
William Gamwell, Postman, Northallerton
William Garwood, Stamper, Office of Inspector of Stamping, Inland Revenue
James Richard Ernest Gaston, Postman, London Postal Service
Giovanni Gatt, Foreman of Stores, Naval Store Dept., Admiralty
Andrew Gibson, Postman, Belfast
William Grave, Overseer (Postal), Liverpool
Richard Horatio Green, Assistant Inspector of Tracing, Accountant-General's Dept., General Post Office
George Edward Harris, Postman, Harlow
George Harvey, Postman, Gloucester
William John Head, Second Class Storerman, Stores Dept., General Post Office
James Heard, Shipwright, Chatham Dockyard
Thomas Hennessy, Postman, Kildare, Newbridge, Ireland
Charles Samuel Hill, Mate in charge of War Dept. Vessels, War Office
William Sycamore Hill, Postman, Sutton
Jessie Eliza Housden, Sorting Clerk and Telegraphist, Wimborne
Joseph Hudson, Postman, Warwick
Gabriel Hughes, Inspector of Messengers, Central Telegraph Office
Edward Jones, Postman, Liverpool
Robert Jones, Shipwright, Pembroke Dockyard
Edwin James Lake, Skilled Labourer, Portsmouth Dockyard
Robert Lawson, Postman, Glasgow
William Thomas Leonard, Postman, Rochdale
Mary Elizabeth Liddle, Assistant Supervisor, Post Office, Carlisle
George William Lock, Telegraphist, Central Telegraph Office
Mary Lomax, Sorting Clerk and Telegraphist, Manchester
George William Long, Sorting Clerk and Telegraphist, Boston
Henry Lord, Preventive Ofc., Sunderland
Edward Lovell, Postman, Eastbourne
Andrew Low, Inspector of Storehousemen, Chatham Dockyard
Patrick M'Donnell, Postman, Slane, Drogheda
James M'Geoch, Inspector, Engineering Dept., General Post Office
Daniel M'llgorm, Customs and Excise Ofc., Holyhead, Carnarvon
Arthur Samuel Madge, Sorter, London Postal Service
William Mash, Rigger (Chargeman), Sheerness Dockyard
Walter Mason, Paper-Keeper, Money Order Dept., General Post Office
David Millar, Postman, Coatbridge
James Nelson, Postman, Crossgar, Belfast
William Newburn, Shipwright, Chatham Dockyard
William Noot, Shipwright, Pembroke Dockyard
William Parsons, Warder, Grade I, Brixton Prison
Charles Henry Penrose, Ship Fitter, Devonport Dockyard
Harry Perks, Assistant Inspector of Postmen, Buxton
Thomas Reekie, Postman, Auchtermuchty, Ladybank
Arthur James Richards, Fitter, Chatham Dockyard
Ralph Robinson, Overseer, Post Office, Stockton-on-Tees
Alfred Robert Rose, Sorter, London Postal Service
John Sandham, Postman, Fleetwood
Elizabeth Scowcroft, Telegraphist, Central Telegraph Office
William Kinnear Shannon, Postman, Dundee
Edna Jane Sharpe, Matron, Class I, Leeds Prison
William Shearman, Postman, York
Margaret Sheret, Counter Clerk and Telegraphist, London Postal Service
George Sinclair, Head Office Keeper and House Keeper, Foreign Office
Charles Smith, Postman, London Postal Service
George Henry Smith, Shipwright, Devonport Dockyard
William Stewart, Skilled Labourer, Devonport Dockyard
Robert Scott Taylor, Labourer, Leeds Prison
Robert Tillett, Shipwright, Portsmouth Dockyard
John Thomas Tozer, Skilled Labourer, Devonport Dockyard
William Richard Upjohn, Postman, Lyme Regis, S.O. Axminster
William Wardrop, Foreman, Engineering Dept., General Post Office
Frances Mary Isabella Webber, Assistant Supervisor (Telegraphs), Bath
Charles Arthur Wells, Examiner of Tracings, Control Division, Ordnance Survey, Southampton
Alfred George White, Sorter, London Postal Service
Henry James Whittle, Telegraphist, Central Telegraph Office
Edward Whitwell, Postman, Kendal
Joseph William Wickenden, Skilled Labourer, Sheerness Dockyard
Alfred John Wilkins, Photographic Writer, Publication Division, Ordnance Survey, Southampton
Edwin Williams, Ship Fitter, Chargeman, Devonport Dockyard
References
New Year Honours
1918 awards
1918 in Australia
1918 in Canada
1918 in India
1918 in New Zealand
1918 in the United Kingdom |
5397712 | https://en.wikipedia.org/wiki/Tree%20%28command%29 | Tree (command) | In computing, tree is a recursive directory listing command or program that produces a depth-indented listing of files. Originating in PC- and MS-DOS, it is found in Digital Research FlexOS, IBM/Toshiba 4690 OS, PTS-DOS, FreeDOS, IBM OS/2, Microsoft Windows, and ReactOS. A version for Unix and Unix-like systems is also available.
The tree command is frequently used as part of a technical support scam, where the command is used to occupy the command prompt screen, while the scammer, pretending to be technical support, types additional text that is supposed to look like output of the command.
Overview
With no arguments, tree lists the files in the current directory. When directory arguments are given, tree lists all the files or directories found in the given directories each in turn. Upon completion of listing all files and directories found, tree returns the total number of files and directories listed. There are options to change the characters used in the output, and to use color output.
The command is available in MS-DOS versions 3.2 and later and IBM PC DOS releases 2 and later. Digital Research DR DOS 6.0, Itautec SISNE plus, and Datalight ROM-DOS include an implementation of the command.
The Tree Command for Linux was developed by Steve Baker. The FreeDOS version was developed by Dave Dunfield and the ReactOS version was developed by Asif Bahrainwala. All three implementations are licensed under the GNU General Public License.
Example
$ tree path/to/folder/
path/to/folder/
├── a-first.html
├── b-second.html
├── subfolder
│ ├── readme.html
│ ├── code.cpp
│ └── code.h
└── z-last-file.html
1 directories, 6 files
See also
ls
pstree
List of Unix commands
List of DOS commands
References
Further reading
External links
The Tree Command for Linux Homepage
tree | Microsoft Docs
External DOS commands
OS/2 commands
ReactOS commands
Unix file system-related software
Windows commands |
645445 | https://en.wikipedia.org/wiki/COBOL%20ReSource | COBOL ReSource | COBOL ReSource is a Wang VS COBOL development and production environment for Unix. A product of Getronics (formerly Wang Laboratories, Inc.), COBOL ReSource was first released in 1993 as a tool to replatform and run Wang VS COBOL applications in Unix. It was updated and rereleased in 1995 and its maintenance and ongoing development outsourced to SRDI in the late 1990s.
Unique Wang COBOL dialect ported to Unix
Wang dialects of COBOL-74 and COBOL-85 have important places in the evolution of COBOL. Wang was among the first, if not the first, to integrate COBOL into environments built from the ground up to be interactive as well as batch. Wang also had a principal role in the COBOL standards bodies until the early 1990s. Wang extensions to COBOL involving record locking scope, rollback and rollforward recovery implemented at the file system level allowing transaction processing, and full interactive workstation screen I/O have often made it difficult to port Wang COBOL applications to other systems.
Entire VS look and feel in Unix
On the surface COBOL ReSource appeals to VS users and software developers because it is faithful to the VS look and feel with 32 PFKeys, foreground suspension via Help, VS Field Attribute Characters, underlining, etc. Under the covers, however, are more significant compatibility features such as VS-style argument passing and return by reference between disjoint processes, and full PUTPARM/GETPARM functionality.
VS file system ported to Unix
Wang's premium XDMS file system was ported to Unix to serve as the file system for COBOL ReSource. Called PDMS, it has a track record of supporting shared access to multiple indexed files for user populations as large as 1,000.
External links
SRDI
VS WebCenter at Getronics
Getronics
The Unofficial Wang VS Information Center
COBOL |
14330135 | https://en.wikipedia.org/wiki/Symmetrical%20double-sided%20two-way%20ranging | Symmetrical double-sided two-way ranging | In radio technology, symmetrical double-sided two-way ranging (SDS-TWR) is a ranging method that uses two delays that naturally occur in signal transmission to determine the range between two stations:
Signal propagation delay between two wireless devices
Processing delay of acknowledgements within a wireless device
This method is called symmetrical double-sided two-way ranging, because:
It is symmetrical in that the measurements from station A to station B are a mirror-image of the measurements from station B to station A (ABA to BAB).
It is double-sided in that only two stations are used for ranging measurement – station A and station B.
It is two-way in that a data packet (called a test packet) and an ACK packet is used.
Signal propagation delay
A special type of packet (test packets) is transmitted from station A (node A) to station B (node B). As time the packet travels through space per meter is known (from physical laws), the difference in time from when it was sent from the transmitter and received at the receiver can be calculated. This time delay is known as the signal propagation delay.
Processing delay
Station A now expects an acknowledgement from Station B. A station takes a known amount of time to process the incoming test packet, generate an acknowledgement (ack packet), and prepare it for transmission. The sum of time taken to process this acknowledgement is known as processing delay.
Calculating the range
The acknowledgement sent back to station A includes in its header those two delay values – the signal propagation delay and the processing delay. A further signal propagation delay can be calculated by Station A on the received acknowledgement, even as this delay was calculated on the test packet. These three values can then be used by an algorithm to calculate the range between these two stations.
Verifying the range calculation
To verify that the range calculation was accurate, the same procedure is repeated by station B sending a test packet to station A and station A sending an acknowledgement to station B. At the end of this procedure, two range values are determined and an average of the two can be used to achieve a fairly accurate distance measurement between these two stations.
See also
Multilateration
Real-time locating system
References
Radio technology
Wireless locating |
184781 | https://en.wikipedia.org/wiki/Tempest%20%28codename%29 | Tempest (codename) | TEMPEST is a U.S. National Security Agency specification and a NATO certification referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations. TEMPEST covers both methods to spy upon others and how to shield equipment against such spying. The protection efforts are also known as emission security (EMSEC), which is a subset of communications security (COMSEC).
The NSA methods for spying on computer emissions are classified, but some of the protection standards have been released by either the NSA or the Department of Defense. Protecting equipment from spying is done with distance, shielding, filtering, and masking. The TEMPEST standards mandate elements such as equipment distance from walls, amount of shielding in buildings and equipment, and distance separating wires carrying classified vs. unclassified materials, filters on cables, and even distance and shielding between wires or equipment and building pipes. Noise can also protect information by masking the actual data.
While much of TEMPEST is about leaking electromagnetic emanations, it also encompasses sounds and mechanical vibrations. For example, it is possible to log a user's keystrokes using the motion sensor inside smartphones. Compromising emissions are defined as unintentional intelligence-bearing signals which, if intercepted and analyzed (side-channel attack), may disclose the information transmitted, received, handled, or otherwise processed by any information-processing equipment.
History
During World War II, Bell Telephone supplied the U.S. military with the 131-B2 mixer device that encrypted teleprinter signals by XOR’ing them with key material from one-time tapes (the SIGTOT system) or, earlier, a rotor-based key generator called SIGCUM. It used electromechanical relays in its operation. Later Bell informed the Signal Corps that they were able to detect electromagnetic spikes at a distance from the mixer and recover the plain text. Meeting skepticism over whether the phenomenon they discovered in the laboratory could really be dangerous, they demonstrated their ability to recover plain text from a Signal Corps’ crypto center on Varick Street in Lower Manhattan. Now alarmed, the Signal Corps asked Bell to investigate further. Bell identified three problem areas: radiated signals, signals conducted on wires extending from the facility, and magnetic fields. As possible solutions, they suggested shielding, filtering and masking.
Bell developed a modified mixer, the 131-A1 with shielding and filtering, but it proved difficult to maintain and too expensive to deploy. Instead, relevant commanders were warned of the problem and advised to control a 100 ft (30 m) -diameter zone around their communications center to prevent covert interception, and things were left at that. Then in 1951, the CIA rediscovered the problem with the 131-B2 mixer and found they could recover plain text off the line carrying the encrypted signal from a quarter-mile away. Filters for signal and power lines were developed, and the recommended control-perimeter radius was extended to 200 feet (60 m), based more on what commanders could be expected to accomplish than any technical criteria.
A long process of evaluating systems and developing possible solutions followed. Other compromising effects were discovered, such as fluctuations in the power line as rotors stepped. The question of exploiting the noise of electromechanical encryption systems had been raised in the late 1940s, but was re-evaluated now as a possible threat. Acoustical emanations could reveal plain text, but only if the pick-up device was close to the source. Nevertheless, even mediocre microphones would do. Soundproofing the room made the problem worse by removing reflections and providing a cleaner signal to the recorder.
In 1956, the Naval Research Laboratory developed a better mixer that operated at much lower voltages and currents and therefore radiated far less. It was incorporated in newer NSA encryption systems. However, many users needed the higher signal levels to drive teleprinters at greater distances or where multiple teleprinters were connected, so the newer encryption devices included the option to switch the signal back up to the higher strength. NSA began developing techniques and specifications for isolating sensitive-communications pathways through filtering, shielding, grounding, and physical separation: of those lines that carried sensitive plain text – from those intended to carry only non-sensitive data, the latter often extending outside of the secure environment. This separation effort became known as the Red/Black Concept. A 1958 joint policy called NAG-1 set radiation standards for equipment and installations based on a 50 ft (15 m) limit of control. It also specified the classification levels of various aspects of the TEMPEST problem. The policy was adopted by Canada and the UK the next year. Six organizations, Navy, Army, Air Force, NSA, CIA, and the State Department were to provide the bulk of the effort for its implementation.
Difficulties quickly emerged. Computerization was becoming important to processing intelligence data, and computers and their peripherals had to be evaluated, wherein many of them evidenced vulnerabilities. The Friden Flexowriter, a popular I/O typewriter at the time, proved to be among the strongest emitters, readable at distances up to 3,200 ft (about 1 km) in field tests. The U.S. Communications Security Board (USCSB) produced a Flexowriter Policy that banned its use overseas for classified information and limited its use within the U.S. to the Confidential level, and then only within a 400 ft (120 m) security zone – but users found the policy onerous and impractical. Later, the NSA found similar problems with the introduction of cathode-ray-tube displays (CRTs), which were also powerful radiators.
There was a multi-year process of moving from policy recommendations to more strictly enforced TEMPEST rules. The resulting Directive 5200.19, coordinated with 22 separate agencies, was signed by Secretary of Defense Robert McNamara in December 1964, but still took months to fully implement. The NSA’s formal implementation took effect in June 1966.
Meanwhile, the problem of acoustic emanations became more critical with the discovery of some 900 microphones in U.S. installations overseas, most behind the Iron Curtain. The response was to build room-within-a-room enclosures, some transparent, nicknamed "fish bowls". Other units were fully shielded to contain electronic emanations, but were unpopular with the personnel who were supposed to work inside; they called the enclosures "meat lockers", and sometimes just left their doors open. Nonetheless, they were installed in critical locations, such as the embassy in Moscow, where two were installed: one for State-Department use and one for military attachés. A unit installed at the NSA for its key-generation equipment cost $134,000.
Tempest standards continued to evolve in the 1970s and later, with newer testing methods and more-nuanced guidelines that took account of the risks in specific locations and situations. But then as now, security needs often met with resistance. According to NSA's David G. Boak, "Some of what we still hear today in our own circles, when rigorous technical standards are whittled down in the interest of money and time, are frighteningly reminiscent of the arrogant Third Reich with their Enigma cryptomachine."
Shielding standards
Many specifics of the TEMPEST standards are classified, but some elements are public. Current United States and NATO Tempest standards define three levels of protection requirements:
NATO SDIP-27 Level A (formerly AMSG 720B) and USA NSTISSAM Level I
"Compromising Emanations Laboratory Test Standard"
This is the strictest standard for devices that will be operated in NATO Zone 0 environments, where it is assumed that an attacker has almost immediate access (e.g. neighbouring room, 1 metre; 3' distance).
NATO SDIP-27 Level B (formerly AMSG 788A) and USA NSTISSAM Level II
"Laboratory Test Standard for Protected Facility Equipment"
This is a slightly relaxed standard for devices that are operated in NATO Zone 1 environments, where it is assumed that an attacker cannot get closer than about 20 metres (65') (or where building materials ensure an attenuation equivalent to the free-space attenuation of this distance).
NATO SDIP-27 Level C (formerly AMSG 784) and USA NSTISSAM Level III
"Laboratory Test Standard for Tactical Mobile Equipment/Systems"
An even more relaxed standard for devices operated in NATO Zone 2 environments, where attackers have to deal with the equivalent of 100 metres (300') of free-space attenuation (or equivalent attenuation through building materials).
Additional standards include:
NATO SDIP-29 (formerly AMSG 719G)
"Installation of Electrical Equipment for the Processing of Classified Information"
This standard defines installation requirements, for example in respect to grounding and cable distances.
AMSG 799B
"NATO Zoning Procedures"
Defines an attenuation measurement procedure, according to which individual rooms within a security perimeter can be classified into Zone 0, Zone 1, Zone 2, or Zone 3, which then determines what shielding test standard is required for equipment that processes secret data in these rooms.
The NSA and Department of Defense have declassified some TEMPEST elements after Freedom of Information Act requests, but the documents black out many key values and descriptions. The declassified version of the TEMPEST test standard is heavily redacted, with emanation limits and test procedures blacked out. A redacted version of the introductory Tempest handbook NACSIM 5000 was publicly released in December 2000. Additionally, the current NATO standard SDIP-27 (before 2006 known as AMSG 720B, AMSG 788A, and AMSG 784) is still classified.
Despite this, some declassified documents give information on the shielding required by TEMPEST standards. For example, Military Handbook 1195 includes the chart at the right, showing electromagnetic shielding requirements at different frequencies. A declassified NSA specification for shielded enclosures offers similar shielding values, requiring, "a minimum of 100 dB insertion loss from 1 KHz to 10 GHz." Since much of the current requirements are still classified, there are no publicly available correlations between this 100 dB shielding requirement and the newer zone-based shielding standards.
In addition, many separation distance requirements and other elements are provided by the declassified NSA red-black installation guidance, NSTISSAM TEMPEST/2-95.
Certification
The information-security agencies of several NATO countries publish lists of accredited testing labs and of equipment that has passed these tests:
In Canada: Canadian Industrial TEMPEST Program
In Germany: BSI German Zoned Products List
In the UK: UK CESG Directory of Infosec Assured Products, Section 12
In the U.S.: NSA TEMPEST Certification Program
The United States Army also has a Tempest testing facility, as part of the U.S. Army Information Systems Engineering Command, at Fort Huachuca, Arizona. Similar lists and facilities exist in other NATO countries.
Tempest certification must apply to entire systems, not just to individual components, since connecting a single unshielded component (such as a cable or device) to an otherwise secure system could dramatically alter the system RF characteristics.
RED/BLACK separation
TEMPEST standards require "RED/BLACK separation", i.e., maintaining distance or installing shielding between circuits and equipment used to handle plaintext classified or sensitive information that is not encrypted (RED) and secured circuits and equipment (BLACK), the latter including those carrying encrypted signals. Manufacture of TEMPEST-approved equipment must be done under careful quality control to ensure that additional units are built exactly the same as the units that were tested. Changing even a single wire can invalidate the tests.
Correlated emanations
One aspect of Tempest testing that distinguishes it from limits on spurious emissions (e.g., FCC Part 15) is a requirement of absolute minimal correlation between radiated energy or detectable emissions and any plaintext data that are being processed.
Public research
In 1985, Wim van Eck published the first unclassified technical analysis of the security risks of emanations from computer monitors. This paper caused some consternation in the security community, which had previously believed that such monitoring was a highly sophisticated attack available only to governments; van Eck successfully eavesdropped on a real system, at a range of hundreds of metres, using just $15 worth of equipment plus a television set.
As a consequence of this research, such emanations are sometimes called "van Eck radiation", and the eavesdropping technique van Eck phreaking, although government researchers were already aware of the danger, as Bell Labs noted this vulnerability to secure teleprinter communications during World War II and was able to produce 75% of the plaintext being processed in a secure facility from a distance of 80 feet. (24 metres) Additionally the NSA published Tempest Fundamentals, NSA-82-89, NACSIM 5000, National Security Agency (Classified) on February 1, 1982. In addition, the van Eck technique was successfully demonstrated to non-TEMPEST personnel in Korea during the Korean War in the 1950s.
Markus Kuhn has discovered several low-cost techniques for reducing the chances that emanations from computer displays can be monitored remotely. With CRT displays and analog video cables, filtering out high-frequency components from fonts before rendering them on a computer screen will attenuate the energy at which text characters are broadcast. With modern flat panel displays, the high-speed digital serial interface (DVI) cables from the graphics controller are a main source of compromising emanations. Adding random noise to the least significant bits of pixel values may render the emanations from flat-panel displays unintelligible to eavesdroppers but is not a secure method. Since DVI uses a certain bit code scheme that tries to transport a balanced signal of 0 bits and 1 bits, there may not be much difference between two pixel colors that differ very much in their color or intensity. The emanations can differ drastically even if only the last bit of a pixel's color is changed. The signal received by the eavesdropper also depends on the frequency where the emanations are detected. The signal can be received on many frequencies at once and each frequency's signal differs in contrast and brightness related to a certain color on the screen. Usually, the technique of smothering the RED signal with noise is not effective unless the power of the noise is sufficient to drive the eavesdropper's receiver into saturation thus overwhelming the receiver input.
LED indicators on computer equipment can be a source of compromising optical emanations. One such technique involves the monitoring of the lights on a dial-up modem. Almost all modems flash an LED to show activity, and it is common for the flashes to be directly taken from the data line. As such, a fast optical system can easily see the changes in the flickers from the data being transmitted down the wire.
Recent research has shown it is possible to detect the radiation corresponding to a keypress event from not only wireless (radio) keyboards, but also from traditional wired keyboards, and even from laptop keyboards. From the 1970s onward, Soviet bugging of US Embassy IBM Selectric typewriters allowed the keypress-derived mechanical motion of bails, with attached magnets, to be detected by implanted magnetometers, and converted via hidden electronics to a digital radio frequency signal. Each eight character transmission provided Soviet access to sensitive documents, as they were being typed, at US facilities in Moscow and Leningrad.
In 2014, researchers introduced "AirHopper", a bifurcated attack pattern showing the feasibility of data exfiltration from an isolated computer to a nearby mobile phone, using FM frequency signals.
In 2015, "BitWhisper", a Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations was introduced. "BitWhisper" supports bidirectional communication and requires no additional dedicated peripheral hardware. Later in 2015, researchers introduced GSMem, a method for exfiltrating data from air-gapped computers over cellular frequencies. The transmission - generated by a standard internal bus - renders the computer into a small cellular transmitter antenna. In February 2018, research was published describing how low frequency magnetic fields can be used to escape sensitive data from Faraday-caged, air-gapped computers with malware code-named ’ODINI’ that can control the low frequency magnetic fields emitted from infected computers by regulating the load of CPU cores.
In 2018, a class of side-channel attack was introduced at ACM and Black Hat by Eurecom's researchers: "Screaming Channels". This kind of attack targets mix-signal chips — containing an analog and digital circuit on the same silicon die — with a radio transmitter. The results of this architecture, often found in connected objects, is that the digital part of the chip will leak some metadata on its computations into the analog part, which leads to metadata's leak being encoded in the noise of the radio transmission. Thanks to signal-processing techniques, researchers were able to extract cryptographic keys used during the communication and decrypt the content. This attack class is supposed, by the authors, to being already known since many years by governmental intelligence agencies.
In popular culture
In the television series Numb3rs, season 1 episode "Sacrifice", a wire connected to a high gain antenna was used to "read" from a computer monitor.
In the television series Spooks, season 4 episode "The Sting", a failed attempt to read information from a computer that has no network link is described.
In the novel Cryptonomicon by Neal Stephenson, characters use Van Eck phreaking to likewise read information from a computer monitor in a neighboring room.
In the television series Agents of S.H.I.E.L.D., season 1 episode "Ragtag", an office is scanned for digital signatures in the UHF spectrum.
In the video game Tom Clancy's Splinter Cell: Chaos Theory, part of the final mission involves spying on a meeting in a Tempest-hardened war room. Throughout the entire Splinter Cell series, a laser microphone is used as well.
In the video game Rainbow Six: Siege, the operator Mute has experience in TEMPEST specifications. He designed a Signal Disrupter initially to ensure that hidden microphones in sensitive meetings would not transmit, and adapted them for combat, capable of disrupting remotely activated devices like breaching charges.
In the novel series The Laundry Files by Charles Stross, the character James Angleton (high ranking officer of an ultra-secret intelligence agency) always uses low tech devices such as a typewriter or a Memex to defend against TEMPEST (despite the building being tempest-shielded).
See also
Air gap (networking) - air gaps can be breached by TEMPEST-like techniques
Computer and network surveillance
Computer security
ECHELON
MIL-STD-461
Side-channel attack
References
Sources
Code names
Cryptographic attacks
Side-channel attacks
Signals intelligence
Surveillance
United States government secrecy |
28141082 | https://en.wikipedia.org/wiki/Adeptia | Adeptia | Adeptia is a Chicago-based software company. It provides application to exchange business data with other companies using a self-service integration approach. This business software helps organizations quickly create automated data connections to their customers and partners and automate pre-processing and post-processing steps such as data validation, exception handling and back-end data integration.
Adeptia's products are designed to help on-board customer data, implement real-time interfaces between systems, connecting with cloud applications, automate business processes, publishing APIs, Electronic Data Interchange (EDI) integration and to enable Service-oriented architecture (SOA). Adeptia is being used by organizations in various industries including Insurance, Financial Services, Manufacturing, Logistics, Government, Healthcare and Retail. Adeptia technology provides Data Integration, Enterprise Application Integration (EAI), and Business-to-business (B2B) Integration software capabilities.
Adeptia technology has been developed using Java, XML and Web Services technologies. They are available in both traditional on-premises as well as cloud-delivery models. For cloud deployments, Adeptia utilizes the Amazon Elastic Compute Cloud (EC2).
Adeptia is notable for being the most comprehensive "all-in-one" business integration software on the market that combines Data Integration, Enterprise Application Integration, and Business-to-Business EDI capability on a core SOA architecture.
History
Adeptia was founded in 2000 and is headquartered in Chicago, IL. It has a wholly owned Research and Development Center in New Delhi, India.
In November 2014, Lou Ennuso, CEO of Adeptia, was inducted as a member of University of Illinois at Chicago (UIC) Entrepreneurship Hall of Fame.
Gartner included Adeptia in the Data Integration Magic Quadrant in 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020.
Gartner also included Adeptia in the Application Integration Magic Quadrant in 2013 and 2014.
Forrester Research included Adeptia in the Hybrid Integration Wave in 2014.
See also
Enterprise Application Integration
Enterprise service bus
Comparison of business integration software
References
External links
Adeptia website
Software companies established in 2000
Software companies based in Illinois
Companies based in Chicago
EDI software companies
Software companies of the United States
2000 establishments in Illinois |
2539467 | https://en.wikipedia.org/wiki/VP-Info | VP-Info | VP-Info is a database language and compiler for the personal computer. VP-Info was a competitor to the Clipper and dBase applications in the late 1980s and 1990s. VP-Info runs on MS-DOS, DR-DOS and the PC-MOS/386 operating system. The last release of VP-Info was named Shark.
Origin
In the early 1980s, David Clark met George Gratzer, a mathematics professor at the University of Manitoba, at ComputerLand in Winnipeg where Gratzer was looking for someone who could program in dBase. Clark had been using dBase II, but was frustrated by its limitations for reporting on more than 2 tables at a time. While working for Standard Knitting (a client of Gratzer's and Clark's), David wrote a report generator called dComp that would allow up to six related data files to be in use at one time and run faster than the slow, dBase II. Clark and Gratzer subsequently formed a partnership in a company called "Sub Rosa" that developed dComp into a full dBase II compatible language/database called Max that had more speed and "power tools" than even dBase III contained. Clark designed and developed the program while Gratzer wrote the reference and tutorial manuals. This product was published by Paperback Software and sold over 30,000 copies (worldwide) in 1987 alone. The published reference manual for VP-Info was over 900 pages and the program was distributed in an extra thick back cover which was an innovation for all Paperback Software products at that time.
For programmers, Max had several interesting capabilities, including the ability to change field names easily, to represent fields in array form, automatically execute code while moving from field to field and many tools like cross tabs. With its built-in editor, a programmer could go from edit to executing the program in 2 keystrokes and back to editing the program with just 2 more.
Marketing
Paperback Software International Ltd. acquired worldwide marketing rights to Max and launched it as VP-Info in 1986. Lotus Development Corp. objected to some of the features of VP-Planner 3D, a Lotus look-alike with a number of features beyond those of 1-2-3, and sued Paperback Software for copyright infringement in 1989. Though the lawsuit ultimately failed in the courts, Paperback Software eventually folded following the litigations.
Sub Rosa Inc. reacquired worldwide distribution rights to VP-Info shortly before it entered bankruptcy. Bursten and an associate, Bernie Melman of Toronto, established Sub Rosa Publishing Inc. in Toronto and Sub Rosa Corporation in Minneapolis and attempted to get VP-Info back into distribution. Since the name belonged to the bankrupt Paperback Software, however, they had to give it yet another name, and Shark (or Sharkbase) was introduced in 1992 as an upgrade to VP-Info.
Technical
VP-Info can read and write all the common dBase/Clipper file formats, as well as exchange data with OpenOffice. VP-Info can read and write any type of dbf files (e.g. dBase II, III, IV, Clipper) at the same time. Unlike the older dBase file formats, VP-Info dbf files can have an unlimited number of records. VP-Info has a built-in compiler for fast execution.
Like many DOS applications, VP-Info is available for free download. An online User's Manual for the latest distribution of VP-Info, SharkBase, is still maintained. VP-Info, and subsequent SharkBase versions, can run on 32-bit or 64-bit Windows, using a virtual machine or emulator to provide a usable environment. It has been reported that both VP-Info and Shark run under the latest Windows versions using vDOS, a fork of the DOSBox MS-DOS emulator, and it can also run on multi-user/multi-tasking systems with NetBIOS over TCP/IP such as vDOS. VP-Info dbf files can be opened, modified and saved by both OpenOffice Calc and LibreOffice Calc. The vDOS emulator offers access to all hardware output (printer) ports on the hosting Windows system, unlike DOSbox.
References
Proprietary database management systems
1986 software |
69679733 | https://en.wikipedia.org/wiki/History%20of%20Advaita%20Vedanta | History of Advaita Vedanta | Advaita Vedānta is the oldest extant tradition of Vedānta, and one of the six orthodox (āstika) Hindu philosophies (). Its history may be traced back to the start of the Common Era, but takes clear shape in the 6th-7th century CE, with the seminal works of Gaudapada, Maṇḍana Miśra, and Shankara, who is considered by tradition and Orientalist Indologists to be the most prominent exponent of the Advaita Vedānta, though the historical fame and cultural influence of Shankara grew only centuries later, particularly during the era of the Muslim invasions and consequent reign of the Indian subcontinent. The living Advaita Vedānta tradition in medieval times was influenced by, and incorporated elements from, the yogic tradition and texts like the Yoga Vasistha and the Bhagavata Purana. In the 19th century, due to the interplay between western views and Indian nationalism, Advaita came to be regarded as the paradigmatic example of Hindu spirituality, despite the numerical dominance of theistic Bkakti-oriented religiosity. In modern times, its views appear in various Neo-Vedānta movements.
Historiography
The historiography of Advaita Vedanta is coloured by Orientalist notions, while modern formulations of Advaita Vedānta, which developed as a reaction to western Orientalism and Perennialism have "become a dominant force in Indian intellectual thought."
In the Orientalist view, the medieavl Muslim period was a time of stagnation and cultural degeneration, in which the original purity of the Upanisadic teachings, systematized by philosophers like Shankara, was lost. In this view, "the genuine achievements of Indian civilization" were recovered during the British colonial rule of India, due to the efforts of western Indologists, who viewed Advaita Vedanta as the authentic philosophy of the Upanishads, and Shankara as it's greatest exponent. While this view has been criticised by postcolonial studies and critiques of Orientalism, "in some corners of the academy, the Orientalists' understanding of premodern Indian history has so far escaped thorough reexamination." According to Michael S. Allen and Anand Venkatkrishnan, "scholars have yet to provide even a rudimentary, let alone comprehensive account of the history of Advaita Vedānta in the centuries leading up to the colonial period."
Early Vedanta
The Upanishads form the basic texts, of which Vedānta gives an interpretation. The Upanishads do not contain "a rigorous philosophical inquiry identifying the doctrines and formulating the supporting arguments". This philosophical inquiry was performed by the darsanas, the various philosophical schools.
The Brahma Sutras of Bādarāyana, also called the Vedānta Sutra, were compiled in its present form around 400–450 AD, but "the great part of the Sutra must have been in existence much earlier than that". Estimates of the date of Bādarāyana's lifetime differ between 200 BC and 200 AD. The Brahma Sutra is a critical study of the teachings of the Upanishads, possibly "written from a Bhedābheda Vedāntic viewpoint." It was and is a guide-book for the great teachers of the Vedantic systems. Bādarāyana was not the first person to systematise the teachings of the Upanishads. He refers to seven Vedantic teachers before him:
Early Advaita Vedānta
Of the Vedānta-school before the composition of the Brahma Sutras (400–450 CE), wrote Nakamura in 1950, almost nothing is known. The two Advaita writings predating Maṇḍana Miśra and Shankara that were known to scholars such as Nakamura in the first half of 20th-century, were the Vākyapadīya, written by Bhartṛhari (second half 5th century,) and the Māndūkya-kārikā written by Gauḍapāda (7th century). Later scholarship added the Sannyasa Upanishads to the earliest known corpus.
According to Nakamura, "there must have been an enormous number of other writings turned out in this period [between the Brahma Sutras and Shankara], but unfortunately all of them have been scattered or lost and have not come down to us today". In his commentaries, Shankara mentions 99 different predecessors of his Sampradaya. In the beginning of his commentary on the Brhadaranyaka Upanishad Shankara salutes the teachers of the Brahmavidya Sampradaya. Pre-Shankara doctrines and sayings can be traced in the works of the later schools, which does give insight into the development of early Vedānta philosophy.
The names of various important early Vedānta thinkers have been listed in the Siddhitraya by Yamunācārya (c.1050), the Vedārthasamgraha by Rāmānuja (c.1050–1157), and the Yatīndramatadīpikā by Śrīnivāsa-dāsa. Combined, at least fourteen thinkers are known to have existed between the composition of the Brahman Sutras and Shankara's lifetime, namely Bhartŗhari (c.450–500), Upavarsa (c.450–500), Bodhāyana (c.500), Tanka (Brahmānandin) (c.500–550), Dravida (c.550), Bhartŗprapañca (c.550), Śabarasvāmin (c.550), Bhartŗmitra (c.550–600), Śrivatsānka (c.600), Sundarapāndya (c.600), Brahmadatta (c.600–700), Gaudapada (c.640–690), Govinda (c.670–720), Mandanamiśra (c.670–750).
Sannyasa Upanishads
Scholarship after 1950 suggests that almost all Sannyasa Upanishads, which belong to the minor Upanishads and are of a later date than the major Upanishads, namely the first centuries CE, and some of which are of a sectarian nature, have a strong Advaita Vedānta outlook. The Advaita Vedānta views in these ancient texts may be, states Patrick Olivelle, because major Hindu monasteries of this period (early medieaval period, starting mid 6th century) belonged to the Advaita Vedānta tradition, preserving only Advaita views, and recasting other texts into Advaita texts.
Bhartṛhari
Bhartṛhari (Devanagari: ; also romanised as Bhartrihari; fl. c. 5th century CE) is a Sanskrit writer to whom are normally ascribed two influential Sanskrit texts:
the Vākyapadīya, on Sanskrit grammar and linguistic philosophy, a foundational text in the Indian grammatical tradition, explaining numerous theories on the word and on the sentence, including theories which came to be known under the name of Sphoṭa; in this work Bhartrhari also discussed logical problems such as the liar paradox and a paradox of unnameability or unsignfiability which has become known as Bhartrhari's paradox, and
the Śatakatraya, a work of Sanskrit poetry, comprising three collections of about 100 stanzas each; it may or may not be by the same author who composed the two mentioned grammatical works.
Gauḍapāda and
Gauḍapāda (6th century) was the teacher of Govinda Bhagavatpada and the grandteacher of Shankara. Gauḍapāda uses the concepts of Ajātivāda and Maya to establish "that from the level of ultimate truth the world is a cosmic illusion," and "suggests that the whole of our waking experience is exactly the same as an illusory and insubstantial dream." In contrast, Adi Shankara insists upon a distinction between waking experience and dreams.
Mandukya Karika
Gauḍapāda wrote or compiled the , also known as the or the . The is a commentary in verse form on the Māṇḍūkya Upanishad, one of the shortest Upanishads consisting of just 13 prose sentences. Of the ancient literature related to Advaita Vedānta, the oldest surviving complete text is the Māṇḍukya Kārikā. Many other texts with the same type of teachings and which were older than Māṇḍukya Kārikā existed and this is unquestionable because other scholars and their views are cited by Gauḍapāda, Shankara and Anandagiri, according to Hajime Nakamura. Gauḍapāda relied particularly on the Māṇḍūkya Upanishad, as well as the Brihadaranyaka and Chandogya Upanishads.
Gaudapada took over the Yogachara teaching of vijñapti-mātra, "representation-only," which states that the empirical reality that we experience is a fabrication of the mind, experienced by consciousness-an-sich, and the four-cornered negation, which negates any positive predicates of 'the Absolute'. Gaudapada "wove [both doctrines] into the philosophy of Mandukaya Upanisad, which was further developed by Shankara". In this view,
According to Bhattacharya, Asparsayoga also has Buddhist origins.
The Māṇḍūkya Upanishad was considered to be a Śruti before the era of Adi Shankara, but not treated as particularly important. In later post-Shankara period its value became far more important, and regarded as expressing the essence of the Upanishad philosophy. The entire Karika became a key text for the Advaita school in this later era.
Shri Gauḍapādacharya Math
According to tradition, around 740 CE Gauḍapāda founded Shri Gauḍapādacharya Math, also known as . It is located in Kavale, Ponda, Goa, and is the oldest matha of the South Indian Saraswat Brahmins.
Early medieaval period - Maṇḍana Miśra and Adi Shankara
While today Shankara is regarded as the greatest exponent of Advaita Vedanta, until the 10th century his older contemporary Maṇḍana Miśra was the most prominent Advaitin. Shankara gained more attention in the 10th century, due to the writings of Vachaspati Misra (800–900 CE), a student of Maṇḍana Miśra, but it was not until the 14th century that Shankara was promoted as a folk-hero who disseminated Advaita Vedanta throughout India.
Historical context
Maṇḍana Miśra and Shankara lived in the time of the so-called "Late classical Hinduism", which lasted from 650 to 1100. This era was one of political instability that followed Gupta dynasty and King Harsha of the 7thcentury. It was a time of social and cultural change as the ideas of Buddhism, Jainism, and various traditions within Hinduism were competing for members. Buddhism in particular influenced India's spiritual traditions in the first 700 years of the 1st millennium AD. Shankara and his contemporaries made a significant contribution in understanding Buddhism and the ancient Vedic traditions; they then incorporated the extant ideas, particularly reforming the Vedānta tradition of Hinduism, making it India's most important tradition for more than a thousand years.
Maṇḍana Miśra
Maṇḍana Miśra was an older contemporary of Shankara. Maṇḍana Miśra was a Mimamsa scholar and a follower of Kumarila, but also wrote a seminal text on Advaita that has survived into the modern era, the Brahma-siddhi. His influence was such that some regard the Brahma-siddhi to have "set forth a non-Shankaran brand of Advaita," and for a couple of centuries he seems to have been regarded as "the most important representative of the Advaita position." The "theory of error" set forth in this work became the normative Advaita Vedānta theory of error. According to Maṇḍana Miśra, errors are opportunities because they "lead to truth", and full correct knowledge requires that not only should one understand the truth but also examine and understand errors as well as what is not truth.
Maṇḍana Miśra's influence is reflected in a tradition which tells Maṇḍana Miśra and his wife were defeated by Shankara in a debate, after which he became a follower of Shankara. Yet, his attitude toward Shankara was that of a "self-confident rival teacher of Advaita," and the legend may have intended to incorporate Maṇḍana Miśra into Shankara's fold.
Adi Shankara
Advaita Vedānta existed prior to Adi Shankara (788–820), also known as and , but found in him its most influential expounder.
Systematizer of Advaita Vedanta thought
According to Nakamura, comparison of the known teachings of the early Vedantins and Shankara's thought shows that most of the characteristics of Shankara's thought "were advocated by someone before Śankara". Shankara "was the person who synthesized the Advaita-vāda which had previously existed before him". In this synthesis, he was the rejuvenator and defender of ancient learning. He was an unequalled commentator, due to whose efforts and contributions the Advaita Vedānta assumed a dominant position within Indian philosophy.
According to Mayeda, Shankara represents a turning point in the development of Vedānta, yet he also notices that it is only since Deussens's praise that Shankara "has usually been regarded as the greatest philosopher of India." Mayeda further notes that Shankara was primarily concerned with moksha, "and not with the establishment of a complete system of philosophy or theology," following Potter, who qualifies Shankara as a "speculative philosopher." According to Nakamura, after the growing influence of Buddhism on Vedānta, culminating in the works of Gauḍapāda, Adi Shankara gave a Vedantic character to the Buddhistic elements in these works, synthesising and rejuvenating the doctrine of Advaita. According to Koller, using ideas in ancient Indian texts, Shankara systematized the foundation for Advaita Vedānta in the 8th century, reforming Badarayana's Vedānta tradition.
Writings
Adi Shankara is best known for his reviews and commentaries (Bhasyas) on ancient Indian texts. Shankara's masterpiece of commentary is the Brahmasutrabhasya (literally, commentary on Brahma Sutra), a fundamental text of the Vedānta school of Hinduism. His commentaries on ten Mukhya (principal) Upanishads are also considered authentic by scholars. Other authentic works of Shankara include commentaries on the Bhagavad Gitā (part of his Prasthana Trayi Bhasya).
Shankara's Vivarana (tertiary notes) on the commentary by Vedavyasa on Yogasutras as well as those on Apastamba Dharma-sũtras (Adhyatama-patala-bhasya) are accepted by scholars as authentic works of Adi Shankara. Among the Stotra (poetic works), the Daksinamurti Stotra, Bhajagovinda Stotra, Sivanandalahari, Carpata-panjarika, Visnu-satpadi, Harimide, Dasa-shloki, and Krishna-staka are likely to be authentic. He also authored Upadesasahasri, his most important original philosophical work. Of other original Prakaranas (प्रकरण, monographs, treatise), 76 works are attributed to Adi Shankara. Modern era Indian scholars Belvalkar and Upadhyaya accept five and thirty nine works, respectively, as authentic.
Several commentaries on Nrisimha-Purvatatapaniya and Shveshvatara Upanishads have been attributed to Adi Shankara, but their authenticity is highly doubtful. Similarly, commentaries on several early and later Upanishads attributed to Shankara are rejected by scholars as his works, and are likely works of later Advaita Vedānta scholars; these include the Kaushitaki Upanishad, Maitri Upanishad, Kaivalya Upanishad, Paramahamsa Upanishad, Sakatayana Upanishad, Mandala Brahmana Upanishad, Maha Narayana Upanishad, and Gopalatapaniya Upanishad.
The authenticity of Shankara being the author of has been questioned, and "modern scholars tend to reject its authenticity as a work by Shankara." The authorship of Shankara of his Mandukya Upanishad Bhasya and his supplementary commentary on Gaudapada's has been disputed by Nakamura. However, other scholars state that the commentary on Mandukya, which is actually a commentary on Madukya-Karikas by Gaudapada, may be authentic.
Influence of Shankara
Shankara's status in the tradition of Advaita Vedānta is unparallelled. According to his hagiographies, written in te 14th-17th century and which shaped the popular reception of Shankara, he travelled all over India to help restore the study of the Vedas. His teachings and the tradition attributed to him form the basis of Smartism and have influenced Sant Mat lineages. He's further believed to have introduced the form of worship, the simultaneous worship of five deitiesGanesha, Surya, Vishnu, Shiva, and Devi. Shankara explained that all deities were but different forms of the one Brahman, the invisible Supreme Being.
Benedict Ashley credits Adi Shankara for unifying two seemingly disparate philosophical doctrines in Hinduism, namely Atman and Brahman. Isaeva states that Shankara's influence extended to reforming Hinduism, founding monasteries, edifying disciples, disputing opponents, and engaging in philosophic activity that, in the eyes of Indian tradition, helped revive "the orthodox idea of the unity of all beings" and Vedānta thought.
Scholars have questioned Shankara's early influence in India. The historical records for this period are unclear, and little reliable information is known about the various contemporaries and disciples of Shankara. According to King and Roodurmun, until the 10th century Shankara was overshadowed by his older contemporary Mandana-Misra, who was considered to be the major representative of Advaita. Some modern Advaitins argue that most of post-Shankara Advaita vedanta actually deviates from Shankara, and that only his student Suresvara, who's had little influence, represents Shankara correctly. In this view, Shankara's influential student Padmapada misunderstood Shankara, while his views were manitained by the Suresvara school. According to Satchidanandendra Sarasvati, "almost all the later Advaitins were influenced by Mandana Misra and Bhaskara."
Until the 11th century, Vedanta itself was a peripheral school of thought; Vedanta became a major influence when Vedanta philosophy was utilized by various sects of Hinduism to ground their doctrines, such as Ramanuja (11th c.), who aligned bhakti, "the major force in the religions of Hinduism," with philosophical thought, meanwhile rejecting Shankara's views.
Several scholars argue that the historical fame and cultural influence of Shankara grew centuries later, particularly during the era of the Muslim invasions and consequent devastation of India. Many of Shankara's biographies were created and published in and after the 14th century, such as the widely cited Vidyaranya's Śankara-vijaya. Vidyaranya, also known as Madhava, who was the 12th Jagadguru of the Śringeri Śarada Pītham from 1380 to 1386, inspired the re-creation of the Hindu Vijayanagara Empire of South India in response to the devastation caused by the Islamic Delhi Sultanate. He and his brothers, suggest Paul Hacker and other scholars, wrote about Śankara as well as extensive Advaitic commentaries on the Vedas and Dharma. Vidyaranya was a minister in the Vijayanagara Empire and enjoyed royal support, and his sponsorship and methodical efforts helped establish Shankara as a rallying symbol of values, spread historical and cultural influence of Shankara's Vedānta philosophies, and establish monasteries (mathas) to expand the cultural influence of Shankara and Advaita Vedānta.
Advaita Vedānta sub-schools
After Maṇḍana Miśra and Shankara, several sub-schools developed. Two of them still exist today, the Bhāmatī and the Vivarana. Two defunct schools are the Pancapadika and Istasiddhi, which were replaced by Prakasatman's Vivarana school. These schools worked out the logical implications of various Advaita doctrines. Two of the problems they encountered were the further interpretations of the concepts of māyā and avidya.
Sureśvara
Sureśvara (fl. 800–900 CE) was a contemporary of Shankara. Sureśvara has been credited as the founder of a pre-Shankara branch of Advaita Vedānta, and is often (incorrectly) being identified with Maṇḍana Miśra. The identification is unlikely, and may reflect the influence of Mandana Misra. Hiriyanna and Kuppuswami Sastra have pointed out that Sureśvara and Maṇḍana Miśra had different views on various doctrinal points:
The locus of avidya: according to Maṇḍana Miśra, the individual jiva is the locus of avidya, whereas Suresvara contends that the avidya regarding Brahman is located in Brahman. These two different stances are also reflected in the opposing positions of the Bhamati school and the Vivarana school.
Liberation: according to Maṇḍana Miśra, the knowledge that arises from the Mahavakya is insufficient for liberation. Only the direct realization of Brahma is liberating, which can only be attained by meditation. According to Suresvara, this knowledge is directly liberating, while meditation is at best a useful aid.
Padmapada – Pancapadika school
Padmapada (c. 800 CE) was a direct disciple of Shankara who wrote the Pancapadika, a commentary on the Sankara-bhaya. Padmapada diverged from Shankara in his description of avidya, designating prakrti as avidya or ajnana.
Vachaspati Misra – Bhamati school
Vachaspati Misra (800–900 CE), a student of Maṇḍana Miśra, wrote the Brahmatattva-samiksa, a commentary on Maṇḍana Miśra's Brahma-siddhi, wrote the Bhamati, a commentary on Shankara's Brahma Sutra Bhashya, and the Brahmatattva-samiksa, a commentary on Mandana Mishra's Brahma-siddhi. His thought was mainly inspired by Mandana Miśra, and harmonises Shankara's thought with that of Mandana Miśra. According to Advaita tradition, Shankara reincarnated as Vachaspati Miśra "to popularise the Advaita System through his Bhamati." Only two works are known of Vachaspati Misra, the Brahmatattva-samiksa on Maṇḍana Miśra's Brahma-siddhi, and his Bhamati on the Sankara-bhasya, Shankara's commentary on the Brahma-sutras. The name of the Bhamati sub-school is derived from this Bhamati.
The Bhamati school takes an ontological approach. It sees the Jiva as the source of avidya. It sees meditation as the main factor in the acquirement of liberation, while the study of the Vedas and reflection are additional factors.
Vimuktatman – Ista-Siddhi
Vimuktatman (c. 1200 CE) wrote the Ista-siddhi. It is one of the four traditional siddhi, together with Mandana's Brahma-siddhi, Suresvara's Naiskarmya-siddhi, and Madusudana's Advaita-siddhi. According to Vimuktatman, absolute Reality is "pure intuitive consciousness". His school of thought was eventually replaced by Prakasatman's Vivarana school.
Prakasatman – Vivarana school
Prakasatman (c. 1200–1300) wrote the Pancapadika-Vivarana, a commentary on the Pancapadika by Padmapadacharya. The Vivarana lends its name to the subsequent school. According to Roodurmum, "[H]is line of thought [...] became the leitmotif of all subsequent developments in the evolution of the Advaita tradition."
The Vivarana school takes an epistemological approach. Prakasatman was the first to propound the theory of mulavidya or maya as being of "positive beginningless nature", and sees Brahman as the source of avidya. Critics object that Brahman is pure consciousness, so it cannot be the source of avidya. Another problem is that contradictory qualities, namely knowledge and ignorance, are attributed to Brahman.
Late medieval times – "yogic Advaita" and "Greater Advaita Vedānta"
Michael S. Allen and Anand Venkatkrishnan note that Shankara is very well-studied, but "scholars have yet to provide even a rudimentary, let alone comprehensive account of the history of Advaita Vedānta in the centuries leading up to the colonial period."
Prominent teachers
According to Sangeetha Menon, prominent names in the later Advaita tradition are:
Prakāsātman, Vimuktātman, Sarvajñātman (10th century)(see above)
Śrī Harṣa, Citsukha (12th century)
ānandagiri, Amalānandā (13th century)
Vidyāraņya, Śaṅkarānandā (14th century)
Sadānandā (15th century)
Prakāṣānanda, Nṛsiṁhāśrama (16th century)
Madhusūdhana Sarasvati, Dharmarāja Advarindra, Appaya Dīkśita (17th century)
Vaishnavite Vedanta (10th-14th century)
Hajime Nakamura notes that the early Vedanta scholars were from the upper classes of society, well-educated in traditional culture. They formed a social elite, "sharply distinguished from the general practitioners and theologians of Hinduism." Their teachings were "transmitted among a small number of selected intellectuals". Works of the early Vedanta schools do not contain references to Vishnu or Shiva. It was only after Shankara that "the theologians of the various sects of Hinduism utilized Vedanta philosophy to a greater or lesser degree to form the basis of their doctrines," whereby "its theoretical influence upon the whole of Indian society became final and definitive."
Influence of yogic tradition
While indologists like Paul Hacker and Wilhelm Halbfass took Shankara's system as the measure for an "orthodox" Advaita Vedānta, the living Advaita Vedānta tradition in medieval times was influenced by, and incorporated elements from, the yogic tradition and texts like the Yoga Vasistha and the Bhagavata Purana. The Yoga Vasistha became an authoritative source text in the Advaita vedānta tradition in the 14th century, while the "yogic Advaita" of Vidyāraņya's Jivanmuktiviveka (14th century) was influenced by the (Laghu-)Yoga-Vasistha, which in turn was influenced by Kashmir Shaivism. Vivekananda's 19th century emphasis on nirvikalpa samadhi was preceded by medieval yogic influences on Advaita Vedānta. In the 16th and 17th centuries, some Nath and hatha yoga texts also came within the scope of the developing Advaita Vedānta tradition.
Development of central position (14th century)
In medieval times, Advaita Vedanta position as most influential Hindu darsana started to take shape, as Advaitins in the Vijayanagara Empire competed for patronage from the royal court, and tried to convert others to their sect. It is only during this period that the historical fame and cultural influence of Shankara and Advaita Vedanta was established. Many of Shankara's biographies were created and published in and after the 14th century, such as Vidyaranya's widely cited Śankara-vijaya. Vidyaranya, also known as Madhava, who was the 12th Jagadguru of the Śringeri Śarada Pītham from 1380 to 1386 and a minister in the Vijayanagara Empire, inspired the re-creation of the Hindu Vijayanagara Empire of South India. This may have been in response to the devastation caused by the Islamic Delhi Sultanate, but his efforts were also targeted at Srivaisnava groups, especially Visistadvaita, which was dominant in territories conquered by the Vijayanagara Empire. Furthermore, sects competed for patronage from the royal court, and tried to convert others to their own sectarian system. Vidyaranya and his brothers, note Paul Hacker and other scholars, wrote extensive Advaitic commentaries on the Vedas and Dharma to make "the authoritative literature of the Aryan religion" more accessible. Vidyaranya was an influential Advaitin, and he created legends to turn Shankara, whose elevated philosophy had no appeal to gain widespread popularity, into a "divine folk-hero who spread his teaching through his digvijaya ("universal conquest") all over India like a victorious conqueror." In his doxography Sarvadarśanasaṅgraha ("Summary of all views") Vidyaranya presented Shankara's teachings as the summit of all darsanas, presenting the other darsanas as partial truths which converged in Shankara's teachings, which was regarded to be the most inclusive system. The Vaishanava traditions of Dvaita and Visitadvaita were not classified as Vedanta, and placed just above Buddhism and Jainism, reflecting the threat they posed for Vidyaranya's Advaita allegiance. Bhedabheda wasn't mentioned at all, "literally written out of the history of Indian philosophy." Such was the influence of the Sarvadarśanasaṅgraha, that early Indologists also regarded Advaita Vedanta as the most accurate interpretation of the Upanishads. And Vidyaranya founded a matha, proclaiming that it was established by Shankara himself. Vidyaranya enjoyed royal support, and his sponsorship and methodical efforts helped establish Shankara as a rallying symbol of values, spread historical and cultural influence of Shankara's Vedānta philosophies, and establish monasteries (mathas) to expand the cultural influence of Shankara and Advaita Vedānta.
It is with the arrival of Islamic rule, first in the form of Delhi Sultanate and later the Mughal Empire, and the subsequent persecution of Indian religions, that Hindu scholars began a self-conscious attempts to define an identity and unity. Between the twelfth and the fourteenth century, according to Andrew Nicholson, this effort emerged with a classification of astika and nastika systems of Indian philosophies. Certain thinkers, according to Nicholson, began to retrospectively classify ancient thought into "six systems" (saddarsana) of mainstream Hindu philosophy.
Traditional Hindus present an alternate thesis. The scriptures such as the Vedas, Upanishads and Bhagavad Gitā, texts such as Dharmasutras and Puranas, and various ideas that are considered to be paradigmatic Hinduism are traceable to being thousands of years old. Unlike Christianity and Islam, Hinduism as a religion does not have a single founder, rather it is a fusion of diverse scholarship where a galaxy of thinkers openly challenged each other's teachings and offered their own ideas. The term "Hindu," states Arvind Sharma, appears in much older texts such as those in Arabic that record the Islamic invasion or regional rule of the Indian subcontinent. Some of these texts have been dated to between the 8th and the 11th century.
Modern times (colonial rule and independence)
Neo-Vedanta
King states that its present position was a response of Hindu intellectuals to centuries of Christian polemic aimed at establishing a "Hindu inferiority complex" during the colonial rule of the Indian subcontinent. The "humanistic, inclusivist" formulation, now called Neo-Vedānta, attempted to respond to this colonial stereotyping of "Indian culture was backward, superstitious and inferior to the West", states King. Advaita Vedānta was projected as the central philosophy of Hinduism, and Neo-Vedānta subsumed and incorporated Buddhist ideas thereby making the Buddha a part of the Vedānta tradition, all in an attempt to reposition the history of Indian culture. Thus, states King, neo-Vedānta developed as a reaction to western Orientalism and Perennialism. With the efforts of Vivekananda, modern formulations of Advaita Vedānta have "become a dominant force in Indian intellectual thought", though Hindu beliefs and practices are diverse.
According to King, with the consolidation of the British imperialist rule the new rulers started to view Indians through the "colonially crafted lenses" of Orientalism. In response Hindu nationalism emerged, striving for socio-political independence and countering the influence of Christian missionaries. In this colonial era search of identity Vedānta came to be regarded, both by westerners as by Indian nationalists, as the essence of Hinduism, and Advaita Vedānta came to be regarded as "then paradigmatic example of the mystical nature of the Hindu religion" and umbrella of "inclusivism". This view on Advaita Vedānta, according to King, "provided an opportunity for the construction of a nationalist ideology that could unite Hindus in their struggle against colonial oppression".
Among the colonial era intelligentsia, according to Anshuman Mondal, a professor of Literature specializing in post-colonial studies, the monistic Advaita Vedānta has been a major ideological force for Hindu nationalism. Mahatma Gandhi professed monism of Advaita Vedānta, though at times he also spoke with terms from mind-body dualism schools of Hinduism. Other colonial era Indian thinkers, such as Vivekananda, presented Advaita Vedānta as an inclusive universal religion, a spirituality that in part helped organize a religiously infused identity, and the rise of Hindu nationalism as a counter weight to Islam-infused Muslim communitarian organizations such as the Muslim League, to Christianity-infused colonial orientalism and to religious persecution of those belonging to Indian religions.
Swami Vivekananda
A major proponent in the popularisation of this Universalist and Perennialist interpretation of Advaita Vedānta was Swami Vivekananda, who played a major role in the revival of Hinduism, and the spread of Advaita Vedānta to the west via the Ramakrishna Mission. His interpretation of Advaita Vedānta has been called "Neo-Vedānta". Vivekananda discerned a universal religion, regarding all the apparent differences between various traditions as various manifestations of one truth. He presented karma, bhakti, jnana and raja yoga as equal means to attain moksha, to present Vedānta as a liberal and universal religion, in contrast to the exclusivism of other religions.
Vivekananda emphasised nirvikalpa samadhi as the spiritual goal of Vedānta, he equated it to the liberation in Yoga and encouraged Yoga practice he called Raja yoga. This approach, however, is missing in historic Advaita texts. In 1896, Vivekananda claimed that Advaita appeals to modern scientists:
According to Rambachan, Vivekananda interprets anubhava as to mean "personal experience", akin to religious experience, whereas Shankara used the term to denote liberating understanding of the sruti.
Vivekananda's claims about spirituality as "science" and modern, according to David Miller, may be questioned by well informed scientists, but it drew attention for being very different than how Christianity and Islam were being viewed by scientists and sociologists of his era.
Sarvepalli Radhakrishnan
Sarvepalli Radhakrishnan, first a professor at Oxford University and later a President of India, further popularized Advaita Vedānta, presenting it as the essence of Hinduism. According to Michael Hawley, a professor of Religious Studies, Radhakrishnan saw other religions, as well as "what Radhakrishnan understands as lower forms of Hinduism," as interpretations of Advaita Vedānta, thereby "in a sense Hindusizing all religions". To him, the world faces a religious problem, where there is unreflective dogmatism and exclusivism, creating a need for "experiential religion" and "inclusivism". Advaita Vedānta, claimed Radhakrishnan, best exemplifies a Hindu philosophical, theological, and literary tradition that fulfills this need. Radhakrishnan did not emphasize the differences between Buddhism, Jainism, Sikhism versus Hinduism that he defined in terms of Advaita Vedānta, rather he tended to minimize their differences. This is apparent, for example, in his discussions of Buddhist "Madhyamika and Yogacara" traditions versus the Advaita Vedānta tradition.
Radhakrishnan metaphysics was grounded in Advaita Vedānta, but he reinterpreted Advaita Vedānta for contemporary needs and context. He acknowledged the reality and diversity of the world of experience, which he saw as grounded in and supported by the transcendent metaphysical absolute concept (nirguna Brahman). Radhakrishnan also reinterpreted Shankara's notion of maya. According to Radhakrishnan, maya is not a strict absolute idealism, but "a subjective misperception of the world as ultimately real."
Mahatama Gandhi
Gandhi declared his allegiance to Advaita Vedānta, and was another popularizing force for its ideas. According to Nicholas Gier, this to Gandhi meant the unity of God and humans, that all beings have the same one Self and therefore equality, that atman exists and is same as everything in the universe, ahimsa (non-violence) is the very nature of this atman. Gandhi called himself advaitist many times, including his letters, but he believed that others have a right to a viewpoint different than his own because they come from a different background and perspective. According to Gier, Gandhi did not interpret maya as illusion, but accepted that "personal theism" leading to "impersonal monism" as two tiers of religiosity.
Contemporary Advaita Vedānta
Contemporary teachers are the orthodox Jagadguru of Sringeri Sharada Peetham; the more traditional teachers Sivananda Saraswati (1887–1963), Chinmayananda Saraswati (1916-1993), Dayananda Saraswati (Arsha Vidya) (1930-2015), Swami Paramarthananda, Swami Tattvavidananda Sarasvati, Carol Whitfield (Radha), Sri Vasudevacharya (previously Michael Comans) and less traditional teachers such as Narayana Guru. According to Sangeetha Menon, prominent names in 20th century Advaita tradition are Shri Chandrashekhara Bharati Mahaswami, Chandrasekharendra Saraswati Swamigal, Sacchidānandendra Saraswati.
Influence on New religious movements
Neo-Advaita
Neo-Advaita is a New Religious Movement based on a popularised, western interpretation of Advaita Vedānta and the teachings of Ramana Maharshi. Neo-Advaita is being criticised for discarding the traditional prerequisites of knowledge of the scriptures and "renunciation as necessary preparation for the path of jnana-yoga". Notable neo-advaita teachers are H. W. L. Poonja, his students Gangaji Andrew Cohen, and Eckhart Tolle.
Non-dualism
Advaita Vedānta has gained attention in western spirituality and New Age, where various traditions are seen as driven by the same non-dual experience. Nonduality points to "a primordial, natural awareness without subject or object". It is also used to refer to interconnectedness, "the sense that all things are interconnected and not separate, while at the same time all things retain their individuality".
See also
History of India
History of Hinduism
History of Buddhism
Buddhist influences on Advaita Vedanta
Notes
References
Sources
Printed sources
Web-sources
Further reading
T. M. P. Mahadevan, Preceptors of Advaita, 1968
External links
Bibliography of Advaita Vedānta Ancient to 9th-century literature
Bibliography of Advaita Vedānta 9th-century to 20th-century literature
Advaita Vedanta |
528787 | https://en.wikipedia.org/wiki/Qt%20Extended | Qt Extended | Qt Extended (named Qtopia before September 30, 2008) is an application platform for embedded Linux-based mobile computing devices such as personal digital assistants, video projectors and mobile phones. It was initially developed by Qt Software, a subsidiary of Nokia. When they cancelled the project the free software portion of it was forked by the community and given the name Qt Extended Improved. The QtMoko Debian-based distribution is the natural successor to these projects as continued by the efforts of the Openmoko community.
Features
Qt Extended features:
Windowing system
Synchronization framework
Integrated development environment
Internationalization and localization support
Games and multimedia
Personal information manager applications
Full screen handwriting
Input methods
Personalization options
Productivity applications
Internet applications
Java integration
Wireless support
Qt Extended is dual licensed under the GNU General Public License (GPL) and proprietary licenses.
Devices and deployment
As of 2006, Qtopia was running on several million devices, including 11 mobile phone models and 30 other handheld devices.
Models included the Sharp Corporation Zaurus line of Linux handhelds, the Sony mylo, the Archos Portable Media Assistant (PMA430) (a multimedia device), the GamePark Holdings GP2X, Greenphone (an open phone initiative), Pocket PC, FIC Openmoko phones: Neo 1973 and FreeRunner. An unofficial hack allows its use on the Archos wifi series of portable media players (PMP) 604, 605, 705, and also on several Motorola phones such as E2, Z6 and A1200. The U980 of ZTE is the last phone running it.
Software development
Native applications could be developed and compiled using C++. Managed applications could be developed in Java.
Discontinuation
On March 3, 2009, Qt Software announced the discontinuation of Qt Extended as a standalone product, with some features integrated on the Qt Framework.
Qt Extended Improved
The Openmoko community has forked the final stable release into Qt Extended Improved (later renamed to QtMoko) which, like its predecessor, is an application platform for embedded Linux-based mobile computing devices such as personal digital assistants, video projectors and mobile phones dual licensed under the GNU General Public License (GPL) and proprietary licenses.
Qt Extended Improved can run on several mobile devices, most notably the Openmoko phones: Neo 1973 and FreeRunner.
Other mobile operating systems
Access Linux Platform
Android
iOS
MeeGo
Nucleus RTOS
Openmoko Linux
Palm webOS
Symbian
Tizen
Windows Mobile
References
External links
Qt Extended Whitepaper from Qt Software
Embedded Linux
Mobile Linux
Mobile software
Openmoko
Personal digital assistant software
Software forks
Software that uses Qt |
4422316 | https://en.wikipedia.org/wiki/Earthbound%20%28Space%3A%201999%29 | Earthbound (Space: 1999) | "Earthbound" is the fourteenth episode of the first series of Space: 1999. The screenplay was written by Anthony Terpiloff; the director was Charles Crichton. The final shooting script is undated. Live-action filming took place Friday 15 March 1974 through Monday 1 April 1974.
Story
Gerald Simmonds, former executive of the World Space Commission, stands at a window in John Koenig's office, staring into space. Ignoring the proceedings of the weekly command conference he attends, the politician broods over his current situation: hurtling through space on the runaway Moon, trapped when the atomic explosion of September 13, 1999 rocketed them out of Earth orbit. Unwilling to accept life on Alpha, the Commissioner is disliked by the entire community. Worse, he still behaves like a visiting dignitary, though bereft of any true authority.
As the meeting adjourns, Simmonds turns from the window and without warning lambastes the senior executives, expressing his disgust at their complacent attitude. Rather than congratulating themselves on how well everyone is coming to terms with life in space, Simmonds insists they should focus on locating and returning to Earth. Koenig refuses to encourage false hope for a task that is scientifically impossible. Simmonds rebuts that, in his experience as a politician, he has observed the 'impossible' takes just a little longer.
The debate is interrupted by a call from Main Mission; an unidentified powered object is approaching the Moon. Computer confirms the vehicle is manned—and on course to enter into an orbit which will carry it directly over Moonbase Alpha. With no reply to their hailing signals, Koenig deploys Eagles One and Two to intercept the alien craft. As they approach, Alan Carter notes that the spacecraft's flight vector is unstable. Rather than achieving orbit, it tumbles toward the Moon surface. At the last moment, landing rockets fire and the vessel softly impacts a short distance from the Moonbase perimeter.
Rejecting Simmonds' attempt to accompany them, Koenig and the crash unit fly to the alien ship. Rescue Eagle Seven touches down next to the silent vessel, docking at what appears to be an entry hatch. Due to the hull's dense molecular structure, Victor Bergman's instruments can gather little information. The team manages to locate and trigger the hatch's opening mechanism and cautiously enter the dimly-lit interior. Surrounding a central column are six free-standing transparent caskets—each containing a motionless humanoid form.
The occupants appear to be in a state of suspended animation. When their instruments register no sign of any metabolic activity, the Alphans consider the possibility the aliens were killed in the crash. Koenig authorises Helena Russell to perform a direct examination. As soon as the doctor begins drilling into a casket, she is blinded by a sudden flare of energy from within and to her horror, the occupant is reduced to ashes. Responding to this destructive act, the central column pulses with light. The remaining five aliens revive, emerging from their hibernacula. Standing nearly seven feet tall, they silently surround Koenig and company.
The leader stoically examines the remains of his comrade, then turns to face the nervous Alphans. Koenig and Helena offer sincere apologies, stating they only violated the seal after the equipment indicated the absence of life. Still silent, the leader extends his hand to Helena, drawing her and the others into a ritualistic circle around their dead companion. During this, Simmonds has been impatiently observing from Main Mission. While he complains over the slow progress of events, Koenig calls in. He orders a crash unit placed on stand-by while the aliens fly their ship over to Alpha.
Landing safely, Koenig escorts the alien contingent into Moonbase. After rudely pushing his way through a throng of curious onlookers, Simmonds is presented to Zantor, captain of the Kaldorian expedition. As the ranking Earth official, the Commissioner assures Zantor those responsible for the death of his crewmember will be brought to account. The alien captain phlegmatically states that the accident was the result of ignorance rather than malice and that Judicial revenge is unnecessary.
Meeting with Koenig and his advisors, the Kaldorians offer the Alphans a token of peace from their home world—the gold-filled eggs of the Libra bird. Zantor explains that they are the product of an ancient and pacifistic culture. With their planet dying, their people dispatched survival ships to every known habitable planet. Bound for Earth, Zantor and his party have travelled for 350 years in stasis. Their ship was programmed to orbit the Moon, allowing the occupants to reanimate before the final descent to Earth. Complications arising from the Moon's extreme change in position led to the crash.
As their computers can calculate a new course to Earth, Zantor announces his decision to continue on. If welcome, the Kaldorians will settle on Earth; if not, they will take their own lives. Helena offers to examine the aliens to determine if they are medically compatible with life on Earth. After they exit, Simmonds comments to himself that the impossible may not take as long as expected. To Koenig's disgust, the politician suggests disposing of the peaceful Kaldorians and seizing their vessel to return home.
Helena's staff conducts a thorough examination of the aliens. As they wait for Computer to process the data, Helena and Zantor discuss the Kaldorian suspension process. Cryogenic freezing, he says, is inadequate to suspend life; their system creates a cycle of accelerated energy which holds all the body's cells in stasis. Taking her hand, Zantor comments her beauty would be enhanced by the peace of suspended animation. Though respectful, his interest in the doctor is clearly more than platonic. The moment is interrupted by Computer's analysis: the Kaldorians are sufficiently human to exist on Earth.
Helena escorts her admirer to the Eagle maintenance hangar, where the Kaldorian ship has been installed. Zantor expresses his wish to complete repairs and depart within twenty hours. Should Koenig permit them to proceed, the captain offers the now-vacant berth on his vessel to one of the Alphans. Koenig orders Helena and Bergman to verify that the stasis procedure is safe for a human being. As the Commander leaves the ship, he is stalked by Simmonds, who repeats his earlier proposal. Refusing to betray the Kaldorians, Koenig plans to accept Zantor's offer. The computer will be programmed to select one person to go home.
Later, there is an emergency call from the spaceship. Koenig is shocked to find Helena lying in one of the stasis chambers. Unwilling to risk anyone else's life, the doctor insisted on testing the procedure herself. Since two attempts to reverse the process have failed, the Alphans believe she is dead. Zantor insists Helena is in suspended animation, but at more intense a level than is suitable for the human body. Reanimation from such a deep sleep, he admits, may result in brain damage. Concerned for her well-being, the alien captain makes a final attempt to revive her. While Koenig watches anxiously, her eyes open in a blank stare. To his relief, she then focuses on him and they exchange loving smiles.
Later, David Kano presents Koenig with Computer's selection for the return to Earth, there are three suitable candidates. Even though the journey will take seventy-five years, the staff is excited at the prospect of someone going home. In private, Simmonds criticises Koenig for permitting a machine to make this decision. The Commissioner then selfishly proclaims himself to be the obvious choice; he serves no useful purpose on Alpha. Though Koenig would love nothing more than to be rid of the insufferable politician, he insists the choice will be objective.
The confrontation is interrupted by the arrival of Zantor. With repairs completed, the alien has come to make his farewells, inquiring who has been selected for the journey. Koenig asks Helena and Bergman for a final verdict on the stasis procedure. Having grasped the basic principles, they declare it safe for human use. The key is the alien computer having a complete matrix of the individual; should someone other than Helena go, one specific matrix for that person must be made. The launch countdown begins, and Koenig orders Kano to have Computer make the final selection.
Simmonds has decided his fate will not be decided by Koenig's lottery. After secretly swapping commlocks with the Commander, he slips away unnoticed. Now with unlimited access provided by the command commlock, he obtains a stun-gun and proceeds to the Main Power Unit. Upon discovering the switch, Koenig orders the command commlock cancelled—but not before the conniving politician has shot the sentries and entered the restricted area.
Inside, Simmonds stuns all but one operative, then forces the man to remove a key component from the main converter assembly. Power instantly fails throughout the base. When Koenig calls for the Commissioner's surrender, Simmonds announces the converter is his hostage. Unless he is given the vacant berth, Moonbase will freeze over and everyone will die. Koenig has no choice but to concede to Simmonds' demands. With the lives of the entire community at stake, Zantor agrees. The noble Kaldorian becomes Simmonds' new hostage in exchange for the converter.
After power is restored, Simmonds and his captive depart, the Kaldorian giving Helena a wistful farewell gaze before being led away at gunpoint. Once aboard the ship, Zantor directs Simmonds to his travel position. The suspicious politician, unaware that a personalised matrix of his body still needs to be compiled, insists the alien captain enter his chamber first. Eyeing the Commissioner's weapon, a silent Zantor does as he is told. With the six travellers in place, the ship blasts off for Earth.
A few hours later, Main Mission receives a signal from the Kaldorian ship. It is Simmonds. He is calling Earth, believing the seventy-five-year voyage to be over. The staff is puzzled by the premature awakening. Did Simmonds not allow a matrix to be compiled? Or is this Zantor's version of justice? On the ship, Simmonds sits up in his chamber, irritated by the lack of response. He calls up the time on his comlink and is horrified to see that only two hours forty-eight minutes have elapsed since take-off.
Panicked, he thrashes around in his chamber, screaming for help. With the Kaldorian ship well beyond Eagle range, Koenig can do nothing. Simmonds' desperate pleas to his fellow travellers—still in suspended animation—are also wasted. After throwing his body against the unyielding walls of the stasis chamber, the politician finally collapses in what will be his coffin.
On Alpha, Koenig and Helena reflect on the tragic irony of the situation when the Commander reveals Computer's final choice for the voyage home: Simmonds.
Cast
Starring
Martin Landau — Commander John Koenig
Barbara Bain — Doctor Helena Russell
Also starring
Barry Morse — Professor Victor Bergman
Guest artist
Roy Dotrice — Commissioner Gerald Simmonds
Special guest star
Christopher Lee — Captain Zantor
Featuring
Prentis Hancock — Controller Paul Morrow
Clifton Jones — David Kano
Zienia Merton — Sandra Benes
Anton Phillips — Doctor Bob Mathias
Nick Tate — Captain Alan Carter
Uncredited artists
Suzanne Roquette — Tanya
Andrew Dempsey — Main Mission Operative
Tony Allyn — Security Guard One (Tony)
Quentin Pierre — Security Guard Two
Barbara Kelly — Computer Voice
Music
The score was re-edited from previous Space: 1999 incidental music tracks composed for the first series by Barry Gray and draws primarily from "Breakaway" and "Black Sun".
Production notes
Christopher Lee had recently completed his role as million-dollar assassin Francisco Scaramanga in the ninth James Bond film The Man With the Golden Gun when he came aboard as the noble alien Captain Zantor. Lee was famous on both sides of the Atlantic for his portrayal of the Frankenstein monster and Count Dracula in his many Hammer Films appearances. In recent years, Lee has played the wizard Saruman in Peter Jackson's The Lord of the Rings film trilogy and the villainous Count Dooku in George Lucas' Star Wars prequels Star Wars: Episode II – Attack of the Clones and Star Wars: Episode III – Revenge of the Sith. Lee passed away in 2015 at the age of 93.
Production designer Keith Wilson was responsible for the hair, makeup and costume design for the first series. When creating the Kaldorians, Wilson envisioned the bridges of their noses being built up with appliances to render a flat plane from nose to forehead. Christopher Lee objected to the uncomfortable makeup—especially when its removal also removed a layer of skin from the involved area. This was also the first time Lee, standing six feet four inches tall, was asked to stand on an 'apple box' to increase his height: the aliens were envisioned as being at least six-foot-six.
Responding to complaints from directors and cameramen regarding the difficulty they experienced shooting on the Main Mission set, Wilson made a major modification prior to this episode. Originally, the set was designed with a platform running along three sides, giving the operations area a 'sunken' effect. The platform and steps were removed from one side, opposite the computer-bank wall. The four windows there were placed on the studio floor and, being 'wild' (i.e. movable), allowed for greater camera access. Wilson also broke up the tight formation of desks, improving the traffic flow through the room.
Novelization
The character of Commissioner Simmonds was killed off by E. C. Tubb in the first Space: 1999 novel Breakaway. As author Brian Ball was unable to rework the story without the scheming politician, "Earthbound" was withdrawn from its intended place in the third Year One Space: 1999 novel The Space Guardians. Ball incorporated certain elements into his adaptation of "Missing Link": Raan's illusory Victor Bergman was given the avaricious intention of seizing an alien ship to travel home.
In 2003, the story was novelised by Tubb and released in Space: 1999 - Earthbound. Minor additions to the story include: (1) As to not violate the novels' continuity, it is stated that Simmonds was left for dead in the confusion of the breakaway, but was resuscitated by Bob Mathias. His broken neck and fractured skull were repaired and the weeks spent recovering in Medical explained his absence; (2) The Kaldorians were found to emit pheromones that make people like them, explaining the instant acceptance of the aliens by Koenig and his boarding party.
References
External links
Space: 1999 - "Earthbound" - The Catacombs episode guide
Space: 1999 - "Earthbound" - Moonbase Alpha's Space: 1999 page
1975 British television episodes
Space: 1999 episodes |
18136 | https://en.wikipedia.org/wiki/Literate%20programming | Literate programming | Literate programming is a programming paradigm introduced by Donald Knuth in which a computer program is given an explanation of its logic in a natural language, such as English, interspersed with snippets of macros and traditional source code, from which compilable source code can be generated. The approach is used in scientific computing and in data science routinely for reproducible research and open access purposes. Literate programming tools are used by millions of programmers today.
The literate programming paradigm, as conceived by Knuth, represents a move away from writing computer programs in the manner and order imposed by the computer, and instead enables programmers to develop programs in the order demanded by the logic and flow of their thoughts. Literate programs are written as an uninterrupted exposition of logic in an ordinary human language, much like the text of an essay, in which macros are included to hide abstractions and traditional source code.
Literate programming (LP) tools are used to obtain two representations from a literate source file: one suitable for further compilation or execution by a computer, the "tangled" code, and another for viewing as formatted documentation, which is said to be "woven" from the literate source. While the first generation of literate programming tools were computer language-specific, the later ones are language-agnostic and exist above the programming languages.
History and philosophy
Literate programming was first introduced by Knuth in 1984. The main intention behind this approach was to treat a program as literature understandable to human beings. This approach was implemented at Stanford University as a part of research on algorithms and digital typography. This implementation was called "WEB" by Knuth since he believed that it was one of the few three-letter words of English that hadn't already been applied to computing. However, it correctly resembles the complicated nature of software delicately pieced together from simple materials. The practice of literate programming has seen an important resurgence in the 2010s with the use of computational notebooks, especially in data science.
Concept
Literate programming is writing out the program logic in a human language with included (separated by a primitive markup) code snippets and macros. Macros in a literate source file are simply title-like or explanatory phrases in a human language that describe human abstractions created while solving the programming problem, and hiding chunks of code or lower-level macros. These macros are similar to the algorithms in pseudocode typically used in teaching computer science. These arbitrary explanatory phrases become precise new operators, created on the fly by the programmer, forming a meta-language on top of the underlying programming language.
A preprocessor is used to substitute arbitrary hierarchies, or rather "interconnected 'webs' of macros", to produce the compilable source code with one command ("tangle"), and documentation with another ("weave"). The preprocessor also provides an ability to write out the content of the macros and to add to already created macros in any place in the text of the literate program source file, thereby disposing of the need to keep in mind the restrictions imposed by traditional programming languages or to interrupt the flow of thought.
Advantages
According to Knuth,
literate programming provides higher-quality programs, since it forces programmers to explicitly state the thoughts behind the program, making poorly thought-out design decisions more obvious. Knuth also claims that literate programming provides a first-rate documentation system, which is not an add-on, but is grown naturally in the process of exposition of one's thoughts during a program's creation. The resulting documentation allows the author to restart his own thought processes at any later time, and allows other programmers to understand the construction of the program more easily. This differs from traditional documentation, in which a programmer is presented with source code that follows a compiler-imposed order, and must decipher the thought process behind the program from the code and its associated comments. The meta-language capabilities of literate programming are also claimed to facilitate thinking, giving a higher "bird's eye view" of the code and increasing the number of concepts the mind can successfully retain and process. Applicability of the concept to programming on a large scale, that of commercial-grade programs, is proven by an edition of TeX code as a literate program.
Knuth also claims that literate programming can lead to easy porting of software to multiple environments, and even cites the implementation of TeX as an example.
Contrast with documentation generation
Literate programming is very often misunderstood to refer only to formatted documentation produced from a common file with both source code and comments – which is properly called documentation generation – or to voluminous commentaries included with code. This is the converse of literate programming: well-documented code or documentation extracted from code follows the structure of the code, with documentation embedded in the code; while in literate programming, code is embedded in documentation, with the code following the structure of the documentation.
This misconception has led to claims that comment-extraction tools, such as the Perl Plain Old Documentation or Java Javadoc systems, are "literate programming tools". However, because these tools do not implement the "web of abstract concepts" hiding behind the system of natural-language macros, or provide an ability to change the order of the source code from a machine-imposed sequence to one convenient to the human mind, they cannot properly be called literate programming tools in the sense intended by Knuth.
Critique
In 1986, Jon Bentley asked Knuth to demonstrate the concept of literate programming for his Programming Pearls column in the Communications of the ACM, by writing a program in WEB. Knuth sent him a program for a problem previously discussed in the column (that of sampling M random numbers in the range 1..N), and also asked for an "assignment". Bentley gave him the problem of finding the K most common words from a text file, for which Knuth wrote a WEB program that was published together with a review by Douglas McIlroy of Bell Labs. McIlroy praised the intricacy of Knuth's solution, his choice of a data structure (a variant of Frank M. Liang's hash trie), and the presentation. He criticized some matters of style, such as the fact that the central idea was described late in the paper, the use of magic constants, and the absence of a diagram to accompany the explanation of the data structure. McIlroy, known for Unix pipelines, also used the review to critique the programming task itself, pointing out that in Unix (developed at Bell Labs), utilities for text processing (tr, sort, uniq and sed) had been written previously that were "staples", and a solution that was easy to implement, debug and reuse could be obtained by combining these utilities in a six-line shell script. In response, Bentley wrote that:
McIlroy later admitted that his critique was unfair, since he criticized Knuth's program on engineering grounds, while Knuth's purpose was only to demonstrate the literate programming technique. In 1987, Communications of the ACM published a followup article which illustrated literate programming with a C program that combined artistic approach of Knuth with engineering approach of McIlroy, with a critique by John Gilbert.
Workflow
Implementing literate programming consists of two steps:
Weaving: Generating a comprehensive document about the program and its maintenance.
Tangling: Generating machine executable code
Weaving and tangling are done on the same source so that they are consistent with each other.
Example
A classic example of literate programming is the literate implementation of the standard Unix wc word counting program. Knuth presented a CWEB version of this example in Chapter 12 of his Literate Programming book. The same example was later rewritten for the noweb literate programming tool. This example provides a good illustration of the basic elements of literate programming.
Creation of macros
The following snippet of the wc literate program shows how arbitrary descriptive phrases in a natural language are used in a literate program to create macros, which act as new "operators" in the literate programming language, and hide chunks of code or other macros. The mark-up notation consists of double angle brackets ("<<...>>") that indicate macros, the "@" symbol which indicates the end of the code section in a noweb file. The "<<*>>" symbol stands for the "root", topmost node the literate programming tool will start expanding the web of macros from. Actually, writing out the expanded source code can be done from any section or subsection (i.e. a piece of code designated as "<<name of the chunk>>=", with the equal sign), so one literate program file can contain several files with machine source code.
The purpose of wc is to count lines, words, and/or characters in a list of files. The
number of lines in a file is ......../more explanations/
Here, then, is an overview of the file wc.c that is defined by the noweb program wc.nw:
<<*>>=
<<Header files to include>>
<<Definitions>>
<<Global variables>>
<<Functions>>
<<The main program>>
@
We must include the standard I/O definitions, since we want to send formatted output
to stdout and stderr.
<<Header files to include>>=
#include <stdio.h>
@
The unraveling of the chunks can be done in any place in the literate program text file, not necessarily in the order they are sequenced in the enclosing chunk, but as is demanded by the logic reflected in the explanatory text that envelops the whole program.
Program as a web—macros are not just section names
Macros are not the same as "section names" in standard documentation. Literate programming macros can hide any chunk of code behind themselves, and be used inside any low-level machine language operators, often inside logical operators such as "if", "while" or "case". This is illustrated by the following snippet of the wc literate program.
The present chunk, which does the counting, was actually one of
the simplest to write. We look at each character and change state if it begins or ends
a word.
<<Scan file>>=
while (1) {
<<Fill buffer if it is empty; break at end of file>>
c = *ptr++;
if (c > ' ' && c < 0177) {
/* visible ASCII codes */
if (!in_word) {
word_count++;
in_word = 1;
}
continue;
}
if (c == '\n') line_count++;
else if (c != ' ' && c != '\t') continue;
in_word = 0;
/* c is newline, space, or tab */
}
@
In fact, macros can stand for any arbitrary chunk of code or other macros, and are thus more general than top-down or bottom-up "chunking", or than subsectioning. Knuth says that when he realized this, he began to think of a program as a web of various parts.
Order of human logic, not that of the compiler
In a noweb literate program besides the free order of their exposition, the chunks behind macros, once introduced with "<<...>>=", can be grown later in any place in the file by simply writing "<<name of the chunk>>=" and adding more content to it, as the following snippet illustrates ("plus" is added by the document formatter for readability, and is not in the code).
The grand totals must be initialized to zero at the beginning of the program.
If we made these variables local to main, we would have to do this initialization
explicitly; however, C globals are automatically zeroed. (Or rather,``statically
zeroed.'' (Get it?)
<<Global variables>>+=
long tot_word_count, tot_line_count,
tot_char_count;
/* total number of words, lines, chars */
@
Record of the train of thought
The documentation for a literate program is produced as part of writing the program. Instead of comments provided as side notes to source code a literate program contains the explanation of concepts on each level, with lower level concepts deferred to their appropriate place, which allows for better communication of thought. The snippets of the literate wc above show how an explanation of the program and its source code are interwoven. Such exposition of ideas creates the flow of thought that is like a literary work. Knuth wrote a "novel" which explains the code of the interactive fiction game Colossal Cave Adventure.
Remarkable examples
Axiom, which is evolved from scratchpad, a computer algebra system developed by IBM. It is now being developed by Tim Daly, one of the developers of scratchpad, Axiom is totally written as a literate program.
Literate programming practices
The first published literate programming environment was WEB, introduced by Knuth in 1981 for his TeX typesetting system; it uses Pascal as its underlying programming language and TeX for typesetting of the documentation. The complete commented TeX source code was published in Knuth's TeX: The program, volume B of his 5-volume Computers and Typesetting. Knuth had privately used a literate programming system called DOC as early as 1979. He was inspired by the ideas of Pierre-Arnoul de Marneffe. The free CWEB, written by Knuth and Silvio Levy, is WEB adapted for C and C++, runs on most operating systems and can produce TeX and PDF documentation.
There are various other implementations of the literate programming concept (some of them don't have macros and hence violate the order of human logic principle):
Other useful tools include
The Leo text editor is an outlining editor which supports optional noweb and CWEB markup. The author of Leo mixes two different approaches: first, Leo is an outlining editor, which helps with management of large texts; second, Leo incorporates some of the ideas of literate programming, which in its pure form (i.e., the way it is used by Knuth Web tool or tools like "noweb") is possible only with some degree of inventiveness and the use of the editor in a way not exactly envisioned by its author (in modified @root nodes). However, this and other extensions (@file nodes) make outline programming and text management successful and easy and in some ways similar to literate programming.
The Haskell programming language has native support for semi-literate programming. The compiler/interpreter supports two file name extensions: .hs and .lhs; the latter stands for literate Haskell.
The literate scripts can be full LaTeX source text, at the same time it can be compiled, with no changes, because the interpreter only compiles the text in a code environment, for example:
% here text describing the function:
\begin{code}
fact 0 = 1
fact (n+1) = (n+1) * fact n
\end{code}
here more text
The code can be also marked in the Richard Bird style, starting each line with a greater than symbol and a space, preceding and ending the piece of code with blank lines.
The LaTeX listings package provides a lstlisting environment which can be used to embellish the source code. It can be used to define a code environment to use within Haskell to print the symbols in the following manner:
\newenvironment{code}{\lstlistings[language=Haskell]}{\endlstlistings}
\begin{code}
comp :: (beta -> gamma) -> (alpha -> beta) -> (alpha -> gamma)
(g `comp` f) x = g(f x)
\end{code}
which can be configured to yield:
Although the package does not provide means to organize chunks of code, one can split the LaTeX source code in different files. See listings manual for an overview.
The Web 68 Literate Programming system used Algol 68 as the underlying programming language, although there was nothing in the pre-processor 'tang' to force the use of that language.
The customization mechanism of the Text Encoding Initiative which enables the constraining, modification, or extension of the TEI scheme enables users to mix prose documentation with fragments of schema specification in their One Document Does-it-all format. From this prose documentation, schemas, and processing model pipelines can be generated and Knuth's Literate Programming paradigm is cited as the inspiration for this way of working.
See also
Documentation generator – the inverse on literate programming where documentation is embedded in and generated from source code
Notebook interface – virtual notebook environment used for literate programming
Sweave and Knitr – examples of use of the "noweb"-like Literate Programming tool inside the R language for creation of dynamic statistical reports
Self-documenting code – source code that can be easily understood without documentation
References
Further reading
(includes software)
External links
LiterateProgramming at WikiWikiWeb
Literate Programming FAQ at CTAN
Articles with example code
Computer-related introductions in 1981 |
32073 | https://en.wikipedia.org/wiki/USB | USB | Universal Serial Bus (USB) is an industry standard that establishes specifications for cables, connectors and protocols for connection, communication and power supply (interfacing) between computers, peripherals and other computers. A broad variety of USB hardware exists, including 14 different connector types, of which USB-C is the most recent.
First released in 1996, the USB standards are maintained by the USB Implementers Forum (USB-IF). The four generations of USB are: USB 1.x, USB 2.0, USB 3.x, and USB4.
Overview
USB was designed to standardize the connection of peripherals to personal computers, both to communicate with and to supply electric power. It has largely replaced interfaces such as serial ports and parallel ports, and has become commonplace on a wide range of devices. Examples of peripherals that are connected via USB include computer keyboards and mice, video cameras, printers, portable media players, mobile (portable) digital telephones, disk drives, and network adapters.
USB connectors have been increasingly replacing other types as charging cables of portable devices.
Connector type quick reference
Objectives
The Universal Serial Bus was developed to simplify and improve the interface between personal computers and peripheral devices, such as cell phones, computer accessories, and monitors, when compared with previously existing standard or ad hoc proprietary interfaces.
From the computer user's perspective, the USB interface improves ease of use in several ways:
The USB interface is self-configuring, eliminating the need for the user to adjust the device's settings for speed or data format, or configure interrupts, input/output addresses, or direct memory access channels.
USB connectors are standardized at the host, so any peripheral can use most available receptacles.
USB takes full advantage of the additional processing power that can be economically put into peripheral devices so that they can manage themselves. As such, USB devices often do not have user-adjustable interface settings.
The USB interface is hot-swappable (devices can be exchanged without rebooting the host computer).
Small devices can be powered directly from the USB interface, eliminating the need for additional power supply cables.
Because use of the USB logo is only permitted after compliance testing, the user can have confidence that a USB device will work as expected without extensive interaction with settings and configuration.
The USB interface defines protocols for recovery from common errors, improving reliability over previous interfaces.
Installing a device that relies on the USB standard requires minimal operator action. When a user plugs a device into a port on a running computer, it either entirely automatically configures using existing device drivers, or the system prompts the user to locate a driver, which it then installs and configures automatically.
The USB standard also provides multiple benefits for hardware manufacturers and software developers, specifically in the relative ease of implementation:
The USB standard eliminates the requirement to develop proprietary interfaces to new peripherals.
The wide range of transfer speeds available from a USB interface suits devices ranging from keyboards and mice up to streaming video interfaces.
A USB interface can be designed to provide the best available latency for time-critical functions or can be set up to do background transfers of bulk data with little impact on system resources.
The USB interface is generalized with no signal lines dedicated to only one function of one device.
Limitations
As with all standards, USB possesses multiple limitations to its design:
USB cables are limited in length, as the standard was intended for peripherals on the same table-top, not between rooms or buildings. However, a USB port can be connected to a gateway that accesses distant devices.
USB data transfer rates are slower than those of other interconnects such as 100 Gigabit Ethernet.
USB has a strict tree network topology and master/slave protocol for addressing peripheral devices; those devices cannot interact with one another except via the host, and two hosts cannot communicate over their USB ports directly. Some extension to this limitation is possible through USB On-The-Go in, Dual-Role-Devices and protocol bridge.
A host cannot broadcast signals to all peripherals at once—each must be addressed individually.
While converters exist between certain legacy interfaces and USB, they may not provide a full implementation of the legacy hardware. For example, a USB-to-parallel-port converter may work well with a printer, but not with a scanner that requires bidirectional use of the data pins.
For a product developer, using USB requires the implementation of a complex protocol and implies an "intelligent" controller in the peripheral device. Developers of USB devices intended for public sale generally must obtain a USB ID, which requires that they pay a fee to the USB Implementers Forum (USB-IF). Developers of products that use the USB specification must sign an agreement with the USB-IF. Use of the USB logos on the product requires annual fees and membership in the organization.
History
A group of seven companies began the development of USB in 1995: Compaq, DEC, IBM, Intel, Microsoft, NEC, and Nortel. The goal was to make it fundamentally easier to connect external devices to PCs by replacing the multitude of connectors at the back of PCs, addressing the usability issues of existing interfaces, and simplifying software configuration of all devices connected to USB, as well as permitting greater data transfer rates for external devices and Plug and Play features. Ajay Bhatt and his team worked on the standard at Intel; the first integrated circuits supporting USB were produced by Intel in 1995.
Joseph C. Decuir, an American fellow of the Institute of Electrical and Electronics Engineers (IEEE) and one of the designers of the early Atari 8-bit game and computer systems (Atari VCS, Atari 400/800), as well as the Commodore Amiga, credits his work on Atari SIO, the Atari 8-bit computer's communication implementation as the basis of the USB standard, which he also helped design and on which he holds patents.
, about 6 billion USB ports and interfaces were in the global marketplace, and about 2 billion were being sold each year.
USB 1.x
Released in January 1996, USB 1.0 specified signaling rates of 1.5 Mbit/s (Low Bandwidth or Low Speed) and 12 Mbit/s (Full Speed). It did not allow for extension cables or pass-through monitors, due to timing and power limitations. Few USB devices made it to the market until USB 1.1 was released in August 1998. USB 1.1 was the earliest revision that was widely adopted and led to what Microsoft designated the "Legacy-free PC".
Neither USB 1.0 nor 1.1 specified a design for any connector smaller than the standard type A or type B. Though many designs for a miniaturised type B connector appeared on many peripherals, conformity to the USB 1.x standard was hampered by treating peripherals that had miniature connectors as though they had a tethered connection (that is: no plug or receptacle at the peripheral end). There was no known miniature type A connector until USB 2.0 (revision 1.01) introduced one.
USB 2.0
USB 2.0 was released in April 2000, adding a higher maximum signaling rate of 480 Mbit/s (maximum theoretical data throughput 53 MByte/s) named High Speed or High Bandwidth, in addition to the USB 1.x Full Speed signaling rate of 12 Mbit/s (maximum theoretical data throughput 1.2 MByte/s).
Modifications to the USB specification have been made via engineering change notices (ECNs). The most important of these ECNs are included into the USB 2.0 specification package available from USB.org:
Mini-A and Mini-B Connector
Micro-USB Cables and Connectors Specification 1.01
InterChip USB Supplement
On-The-Go Supplement 1.3 USB On-The-Go makes it possible for two USB devices to communicate with each other without requiring a separate USB host
Battery Charging Specification 1.1 Added support for dedicated chargers, host chargers behaviour for devices with dead batteries
Battery Charging Specification 1.2: with increased current of 1.5 A on charging ports for unconfigured devices, allowing High Speed communication while having a current up to 1.5 A
Link Power Management Addendum ECN, which adds a sleep power state
USB 2.0 VBUS Max Limit, increased the maximum allowable V_BUS voltage from 5.25V to 5.50V to align with the USB Type-C Spec, which was released simultaneously.
USB 3.x
The USB 3.0 specification was released on 12 November 2008, with its management transferring from USB 3.0 Promoter Group to the USB Implementers Forum (USB-IF), and announced on 17 November 2008 at the SuperSpeed USB Developers Conference.
USB 3.0 adds a SuperSpeed transfer mode, with associated backward compatible plugs, receptacles, and cables. SuperSpeed plugs and receptacles are identified with a distinct logo and blue inserts in standard format receptacles.
The SuperSpeed bus provides for a transfer mode at a nominal rate of 5.0 Gbit/s, in addition to the three existing transfer modes. Its efficiency is dependent on a number of factors including physical symbol encoding and link level overhead. At a 5 Gbit/s signaling rate with 8b/10b encoding, each byte needs 10 bits to transmit, so the raw throughput is 500 MB/s. When flow control, packet framing and protocol overhead are considered, it is realistic for 400 MB/s (3.2 Gbit/s) or more to transmit to an application. Communication is full-duplex in SuperSpeed transfer mode; earlier modes are half-duplex, arbitrated by the host.
Low-power and high-power devices remain operational with this standard, but devices using SuperSpeed can take advantage of increased available current of between 150 mA and 900 mA, respectively.
USB 3.1, released in July 2013 has two variants. The first one preserves USB 3.0's SuperSpeed transfer mode and is labeled USB 3.1 Gen 1, and the second version introduces a new SuperSpeed+ transfer mode under the label of USB 3.1 Gen 2. SuperSpeed+ doubles the maximum data signaling rate to 10 Gbit/s, while reducing line encoding overhead to just 3% by changing the encoding scheme to 128b/132b.
USB 3.2, released in September 2017, preserves existing USB 3.1 SuperSpeed and SuperSpeed+ data modes but introduces two new SuperSpeed+ transfer modes over the USB-C connector with data rates of 10 and 20 Gbit/s (1.25 and 2.5 GB/s). The increase in bandwidth is a result of multi-lane operation over existing wires that were intended for flip-flop capabilities of the USB-C connector.
USB 3.0 also introduced the UASP protocol, which provides generally faster transfer speeds than the BOT (Bulk-Only-Transfer) protocol.
Naming scheme
Starting with the USB 3.2 standard, USB-IF introduced a new naming scheme. To help companies with branding of the different transfer modes, USB-IF recommended branding the 5, 10, and 20 Gbit/s transfer modes as SuperSpeed USB 5Gbps, SuperSpeed USB 10Gbps, and SuperSpeed USB 20Gbps, respectively.
USB4
The USB4 specification was released on 29 August 2019 by the USB Implementers Forum.
USB4 is based on the Thunderbolt 3 protocol. It supports 40 Gbit/s throughput, is compatible with Thunderbolt 3, and backward compatible with USB 3.2 and USB 2.0. The architecture defines a method to share a single high-speed link with multiple end device types dynamically that best serves the transfer of data by type and application.
The USB4 specification states that the following technologies shall be supported by USB4:
During CES 2020, USB-IF and Intel stated their intention to allow USB4 products that support all the optional functionality as Thunderbolt 4 products. The first products compatible with USB4 are expected to be Intel's Tiger Lake series and AMD's Zen 3 series of CPUs. Released in 2020.
Version history
Release versions
Power-related standards
System design
A USB system consists of a host with one or more downstream ports, and multiple peripherals, forming a tiered-star topology. Additional USB hubs may be included, allowing up to five tiers. A USB host may have multiple controllers, each with one or more ports. Up to 127 devices may be connected to a single host controller. USB devices are linked in series through hubs. The hub built into the host controller is called the root hub.
A USB device may consist of several logical sub-devices that are referred to as device functions. A composite device may provide several functions, for example, a webcam (video device function) with a built-in microphone (audio device function). An alternative to this is a compound device, in which the host assigns each logical device a distinct address and all logical devices connect to a built-in hub that connects to the physical USB cable.
USB device communication is based on pipes (logical channels). A pipe is a connection from the host controller to a logical entity within a device, called an endpoint. Because pipes correspond to endpoints, the terms are sometimes used interchangeably. Each USB device can have up to 32 endpoints (16 in and 16 out), though it is rare to have so many. Endpoints are defined and numbered by the device during initialization (the period after physical connection called "enumeration") and so are relatively permanent, whereas pipes may be opened and closed.
There are two types of pipe: stream and message.
A message pipe is bi-directional and is used for control transfers. Message pipes are typically used for short, simple commands to the device, and for status responses from the device, used, for example, by the bus control pipe number 0.
A stream pipe is a uni-directional pipe connected to a uni-directional endpoint that transfers data using an isochronous, interrupt, or bulk transfer:
Isochronous transfers At some guaranteed data rate (for fixed-bandwidth streaming data) but with possible data loss (e.g., realtime audio or video)
Interrupt transfers Devices that need guaranteed quick responses (bounded latency) such as pointing devices, mice, and keyboards
Bulk transfers Large sporadic transfers using all remaining available bandwidth, but with no guarantees on bandwidth or latency (e.g., file transfers)
When a host starts a data transfer, it sends a TOKEN packet containing an endpoint specified with a tuple of (device_address, endpoint_number). If the transfer is from the host to the endpoint, the host sends an OUT packet (a specialization of a TOKEN packet) with the desired device address and endpoint number. If the data transfer is from the device to the host, the host sends an IN packet instead. If the destination endpoint is a uni-directional endpoint whose manufacturer's designated direction does not match the TOKEN packet (e.g. the manufacturer's designated direction is IN while the TOKEN packet is an OUT packet), the TOKEN packet is ignored. Otherwise, it is accepted and the data transaction can start. A bi-directional endpoint, on the other hand, accepts both IN and OUT packets.
Endpoints are grouped into interfaces and each interface is associated with a single device function. An exception to this is endpoint zero, which is used for device configuration and is not associated with any interface. A single device function composed of independently controlled interfaces is called a composite device. A composite device only has a single device address because the host only assigns a device address to a function.
When a USB device is first connected to a USB host, the USB device enumeration process is started. The enumeration starts by sending a reset signal to the USB device. The data rate of the USB device is determined during the reset signaling. After reset, the USB device's information is read by the host and the device is assigned a unique 7-bit address. If the device is supported by the host, the device drivers needed for communicating with the device are loaded and the device is set to a configured state. If the USB host is restarted, the enumeration process is repeated for all connected devices.
The host controller directs traffic flow to devices, so no USB device can transfer any data on the bus without an explicit request from the host controller. In USB 2.0, the host controller polls the bus for traffic, usually in a round-robin fashion. The throughput of each USB port is determined by the slower speed of either the USB port or the USB device connected to the port.
High-speed USB 2.0 hubs contain devices called transaction translators that convert between high-speed USB 2.0 buses and full and low speed buses. There may be one translator per hub or per port.
Because there are two separate controllers in each USB 3.0 host, USB 3.0 devices transmit and receive at USB 3.0 data rates regardless of USB 2.0 or earlier devices connected to that host. Operating data rates for earlier devices are set in the legacy manner.
Device classes
The functionality of a USB device is defined by a class code sent to a USB host. This allows the host to load software modules for the device and to support new devices from different manufacturers.
Device classes include:
USB mass storage / USB drive
USB mass storage device class (MSC or UMS) standardizes connections to storage devices. At first intended for magnetic and optical drives, it has been extended to support flash drives. It has also been extended to support a wide variety of novel devices as many systems can be controlled with the familiar metaphor of file manipulation within directories. The process of making a novel device look like a familiar device is also known as extension. The ability to boot a write-locked SD card with a USB adapter is particularly advantageous for maintaining the integrity and non-corruptible, pristine state of the booting medium.
Though most personal computers since early 2005 can boot from USB mass storage devices, USB is not intended as a primary bus for a computer's internal storage. However, USB has the advantage of allowing hot-swapping, making it useful for mobile peripherals, including drives of various kinds.
Several manufacturers offer external portable USB hard disk drives, or empty enclosures for disk drives. These offer performance comparable to internal drives, limited by the number and types of attached USB devices, and by the upper limit of the USB interface. Other competing standards for external drive connectivity include eSATA, ExpressCard, FireWire (IEEE 1394), and most recently Thunderbolt.
Another use for USB mass storage devices is the portable execution of software applications (such as web browsers and VoIP clients) with no need to install them on the host computer.
Media Transfer Protocol
Media Transfer Protocol (MTP) was designed by Microsoft to give higher-level access to a device's filesystem than USB mass storage, at the level of files rather than disk blocks. It also has optional DRM features. MTP was designed for use with portable media players, but it has since been adopted as the primary storage access protocol of the Android operating system from the version 4.1 Jelly Bean as well as Windows Phone 8 (Windows Phone 7 devices had used the Zune protocol an evolution of MTP). The primary reason for this is that MTP does not require exclusive access to the storage device the way UMS does, alleviating potential problems should an Android program request the storage while it is attached to a computer. The main drawback is that MTP is not as well supported outside of Windows operating systems.
Human interface devices
USB mice and keyboards can usually be used with older computers that have PS/2 connectors with the aid of a small USB-to-PS/2 adapter. For mice and keyboards with dual-protocol support, an adaptor that contains no logic circuitry may be used: the USB hardware in the keyboard or mouse is designed to detect whether it is connected to a USB or PS/2 port, and communicate using the appropriate protocol. Converters that connect PS/2 keyboards and mice (usually one of each) to a USB port also exist. These devices present two HID endpoints to the system and use a microcontroller to perform bidirectional data translation between the two standards.
Device Firmware Upgrade mechanism
Device Firmware Upgrade (DFU) is a vendor- and device-independent mechanism for upgrading the firmware of USB devices with improved versions provided by their manufacturers, offering (for example) a way to deploy firmware bug fixes. During the firmware upgrade operation, USB devices change their operating mode effectively becoming a PROM programmer. Any class of USB device can implement this capability by following the official DFU specifications.
DFU can also give the user the freedom to flash USB devices with alternative firmware. One consequence of this is that USB devices after being re-flashed may act as various unexpected device types. For example, a USB device that the seller intends to be just a flash drive can "spoof" an input device like a keyboard. See BadUSB.
Audio streaming
The USB Device Working Group has laid out specifications for audio streaming, and specific standards have been developed and implemented for audio class uses, such as microphones, speakers, headsets, telephones, musical instruments, etc. The working group has published three versions of audio device specifications: Audio 1.0, 2.0, and 3.0, referred to as "UAC" or "ADC".
UAC 2.0 introduced support for High Speed USB (in addition to Full Speed), allowing greater bandwidth for multi-channel interfaces, higher sample rates, lower inherent latency, and 8× improvement in timing resolution in synchronous and adaptive modes. UAC2 also introduces the concept of clock domains, which provides information to the host about which input and output terminals derive their clocks from the same source, as well as improved support for audio encodings like DSD, audio effects, channel clustering, user controls, and device descriptions.
UAC 3.0 primarily introduces improvements for portable devices, such as reduced power usage by bursting the data and staying in low power mode more often, and power domains for different components of the device, allowing them to be shut down when not in use.
UAC 1.0 devices are still common, however, due to their cross-platform driverless compatibility, and also partly due to Microsoft's failure to implement UAC 2.0 for over a decade after its publication, having finally added support to Windows 10 through the Creators Update on 20 March 2017. UAC 2.0 is also supported by MacOS, iOS, and Linux, however Android also only implements a subset of UAC 1.0.
USB provides three isochronous (fixed-bandwidth) synchronization types, all of which are used by audio devices:
Asynchronous The ADC or DAC are not synced to the host computer's clock at all, operating off a free-running clock local to the device.
Synchronous The device's clock is synced to the USB start-of-frame (SOF) or Bus Interval signals. For instance, this can require syncing an 11.2896 MHz clock to a 1 kHz SOF signal, a large frequency multiplication.
Adaptive The device's clock is synced to the amount of data sent per frame by the host
While the USB spec originally described asynchronous mode being used in "low cost speakers" and adaptive mode in "high-end digital speakers", the opposite perception exists in the hi-fi world, where asynchronous mode is advertised as a feature, and adaptive/synchronous modes have a bad reputation. In reality, all the types can be high-quality or low-quality, depending on the quality of their engineering and the application. Asynchronous has the benefit of being untied from the computer's clock, but the disadvantage of requiring sample rate conversion when combining multiple sources.
Connectors
The connectors the USB committee specifies support a number of USB's underlying goals, and reflect lessons learned from the many connectors the computer industry has used. The female connector mounted on the host or device is called the receptacle, and the male connector attached to the cable is called the plug. The official USB specification documents also periodically define the term male to represent the plug, and female to represent the receptacle.
By design, it is difficult to insert a USB plug into its receptacle incorrectly. The USB specification requires that the cable plug and receptacle be marked so the user can recognize the proper orientation. The USB-C plug however is reversible. USB cables and small USB devices are held in place by the gripping force from the receptacle, with no screws, clips, or thumb-turns as some connectors use.
The different A and B plugs prevent accidentally connecting two power sources. However, some of this directed topology is lost with the advent of multi-purpose USB connections (such as USB On-The-Go in smartphones, and USB-powered Wi-Fi routers), which require A-to-A, B-to-B, and sometimes Y/splitter cables.
USB connector types multiplied as the specification progressed. The original USB specification detailed standard-A and standard-B plugs and receptacles. The connectors were different so that users could not connect one computer receptacle to another. The data pins in the standard plugs are recessed compared to the power pins, so that the device can power up before establishing a data connection. Some devices operate in different modes depending on whether the data connection is made. Charging docks supply power and do not include a host device or data pins, allowing any capable USB device to charge or operate from a standard USB cable. Charging cables provide power connections, but not data. In a charge-only cable, the data wires are shorted at the device end, otherwise the device may reject the charger as unsuitable.
Cabling
The USB 1.1 standard specifies that a standard cable can have a maximum length of with devices operating at full speed (12 Mbit/s), and a maximum length of with devices operating at low speed (1.5 Mbit/s).
USB 2.0 provides for a maximum cable length of for devices running at high speed (480 Mbit/s).
The USB 3.0 standard does not directly specify a maximum cable length, requiring only that all cables meet an electrical specification: for copper cabling with AWG 26 wires the maximum practical length is .
USB bridge cables
USB bridge cables, or data transfer cables can be found within the market, offering direct PC to PC connections. A bridge cable is a special cable with a chip and active electronics in the middle of the cable. The chip in the middle of the cable acts as a peripheral to both computers, and allows for peer-to-peer communication between the computers. The USB bridge cables are used to transfer files between two computers via their USB ports.
Popularized by Microsoft as Windows Easy Transfer, the Microsoft utility used a special USB bridge cable to transfer personal files and settings from a computer running an earlier version of Windows to a computer running a newer version. In the context of the use of Windows Easy Transfer software, the bridge cable can sometimes be referenced as Easy Transfer cable.
Many USB bridge / data transfer cables are still USB 2.0, but there are also a number of USB 3.0 transfer cables. Despite USB 3.0 being 10 times faster than USB 2.0, USB 3.0 transfer cables are only 2 - 3 times faster given their design.
The USB 3.0 specification introduced an A-to-A cross-over cable without power for connecting two PCs. These are not meant for data transfer but are aimed at diagnostic uses.
Dual-role USB connections
USB bridge cables have become less important with USB dual-role-device capabilities introduced with the USB 3.1 specification. Under the most recent specifications, USB supports most scenarios connecting systems directly with a Type-C cable. For the capability to work, however, connected systems must support role-switching. Dual-role capabilities requires there be two controllers within the system, as well as a role controller. While this can be expected in a mobile platform such as a tablet or a phone, desktop PCs and laptops often will not support dual roles.
Power
Upstream USB connectors supply power at a nominal 5V DC via the V_BUS pin to downstream USB devices.
Low-power and high-power devices
Low-power devices may draw at most 1 unit load, and all devices must act as low-power devices when starting out as unconfigured. 1 unit load is 100 mA for USB devices up to USB 2.0, while USB 3.0 defines a unit load as 150 mA.
High-power devices (such as a typical 2.5-inch USB hard disk drive) draw at least 1 unit load and at most 5 unit loads (5x100mA = 500 mA) for devices up to USB 2.0 or 6 unit loads (6x150mA= 900 mA) for SuperSpeed (USB 3.0 and up) devices.
To recognize Battery Charging mode, a dedicated charging port places a resistance not exceeding 200 Ω across the D+ and D− terminals. Shorted or near-shorted data lanes with less than 200 Ω of resistance across the "D+" and "D-" terminals signify a dedicated charging port (DCP) with indefinite charging rates.
In addition to standard USB, there is a proprietary high-powered system known as PoweredUSB, developed in the 1990s, and mainly used in point-of-sale terminals such as cash registers.
Signaling
USB signals are transmitted using differential signaling on a twisted-pair data cable with characteristic impedance. Modes up to USB 2.0 use single pair in half-duplex (HDx). USB 3.0 and later modes have one pair for USB 2.0 compatibility and additionally two or four pairs for data transfer: two pairs for full-duplex (FDx) single lane modes (requires SuperSpeed connectors); four pairs for full-duplex, dual lane (×2) modes (requires USB-C connector).
Low-speed (LS) and Full-speed (FS) modes use a single data pair, labelled D+ and D−, in half-duplex. Transmitted signal levels are for logical low, and for logical high level. The signal lines are not terminated.
High-speed (HS) mode uses the same wire pair, but with different electrical conventions. Lower signal voltages of for low and for logical high level, and termination of 45 Ω to ground or 90 Ω differential to match the data cable impedance.
SuperSpeed (SS) adds two additional pairs of shielded twisted wire (and new, mostly compatible expanded connectors). These are dedicated to full-duplex SuperSpeed operation. The SuperSpeed link operates independently from USB 2.0 channel, and takes a precedence on connection. Link configuration is performed using LFPS (Low Frequency Periodic Signalling, approximately at 20 MHz frequency), and electrical features include voltage de-emphasis at transmitter side, and adaptive linear equalization on receiver side to combat electrical losses in transmission lines, and thus the link introduces the concept of link training.
SuperSpeed+ (SS+) uses increased data rate (Gen 2×1 mode) and/or the additional lane in the USB-C connector (Gen 1×2 and Gen 2×2 mode).
A USB connection is always between a host or hub at the A connector end, and a device or hub's "upstream" port at the other end.
Protocol layer
During USB communication, data is transmitted as packets. Initially, all packets are sent from the host via the root hub, and possibly more hubs, to devices. Some of those packets direct a device to send some packets in reply.
Transactions
The basic transactions of USB are:
OUT transaction
IN transaction
SETUP transaction
Control transfer exchange
Related standards
The USB Implementers Forum introduced the Media Agnostic USB v.1.0 wireless communication standard based on the USB protocol on July 29, 2015. Wireless USB is a cable-replacement technology, and uses ultra-wideband wireless technology for data rates of up to 480 Mbit/s.
The USB-IF used WiGig Serial Extension v1.2 specification as its initial foundation for the MA-USB specification, and is compliant with SuperSpeed USB (3.0 and 3.1) and Hi-Speed USB (USB 2.0). Devices that uses MA-USB will be branded as 'Powered by MA-USB', provided the product qualifies its certification program.
InterChip USB is a chip-to-chip variant that eliminates the conventional transceivers found in normal USB. The HSIC physical layer uses about 50% less power and 75% less board area compared to USB 2.0.
Comparisons with other connection methods
IEEE 1394
At first, USB was considered a complement to IEEE 1394 (FireWire) technology, which was designed as a high-bandwidth serial bus that efficiently interconnects peripherals such as disk drives, audio interfaces, and video equipment. In the initial design, USB operated at a far lower data rate and used less sophisticated hardware. It was suitable for small peripherals such as keyboards and pointing devices.
The most significant technical differences between FireWire and USB include:
USB networks use a tiered-star topology, while IEEE 1394 networks use a tree topology.
USB 1.0, 1.1, and 2.0 use a "speak-when-spoken-to" protocol, meaning that each peripheral communicates with the host when the host specifically requests it to communicate. USB 3.0 allows for device-initiated communications towards the host. A FireWire device can communicate with any other node at any time, subject to network conditions.
A USB network relies on a single host at the top of the tree to control the network. All communications are between the host and one peripheral. In a FireWire network, any capable node can control the network.
USB runs with a 5 V power line, while FireWire supplies 12 V and theoretically can supply up to 30 V.
Standard USB hub ports can provide from the typical 500 mA/2.5 W of current, only 100 mA from non-hub ports. USB 3.0 and USB On-The-Go supply 1.8 A/9.0 W (for dedicated battery charging, 1.5 A/7.5 W full bandwidth or 900 mA/4.5 W high bandwidth), while FireWire can in theory supply up to 60 watts of power, although 10 to 20 watts is more typical.
These and other differences reflect the differing design goals of the two buses: USB was designed for simplicity and low cost, while FireWire was designed for high performance, particularly in time-sensitive applications such as audio and video. Although similar in theoretical maximum transfer rate, FireWire 400 is faster than USB 2.0 high-bandwidth in real-use, especially in high-bandwidth use such as external hard drives. The newer FireWire 800 standard is twice as fast as FireWire 400 and faster than USB 2.0 high-bandwidth both theoretically and practically. However, FireWire's speed advantages rely on low-level techniques such as direct memory access (DMA), which in turn have created opportunities for security exploits such as the DMA attack.
The chipset and drivers used to implement USB and FireWire have a crucial impact on how much of the bandwidth prescribed by the specification is achieved in the real world, along with compatibility with peripherals.
Ethernet
The IEEE 802.3af, 802.3at, and 802.3bt Power over Ethernet (PoE) standards specify more elaborate power negotiation schemes than powered USB. They operate at 48 V DC and can supply more power (up to 12.95 W for 802.3af, 25.5 W for 802.3at aka PoE+, 71 W for 802.3bt aka 4PPoE) over a cable up to 100 meters compared to USB 2.0, which provides 2.5 W with a maximum cable length of 5 meters. This has made PoE popular for VoIP telephones, security cameras, wireless access points, and other networked devices within buildings. However, USB is cheaper than PoE provided that the distance is short and power demand is low.
Ethernet standards require electrical isolation between the networked device (computer, phone, etc.) and the network cable up to 1500 V AC or 2250 V DC for 60 seconds. USB has no such requirement as it was designed for peripherals closely associated with a host computer, and in fact it connects the peripheral and host grounds. This gives Ethernet a significant safety advantage over USB with peripherals such as cable and DSL modems connected to external wiring that can assume hazardous voltages under certain fault conditions.
MIDI
The USB Device Class Definition for MIDI Devices transmits Music Instrument Digital Interface (MIDI) music data over USB. The MIDI capability is extended to allow up to sixteen simultaneous virtual MIDI cables, each of which can carry the usual MIDI sixteen channels and clocks.
USB is competitive for low-cost and physically adjacent devices. However, Power over Ethernet and the MIDI plug standard have an advantage in high-end devices that may have long cables. USB can cause ground loop problems between equipment, because it connects ground references on both transceivers. By contrast, the MIDI plug standard and Ethernet have built-in isolation to or more.
eSATA/eSATAp
The eSATA connector is a more robust SATA connector, intended for connection to external hard drives and SSDs. eSATA's transfer rate (up to 6 Gbit/s) is similar to that of USB 3.0 (up to 5 Gbit/s) and USB 3.1 (up to 10 Gbit/s). A device connected by eSATA appears as an ordinary SATA device, giving both full performance and full compatibility associated with internal drives.
eSATA does not supply power to external devices. This is an increasing disadvantage compared to USB. Even though USB 3.0's 4.5 W is sometimes insufficient to power external hard drives, technology is advancing and external drives gradually need less power, diminishing the eSATA advantage. eSATAp (power over eSATA; aka ESATA/USB) is a connector introduced in 2009 that supplies power to attached devices using a new, backward compatible, connector. On a notebook eSATAp usually supplies only 5 V to power a 2.5-inch HDD/SSD; on a desktop workstation it can additionally supply 12 V to power larger devices including 3.5-inch HDD/SSD and 5.25-inch optical drives.
eSATAp support can be added to a desktop machine in the form of a bracket connecting the motherboard SATA, power, and USB resources.
eSATA, like USB, supports hot plugging, although this might be limited by OS drivers and device firmware.
Thunderbolt
Thunderbolt combines PCI Express and Mini DisplayPort into a new serial data interface. Original Thunderbolt implementations have two channels, each with a transfer speed of 10 Gbit/s, resulting in an aggregate unidirectional bandwidth of 20 Gbit/s.
Thunderbolt 2 uses link aggregation to combine the two 10 Gbit/s channels into one bidirectional 20 Gbit/s channel.
Thunderbolt 3 uses the USB-C connector. Thunderbolt 3 has two physical 20 Gbit/s bi-directional channels, aggregated to appear as a single logical 40 Gbit/s bi-directional channel. Thunderbolt 3 controllers can incorporate a USB 3.1 Gen 2 controller to provide compatibility with USB devices. They are also capable of providing DisplayPort alternate mode over the USB-C connector, making a Thunderbolt 3 port a superset of a USB 3.1 Gen 2 port with DisplayPort alternate mode.
DisplayPort Alt Mode 2.0: USB 4 supports DisplayPort 2.0 over its alternative mode. DisplayPort 2.0 can support 8K resolution at 60 Hz with HDR10 color. DisplayPort 2.0 can use up to 80 Gbit/s, which is double the amount available to USB data, because it sends all the data in one direction (to the monitor) and can thus use all eight data lanes at once.
After the specification was made royalty-free and custodianship of the Thunderbolt protocol was transferred from Intel to the USB Implementers Forum, Thunderbolt 3 has been effectively implemented in the USB4 specification—with compatibility with Thunderbolt 3 optional but encouraged for USB4 products.
Interoperability
Various protocol converters are available that convert USB data signals to and from other communications standards.
Security threats
BadUSB, see also USB flash drive#BadUSB
Intel CPUs, from Skylake, allow to take control over them from USB 3.0.
USB Killer
USB flash drives were dangerous for first versions of Windows XP because they were configured by default to execute program shown in Autorun.inf immediately after plugging flash drive in, malware could be automatically activated with usage of that.
See also
DockPort
Easy Transfer Cable
Extensible Host Controller Interface (XHCI)
LIO Target
List of device bit rates#Peripheral
Media Transfer Protocol
Mobile High-Definition Link
WebUSB
USB-C
Thunderbolt (interface)
References
Further reading
External links
General overview
Technical documents
IEC 62680 (Universal Serial Bus interfaces for data and power):
IEC 62680-1.1:2015 - Part 1-1: Common components - USB Battery Charging Specification, Revision 1.2
IEC 62680-1-2:2018 - Part 1-2: Common components - USB Power Delivery specification
IEC 62680-1-3:2018 - Part 1-3: Common components - USB Type-C Cable and Connector Specification
IEC 62680-1-4:2018 - Part 1-4: Common components - USB Type-C Authentication Specification
IEC 62680-2-1:2015 - Part 2-1: Universal Serial Bus Specification, Revision 2.0
IEC 62680-2-2:2015 - Part 2-2: Micro-USB Cables and Connectors Specification, Revision 1.01
IEC 62680-2-3:2015 - Part 2-3: Universal Serial Bus Cables and Connectors Class Document Revision 2.0
IEC 62680-3-1:2017 - Part 3-1: Universal Serial Bus 3.1 Specification
American inventions
Computer buses
Computer connectors
Computer-related introductions in 1996
Japanese inventions
Physical layer protocols
Serial buses |
4001661 | https://en.wikipedia.org/wiki/TeleFinder | TeleFinder | TeleFinder is a Macintosh-based bulletin-board system written by Spider Island Software, based on a client–server model whose client end provides a Mac-like GUI. It appears to be the first such system on any platform, predating Apple's own AppleLink, as well as other Mac-based BBS systems like FirstClass. In more recent years the product has added a complete suite of "sub-servers" for popular internet protocols.
The TeleFinder software consists of 2 programs, the Server software (Macintosh only) and the GUI based client software (also called TeleFinder), which is available for both macintosh and Windows based PCs.
The TeleFinder Server could also network with other TeleFinder Server BBS computers and share email and forum messages between themselves and also over FidoNet. The TeleFinder Server System Operator (SysOp) could also use ResEdit (a Macintosh resource editor software) to create and modify profiles to give their BBS a unique GUI. These profile files were distributed by each BBS for users to download and use with the client software, if they wished to see this GUI. Otherwise, a default GUI was used instead.
TeleFinder Server and Client software was originally written by Rusty Tucker with portions by Chris Silverberg and Jim White for Spider Island Software in Irvine, California USA.
All artwork by Drew Dougherty of Attention Design (now BXC Creative).
External links
TeleFinder Server
Bulletin board system software |
35959460 | https://en.wikipedia.org/wiki/Verivo | Verivo | Verivo Software Inc. is an enterprise mobility software company, with headquarters in Waltham, Massachusetts. Verivo’s enterprise mobility platforms allow users to develop, secure and govern mobile applications across multiple devices.
In June 2015 Verivo has joined forces with Appery.io
History
Pyxis Mobile Inc. was founded in 1998 as a company that developed PalmPilot apps for financial services companies. In July 2010, Steve Levy joined the company as CEO and transformed the company into Verivo Software Inc.
In January 2012, Verivo Software announced it had secured USD 17 million in funding from Commonwealth Capital Ventures and existing investors to develop new products and fund marketing programs. Simultaneously, the company announced its intention to refocus its business strategy, by moving away from the development and sale of mobile enterprise apps to directly offering its enterprise mobility platform to customers.
Verivo moved into new corporate headquarters in Waltham, MA, in January 2012. In February 2012, Verivo opened its first European office in London, UK.
In June 2015, Appery, LLC, announced it has acquired major assets of Verivo Software, including revenue contracts, source code, patents, trademarks and other intellectual property.
Operations
Verivo counts six of the top 15 Fortune 500 companies, 28 of the top 50 global asset managers, 15 of the top 25 insurance carriers and three of the top five U.S. banks as clients. Verivo also serves customers in the retail, health and life science, manufacturing, higher education, government, real estate, transportation, and automotive industries globally. Customers include AXA, CHEP, Deutsche Bank, International SOS, Thomson Reuters and Toyota.
Products
Verivo's first commercially available product, AppStudio, was launched in 2008. It is a mobile enterprise application platform (MEAP) that allows developers to build and deploy enterprise mobile apps through a drag-and-drop interface. As the industry began to demand more open and extensible platforms, Verivo launched Akula,a mobile app server. Both products are under active development today.
In addition, Verivo provides implementation services including concept building, graphic design, integration and testing services, cloud and on-premises hosting and training for its AppStudio IDE and Akula.
AppStudio
Verivo’s AppStudio allows users to centrally build, deploy, and manage cross-device native enterprise applications across multiple devices including iPhones, iPads, Android smartphones and tablets and Research In Motion’s BlackBerry devices.
It includes built-in security and built-in reporting capabilities. Verivo’s AppServer authenticates users, delivers app configurations, manages data synchronization, integrates with a wide range of data sources and more.
Akula
Akula is a fully open mobile application platform that enables IT departments to secure, manage and control mobile applications. It is a Mobile App Server that can be deployed on-premises or in the cloud, and its open and extensible design allows users to easily and rapidly develop, deploy and manage multiple mobile applications. Akula integrates with enterprise infrastructure, extending SOA to mobile devices. This structure enables development teams to create a user experience using the front-end tools and frameworks of their choice. In 2013, Verivo announced the release of Akula 1.0.1, which extends the enterprise mobile app platform to Adobe PhoneGap.
See also
Mobile enterprise application platform
Mobile application development
Mobile security
References
External links
Official Website
Mobile business software
Mobile software programming tools
Mobile software
Mobile device management
Software companies based in Massachusetts
Mobile software development
Software companies of the United States |
2102092 | https://en.wikipedia.org/wiki/Gumstix | Gumstix | Gumstix is an American multinational corporation headquartered in Redwood City, California. It develops and manufactures small system boards comparable in size to a stick of gum. In 2003, when it was first fully functional, it used ARM architecture System on a chip (SoC) and an Operating System based on Linux 2.6 kernel. It has an online tool called Geppetto that allows users to design their own boards. In August 2013 it started a crowd-funding service to allow a group of users that want to get a custom design manufactured to share the setup costs.
See also
Stick PC
Arduino
Raspberry Pi
Embedded System
References
External links
Gumstix users wiki
Gumstix mailing list archives on nabble
Embedded Linux
Linux-based devices
Computer companies of the United States
Companies based in Redwood City, California
Network computer (brand)
Motherboard form factors
Motherboard companies
Privately held companies based in California
Single-board computers |
8569 | https://en.wikipedia.org/wiki/Duke%20Nukem%203D | Duke Nukem 3D | Duke Nukem 3D is a first-person shooter video game developed by 3D Realms. It is a sequel to the platform games Duke Nukem and Duke Nukem II, published by 3D Realms.
Duke Nukem 3D features the adventures of the titular Duke Nukem, voiced by Jon St. John, who fights against an alien invasion on Earth. Along with Wolfenstein 3D and Doom, Duke Nukem 3D is considered to be one of many titles responsible for popularizing first-person shooters, and was released to major acclaim. Reviewers praised the interactivity of the environments, gameplay, level design, and unique risqué humor, a mix of pop-culture satire and lampooning of over-the-top Hollywood action heroes. However, it also incited controversy due to its violence, erotic elements, and portrayal of women.
The shareware version of the game was originally released on January 29, 1996, while the full version was released on April 19, 1996, as version 1.3d. The Plutonium PAK, an expansion pack which updated the game to version 1.4 and added a fourth eleven-level episode, was released in November 1996. The Atomic Edition, a standalone version of the game that included the content from the Plutonium PAK and updated the game to version 1.5, was later released; it is now only available on ZOOM-Platform.com. An official fifth episode was released on October 11, 2016, with 20th Anniversary World Tour published by Gearbox Software. After fifteen years in development hell, a direct sequel was released in 2011 called Duke Nukem Forever.
Gameplay
As a first-person shooter whose gameplay is similar to Doom, the gameplay of Duke Nukem 3D involves moving through levels presented from the protagonist's point of view, shooting enemies on the way. The environments in Duke Nukem 3D are highly destructible and interactive; most props can be destroyed by the player.
Levels were designed in a fairly non-linear manner such that players can advantageously use air ducts, back doors, and sewers to avoid enemies or find hidden caches. These locations are also filled with objects the player can interact with. Some confer gameplay benefits to the player; light switches make it easier to see, while water fountains and broken fire hydrants provide some health points. Others are simply there as a diversion. IOtand tipping strippers provokes a quote from Duke, and a provocative reveal from the dancer.
Duke's arsenal consists of the "Mighty Foot" (a basic kick attack), a pistol, a shotgun, a triple-barrelled chain gun, a rocket-propelled grenade launcher, pipe bombs, freeze and shrink rays, laser land mines, and the rapid-fire "Devastator" rocket launcher. There is also an extra weapon known as the "Expander", the opposite of the shrink-ray weapon, which is only available in the Atomic Edition version of the game.
Various items can be picked up during gameplay. The portable medkit allows players to heal Duke at will. Steroids speed up Duke's movement, as well as instantly reversing the effects of the shrink-ray weapon and increasing the strength of Duke's Mighty Foot for a short period. Night vision goggles allow players to see enemies in the dark. The "HoloDuke" device projects a hologram of Duke, which can be used to distract enemies. Protective boots allow Duke to cross dangerously hot or toxic terrain. In sections where progress requires more aquatic legwork, an aqua-lung allows Duke to take longer trips underwater. Duke's jet pack allows the player to move vertically and gain access to otherwise inaccessible areas.
The game features a wide variety of enemies; some of which are aliens and other mutated humans. The LAPD have been turned into "Pig Cops", a play on the derogatory term "pig" for police officers, with LARD emblazoned on their uniforms. As is usual for a first-person shooter, Duke Nukem encounters a large number of lesser foes, as well as bosses, usually at the end of episodes. Like Duke, these enemies have access to a wide range of weapons and equipment, and some weaker enemies have jet packs.
Multiplayer
Duke Nukem 3D features multiplayer. At the time of its release, Internet-based gaming was just beginning. Duke Nukem 3D did not support the TCP/IP client–server model, instead based its network play on the IPX LAN, modem or serial cable. Duke Nukem 3D players often either battled modem-to-modem, using the IPX network utility Kali or the Total Entertainment Network (TEN) online pay service. Kali allowed users to connect to a chat room to host and join games. Duke Nukem 3D was one of the more popular games on TEN prior to the closure of the network in 1999. The game was also supported by DWANGO.
Duke Nukem 3D levels were often used as the battlegrounds for these encounters, and users were even able to create their own levels, or maps, using the level editor bundled with the game, which was also used by the developers to design the initial levels. The game also features co-operative play which allows players to complete the story-based mode together. In Duke Nukem 3D: Atomic Edition, a new gameplay mode was introduced: Duke-Tag, a "capture the flag" style mode.
Duke Nukem 3D has been ported to run on modern Microsoft Windows variants including Windows XP, Windows 7, and Windows 8. This has been made possible since the game's source code was publicly released in 2003. Various source ports have been made, including EDuke32, JFDuke3D, nDuke, hDuke, and xDuke. All five offer the original visual appearance of the game, while EDuke32 also supports OpenGL rendering, including the capability to use fan-created modern graphics using the High Resolution Pack. nDuke, hDuke and xDuke can still be played online in multiplayer "DukeMatch" format using launchers such as Duke Matcher and YANG, both freely available. EDuke32 multiplayer is in a state of development hell following an attempt to rewrite the network functionality using a client–server model.
Plot
Setting
Duke Nukem 3D is set on Earth "sometime in the early 21st century". The levels of Duke Nukem 3D take players outdoors and indoors through rendered street scenes, military bases, deserts, a flooded city, space stations, Moon bases, and a Japanese restaurant.
The game contains several humorous references to pop culture. Some of Duke's lines are drawn from movies such as Aliens, Dirty Harry, Evil Dead II, Full Metal Jacket, Jaws, Pulp Fiction, and They Live; the captured women saying "Kill me" is a reference to Aliens. Players will encounter corpses of famous characters such as Luke Skywalker, Indiana Jones, Snake Plissken, the protagonist of Doom, and a smashed T-800. In the first episode, players navigate a tunnel in the wall of a prison cell hidden behind a poster, just like in The Shawshank Redemption. During the second episode, players can see The Monolith (from 2001: A Space Odyssey) on the Moon.
Story
There is little narrative in the game, only a brief text prelude located under "Help" in the Main Menu, and a few cutscenes after the completion of an episode. The game picks up right after the events of Duke Nukem II, with Duke returning to Earth in his space cruiser. As Duke descends on Los Angeles in hopes of taking a vacation, his ship is shot down by unknown hostiles. While sending a distress signal, Duke learns that aliens are attacking Los Angeles and have mutated the LAPD. With his vacation plans now ruined, Duke hits the "eject" button, and vows to do whatever it takes to stop the alien invasion.
In "Episode One: L.A. Meltdown", Duke fights his way through a dystopian Los Angeles. At a strip club, he is captured by pig-cops, but escapes the alien-controlled penitentiary and tracks down the alien cruiser responsible for the invasion in the San Andreas Fault. Duke confronts and kills an Alien Battlelord in the final level. Duke discovers that the aliens were capturing women, and detonates the ship. Levels in this episode include a movie theater, a red-light district, a prison, and a nuclear-waste disposal facility.
In "Episode Two: Lunar Apocalypse", Duke journeys to space, where he finds many of the captured women held in various incubators throughout space stations that had been conquered by the aliens. Duke reaches the alien mother ship on the moon and kills an alien Overlord. As Duke inspects the ship's computer, it is revealed that the plot to capture women was merely a ruse to distract him. The aliens have already begun their attack on Earth.
In "Episode Three: Shrapnel City", Duke battles the massive alien presence through Los Angeles once again, and kills the leader of the alien menace: the Cycloid Emperor. The game ends as Duke promises that after some "R&R", he will be "...ready for more action!", as an anonymous woman calls him back to bed. Levels in this episode include a sushi bar, a movie set, a subway, and a hotel.
The story continues in the Atomic Edition. In "Episode Four: The Birth", it is revealed that the aliens used a captured woman to give birth to the Alien Queen, a creature which can quickly spawn deadly alien protector drones. Duke is dispatched back to Los Angeles to fight hordes of aliens, including the protector drones. Eventually, Duke finds the lair of the Alien Queen, and kills her, thus thwarting the alien plot. Levels in this episode include a fast-food restaurant ("Duke Burger"), a supermarket, a Disneyland parody called "Babe Land", a police station, the oil tanker Exxon Valdez, and Area 51.
With the release of 20th Anniversary World Tour, the story progresses further. In "Episode Five: Alien World Order", Duke finds out that the aliens initiated a world-scale invasion, so he sets out to repel their attack on various countries. Duke proceeds to clear out aliens from Amsterdam, Moscow, London, San Francisco, Paris, the Giza pyramid complex, and Rome, with the final showdown with the returning alien threat taking place in Los Angeles, taking the game full circle. There, he defeats the Cycloid Incinerator, the current alien leader, stopping their threat for good.
Development
Duke Nukem 3D was developed on a budget of roughly $300,000. The development team consisted of 8 people for most of the development cycle, increasing to 12 or 13 people near the end. At one point, the game was being programmed to allow the player to switch between first-person view, third-person view, and fixed camera angles. Scott Miller of 3D Realms recalled that "with Duke 3D, unlike every shooter that came before, we wanted to have sort of real life locations like a cinema theatre, you know, strip club, bookstores..."
LameDuke is a beta version of Duke Nukem 3D, which was released by 3D Realms as a "bonus" one year after the release of the official version. It has been released as is, with no support. LameDuke features four episodes: Mr. Caliber, Mission Cockroach, Suck Hole, and Hard Landing. Certain weapons were altered from the original versions and/or removed.
Lee Jackson's theme song "Grabbag" has elicited many covers and remixes over the years by both fans and professional musicians, including an officially sanctioned studio version by thrash metal band Megadeth. Another version of the song was recorded by Chris Kline in August 2005. 3D Realms featured it on the front page of their website and contracted with Kline to use it to promote their Xbox Live release of Duke Nukem 3D.
The original official website was created by Jeffrey D. Erb and Mark Farish of Intersphere Communications Ltd.
Release
PC versions
Shareware Version: The shareware version, released on January 29, 1996, contained only the first episode. This version uses 3D Realms's shareware distribution model, which means that it can be distributed for free.
Full Version: 3D Realms started shipping the full registered version to customers on May 5, 1996. The company streamed the process of packing and shipping the first copies using a webcam. The full version contains the original three episodes, and includes the full versions of Duke Nukem and Duke Nukem II as bonus content.
Plutonium PAK/Atomic Edition: The Atomic Edition of Duke Nukem 3D was released in November 1996 as a standalone game. It contained the original three episodes, as well as a new eleven-level fourth episode, bringing the level total to 41 as opposed to 30 in the original Duke Nukem 3D. The Plutonium PAK was released as an upgrade package to convert the original release of Duke Nukem 3D (v1.3d) to the Atomic Edition (v1.4, later updated to v1.5 with the standalone Atomic Edition release and via a free download patch for the Plutonium PAK version on 3D Realms' website). It introduced two new enemies, the Protector Drone and the Pig Cop Tank, a new final boss, the Alien Queen, and a new weapon, the Expander. Changes to the script made the game easier to mod, and players could set up a multiplayer session against CPU bots. This is the only official add-on for the game developed by 3D Realms. Unlike the original release of Duke Nukem 3D, however, the Atomic Edition does not include Duke Nukem and Duke Nukem II.
Macintosh Version: The Macintosh release came on June 6, 1997, in Minneapolis, being shipped by MacSoft.
East Meets West: Released in 1998, includes Duke Nukem 3D: Atomic Edition and the full version of Shadow Warrior.
Duke: The Apocalypse contains Duke!ZONE II, Duke Xtreme, and a T-shirt.
Duke: The Apocalypse 2 contains Duke!ZONE, Duke It Out In D.C., a strategy guide, and a T-shirt.
Kill-A-Ton Collection: The Kill-A-Ton Collection was released in 1998 and includes: Duke Nukem I (Duke Nukum), Duke Nukem II, Duke Nukem 3D (both v1.3d and v1.5), Duke It Out In D.C., Duke!ZONE II, Duke Xtreme, and various editing utilities.
GOG Version: The Atomic Edition was released on GOG.com along with Duke Nukem 1, 2 and Manhattan Project in 2009. The entire catalog was removed from the website on December 31, 2015, due to a licensing agreement with Gearbox Software.
Megaton Edition: Developed by General Arcade and published by Devolver Digital, it was released through Steam on March 20, 2013. The Megaton Edition includes Duke Nukem 3D: Atomic Edition, Duke It Out In D.C., Duke Caribbean: Life's a Beach, and Duke: Nuclear Winter all running on OpenGL, as well as the original MS-DOS version of Duke Nukem 3D: Atomic Edition. It supports SteamPlay for Windows, Mac OS X, and Linux, and is based on the code of the JFDuke3D source port by Jonathon Fowler. Online multiplayer was added to the game in January 2014. However, about a year later, the Megaton Edition was removed from all digital distribution as Devolver Digital's agreement with Gearbox Software has ended now that the latter company currently owns the intellectual property. In 2016, Gearbox informed TechRaptor that they have plans to "bring the game back this year," and that game became the 20th Anniversary World Tour.
Kill-a-Ton 2015 Collection: Released in May 2015 on Steam, includes everything that Kill-a-Ton Collection contained (with exception of Duke Nukem 3D v1.3D and Duke Xtreme), plus two other expansions, Duke Caribbean: Life's a Beach, and Duke: Nuclear Winter, as well as Duke Nukem: Manhattan Project and the Balls of Steel game. Like with the GOG.com release and Megaton Edition, it was removed from Steam at the end of 2015.
20th Anniversary World Tour: Developed by Nerve Software and Gearbox Software and published by Gearbox Publishing. It was announced by Gearbox Software on September 2, 2016, at PAX East, and it's a re-release for the Xbox One, PlayStation 4, and PC via Steam. World Tour includes an all-new 5th episode by the original episode designers, new music by composer Lee Jackson, re-recorded voice lines by Jon St. John, new enemies and new lighting effects. However, it does not contain the expansions from Kill-A-Ton Collection and Megaton Edition. World Tour was released on October 11, 2016.
Expansion packs
Nuke It: This is an expansion pack developed by Micro Star in 1996, consisting of 300 custom made levels. Although it was made with the Build Editor, Micro Star was charged by FormGen and 3D Realms of copyright infringement for unauthorized sales of the pack. Ultimately Micro Star lost their case.
Duke It Out In D.C.: This is an authorized add-on developed by Sunstorm Interactive and published by WizardWorks; it was released in March 1997. President Bill Clinton is captured by alien forces, and Duke must save him. This expansion pack featured 10 new levels that were based on real-world locations, such as: the White House, the FBI headquarters, the Smithsonian museum, the Washington Monument, and other areas in Washington, D.C. The add-on was also included as part of an official compilation called Duke Nukem: Kill-A-Ton Collection through business deals with 3D Realms. Charlie Wiederhold created levels for this add-on.
Duke Caribbean: Life's a Beach: This is an authorized add-on developed by Sunstorm Interactive and published by WizardWorks; it was released in January 1998. Duke is relaxing on a tropical island when he discovers that the aliens are having their own "vacation". This add-on includes a sunny Caribbean theme with 12 new levels that take place on beaches and vacation hotels. Charlie Wiederhold created several levels for this add-on. Wiederhold was later hired by 3D Realms to work on the sequel Duke Nukem Forever.
Duke: Nuclear Winter: This is an authorized add-on developed by Simply Silly Software and published by WizardWorks; it was released in January 1998. Santa Claus is being mind-controlled by aliens into causing trouble on Earth. Several of the levels take place in Alaska and the North Pole.
Duke!ZONE: An authorized add-on released in 1996, published by WizardWorks, which includes 500 fan-made levels and various editing utilities.
Duke!ZONE II: An authorized follow-up add-on to Duke!ZONE, published by WizardWorks and released in 1997. Duke!ZONE II contains three new episodes, each containing seven levels, created by Simply Silly Software and the same 500 fan-made levels from the original Duke!ZONE.
Duke Xtreme: An authorized add-on released in 1997 and developed by Sunstorm Interactive, containing 50 levels (25 for single player and 25 for multiplayer) and various editing utilities.
Duke Assault: An add-on released in 1997 containing over 1,500 levels for Duke Nukem 3D. It was published by WizardWorks and created by fans in the Duke Nukem 3D modding community.
Duke Nukem's Penthouse Paradise: This is an official add-on for Duke Nukem 3D, created by Jeffrey D. Erb and Mark Farish of Intersphere Communications Ltd. and available exclusively from GT Interactive and Penthouse Magazine in May 1997. Taking place between Duke Nukem 3D and the Atomic Edition, aliens interrupt Duke's R&R and a couple of Penthouse photo shoots. Duke has to fight his way through a hotel, clubs, and, finally, the Penthouse offices. The level features music from the industrial rock band Needle.
Duke - It's Zero Hour: An add-on developed by ZeroHour Software and released in November 1997. It was originally slated to be a retail product via WizardWorks, but the developers ended up releasing it for free. It has 11 new levels that feature 12 all-new monsters, five new weapons, music, and sound effects.
Console versions and add-ons
Duke Nukem 3D was ported to many consoles of the time. All of the ports featured some sort of new content.
Duke Nukem 3D (Game.com) was released in 1997 in the USA only. Unlike every other version of the game, Duke Nukem cannot turn; he can only move forward, backward, and strafe to the left or right. Due to the Game.com's monochrome screen, it is also the only version to lack color. It only includes four levels from each of the original three episodes for a total of 12 levels. These levels were modified to accommodate Duke Nukem's inability to turn.
Duke Nukem 3D (Sega Saturn) was ported by Lobotomy Software and published by Sega in 1997. It retains the original name and uses Lobotomy Software's own fully 3D SlaveDriver engine. This version uses the Sega NetLink for online gaming, and has built-in support for the Saturn's analog pad. It also includes a hidden multiplayer mini-game called Death Tank Zwei, and an exclusive bonus level called Urea 51, accessed through the level "Fahrenheit". It was the final game branded by Sega of America under the Deep Water label, employed for games featuring adult content such as Eternal Champions: Challenge from the Dark Side.
Duke Nukem: Total Meltdown (titled simply Duke Nukem in Europe), the PlayStation port released in 1997, was developed by Aardvark Software. It contains all three original episodes, plus an exclusive fourth episode, Plug 'n' Pray, which includes six new levels and a secret level. The secret level was also included in the PC version of Duke Nukem 3D. The new episode features several new enemies, including three new types of Pig Cops, and a new final boss, the CyberKeef. This version also features remixed music, some rearranged from the PC version, and some original, in streaming XA-Audio made by Mark Knight. It includes support for analog pads and the PlayStation Link Cable.
Duke Nukem 64 is a port released in 1997 for the Nintendo 64 which features a split screen 4-player mode. It was developed by Eurocom. In-game music was removed due to limited storage capacity, many items were renamed to avoid drug and sex references, and new lines of dialogue were recorded specifically for this version to remove profanity. Several levels were altered to include areas from the Atomic Edition, such as a Duke Burger outlet in the second level which was not in the original PC version. Levels are played sequentially instead of as separate episodes. Other changes include the addition of Rumble Pak support, four new weapons, dual sub-machine guns, a grenade launcher, a missile launcher, and the Plasma Cannon, alternative ammo types for the pistol, shotgun, and missile launcher, and a fully 3D model for the Cycloid Emperor boss. The Protector Drone, an enemy from the Atomic Edition, also appears a few times in the standard levels. Originally, the weapons and end bosses were going to be polygonal.
Duke Nukem 3D (Mega Drive/Genesis) was released in 1998 by Tec Toy. The visuals were drastically simplified, being closer to early shooters like Wolfenstein 3D. It consisted solely of Lunar Apocalypse, the second from the original game's three episodes, which was heavily modified to suit the game engine. This version was released in South America only. In 2015, Piko Interactive acquired the rights to the port from Tec Toy and released it worldwide in cartridge form on October 16, 2015.
Duke Nukem 3D (Xbox 360) was released on September 24, 2008. This version features: the ability to "rewind" the game to any prior point upon dying, save clips of gameplay, and play cooperatively online, as well as the standard "Dukematch" online multiplayer mode. The music received a slight quality upgrade with modern MIDI tools.
Duke Nukem 3D (iPhone/iPod Touch) was released on August 11, 2009, and ported by MachineWorks Northwest. The game employs a new engine, which uses a trademarked touch-screen system called TapShoot to allow players to lock onto and dispatch foes. An update in September 2009 made the game compatible with the first and second-generation iPod Touch. It also added a new control scheme which lets players control Duke by dragging their finger around the screen.
Duke Nukem 3D (Nokia N900) was released on December 29, 2009. As shown in a MaemoWorld's video, Duke is controlled using the Qwerty keypad and touchscreen.
Duke Nukem 3D: Megaton Edition (PlayStation 3, PlayStation Vita) was released on January 6, 2015, in North America, and January 7, 2015, in Europe. It is a port of the Megaton Edition released on Steam for Windows, Mac, and Linux. It was developed by General Arcade for the PC, ported to consoles by Abstraction Games, and published by Devolver Digital. It features cross-buy and Cross-Play between both platforms. As of February 2016, the game is no longer available for download in North America due to publishing rights returning to Gearbox Software.
Duke Nukem 3D: 20th Anniversary World Tour (PlayStation 4, Xbox One, Nintendo Switch): Released on October 11, 2016. Includes a new 5th episode, made by the original designers and new music by Lee Jackson, the original composer. The Nintendo Switch version released on June 23, 2020.
Sales
Duke Nukem 3D was a commercial hit, selling about 3.5 million copies. In the United States alone, it was the 12th best-selling computer game in the period from 1993 to 1999, with 950,000 units sold. NPD Techworld, a firm that tracked sales in the United States, reported 1.25 million units sold of Duke Nukem 3D by December 2002.
Source ports
Following the release of the Doom source code in 1997, players wanted a similar source code release from 3D Realms. The last major game to make use of the Duke Nukem 3D source code was TNT Team's World War II GI in 1999. Its programmer, Matthew Saettler, obtained permission from 3D Realms to expand the gameplay enhancements done on WWII GI to Duke Nukem 3D.
EDuke was a semi-official branch of Duke Nukem 3D that was released as a patch as Duke Nukem 3D v2.0 for Atomic Edition users on July 28, 2000. It included a demo mod made by several beta testers. It focused primarily on enhancing the CON scripting language in ways which allowed those modifying the game to do much more with the system than originally possible. Though a further version was planned, it never made it out of beta. It was eventually cancelled due to programmer time constraints. About a month after the release of the Duke Nukem 3D source code, Blood project manager Matt Saettler released the source code for both EDuke v2.0 and EDuke v2.1, the test version of which would have eventually become the next EDuke release, under the GPL.
The source code to the Duke Nukem 3D v1.5 executable, which uses the Build engine, was released as free software under the GPL-2.0-or-later license on April 1, 2003. The game content remains under a proprietary license. The game was quickly ported by enthusiasts to modern operating systems.
The first Duke Nukem 3D port was from icculus.org. It is a cross-platform project that allows the game to be played on AmigaOS, AmigaOS 4, AROS, BeOS, FreeBSD, Linux, Mac OS X, MorphOS, Solaris, and Windows rather than MS-DOS. The icculus.org codebase would later be used as the base for several other ports, including Duke3d_32.
Another popular early project was Jonathon Fowler's JFDuke3D, which, in December 2003, received backing from the original author of Build, programmer Ken Silverman. Fowler, in cooperation with Silverman, released a new version of JFDuke3D using Polymost, an OpenGL-enhanced renderer for Build which allows hardware acceleration and 3D model support along with 32-bit color high resolution textures. Another project based on JFDuke3D called xDuke, unrelated to the xDuke project based on Duke3d_w32, runs on the Xbox. Silverman has since helped Fowler with a large portion of other engine work, including updating the network code, and helping to maintain various other aspects of the engine. Development appears to have stopped; as of January 2015, there have been no new versions since October 9, 2005.
While a few short-lived DOS-based EDuke projects emerged, it was not until the release of EDuke32, an extended version of Duke3D incorporating variants of both Fowler's Microsoft Windows JFDuke3D code, and Saettler's EDuke code, by one of 3D Realms' forum moderators in late 2004, that EDuke's scripting extensions received community focus. Among the various enhancements, support for advanced shader model 3.0 based graphics was added to EDuke32 during late 2008-early 2009. In June 2008, thanks to significant porting contributions from the DOSBox team, EDuke32 became the only Duke Nukem 3D source port to compile and run natively on 64-bit Linux systems without the use of a 32-bit compatibility environment.
On April 1, 2009, an OpenGL Shader Model 3.0 renderer was revealed to have been developed for EDuke32, named Polymer to distinguish from Ken Silverman's Polymost. It allows for much more modern effects such as dynamic lighting and normal mapping. Although Polymer is fully functional, it is technically incomplete and unoptimized, and is still in development. As of the fifth installment of the High Resolution Pack, released in 2011, the Polymer renderer is mandatory. In 2011, another significant development of EDuke32 was the introduction of true room over room (TROR), where sectors can be placed over other sectors, and can be seen at the same time. In practice, this allows for true three-dimensional level design that was previously impossible, although the base engine is still 2D.
On December 18, 2012, Chocolate Duke3D port was released. Inspired by Chocolate Doom, the primary goal was to refactor the code so developers would easily read and learn from it.
In February 2013, a source code review article was published that described the internal working of the code.
Reception
All versions of the game have earned a positive aggregate score on GameRankings and Metacritic. The original release on MS-DOS holds an aggregate score of 89% on GameRankings and a score of 89/100 on Metacritic. The version released on Nintendo 64 holds an aggregate score of 74% on GameRankings and a score of 73/100 on Metacritic. The version released on Xbox 360 holds an aggregate score of 81% on GameRankings while it holds a score of 80/100 on Metacritic. The iOS version holds an aggregate score of 64% on GameRankings.
Daniel Jevons of Maximum gave it five out of five stars, calling it "absolutely perfect in every respect". He particularly cited the game's speed and fluidity even on low-end PCs, imaginative weapons, varied and identifiable environments, true 3D level designs, and strong multiplayer mode. A Next Generation critic summarized: "Duke Nukem 3D has everything Doom doesn't, but it also doesn't leave out the stuff that made Doom a classic." He praised the imaginative weapons, long and complex single-player campaign, competitive multiplayer, built-in level editor, and parental lock. Reviewers paid a lot of attention to the sexual content within the game. Reception of this element varied: Tim Soete of GameSpot felt that it was "morally questionable", while the Game Revolution reviewer noted that it was "done in a tongue-in-cheek manner", and he was "not personally offended". GamingOnLinux reviewer Hamish Paul Wilson commented in a later retrospective how the game's "dark dystopian atmosphere filled with pornography and consumerist decadence" in his view helped to ground "the game's more outlandish and obscene moments in context", concluding that "in a world as perverse as this, someone like Duke becoming its hero seems almost inevitable".
Next Generation reviewed the Macintosh version of the game and stated that "Though it took a year, the Mac port of Duke Nukem 3D is an impressive feat, both for the game's own features, and the quality of the port."
The Saturn version also received generally positive reviews, with critics particularly praising the use of real-world settings for the levels and Duke's numerous one-liners. Reviewers were also generally impressed with how accurately it replicates the PC version. AllGame editor Colin Williamson highly praised the Sega Saturn port, referring to it as "one of the best versions" and that it was "probably one of the best console ports ever released".GamePro summarized that "All the gore, vulgarity, go-go dancers, and ultra-intense 3D combat action that made Duke Nukem [3D] excel on the PC are firmly intact in the Saturn version, making it one of the premier corridor shooters on the system." However, some complained at the limitations of this version's multiplayer. Dan Hsu of Electronic Gaming Monthly said it was unfortunate that it supports only two players instead of four, while Sega Saturn Magazine editor Rich Leadbetter complained at the multiplayer being only supported through the Sega NetLink and not the Saturn link cable, since the NetLink was not being released in Europe, effectively making the Saturn version single-player only to Europeans.
The Nintendo 64 version was likewise positively received, with critics almost overwhelming praising the new weapons and polygonal explosions, though some said that the use of sprites for most enemies and objects makes the game look outdated. While commenting that the deathmatch gameplay is less impressive than that of GoldenEye 007, critics also overwhelmingly applauded the port's multiplayer features. Next Generation stated that "The sound effects and music are solid, the levels are still interactive as heck, and it's never quite felt so good blasting enemies with a shotgun or blowing them to chunks with pipe bombs." GamePro opined that the censoring of sexual content from the port stripped the game of all uniqueness, but the vast majority of critics held that the censorship, though unfortunate, was not extensive enough to eliminate or even reduce Duke's distinctive personality. Peer Schneider of IGN called it "a better and much more intense shooter than Hexen and Doom 64, and currently the best N64 game with a two-player co-op mode. If you don't already own the PC or Saturn version of Duke, do yourself a favor and get it." Crispin Boyer of Electronic Gaming Monthly, while complaining that the large weapons obscure too much of the player's view in four-player mode, assessed that "You're not gonna find a better console version of Duke."
Duke Nukem 3D was a finalist for CNET Gamecenter's 1996 "Best Action Game" award, which ultimately went to Quake. In 1996, Next Generation ranked it as the 35th top game of all time, called "for many, the game Quake should have been". In 1996 Computer Gaming World named Duke Nukem 3D #37 overall among the best games of all time and #13 among the "best ways to die in computer gaming". It won a 1996 Spotlight Award for Best Action Game. In 1998, PC Gamer declared it the 29th-best computer game ever released, and the editors called it "a gaming icon" and "an absolute blast".
PC Gamer magazine's readers' voted it #13 on its all-time top games poll. The editors of PC Game ranked it as the 12th top game of all time in 2001 citing the game's humor and pop-culture references, and as the 15th best games of all time in 2005. GamePro included it among the most important video games of all time. In 2009, IGN's Cam Shea ranked it as the ninth top 10 Xbox Live Arcade game, stating that it was as fun as it was in its initial release, and praised the ability to rewind to any point before the player died.
Japanese gaming magazine Famitsu reviewed the PlayStation console port, giving it a 21 out of 40 score.
Controversy
Duke Nukem 3D was attacked by some critics, who alleged that it promoted pornography and murder. In response to the criticism encountered, censored versions of the game were released in certain countries in order to avoid it being banned altogether. A similar censored version was carried at Wal-Mart retail stores in the United States.
In Australia, the game was originally refused classification on release. 3D Realms repackaged the game with the parental lock feature permanently enabled, although a patch available on the 3D Realms website allowed the user to revert the game back into its uncensored U.S. version. The OFLC then attempted to have the game pulled from the shelves, but it was discovered that the distributor had notified them of this fact and the rating could not be surrendered; six months later, the game was reclassified and released uncensored with an MA15+ rating. In Germany, the BPjM placed the game on their "List B" ("List of Media Harmful to Young People") of videos games, thus prohibiting its advertisement in the public. However, it was not fully confiscated, meaning that an adult could still request to see the game and buy it. In 1999, Duke Nukem 3D was banned in Brazil, along with Doom and several other first-person shooters after a rampage in and around a movie theater was supposedly inspired by the first level in the game.
Despite such concerns from critics, legislators, and publishers, Scott Miller later recounted that 3D Realms saw very little negative feedback to the game's controversial elements from actual gamers or their parents. He pointed out that Duke Nukem 3D was appropriately rated "M" and had no real nudity, and speculated that that was enough to make it inoffensive to the general public.
Notes
References
External links
1996 video games
Action-adventure games
Alien invasions in video games
Amiga 1200 games
Amiga games
AmigaOS 4 games
Android (operating system) games
AROS software
Build (game engine) games
Christmas video games
Commercial video games with freely available source code
Cooperative video games
DOS games ported to Windows
DOS games
Duke Nukem
First-person shooters
Game.com games
Games commercially released with DOSBox
GP2X games
GT Interactive Software games
IOS games
Linux games
Classic Mac OS games
MacSoft games
Microsoft games
MorphOS games
Multiplayer and single-player video games
Multiplayer null modem games
Multiplayer online games
Nintendo 64 games
MacOS games
Piko Interactive games
PlayStation 3 games
PlayStation Network games
PlayStation Vita games
Satirical video games
Science fiction video games
Sega Genesis games
Sega Saturn games
Split-screen multiplayer games
Video games with Steam Workshop support
Tiger handheld games
U.S. Gold games
Censored video games
Obscenity controversies in video games
Video games about size change
Video games scored by Mark Knight
Video games scored by Bobby Prince
Video games scored by Lee Jackson (composer)
Video games developed in the United States
Video games set in Egypt
Video games set in London
Video games set in Los Angeles
Video games set in Moscow
Video games set in Nevada
Video games set in Paris
Video games set in Rome
Video games set in San Francisco
Video games set in the 2000s
Video games set in the Netherlands
Video games set in the United States
Video games set on the Moon
Video games with alternative versions
Video games with digitized sprites
Video games with expansion packs
Windows games
Xbox 360 Live Arcade games
Devolver Digital games
Video games with 2.5D graphics
Eurocom games
Gearbox Software games
Sega video games
PlayStation (console) games
PlayStation 4 games
Xbox One games
Nintendo Switch games
3D Realms games
Sprite-based first-person shooters
Video games with commentaries |
5426007 | https://en.wikipedia.org/wiki/Department%20of%20Communications%2C%20Information%20Technology%20and%20the%20Arts | Department of Communications, Information Technology and the Arts | The Department of Communications, Information Technology and the Arts (DCITA) was an Australian government department that existed between October 1998 and December 2007. The Department was closed on 3 December 2007 and its authority was transferred to the Department of Broadband, Communications and the Digital Economy.
Scope
While operational, information about the department's functions and government funding allocation originally could be found in the Administrative Arrangements Orders, the annual Portfolio Budget Statements and in the Department's annual reports. At the time of its creation, the Department was responsible for:
Australia's Postal and telecommunications services
Management of the electromagnetic spectrum
Broadcasting services
Management of government records
Centenary of federation
Cultural affairs, including support for the arts
National policy issues relating to the information economy
Information and communication industries development, electronic commerce and business on-line and Year 2000 issues
Government on-line delivery and information technology and communications management, excluding IT outsourcing
Structure
The Department was an Australian Public Service department, staffed by officials who were responsible to the Minister for Communications, Information Technology and the Arts.
Arrangements for outside participation and public involvement
The Department had an ongoing involvement with the following bodies some of which played a role in consulting with the community and industry
:
Collections Council of Australia
Committee on Taxation Incentives for the Arts
Community Broadcasting Foundation
Contemporary Music Touring Program Committee
Cultural Ministers Council (CMC)
Digital Content Industry Action Agenda Strategic Industry Leaders Group
Festivals Australia Committee
Film Certification Advisory Board
Media and Communications Council (MACC)
National Portrait Gallery Board
Networking the Nation Board
Online Council
Online and Communications Council including its Regional Communications and Indigenous Telecommunications Working Groups
Playing Australia Committee
Public Lending Right (PLR) Committee
Sport and Recreation Ministers Council (SR MC)
Visions of Australia Committee
References
Sources
Ministries established in 1998
Communications, Information Technology and the Arts |
26996233 | https://en.wikipedia.org/wiki/CajunBot | CajunBot | CajunBot refers to the autonomous ground vehicles developed by the University of Louisiana at Lafayette for the DARPA Grand Challenges. CajunBot was featured on CNN and on the Discovery Channel science series Robocars.
CajunBot's custom AGV software, CBSystem, has artificial intelligence path planning capabilities, as well as visualization and simulation components.
The hardware repertoire of CajunBot includes a high grade GPS/INS positioning unit to navigate a designated route while detecting and avoiding obstacles using LIDAR laser-ranging units.
History
Inception and the 2004 Grand Challenge
In 2002, DARPA announced the first Grand Challenge: "Build a robotic vehicle able to travel unassisted on a predefined path of about 130 miles through the Mojave Desert. The fastest robot to navigate the course in less than 10 hours will take home $1 million." The first competition was scheduled in March 2004.
After learning of the Challenge in 2003, a small group of UL Lafayette students and professors joined together to see if they could take on the task of designing a completely autonomous vehicle. "GPS Bot" was engineered as a proof-of-concept, using a small remote controlled car coupled with a micro controller and GPS sensor. "GPS Bot" was able to navigate pre-programmed GPS waypoints without any human interaction.
Branding themselves as "Team CajunBot", (UL Lafayette's athletic teams are referred to as the Ragin' Cajuns) the group was able to have the first CajunBot vehicle ready within a few short months. "CajunBot" was built on a 6-wheeled all-terrain vehicle commonly used for hunting in the swamps and marshlands.
Team CajunBot, energized by the tremendous support from the Lafayette community, defied odds and competed successfully in the qualification rounds, earning a place among the 13 teams selected to compete in the finals, out of 106 initial applicants.
No team managed to complete the 2004 Grand Challenge course, but DARPA was encouraged by the results. It brought together engineers and inventors and managed to channel their energies into the development of important technologies designed to save American lives on the battlefield.
2005 Grand Challenge
In 2005 DARPA repeated the Challenge, fielded more than 198 team entries. Team CajunBot, again, successfully passed the qualification rounds and earned a place among 23 teams selected to compete in the finals.
In the 2005 Grand Challenge, history was made as Stanford University's vehicle, Stanley, crossed the finish line after making the 132-mile course in 6 hours and 52 minutes.
As envisioned by DARPA, the 2004 and 2005 Grand Challenges successfully accelerated development of the core technology behind fully autonomous battlefield vehicles. But the technology was hardly battle ready.
2007 Urban Challenge
Building on the success of previous challenges, DARPA has launched a new competition, dubbed the "Urban Challenge". The event took place in November 2007, set in Victorville, California.
The Urban Challenge required teams "to build a robotic vehicle that can operate in urban traffic, finding its own path while also following traffic rules".
Each team was provided a GPS map of an urban cityscape, simulating military supply missions in an urban setting. Traveling among manned and robotic vehicle traffic, the team vehicles traveled through required points in the mock city. Teams were required to complete the 60-mile course safely in less than six hours.
Team CajunBot was a semi-finalist. being eliminated in the final round of cuts due to an unexpected collision with a roadside vehicle. The team's progress leading up to the challenge was documented in the Discovery Science series Robocars.
Vehicles
CajunBot
Platform: A MAX 6-wheel amphibious all-terrain vehicle with a 25 hp twin-cylinder engine. Fuel capacity of 35 gallons. Top speed 30+ mph. Total weight 1,200 lbs.
Electronics: Controlled by 2 high-speed AMD computers with a distributed memory system, several microcontrollers, and many custom circuits. A 2-kilowatt electric generator supplies the electrical power.
Sensors: Two scanning LIDAR laser systems, three Doppler radars, and sonar help detect obstacles. C-Nav differential GPS and an Oxford inertial navigation sensor provide exact location information.
Software: CBSystem software developed by Team CajunBot does everything from object detection to path planning. Advanced Artificial Intelligence (AI) software developed at UL Lafayette allows CajunBot to pick the shortest path while avoiding obstacles.
Estimated Cost: $15,000 vehicle, $90,000 electronics, and $70,000 in-kind loaner equipment. Total hardware: $175,000. Not including thousands of hours of custom programming.
CajunBot-II (a.k.a. Ragin'Bot)
Platform: A 2004 Jeep Wrangler Rubicon with a 4.0 liter gasoline engine and automatic transmission with 4-wheel drive.
Electronics: Ragin'Bot houses many devices to enable sensor processing and autonomous vehicle control. The CajunBot software "CBSystem" runs on three EPIC form factor computers, each powered by a 1.8 GHz Intel Pentium M processor, housed in a single 1U rackmount case. Several devices convert various serial communications to Ethernet so data can be collected by all computers in the case of a failure of one computer. A custom dual alternator system powers the vehicle and onboard electronics. Redundant DC-to-DC converters transform the alternator voltage into a form usable by the various devices. A custom electronics box (EBOX) houses emergency stop control hardware and provides a central connection for all vehicle control hardware.
Sensors: Two Ibeo LIDAR sensors, three SICK LIDAR sensors and two Eaton Vorad Doppler radar detect obstacles. An Iteris lane departure warning system provides information about the position of the vehicle on the road. A C-Nav GPS receiver provides StarFire differential corrections, and an Oxford inertial navigation sensor provides Kalman filter smoothing for GPS data and motion compensation via MEMS gyros and accelerometers.
Software: CBSystem developed by Team CajunBot does everything from object detection to path planning. Advanced Artificial Intelligence (AI) software developed at UL Lafayette allows Ragin'Bot to pick the shortest path while avoiding obstacles.
Software
CajunBot's custom AGV software, CBSystem, was primarily developed in C++ for use on the Linux operating system.
Capabilities of CBSystem:
Urban path planning for navigation of an RNDF network, while handling lane blockages, stalled vehicles, intersection precedence & queuing, free zone navigation, and parking behavior.
Static and dynamic obstacle detection.
Visualization of real time sensor data and path planner status, as well as visualization of logged data and simulation data.
PID-based steering controller.
Simulation via a physics-based simulator built on the Open Dynamics Engine, for simulating the wheels, mass, and suspension of the vehicle, as well as traffic vehicles, point clouds from laser sensors, and more.
CajunBot day
On June 2, 2004, Governor Kathleen Babineaux Blanco officially declared Wednesday to be known as "CajunBot day". On this day, the CajunBot vehicle climbed 12 steps of the Louisiana state capital building as Gov. Blanco declared it "an outstanding example of the brainpower we have here in Louisiana and at our universities."
CNN segment
"CajunBot - a six-wheeled all-terrain vehicle - will be traveling across 210 miles of desert terrain as part of a challenge set forth by the Defense Advanced Research Projects Agency of the U.S. Department of Defense. Team CajunBot most recently gained national media attention when CNN visited the UL Lafayette campus for a segment on its show Next@CNN."
"CNN producer Marsha Walton said the crew decided on CajunBot as a subject because of its uniqueness and freshness to the contest."
Robocars documentary
During the 2007 Urban Challenge, CajunBot was one of 10 teams selected to be featured on the Discovery Channel science series "Robocars". The 6-part documentary series chronicled the progress of the teams as they struggled for the $2 million grand prize.
Team CajunBot was featured prominently in the 2nd and 3rd episodes, which aired July 21 & 28 2008, respectively.
Algorithms
Some research papers produced from the CajunBot project:
C. Cavanaugh, Design and Integration of the Sensing and Control Subsystems of CajunBot, April 9, 2004 (PDF).
S. Golconda, Steering Control for a Skid-Steered Autonomous Ground Vehicle at Varying Speed, M.S. Thesis, February 2005 (Full thesis).
A. Lakhotia, S. Golconda, A. Maida, P. Mejia, A. Puntambekar, G. Seetharaman, and S. Wilson, CajunBot: Architecture and Algorithms, Journal of Field Robotics, 23 (8), 2006, 555-578, , (Full paper).
A. Maida, S. Golconda, P. Mejia, A. Lakhotia, and C. Cavanaugh, Subgoal-based local navigation and obstacle avoidance using a grid-distance field, International Journal of Vehicle Autonomous Systems (IJVAS), 4 (2-4), 2006, pp. 122–142, (Full paper).
V. Venkitarakrishnan, CBWare - Distributed Middleware for Autonomous Ground Vehicles, M.S. Thesis, December 2006 (Thesis: front page, body, PPT Presentation).
A. Puntambekar, Terrain Mapping and Obstacle Detection for Unmanned Autonomous Ground Robots Without Sensor Stabilization, M.S. Thesis, October 18, 2006 (Full thesis, PPT Presentation).
Solving Urban Transit Problems using SLAM based Algorithms - December 7, 2006
See also
Autonomous robot
References
External links
CajunBot-II: An Autonomous Vehicle for the DARPA Urban Challenge (PDF)
PBS' NOVA show on the DARPA Grand Challenge
Robots race for Pentagon cash, Taipei Times article.
Self-driving cars
Linux-based devices
University of Louisiana at Lafayette
DARPA Grand Challenge |
55204063 | https://en.wikipedia.org/wiki/Frontiers%20of%20Computer%20Science | Frontiers of Computer Science | Frontiers of Computer Science is a bimonthly peer-reviewed scientific journal in English, co-published by Springer and Higher Education Press. It publishes research papers, review articles, and letters in computer science, including system architecture, software, artificial intelligence, theoretical computer science, networks and communication, information systems, multimedia and graphics, information security, etc. The editor-in-chief is Wei LI (Beihang University, China); the executive editors-in-chief are Zhang XIONG (Beihang University, China) and Zhi-Hua ZHOU (Nanjing University, China).
Abstracting and indexing
The journal is abstracted and indexed in:
Science Citation Index Expanded (SciSearch)
Journal Citation Reports/Science Edition
SCOPUS
INSPEC
Zentralblatt Math
Google Scholar
ACM Digital Library
Chinese Science Citation Database
Current Contents/Engineering
Computing and Technology
DBLP
EI-Compendex
Expanded Academic
OCLC
SCImago
References
External links
Official website
Computer science journals
Bimonthly journals
English-language journals
Publications established in 2007 |
274260 | https://en.wikipedia.org/wiki/Michael%20Abrash | Michael Abrash | Michael Abrash is a programmer and technical writer specializing in code optimization and 80x86 assembly language, a reputation cemented by his 1990 book Zen of Assembly Language Volume 1: Knowledge and a monthly column in Dr. Dobb's Journal in the early 1990s. A later book, Zen of Graphics Programming, applied these ideas to 2D and 3D graphics prior to the advent of hardware accelerators for the PC. Though not strictly a game programmer, Abrash has worked on the underlying technology for games, such as Quake, for much of his career. Since 2014, he has been the chief scientist of Oculus VR, a subsidiary of Facebook, Inc.
Game programmer
Abrash first bought a microcomputer while doing postgraduate studies at the University of Pennsylvania. Before getting into technical writing, Abrash was a game programmer in the early days of the IBM PC. His first commercial game was a clone of Space Invaders published by Datamost in 1982 as Space Strike. He co-authored several games with Dan Illowsky, who had previously written the successful Pac-Man clone Snack Attack for the Apple II. Abrash and Illowsky worked together on the Galaxian-like Cosmic Crusader (1982), maze game Snack Attack II (1982), and platform game Big Top (1983).
After working at Microsoft on graphics and assembly code for Windows NT 3.1, he returned to the video game industry in the mid-1990s to work on Quake for id Software. Some of the technology behind Quake is documented in Abrash's Ramblings in Realtime published in Dr. Dobb's Journal. He mentions Quake as his favourite game of all time. After Quake was released, Abrash returned to Microsoft to work on natural language research, then moved to the Xbox team, until 2001.
In 2002, Abrash went to RAD Game Tools where he co-wrote the Pixomatic software renderer, which emulates the functionality of a DirectX 7-level graphics card and is used as the software renderer in Unreal Tournament 2004. At the end of 2005, Pixomatic was acquired by Intel. When developing Pixomatic, he and Mike Sartain designed a new architecture called Larrabee, which now is part of Intel's GPGPU project.
Gabe Newell, managing director of Valve, said that he had "been trying to hire Michael Abrash forever. [...] About once a quarter we go for dinner and I say 'are you ready to work here yet?'" In 2011 Abrash made the move to join Valve.
On March 28, 2014, three days after Facebook announced agreements to purchase the company, virtual reality headset company Oculus VR published a statement saying that Michael Abrash had joined their company as Chief Scientist.
Technical writer
Early work
Michael Abrash was a columnist in the 1980s for a magazine called Programmer's Journal. Those articles were collected in the 1989 book, Power Graphics Programming.
His second book, Zen of Assembly Language Volume 1: Knowledge (1990), focused on writing efficient assembly code for the 16-bit 8086 processor, but was released after the 80486 CPU was already available. In addition to assembly-level optimization, the book focused on parts of the system that silently affect code performance, which he called "cycle eaters." A key point of Zen of Assembly Language is that performance must always be measured, and the book included the "Zen Timer" tool to check if theoretical code optimizations actually worked. Volume 2 was never published.
Dr. Dobb's and later books
In the early to mid-1990s, Abrash wrote a PC graphics programming column for Dr. Dobb's Journal called "Ramblings in Realtime." In 1991 he introduced Mode X, a 320x240 VGA graphics mode with square pixels instead of the slightly elongated pixels of the standard 320x200 mode. At the same time, he introduced readers to a little known part of the VGA standard allowing multiple pixels to be written at once. The article and its follow-ups ignited interest among PC game programmers.
Much of the content of Zen of Assembly Language was updated in Zen of Code Optimization: The Ultimate Guide to Writing Software That Pushes PCs to the Limit (1994), along with new material. The presentation of stepwise program refinement empirically demonstrated how algorithm re-design could improve performance up to a factor of 100. Assembly language re-coding, on the other hand, may only improve performance by a factor of 10. Abrash also showed how elusive performance improvement can be, and improving performance in one subroutine can expose bottlenecks in other routines. Finally, he demonstrated processor-dependent assembly-based performance improvements by comparing assembly language optimizations across x86 generations, including how some micro-optimizations disappeared or even made a program slower.
In 1997 Abrash's Graphics Programming Black Book, was published. It was a collection of his Dr. Dobb's Journal articles and his work on the Quake graphic subsystem.
Abrash stopped writing publicly in the 2000s until maintaining a public blog at Valve, "Ramblings in Valve Time," from April 2012 until January 2014.
References
External links
Ramblings in Valve Time - A blog by Michael Abrash (archived)
Ramblings in Realtime by Michael Abrash, detailed description of Quake's graphics engine programming (PDF version)
Graphics Programming Black Book by Michael Abrash (HTML version and ebook source)
''40 minutes with Michael Abrash of Valve Software", Audio interview with Michael Abrash at QuakeCon 2012 discussing Abrash's career and work at Valve
American computer programmers
American technology writers
Living people
Microsoft employees
Valve Corporation people
American video game programmers
Id Software people
1957 births |
69818106 | https://en.wikipedia.org/wiki/Nizar%20Ben%20N%C3%A9ji | Nizar Ben Néji | Nizar Ben Néji is a Tunisian computer engineer and doctor in information and communication technologies, specializing in cybersecurity and cyber criminality with a special focus in his career on cryptography and PKI-related solutions. Recognized for his expertise in innovation and qualified by his rich international experience in the field of information and communication technologies, cybersecurity and cyber criminality, Dr. Ben Néji has been appointed in charge of the Ministry of Information and Communication Technologies in Tunisia since August 2nd, 2021.
Biography
Nizar Ben Neji holds a Doctorate degree in Information and Communication Technologies from the Higher School of Communications of Tunis (Sup'com) of the University of Carthage and an engineering degree from the National School of Computer Sciences of Tunis (ENSI, part of Manouba University) in 2005. He also performed postdoctoral scientific research at the University of Massachusetts Amherst in USA as Fulbright scholar, in 2015.
Career
Dr. Ben Néji started his career as a PKI engineer and later project manager at the Tunisian Government Certification Authority (ANCE) of the Ministry of ICT and Digital Economy in Tunisia from 2005 to 2013 and was a member of several National Steering committees and working groups in charge of supervising and conducting National IT and e-Government projects.
In 2013, he joined the University of Carthage in Tunisia, as lecturer and researcher at the Faculty of Sciences of Bizerte (FSB), then at the Higher School of Communications of Tunis (Sup'com).
Dr. Ben Néji was actively involved as an expert at an international level with CTO (Commonwealth Telecommunications Organization), ITU (International Telecommunication Union) and AICTO (Arab Information and Communication Technology Organization) in delivering seminars in a wide variety of subjects related to cybersecurity and cyber criminality.
References
Living people
Tunisian politicians |
634671 | https://en.wikipedia.org/wiki/Pthreads | Pthreads | POSIX Threads, commonly known as pthreads, is an execution model that exists independently from a language, as well as a parallel execution model. It allows a program to control multiple different flows of work that overlap in time. Each flow of work is referred to as a thread, and creation and control over these flows is achieved by making calls to the POSIX Threads API. POSIX Threads is an API defined by the standard POSIX.1c, Threads extensions (IEEE Std 1003.1c-1995).
Implementations of the API are available on many Unix-like POSIX-conformant operating systems such as FreeBSD, NetBSD, OpenBSD, Linux, macOS, Android, Solaris, Redox, and AUTOSAR Adaptive, typically bundled as a library libpthread. DR-DOS and Microsoft Windows implementations also exist: within the SFU/SUA subsystem which provides a native implementation of a number of POSIX APIs, and also within third-party packages such as pthreads-w32, which implements pthreads on top of existing Windows API.
Contents
pthreads defines a set of C programming language types, functions and constants. It is implemented with a pthread.h header and a thread library.
There are around 100 threads procedures, all prefixed pthread_ and they can be categorized into four groups:
Thread management - creating, joining threads etc.
Mutexes
Condition variables
Synchronization between threads using read/write locks and barriers
The POSIX semaphore API works with POSIX threads but is not part of threads standard, having been defined in the POSIX.1b, Real-time extensions (IEEE Std 1003.1b-1993) standard. Consequently, the semaphore procedures are prefixed by sem_ instead of pthread_.
Example
An example illustrating the use of pthreads in C:
#include <stdio.h>
#include <stdlib.h>
#include <assert.h>
#include <pthread.h>
#include <unistd.h>
#define NUM_THREADS 5
void *perform_work(void *arguments){
int index = *((int *)arguments);
int sleep_time = 1 + rand() % NUM_THREADS;
printf("THREAD %d: Started.\n", index);
printf("THREAD %d: Will be sleeping for %d seconds.\n", index, sleep_time);
sleep(sleep_time);
printf("THREAD %d: Ended.\n", index);
return NULL;
}
int main(void) {
pthread_t threads[NUM_THREADS];
int thread_args[NUM_THREADS];
int i;
int result_code;
//create all threads one by one
for (i = 0; i < NUM_THREADS; i++) {
printf("IN MAIN: Creating thread %d.\n", i);
thread_args[i] = i;
result_code = pthread_create(&threads[i], NULL, perform_work, &thread_args[i]);
assert(!result_code);
}
printf("IN MAIN: All threads are created.\n");
//wait for each thread to complete
for (i = 0; i < NUM_THREADS; i++) {
result_code = pthread_join(threads[i], NULL);
assert(!result_code);
printf("IN MAIN: Thread %d has ended.\n", i);
}
printf("MAIN program has ended.\n");
return 0;
}
This program creates five threads, each executing the function perform_work that prints the unique number of this thread to standard output. If a programmer wanted the threads to communicate with each other, this would require defining a variable outside of the scope of any of the functions, making it a global variable. This program can be compiled using the gcc compiler with the following command:
gcc pthreads_demo.c -pthread -o pthreads_demo
Here is one of the many possible outputs from running this program.
IN MAIN: Creating thread 0.
IN MAIN: Creating thread 1.
IN MAIN: Creating thread 2.
IN MAIN: Creating thread 3.
THREAD 0: Started.
IN MAIN: Creating thread 4.
THREAD 3: Started.
THREAD 2: Started.
THREAD 0: Will be sleeping for 3 seconds.
THREAD 1: Started.
THREAD 1: Will be sleeping for 5 seconds.
THREAD 2: Will be sleeping for 4 seconds.
THREAD 4: Started.
THREAD 4: Will be sleeping for 1 seconds.
IN MAIN: All threads are created.
THREAD 3: Will be sleeping for 4 seconds.
THREAD 4: Ended.
THREAD 0: Ended.
IN MAIN: Thread 0 has ended.
THREAD 2: Ended.
THREAD 3: Ended.
THREAD 1: Ended.
IN MAIN: Thread 1 has ended.
IN MAIN: Thread 2 has ended.
IN MAIN: Thread 3 has ended.
IN MAIN: Thread 4 has ended.
MAIN program has ended.
POSIX Threads for Windows
Windows does not support the pthreads standard natively, therefore the Pthreads4w project seeks to provide a portable and open-source wrapper implementation. It can also be used to port Unix software (which uses pthreads) with little or no modification to the Windows platform. Pthreads4w version 3.0.0 or later, released under the Apache Public License v2.0, is compatible with 64-bit or 32-bit Windows systems. Version 2.11.0, released under the LGPLv3 license, is also 64-bit or 32-bit compatible.
The Mingw-w64 project also contains a wrapper implementation of pthreads, winpthreads, which tries to use more native system calls than the Pthreads4w project.
Interix environment subsystem available in the Windows Services for UNIX/Subsystem for UNIX-based Applications package provides a native port of the pthreads API, i.e. not mapped on Win32/Win64 API but built directly on the operating system syscall interface.
See also
Runtime system
OpenMP
Cilk/Cilk Plus
Threading Building Blocks (TBB)
Native POSIX Thread Library (NPTL)
DCEThreads
clone (Linux system call)
Spurious wakeup
Thread-local storage
GNU Portable Threads
Grand Central Dispatch (Apple's thread library)
Beginthread (a subroutine within Windows for creating a new thread and unix thread)
State Threads, an event driven approach to threading
References
Further reading
External links
The Open Group Base Specifications Issue 7, IEEE Std 1003.1
C POSIX library
Parallel computing
Threads (computing) |
58860812 | https://en.wikipedia.org/wiki/Bright%20Machines | Bright Machines | Bright Machines is a software and robotics company whose applications focus on automation for the manufacturing industry. The San Francisco-based company has two primary products. First, Bright Machines employs “micro-factories” made up of robot cells for the purpose of automating electronics manufacturing and inspection. Second, Bright Machines offers software tools for the purpose of improving efficiencies in the manufacturing process.
History
Bright Machines was founded on May 25, 2018 as a spin-off of Flex Ltd. Initially the company began as stealth startup under the name AutoLabs AI. Amar Hanspal, former co-CEO at Autodesk, was named CEO. Its board of directors are Carl Bass, former president and CEO at Autodesk; Stephen Luczo, executive chairman of Seagate; and Lior Susan, founder of Eclipse Ventures. In August 2021, the company named Michael Keogh its new chief financial officer, and in December 2021, the company announced that Lior Susan had been appointed interim CEO.
In October 23, 2018, the company officially changed its name to Bright Machines and announced it raised $179 million for its Series A. The $179 million funding round was led by Eclipse, with participation from Flex. Other investors include BMW i Ventures and Lux Capital.
In May 2021, Bright Machines announced plans for an initial public offering through a SPAC merger with SCVX Corp, which valued the company at $1.6 billion and was expected to generate approximately $435 million in cash. On December 13, 2021, the company announced that it was terminating the SPAC agreement, citing "market conditions."
Products
Bright Machines makes software and robotic modules that assemble small goods, such as household appliances, tools, and electronics. The modules can be plugged together to create a small assembly line, and the robots can be programmed through the company's software to follow instructions. Its customers include Asteelflash Group, United Equipment Accessories, and Argonaut Manufacturing Services.
References
2018 establishments in California
Companies based in San Francisco
Corporate spin-offs
Software companies based in the San Francisco Bay Area
Software companies established in 2018
Manufacturing companies established in 2018
American companies established in 2018
Software companies of the United States
Robotics companies of the United States |
2386949 | https://en.wikipedia.org/wiki/XULRunner | XULRunner | XULRunner is a discontinued, packaged version of the Mozilla platform to enable standalone desktop application development using XUL, developed by Mozilla. It replaced the Gecko Runtime Environment, a stalled project with a similar purpose. The first stable developer preview of XULRunner was released in February 2006, based on the Mozilla 1.8 code base. Mozilla stopped supporting the development of XULrunner in July 2015.
XULRunner was a "technology experiment", not a shipped product, meaning there were no official XULRunner releases, only stable builds based on the same code as a corresponding Firefox release.
Software architecture
XULRunner is a runtime that can be used to bootstrap multiple XUL + XPCOM applications that are equal in capabilities to Firefox and Thunderbird.
XULRunner stores a variety of configuration data (bookmarks, cookies, contacts etc.) in internally managed SQLite databases, and even offer an add-on to manage SQLite databases.
Uses
Mozilla Firefox, Mozilla Thunderbird, Nightingale, Songbird, Flickr Uploadr, SeaMonkey, Conkeror, Sunbird, Miro, Joost, and TomTom Home 2.0 ran on XULRunner. Starting with version 3.0, Mozilla Firefox uses a "private" XULRunner, meaning the framework is installed locally in the application directory.
Kiwix, an offline browser for Wikipedia and Project Gutenberg, used XULRunner until 2017.
The Google AdWords Editor used XULRunner until 2010, as did Evergreen ILS, an open-source library automation system.
The fourth version of the video game series Simon the Sorcerer, Simon the Sorcerer 4: Chaos Happens, uses XULRunner.
In addition, the XULRunner package provided access to ActiveX Control functionality previously found in a (now defunct) third-party ActiveX Control built off the Mozilla source code. Applications using this application programming interface (API) may have function with XULRunner installed and registered.
Starting with Lotus Notes version 8.5.1, IBM deployed XULRunner to provide Notes client support for XPages applications.
Deprecation
In January 2014, dropping XULRunner support was discussed by Mozilla developers. In July 2015, Mozilla stopped supporting the development of XULrunner, and the community page has been taken down. As of the beginning of 2016, it had been dropped from the package database of most Linux distributions, including Gentoo, Debian, and Ubuntu.
XULRunner can still be installed separately, and many XULRunner-dependent applications can be switched over fairly easily. Also developing and running XULRunner apps is still possible through Firefox as well as previous or custom builds of XULRunner. However, its disappearance has caused some dependent packages to be removed from package databases.
See also
Mozilla application framework (XPFE)
Mozilla Prism
Gecko (software)
HTML Application
Adobe Integrated Runtime (AIR)
Chromium Embedded Framework
Electron (software framework)
References
External links
XULRunner wiki site
XULRunner Documentation
XULRunner Hall of Fame
XULRunner: What we are doing (Mozilla plans for the 1.9 timeframe)
XULRunner source code
Brian King 2005 Media
Brian King 2005 Presentations Slides
https://web.archive.org/web/20160828115439/https://developer.mozilla.org/en-US/docs/Archive/Mozilla/XULRunner
Free software programmed in C++
Free system software
Mozilla
Software that uses XUL
Software using the Mozilla license
Widget engines |
1710557 | https://en.wikipedia.org/wiki/Fuzzing | Fuzzing | Fuzzing or fuzz testing is an automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program. The program is then monitored for exceptions such as crashes, failing built-in code assertions, or potential memory leaks. Typically, fuzzers are used to test programs that take structured inputs. This structure is specified, e.g., in a file format or protocol and distinguishes valid from invalid input. An effective fuzzer generates semi-valid inputs that are "valid enough" in that they are not directly rejected by the parser, but do create unexpected behaviors deeper in the program and are "invalid enough" to expose corner cases that have not been properly dealt with.
For the purpose of security, input that crosses a trust boundary is often the most useful. For example, it is more important to fuzz code that handles the upload of a file by any user than it is to fuzz the code that parses a configuration file that is accessible only to a privileged user.
History
The term "fuzz" originates from a fall 1988 class project in the graduate Advanced Operating Systems class (CS736), taught by Prof. Barton Miller at the University of Wisconsin, whose results were subsequently published in 1990. To fuzz test a UNIX utility meant to automatically generate random input and command-line parameters for the utility. The project was designed to test the reliability of UNIX command line programs by executing a large number of random inputs in quick succession until they crashed. Miller's team was able to crash 25 to 33 percent of the utilities that they tested. They then debugged each of the crashes to determine the cause and categorized each detected failure. To allow other researchers to conduct similar experiments with other software, the source code of the tools, the test procedures, and the raw result data were made publicly available. This early fuzzing would now be called black box, generational, unstructured (dumb) fuzzing.
This 1990 fuzz paper also noted the relationship of reliability to security: "Second, one of the bugs that we found was caused by the same programming practice that provided one of the security holes to the Internet worm (the 'gets finger' bug). We have found additional bugs that might indicate future security holes." (Referring to the Morris worm of November 1988.)
The original fuzz project went on to make contributions in 1995, 2000, 2006 and most recently in 2020:
1995: The "fuzz revisited" paper consisted of four parts. (1) Reproduced the original command line study, including a wider variety of UNIX systems and more utilities. The study showed that, if anything, reliability had gotten worse. This was the first study that included open source GNU and Linux utilities that, interestingly, were significantly more reliable than those from the commercial UNIX systems. (2) Introduced the fuzz testing of GUI (window based) applications under X-Windows. This study used both unstructured and structured (valid sequences of mouse and keyboard events) input data. They were able to crash 25% of the X-Windows applications. In addition, they tested the X-Windows server and showed that it was resilient to crashes. (3) Introduced fuzz testing of network services, again based on structured test input. None of these services was crashed. (4) Introduced random testing of system library call return values, specifically randomly returning zero from the malloc family of functions. Almost half the standard UNIX programs failed to properly check such return values.
2000: Applied fuzz testing to the recently released Windows NT operating system, testing applications that ran under the Win32 window system. They were able to crash 21% of the applications and hang an additional 24% of those tested. Again, applications were testing with both unstructured and structured (valid keyboard and mouse events) input, crashing almost half of those applications that they tested. They identified the causes of the failures and found them to be similar to previous studies.
2006: Applied fuzz testing to Mac OS X, for both command line and window based applications. They tested 135 command line utility programs, crashing 7% of those tested. In addition, they tested 30 applications that ran under the MacOS Aqua window system, crashing 73% of those tested.
2020: Most recently, they applied the classic generational, black box, unstructured testing to current UNIX systems, specially Linux, FreeBSD and MacOS, to see if the original techniques were still relevant and if current utility programs were resistant to this type of testing. They tested approximately 75 utilities on each platform, with failure rates of 12% on Linux, 16% on MacOS and 19% on FreeBSD. (Note that these failure rates were worse than the results from earlier test of the same systems.) When they analyzed each failure and categorized them, they found that the classic categories of failures, such as pointer and array errors and not checking return codes, were still broadly present in the new results. In addition, new failure causes cropped up from complex program state and algorithms that did not scale with the input size or complexity. They also tested UNIX utilities written more recently in Rust and found that they were of similar reliability to the ones written in C, though (as expected) less likely to have memory errors.
In April 2012, Google announced ClusterFuzz, a cloud-based fuzzing infrastructure for security-critical components of the Chromium web browser. Security researchers can upload their own fuzzers and collect bug bounties if ClusterFuzz finds a crash with the uploaded fuzzer.
In September 2014, Shellshock was disclosed as a family of security bugs in the widely used UNIX Bash shell; most vulnerabilities of Shellshock were found using the fuzzer AFL. (Many Internet-facing services, such as some web server deployments, use Bash to process certain requests, allowing an attacker to cause vulnerable versions of Bash to execute arbitrary commands. This can allow an attacker to gain unauthorized access to a computer system.)
In April 2015, Hanno Böck showed how the fuzzer AFL could have found the 2014 Heartbleed vulnerability. (The Heartbleed vulnerability was disclosed in April 2014. It is a serious vulnerability that allows adversaries to decipher otherwise encrypted communication. The vulnerability was accidentally introduced into OpenSSL which implements TLS and is used by the majority of the servers on the internet. Shodan reported 238,000 machines still vulnerable in April 2016; 200,000 in January 2017.)
In August 2016, the Defense Advanced Research Projects Agency (DARPA) held the finals of the first Cyber Grand Challenge, a fully automated capture-the-flag competition that lasted 11 hours. The objective was to develop automatic defense systems that can discover, exploit, and correct software flaws in real-time. Fuzzing was used as an effective offense strategy to discover flaws in the software of the opponents. It showed tremendous potential in the automation of vulnerability detection. The winner was a system called "Mayhem" developed by the team ForAllSecure led by David Brumley.
In September 2016, Microsoft announced Project Springfield, a cloud-based fuzz testing service for finding security critical bugs in software.
In December 2016, Google announced OSS-Fuzz which allows for continuous fuzzing of several security-critical open-source projects.
At Black Hat 2018, Christopher Domas demonstrated the use of fuzzing to expose the existence of a hidden RISC core in a processor. This core was able to bypass existing security checks to execute Ring 0 commands from Ring 3.
In September 2020, Microsoft released OneFuzz, a self-hosted fuzzing-as-a-service platform that automates the detection of software bugs. It supports Windows and Linux.
Early random testing
Testing programs with random inputs dates back to the 1950s when data was still stored on punched cards. Programmers would use punched cards that were pulled from the trash or card decks of random numbers as input to computer programs. If an execution revealed undesired behavior, a bug had been detected.
The execution of random inputs is also called random testing or monkey testing.
In 1981, Duran and Ntafos formally investigated the effectiveness of testing a program with random inputs. While random testing had been widely perceived to be the worst means of testing a program, the authors could show that it is a cost-effective alternative to more systematic testing techniques.
In 1983, Steve Capps at Apple developed "The Monkey", a tool that would generate random inputs for classic Mac OS applications, such as MacPaint. The figurative "monkey" refers to the infinite monkey theorem which states that a monkey hitting keys at random on a typewriter keyboard for an infinite amount of time will eventually type out the entire works of Shakespeare. In the case of testing, the monkey would write the particular sequence of inputs that would trigger a crash.
In 1991, the crashme tool was released, which was intended to test the robustness of Unix and Unix-like operating systems by randomly executing systems calls with randomly chosen parameters.
Types
A fuzzer can be categorized in several ways:
A fuzzer can be generation-based or mutation-based depending on whether inputs are generated from scratch or by modifying existing inputs.
A fuzzer can be dumb (unstructured) or smart (structured) depending on whether it is aware of input structure.
A fuzzer can be white-, grey-, or black-box, depending on whether it is aware of program structure.
Reuse of existing input seeds
A mutation-based fuzzer leverages an existing corpus of seed inputs during fuzzing. It generates inputs by modifying (or rather mutating) the provided seeds. For example, when fuzzing the image library libpng, the user would provide a set of valid PNG image files as seeds while a mutation-based fuzzer would modify these seeds to produce semi-valid variants of each seed. The corpus of seed files may contain thousands of potentially similar inputs. Automated seed selection (or test suite reduction) allows users to pick the best seeds in order to maximize the total number of bugs found during a fuzz campaign.
A generation-based fuzzer generates inputs from scratch. For instance, a smart generation-based fuzzer takes the input model that was provided by the user to generate new inputs. Unlike mutation-based fuzzers, a generation-based fuzzer does not depend on the existence or quality of a corpus of seed inputs.
Some fuzzers have the capability to do both, to generate inputs from scratch and to generate inputs by mutation of existing seeds.
Aware of input structure
Typically, fuzzers are used to generate inputs for programs that take structured inputs, such as a file, a sequence of keyboard or mouse events, or a sequence of messages. This structure distinguishes valid input that is accepted and processed by the program from invalid input that is quickly rejected by the program. What constitutes a valid input may be explicitly specified in an input model. Examples of input models are formal grammars, file formats, GUI-models, and network protocols. Even items not normally considered as input can be fuzzed, such as the contents of databases, shared memory, environment variables or the precise interleaving of threads. An effective fuzzer generates semi-valid inputs that are "valid enough" so that they are not directly rejected from the parser and "invalid enough" so that they might stress corner cases and exercise interesting program behaviours.
A smart (model-based, grammar-based, or protocol-based) fuzzer leverages the input model to generate a greater proportion of valid inputs. For instance, if the input can be modelled as an abstract syntax tree, then a smart mutation-based fuzzer would employ random transformations to move complete subtrees from one node to another. If the input can be modelled by a formal grammar, a smart generation-based fuzzer would instantiate the production rules to generate inputs that are valid with respect to the grammar. However, generally the input model must be explicitly provided, which is difficult to do when the model is proprietary, unknown, or very complex. If a large corpus of valid and invalid inputs is available, a grammar induction technique, such as Angluin's L* algorithm, would be able to generate an input model.
A dumb fuzzer does not require the input model and can thus be employed to fuzz a wider variety of programs. For instance, AFL is a dumb mutation-based fuzzer that modifies a seed file by flipping random bits, by substituting random bytes with "interesting" values, and by moving or deleting blocks of data. However, a dumb fuzzer might generate a lower proportion of valid inputs and stress the parser code rather than the main components of a program. The disadvantage of dumb fuzzers can be illustrated by means of the construction of a valid checksum for a cyclic redundancy check (CRC). A CRC is an error-detecting code that ensures that the integrity of the data contained in the input file is preserved during transmission. A checksum is computed over the input data and recorded in the file. When the program processes the received file and the recorded checksum does not match the re-computed checksum, then the file is rejected as invalid. Now, a fuzzer that is unaware of the CRC is unlikely to generate the correct checksum. However, there are attempts to identify and re-compute a potential checksum in the mutated input, once a dumb mutation-based fuzzer has modified the protected data.
Aware of program structure
Typically, a fuzzer is considered more effective if it achieves a higher degree of code coverage. The rationale is, if a fuzzer does not exercise certain structural elements in the program, then it is also not able to reveal bugs that are hiding in these elements. Some program elements are considered more critical than others. For instance, a division operator might cause a division by zero error, or a system call may crash the program.
A black-box fuzzer treats the program as a black box and is unaware of internal program structure. For instance, a random testing tool that generates inputs at random is considered a blackbox fuzzer. Hence, a blackbox fuzzer can execute several hundred inputs per second, can be easily parallelized, and can scale to programs of arbitrary size. However, blackbox fuzzers may only scratch the surface and expose "shallow" bugs. Hence, there are attempts to develop blackbox fuzzers that can incrementally learn about the internal structure (and behavior) of a program during fuzzing by observing the program's output given an input. For instance, LearnLib employs active learning to generate an automaton that represents the behavior of a web application.
A white-box fuzzer leverages program analysis to systematically increase code coverage or to reach certain critical program locations. For instance, SAGE leverages symbolic execution to systematically explore different paths in the program.
If the program's specification is available, a whitebox fuzzer might leverage techniques from model-based testing to generate inputs and check the program outputs against the program specification.
A whitebox fuzzer can be very effective at exposing bugs that hide deep in the program. However, the time used for analysis (of the program or its specification) can become prohibitive. If the whitebox fuzzer takes relatively too long to generate an input, a blackbox fuzzer will be more efficient. Hence, there are attempts to combine the efficiency of blackbox fuzzers and the effectiveness of whitebox fuzzers.
A gray-box fuzzer leverages instrumentation rather than program analysis to glean information about the program. For instance, AFL and libFuzzer utilize lightweight instrumentation to trace basic block transitions exercised by an input. This leads to a reasonable performance overhead but informs the fuzzer about the increase in code coverage during fuzzing, which makes gray-box fuzzers extremely efficient vulnerability detection tools.
Uses
Fuzzing is used mostly as an automated technique to expose vulnerabilities in security-critical programs that might be exploited with malicious intent. More generally, fuzzing is used to demonstrate the presence of bugs rather than their absence. Running a fuzzing campaign for several weeks without finding a bug does not prove the program correct. After all, the program may still fail for an input that has not been executed, yet; executing a program for all inputs is prohibitively expensive. If the objective is to prove a program correct for all inputs, a formal specification must exist and techniques from formal methods must be used.
Exposing bugs
In order to expose bugs, a fuzzer must be able to distinguish expected (normal) from unexpected (buggy) program behavior. However, a machine cannot always distinguish a bug from a feature. In automated software testing, this is also called the test oracle problem.
Typically, a fuzzer distinguishes between crashing and non-crashing inputs in the absence of specifications and to use a simple and objective measure. Crashes can be easily identified and might indicate potential vulnerabilities (e.g., denial of service or arbitrary code execution). However, the absence of a crash does not indicate the absence of a vulnerability. For instance, a program written in C may or may not crash when an input causes a buffer overflow. Rather the program's behavior is undefined.
To make a fuzzer more sensitive to failures other than crashes, sanitizers can be used to inject assertions that crash the program when a failure is detected. There are different sanitizers for different kinds of bugs:
to detect memory related errors, such as buffer overflows and use-after-free (using memory debuggers such as AddressSanitizer),
to detect race conditions and deadlocks (ThreadSanitizer),
to detect undefined behavior (UndefinedBehaviorSanitizer),
to detect memory leaks (LeakSanitizer), or
to check control-flow integrity (CFISanitizer).
Fuzzing can also be used to detect "differential" bugs if a reference implementation is available. For automated regression testing, the generated inputs are executed on two versions of the same program. For automated differential testing, the generated inputs are executed on two implementations of the same program (e.g., lighttpd and httpd are both implementations of a web server). If the two variants produce different output for the same input, then one may be buggy and should be examined more closely.
Validating static analysis reports
Static program analysis analyzes a program without actually executing it. This might lead to false positives where the tool reports problems with the program that do not actually exist. Fuzzing in combination with dynamic program analysis can be used to try to generate an input that actually witnesses the reported problem.
Browser security
Modern web browsers undergo extensive fuzzing. The Chromium code of Google Chrome is continuously fuzzed by the Chrome Security Team with 15,000 cores. For Microsoft Edge and Internet Explorer, Microsoft performed fuzzed testing with 670 machine-years during product development, generating more than 400 billion DOM manipulations from 1 billion HTML files.
Toolchain
A fuzzer produces a large number of inputs in a relatively short time. For instance, in 2016 the Google OSS-fuzz project produced around 4 trillion inputs a week. Hence, many fuzzers provide a toolchain that automates otherwise manual and tedious tasks which follow the automated generation of failure-inducing inputs.
Automated bug triage
Automated bug triage is used to group a large number of failure-inducing inputs by root cause and to prioritize each individual bug by severity. A fuzzer produces a large number of inputs, and many of the failure-inducing ones may effectively expose the same software bug. Only some of these bugs are security-critical and should be patched with higher priority. For instance the CERT Coordination Center provides the Linux triage tools which group crashing inputs by the produced stack trace and lists each group according to their probability to be exploitable. The Microsoft Security Research Centre (MSEC) developed the !exploitable tool which first creates a hash for a crashing input to determine its uniqueness and then assigns an exploitability rating:
Exploitable
Probably Exploitable
Probably Not Exploitable, or
Unknown.
Previously unreported, triaged bugs might be automatically reported to a bug tracking system. For instance, OSS-Fuzz runs large-scale, long-running fuzzing campaigns for several security-critical software projects where each previously unreported, distinct bug is reported directly to a bug tracker. The OSS-Fuzz bug tracker automatically informs the maintainer of the vulnerable software and checks in regular intervals whether the bug has been fixed in the most recent revision using the uploaded minimized failure-inducing input.
Automated input minimization
Automated input minimization (or test case reduction) is an automated debugging technique to isolate that part of the failure-inducing input that is actually inducing the failure. If the failure-inducing input is large and mostly malformed, it might be difficult for a developer to understand what exactly is causing the bug. Given the failure-inducing input, an automated minimization tool would remove as many input bytes as possible while still reproducing the original bug. For instance, Delta Debugging is an automated input minimization technique that employs an extended binary search algorithm to find such a minimal input.
See also
American fuzzy lop (fuzzer)
Concolic testing
Glitch
Glitching
Monkey testing
Random testing
Responsible disclosure
Runtime error detection
Security testing
Smoke testing (software)
Symbolic execution
System testing
Test automation
References
Further reading
Ari Takanen, Jared D. DeMott, Charles Miller, Fuzzing for Software Security Testing and Quality Assurance, 2008,
Michael Sutton, Adam Greene, and Pedram Amini. Fuzzing: Brute Force Vulnerability Discovery, 2007, .
H. Pohl, Cost-Effective Identification of Zero-Day Vulnerabilities with the Aid of Threat Modeling and Fuzzing, 2011
Fabien Duchene, Detection of Web Vulnerabilities via Model Inference assisted Evolutionary Fuzzing, 2014, PhD Thesis
Bratus, S., Darley, T., Locasto, M., Patterson, M.L., Shapiro, R.B., Shubina, A., Beyond Planted Bugs in "Trusting Trust": The Input-Processing Frontier, IEEE Security & Privacy Vol 12, Issue 1, (Jan-Feb 2014), pp. 83–87—Basically highlights why fuzzing works so well: because the input is the controlling program of the interpreter.
External links
Fuzzing Project, includes tutorials, a list of security-critical open-source projects, and other resources.
University of Wisconsin Fuzz Testing (the original fuzz project) Source of papers and fuzz software.
Designing Inputs That Make Software Fail, conference video including fuzzy testing
Link to the Oulu (Finland) University Secure Programming Group
Building 'Protocol Aware' Fuzzing Frameworks
Software testing
Computer security procedures |
16144050 | https://en.wikipedia.org/wiki/Edge%20Technologies | Edge Technologies | Edge Technologies, Inc. is an American software company, focusing on the integration of secure web applications. Edge provides software products and enterprise services to corporations and government agencies. Edge was founded in 1993 and is headquartered in Arlington, Virginia. In 2017, the company was acquired by Lotus Innovations Fund.
Products
enVision is the first software product to provide a web interface for HP Openview and Network Node Manager.
Released in 2000, enPortal is a secure, integration Web portal. It lets service providers or large enterprise customers view data from disparate network-management systems through a single Web interface. The enPortal customer base is primarily corporations and government agencies which use network management applications. enPortal offers prepackaged Product Integration Modules (PIMs). PIMs provide pre-built integration with commonly used applications, including products from Concord Communications, Hewlett-Packard, InfoVista, IBM/Tivoli Netcool, and Remedy. Single sign-on allows the user to log into enPortal, which then automatically logs into all of the other applications integrated into the portal. The software also can automate workflow, normalize and correlate events, and take action based on user-defined rules.
Released in 2008, AppBoard is a data integration and visualization platform that allows for the rapid development and deployment of real-time business systems dashboards. AppBoard consists of a series of Data Adapters, Widgets, and a dashboard Builder. In 2012, Edge released mobile versions of the AppBoard client for Android and iOS in conjunction with the version 2.2 release of AppBoard.
Released in 2017, edgeSuite is a data integration and data visualization platform that aims to provide efficient development and deployment of real-time business systems dashboards. edgeCore allows users to connect, visualize, and interact with data in a user-friendly manner. edgeWeb allows users to integrate web-based interfaces. edgeRPA (add-on module released in 2019) provides for automation of tasks by Robotic Process Automation. edgeSuite is multi-platform.
See also
Java Portlet specification
References
External links
"Secure Portal-Based Information Display and Consolidation Technology" patent awarded in 2007
Business software
Companies based in Arlington County, Virginia
Companies established in 1993
Software companies based in Virginia
Software companies of the United States |
22738416 | https://en.wikipedia.org/wiki/Linux%20Vacation%20/%20Eastern%20Europe | Linux Vacation / Eastern Europe | Linux Vacation / Eastern Europe (LVEE) is an annual international conference of developers and users of free and open source software. It takes place in the end of June – beginning of July in Belarus, near the Grodno city.
The event is aimed at combining both professional communication and leisure activities for the free software professionals and enthusiasts. LVEE organizers are Minsk Linux Users Group and open source community active members from Grodno and Brest. Recommended languages are Belarusian, English and Russian.
History
The first LVEE conference took place in 2005. It was inspired by a Russian LinuxFest event, after the large Minsk delegation had taken part in it in 2004. This visit resulted in a decision to organise a similar event in a slightly more official setting for free software enthusiasts and professionals from Belarus and neighbouring countries. The format of LVEE includes presentations and lightning talks as well as workshops and round table discussions.
Currently LVEE is the only general-topic open source conference held in Belarus (according to interview with the conference organisers and claims on its official website). Despite its historically formed naming, conference is not limited to the Linux operating system, but also covers a wide range of platforms: from workstations and servers to embedded systems and mobile devices. The presentation topics are normally focused on the design, development, and maintenance of free software, adoption and administration of FOSS-based solutions, making business based on open technologies, licensing, legal and policy issues.
The conference has been sponsored by Belarusian and foreign IT companies involved with open source projects and communities: Altoros, Collabora, EPAM Systems, Promwad, SaM Solutions, etc.
Photos
References
External links
The official website of the conference
MLUG website
Free-software conferences
Linux conferences
Recurring events established in 2005 |
59372429 | https://en.wikipedia.org/wiki/Ilus%20%28son%20of%20Dardanus%29 | Ilus (son of Dardanus) | In Greek mythology, Ilus (; Ancient Greek: Ἶλος or Ἴλου Ilos) was a king of Dardania.
Family
Ilus was the eldest son of Dardanus either by Batea of Troad, daughter of Teucer, or probably Olizone, daughter of Phineus. Ilus was the brother of Erichthonius, his successor. In some accounts, the names of the two sons of Dardanus and Batea were Erichthonius and Zacynthus.
Mythology
After Dardanus died, his heir Ilus succeeded him to the throne. However, after his long reign, he died childless and heirless. His brother Erichthonius consequently gained the kingship, and became the ancestor of the later Trojans. Homer's Iliad mentions at several points the tomb of Ilus in the middle of the Trojan plain.
Family tree
Notes
References
Dictys Cretensis, from The Trojan War. The Chronicles of Dictys of Crete and Dares the Phrygian translated by Richard McIlwaine Frazer, Jr. (1931-). Indiana University Press. 1966. Online version at the Topos Text Project.
Dionysus of Halicarnassus, Roman Antiquities. English translation by Earnest Cary in the Loeb Classical Library, 7 volumes. Harvard University Press, 1937-1950. Online version at Bill Thayer's Web Site
Dionysius of Halicarnassus, Antiquitatum Romanarum quae supersunt, Vol I-IV. . Karl Jacoby. In Aedibus B.G. Teubneri. Leipzig. 1885. Greek text available at the Perseus Digital Library.
Homer, The Iliad with an English Translation by A.T. Murray, Ph.D. in two volumes. Cambridge, MA., Harvard University Press; London, William Heinemann, Ltd. 1924. Online version at the Perseus Digital Library.
Homer, Homeri Opera in five volumes. Oxford, Oxford University Press. 1920. Greek text available at the Perseus Digital Library.
Pseudo-Apollodorus, The Library with an English Translation by Sir James George Frazer, F.B.A., F.R.S. in 2 Volumes, Cambridge, MA, Harvard University Press; London, William Heinemann Ltd. 1921. Online version at the Perseus Digital Library. Greek text available from the same website.
Mythological kings of Troy
Princes in Greek mythology
Kings in Greek mythology
Trojans |
13547404 | https://en.wikipedia.org/wiki/Amateur%20radio%20in%20India | Amateur radio in India | Amateur radio or ham radio is practised by more than 22,000 licensed users in India. The first amateur radio operator was licensed in 1921, and by the mid-1930s, there were around 20 amateur radio operators in India. Amateur radio operators played an important part in the Indian independence movement with the establishment of illegal pro-independence radio stations in the 1940s. The three decades after India's independence saw only slow growth in the numbers of operators until the then Prime Minister of India and amateur radio operator, Rajiv Gandhi (VU2RG), waived the import duty on wireless equipment in 1984. Since then, numbers have picked up, and , there were more than 16,000 operators in the country. Amateur radio operators have played a vital role during disasters and national emergencies such as earthquakes, tsunamis, cyclones, floods, and bomb blasts, by providing voluntary emergency communications in the affected areas.
The Wireless and Planning and Coordination Wing (WPC)—a division of the Ministry of Communications and Information Technology—regulates amateur radio in India. The WPC assigns call signs, issues amateur radio licences, conducts exams, allots frequency spectrum, and monitors the radio waves. Popular amateur radio events include daily ham nets, the annual Hamfest India, and regular DX contests.
History
The first amateur radio operator in India was Amarendra Chandra Gooptu (callsign 2JK), licensed in 1921.
Later that year, Mukul Bose (2HQ) became the second ham operator, thereby introducing the first two-way ham radio communication in the country. By 1923, there were twenty British hams operating in India. In 1929, the call sign prefix VU came into effect in India, replacing three-letter call signs. The first short-wave entertainment and public broadcasting station, "VU6AH", was set up in 1935 by E P Metcalfe, vice-chancellor of Mysore University. However, there were fewer than fifty licence holders in the mid-1930s, most of them British officers in the Indian army.
With the outbreak of World War II in 1939, the British cancelled the issue of new licences. All amateur radio operators were sent written orders to surrender their transmitting equipment to the police, both for possible use in the war effort and to prevent the clandestine use of the stations by Axis collaborators and spies. With the gaining momentum of the Indian independence movement, ham operator Nariman Abarbad Printer (VU2FU) set up the Azad Hind Radio to broadcast Gandhian protest music and uncensored news; he was immediately arrested and his equipment seized. In August 1942, after Mahatma Gandhi launched the Quit India Movement, the British began clamping down on the activities of Indian independence activists and censoring the media. To circumvent media restrictions, Indian National Congress activists, led by Usha Mehta, contacted Mumbai-based amateur radio operators, "Bob" Tanna (VU2LK) and Nariman Printer to help broadcast messages to grass-roots party workers across the country. The radio service was called the "Congress Radio", and began broadcasting from 2 September 1942 on 7.12 MHz. The station could be received as far as Japanese-occupied Myanmar. By November 1942, Tanna was betrayed by an unknown radio officer and was forced to shut down the station.
Temporary amateur radio licences were issued from 1946, after the end of World War II. By 1948, there were 50 amateur radio operators in India, although only a dozen were active. Following India's independence in 1947, the first amateur radio organization, the Amateur Radio Club of India was inaugurated on 15 May 1948 at the School of Signals at Mhow in Madhya Pradesh. The club headquarters was later moved to New Delhi, where it was renamed the Amateur Radio Society of India (ARSI) on 15 May 1954. As India's oldest amateur radio organization, ARSI became its representative at the International Amateur Radio Union.
Partly due to low awareness among the general population and prohibitive equipment costs, the number of licensed amateur radio operators did not increase significantly over the next two decades, numbering fewer than a thousand by 1970. CW (Morse code) and AM were the predominant modes at that time. The electronic equipment was mostly valve-based, obtained from Indian army surpluses. During the mid-1960s, the modes of operation saw a change from Amplitude Modulation to Single Side Band (SSB) as the preferred communication mode. By 1980, the number of amateur radio operators had risen to 1,500. In 1984, then Indian Prime Minister, Rajiv Gandhi, waived the import duty for wireless equipment. After this, the number of operators rose steadily, and by 2000 there were 10,000 licensed ham operators. As of 2007, there are more than 17,000 licensed users in India.
Amateur radio operators have played a significant part in disaster management and emergencies. In 1991, during the Gulf War, a lone Indian ham operator in Kuwait, provided the only means of communication between stranded Indian nationals in that country and their relatives in India. Amateur radio operators have also played a helpful part in disaster management. Shortly after the 1993 Latur and 2001 Gujarat earthquakes, the central government rushed teams of ham radio operators to the epicentre to provide vital communication links. In December 2004, a group of amateur radio operators on DX-pedition on the Andaman Islands witnessed the 2004 Indian Ocean Tsunami. With communication lines between the islands severed, the group provided the only way of relaying live updates and messages to stations across the world.
In 2005, India became one of few countries to launch an amateur radio satellite, the HAMSAT. The Indian Space Research Organisation (ISRO) launched the microsatellite as an auxiliary payload on the PSLV-6.
Licence
The Indian Wireless Telegraph (Amateur Service) Rules, 2009 lists two licence categories:
Amateur Wireless Telegraph Station Licence (General)
Amateur Wireless Telegraph Station Licence (Restricted)
After passing the examination, the candidate must then clear a police interview. After clearance, the WPC grants the licence along with the user-chosen call sign. This procedure can take up to 12 months.
Examination
Amateur Station Operator's Certificate or ASOC is the examination that needs to be passed to receive an amateur radio licence in India. The exam is conducted by the Wireless and Planning and Coordination Wing (WPC) of the Ministry of the Ministry of Communications and Information Technology. The examination is held monthly in Delhi, Mumbai, Kolkata and Chennai, every two months in Ahmedabad, Nagpur and Hyderabad, and every four months in some smaller cities. The licence may be awarded to an individual or a club station operated by a group of licensed amateur radio operators.
The exam consists of two parts:
Part I – Written Test
Section I: Radio Theory and Practice
Section 2 : Regulations
Part II – Morse (Not required for Restricted Grade)
Section 1 : Morse Receiving and Sending : (Speed: 8 words per minute)
Section 2 : Morse Receiving and Sending : (Speed: 8 words per minute)
The maximum number of marks that a candidate can secure is 100. To pass the examination, a candidate must score a minimum of 40 (50 for Grade I) in each written section, and 50 (55 for Grade I) in aggregate for a pass.
The application and licensing procedures are done online through WPC portal https://saralsanchar.gov.in/
Radio theory and practice
The Radio theory and practice syllabus includes eight subtopics:
The first subtopic is the elementary theory of electricity that covers topics on conductors, resistors, Ohm's Law, power, energy, electromagnets, inductance, capacitance, types of capacitors and inductors, series and parallel connections for radio circuits. The second topic is the elementary theory of alternating currents. Portions include sinusoidal alternating quantities such as peak values, instantaneous values, RMS average values, phase; electrical resonance, and quality factor for radio circuits. The syllabus then moves on to semiconductors, specifically the construction and operation of valves, also known as vacuum tubes. Included in this portion of the syllabus are thermionic emissions with their characteristic curves, diodes, triodes and multi-electrode valves; and the use of valves as rectifiers, oscillators, amplifiers, detectors and frequency changers, stabilisation and smoothing.
Radio receivers is the fourth topic that covers the principles and operation of TRF receivers and Superheterodyne receivers, CW reception; with receiver characteristics such as sensitivity, selectivity and fidelity; Adjacent-channel interference and image interference; AGC and squelch; and signal to noise ratio (S/R). Similarly, the next topic on transmitters covers the principles and operation of low power transmitters; oscillators such as the Colpitts oscillator, Hartley oscillator, crystal oscillators, and stability of oscillators.
The last three topics deal with radio propagation, aerials, and frequency measurement. Covered are topic such as wavelength, frequency, nature and propagation of radio waves; ground and sky waves; skip distance; and fading. Common types of transmitting and receiving aerials such as Yagi antennas, and radiation patterns, measurement of frequency and use of simple frequency meters conclude the topic.
Regulations
Knowledge of the Indian Wireless Telegraph Rules and the Indian Wireless Telegraphs (Amateur Service) Rules are essential and always tested. The syllabus also includes international radio regulations related to the operation of amateur stations with emphasis on provisions of radio regulation nomenclature of the frequency and wavelength, frequency allocation to amateur radio service, measures to prevent harmful interference, standard frequency and time signals services across the world, identification of stations, distress and urgency transmissions, amateur stations, phonetic alphabets, and figure code are the other topics included in the portion.
Also included in the syllabus are Q codes such as QRA, QRG, QRH, QRI, QRK, QRL, QRM, QRN, QRQ, QRS, QRT, QRU, QRV, QRW, QRX, QRZ, QSA, QSB, QSL, QSO, QSU, QSV, QSW, QSX, QSY, QSZ, QTC, QTH, QTR, and QUM; and CW abbreviations and prosigns such as AA, AB, AR, AS, C, CFM, CL, CQ, DE, K, NIL, OK, R, TU, VA, WA, and WB.
Morse
The syllabus includes the following Morse code characters: all alphabets, numbers, prosigns, and punctuations such as the full-stop; comma; semi-colon; break sign; hyphen and question mark.
Receiving
For Grade II, the test piece consists of a passage of 125 letters, five letters counting as one word. Candidates are required to copy for five minutes at the speed of five words per minute, international Morse signals from an audio oscillator keyed either manually or automatically. A short practice piece is sent at the prescribed speed before the start of the test. More than five errors disqualifies a candidate. For Grade I, the test piece consists of a passage of 300 characters: letters, figures, and punctuations. The average words contain five characters and each figure and punctuation is counted as two characters. Candidates have to receive for five consecutive minutes at a speed of 12 words per minute.
Sending
For Grade II, the test piece consists of 125 letters, with five letters forming one word. Candidates are required to transmit by using a Morse key for five consecutive minutes at the minimum speed of five words per minute. A short practice piece is allowed before the test. Candidates are not allowed more than one attempt in the test. More than five uncorrected errors disqualifies a candidate. For Grade I, the speed sent is 12 words per minute.
Fees
Reciprocal licensing and operational restrictions
Indian amateur radio exams can only be taken by Indian citizens. Foreign passport holders can apply for reciprocal Indian licences based upon a valid amateur radio call-sign from their country of residence.
Indian amateur radio licences always bear mention of location of transmitting equipment. Portable and mobile amateur radio stations require explicit permission from WPC.
Amateur radio operators from United States of America do not have automatic reciprocity in India. The use of US Federal Communications Commission (FCC) call-signs is prohibited under Indian law.
Call-signs
The International Telecommunication Union (ITU) has divided all countries into three regions; India is located in ITU Region 3. These regions are further divided into two competing zones, the ITU and the CQ. Mainland India and the Lakshadweep Islands come under ITU Zone 41 and CQ Zone 22, and the Andaman and Nicobar Islands under ITU Zone 49 and CQ Zone 26. The ITU has assigned to India call-sign blocks 8TA to 8YZ, VUA to VWZ, and ATA to AWZ.
The WPC allots individual call-signs. Indian amateur radio operators are allotted only the VU call-sign prefix. The V or Viceroy, series prefix was allotted to British colonies. at the 1912 London International Radiotelegraphic Convention.
VU call-signs are listed according to licence grade: for General (formerly the Advanced Grade and Grade–I) licence holders, the call-sign prefix is VU2; for Restricted (formerly Grade–II and Grade–II Restricted) licence holders, the prefix is VU3. The VU3 prefix has also been granted to foreigners operating in India. , call-signs consist of only letters, not numerals, and can be either two or three characters long. Examples of Indian amateur radio call-signs are "VU2XY" and "VU3EGH".
In addition to individual and club call-signs, the WPC allots temporary call-signs for contests and special events. For example, in November 2007, the WPC temporarily allotted the prefixes AT and AU to selected ham operators to mark the anniversary of the birth of radio scientist Jagadish Chandra Bose. The Indian Union territory (UT) of Andaman and Nicobar Islands are assigned the prefix VU4 and the UT of Lakshadweep is assigned VU7.
Defunct call-signs include CR8 (for Portuguese India), FN8 (for French India), and AC3 (for the former kingdom of Sikkim, which merged with India in 1975).
Organisation
The WPC is the only authorised body responsible for regulating amateur radio in India. The WPC has its headquarters in New Delhi with regional headquarters and monitoring stations in Mumbai (Bombay), Kolkata (Calcutta), and Chennai (Madras). It also has monitoring stations in Ahmedabad, Nagpur, Hyderabad, Ajmer, Bangalore, Darjeeling, Gorakhpur, Jalandhar, Goa (Betim), Mangalore, Shillong, Ranchi, Srinagar, Dibrugarh, Visakhapatnam, and Thiruvananthapuram. Set up in 1952, the organization is responsible for conducting exams, issuing licences, allotting frequency spectrum, and monitoring the airwaves. It is also responsible for maintaining the rules and regulations on amateur radio.
In India, amateur radio is governed by the Indian Wireless Telegraphs (Amateur Service) Rules, 1978, the Indian Wireless Telegraph Rules, the Indian Telegraph Act, 1885 and the Information Technology Act, 2000. The WPC is also responsible for coordinating with the Ministry of Internal Affairs and the Intelligence Bureau in running background checks before issuing amateur radio licences.
Allotted spectrum
The following frequency bands are permitted by the WPC for use by amateur radio operators in India.
Awareness drives
Indian amateur radio operators number approximately 22,000. Amateur radio clubs across the country offer training courses for the Amateur Station Operator's Certificate. People interested in the hobby would be advised to get in touch with a local radio club or a local amateur radio operator who can direct them to a club that organises training programmes.
Activities and events
Popular events and activities include Amateur Radio Direction Finding, DX-peditions, hamfests, JOTA, QRP operations, Contesting, DX communications, Light House operation, and Islands on Air. One of the most popular activities is Amateur Radio Direction Finding commonly known as a "foxhunt". Several clubs across India regularly organize foxhunts in which participants search for a hidden transmitter around the city. A foxhunt carried out in Matheran near Mumbai in 2005 by the Mumbai Amateur Radio Society was listed in the 2006 Limca Book of Records under the entry "most ham operators on horseback on a foxhunt." Despite being a popular recreational activity among hams, no organization has yet participated in an international event.
Hamfest India is an annual event that serves for social gathering and comparison and sales of radio equipment. Most hamfests feature a flea market, where the attendees buy and sell equipment, generally from and for their personal stations. The event also seeks to raise amateur radio awareness in the host city. In 2008, Gandhinagar hosted the annual hamfest. Bangalore hosted the hamfest in November 2009. The 2011 hamfest was held at Kochi, Kerala.
Ham nets, where amateur radio operators "check into" are regularly conducted across India. Airnet India, Charminar Net, Belgaum Net, and Nite Owl's Net are some of the well-known ham nets in India.
See also
Amateur radio frequency bands in India
Amateur Station Operator's Certificate
Citizens Band radio in India
Amateur radio callsigns of India
References
Note: Indian call signs do not use numbers as an identifier. This picture is for demonstration purposes only.
Amendment in Amateur Radio rule 2010 by WPC (actually based on 2009)
Further reading
Verma, Rajesh (1988), ABC of Amateur Radio and Citizen Band, EFY Publications
Ali, Saad (1985), Guide To Amateur Radio In India, E.M.J. Monteiro
External links
Ham Radio India
Vigyan Prasar - HAM radio
Amateur Radio Development Society - HAM radio in Kolkata
India |
268622 | https://en.wikipedia.org/wiki/Antivirus%20software | Antivirus software | Antivirus software, or antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.
Antivirus software was originally developed to detect and remove computer viruses, hence the name. However, with the proliferation of other malware, antivirus software started to protect from other computer threats. In particular, modern antivirus software can protect users from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraud tools, adware, and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity (privacy), online banking attacks, social engineering techniques, advanced persistent threat (APT), and botnet DDoS attacks.
History
1949–1980 period (pre-antivirus days)
Although the roots of the computer virus date back as early as 1949, when the Hungarian scientist John von Neumann published the "Theory of self-reproducing automata", the first known computer virus appeared in 1971 and was dubbed the "Creeper virus". This computer virus infected Digital Equipment Corporation's (DEC) PDP-10 mainframe computers running the TENEX operating system.
The Creeper virus was eventually deleted by a program created by Ray Tomlinson and known as "The Reaper". Some people consider "The Reaper" the first antivirus software ever written – it may be the case, but it is important to note that the Reaper was actually a virus itself specifically designed to remove the Creeper virus.
The Creeper virus was followed by several other viruses. The first known that appeared "in the wild" was "Elk Cloner", in 1981, which infected Apple II computers.
In 1983, the term "computer virus" was coined by Fred Cohen in one of the first ever published academic papers on computer viruses. Cohen used the term "computer virus" to describe programs that: "affect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of itself." (note that a more recent, and precise, definition of computer virus has been given by the Hungarian security researcher Péter Szőr: "a code that recursively replicates a possibly evolved copy of itself").
The first IBM PC compatible "in the wild" computer virus, and one of the first real widespread infections, was "Brain" in 1986. From then, the number of viruses has grown exponentially. Most of the computer viruses written in the early and mid-1980s were limited to self-reproduction and had no specific damage routine built into the code. That changed when more and more programmers became acquainted with computer virus programming and created viruses that manipulated or even destroyed data on infected computers.
Before internet connectivity was widespread, computer viruses were typically spread by infected floppy disks. Antivirus software came into use, but was updated relatively infrequently. During this time, virus checkers essentially had to check executable files and the boot sectors of floppy disks and hard disks. However, as internet usage became common, viruses began to spread online.
1980–1990 period (early days)
There are competing claims for the innovator of the first antivirus product. Possibly, the first publicly documented removal of an "in the wild" computer virus (i.e. the "Vienna virus") was performed by Bernd Fix in 1987.
In 1987, Andreas Lüning and Kai Figge, who founded G Data Software in 1985, released their first antivirus product for the Atari ST platform. In 1987, the Ultimate Virus Killer (UVK) was also released. This was the de facto industry standard virus killer for the Atari ST and Atari Falcon, the last version of which (version 9.0) was released in April 2004. In 1987, in the United States, John McAfee founded the McAfee company (was part of Intel Security) and, at the end of that year, he released the first version of VirusScan. Also in 1987 (in Czechoslovakia), Peter Paško, Rudolf Hrubý, and Miroslav Trnka created the first version of NOD antivirus.
In 1987, Fred Cohen wrote that there is no algorithm that can perfectly detect all possible computer viruses.
Finally, at the end of 1987, the first two heuristic antivirus utilities were released: Flushot Plus by Ross Greenberg and Anti4us by Erwin Lanting. In his O'Reilly book, Malicious Mobile Code: Virus Protection for Windows, Roger Grimes described Flushot Plus as "the first holistic program to fight malicious mobile code (MMC)."
However, the kind of heuristic used by early AV engines was totally different from those used today. The first product with a heuristic engine resembling modern ones was F-PROT in 1991. Early heuristic engines were based on dividing the binary into different sections: data section, code section (in a legitimate binary, it usually starts always from the same location). Indeed, the initial viruses re-organized the layout of the sections, or overrode the initial portion of a section in order to jump to the very end of the file where malicious code was located—only going back to resume execution of the original code. This was a very specific pattern, not used at the time by any legitimate software, which represented an elegant heuristic to catch suspicious code. Other kinds of more advanced heuristics were later added, such as suspicious section names, incorrect header size, regular expressions, and partial pattern in-memory matching.
In 1988, the growth of antivirus companies continued. In Germany, Tjark Auerbach founded Avira (H+BEDV at the time) and released the first version of AntiVir (named "Luke Filewalker" at the time). In Bulgaria, Vesselin Bontchev released his first freeware antivirus program (he later joined FRISK Software). Also Frans Veldman released the first version of ThunderByte Antivirus, also known as TBAV (he sold his company to Norman Safeground in 1998). In Czechoslovakia, Pavel Baudiš and Eduard Kučera started avast! (at the time ALWIL Software) and released their first version of avast! antivirus. In June 1988, in South Korea, Ahn Cheol-Soo released its first antivirus software, called V1 (he founded AhnLab later in 1995). Finally, in the Autumn 1988, in United Kingdom, Alan Solomon founded S&S International and created his Dr. Solomon's Anti-Virus Toolkit (although he launched it commercially only in 1991 – in 1998 Solomon's company was acquired by McAfee). In November 1988 a professor at the Panamerican University in Mexico City named Alejandro E. Carriles copyrighted the first antivirus software in Mexico under the name "Byte Matabichos" (Byte Bugkiller) to help solve the rampant virus infestation among students.
Also in 1988, a mailing list named VIRUS-L was started on the BITNET/EARN network where new viruses and the possibilities of detecting and eliminating viruses were discussed. Some members of this mailing list were: Alan Solomon, Eugene Kaspersky (Kaspersky Lab), Friðrik Skúlason (FRISK Software), John McAfee (McAfee), Luis Corrons (Panda Security), Mikko Hyppönen (F-Secure), Péter Szőr, Tjark Auerbach (Avira) and Vesselin Bontchev (FRISK Software).
In 1989, in Iceland, Friðrik Skúlason created the first version of F-PROT Anti-Virus (he founded FRISK Software only in 1993). Meanwhile in the United States, Symantec (founded by Gary Hendrix in 1982) launched its first Symantec antivirus for Macintosh (SAM). SAM 2.0, released March 1990, incorporated technology allowing users to easily update SAM to intercept and eliminate new viruses, including many that didn't exist at the time of the program's release.
In the end of the 1980s, in United Kingdom, Jan Hruska and Peter Lammer founded the security firm Sophos and began producing their first antivirus and encryption products. In the same period, in Hungary, also VirusBuster was founded (which has recently being incorporated by Sophos).
1990–2000 period (emergence of the antivirus industry)
In 1990, in Spain, Mikel Urizarbarrena founded Panda Security (Panda Software at the time). In Hungary, the security researcher Péter Szőr released the first version of Pasteur antivirus. In Italy, Gianfranco Tonello created the first version of VirIT eXplorer antivirus, then founded TG Soft one year later.
In 1990, the Computer Antivirus Research Organization (CARO) was founded. In 1991, CARO released the "Virus Naming Scheme", originally written by Friðrik Skúlason and Vesselin Bontchev. Although this naming scheme is now outdated, it remains the only existing standard that most computer security companies and researchers ever attempted to adopt. CARO members includes: Alan Solomon, Costin Raiu, Dmitry Gryaznov, Eugene Kaspersky, Friðrik Skúlason, Igor Muttik, Mikko Hyppönen, Morton Swimmer, Nick FitzGerald, Padgett Peterson, Peter Ferrie, Righard Zwienenberg and Vesselin Bontchev.
In 1991, in the United States, Symantec released the first version of Norton AntiVirus. In the same year, in the Czech Republic, Jan Gritzbach and Tomáš Hofer founded AVG Technologies (Grisoft at the time), although they released the first version of their Anti-Virus Guard (AVG) only in 1992. On the other hand, in Finland, F-Secure (founded in 1988 by Petri Allas and Risto Siilasmaa – with the name of Data Fellows) released the first version of their antivirus product. F-Secure claims to be the first antivirus firm to establish a presence on the World Wide Web.
In 1991, the European Institute for Computer Antivirus Research (EICAR) was founded to further antivirus research and improve development of antivirus software.
In 1992, in Russia, Igor Danilov released the first version of SpiderWeb, which later became Dr. Web.
In 1994, AV-TEST reported that there were 28,613 unique malware samples (based on MD5) in their database.
Over time other companies were founded. In 1996, in Romania, Bitdefender was founded and released the first version of Anti-Virus eXpert (AVX). In 1997, in Russia, Eugene Kaspersky and Natalya Kaspersky co-founded security firm Kaspersky Lab.
In 1996, there was also the first "in the wild" Linux virus, known as "Staog".
In 1999, AV-TEST reported that there were 98,428 unique malware samples (based on MD5) in their database.
2000–2005 period
In 2000, Rainer Link and Howard Fuhs started the first open source antivirus engine, called OpenAntivirus Project.
In 2001, Tomasz Kojm released the first version of ClamAV, the first ever open source antivirus engine to be commercialised. In 2007, ClamAV was bought by Sourcefire, which in turn was acquired by Cisco Systems in 2013.
In 2002, in United Kingdom, Morten Lund and Theis Søndergaard co-founded the antivirus firm BullGuard.
In 2005, AV-TEST reported that there were 333,425 unique malware samples (based on MD5) in their database.
2005–2014 period
In 2007, AV-TEST reported a number of 5,490,960 new unique malware samples (based on MD5) only for that year. In 2012 and 2013, antivirus firms reported a new malware samples range from 300,000 to over 500,000 per day.
Over the years it has become necessary for antivirus software to use several different strategies (e.g. specific email and network protection or low level modules) and detection algorithms, as well as to check an increasing variety of files, rather than just executables, for several reasons:
Powerful macros used in word processor applications, such as Microsoft Word, presented a risk. Virus writers could use the macros to write viruses embedded within documents. This meant that computers could now also be at risk from infection by opening documents with hidden attached macros.
The possibility of embedding executable objects inside otherwise non-executable file formats can make opening those files a risk.
Later email programs, in particular Microsoft's Outlook Express and Outlook, were vulnerable to viruses embedded in the email body itself. A user's computer could be infected by just opening or previewing a message.
In 2005, F-Secure was the first security firm that developed an Anti-Rootkit technology, called BlackLight.
Because most users are usually connected to the Internet on a continual basis, Jon Oberheide first proposed a Cloud-based antivirus design in 2008.
In February 2008 McAfee Labs added the industry-first cloud-based anti-malware functionality to VirusScan under the name Artemis. It was tested by AV-Comparatives in February 2008 and officially unveiled in August 2008 in McAfee VirusScan.
Cloud AV created problems for comparative testing of security software – part of the AV definitions was out of testers control (on constantly updated AV company servers) thus making results non-repeatable. As a result, Anti-Malware Testing Standards Organisation (AMTSO) started working on method of testing cloud products which was adopted on May 7, 2009.
In 2011, AVG introduced a similar cloud service, called Protective Cloud Technology.
2014–present (rise of next-gen)
Following the 2013 release of the APT 1 report from Mandiant, the industry has seen a shift towards signature-less approaches to the problem capable of detecting and mitigating zero-day attacks. Numerous approaches to address these new forms of threats have appeared, including behavioral detection, artificial intelligence, machine learning, and cloud-based file detonation. According to Gartner, it is expected the rise of new entrants, such Carbon Black, Cylance and Crowdstrike will force EPP incumbents into a new phase of innovation and acquisition. One method from Bromium involves micro-virtualization to protect desktops from malicious code execution initiated by the end user. Another approach from SentinelOne and Carbon Black focuses on behavioral detection by building a full context around every process execution path in real time, while Cylance leverages an artificial intelligence model based on machine learning. Increasingly, these signature-less approaches have been defined by the media and analyst firms as "next-generation" antivirus and are seeing rapid market adoption as certified antivirus replacement technologies by firms such as Coalfire and DirectDefense. In response, traditional antivirus vendors such as Trend Micro, Symantec and Sophos have responded by incorporating "next-gen" offerings into their portfolios as analyst firms such as Forrester and Gartner have called traditional signature-based antivirus "ineffective" and "outdated".
Identification methods
One of the few solid theoretical results in the study of computer viruses is Frederick B. Cohen's 1987 demonstration that there is no algorithm that can perfectly detect all possible viruses. However, using different layers of defense, a good detection rate may be achieved.
There are several methods which antivirus engines can use to identify malware:
Sandbox detection: a particular behavioural-based detection technique that, instead of detecting the behavioural fingerprint at run time, it executes the programs in a virtual environment, logging what actions the program performs. Depending on the actions logged, the antivirus engine can determine if the program is malicious or not. If not, then, the program is executed in the real environment. Albeit this technique has shown to be quite effective, given its heaviness and slowness, it is rarely used in end-user antivirus solutions.
Data mining techniques: one of the latest approaches applied in malware detection. Data mining and machine learning algorithms are used to try to classify the behaviour of a file (as either malicious or benign) given a series of file features, that are extracted from the file itself.
Signature-based detection
Traditional antivirus software relies heavily upon signatures to identify malware.
Substantially, when a malware sample arrives in the hands of an antivirus firm, it is analysed by malware researchers or by dynamic analysis systems. Then, once it is determined to be a malware, a proper signature of the file is extracted and added to the signatures database of the antivirus software.
Although the signature-based approach can effectively contain malware outbreaks, malware authors have tried to stay a step ahead of such software by writing "oligomorphic", "polymorphic" and, more recently, "metamorphic" viruses, which encrypt parts of themselves or otherwise modify themselves as a method of disguise, so as to not match virus signatures in the dictionary.
Heuristics
Many viruses start as a single infection and through either mutation or refinements by other attackers, can grow into dozens of slightly different strains, called variants. Generic detection refers to the detection and removal of multiple threats using a single virus definition.
For example, the Vundo trojan has several family members, depending on the antivirus vendor's classification. Symantec classifies members of the Vundo family into two distinct categories, Trojan.Vundo and Trojan.Vundo.B.
While it may be advantageous to identify a specific virus, it can be quicker to detect a virus family through a generic signature or through an inexact match to an existing signature. Virus researchers find common areas that all viruses in a family share uniquely and can thus create a single generic signature. These signatures often contain non-contiguous code, using wildcard characters where differences lie. These wildcards allow the scanner to detect viruses even if they are padded with extra, meaningless code. A detection that uses this method is said to be "heuristic detection."
Rootkit detection
Anti-virus software can attempt to scan for rootkits. A rootkit is a type of malware designed to gain administrative-level control over a computer system without being detected. Rootkits can change how the operating system functions and in some cases can tamper with the anti-virus program and render it ineffective. Rootkits are also difficult to remove, in some cases requiring a complete re-installation of the operating system.
Real-time protection
Real-time protection, on-access scanning, background guard, resident shield, autoprotect, and other synonyms refer to the automatic protection provided by most antivirus, anti-spyware, and other anti-malware programs. This monitors computer systems for suspicious activity such as computer viruses, spyware, adware, and other malicious objects. Real-time protection detects threats in opened files and scans apps in real-time as they are installed on the device. When inserting a CD, opening an email, or browsing the web, or when a file already on the computer is opened or executed.
Issues of concern
Unexpected renewal costs
Some commercial antivirus software end-user license agreements include a clause that the subscription will be automatically renewed, and the purchaser's credit card automatically billed, at the renewal time without explicit approval. For example, McAfee requires users to unsubscribe at least 60 days before the expiration of the present subscription while BitDefender sends notifications to unsubscribe 30 days before the renewal. Norton AntiVirus also renews subscriptions automatically by default.
Rogue security applications
Some apparent antivirus programs are actually malware masquerading as legitimate software, such as WinFixer, MS Antivirus, and Mac Defender.
Problems caused by false positives
A "false positive" or "false alarm" is when antivirus software identifies a non-malicious file as malware. When this happens, it can cause serious problems. For example, if an antivirus program is configured to immediately delete or quarantine infected files, as is common on Microsoft Windows antivirus applications, a false positive in an essential file can render the Windows operating system or some applications unusable. Recovering from such damage to critical software infrastructure incurs technical support costs and businesses can be forced to close whilst remedial action is undertaken.
Examples of serious false-positives:
May 2007: a faulty virus signature issued by Symantec mistakenly removed essential operating system files, leaving thousands of PCs unable to boot.
May 2007: the executable file required by Pegasus Mail on Windows was falsely detected by Norton AntiVirus as being a Trojan and it was automatically removed, preventing Pegasus Mail from running. Norton AntiVirus had falsely identified three releases of Pegasus Mail as malware, and would delete the Pegasus Mail installer file when that happened. In response to this Pegasus Mail stated:
April 2010: McAfee VirusScan detected svchost.exe, a normal Windows binary, as a virus on machines running Windows XP with Service Pack 3, causing a reboot loop and loss of all network access.
December 2010: a faulty update on the AVG anti-virus suite damaged 64-bit versions of Windows 7, rendering it unable to boot, due to an endless boot loop created.
October 2011: Microsoft Security Essentials (MSE) removed the Google Chrome web browser, rival to Microsoft's own Internet Explorer. MSE flagged Chrome as a Zbot banking trojan.
September 2012: Sophos' anti-virus suite identified various update-mechanisms, including its own, as malware. If it was configured to automatically delete detected files, Sophos Antivirus could render itself unable to update, required manual intervention to fix the problem.
September 2017: the Google Play Protect anti-virus started identifying Motorola's Moto G4 Bluetooth application as malware, causing Bluetooth functionality to become disabled.
System and interoperability related issues
Running (the real-time protection of) multiple antivirus programs concurrently can degrade performance and create conflicts. However, using a concept called multiscanning, several companies (including G Data Software and Microsoft) have created applications which can run multiple engines concurrently.
It is sometimes necessary to temporarily disable virus protection when installing major updates such as Windows Service Packs or updating graphics card drivers. Active antivirus protection may partially or completely prevent the installation of a major update. Anti-virus software can cause problems during the installation of an operating system upgrade, e.g. when upgrading to a newer version of Windows "in place"—without erasing the previous version of Windows. Microsoft recommends that anti-virus software be disabled to avoid conflicts with the upgrade installation process. Active anti-virus software can also interfere with a firmware update process.
The functionality of a few computer programs can be hampered by active anti-virus software. For example, TrueCrypt, a disk encryption program, states on its troubleshooting page that anti-virus programs can conflict with TrueCrypt and cause it to malfunction or operate very slowly. Anti-virus software can impair the performance and stability of games running in the Steam platform.
Support issues also exist around antivirus application interoperability with common solutions like SSL VPN remote access and network access control products. These technology solutions often have policy assessment applications that require an up-to-date antivirus to be installed and running. If the antivirus application is not recognized by the policy assessment, whether because the antivirus application has been updated or because it is not part of the policy assessment library, the user will be unable to connect.
Effectiveness
Studies in December 2007 showed that the effectiveness of antivirus software had decreased in the previous year, particularly against unknown or zero day attacks. The computer magazine c't found that detection rates for these threats had dropped from 40-50% in 2006 to 20–30% in 2007. At that time, the only exception was the NOD32 antivirus, which managed a detection rate of 68%. According to the ZeuS tracker website the average detection rate for all variants of the well-known ZeuS trojan is as low as 40%.
The problem is magnified by the changing intent of virus authors. Some years ago it was obvious when a virus infection was present. At the time, viruses were written by amateurs and exhibited destructive behavior or pop-ups. Modern viruses are often written by professionals, financed by criminal organizations.
In 2008, Eva Chen, CEO of Trend Micro, stated that the anti-virus industry has over-hyped how effective its products are—and so has been misleading customers—for years.
Independent testing on all the major virus scanners consistently shows that none provides 100% virus detection. The best ones provided as high as 99.9% detection for simulated real-world situations, while the lowest provided 91.1% in tests conducted in August 2013. Many virus scanners produce false positive results as well, identifying benign files as malware.
Although methods may differ, some notable independent quality testing agencies include AV-Comparatives, ICSA Labs, West Coast Labs, Virus Bulletin, AV-TEST and other members of the Anti-Malware Testing Standards Organization.
New viruses
Anti-virus programs are not always effective against new viruses, even those that use non-signature-based methods that should detect new viruses. The reason for this is that the virus designers test their new viruses on the major anti-virus applications to make sure that they are not detected before releasing them into the wild.
Some new viruses, particularly ransomware, use polymorphic code to avoid detection by virus scanners. Jerome Segura, a security analyst with ParetoLogic, explained:
A proof of concept virus has used the Graphics Processing Unit (GPU) to avoid detection from anti-virus software. The potential success of this involves bypassing the CPU in order to make it much harder for security researchers to analyse the inner workings of such malware.
Rootkits
Detecting rootkits is a major challenge for anti-virus programs. Rootkits have full administrative access to the computer and are invisible to users and hidden from the list of running processes in the task manager. Rootkits can modify the inner workings of the operating system and tamper with antivirus programs.
Damaged files
If a file has been infected by a computer virus, anti-virus software will attempt to remove the virus code from the file during disinfection, but it is not always able to restore the file to its undamaged state. In such circumstances, damaged files can only be restored from existing backups or shadow copies (this is also true for ransomware); installed software that is damaged requires re-installation (however, see System File Checker).
Firmware infections
Any writeable firmware in the computer can be infected by malicious code. This is a major concern, as an infected BIOS could require the actual BIOS chip to be replaced to ensure the malicious code is completely removed. Anti-virus software is not effective at protecting firmware and the motherboard BIOS from infection. In 2014, security researchers discovered that USB devices contain writeable firmware which can be modified with malicious code (dubbed "BadUSB"), which anti-virus software cannot detect or prevent. The malicious code can run undetected on the computer and could even infect the operating system prior to it booting up.
Performance and other drawbacks
Antivirus software has some drawbacks, first of which that it can impact a computer's performance.
Furthermore, inexperienced users can be lulled into a false sense of security when using the computer, considering their computers to be invulnerable, and may have problems understanding the prompts and decisions that antivirus software presents them with. An incorrect decision may lead to a security breach. If the antivirus software employs heuristic detection, it must be fine-tuned to minimize misidentifying harmless software as malicious (false positive).
Antivirus software itself usually runs at the highly trusted kernel level of the operating system to allow it access to all the potential malicious process and files, creating a potential avenue of attack. The US National Security Agency (NSA) and the UK Government Communications Headquarters (GCHQ) intelligence agencies,
respectively, have been exploiting anti-virus software to spy on users. Anti-virus software has highly privileged and trusted access to the underlying operating system, which makes it a much more appealing target for remote attacks. Additionally anti-virus software is "years behind security-conscious client-side applications like browsers or document readers. It means that Acrobat Reader, Microsoft Word or Google Chrome are harder to exploit than 90 percent of the anti-virus products out there", according to Joxean Koret, a researcher with Coseinc, a Singapore-based information security consultancy.
Alternative solutions
Antivirus software running on individual computers is the most common method employed of guarding against malware, but it is not the only solution. Other solutions can also be employed by users, including Unified Threat Management (UTM), hardware and network firewalls, Cloud-based antivirus and online scanners.
Hardware and network firewall
Network firewalls prevent unknown programs and processes from accessing the system. However, they are not antivirus systems and make no attempt to identify or remove anything. They may protect against infection from outside the protected computer or network, and limit the activity of any malicious software which is present by blocking incoming or outgoing requests on certain TCP/IP ports. A firewall is designed to deal with broader system threats that come from network connections into the system and is not an alternative to a virus protection system.
Cloud antivirus
Cloud antivirus is a technology that uses lightweight agent software on the protected computer, while offloading the majority of data analysis to the provider's infrastructure.
One approach to implementing cloud antivirus involves scanning suspicious files using multiple antivirus engines. This approach was proposed by an early implementation of the cloud antivirus concept called CloudAV. CloudAV was designed to send programs or documents to a network cloud where multiple antivirus and behavioral detection programs are used simultaneously in order to improve detection rates. Parallel scanning of files using potentially incompatible antivirus scanners is achieved by spawning a virtual machine per detection engine and therefore eliminating any possible issues. CloudAV can also perform "retrospective detection," whereby the cloud detection engine rescans all files in its file access history when a new threat is identified thus improving new threat detection speed. Finally, CloudAV is a solution for effective virus scanning on devices that lack the computing power to perform the scans themselves.
Some examples of cloud anti-virus products are Panda Cloud Antivirus and Immunet. Comodo Group has also produced cloud-based anti-virus.
Online scanning
Some antivirus vendors maintain websites with free online scanning capability of the entire computer, critical areas only, local disks, folders or files. Periodic online scanning is a good idea for those that run antivirus applications on their computers because those applications are frequently slow to catch threats. One of the first things that malicious software does in an attack is disable any existing antivirus software and sometimes the only way to know of an attack is by turning to an online resource that is not installed on the infected computer.
Specialized tools
Virus removal tools are available to help remove stubborn infections or certain types of infection. Examples include Avast Free Anti- Malware, AVG Free Malware Removal Tools, and Avira AntiVir Removal Tool. It is also worth noting that sometimes antivirus software can produce a false positive result, indicating an infection where there is none.
A rescue disk that is bootable, such as a CD or USB storage device, can be used to run antivirus software outside of the installed operating system, in order to remove infections while they are dormant. A bootable antivirus disk can be useful when, for example, the installed operating system is no longer bootable or has malware that is resisting all attempts to be removed by the installed antivirus software. Examples of some of these bootable disks include the Bitdefender Rescue CD, Kaspersky Rescue Disk 2018, and Windows Defender Offline (integrated into Windows 10 since the Anniversary Update). Most of the Rescue CD software can also be installed onto a USB storage device, that is bootable on newer computers.
Usage and risks
According to an FBI survey, major businesses lose $12 million annually dealing with virus incidents. A survey by Symantec in 2009 found that a third of small to medium-sized business did not use antivirus protection at that time, whereas more than 80% of home users had some kind of antivirus installed. According to a sociological survey conducted by G Data Software in 2010 49% of women did not use any antivirus program at all.
See also
Anti-virus and anti-malware software
CARO, the Computer Antivirus Research Organization
Comparison of antivirus software
Comparison of computer viruses
EICAR, the European Institute for Computer Antivirus Research
Firewall software
Internet security
Linux malware
Quarantine (computing)
Sandbox (computer security)
Timeline of computer viruses and worms
Virus hoax
Citations
General bibliography
Utility software types |
36234498 | https://en.wikipedia.org/wiki/2012%E2%80%9313%20USC%20Trojans%20men%27s%20basketball%20team | 2012–13 USC Trojans men's basketball team | The 2012–13 USC Trojans men's basketball team represented the University of Southern California during the 2012–13 NCAA Division I men's basketball season. They were led by fourth year head coach Kevin O'Neill until January 14 when O'Neill was fired. Bob Cantu was named as an interim head coach for the remainder. They played their home games at the Galen Center and were members of the Pac-12 Conference. They finished the season 14–18, 9–9 in Pac-12 play to finish in a four-way tie for sixth place. They lost in the first round of the Pac-12 Tournament to Utah.
Roster
2012–13 Schedule and results
|-
!colspan=9| Regular Season
|-
!colspan=9| Pac-12 Tournament
Notes
January 14, 2013 – Head coach Kevin O'Neill was removed as head coach and associate head coach Bob Cantu took over as interim head coach, athletic director Pat Haden announced.
References
USC
USC Trojans men's basketball seasons
USC Trojans
USC Trojans |
32631678 | https://en.wikipedia.org/wiki/Imperva | Imperva | Imperva is a cyber security software and services company which provides protection to enterprise data and application software. The company is headquartered in San Mateo, California.
History
Imperva, originally named WEBcohort, was founded in 2002 by Shlomo Kramer, Amichai Shulman and Mickey Boodaei. The following year the company shipped its first product, SecureSphere Web Application Database Protection, a web application firewall. In 2004, the company changed its name to Imperva.
In 2011, Imperva went public and was listed on the New York Stock Exchange (NYSE: IMPV). In August 2014, Imperva named Anthony Bettencourt as CEO. In 2016, it published a free scanner designed to detect devices infected with, or vulnerable to the Mirai botnet.
In February 2017, Imperva sold Skyfence to Forcepoint for $40 million. In August 2017, the company named Chris Hylen, the former CEO of Citrix GetGo, as its new president and CEO. Its former CEO, Anthony Bettencourt, resigned as chairman of the board of directors in February 2018. In 2018, Imperva identified a bug in Google Chrome which had been allowing attackers to steal information via HTML tags for audio and video files.
In 2019, Imperva was acquired by private equity firm Thoma Bravo. That same year, Imperva suffered a breach of its own when it notified customers that it learned about a security incident that exposed sensitive information for some users of Incapsula. CEO Chris Hylen left in October 2019 and Thoma Bravo Chairman of the Board, Charles Goodman, became interim CEO. In January 2020, Imperva named Pam Murphy as CEO.
Acquisitions
In 2014, Imperva acquired the complete shares of Incapsula, a cloud application security startup named SkyFence, and real-time mainframe security auditing assets from Tomium Software. In February 2017, the company purchased Camouflage, a data masking company.
In August 2018, Imperva acquired Prevoty, a runtime application self-protection (RASP) security company. In July 2019, it acquired Distil Networks for its bot management capabilities. In October 2020, Imperva acquired database security startup jSonar for an undisclosed amount.
Services
Imperva’s software stack contains products for both application and data security. It provides layered protection to ensure a company’s website located on-premises, in the cloud, or in a hybrid environment. The application security software includes Web Application Firewall (WAF), DDoS Protection, Runtime Application Self-Protection (RASP), API Security, bot management, Account Takeover (ATO) protection, attack analytics and application delivery; and the data security software includes Data Activity Monitoring (DAM), data risk analytics, data masking, discovery and assessment and file security.
Awards and recognitions
In 2013, Imperva received the Frost & Sullivan Southeast Asia Web Application Market Share Leadership Award for the second consecutive year. In 2016, Imperva won ICSA Labs’ Excellence in Information Security Testing Award. In 2017, Imperva was featured in CRN’s Security 100 list, as one of the coolest Identity Management and Data Protection Vendors. In 2018, Imperva WAF was recognized by customers in Gartner’s peer insight Customer Choice as one of the best WAFs of the year. In 2019, Imperva was recognized by Frost & Sullivan as the Asia-Pacific WAF Vendor of the Year. In 2020, the company was recognized for the seventh consecutive year as a leader in the Gartner Magic Quadrant for WAFs.
References
External links
2002 establishments in California
American companies established in 2002
Companies formerly listed on the Nasdaq
Computer security software companies
Companies based in San Mateo, California
Software companies based in the San Francisco Bay Area
Content delivery networks
Internet security
DDoS mitigation companies
Firewall software
2011 initial public offerings
2019 mergers and acquisitions
Private equity portfolio companies
Software companies of the United States
Software companies established in 2002 |
7412236 | https://en.wikipedia.org/wiki/Steve%20Jobs | Steve Jobs | Steven Paul Jobs (February 24, 1955 – October 5, 2011) was an American business magnate, industrial designer, media proprietor, and investor. He was the co-founder, chairman, and CEO of Apple; the chairman and majority shareholder of Pixar; a member of The Walt Disney Company's board of directors following its acquisition of Pixar; and the founder, chairman, and CEO of NeXT. He is widely recognized as a pioneer of the personal computer revolution of the 1970s and 1980s, along with his early business partner and fellow Apple co-founder Steve Wozniak.
Jobs attended Reed College in 1972 before withdrawing that same year, and traveled through India in 1974 seeking enlightenment and studying Zen Buddhism. He and Wozniak co-founded Apple in 1976 to sell Wozniak's Apple I personal computer. Together, the duo gained fame and wealth a year later with the Apple II, one of the first highly successful mass-produced microcomputers. Jobs saw the commercial potential of the Xerox Alto in 1979, which was mouse-driven and had a graphical user interface (GUI). This led to the development of the unsuccessful Apple Lisa in 1983, followed by the breakthrough Macintosh in 1984, the first mass-produced computer with a GUI. The Macintosh introduced the desktop publishing industry in 1985 with the addition of the Apple LaserWriter, the first laser printer to feature vector graphics.
Jobs was forced out of Apple in 1985 after a long power struggle with the company's board and its then-CEO John Sculley. That same year, Jobs took a few Apple employees with him to found NeXT, a computer platform development company that specialized in computers for higher-education and business markets. In addition, he helped to develop the visual effects industry when he funded the computer graphics division of George Lucas's Lucasfilm in 1986. The new company was Pixar, which produced the first 3D computer animated feature film Toy Story (1995) and went on to become a major animation studio, producing over 20 films since.
Jobs became CEO of Apple in 1997, following his company's acquisition of NeXT. He was largely responsible for helping revive Apple, which had been on the verge of bankruptcy. He worked closely with English designer Jony Ive to develop a line of products that had larger cultural ramifications, beginning in 1997 with the "Think different" advertising campaign and leading to the Apple Store, App Store, iMac, iPad, iPod, iPhone, iTunes, and iTunes Store. In 2001, the original Mac OS was replaced with the completely new Mac OS X (now known as macOS), based on NeXT's NeXTSTEP platform, giving the OS a modern Unix-based foundation for the first time. Jobs was diagnosed with a pancreatic neuroendocrine tumor in 2003. He died of respiratory arrest related to the tumor at age 56 on October 5, 2011.
Background
Biological and adoptive families
Steven Paul Jobs was born in San Francisco, California, on February 24, 1955, the son of Joanne Carole Schieble and Abdulfattah Jandali (). He was adopted by Clara (née Hagopian) and Paul Reinhold Jobs.
Jandali, Jobs' biological father, was Syrian and went by the name "John". He grew up in an Arab Muslim household in Homs. While an undergraduate at the American University of Beirut in Lebanon, he was a student activist and spent time in prison for his political activities. He pursued a PhD at the University of Wisconsin, where he met Schieble, an American Catholic of German and Swiss descent. As a doctoral candidate, Jandali was a teaching assistant for a course Schieble was taking, although both were the same age. Novelist Mona Simpson, Jobs' biological sister, noted that Schieble's parents were not happy that their daughter was dating a Muslim. Walter Isaacson, author of the biography Steve Jobs, additionally states that Schieble's father "threatened to cut her off completely" if she continued the relationship.
Jobs's adoptive father was a Coast Guard mechanic. After leaving the Coast Guard, he married Hagopian, an American of Armenian descent, in 1946. Their attempts to start a family were halted after Hagopian had an ectopic pregnancy, leading them to consider adoption in 1955. Hagopian's parents were survivors of the Armenian Genocide.
Birth and early life
Schieble became pregnant with Jobs in 1954, when she and Jandali spent the summer with his family in Homs. According to Jandali, Schieble deliberately did not involve him in the process: "Without telling me, Joanne upped and left to move to San Francisco to have the baby without anyone knowing, including me."
Schieble gave birth to Jobs in San Francisco on February 24, 1955, and chose an adoptive couple for him that was "Catholic, well-educated, and wealthy", but the couple later changed their mind. Jobs was then placed with Paul and Clara Jobs, neither of whom had a college education, and Schieble refused to sign the adoption papers. She then took the matter to court in an attempt to have her baby placed with a different family, and only consented to releasing the baby to Paul and Clara after the couple pledged to pay for the boy's college education. Jobs' cousin, Bassma Al Jandaly, maintains that Jobs' birth name was Abdul Lateef Jandali.
In his youth, Steve's parents took him to a Lutheran church. When Jobs was in high school, Clara admitted to his girlfriend, Chrisann Brennan, that she "was too frightened to love [Steve] for the first six months of his life ... I was scared they were going to take him away from me. Even after we won the case, Steve was so difficult a child that by the time he was two I felt we had made a mistake. I wanted to return him." When Chrisann shared this comment with Steve, he stated that he was already aware, and would later say he was deeply loved and indulged by Paul and Clara. Many years later, Jobs' wife Laurene also noted that "he felt he had been really blessed by having the two of them as parents." Jobs would become upset when Paul and Clara were referred to as his "adoptive parents"; he regarded them as his parents "1,000%". With regard to his biological parents, Jobs referred to them as "my sperm and egg bank. That's not harsh, it's just the way it was, a sperm bank thing, nothing more."
Childhood
Paul Jobs worked in several jobs that included a try as a machinist,
several other jobs, and then "back to work as a machinist."
Paul and Clara adopted Jobs's sister Patricia in 1957 and by 1959 the family had moved to the Monta Loma neighborhood in Mountain View, California. It was during this time that Paul built a workbench in his garage for his son in order to "pass along his love of mechanics." Jobs, meanwhile, admired his father's craftsmanship "because he knew how to build anything. If we needed a cabinet, he would build it. When he built our fence, he gave me a hammer so I could work with him ... I wasn't that into fixing cars ... but I was eager to hang out with my dad." By the time he was ten, Jobs was deeply involved in electronics and befriended many of the engineers who lived in the neighborhood. He had difficulty making friends with children his own age, however, and was seen by his classmates as a "loner."
Jobs had difficulty functioning in a traditional classroom, tended to resist authority figures, frequently misbehaved, and was suspended a few times. Clara had taught him to read as a toddler, and Jobs stated that he was "pretty bored in school and [had] turned into a little terror... you should have seen us in the third grade, we basically destroyed the teacher." He frequently played pranks on others at Monta Loma Elementary School in Mountain View. His father Paul (who was abused as a child) never reprimanded him, however, and instead blamed the school for not challenging his brilliant son.
Jobs would later credit his fourth grade teacher, Imogene "Teddy" Hill, with turning him around: "She taught an advanced fourth grade class and it took her about a month to get hip to my situation. She bribed me into learning. She would say, 'I really want you to finish this workbook. I'll give you five bucks if you finish it.' That really kindled a passion in me for learning things! I learned more that year than I think I learned in any other year in school. They wanted me to skip the next two years in grade school and go straight to junior high to learn a foreign language but my parents very wisely wouldn't let it happen." Jobs skipped the 5th grade and transferred to the 6th grade at Crittenden Middle School in Mountain View where he became a "socially awkward loner". Jobs was often "bullied" at Crittenden Middle, and in the middle of 7th grade, he gave his parents an ultimatum: they had to either take him out of Crittenden or he would drop out of school.
Though the Jobs family was not well off, they used all their savings in 1967 to buy a new home, allowing Jobs to change schools. The new house (a three-bedroom home on Crist Drive in Los Altos, California) was in the better Cupertino School District, Cupertino, California, and was embedded in an environment that was even more heavily populated with engineering families than the Mountain View area was. The house was declared a historic site in 2013, as it was the first site for Apple Computer; as of 2013, it was owned by Jobs's sister, Patty, and occupied by his step-mother, Marilyn.
When he was 13 in 1968, Jobs was given a summer job by Bill Hewlett (of Hewlett-Packard) after Jobs cold-called him to ask for parts for an electronics project.
Homestead High
The location of the Los Altos home meant that Jobs would be able to attend nearby Homestead High School, which had strong ties to Silicon Valley. He began his first year there in late 1968 along with Bill Fernandez. (Fernandez introduced Jobs to Steve Wozniak, and would later be Apple's first employee.) Neither Jobs nor Fernandez (whose father was a lawyer) came from engineering households and thus decided to enroll in John McCollum's "Electronics 1." McCollum and the rebellious Jobs (who had grown his hair long and become involved in the growing counterculture) would eventually clash and Jobs began to lose interest in the class.
He underwent a change during mid-1970: "I got stoned for the first time; I discovered Shakespeare, Dylan Thomas, and all that classic stuff. I read Moby Dick and went back as a junior taking creative writing classes." Jobs also later noted to his official biographer that "I started to listen to music a whole lot, and I started to read more outside of just science and technology—Shakespeare, Plato. I loved King Lear ... when I was a senior I had this phenomenal AP English class. The teacher was this guy who looked like Ernest Hemingway. He took a bunch of us snowshoeing in Yosemite." During his last two years at Homestead High, Jobs developed two different interests: electronics and literature. These dual interests were particularly reflected during Jobs's senior year as his best friends were Wozniak and his first girlfriend, the artistic Homestead junior Chrisann Brennan.
In 1971 after Wozniak began attending University of California, Berkeley, Jobs would visit him there a few times a week. This experience led him to study in nearby Stanford University's student union. Jobs also decided that rather than join the electronics club, he would put on light shows with a friend for Homestead's avant-garde Jazz program. He was described by a Homestead classmate as "kind of a brain and kind of a hippie ... but he never fit into either group. He was smart enough to be a nerd, but wasn't nerdy. And he was too intellectual for the hippies, who just wanted to get wasted all the time. He was kind of an outsider. In high school everything revolved around what group you were in, and if you weren't in a carefully defined group, you weren't anybody. He was an individual, in a world where individuality was suspect." By his senior year in late 1971, he was taking freshman English class at Stanford and working on a Homestead underground film project with Chrisann Brennan.
Around that time, Wozniak designed a low-cost digital "blue box" to generate the necessary tones to manipulate the telephone network, allowing free long-distance calls. Jobs decided then to sell them and split the profit with Wozniak. The clandestine sales of the illegal blue boxes went well and perhaps planted the seed in Jobs's mind that electronics could be both fun and profitable. Jobs, in a 1994 interview, recalled that it took six months for him and Wozniak to figure out how to build the blue boxes. Jobs later reflected that had it not been for Wozniak's blue boxes, "there wouldn't have been an Apple". He states it showed them that they could take on large companies and beat them.
By his senior year of high school, Jobs began using LSD. He later recalled that on one occasion he consumed it in a wheat field outside Sunnyvale, and experienced "the most wonderful feeling of my life up to that point". In mid-1972, after graduation and before leaving for Reed College, Jobs and Brennan rented a house from their other roommate, Al.
Reed College
In September 1972, Jobs enrolled at Reed College in Portland, Oregon. He insisted on applying only to Reed although it was an expensive school that Paul and Clara could ill afford. Jobs soon befriended Robert Friedland, who was Reed's student body president at that time. Brennan remained involved with Jobs while he was at Reed. He later asked her to come and live with him in a house he rented near the Reed campus, but she refused.
After just one semester, Jobs dropped out of Reed College without telling his parents. Jobs later explained that he decided to drop out because he did not want to spend his parents' money on an education that seemed meaningless to him. He continued to attend by auditing his classes, which included a course on calligraphy that was taught by Robert Palladino. In a 2005 commencement speech at Stanford University, Jobs stated that during this period, he slept on the floor in friends' dorm rooms, returned Coke bottles for food money, and got weekly free meals at the local Hare Krishna temple. In that same speech, Jobs said: "If I had never dropped in on that single calligraphy course in college, the Mac would have never had multiple typefaces or proportionally spaced fonts."
1972–1985
Pre-Apple
In February 1974, Jobs returned to his parents' home in Los Altos and began looking for a job. He was soon hired by Atari, Inc. in Los Gatos, California, which gave him a job as a technician. Back in 1973, Steve Wozniak designed his own version of the classic video game Pong and gave the board to Jobs. According to Wozniak, Atari only hired Jobs because he took the board down to the company, and they thought that he had built it himself. Atari's cofounder Nolan Bushnell later described him as "difficult but valuable", pointing out that "he was very often the smartest guy in the room, and he would let people know that."
During this period, Jobs and Brennan remained involved with each other while continuing to see other people. By early 1974, Jobs was living what Brennan describes as a "simple life" in a Los Gatos cabin, working at Atari, and saving money for his impending trip to India.
Jobs traveled to India in mid-1974 to visit Neem Karoli Baba at his Kainchi ashram with his Reed friend (and eventual Apple employee) Daniel Kottke, in search of spiritual enlightenment. When they got to the Neem Karoli ashram, it was almost deserted because Neem Karoli Baba had died in September 1973. Then they made a long trek up a dry riverbed to an ashram of Haidakhan Babaji.
After seven months, Jobs left India and returned to the US ahead of Daniel Kottke. Jobs had changed his appearance; his head was shaved and he wore traditional Indian clothing. During this time, Jobs experimented with psychedelics, later calling his LSD experiences "one of the two or three most important things [he had] done in [his] life". He spent a period at the All One Farm, a commune in Oregon that was owned by Robert Friedland. Brennan joined him there for a period.
During this time period, Jobs and Brennan both became practitioners of Zen Buddhism through the Zen master Kōbun Chino Otogawa. Jobs was living in his parents' backyard toolshed, which he had converted into a bedroom. Jobs engaged in lengthy meditation retreats at the Tassajara Zen Mountain Center, the oldest Sōtō Zen monastery in the US. He considered taking up monastic residence at Eihei-ji in Japan, and maintained a lifelong appreciation for Zen.
In mid-1975, after returning to Atari, Jobs was assigned to create a circuit board for the arcade video game Breakout. According to Bushnell, Atari offered for each TTL chip that was eliminated in the machine. Jobs had little specialized knowledge of circuit board design and made a deal with Wozniak to split the fee evenly between them if Wozniak could minimize the number of chips. Much to the amazement of Atari engineers, Wozniak reduced the TTL count to 46, a design so tight that it was impossible to reproduce on an assembly line. According to Wozniak, Jobs told him that Atari gave them only $700 (instead of the $5,000 paid out), and that Wozniak's share was thus $350. Wozniak did not learn about the actual bonus until ten years later, but said that if Jobs had told him about it and explained that he needed the money, Wozniak would have given it to him.
Jobs and Wozniak attended meetings of the Homebrew Computer Club in 1975, which was a stepping stone to the development and marketing of the first Apple computer.
Apple (1976–1985)
By March 1976, Wozniak completed the basic design of the Apple I computer and showed it to Jobs, who suggested that they sell it; Wozniak was at first skeptical of the idea but later agreed. In April of that same year, Jobs, Wozniak, and administrative overseer Ronald Wayne founded Apple Computer Company (now called Apple Inc.) as a business partnership in Jobs's parents' Crist Drive home on April 1, 1976. The operation originally started in Jobs's bedroom and later moved to the garage. Wayne stayed only a short time, leaving Jobs and Wozniak as the active primary cofounders of the company. The two decided on the name "Apple" after Jobs returned from the All One Farm commune in Oregon and told Wozniak about his time spent in the farm's apple orchard. Jobs originally planned to produce bare printed circuit boards of the Apple I and sell them to computer hobbyists for $50 each. To raise the money they needed to build the first batch of the circuit boards, Wozniak sold his HP scientific calculator and Jobs sold his Volkswagen van. Later that year, computer retailer Paul Terrell purchased 50 fully assembled units of the Apple I from them for $500 each. Eventually about 200 Apple I computers were produced in total.
A neighbor on Crist Drive recalled Jobs as an odd individual who would greet his clients "with his underwear hanging out, barefoot and hippie-like". Another neighbor, Larry Waterland, who had just earned his PhD in chemical engineering at Stanford, recalled dismissing Jobs's budding business: "'You punched cards, put them in a big deck,' he said about the mainframe machines of that time. 'Steve took me over to the garage. He had a circuit board with a chip on it, a DuMont TV set, a Panasonic cassette tape deck and a keyboard. He said, 'This is an Apple computer.' I said, 'You've got to be joking.' I dismissed the whole idea.'" Jobs's friend from Reed College and India, Daniel Kottke, recalled that as an early Apple employee, he "was the only person who worked in the garage ... Woz would show up once a week with his latest code. Steve Jobs didn't get his hands dirty in that sense." Kottke also stated that much of the early work took place in Jobs's kitchen, where he spent hours on the phone trying to find investors for the company.
They received funding from a then-semi-retired Intel product marketing manager and engineer Mike Markkula. Scott McNealy, one of the cofounders of Sun Microsystems, said that Jobs broke a "glass age ceiling" in Silicon Valley because he'd created a very successful company at a young age. Markkula brought Apple to the attention of Arthur Rock, which after looking at the crowded Apple booth at the Home Brew Computer Show, started with a $60,000 investment and went on the Apple board. Jobs was not pleased when Markkula recruited Mike Scott from National Semiconductor in February 1977 to serve as the first president and CEO of Apple.
After Brennan returned from her own journey to India, she and Jobs fell in love again, as Brennan noted changes in him that she attributes to Kobun (whom she was also still following). It was also at this time that Jobs displayed a prototype Apple I computer for Brennan and his parents in their living room. Brennan notes a shift in this time period, where the two main influences on Jobs were Apple Inc. and Kobun. By early 1977, she and Jobs would spend time together at her home at Duveneck Ranch in Los Altos, which served as a hostel and environmental education center.
In April 1977, Jobs and Wozniak introduced the Apple II at the West Coast Computer Faire. It is the first consumer product to have been sold by Apple Computer. Primarily designed by Wozniak, Jobs oversaw the development of its unusual case and Rod Holt developed the unique power supply. During the design stage, Jobs argued that the Apple II should have two expansion slots, while Wozniak wanted eight. After a heated argument, Wozniak threatened that Jobs should "go get himself another computer". They later decided to go with eight slots. The Apple II became one of the first highly successful mass-produced microcomputer products in the world.
As Jobs became more successful with his new company, his relationship with Brennan grew more complex. In 1977, the success of Apple was now a part of their relationship, and Brennan, Daniel Kottke, and Jobs moved into a house near the Apple office in Cupertino. Brennan eventually took a position in the shipping department at Apple. Brennan's relationship with Jobs deteriorated as his position with Apple grew, and she began to consider ending the relationship. In October 1977, Brennan was approached by Rod Holt, who asked her to take "a paid apprenticeship designing blueprints for the Apples". Both Holt and Jobs believed that it would be a good position for her, given her artistic abilities. Holt was particularly eager that she take the position and puzzled by her ambivalence toward it. Brennan's decision, however, was overshadowed by the fact that she realized she was pregnant and that Jobs was the father. It took her a few days to tell Jobs, whose face, according to Brennan "turned ugly" at the news. At the same time, according to Brennan, at the beginning of her third trimester, Jobs said to her: "I never wanted to ask that you get an abortion. I just didn't want to do that." He also refused to discuss the pregnancy with her. Brennan turned down the internship and decided to leave Apple. She stated that Jobs told her "If you give up this baby for adoption, you will be sorry" and "I am never going to help you." According to Brennan, Jobs "started to seed people with the notion that I slept around and he was infertile, which meant that this could not be his child." A few weeks before she was due to give birth, Brennan was invited to deliver her baby at the All One Farm. She accepted the offer. When Jobs was 23 (the same age as his biological parents when they had him) Brennan gave birth to her baby, Lisa Brennan, on May 17, 1978. Jobs went there for the birth after he was contacted by Robert Friedland, their mutual friend and the farm owner. While distant, Jobs worked with her on a name for the baby, which they discussed while sitting in the fields on a blanket. Brennan suggested the name "Lisa" which Jobs also liked and notes that Jobs was very attached to the name "Lisa" while he "was also publicly denying paternity." She would discover later that during this time, Jobs was preparing to unveil a new kind of computer that he wanted to give a female name (his first choice was "Claire" after St. Clare). She also stated that she never gave him permission to use the baby's name for a computer and he hid the plans from her. Jobs also worked with his team to come up with the phrase, "Local Integrated Software Architecture" as an alternative explanation for the Apple Lisa. Decades later, however, Jobs admitted to his biographer Walter Isaacson that "obviously, it was named for my daughter".
When Jobs denied paternity, a DNA test established him as Lisa's father. It required him to give Brennan $385 a month in addition to returning the welfare money she had received. Jobs gave her $500 a month at the time when Apple went public and Jobs became a millionaire. Later, Brennan agreed to give an interview with Michael Moritz for Time magazine for its Time Person of the Year special, released on January 3, 1983, in which she discussed her relationship with Jobs. Rather than name Jobs the Person of the Year, the magazine named the computer the "Machine of the Year". In the issue, Jobs questioned the reliability of the paternity test (which stated that the "probability of paternity for Jobs, Steven... is 94.1%"). Jobs responded by arguing that "28% of the male population of the United States could be the father". Time also noted that "the baby girl and the machine on which Apple has placed so much hope for the future share the same name: Lisa".
Jobs was worth over $1 million in 1978, when he was just 23 years old. His net worth grew to over $250 million by the time he was 25, according to estimates. He was also one of the youngest "people ever to make the Forbes list of the nation's richest people—and one of only a handful to have done it themselves, without inherited wealth".
In 1982, Jobs bought an apartment on the top two floors of The San Remo, a Manhattan building with a politically progressive reputation. Although he never lived there, he spent years renovating it with the help of I. M. Pei. In 2003, he sold it to U2 singer Bono.
In 1983, Jobs lured John Sculley away from Pepsi-Cola to serve as Apple's CEO, asking, "Do you want to spend the rest of your life selling sugared water, or do you want a chance to change the world?"
In 1984, Jobs bought the Jackling House and estate, and resided there for a decade. After that, he leased it out for several years until 2000 when he stopped maintaining the house, allowing exposure to the weather to degrade it. In 2004, Jobs received permission from the town of Woodside to demolish the house in order to build a smaller contemporary styled one. After a few years in court, the house was finally demolished in 2011, a few months before he died.
Jobs began directing the development of the Macintosh in 1981, when he took over the project from early Apple employee Jef Raskin, who conceived the computer (Wozniak, who with Raskin had heavy influence over the program early on in its development, was on leave during this time due to an airplane crash earlier that year). On January 22, 1984, Apple aired a Super Bowl television commercial titled "1984", which ended with the words: "On January 24th, Apple Computer will introduce Macintosh. And you'll see why 1984 won't be like 1984." On January 24, 1984, an emotional Jobs introduced the Macintosh to a wildly enthusiastic audience at Apple's annual shareholders meeting held in the Flint Auditorium; Macintosh engineer Andy Hertzfeld described the scene as "pandemonium". The Macintosh was based on The Lisa (and Xerox PARC's mouse-driven graphical user interface), and it was widely acclaimed by the media with strong initial sales supporting it. However, the computer's slow processing speed and limited range of available software led to a rapid sales decline in the second half of 1984.
Sculley's and Jobs's respective visions for the company greatly differed. The former favored open architecture computers like the Apple II, sold to education, small business, and home markets less vulnerable to IBM. Jobs wanted the company to focus on the closed architecture Macintosh as a business alternative to the IBM PC. President and CEO Sculley had little control over chairman of the board Jobs's Macintosh division; it and the Apple II division operated like separate companies, duplicating services. Although its products provided 85 percent of Apple's sales in early 1985, the company's January 1985 annual meeting did not mention the Apple II division or employees. Many left, including Wozniak, who stated that the company had "been going in the wrong direction for the last five years" and sold most of his stock. Despite being frustrated with the company's (including Jobs himself) dismissal of the Apple II employees in favor of the Macintosh, Wozniak left amicably and remained an honorary employee of Apple, maintaining a friendship with Jobs until his death.
By early 1985, the Macintosh's failure to defeat the IBM PC became clear, and it strengthened Sculley's position in the company. In May 1985, Sculley—encouraged by Arthur Rock—decided to reorganize Apple, and proposed a plan to the board that would remove Jobs from the Macintosh group and put him in charge of "New Product Development". This move would effectively render Jobs powerless within Apple. In response, Jobs then developed a plan to get rid of Sculley and take over Apple. However, Jobs was confronted after the plan was leaked, and he said that he would leave Apple. The Board declined his resignation and asked him to reconsider. Sculley also told Jobs that he had all of the votes needed to go ahead with the reorganization. A few months later, on September 17, 1985, Jobs submitted a letter of resignation to the Apple Board. Five additional senior Apple employees also resigned and joined Jobs in his new venture, NeXT.
The Macintosh's struggle continued after Jobs left Apple. Though marketed and received in fanfare, the expensive Macintosh was a hard sell. In 1985, Bill Gates's then-developing company, Microsoft, threatened to stop developing Mac applications unless it was granted "a license for the Mac operating system software. Microsoft was developing its graphical user interface ... for DOS, which it was calling Windows and didn't want Apple to sue over the similarities between the Windows GUI and the Mac interface." Sculley granted Microsoft the license which later led to problems for Apple. In addition, cheap IBM PC clones that ran on Microsoft software and had a graphical user interface began to appear. Although the Macintosh preceded the clones, it was far more expensive, so "through the late 1980s, the Windows user interface was getting better and better and was thus taking increasingly more share from Apple". Windows-based IBM-PC clones also led to the development of additional GUIs such as IBM's TopView or Digital Research's GEM, and thus "the graphical user interface was beginning to be taken for granted, undermining the most apparent advantage of the Mac...it seemed clear as the 1980s wound down that Apple couldn't go it alone indefinitely against the whole IBM-clone market."
1985–1997
NeXT computer
Following his resignation from Apple in 1985, Jobs founded NeXT Inc. with $7 million. A year later he was running out of money, and he sought venture capital with no product on the horizon. Eventually, Jobs attracted the attention of billionaire Ross Perot, who invested heavily in the company. The NeXT computer was shown to the world in what was considered Jobs's comeback event, a lavish invitation-only gala launch event that was described as a multimedia extravaganza. The celebration was held at the Louise M. Davies Symphony Hall, San Francisco, California on Wednesday October 12, 1988. Steve Wozniak said in a 2013 interview that while Jobs was at NeXT he was "really getting his head together".
NeXT workstations were first released in 1990 and priced at . Like the Apple Lisa, the NeXT workstation was technologically advanced and designed for the education sector, but was largely dismissed as cost-prohibitive for educational institutions. The NeXT workstation was known for its technical strengths, chief among them its object-oriented software development system. Jobs marketed NeXT products to the financial, scientific, and academic community, highlighting its innovative, experimental new technologies, such as the Mach kernel, the digital signal processor chip, and the built-in Ethernet port. Making use of a NeXT computer, English computer scientist Tim Berners-Lee invented the World Wide Web in 1990 at CERN in Switzerland.
The revised, second generation NeXTcube was released in 1990. Jobs touted it as the first "interpersonal" computer that would replace the personal computer. With its innovative NeXTMail multimedia email system, NeXTcube could share voice, image, graphics, and video in email for the first time. "Interpersonal computing is going to revolutionize human communications and groupwork", Jobs told reporters. Jobs ran NeXT with an obsession for aesthetic perfection, as evidenced by the development of and attention to NeXTcube's magnesium case. This put considerable strain on NeXT's hardware division, and in 1993, after having sold only 50,000 machines, NeXT transitioned fully to software development with the release of NeXTSTEP/Intel. The company reported its first yearly profit of $1.03 million in 1994. In 1996, NeXT Software, Inc. released WebObjects, a framework for Web application development. After NeXT was acquired by Apple Inc. in 1997, WebObjects was used to build and run the Apple Store, MobileMe services, and the iTunes Store.
Pixar and Disney
In 1986, Jobs funded the spinout of The Graphics Group (later renamed Pixar) from Lucasfilm's computer graphics division for the price of $10 million, $5 million of which was given to the company as capital and $5 million of which was paid to Lucasfilm for technology rights.
The first film produced by Pixar with its Disney partnership, Toy Story (1995), with Jobs credited as executive producer, brought financial success and critical acclaim to the studio when it was released. Over the course of Jobs's life, under Pixar's creative chief John Lasseter, the company produced box-office hits A Bug's Life (1998); Toy Story 2 (1999); Monsters, Inc. (2001); Finding Nemo (2003); The Incredibles (2004); Cars (2006); Ratatouille (2007); WALL-E (2008); Up (2009); Toy Story 3 (2010); and Cars 2 (2011). Brave (2012), Pixar's first film to be produced since Jobs's death, honored him with a tribute for his contributions to the studio. Finding Nemo, The Incredibles, Ratatouille, WALL-E, Up, Toy Story 3 and Brave each received the Academy Award for Best Animated Feature, an award introduced in 2001.
In 2003 and 2004, as Pixar's contract with Disney was running out, Jobs and Disney chief executive Michael Eisner tried but failed to negotiate a new partnership, and in January 2004, Jobs announced that he would never deal with Disney again. Pixar would seek a new partner to distribute its films after its contract expired.
In October 2005, Bob Iger replaced Eisner at Disney, and Iger quickly worked to mend relations with Jobs and Pixar. On January 24, 2006, Jobs and Iger announced that Disney had agreed to purchase Pixar in an all-stock transaction worth $7.4 billion. When the deal closed, Jobs became The Walt Disney Company's largest single shareholder with approximately seven percent of the company's stock. Jobs's holdings in Disney far exceeded those of Eisner, who holds 1.7%, and of Disney family member Roy E. Disney, who until his 2009 death held about 1% of the company's stock and whose criticisms of Eisner—especially that he soured Disney's relationship with Pixar—accelerated Eisner's ousting. Upon completion of the merger, Jobs received 7% of Disney shares, and joined the board of directors as the largest individual shareholder. Upon Jobs's death his shares in Disney were transferred to the Steven P. Jobs Trust led by Laurene Jobs.
After Jobs's death Iger recalled in 2019 that many warned him about Jobs, "that he would bully me and everyone else". Iger wrote, "Who wouldn't want Steve Jobs to have influence over how a company is run?", and that as an active Disney board member "he rarely created trouble for me. Not never but rarely". He speculated that they would have seriously considered merging Disney and Apple had Jobs lived. Floyd Norman, of Pixar, described Jobs as a "mature, mellow individual" who never interfered with the creative process of the filmmakers. In early June 2014, Pixar cofounder and Walt Disney Animation Studios President Ed Catmull revealed that Jobs once advised him to "just explain it to them until they understand" in disagreements. Catmull released the book Creativity, Inc. in 2014, in which he recounts numerous experiences of working with Jobs. Regarding his own manner of dealing with Jobs, Catmull writes:
1997–2011
Return to Apple
In 1996, Apple announced that it would buy NeXT for $427 million. The deal was finalized in February 1997, bringing Jobs back to the company he had cofounded. Jobs became de facto chief after then-CEO Gil Amelio was ousted in July 1997. He was formally named interim chief executive on September 16. In March 1998, to concentrate Apple's efforts on returning to profitability, Jobs terminated a number of projects, such as Newton, Cyberdog, and OpenDoc. In the coming months, many employees developed a fear of encountering Jobs while riding in the elevator, "afraid that they might not have a job when the doors opened. The reality was that Jobs's summary executions were rare, but a handful of victims was enough to terrorize a whole company." Jobs changed the licensing program for Macintosh clones, making it too costly for the manufacturers to continue making machines.
With the purchase of NeXT, much of the company's technology found its way into Apple products, most notably NeXTSTEP, which evolved into Mac OS X. Under Jobs's guidance, the company increased sales significantly with the introduction of the iMac and other new products; since then, appealing designs and powerful branding have worked well for Apple. At the 2000 Macworld Expo, Jobs officially dropped the "interim" modifier from his title at Apple and became permanent CEO. Jobs quipped at the time that he would be using the title "iCEO".
The company subsequently branched out, introducing and improving upon other digital appliances. With the introduction of the iPod portable music player, iTunes digital music software, and the iTunes Store, the company made forays into consumer electronics and music distribution. On June 29, 2007, Apple entered the cellular phone business with the introduction of the iPhone, a multi-touch display cell phone, which also included the features of an iPod and, with its own mobile browser, revolutionized the mobile browsing scene. While nurturing open-ended innovation, Jobs also reminded his employees that "real artists ship".
Jobs had a public war of words with Dell Computer CEO Michael Dell, starting in 1987, when Jobs first criticized Dell for making "un-innovative beige boxes". On October 6, 1997, at a Gartner Symposium, when Dell was asked what he would do if he ran the then-troubled Apple Computer company, he said: "I'd shut it down and give the money back to the shareholders." Then, in 2006, Jobs sent an email to all employees when Apple's market capitalization rose above Dell's. It read:
Jobs was both admired and criticized for his consummate skill at persuasion and salesmanship, which has been dubbed the "reality distortion field" and was particularly evident during his keynote speeches (colloquially known as "Stevenotes") at Macworld Expos and at Apple Worldwide Developers Conferences.
Jobs usually went to work wearing a black long-sleeved mock turtleneck made by Issey Miyake, Levi's 501 blue jeans, and New Balance 991 sneakers. Jobs told his biographer Walter Isaacson "...he came to like the idea of having a uniform for himself, both because of its daily convenience (the rationale he claimed) and its ability to convey a signature style."
Jobs was a board member at Gap Inc. from 1999 to 2002.
In 2001, Jobs was granted stock options in the amount of 7.5 million shares of Apple with an exercise price of $18.30. It was alleged that the options had been backdated, and that the exercise price should have been $21.10. It was further alleged that Jobs had thereby incurred taxable income of $20,000,000 that he did not report, and that Apple overstated its earnings by that same amount. As a result, Jobs potentially faced a number of criminal charges and civil penalties. The case was the subject of active criminal and civil government investigations, though an independent internal Apple investigation completed on December 29, 2006 found that Jobs was unaware of these issues and that the options granted to him were returned without being exercised in 2003.
In 2005, Jobs responded to criticism of Apple's poor recycling programs for e-waste in the US by lashing out at environmental and other advocates at Apple's annual meeting in Cupertino in April. A few weeks later, Apple announced it would take back iPods for free at its retail stores. The Computer TakeBack Campaign responded by flying a banner from a plane over the Stanford University graduation at which Jobs was the commencement speaker. The banner read "Steve, don't be a mini-player—recycle all e-waste."
In 2006, he further expanded Apple's recycling programs to any US customer who buys a new Mac. This program includes shipping and "environmentally friendly disposal" of their old systems. The success of Apple's unique products and services provided several years of stable financial returns, propelling Apple to become the world's most valuable publicly traded company in 2011.
Jobs was perceived as a demanding perfectionist who always aspired to position his businesses and their products at the forefront of the information technology industry by foreseeing and setting innovation and style trends. He summed up this self-concept at the end of his keynote speech at the Macworld Conference and Expo in January 2007, by quoting ice hockey player Wayne Gretzky:
On July 1, 2008, a billion class action suit was filed against several members of the Apple board of directors for revenue lost because of alleged securities fraud.
In a 2011 interview with biographer Walter Isaacson, Jobs revealed that he had met with US President Barack Obama, complained about the nation's shortage of software engineers, and told Obama that he was "headed for a one-term presidency". Jobs proposed that any foreign student who got an engineering degree at a US university should automatically be offered a green card. After the meeting, Jobs commented, "The president is very smart, but he kept explaining to us reasons why things can't get done . . . . It infuriates me."
Health problems
In October 2003, Jobs was diagnosed with cancer. In mid 2004, he announced to his employees that he had a cancerous tumor in his pancreas. The prognosis for pancreatic cancer is usually very poor; Jobs stated that he had a rare, much less aggressive type, known as islet cell neuroendocrine tumor.
Despite his diagnosis, Jobs resisted his doctors' recommendations for medical intervention for nine months, instead relying on alternative medicine to thwart the disease. According to Harvard researcher Ramzi Amri, his choice of alternative treatment "led to an unnecessarily early death". Other doctors agree that Jobs's diet was insufficient to address his disease. However, cancer researcher and alternative medicine critic David Gorski wrote that "it's impossible to know whether and by how much he might have decreased his chances of surviving his cancer through his flirtation with woo. My best guess was that Jobs probably only modestly decreased his chances of survival, if that." Barrie R. Cassileth, the chief of Memorial Sloan Kettering Cancer Center's integrative medicine department, on the other hand, said, "Jobs's faith in alternative medicine likely cost him his life.... He had the only kind of pancreatic cancer that is treatable and curable.... He essentially committed suicide." According to Jobs's biographer, Walter Isaacson, "for nine months he refused to undergo surgery for his pancreatic cancer – a decision he later regretted as his health declined". "Instead, he tried a vegan diet, acupuncture, herbal remedies, and other treatments he found online, and even consulted a psychic. He was also influenced by a doctor who ran a clinic that advised juice fasts, bowel cleansings and other unproven approaches, before finally having surgery in July 2004." He eventually underwent a pancreaticoduodenectomy (or "Whipple procedure") in July 2004, that appeared to remove the tumor successfully. Jobs did not receive chemotherapy or radiation therapy. During Jobs's absence, Tim Cook, head of worldwide sales and operations at Apple, ran the company.
, only Jobs's wife, his doctors, and Iger and his wife knew that his cancer had returned. Jobs told Iger privately that he hoped to live to see his son Reed's high school graduation in 2010. In early August 2006, Jobs delivered the keynote for Apple's annual Worldwide Developers Conference. His "thin, almost gaunt" appearance and unusually "listless" delivery, together with his choice to delegate significant portions of his keynote to other presenters, inspired a flurry of media and internet speculation about the state of his health. In contrast, according to an Ars Technica journal report, Worldwide Developers Conference (WWDC) attendees who saw Jobs in person said he "looked fine". Following the keynote, an Apple spokesperson said that "Steve's health is robust."
Two years later, similar concerns followed Jobs's 2008 WWDC keynote address. Apple officials stated that Jobs was victim to a "common bug" and was taking antibiotics, while others surmised his cachectic appearance was due to the Whipple procedure. During a July conference call discussing Apple earnings, participants responded to repeated questions about Jobs's health by insisting that it was a "private matter". Others said that shareholders had a right to know more, given Jobs's hands-on approach to running his company. Based on an off-the-record phone conversation with Jobs, The New York Times reported, "While his health problems amounted to a good deal more than 'a common bug', they weren't life-threatening and he doesn't have a recurrence of cancer."
On August 28, 2008, Bloomberg mistakenly published a 2500-word obituary of Jobs in its corporate news service, containing blank spaces for his age and cause of death. News carriers customarily stockpile up-to-date obituaries to facilitate news delivery in the event of a well-known figure's death. Although the error was promptly rectified, many news carriers and blogs reported on it, intensifying rumors concerning Jobs's health. Jobs responded at Apple's September 2008 Let's Rock keynote by paraphrasing Mark Twain: "Reports of my death are greatly exaggerated." At a subsequent media event, Jobs concluded his presentation with a slide reading "110/70", referring to his blood pressure, stating he would not address further questions about his health.
On December 16, 2008, Apple announced that marketing vice-president Phil Schiller would deliver the company's final keynote address at the Macworld Conference and Expo 2009, again reviving questions about Jobs's health. In a statement given on January 5, 2009, on Apple.com, Jobs said that he had been suffering from a "hormone imbalance" for several months.
On January 14, 2009, Jobs wrote in an internal Apple memo that in the previous week he had "learned that my health-related issues are more complex than I originally thought". He announced a six-month leave of absence until the end of June 2009, to allow him to better focus on his health. Tim Cook, who previously acted as CEO in Jobs's 2004 absence, became acting CEO of Apple, with Jobs still involved with "major strategic decisions".
In 2009, Tim Cook offered a portion of his liver to Jobs, since both share a rare blood type and the donor liver can regenerate tissue after such an operation. Jobs yelled, "I'll never let you do that. I'll never do that."
In April 2009, Jobs underwent a liver transplant at Methodist University Hospital Transplant Institute in Memphis, Tennessee. Jobs's prognosis was described as "excellent".
Resignation
On January 17, 2011, a year and a half after Jobs returned to work following the liver transplant, Apple announced that he had been granted a medical leave of absence. Jobs announced his leave in a letter to employees, stating his decision was made "so he could focus on his health". As it did at the time of his 2009 medical leave, Apple announced that Tim Cook would run day-to-day operations and that Jobs would continue to be involved in major strategic decisions at the company. While on leave, Jobs appeared at the iPad 2 launch event on March 2, the WWDC keynote introducing iCloud on June 6, and before the Cupertino City Council on June 7.
On August 24, 2011, Jobs announced his resignation as Apple's CEO, writing to the board, "I have always said if there ever came a day when I could no longer meet my duties and expectations as Apple's CEO, I would be the first to let you know. Unfortunately, that day has come." Jobs became chairman of the board and named Tim Cook as his successor as CEO. Jobs continued to work for Apple until the day before his death six weeks later.
Death
Jobs died at his Palo Alto, California home around 3 p.m. (PDT) on October 5, 2011, due to complications from a relapse of his previously treated islet-cell pancreatic neuroendocrine tumor, which resulted in respiratory arrest. He had lost consciousness the day before and died with his wife, children, and sisters at his side. His sister, Mona Simpson, described his death thus: "Steve's final words, hours earlier, were monosyllables, repeated three times. Before embarking, he'd looked at his sister Patty, then for a long time at his children, then at his life's partner, Laurene, and then over their shoulders past them. Steve's final words were: 'Oh wow. Oh wow. Oh wow.'" He then lost consciousness and died several hours later. A small private funeral was held on October 7, 2011, the details of which, out of respect for Jobs's family, were not made public.
Apple and Pixar each issued announcements of his death. Apple announced on the same day that they had no plans for a public service, but were encouraging "well-wishers" to send their remembrance messages to an email address created to receive such messages. Apple and Microsoft both flew their flags at half-staff throughout their respective headquarters and campuses.
Bob Iger ordered all Disney properties, including Walt Disney World and Disneyland, to fly their flags at half-staff from October 6 to 12, 2011. For two weeks following his death, Apple displayed on its corporate Web site a simple page that showed Jobs's name and lifespan next to his grayscale portrait. On October 19, 2011, Apple employees held a private memorial service for Jobs on the Apple campus in Cupertino. Jobs's widow, Laurene, was in attendance, as well as Cook, Bill Campbell, Norah Jones, Al Gore, and Coldplay. Some of Apple's retail stores closed briefly so employees could attend the memorial. A video of the service was uploaded to Apple's website.
California Governor Jerry Brown declared Sunday, October 16, 2011, to be "Steve Jobs Day". On that day, an invitation-only memorial was held at Stanford University. Those in attendance included Apple and other tech company executives, members of the media, celebrities, close friends of Jobs, and politicians, along with Jobs's family. Bono, Yo-Yo Ma, and Joan Baez performed at the service, which lasted longer than an hour. The service was highly secured, with guards at all of the university's gates, and a helicopter flying overhead from an area news station. Each attendee was given a small brown box as a "farewell gift" from Jobs. The box contained a copy of the Autobiography of a Yogi by Paramahansa Yogananda.
Childhood friend and fellow Apple co-founder Steve Wozniak, former owner of what would become Pixar, George Lucas, former rival, Microsoft co-founder Bill Gates, and President Barack Obama all offered statements in response to his death.
Per his request, Jobs is buried in an unmarked grave at Alta Mesa Memorial Park, the only nonsectarian cemetery in Palo Alto.
On October 7, 2021, Apple released a commemorative YouTube video on the tenth anniversary of Jobs's passing.
Innovations and designs
Jobs' design aesthetic was influenced by philosophies of Zen and Buddhism. In India, he experienced Buddhism while on his seven-month spiritual journey, and his sense of intuition was influenced by the spiritual people with whom he studied. He also learned from many references and sources, such as modernist architectural style of Joseph Eichler, and the industrial designs of Richard Sapper and Dieter Rams.
According to Apple co-founder Steve Wozniak, "Steve didn't ever code. He wasn't an engineer and he didn't do any original design..." Daniel Kottke, one of Apple's earliest employees and a college friend of Jobs's, stated: "Between Woz and Jobs, Woz was the innovator, the inventor. Steve Jobs was the marketing person."
He is listed as either primary inventor or co-inventor in 346 United States patents or patent applications related to a range of technologies from actual computer and portable devices to user interfaces (including touch-based), speakers, keyboards, power adapters, staircases, clasps, sleeves, lanyards and packages. Jobs's contributions to most of his patents were to "the look and feel of the product". His industrial design chief Jonathan Ive had his name along with Jobs's name for 200 of the patents. Most of these are design patents (specific product designs; for example, Jobs listed as primary inventor in patents for both original and lamp-style iMacs, as well as PowerBook G4 Titanium) as opposed to utility patents (inventions). He has 43 issued US patents on inventions. The patent on the Mac OS X Dock user interface with "magnification" feature was issued the day before he died. Although Jobs had little involvement in the engineering and technical side of the original Apple computers, Jobs later used his CEO position to directly involve himself with product design.
Involved in many projects throughout his career was his long-time marketing executive and confidant Joanna Hoffman, known as one of the few employees at Apple and NeXT who could successfully stand up to Jobs while also engaging with him.
Even while terminally ill in the hospital, Jobs sketched new devices that would hold the iPad in a hospital bed. He also despised the oxygen monitor on his finger, and suggested ways to revise the design for simplicity.
Since his death, the former Apple CEO has won 141 patents, more than most inventors win during their lifetimes. Currently, Jobs holds over 450 patents.
Apple I
Although entirely designed by Steve Wozniak, Jobs had the idea of selling the desktop computer, which led to the formation of Apple Computer in 1976. Both Jobs and Wozniak constructed several of the first Apple I prototypes by hand, and sold some of their belongings in order to do so. Eventually, 200 units were produced.
Apple II
The Apple II is an 8-bit home computer, one of the world's first highly successful mass-produced microcomputer products, designed primarily by Wozniak (though Jobs oversaw the development of the Apple II's unusual case and Rod Holt developed the unique power supply). It was introduced in 1977 at the West Coast Computer Faire by Jobs and Wozniak and was the first consumer product sold by Apple.
Apple Lisa
The Lisa is a personal computer designed by Apple during the early 1980s. It was the first personal computer to offer a graphical user interface in a machine aimed at individual business users. Development of the Lisa began in 1978. The Lisa sold poorly, with only 100,000 units sold.
In 1982, after Jobs was forced out of the Lisa project, he joined the Macintosh project. The Macintosh is not a direct descendant of Lisa, although there are obvious similarities between the systems. The final revision, the Lisa 2/10, was modified and sold as the Macintosh XL.
Macintosh
Once he joined the original Macintosh team, Jobs took over the project after Wozniak had experienced a traumatic airplane accident and temporarily left the company. Jobs introduced the Macintosh computer on January 24, 1984. This was the first mass-market personal computer featuring an integral graphical user interface and mouse. This first model was later renamed to "Macintosh 128k" for uniqueness amongst a populous family of subsequently updated models which are also based on Apple's same proprietary architecture. Since 1998, Apple has largely phased out the Macintosh name in favor of "Mac", though the product family has been nicknamed "Mac" or "the Mac" since the development of the first model. The Macintosh was introduced by a US$1.5 million Ridley Scott television commercial, "1984". It most notably aired during the third quarter of Super Bowl XVIII on January 22, 1984, and some people consider the ad a "watershed event" and a "masterpiece". Regis McKenna called the ad "more successful than the Mac itself". "1984" uses an unnamed heroine to represent the coming of the Macintosh (indicated by a Picasso-style picture of the computer on her white tank top) as a means of saving humanity from the conformity of IBM's attempts to dominate the computer industry. The ad alludes to George Orwell's novel, Nineteen Eighty-Four, which describes a dystopian future ruled by a televised "Big Brother."
The Macintosh, however, was expensive, which hindered its ability to be competitive in a market already dominated by the Commodore 64 for consumers, as well as the IBM Personal Computer and its accompanying clone market for businesses. Macintosh systems still found success in education and desktop publishing and kept Apple as the second-largest PC manufacturer for the next decade.
NeXT Computer
After Jobs was forced out of Apple in 1985, he started NeXT, a workstation computer company. The NeXT Computer was introduced in 1988 at a lavish launch event. Using the NeXT Computer, Tim Berners-Lee created the world's first web browser, the WorldWideWeb. The NeXT Computer's operating system, named NeXTSTEP, begat Darwin, which is now the foundation of most of Apple's products such as Macintosh's macOS and iPhone's iOS.
iMac
Apple iMac G3 was introduced in 1998 and its innovative design was directly the result of Jobs's return to Apple. Apple boasted "the back of our computer looks better than the front of anyone else's." Described as "cartoonlike", the first iMac, clad in Bondi Blue plastic, was unlike any personal computer that came before. In 1999, Apple introduced the Graphite gray Apple iMac and since has varied the shape, color and size considerably while maintaining the all-in-one design. Design ideas were intended to create a connection with the user such as the handle and a "breathing" light effect when the computer went to sleep. The Apple iMac sold for $1,299 at that time. The iMac also featured forward-thinking changes, such as eschewing the floppy disk drive and moving exclusively to USB for connecting peripherals. This latter change resulted, through the iMac's success, in the interface being popularized among third-party peripheral makers—as evidenced by the fact that many early USB peripherals were made of translucent plastic (to match the iMac design).
iTunes
iTunes is a media player, media library, online radio broadcaster, and mobile device management application developed by Apple. It is used to play, download, and organize digital audio and video (as well as other types of media available on the iTunes Store) on personal computers running the macOS and Microsoft Windows operating systems. The iTunes Store is also available on the iPod Touch, iPhone, and iPad.
Through the iTunes Store, users can purchase and download music, music videos, television shows, audiobooks, podcasts, movies, and movie rentals in some countries, and ringtones, available on the iPhone and iPod Touch (fourth generation onward). Application software for the iPhone, iPad and iPod Touch can be downloaded from the App Store.
iPod
The first generation of iPod was released October 23, 2001. The major innovation of the iPod was its small size achieved by using a 1.8" hard drive compared to the 2.5" drives common to players at that time. The capacity of the first generation iPod ranged from 5 GB to 10 GB. The iPod sold for US$399 and more than 100,000 iPods were sold before the end of 2001. The introduction of the iPod resulted in Apple becoming a major player in the music industry. Also, the iPod's success prepared the way for the iTunes music store and the iPhone. After the first few generations of iPod, Apple released the touchscreen iPod Touch, the reduced-size iPod Mini and iPod Nano, and the screenless iPod Shuffle in the following years.
iPhone
Apple began work on the first iPhone in 2005 and the first iPhone was released on June 29, 2007. The iPhone created such a sensation that a survey indicated six out of ten Americans were aware of its release. Time declared it "Invention of the Year" for 2007 and included it in the All-TIME 100 Gadgets list in 2010, in the category of Communication. The completed iPhone had multimedia capabilities and functioned as a quad-band touch screen smartphone. A year later, the iPhone 3G was released in July 2008 with three key features: support for GPS, 3G data and tri-band UMTS/HSDPA. In June 2009, the iPhone 3GS, whose improvements included voice control, a better camera, and a faster processor, was introduced by Phil Schiller. The iPhone 4 was thinner than previous models, had a five megapixel camera capable of recording video in 720p HD, and added a secondary front-facing camera for video calls. A major feature of the iPhone 4S, introduced in October 2011, was Siri, a virtual assistant capable of voice recognition.
iPad
The iPad is an iOS-based line of tablet computers designed and marketed by Apple. The first iPad was released on April 3, 2010. The user interface is built around the device's multi-touch screen, including a virtual keyboard. The iPad includes built-in Wi-Fi and cellular connectivity on select models. , more than 250 million iPads have been sold.
Personal life
Marriage
In 1989, Jobs first met his future wife, Laurene Powell, when he gave a lecture at the Stanford Graduate School of Business, where she was a student. Soon after the event, he stated that Laurene "was right there in the front row in the lecture hall, and I couldn't take my eyes off of her ... kept losing my train of thought, and started feeling a little giddy." After the lecture, Jobs met up with her in the parking lot and invited her out to dinner. From that point forward, they were together, with a few minor exceptions, for the rest of his life.
Jobs proposed on New Year's Day 1990 with "a fistful of freshly picked wildflowers". They married on March 18, 1991, in a Buddhist ceremony at the Ahwahnee Hotel in Yosemite National Park. Fifty people, including Jobs's father, Paul, and his sister Mona, attended. The ceremony was conducted by Jobs's guru, Kobun Chino Otogawa. The vegan wedding cake was in the shape of Yosemite's Half Dome, and the wedding ended with a hike (during which Laurene's brothers had a snowball fight). Jobs is reported to have said to Mona: "You see, Mona [...], Laurene is descended from Joe Namath, and we're descended from John Muir."
Jobs's and Powell's first child, Reed, was born in September 1991. Jobs's father, Paul, died a year and a half later, on March 5, 1993. Jobs's childhood home remains a tourist attraction and is currently owned by his stepmother (Paul's second wife), Marilyn Jobs.
Jobs and Powell had two more children, Erin, born in August 1995, and Eve, born in May 1998. The family lived in Palo Alto, California. A journalist who grew up locally remembered him as owning the house with "the scariest [Halloween] decorations in Palo Alto... I don't remember seeing him. I was busy being terrified."
Although a billionaire, Jobs made it known that, like Bill Gates, most of his monetary fortune would not be left to his children. These technology leaders also had in common another family-related area: both men limited their children's access, age appropriate, to social media, computer games and the Internet.
Family
Chrisann Brennan notes that after Jobs was forced out of Apple, "he apologized many times over for his behavior" towards her and Lisa. She also states that Jobs "said that he never took responsibility when he should have, and that he was sorry". By this time, Jobs had developed a strong relationship with Lisa and when she was nine, Jobs had her name on her birth certificate changed from "Lisa Brennan" to "Lisa Brennan-Jobs". In addition, Jobs and Brennan developed a working relationship to co-parent Lisa, a change Brennan credits to the influence of his newly found biological sister, Mona Simpson (who worked to repair the relationship between Lisa and Jobs). Jobs found Mona after first finding his birth mother, Joanne Schieble Simpson, shortly after he left Apple.
Jobs did not contact his birth family during his adoptive mother Clara's lifetime, however. He would later tell his official biographer Walter Isaacson: "I never wanted [Paul and Clara] to feel like I didn't consider them my parents, because they were totally my parents [...] I loved them so much that I never wanted them to know of my search, and I even had reporters keep it quiet when any of them found out." However, in 1986, when Jobs was 31, Clara was diagnosed with lung cancer. He began to spend a great deal of time with her and learned more details about her background and his adoption, information that motivated him to find his biological mother. Jobs found on his birth certificate the name of the San Francisco doctor to whom Schieble had turned when she was pregnant. Although the doctor did not help Jobs while he was alive, he left a letter for Jobs to be opened upon his death. As he died soon afterwards, Jobs was given the letter which stated that "his mother had been an unmarried graduate student from Wisconsin named Joanne Schieble."
Jobs only contacted Schieble after Clara died in early 1986 and after he received permission from his father, Paul. In addition, out of respect for Paul, he asked the media not to report on his search. Jobs stated that he was motivated to find his birth mother out of both curiosity and a need "to see if she was okay and to thank her, because I'm glad I didn't end up as an abortion. She was twenty-three and she went through a lot to have me." Schieble was emotional during their first meeting (though she wasn't familiar with the history of Apple or Jobs's role in it) and told him that she had been pressured into signing the adoption papers. She said that she regretted giving him up and repeatedly apologized to him for it. Jobs and Schieble would develop a friendly relationship throughout the rest of his life and would spend Christmas together.
During this first visit, Schieble told Jobs that he had a sister, Mona, who was not aware that she had a brother. Schieble then arranged for them to meet in New York where Mona worked. Her first impression of Jobs was that "he was totally straightforward and lovely, just a normal and sweet guy." Simpson and Jobs then went for a long walk to get to know each other. Jobs later told his biographer that "Mona was not completely thrilled at first to have me in her life and have her mother so emotionally affectionate toward me... As we got to know each other, we became really good friends, and she is my family. I don't know what I'd do without her. I can't imagine a better sister. My adopted sister, Patty, and I were never close."
Jobs then learned his family history. Six months after he was given up for adoption, Schieble's father died, she wed Jandali, and they had a daughter, Mona. Jandali states that after finishing his PhD he returned to Syria to work and that it was during this period that Schieble left him (they divorced in 1962). He also states that after the divorce he lost contact with Mona for a period of time: I also bear the responsibility for being away from my daughter when she was four years old, as her mother divorced me when I went to Syria, but we got back in touch after 10 years. We lost touch again when her mother moved and I didn't know where she was, but since 10 years ago we've been in constant contact, and I see her three times a year. I organized a trip for her last year to visit Syria and Lebanon and she went with a relative from Florida. A few years later, Schieble married an ice skating teacher, George Simpson. Mona Jandali took her stepfather's last name and thus became Mona Simpson. In 1970, after divorcing her second husband, Schieble took Mona to Los Angeles and raised her on her own.
When Simpson found that their father, Abdulfattah Jandali, was living in Sacramento, California, Jobs had no interest in meeting him as he believed Jandali didn't treat his children well. Simpson went to Sacramento alone and met Jandali, who worked in a small restaurant. Jandali and Simpson spoke for several hours, during which time he told her that he had left teaching for the restaurant business. He also said that he and Schieble had given another child away for adoption but that "we'll never see that baby again. That baby's gone." At the request of Jobs, Simpson did not tell Jandali that she had met his son. Jandali further told Simpson that he once managed a Mediterranean restaurant near San Jose and that "all of the successful technology people used to come there. Even Steve Jobs ... oh yeah, he used to come in, and he was a sweet guy and a big tipper."
After hearing about the visit, Jobs recalled that "it was amazing ... I had been to that restaurant a few times, and I remember meeting the owner. He was Syrian. Balding. We shook hands." However, Jobs still did not want to meet Jandali because "I was a wealthy man by then, and I didn't trust him not to try to blackmail me or go to the press about it ... I asked Mona not to tell him about me." Jandali later discovered his relationship to Jobs through an online blog. He then contacted Simpson and asked "what is this thing about Steve Jobs?" Simpson told him that it was true and later commented, "My father is thoughtful and a beautiful storyteller, but he is very, very passive ... He never contacted Steve." Because Simpson herself researched her Syrian roots and began to meet members of the family, she assumed that Jobs would eventually want to meet their father, but he never did. Jobs also never showed an interest in his Syrian heritage or the Middle East. Simpson fictionalized the search for their father in her 1992 novel The Lost Father. Malek Jandali is their cousin.
Honors and awards
1985: National Medal of Technology (with Steve Wozniak), awarded by US President Ronald Reagan
1987: Jefferson Award for Public Service
1989: Entrepreneur of the Decade by Inc. magazine
1991: Howard Vollum Award from Reed College
2004–2010: Listed among the Time 100 Most Influential People in the World on five separate occasions.
2007: Named the most powerful person in business by Fortune magazine
2007: Inducted into the California Hall of Fame, located at The California Museum for History, Women and the Arts
2012: Grammy Trustees Award, an award for those who have influenced the music industry in areas unrelated to performance
2012: Posthumously honored with an Edison Achievement Award for his commitment to innovation throughout his career.
2013: Posthumously inducted as a Disney Legend
2017: Steve Jobs Theatre opens at Apple Park
In popular culture
See also
Seva Foundation
Timeline of Steve Jobs media
References
Sources:
External links
"Steve Jobs: From Garage to World's Most Valuable Company." Computer History Museum.
Steve Jobs @ Andy Hertzfeld's The Original Macintosh (folklore.org)
Steve Jobs @ Steve Wozniak's woz.org
Forbes Profile
FBI Records: The Vault – Steven Paul Jobs at vault.fbi.gov
2005: Steve Jobs commencement speech at Stanford University
1995: Excerpts from an Oral History Interview with Steve Jobs, Founder, NeXT Computer – Smithsonian Institution, April 20, 1995.
1994: Steve Jobs in 1994: The Rolling Stone Interview – Rolling Stone
1990: Memory and Imagination
1983: The "Lost" Steve Jobs Speech from 1983; Foreshadowing Wireless Networking, the iPad, and the App Store (audio clip)
1955 births
2011 deaths
20th-century American businesspeople
21st-century American businesspeople
American Zen Buddhists
American adoptees
American billionaires
American computer businesspeople
American film producers
American film studio executives
American financiers
American industrial designers
American people of German descent
American people of Swiss descent
American people of Arab descent
American people of Syrian descent
American technology chief executives
American technology company founders
Apple Inc. executives
Apple Inc.
Atari people
Burials in California
Businesspeople from California
Businesspeople from San Francisco
Businesspeople in software
Computer designers
Deaths from cancer in California
Deaths from pancreatic cancer
Directors of Apple Inc.
Disney executives
Internet pioneers
Liver transplant recipients
National Medal of Technology recipients
NeXT
People from Cupertino, California
People from Los Altos, California
People from Mountain View, California
People from Palo Alto, California
People from San Francisco
Personal computing
Pixar people
Pixar
Psychedelic drug advocates
Spokespersons |
64713245 | https://en.wikipedia.org/wiki/Basque%20Cybersecurity%20Centre | Basque Cybersecurity Centre | The Basque Cybersecurity Centre (BCSC) is the organization appointed by the Basque Government to promote cybersecurity in the Basque Country. It is made up of departments of the Basque Government (Economic Development and Infrastructures, Safety, Public Governance, Education) and technology centres (Tecnalia, Vicomtech, Ik4-Ikerlan, and Basque Center for Applied Mathematics).
BCSC is currently a member of FIRST, a global association devoted to offering coordinated response in the event of computer attacks, and it has achieved CERT homologation. It also takes part in collaborations with other analogous centres on an international scale:
Member of the international cybersecurity consortium Global EPIC.
Member of the European Cyber Security Organisation (ECSO).
In partnership with Instituto Nacional de Ciberseguridad (INCIBE) and INCIBE-CERT.
Entity acknowledged by the European Union Agency for Cybersecurity (ENISA).
Scope and services
As CSIRT team, BCSC offers the following services:
Cybersecurity event management, offering advice on the phone and via email, both in Spanish and Basque.
Vulnerability handling, ensuring communication among the people or firms which discover them, and software or device developers.
Malware analysis, developing strategies for detection, protection and elimination.
Releasing warnings about safety vulnerabilities in IT systems, to lower their risk.
Early alert in case a risk becomes an actual threat.
Spreading information by publishing good practice guides in the scope of cybersecurity. Also publishing situation reports.
Collaborating with other fast response teams, internet service providers, devices manufacturers and other entities, sharing information.
Training for professionals, through workshops and seminars to promote learning in the field of cybersecurity.
Awareness building for young people and companies and associations working in the industrial field, through seminars focusing on the need to implement the necessary cybersecurity measures.
Among other services, BCSC cooperates with the Basque police, monitoring public networks to mitigate cyber-threats which put citizens and/or companies at risk. It also coordinates R&D&I initiatives, or the support to startups through initiative BIND 4.0.
References
External links
Official website
Basque Government
Internet security
Computer security organizations |
49297221 | https://en.wikipedia.org/wiki/Rahul%20Thakkar | Rahul Thakkar | Rahul Chandrakant Thakkar is an Indian-American software inventor who was one of the 33 recipients of Academy Award for scientific and technical achievement in 2016. Thakkar won the Academy Award for creating the "groundbreaking design" of DreamWorks Animation Media Review System, a scalable digital film review platform.
Thakkar was also a key member of the animation software development team for Shrek, which went on to win the first-ever Academy Award for Best Animated Feature at the 74th Academy Awards. He currently resides in Virginia, working in the aerospace industry for a Boeing subsidiary.
Early life and family
Thakkar was born to Prabha Thakkar and Chandrakant Thakkar in the United Kingdom and was subsequently raised in India. Thakkar's mother Prabha, whom he considered his inspiration, was a teacher and encouraged his interest in science. His father Chandrakant was, as per Thakkar, an "actor, writer and director" apart from being a voice-over artist.
Thakkar spent his early years in Mumbai and considers himself a Mumbaikar. He completed his graduation from the University of Mumbai with a degree in computer science. Eventually, Thakkar studied at Utah State University to complete his Master's in computer science in 1995.
Because of his father's background, Thakkar's early years in India were spent around actors. During these initial years, Thakkar worked with his father for some time in Mumbai, contributing to a 1971 Films Division of India documentary, and playing parts in television and radio shows. Thakkar also worked as a voice-over artist for television advertisements. At the same time, Thakkar's interest in mathematics and science remained predominant. Later on, he moved to the United States as he believed it was easier to make visual effects movies in Hollywood. Currently, Thakkar stays with his wife and a daughter in Virginia.
Career
In the United States, after graduating, Thakkar got a job offer from an animation studio and worked for a few television advertisements, developing their visual effects. Thakkar also developed the show opening software for CBS' 1994 and 1996 election coverage, and for the Late Show with David Letterman.
He was soon invited by Pacific Data Images and he joined in 1996, to develop an animated film that turned out to be Antz. PDI was soon acquired by DreamWorks in 2000, where he headed the ' "high performance particle system rendering software" and "colour management system and software" teams. While at DreamWorks, Thakkar worked with his mentor Richard Chuang (the co-founder of Pacific Data Images) on designing the DreamWorks Animation Media Review System, which subsequently led Thakkar to jointly win the Academy Award in 2016. He was the primary coder for the system's product suite since his time at PDI, when it was yet to be known as DreamWorks Animation Media Review System.
The suite was developed in an era of 56K modems to enable seamless collaboration between different artists and technicians in film-making. In Thakkur's words:- "They wanted any artist to view to view any number of shots, back-to-back, from part of the film, in high resolution, at 24 fps, with high quality audio, with speed-change control, from any phase of production from any department (story, editing, animation, modeling, layout, lighting, vfx, etc.)..."
At PDI and DreamWorks, Thakkar worked on several films, including Forces of Nature, Antz, The Legend of Bagger Vance, The Peacemaker and A Simple Wish. He was also a member of the animation software development team for Shrek, which went on to win the first-ever Academy Award for Best Animated Feature at the 74th Academy Awards.
After leaving DreamWorks in 2002, Thakkar worked in PIXIA Corp from 2003 to 2013 as a Chief Architect and was the Vice President of Technology in the area of satellite imagery. He then worked at Madison Square Garden from 2013 to 2014 as Vice President of Technology contributing in the entertainment, media and sports fields. Later, in 2014, he became the Vice President of R&D at Brivio Systems, a company operating in the access control industry. Thakkar noted certain surveillance drones used in the rescue of Captain Philips (from Somalian pirates) ran on their software. He left Brivio in 2015, and since then has been engaged with the aerospace industry, working for a Boeing subsidiary in the cloud-computing sector.
At the time of winning the 2016 Academy Award, Thakkar had 25 patents in his name, including patents pending, and had also developed a web standard.
2016 Academy Award
Thakkar won the 2016 Academy Award for scientific and technical achievement for his "groundbreaking design" of DreamWorks Animation Media Review System. He was interviewed by six members of the Academy during the shortlisting process. In a ceremony held on 13 February 2016 at Beverly Wilshire Hotel in Beverly Hills, California, Thakkar received the Academy Award jointly with Pacific Data Images' co-founder Richard Chuang. As per the Academy, these set of awards are bestowed upon individuals who have contributed significantly over time (and not necessarily in the past year) to the motion picture industry.
Thakkar commented in a January 2016 interview to India-West, "It is quite humbling to be recognized by AMPAS (Academy of Motion Picture Arts and Sciences) with a technical achievement award... It’s a wonderful feeling to know that the work we did two decades ago was still in use by the film industry. I am honored to be sharing this award with Richard Chuang, a mentor and pioneer in visual effects." He further revealed that he was excited about attending the award ceremony, additionally commenting that he expected more Indians to be featured in the Academy Awards winners' lists in the coming years.
The award presenters noted Thakkar and Chuang's pioneer contributions in enabling stereoscopic 3D viewing for movies and especially over the film Shrek. The Academy's award citation praised the DreamWork Animation Media Review System's film review capabilities, mentioning that the technology "continues to provide artist-driven, integrated, consistent and highly scalable studio-wide playback and interactive reviews."
Notes
See also
List of Indian winners and nominees of the Academy Awards
References
External links
Indian Academy Award winners
Living people
Scientists from Mumbai
Academy Award for Technical Achievement winners
University of Mumbai alumni
Utah State University alumni
Year of birth missing (living people)
Indian expatriates in the United States |
1151544 | https://en.wikipedia.org/wiki/BRL-CAD | BRL-CAD | BRL-CAD is a constructive solid geometry (CSG) solid modeling computer-aided design (CAD) system. It includes an interactive geometry editor, ray tracing support for graphics rendering and geometric analysis, computer network distributed framebuffer support, scripting, image-processing and signal-processing tools. The entire package is distributed in source code and binary form.
Although BRL-CAD can be used for a variety of engineering and graphics applications, the package's primary purpose continues to be the support of ballistic and electromagnetic analyses. In keeping with the Unix philosophy of developing independent tools to perform single, specific tasks and then linking the tools together in a package, BRL-CAD is basically a collection of libraries, tools, and utilities that work together to create, raytrace, and interrogate geometry and manipulate files and data. In contrast to many other 3D modelling applications, BRL-CAD primarily uses CSG rather than boundary representation. This means BRL-CAD can "study physical phenomena such as ballistic penetration and thermal, radiative, neutron, and other types of transport". It does also support boundary representation.
The BRL-CAD libraries are designed primarily for the geometric modeler who also wants to tinker with software and design custom tools. Each library is designed for a specific purpose: creating, editing, and ray tracing geometry, and image handling. The application side of BRL-CAD also offers a number of tools and utilities that are primarily concerned with geometric conversion, interrogation, image format conversion, and command-line-oriented image manipulation.
History
In 1979, the U.S. Army Ballistic Research Laboratory (BRL) – now the United States Army Research Laboratory – expressed a need for tools that could assist with the computer simulation and engineering analysis of combat vehicle systems and environments. When no CAD package was found to be adequate for this purpose, BRL software developers – led by Mike Muuss – began assembling a suite of utilities capable of interactively displaying, editing, and interrogating geometric models. This suite became known as BRL-CAD. Development on BRL-CAD as a package subsequently began in 1983; the first public release was made in 1984. BRL-CAD became an open-source project in December 2004.
The BRL-CAD source code repository is the oldest known public version-controlled codebase in the world that's still under active development, dating back to 1983-12-16 00:10:31 UTC.
See also
PLaSM - Programming Language of Solid Modeling
Comparison of CAD editors
References
External links
Computer-aided design software
Free computer-aided design software
Free software programmed in C
Free software programmed in Tcl
Computer-aided design software for Linux
MacOS computer-aided design software
Software that uses Tk (software)
Engineering software that uses Qt
Software using the BSD license |
25098614 | https://en.wikipedia.org/wiki/Biff%20%28Unix%29 | Biff (Unix) | is a mail notification system for Unix.
Usage
When a new mail message is delivered, the program alerts the recipient so they can read it immediately. The alert is sent to the tty where the recipient is logged in, and contains the Subject, From line, and first few lines of the body of the new message. The alert also includes terminal beeps to guarantee quick attention.
Notification is enabled by the command
and disabled by
Comsat
The biff utility was the user interface used to change notification preferences. The actual act of notifying the user was performed by a daemon called (short for "communications satellite"). The daemon received messages via UDP describing the update to the mailbox, and would then inform the user of the new message.
Replacements
Because the sudden, unexpected printing of a block of text on a tty can be annoying if it overwrites more useful information on the screen that can't be easily regenerated, is not used very much any more. Some modern MTAs do not even support comsat (the server process which listens for reports of incoming mail) making useless.
The general idea of the incoming mail alert has remained very popular even as the original biff and comsat have been almost completely abandoned. There are many replacements, several with similar names like , , , , , , and . The concept also extends outside the Unix world — the AOL "You've got mail" voice could be seen as a talking biff.
Variant
Some versions of , such as the one found in FreeBSD as of 4.7 have a third mode of operation. In addition to and it could be set to which would reduce the alert to just a pair of beeps, without any text written to the terminal. This makes less disruptive.
Origin and name
was written by John Foderero for 4.0BSD. It was named after a dog belonging to Heidi Stettner, another Berkeley CS student; the dog was well known to many students as he would accompany Stettner around campus.
Eric Cooper, a student contemporary to Foderero and Stettner, reports that the dog would bark at the mail carrier, making it a natural choice for the name of a mail notification system. Stettner herself contradicts this.
References
Unix software
Email |
13682049 | https://en.wikipedia.org/wiki/Quilt%20%28software%29 | Quilt (software) | Quilt is a software utility for managing a series of changes to the source code of any computer program. Such changes are often referred to as "patches" or "patch sets". Quilt can take an arbitrary number of patches as input and condense them into a single patch. In doing so, Quilt makes it easier for many programmers to test and evaluate the different changes amongst patches before they are permanently applied to the source code.
Tools of this type are very important for distributed software development, in which many programmers collaborate to test and build a single large codebase. For example, quilt is heavily used by the maintainers of the Linux kernel.
Quilt evolved from a set of patch-management scripts originally written by Linux kernel developer Andrew Morton, and was developed by Andreas Grünbacher for maintaining Linux kernel customizations for SuSE Linux. It is now being developed as a community effort, hosted at the GNU Savannah project repository and distributed as free software (its license is the GNU General Public License v2, or later). Quilt's name originated from patchwork quilts.
Quilt has been incorporated into dpkg, Debian's package manager, and is one of the standard source formats supported from the Debian "squeeze" release onwards. This source format is identified as "3.0 (quilt)" by dpkg. Quilt is integrated into the Buildroot, which is notably used by OpenWrt. Quilt is also integrated into and supported by the similar Yocto Project build system supported by the Linux Foundation.
Mercurial queues (mq), an extension of the Mercurial revision control system, provides similar functionality.
See also
Apache Subversion
Git (software)
References
External links
Quilt Tutorial (PDF)
Free computer programming tools |
57570100 | https://en.wikipedia.org/wiki/DeepScale | DeepScale | DeepScale, Inc. is an American technology company headquartered in Mountain View, California, that develops perceptual system technologies for automated vehicles. On October 1, 2019, the company was purchased by Tesla.
History
DeepScale was co-founded in September 2015 by Forrest Iandola and Kurt Keutzer. In 2018, DeepScale raised in Series A funding. In 2018, the firm announced strategic partnerships with automotive suppliers including Visteon and Hella Aglaia Mobile Vision GmbH. On October 1, 2019, the firm was purchased by Tesla, which works on autonomous vehicle technology.
Technology
Prior to the founding of DeepScale, Forrest Iandola and Kurt Keutzer worked together at University of California, Berkeley, on making deep neural networks (DNNs) more efficient. In 2016, shortly after the founding of DeepScale, Iandola, Keutzer, and their collaborators released SqueezeNet, which is a small and energy-efficient DNN for computer vision. By developing smaller DNNs, the firm has been able to run deep learning on scaled-down processing hardware such as smartphones and automotive-grade chips. In 2018, the firm said that its engineering team had moved beyond SqueezeNet and that it had developed even faster and more accurate DNNs for use in commercial products.
Neural Architecture Search
In recent years, neural architecture search (NAS) has begun to outperform humans at designing DNNs that produce high-accuracy results while running fast. In 2019, DeepScale published a paper called SqueezeNAS, which used supernetwork-based NAS to design a family of fast and accurate DNNs for semantic segmentation of images. The paper claimed that the SqueezeNAS neural networks outperform the speed-accuracy tradeoff curve of Google's MobileNetV3 family of neural network models. While Google used thousands of GPU-days to search for the design of MobileNetV3, DeepScale used just tens of GPU-days to automatically design the DNNs presented in the SqueezeNAS paper.
Product
The firm develops perceptual system software which uses deep neural networks to enable cars to interpret their environment. The software is designed for integration into an open platform, where a wide range of sensors and processors can be used. The software is able to run on a variety of processors, ranging from NVIDIA GPUs to smaller ARM-based processing chips that are designed specifically for the automotive market.
In January 2019, the firm launched an automotive perception software product called "Carver" that uses deep neural networks to perform object detection, lane identification, and drivable area identification. To accomplish this, Carver uses three neural networks which run in parallel. While running in real-time, these three networks perform a total of 0.6 trillion operations per second ("tera-ops/sec"). As a point of reference, each of the two redundant chips on the Tesla Full-Self-Driving computer system board can perform 36 tera-ops/sec. So 0.6 tera-ops/sec is only 2% of the capacity of each Tesla chip.
Acquisition by Tesla
On October 1, 2019, CNBC reported that Tesla had purchased DeepScale. Fortune stated that "it's apparent that DeepScale's technology will be integrated into Tesla's Autopilot, the self-driving technology the company is currently working on." Further, CNET reported that "DeepScale's approach to autonomy fits the bigger picture that [Tesla CEO Elon] Musk has promoted for a few years now. Rather than relying on LiDAR, Musk has consistently believed cameras, radar and ultrasonic sensors will make up a robust system without other hardware."
References
Software companies based in California
Technology companies of the United States
Software companies of the United States
2015 establishments in California |
401540 | https://en.wikipedia.org/wiki/STS-75 | STS-75 | STS-75 was a 1996 NASA Space Shuttle mission, the 19th mission of the Columbia orbiter.
Crew
Allen, Hoffman, Nicollier and Chang-Díaz had previously been members of the STS-46 crew, which had flown the TSS-1 experiment in 1992.
Mission objective
Tethered Satellite System
The primary objective of STS-75 was to carry the Tethered Satellite System Reflight (TSS-1R) into orbit and to deploy it spaceward on a conducting tether. The mission also flew the United States Microgravity Payload (USMP-3) designed to investigate materials science and condensed matter physics.
The TSS-1R mission was a reflight of TSS-1 which was flown onboard Space Shuttle Atlantis on STS-46 in July/August 1992. The Tether Satellite System circled the Earth at an altitude of 296 kilometers, placing the tether system within the rarefied electrically charged layer of the atmosphere known as the ionosphere.
STS-75 mission scientists hoped to deploy the tether to a distance of . Over 19 kilometers of the tether were deployed (over a period of 5 hours) before the tether broke. Many pieces of floating debris were produced by the plasma discharge and rupture of the tether, and some collided with it. The satellite remained in orbit for a number of weeks and was easily visible from the ground.
The electric conductor of the tether was a copper braid wound around a nylon (Nomex) string. It was encased in teflon-like insulation, with an outer cover of kevlar, inside a nylon (Nomex) sheath. The culprit turned out to be the innermost core, made of a porous material which, during its manufacture, trapped many bubbles of air, at atmospheric pressure.
Later vacuum-chamber experiments suggested that the unwinding of the reel uncovered pinholes in the insulation. That in itself would not have caused a major problem, because the ionosphere around the tether, under normal circumstance, was too rarefied to divert much of the current. However, the air trapped in the insulation changed that. As air bubbled out of the pinholes, the high voltage of the nearby tether, about 3500 volts, converted it into a relatively dense plasma (similar to the ignition of a fluorescent tube), and therefore made the tether a much better conductor of electricity. This plasma diverted to the metal of the shuttle and from there to the ionospheric return circuit. That current was enough to melt the cable.
The specific TSS-1R mission objectives were: characterize the current-voltage response of the TSS-orbiter system, characterize the satellite's high-voltage sheath structure and current collection process, demonstrate electric power generation, verify tether control laws and basic tether dynamics, demonstrate the effect of neutral gas on the plasma sheath and current collection, characterize the TSS radio frequency and plasma wave emissions and characterize the TSS dynamic-electrodynamic coupling.
TSS-1R Science Investigations included: TSS Deployer Core Equipment and Satellite Core Equipment (DCORE/SCORE), Research on Orbital Plasma Electrodynamics (ROPE), Research on Electrodynamic Tether Effects (RETE), Magnetic Field Experiment for TSS Missions (TEMAG), Shuttle Electrodynamic Tether System (SETS), Shuttle Potential and Return Electron Experiment (SPREE), Tether Optical Phenomena Experiment (TOP), Investigation of Electromagnetic Emissions by the Electrodynamic Tether (EMET), Observations at the Earth's Surface of Electromagnetic Emissions by TSS (OESSE), Investigation and Measurement of Dynamic Noise in the TSS (IMDN), Theoretical and Experimental Investigation of TSS Dynamics (TEID) and the Theory and Modeling in Support of Tethered Satellite Applications (TMST).
Other mission objectives
The USMP-3 payload consisted of four major experiments mounted on two Mission Peculiar Experiment Support Structures (MPESS) and three Shuttle Mid-deck experiments. The experiments were: Advanced Automated Directional Solidification Furnace (AADSF), Material pour l'Etude des Phenomenes Interessant la Solidification sur Terre et en Orbite (MEPHISTO), Space Acceleration Measurement System (SAMS), Orbital Acceleration Research Experiment (OARE), Critical Fluid Light Scattering Experiment (ZENO) and Isothermal Dendritic Growth Experiment (IDGE).
Alternating use of bunk bed
Astronauts Jeffrey A. Hoffman and Scott J. Horowitz, both Jewish, had alternating use of the same bunk bed, to which Hoffman attached, upon Horowitz's request, a mezuzah, using Velcro.
Operating system
STS-75 also was the first use of an operating system based on the Linux kernel on orbit. An older Digital Unix program, originally on a DEC AlphaServer, was ported to run Linux on a laptop. The next use of Linux was a year later, on STS-83.
Fictional STS-75 mission
STS-75 was the shuttle mission described in the fictional NASA Document 12-571-3570, although this document was disseminated several years before STS-75 was launched. The document purports to report on experiments to determine effective sexual positions in microgravity. Astronomer and scientific writer Pierre Kohler mistook this document for fact and is responsible for a major increase in its redistribution in the early 21st century. Conspiracy theories first made in the early beginnings of the Shuttle era of sex in space were suddenly made rampant again, causing a minor press debacle among tabloids.
References
External links
NASA mission summary
STS-75 Video Highlights
STS-075
Spacecraft launched in 1996 |
68679499 | https://en.wikipedia.org/wiki/Ms2%20%28software%29 | Ms2 (software) | ms2 is a molecular simulation program. It comprises both molecular dynamics and Monte Carlo simulation algorithms. ms2 is designed for the calculation of thermodynamic properties of fluids. A large number of thermodynamic properties can be readily computed using ms2, e.g. phase equilibrium, transport and caloric properties. ms2 is limited to homogeneous state simulations. The software is fully open source accessible.
Features
ms2 contains two molecular simulation techniques: molecular dynamics (MD) and Monte-Carlo. ms2 supports the calculation of vapor-liquid equilibria of pure components as well as multi-component mixtures. Different Phase equilibrium calculation methods are implemented in ms2. Furthermore, ms2 is capable of sampling various classical ensembles such as NpT, NVE, NVT, NpH. To evaluate the chemical potential, Widom's test molecule method and thermodynamic integration are implemented. Also, algorithms for the sampling of transport properties are implemented in ms2. Transport properties are determined by equilibrium MD simulations following the Green-Kubo formalism and the Einstein formalism.
Applications
ms2 has been frequently used for predicting thermophysical properties of fluids for chemical engineering applications as well as for scientific computing and soft matter physics. It has been used for modelling both model fluids as well as real substances. A large number interaction potentials are implemented in ms2, e.g. the Lennard-Jones potential, the Mie potential, electrostatic interactions (point charges, point dipoles and point quadrupoles), and external forces. Force fields from databases such as the MolMod database can readily be used in ms2.
See also
Comparison of software for molecular mechanics modeling
List of Monte Carlo simulation software
List of free and open-source software packages
References
External links
Molecular dynamics software
Free science software
Computational chemistry
Molecular modelling
Molecular dynamics
Force fields |
22749929 | https://en.wikipedia.org/wiki/Theophilus%20Beckford | Theophilus Beckford | Theophilus Beckford (1935 – 19 February 2001) was a Jamaican pianist and one of the pioneers of Jamaican popular music during the transition from rhythm 'n' blues to Jamaican ska.
Biography
Beckford was born in 1935 in Trench Town, Kingston, Jamaica, the second of three sons. He learned to play piano at the Boys' Town home for indigent boys in west Kingston, initially inspired by Rosco Gordon and Fats Domino, and on leaving bought a piano and began working with producer Stanley Motta, backing local calypsonians. His piano playing helped to define the sound and feel of ska music, as distinct from Jamaican rhythm & blues in the late 1950s. He had a huge hit in 1959 with "Easy Snappin", recorded in 1956 and played at dances by producer Coxsone Dodd before he released it three years later on his Worldisc label. The single was a number one in Jamaica and stayed on the chart for eighteen months, also selling well in the United Kingdom, and the emphasis on the off-beat was widely imitated. The song is considered a forerunner of ska. Although Beckford was credited as the writer, he received no royalties from the song. A second hit followed with "Jack & Jill Shuffle", and a few more singles were recorded for Dodd before Beckford formed his own King Pioneer label in the early 1960s.
The bulk of Beckford's recorded work is as a session musician with bands such as Clue J & His Blues Blasters, and he recorded extensively for both Dodd and Duke Reid in this capacity, as well as for Prince Buster, Leslie Kong, and Clancy Eccles.
In 1975, he played piano on Junior Byles' classic song "Fade Away", and in 1978 he appeared as himself in the film Rockers.
In 1991, Beckford performed as part of the Studio One The Beat Goes On: 35 years in the Business shows at the National Arena in Kingston.
In 1992, "Easy Snappin'" was used in a television commercial for jeans, but again, Beckford received no royalties. Although he performed on hundreds of popular records, the lack of financial reward received by Beckford was a constant complaint, as he said in 2000: "Today as I listen to music on radio and sound system and recognise that I created some of these tunes. I feel strongly that I am not given full recognition for my work".
Beckford died on 19 February 2001 as a result of injuries sustained from a machete wound to the head after an argument with a neighbour in the Washington Gardens area of Kingston. He left nine children.
Albums
Trench Town Ska (1999) Jamaican Gold
Trojan Battlefield: King Pioneer Ska Productions (2004) Trojan
References
1935 births
2001 deaths
Jamaican pianists
Jamaican reggae musicians
Musicians from Kingston, Jamaica
Island Records artists
Trojan Records artists
Deaths by blade weapons
20th-century pianists |
8955445 | https://en.wikipedia.org/wiki/O.%20J.%20Simpson | O. J. Simpson | Orenthal James Simpson (born July 9, 1947), nicknamed "the Juice", is an American former football running back, broadcaster, actor, and advertising spokesman. Once a popular figure with the U.S. public, he is now best known for being tried for the murders of his former wife, Nicole Brown Simpson, and her friend Ron Goldman. Simpson was initially acquitted of the murders in criminal court but was later found responsible for both deaths in a civil trial.
Simpson attended the University of Southern California (USC), where he played football for the USC Trojans and won the Heisman Trophy in 1968. He played professionally as a running back in the National Football League (NFL) for 11 seasons, primarily with the Buffalo Bills from 1969 to 1977. He also played for the San Francisco 49ers from 1978 to 1979. In 1973, he became the first NFL player to rush for more than 2,000 yards in a season. He holds the record for the single-season yards-per-game average, which stands at 143.1. He was the only player to rush for over 2,000 yards in the 14-game regular season NFL format. Simpson was inducted into the College Football Hall of Fame in 1983 and the Pro Football Hall of Fame in 1985. After retiring from football, he began new careers in acting and football broadcasting.
In 1994, Simpson was arrested and charged with the murders of his ex-wife, Nicole Brown Simpson, and her friend, Ron Goldman. He was acquitted by a jury after a lengthy and internationally publicized trial. The families of the victims subsequently filed a civil suit against him. A civil court awarded a $33.5 million judgment against him in 1997 for the victims' wrongful deaths. In 2000, Simpson moved to Miami, Florida to avoid paying on the liability judgment, which as of 2021 remained mostly unpaid.
In 2007, Simpson was arrested in Las Vegas, Nevada, and charged with the felonies of armed robbery and kidnapping. In 2008, he was convicted and sentenced to 33 years' imprisonment, with a minimum of nine years without parole. He served his sentence at the Lovelock Correctional Center near Lovelock, Nevada. Simpson was granted parole on July 20, 2017, which was the minimum sentence. He was eligible for release from prison on October 1, 2017, and was released on that date. On December 14, 2021, Simpson was granted early release from his parole by the Nevada Division of Parole and Probation.
Early life
Born and raised in San Francisco, California, Simpson is a son of Eunice (née Durden), a hospital administrator, and Jimmy Lee Simpson, a chef and bank custodian. His father was a well-known drag queen in the San Francisco Bay Area. Later in life, Jimmy Simpson announced that he was gay and died of AIDS in 1986.
Simpson's maternal grandparents were from Louisiana, and his aunt gave him the name Orenthal, which she said was the name of a French actor she liked. He was called "O. J." from birth and did not know that Orenthal was his given name until a teacher read it in third grade. Simpson has one brother, Melvin Leon "Truman" Simpson, one living sister, Shirley Simpson-Baker, and one deceased sister, Carmelita Simpson-Durio. As a child, Simpson developed rickets and wore braces on his legs until the age of five, giving him his bowlegged stance. His parents separated in 1952, and Simpson was raised by his mother.
Simpson grew up in San Francisco and lived with his family in the housing projects of the Potrero Hill neighborhood. In his early teenage years, he joined a street gang called the Persian Warriors and was briefly incarcerated at the San Francisco Youth Guidance Center. Future wife Marquerite, his childhood sweetheart, described Simpson as "really an awful person then"; after his third arrest, a meeting with Willie Mays during which the baseball star encouraged Simpson to avoid trouble helped persuade him to reform. At Galileo High School (currently Galileo Academy of Science and Technology) in San Francisco, Simpson played for the school football team, the Galileo Lions. He graduated in 1965.
College football and athletics career
Although Simpson was an All-City football player at Galileo, his mediocre high-school grades prevented him from attracting the interest of many college recruiters. After a childhood friend's injury in the Vietnam War influenced Simpson to stay out of the military, he enrolled at City College of San Francisco in 1965. He played football both ways as a running back and defensive back and was named to the Junior College All-American team as a running back. City College won the Prune Bowl against Long Beach State, and many colleges sought Simpson as a transfer student for football.
Simpson chose to attend the University of Southern California (USC), which he had admired as a young football fan, over the University of Utah and played running back for head coach John McKay in 1967 and 1968. Simpson led the nation in rushing both years under McKay: in 1967 with 1,543 yards and 13 touchdowns, and in 1968 with 1,880 yards on 383 carries.
As a junior in 1967, Simpson was a close runner-up in the Heisman Trophy balloting to quarterback Gary Beban of UCLA. In that year's Victory Bell rivalry game between the teams, USC was down by six points in the fourth quarter with under eleven minutes remaining. On their own 36, USC backup quarterback Toby Page called an audible on third and seven. Simpson's 64-yard touchdown run tied the score, and the extra point provided a 21–20 lead, which was the final score. This was the biggest play in what is regarded as one of the greatest football games of the 20th century.
Another dramatic touchdown in the same game is the subject of the Arnold Friberg oil painting, O.J. Simpson Breaks for Daylight. Simpson also won the Walter Camp Award in 1967 and was a two-time consensus All-American.
Simpson was an aspiring track athlete; in 1967 he lost a 100 m race at Stanford against the then-British record holder Menzies Campbell. Prior to playing football at Southern Cal, he ran in the USC sprint relay quartet that broke the world record in the 4 × 110-yard relay at the NCAA track championships in Provo, Utah on June 17, 1967.
As a senior in 1968, Simpson rushed for 1,709 yards and 22 touchdowns in the regular season, earning the Heisman Trophy, the Maxwell Award, and Walter Camp Award. He held the record for the Heisman's largest margin of victory for 51 years, defeating runner-up Leroy Keyes by 1,750 points. In the Rose Bowl on New Year's Day, #2 USC faced top-ranked Ohio State; Simpson ran for 171 yards, including an 80-yard touchdown run in a 27–16 loss.
Statistics
Professional football career
Buffalo Bills
The first selection 1969 AFL–NFL Common Draft was held by the AFL's Buffalo Bills, after finishing 1–12–1 in 1968. They took Simpson, but he demanded what was then the largest contract in professional sports history: $650,000 over five years. This led to a standoff with Bills' owner Ralph Wilson, as Simpson threatened to become an actor and skip professional football. Eventually, Wilson agreed to pay Simpson.
Simpson entered professional football with high expectations, but struggled in his first three years, averaging only 622 yards per season. Bills coach John Rauch, not wanting to build an offense around one running back, assigned Simpson to do blocking and receiving duties at the expense of running the ball. In 1971, Rauch resigned as head coach and the Bills brought in Harvey Johnson. Despite Johnson devising a new offense for Simpson, Simpson was still ineffective that year. After the 1971 season, the Bills fired Johnson and brought in Lou Saban as head coach. Unlike Rauch, Saban made Simpson the centerpiece of the Bills offense.
In 1972, Simpson rushed for over 1,000 yards for the first time in his career, gaining a league-leading total of 1,251 yards. In 1973, Simpson became the first player to break the highly coveted 2,000 yard rushing mark, with 2,003 total rushing yards and 12 touchdowns. Simpson broke the mark during the last game of the season against the New York Jets with a seven-yard rush. That same game also saw Simpson break Jim Brown's single-season rushing record of 1,863 yards. For his performance, Simpson won that year's NFL MVP Award and Bert Bell Award. While other players have broken the 2,000-yard mark since Simpson, his record was established in a time when the NFL had only 14 games per season, as opposed to the 16-game seasons that began in 1978. Simpson still holds the rushing record for 14 games.
Simpson gained more than 1,000 rushing yards for each of his next three seasons. He did not lead the league in rushing in 1974, but did cross the 1,000-yard barrier despite a knee injury. In game 11 of 1974, he passed Ken Willard as the rushing leader among active players, a position he maintained until his retirement more than five seasons later. Simpson also made his first and only playoff appearance during the 1974 season. In a divisional game against the Pittsburgh Steelers, Simpson rushed for 49 yards on 15 attempts and caught a touchdown pass, but the Bills lost the game 32–14.
Simpson won the rushing title again in 1975, rushing for 1,817 yards and 16 touchdowns. Simpson also had a career-high 426 receiving yards and seven receiving touchdowns that season. Simpson once again led the league in rushing in 1976, rushing for 1,503 yards and eight touchdowns. Simpson had the best game of his career during that season's Thanksgiving game against the Detroit Lions on November 25. In that game, Simpson rushed for a then-record 273 yards on 29 attempts and scored two touchdowns. Despite Simpson's performance, the Bills would lose the game 27–14.
A low light that season came during a game against the Patriots a few weeks earlier when defensive end Mel Lunsford and several other Patriots defenders stuffed the superstar running back for no gain but as Simpson tried to continue driving forward Lunsford bodyslammed him to the ground. Simpson got up and punched Lunsford which prompted Lunsford to swing back. Bills offensive lineman Reggie McKenzie then jumped on Lunsford's back but Lunsford bent down and flung McKenzie over his head and went back to swinging at Simpson before a melee of the two teams stopped the fight and ended up in a pile on the field. Lunsford and Simpson were both ejected from the game as the Patriots solid defense persisted with New England going on to win 20–10 on their way to finishing the 1976 season 11–3. The Bills finished 2–12.
Simpson played in only seven games in 1977, as his season was cut short by injury.
San Francisco 49ers
Before the 1978 season, the Bills traded Simpson to his hometown San Francisco 49ers for a series of draft picks. Simpson played in San Francisco for two seasons, rushing for 1,053 yards and four touchdowns. His final NFL game was on December 16, 1979, a 31–21 loss to the Atlanta Falcons at Atlanta–Fulton County Stadium. His final play was a 10-yard run on 3rd and 10 for a first down.
Career summary
Simpson gained 11,236 rushing yards, placing him 2nd on the NFL's all-time rushing list when he retired; he now stands at 21st. He was named NFL Player of the Year in 1973, and played in six Pro Bowls. He was the only player in NFL history to rush for over 2,000 yards in a 14-game season and he is the only player to rush for over 200 yards in six different games in his career. From 1972 to 1976, Simpson averaged 1,540 rushing yards per (14 game) season, 5.1 yards per carry, and he won the NFL rushing title four times. Simpson was inducted into the Pro Football Hall of Fame in 1985, his first year of eligibility. In 2019, he was named to the National Football League 100th Anniversary All-Time Team.
Simpson played in only one playoff game during his 11-season Hall of Fame career: a 1974 Divisional Round game between the Buffalo Bills and the Pittsburgh Steelers. Simpson was held to 49 rushing yards on fifteen carries to go with three receptions for 37 yards and a touchdown as the Bills lost 32–14.
Simpson acquired the nickname "Juice" as a play on "O.J.", a common abbreviation for orange juice. "Juice" is also a colloquial synonym for electricity or electrical power, and hence a metaphor for any powerful entity; the Bills' offensive line at Simpson's peak was nicknamed "The Electric Company".
NFL career statistics
Regular season
Source:
NFL records
Fastest player to gain 1,000 rushing yards in season: 1,025 in seven games in 1973 and 1,005 in seven games in 1975 (tied with Terrell Davis).
Fastest player to gain 2,000 rushing yards in season: 2,003 in 14 games in 1973.
Most rushing yards per game in a season: 143.1 per game in 1973.
Acting career
Simpson began acting while at USC and appeared on Dragnet in an uncredited role as a potential recruit to the LAPD. He became a professional actor before playing professional football, appearing in the first episode of Medical Center while negotiating his contract with the Bills. While in the NFL Simpson appeared in productions such as the television miniseries Roots (1977), and the dramatic motion pictures The Klansman (1974), The Towering Inferno (1974), The Cassandra Crossing (1976), and Capricorn One (1978). In 1979, he started his own film production company, Orenthal Productions, which dealt mostly in made-for-TV fare such as the family-oriented Goldie and the Boxer films with Melissa Michaelsen (1979 and 1981), and Cocaine and Blue Eyes (1983), a television movie broadcast by NBC.
Simpson said that he did not seriously consider an acting career until seeing Lee Marvin and Richard Burton, while filming The Klansman in Oroville, California, ordering chili from Chasen's via private jet. He said in 1980 that "The Oscar or the Emmy says you've reached a level of competence in this business, and I would love to have one". Simpson avoided starring in blaxploitation films, choosing third or fourth lead roles while studying experienced stars like Marvin and Burton. The Hertz commercials from 1975 benefited Simpson's acting career but he sometimes intentionally chose non-positive roles; "I've got to tear down that picture of O.J. Simpson, the clean-cut athlete, to get believability into whatever part I happen to be playing". Simpson also starred in the comedic Back to the Beach (1987) and The Naked Gun trilogy (1988, 1991, 1994). According to Arnold Schwarzenegger, Simpson was considered by director James Cameron to play the eponymous character in The Terminator (1984) when Schwarzenegger was cast as Kyle Reese, but Cameron ultimately cast Schwarzenegger as the Terminator while Simpson had no involvement in the film.
Besides his acting career, Simpson worked as a commentator for Monday Night Football and The NFL on NBC. He also appeared in the audience of Saturday Night Live during its second season and hosted an episode during its third season.
Frogmen
Simpson starred in the un-televised two-hour-long film pilot for Frogmen, an A-Team-like adventure series that Warner Bros. Television completed in 1994, a few months before the murders. NBC had not yet decided whether to order the series when Simpson's arrest cancelled the project. While searching his home, the police obtained a videotaped copy of the pilot as well as the script and dailies. Although the prosecution investigated reports that Simpson, who played the leader of a group of former United States Navy SEALs, received "a fair amount of" military training—including use of a knife—for Frogmen, and there is a scene in which he holds a knife to the throat of a woman, this material was not introduced as evidence during the trial.
NBC executive Warren Littlefield said in July 1994 that the network would probably never air the pilot if Simpson were convicted; if he were acquitted, however, one television journalist speculated that "Frogmen would probably be on the air before the NBC peacock could unfurl its plume". Most pilots that are two hours long are aired as TV movies whether or not they are ordered as series. Because—as the Los Angeles Times later reported—"the appetite for all things O.J. appeared insatiable" during the trial, Warner Bros. and NBC estimated that a gigantic, Super Bowl–like television audience would have watched the Frogmen film. Co-star Evan Handler said the studio's decision not to air it or release it on home video, and forego an estimated $14 million in profits, was "just about the only proof you have that there is some dignity in the advertising and television business".
Juiced
In 2006, Simpson starred in his own improv, hidden-camera prank TV show, Juiced. Typical of the genre, Simpson would play a prank on everyday people while secretly filming them and at the end of each prank, he would shout, "You've been Juiced!" Less typical, each episode opened with topless strippers dancing around Simpson, who is dressed as a pimp. He sings his own rap song, which includes the lyrics "Don't you know there's no stopping the Juice / When I'm on the floor I'm like a lion on the loose / Better shoot me with a tranquilizer dart / Don't be stupid, I'm not a Simpson named Bart." In one episode, Simpson is at a used car lot in Las Vegas where he attempts to sell his white Bronco. A bullet hole in the front of the SUV is circled with his autograph, and he pitches it to a prospective buyer by saying that if they "ever get into some trouble and have to get away, it has escapability." In another sketch called "B-I-N-G-O.J.", Simpson pretends to be having an affair with another man's girlfriend. Later he transforms into an old white man whose dying wish is to call a game of bingo. Juiced aired as a one-time special on pay-per-view television and was later released on DVD.
Filmography
Endorsements
As a child Simpson earned money by scalping tickets and collecting seat cushions at Kezar Stadium. In high school he organized dances, hiring a band and ballroom and charging admission. Chuck Barnes helped Simpson form business relationships with Chevrolet and ABC early in his football career. By 1971, New York wrote that Simpson was already wealthy enough to "retire this week if [he] wanted to".
In 1975, People magazine described Simpson as "the first black athlete to become a bona fide lovable media superstar". He used his amiable persona, good looks, and charisma in many endorsement deals. Beginning in 1975, he appeared in advertisements with the Hertz rental car company. Commercials depicted Simpson running through airports embodying speed, as others shouted to him the Hertz slogan "Go, O.J., Go!".
Besides helping his acting career, Simpson estimated that the very successful "superstar in rent-a-car" campaign raised the recognition rate among people he met from 30% to 90%. Hertz's annual profit increased by 50% to $42.2 million within the first year, brand awareness increased by more than 40%, and 97% of viewers understood that the commercials advertised Hertz, avoiding the common "vampire video" problem. Simpson was so important to the company that CEO Frank Olson personally negotiated his contract, and Hertz used him for an unusually long time for a celebrity endorser. Advertising Age in 1977 named Simpson the magazine's Star Presenter of the Year; by 1984 consumer research found that he was the most popular athlete endorser, and a 1990s MCI Communications commercial starring Eunice Simpson satirized her son's work. Although Simpson appeared less often in Hertz commercials by the late 1980s, his relationship with the company continued; Simpson was to travel to Chicago to meet with Hertz executives and clients on the night of the Brown-Goldman murder.
Other products Simpson endorsed included Pioneer Chicken, Honey Baked Ham, Calistoga Water Company's line of Napa Naturals soft drinks, and Dingo cowboy boots. As president and CEO of O. J. Simpson Enterprises he owned hotels and restaurants. When Simpson and Brown divorced in 1992 he had $10 million in assets and more than $1 million in annual income, including $550,000 from Hertz. During the June 1994 police chase, spectators shouted the "Go, O.J., Go!" slogan at Simpson as he rode in a white Bronco owned by Hertz.
Family life
At age 19 on June 24, 1967, Simpson married Marguerite L. Whitley. Together, they had three children: Arnelle L. Simpson (b. 1968), Jason Lamar Simpson (b. 1970), and Aaren Lashone Simpson (1977–1979). In August 1979, Aaren drowned in the family's swimming pool.
Simpson met Nicole Brown in 1977, while she was working as a waitress at a nightclub called The Daisy. Although still married to his first wife, Simpson began dating Brown. Simpson and Marguerite
divorced in March 1979.
Brown and Simpson were married on February 2, 1985, five years after his retirement from professional football. The couple had two children, Sydney Brooke Simpson (b. 1985) and Justin Ryan Simpson (b. 1988). The marriage lasted seven years, during which Simpson pleaded no contest to spousal abuse in 1989. Brown filed for divorce on February 25, 1992, citing irreconcilable differences. In 1993, after the divorce, Brown and Simpson made an attempt at reconciliation, but according to Sheila Weller "they were a dramatic, fractious, mutually obsessed couple before they married, after they married, after they divorced in 1992, and after they reconciled."
Legal history
Nicole Brown Simpson and Ron Goldman murders and trials
Criminal trial for murder
On June 12, 1994, Nicole Brown Simpson and Ron Goldman were found stabbed to death outside Nicole's condo in the Brentwood area of Los Angeles. Simpson was a person of interest in their murders. Simpson did not turn himself in, and on June 17 he became the object of a low-speed pursuit by police while riding as a passenger in the white 1993 Ford Bronco SUV owned and driven by his longtime friend Al Cowlings. TV stations interrupted coverage of the 1994 NBA Finals to broadcast the incident live. With an estimated audience of 95 million people, the event was described as "the most famous ride on American shores since Paul Revere's".
The pursuit, arrest, and trial of Simpson were among the most widely publicized events in American history. The trial, often characterized as the Trial of the Century because of its international publicity, likened to that of Sacco and Vanzetti and the Lindbergh kidnapping, culminated after eleven months on October 3, 1995, when the jury rendered a verdict of "not guilty" for the two murders. An estimated 100 million people nationwide tuned in to watch or listen to the verdict announcement. Following Simpson's acquittal, no additional arrests or convictions related to the murders were made.
Immediate reaction to the verdict was known for its division along racial lines: a poll of Los Angeles County residents showed that most African Americans there felt justice had been served by the "not guilty" verdict, while the majority of whites and Latinos opined that it had not. O. J. Simpson's integrated defense counsel team included Johnnie Cochran, Robert Kardashian, Robert Shapiro, and F. Lee Bailey. Marcia Clark was the lead prosecutor for the State of California.
According to a 2016 poll, 83% of white Americans and 57% of black Americans believe Simpson committed the murders.
Wrongful death civil trial
Following Simpson's acquittal of criminal charges, Ron Goldman's family filed a civil lawsuit against Simpson. Daniel Petrocelli represented plaintiff Fred Goldman (Ronald Goldman's father), while Robert Baker represented Simpson. Superior Court Judge Hiroshi Fujisaki presided, and he barred television and still cameras, radio equipment, and courtroom sketch artists from the courtroom. On October 23, 1996, opening statements were made, and on January 16, 1997, both sides rested their cases.
On February 5, 1997, a civil jury in Santa Monica, California unanimously found Simpson liable for the wrongful death of and battery against Goldman, and battery against Brown. Simpson was ordered to pay $33,500,000 in damages. In February 1999, an auction of Simpson's Heisman Trophy and other belongings netted almost $500,000, which went to the Goldman family.
The Goldman family also tried to collect Simpson's NFL $28,000 monthly pension, but failed to collect any money.
In 1997, Simpson defaulted on his mortgage at the home in which he had lived for 20 years, at 360 North Rockingham Avenue, and the lender foreclosed the property. In July 1998, the house was demolished by its next owner, Kenneth Abdalla, an investment banker and president of the Jerry's Famous Deli chain.
On September 5, 2006, Goldman's father took Simpson back to court to obtain control over Simpson's "right to publicity", for purposes of satisfying the judgment in the civil court case. On January 4, 2007, a federal judge issued a restraining order prohibiting Simpson from spending any advance he may have received on a canceled book deal and TV interview about the 1994 murders. The matter was dismissed before trial for lack of jurisdiction. On January 19, 2007, a California state judge issued an additional restraining order, ordering Simpson to restrict his spending to "ordinary and necessary living expenses".
On March 13, 2007, a judge prevented Simpson from receiving any further compensation from the defunct book deal and TV interview, and the judge ordered the bundled book rights to be auctioned. In August 2007, a Florida bankruptcy court awarded the rights to the book to the Goldman family, to partially satisfy an unpaid civil judgment. Originally titled If I Did It, the book was renamed If I Did It: Confessions of the Killer, with the word "If" reduced in size to such an extent that it appears within the width of the large red "I" in the title, making the title appear to read I Did It: Confessions of the Killer. Additional material was added by members of the Goldman family, investigative journalist Dominick Dunne, and author Pablo Fenjves.
Other legal troubles
The State of California claims Simpson owes $1.44 million in back taxes. A tax lien was filed in his case on September 1, 1999.
In the late 1990s, Simpson attempted to register "O. J. Simpson", "O. J.", and "The Juice" as trademarks for "a broad range of goods, including figurines, trading cards, sportswear, medallions, coins, and prepaid telephone cards". A "concerned citizen", William B. Ritchie, sued to oppose the granting of federal registration on the grounds that doing so would be immoral and scandalous. Simpson gave up the effort in 2000 and left California that year for Florida, settling in Miami. Florida is one of few states where pensions and/or residences cannot generally be seized to collect debts.
In February 2001, Simpson was arrested in Miami-Dade County, Florida, for simple battery and burglary of an occupied conveyance, for yanking the glasses off another motorist during a traffic dispute three months earlier. If convicted, Simpson could have faced up to 16 years in prison, but he was tried and quickly acquitted of both charges in October 2001.
On December 4, 2001, Simpson's Miami home was searched by the FBI on suspicion of ecstasy possession and money laundering. The FBI had received a tip that Simpson was involved in a major drug trafficking ring after 10 other suspects were arrested in the case. Simpson's home was thoroughly searched for two hours, but no illegal drugs were discovered, and no arrest or formal charges were filed following the search. However, investigators uncovered equipment capable of stealing satellite television programming, which eventually led to Simpson's being sued in federal court.
On July 4, 2002, Simpson was arrested in Miami-Dade County, Florida, for water speeding through a manatee protection zone and failing to comply with proper boating regulations. The misdemeanor boating regulation charge was dropped, and Simpson was fined for the speeding infraction.
In March 2004, satellite television network DirecTV, Inc. accused Simpson in a Miami federal court of using illegal electronic devices to pirate its broadcast signals. The company later won a $25,000 judgment, and Simpson was ordered to pay an additional $33,678 in attorney's fees and costs.
Las Vegas robbery
On the night of September 13, 2007, a group of men led by Simpson entered a room at the Palace Station hotel-casino and took sports memorabilia at gunpoint, which resulted in Simpson being questioned by police. Simpson admitted to taking the items, which he said had been stolen from him, but denied breaking into the hotel room; he also denied that he or anyone else carried a gun. He was released after questioning.
Two days later, Simpson was arrested and initially held without bail. Along with three other men, Simpson was charged with multiple felony counts, including criminal conspiracy, kidnapping, assault, robbery, and using a deadly weapon. Bail was set at $125,000, with stipulations that Simpson have no contact with the co-defendants and that he surrender his passport. Simpson did not enter a plea.
By the end of October 2007, all three of Simpson's co-defendants had plea-bargained with the prosecution in the Clark County, Nevada, court case. Walter Alexander and Charles H. Cashmore accepted plea agreements in exchange for reduced charges and their testimony against Simpson and three other co-defendants, including testimony that guns were used in the robbery. Co-defendant Michael McClinton told a Las Vegas judge that he too would plead guilty to reduced charges and testify against Simpson that guns were used in the robbery. After the hearings, the judge ordered that Simpson be tried for the robbery.
On November 8, 2007, Simpson had a preliminary hearing to decide whether he would be tried for the charges. He was held over for trial on all 12 counts. Simpson pleaded not guilty on November 29, with an initial setting for trial on April 7, 2008, although it was soon set for September 8 to give the defense more time for their case.
In January 2008, Simpson was taken into custody in Florida and was extradited to Las Vegas, where he was incarcerated at the Clark County jail for violating the terms of his bail by attempting to contact Clarence "C. J." Stewart, a co-defendant in the trial. District Attorney David Roger of Clark County provided District Court Judge Jackie Glass with evidence that Simpson had violated his bail terms. A hearing took place on January 16, 2008. Glass raised Simpson's bail to US$250,000 and ordered that he remain in county jail until 15 percent was paid in cash. Simpson posted bond that evening and returned to Miami the next day.
Simpson and his co-defendant were found guilty of all charges on October 3, 2008. On October 10, 2008, Simpson's counsel moved for a new trial (trial de novo) on grounds of judicial errors and insufficient evidence. Simpson's attorney announced he would appeal to the Nevada Supreme Court if Judge Glass denied the motion. The attorney for Simpson's co-defendant, C. J. Stewart, petitioned for a new trial, alleging Stewart should have been tried separately and cited possible misconduct by the jury foreman.
Simpson faced a possible life sentence with parole on the kidnapping charge, and mandatory prison time for armed robbery. On December 5, 2008, Simpson was sentenced to a total of 33 years in prison, with the possibility of parole after nine years, in 2017. On September 4, 2009, the Nevada Supreme Court denied a request for bail during Simpson's appeal. In October 2010, the Nevada Supreme Court affirmed his convictions. He served his sentence at the Lovelock Correctional Center where his inmate ID number was #1027820.
A Nevada judge agreed on October 19, 2012, to "reopen the armed robbery and kidnapping case against O. J. Simpson to determine if the former football star was so badly represented by his lawyers that he should be freed from prison and get another trial". A hearing was held beginning May 13, 2013, to determine if Simpson was entitled to a new trial. On November 27, 2013, Judge Linda Bell denied Simpson's bid for a new trial on the robbery conviction. In her ruling, Bell wrote that all Simpson's contentions lacked merit.
Release from prison
On July 31, 2013, the Nevada Parole Board granted Simpson parole on some convictions, but his imprisonment continued based on the weapons and assault convictions. The board considered Simpson's prior record of criminal convictions and good behavior in prison in coming to the decision. At his parole hearing on July 20, 2017, the board decided to grant Simpson parole, with certain parole conditions such as travel restrictions, non-contact with co-defendants from the robbery, and not drinking excessively. He was released on October 1, 2017, having served almost nine years. On December 14, 2021, Simpson was released from parole early due to good behavior, releasing him from the previous conditions of his release and effectively making him a completely free man.
In popular culture
Books
Pablo Fenjves ghostwrote the 2007 book If I Did It based on interviews with Simpson. The book was published by Beaufort Books, a New York City publishing house owned by parent company Kampmann & Company/Midpoint Trade Books. All rights and proceeds from the book were awarded to the family of murder victim Ron Goldman.
Films
In Fox Network's TV movie, The O. J. Simpson Story (1995), Simpson is portrayed as a youth by Bumper Robinson and as an adult by Bobby Hosea; his close friend Al Cowlings is portrayed as a youth by Terrence Howard and as an adult by David Roberson.
BBC TV's documentary, O.J. Simpson: The Untold Story (2000), produced by Malcolm Brinkworth, "reveals that clues that some believe pointed away from Simpson as the killer were dismissed or ignored and highlights two other leads which could shed new light on the case."
The Investigation Discovery TV movie documentary, OJ: Trial of the Century (2014), begins on the day of the murders, ends on the reading of the verdict, and comprises actual media footage of events and reactions, as they unfolded.
Also an Investigation Discovery TV documentary is O.J. Simpson Trial: The Real Story (2016), which entirely comprises archival news footage of the murder case, the Bronco chase, the trial, the verdict, and reactions.
In 2018, it was announced Boris Kodjoe would portray Simpson in the film Nicole & O.J.
Television
In CBS's TV movie American Tragedy (November 15, 2000), Simpson is played by Raymond Forchion.
The documentary mini-series, O.J.: Made in America (released January 22, 2016, at Sundance), directed by Ezra Edelman and produced by Laylow Films, is an American five-part, -hour film that previewed at the Tribeca and Sundance Film Festivals, and aired as part of the 30 for 30 series airing on the ABC and ESPN sister networks. This film adds "rich contextual layers to the case, including a dive into the history of Los Angeles race relations that played such a central role in his acquittal." As James Poniewozik observed in his June 20, 2016, New York Times review: "the director Ezra Edelman pulls back, way back, like a news chopper over a freeway chase. Before you hear about the trial, the documentary says, you need to hear all the stories—the stories of race, celebrity, sports, America—that it's a part of." The film won the 2017 Academy Award for Best Documentary Feature.
In FX's cable TV miniseries The People v. O. J. Simpson: American Crime Story (February 2016), based on Jeffrey Toobin's book The Run of His Life: The People v. O. J. Simpson (1997), Simpson is portrayed by Cuba Gooding Jr.
In NBC's miniseries Law & Order: True Crime - The Menendez Murders (2017), O.J. Simpson is shown to be jailed beside Erik Menendez's cell, and the two shared several conversations throughout Episode 7 (only Simpson's voice is present). In Episode 8, actual news footage of Simpson's verdict appeared on the television, with Simpson himself appearing on a newspaper.
In January 2020, Court TV premiered OJ25, a 25-part series documenting each week of the trial and hosted by former Los Angeles prosecutor and legal analyst Roger Cossack.
Exhibits
The Bronco from Simpson's police chase is on display in Pigeon Forge, Tennessee's Alcatraz East Crime Museum.
In 2017, Adam Papagan curated a pop-up museum featuring artifacts and ephemera from the trial at Coagula Curatorial gallery in Los Angeles.
See also
List of NCAA major college football yearly rushing leaders
References
External links
1947 births
20th-century American male actors
21st-century American criminals
African-American male actors
African-American players of American football
African-American sports announcers
African-American sports journalists
All-American college football players
American color commentators
American Conference Pro Bowl players
American Football League All-Star players
American Football League first overall draft picks
American Football League players
American football running backs
American male criminals
American male film actors
American male sprinters
American people convicted of assault
American people convicted of kidnapping
American people convicted of robbery
American prisoners and detainees
American sportspeople convicted of crimes
American television sports announcers
Buffalo Bills players
City College of San Francisco alumni
City College of San Francisco Rams football players
College football announcers
College Football Hall of Fame inductees
Criminals from California
Domestic violence in the United States
Heisman Trophy winners
History of Los Angeles
Junior college men's track and field athletes in the United States
Living people
Male actors from San Francisco
Maxwell Award winners
National Football League announcers
National Football League first overall draft picks
National Football League Most Valuable Player Award winners
National Football League Offensive Player of the Year Award winners
O. J. Simpson murder case
Olympic Games broadcasters
People acquitted of murder
People associated with direct selling
Players of American football from San Francisco
Prisoners and detainees of Nevada
Pro Football Hall of Fame inductees
San Francisco 49ers players
Sportspeople from San Francisco
Track and field athletes from San Francisco
Track and field athletes in the National Football League
USC Trojans football players
USC Trojans men's track and field athletes |
51429011 | https://en.wikipedia.org/wiki/The%20Third%20Argument | The Third Argument | The Third Argument () is a Serbian graphic novel based on the works of writer Milorad Pavić, with script by Zoran Stefanović and art by Zoran Tucić.
Creation and publication history
The graphic novel was created by artist Zoran Tucić and scriptwriter Zoran Stefanović based on motifs from Milorad Pavić's literature. Other artists also participated in the creation of the novel: costume designer Jasmina Ignjatović (women's costumes), painter and sculptor Jasna Nikolić (figure-concepts), art photographer Milinko Stefanović and graphic designer Rade Tovladijac.
The novel is based on Pavić's stories "The Wedgwood Tea Set", "Horses of St. Mark, or the Novel of Troy" and "The Third Argument", as well as poems "The Game of Chess with Mexican Figures" and "The Novel of Troy".
The graphic novel was successfully received both by the public and critics in FR Yugoslavia. In 1995, it was published in Cyprus. Then it was introduced to the planetary public through the Heavy Metal Magazine, where it was published in sections from 1998 to 2000. It 2016 it was published in France by YIL Editions, and republished in Serbia by Komiko.
Story
The novel consists of three stories, "The Wedgwood Tea Set", "The Horses of Saint Mark" and "The Third Argument".
"The Wedgwood Tea Set"
The story is told in the manner of magical realism.
The story is told by a poor young man. He tells how he met a beautiful, rich young girl from the capital. The two met at the Faculty of Mathematics. The girl was looking for someone to help her prepare an exam, so the two start studying together. The young man would visit the girl's house early in the morning, the two would study, the breakfast would be served, after which the two would continue studying. As the time passes, the girl realizes the young man is lagging behind her. When the day of the exam comes, the girl passes, while the young man fails to appear to take the exam. Months pass, with the girl wondering where the young man is. The two meet during the winter, agreeing to study together for the following exam. When the exam comes, she passes, discovering he did not even apply to take it. The two meet during spring and, for the third time, decide to study together. After weeks of studying, the girl passes, while the young man, once again, does not appear on the exam. Among his books left at the girl's house she discovers his student card, which reveals to her that they do not even attend the same faculty. Wondering why he would spend months of studying something that has nothing to do with his studies, the girl comes to the conclusion that it must have been because he was in love with her. Searching for him, she finds out from his African friends that he went home, to Greece, to a village near Thessaloniki. The girl goes to Greece and finds his house. After dinner, the young man shows her his white bull. The two make love on the bull's back, while it runs across the fields. In the autumn, the young man proposes to the girl that they study together again and she agrees, deciding not to mention that she is aware that they do not attain the same faculty. The girl does not feel surprised when the young man does not appear on the exam, but does feel surprised when she does not meet him during following months. Sitting in her living room and wondering whether his feelings for her were real, the girl spots the Wedgwood tea set on the table, with a relief of a girl and a bull on the teapot. She then realizes that the young man spent months and months studying with her only so he could have breakfast in her house. She starts wondering if it is possible that the young man actually hated her. The story concludes with the young man's words: "My name was Balkans. Her name – Europe."
"The Horses of Saint Mark"
The story of the Trojan War is "Slavicized", with Slavic names for Hellenic gods and heroes and numerous anachronisms.
In 4000 BC, a young girl is taken to the forest by the Danube by two older man. They give her instructions about looking into the future. She sees the events happening in 12th century BC through the eyes of Pariž (Paris). Pariž declares how, in the times when Troy still "stood on ships", a woman breastfeeding him fell asleep and had a vision of Troy in flames because of a child "born on the day the mares were taken to the field to be fertilized by the wind". After realizing it is Pariž, the Trojans decide to kill him, but the sailor who is ordered to do it is bribed and Pariž is saved.
Years later, Pariž's father Primuž (Priam) is hunting. After failing to hit a deer from his crossbow, he turns to an "unfortunate and unworthy" way to catch the deer: he prays in order to "tie his prey with his prayer". He takes the dead deer home, where it is skinned. Primuž and his wife lay in deer's skin and make love. When the child is born, his mother, as a repent for his father's sin, names him Jelen (Slavic word for "deer"). When he grows up, it becomes clear that he would not be as beautiful and strong as his older brother, Pariž. However, Jelen is clairvoyant and is sent to a monastery to learn how to use his gift.
The Judgement of Paris takes place (with three goddesses in this version being three female prophets), and Pariž pronounces Venuša (Aphrodite) the most beautiful after she promises him Jelena (Helen), the wife of the emperor Menelauš (king Menelaus). Meanwhile, Jelen is taken to the "Emperor City" (Constantinople) by his teachers, where he is shown four bronze horses "made in the time of Lesandar (Alexander)". He is told that every time the horses move an empire falls. Jelen is, similar to the girl from the story's beginning, left on the coast of a lake. After several days, he sees a white unicorn, and manages to see into the future: Pariž's visit to Sparta, taking of Jelena to Troy and the beginning of the Trojan War. After that, Jelen sees how the Crusaders move the Horses of Saint Mark from Constantinople to Rome, and then a number of dramatic historical events from the future. The story then turns to a contemporary newspaper article about one of the bronze horses being removed from their place at the St Mark's Basilica in Venice in order to go under a restoration. Pariž declares that, at the end of his visions, Jelen saw "you [the reader], who are staring into this images believing you are out of the game". The story returns to the young girl on the coast of Danube, who meets a white unicorn.
"The Third Argument"
The storyteller tells the story of Hernán Cortés reaching the Aztec Empire with his troops. Despite having only 400 soldiers, he is convinced in his victory over Aztecs out of three arguments. First, he has 16 horses, which Aztecs believed were evil gods. Second, there was an Aztec legend about a golden-haired god expatriated from the continent, but who will return, coming from the east, in "the year of reed"; Cortés had blonde hair, and the year of the god's return was, according to Aztec calendar, 1519, the year of Cortés' coming. The third argument was "too complicated to be written or drawn. Thus it remains unknown. The third argument was, however, without any doubt, perfectly clear and known to every one of Cortés' soldiers." The Spanish march into Tenochtitlan, and Moctezuma II offers them peace. One of Moctezuma's closest counselors is sacrificed to the gods; as the storyteller explains, Aztecs believed that the human sacrifice is more valuable if the sacrificed was someone close to the person who offers the sacrifice. After the rebellion against Moctezuma, Cortés has to deal with the rebels and the Tenochtitlan officially falls into the hands of the Spanish.
The story turns to the legend of Juan Diego. During one winter, a poor Indian hunter has a vision of a woman (in the legend of Diego, the apparition was of Virgin Mary, but in this version she resembles Aztec goddess). He tells a catholic missionary that the vision told him they should build a temple. The priest asks for a proof, and the Indian returns to the place where he had a vision. Finding nothing, he returns to the priest and, while declaring the woman is gone, fresh roses fall from his robe, which convinces the priest the vision was real. On the place of the vision Basilica of Our Lady of Guadalupe was built. The storyteller (presumably Pavić) describes his visit to Mexico City and the Basilica. Every year a large number of people attend the festivities in honor of Our Lady of Guadalupe. Every time a murder happens; as the storyteller explains, it is quite often that someone kills his friend "in the moment of true intimacy". One such case included a taxi driver who said to his friend: "Wait here, I'm going to fetch a knife. I'm going to kill you", after which he stabbed his friend, who waited peacefully, to death. The storyteller declares: "One evening, returning alone from a dinner, I was thinking about that event. In the dead of night I was passing through huge and desert park Chapultepec. However, there was no need for fear. In the huge and foreign city around me, among millions of inhabitants of Ciudad de México, there was no man who loved me. I was completely safe. The Cortés' third argument is, evidently, still valid."
Critical reception
The comic album was well received by critics in Serbia. Serbian writer and critic Pavle Zelić in a review wrote: "Authors have, in a very precise manner, touched the spirit, the essence of the oneiric, entangled and then disentangled style, which attracted so many readers to Pavić' prose." Journalist and critic Jelena Tasić wrote: "Done after the recipe of three colors – white, red and blue, stories themselves offer interpretation of their own spectrum, which as opposed to phrases of the enlightened, rational European thoughts on 'Liberté, égalité, fraternité', differ and come to persisting Balkan categories of future, present and past." Painter, poet and essayist Slobodan Škerović wrote about the comic: "Mystical charge is not allowing a reader/watcher to unleash imagination but it takes him to the realm where quiet buzzing of instruments of art overcomes the need for unquestionably solid form of ordered existence." He also wrote: "'Wedgwood's Tea Set' is a mythological quest for the meaning, told by a rich visual language and strict narrative suspense. The simulation surpasses the reality and completely compresses it into a decorative symbolism. This kind of inner emanation I only saw with Kurosawa, in Dodes'ka-den and Dreams." Journalist and writer Aleksandar Žikić wrote: "Coldness of colors is in accord with ethereal characters, who are more like symbols and using the rhythm of the prose sample."
The comic was also well received abroad. American comic book artist, writer and editor Archie Goodwin described the album as a "truly visually brilliant graphic novel". Polish critic Artur Dlugosz wrote: "A sensual comic 'Wedgwood's Tea Set' of the duo Tucić and Stefanović, attracts with its colors and execution technique. It is easy to get immersed into that wonderful story [...] Fluid storytelling takes us through new turnabouts of incredible love, describing the consequential attempts and heroically accepted defeats – as well as sudden punchline, which reveals a completely different side of story. If such comics could only be created in Poland..."
Awards
1995 – The Comic Event of the Year by NIN
1995 – Grand Prix at Zaječar Comic Salon
The Third Argument in Pavić's work
In a postmodern manner, the graphic novel is mentioned in Pavić's novel, The Writing Box (1999):
References
External links
The Third Argument at the Association of Comic Artists of Serbia official website
The Third Argument at YIL Edition official website
Milorad Pavić official website
Serbian comics titles
Serbian graphic novels
Fantasy comics
Novels adapted into comics
Mythology in comics
Classical mythology in comics
Heavy Metal (magazine) titles
1995 comics debuts
Magic realism novels
Fictional Serbian people
Serbian comics characters |
261774 | https://en.wikipedia.org/wiki/T%C3%A9l%C3%A9com%20Paris | Télécom Paris | Télécom Paris (also known as ENST or Télécom or École nationale supérieure des télécommunications, also Télécom ParisTech until 2019) is a French public institution for higher education (grande école) and engineering research. Located in Palaiseau, it is also a member of the Institut Polytechnique de Paris and the Institut Mines-Télécom. In 2021 it was the sixth highest ranked French university in the World University Rankings, and the 7th best small university worldwide.
In the QS Ranking, Télécom Paris is the 64th best university worldwide in Computer Science.
In 1991, Télécom Paris and the EPFL established a school named EURECOM located in Sophia-Antipolis. Students can be admitted either in Palaiseau or in Sophia-Antipolis.
History
In 1845, Alphonse Foy, director of telegraphic lines, proposed a school specializing in telegraphy for Polytechnicians. However, his proposition was rejected. The school was founded on 12 July 1878 as the École professionnelle supérieure des postes et télégraphes (EPSPT). In 1912, the school's name was changed to École supérieure des postes et télégraphes (ESPT). In 1934, the ESPT moved to rue Barrault, in the 13th arrondissement of Paris. In 1938, the school was renamed École nationale supérieure des postes, télégraphes et téléphones (ENSPTT), and in the same year, the President of France, Albert Lebrun awarded the school Legion of Honor. During the Second World War, in 1942, the school was divided into two schools: the ENSPTT and École nationale supérieure des télécommunications (ENST). The ENSPTT was closed on 31 December 2002. In 1971, the ENST passed under the direct guardianship of the Direction générale des télécommunications, and the development of telecommunications during this period drove the state to create two associate schools: the ENST Bretagne in 1977 in Brest, and the INT in 1979 at Évry. In 1992, the ENST, together with the EPFL, founded the EURECOM at Sophia-Antipolis. On 26 December 1996, the Groupe des Écoles des Télécommunications (GET, nowadays Institut Mines-Télécom) was established. It consists of a group of telecommunications schools including the ENST, the Télécom Bretagne (nowadays IMT Atlantique), the Télécom SudParis, and EURECOM. On 21 September 2009, the school's name was changed to Télécom ParisTech. In 2019, the name changed finally into Telecom Paris.
On June 1, 2019, the school's name was again changed to Télécom Paris after the formation of Institute Polytechnique de Paris.
Present
There are two ways to get admitted into Télécom Paris as an undergraduate student:
Through a selective entrance examination (Concours Commun Mines Ponts) after at least two years of preparation in Classes préparatoires aux Grandes Écoles curriculum following high school (in France, Morocco, and Tunisia)
Through an application-based admission process for university students, especially from foreign universities
After a scientific bachelor's degree (Mathematics, Physics, Mechanics, Computer science etc.)
After a DUT degree from a French university of technology
Télécom Paris is also one of the approved application schools for the École Polytechnique, making it possible for fourth-year students to complete their studies with a one-year specialization at Télécom Paris. Télécom Paris also provides education for the Corps des Mines.
Around 250 engineers graduate each year from Télécom Paris. About forty percent of the graduates are foreign students. Specialization courses cover all aspects of computer science and communication engineering: electronics, signal processing, software engineering, networking, economics, finance etc.
Research at Télécom Paris
Research at Télécom Paris consists of:
Optimization and transmission of information
Improvements in data processing
Microelectronics, such as FPGA and DSP systems
Image and Signal processing, wavelets
Artificial intelligence, data mining, distributed and real-time systems
User experience Design, Information visualisation and computer human interfaces
Télécom Paris has four departments:
The Department of Electronics and Communications: This laboratory consists of about one hundred researchers and teaching researchers (37 tenured) within 7 research groups
The Department of Computer Science and Networking
The Department of Signal and Image Processing
The Department of Economic and Social Sciences
The three first labs are gathered in Télécom Paris' own laboratory : LTCI, "Laboratoire de Traitement et de Communication et de l'Information"
The Economic and Social Sciences department is associated with the CNRS through the "Interdisciplinary Institute for Innovation".
Training for engineering degrees
First year - Multidisciplinary studies
For undergraduate students, the core curriculum, commonly referred to as tronc commun, consists of courses in most areas of science (Mathematics, Economics, applied Mathematics, Computer science, Physics, etc.), as well as compulsory courses in the humanities (foreign languages, social sciences, liberal arts, etc.)
Taking place in the Paris campus of Télécom Paris, this primary year of multidisciplinary studies is common to both Paris curriculum students and Sophia-Antipolis curriculum students; and is followed by a one or two month mandatory summer internship.
Second and Third Year - Specialization in Paris or at Sophia-Antipolis (at Eurecom)
Starting from their second year, students have to choose a specialization in which they'll receive in-depth courses and that will conclude their engineering curriculum. Based on 13 specialization tracks of more than 120 courses, these two years eventually unfold into a six-month internship through which the engineering student will acquire their first real professional experience.
Third year students can also choose to complete their studies in an approved university in France or abroad, as part of a Double-Degree or a Master of Science program.
Training for master degrees
Télécom Paris offers post master's degrees Mastères spécialisés (MS), and masters in different domains.
Mastères Spécialisés (Post-Master's Degrees)
One year full-time training
Big Data, gestion et analyse de données massives
Conception, Architecture de Réseaux et Cybersécurité
Concepteur de Projet Digital (in partnership with l'INA) (formerly "Création et Production Multimédia")
Cybersécurité et cyberdéfense
Intelligence Artificielle
Radio-Mobiles, IoT et 5G
Systèmes Embarqués
Two years part-time training
Architecte Digital d'Entreprise
Architecte Réseaux et Cybersécurité
Management des Systèmes d'Information (in partnership with l'ESSEC)
Smart Mobility
Masters courses
Four master's degrees of University Paris Saclay are taught by Télécom ParisTech in collaboration with other Parisian Universities and grande ecoles.
Master Multimedia Networking (MN)
Master Advanced Computer Networks (ACN)
Master Data & Knowledge (D&K)
Master Industries de Réseau et Économie Numérique (IREN)
It takes part in organisation of several other master courses offered by its partners in and around Paris.
References
External links
Official website.
Official site of EURECOM.
Télécom ParisTech Alumni.
Junior Entreprise of Télécom ParisTech.
Engineering universities and colleges in France
ParisTech
Grandes écoles
History of telecommunications in France
Schools in Paris
.
Educational institutions established in 1878
Telecommunication education
1878 establishments in France |
75022 | https://en.wikipedia.org/wiki/Expansion%20card | Expansion card | In computing, an expansion card (also called an expansion board, adapter card or accessory card) is a printed circuit board that can be inserted into an electrical connector, or expansion slot (also referred to as a bus slot) on a computer's motherboard (see also backplane) to add functionality to a computer system. Sometimes the design of the computer's case and motherboard involves placing most (or all) of these slots onto a separate, removable card. Typically such cards are referred to as a riser card in part because they project upward from the board and allow expansion cards to be placed above and parallel to the motherboard.
Expansion cards allow the capabilities and interfaces of a computer system to be extended or supplemented in a way appropriate to the tasks it will perform. For example, a high-speed multi-channel data acquisition system would be of no use in a personal computer used for bookkeeping, but might be a key part of a system used for industrial process control. Expansion cards can often be installed or removed in the field, allowing a degree of user customization for particular purposes. Some expansion cards take the form of "daughterboards" that plug into connectors on a supporting system board.
In personal computing, notable expansion buses and expansion card standards include the S-100 bus from 1974 associated with the CP/M operating system, the 50-pin expansion slots of the original Apple II computer from 1977 (unique to Apple), IBM's Industry Standard Architecture (ISA) introduced with the IBM PC in 1981, Acorn's tube expansion bus on the BBC Micro also from 1981, IBM's patented and proprietary Micro Channel architecture (MCA) from 1987 that never won favour in the clone market, the vastly improved Peripheral Component Interconnect (PCI) that displaced ISA in 1992, and PCI Express from 2003 which abstracts the interconnect into high-speed communication "lanes" and relegates all other functions into software protocol.
History
Even vacuum-tube based computers had modular construction, but individual functions for peripheral devices filled a cabinet, not just a printed circuit board. Processor, memory and I/O cards became feasible with the development of integrated circuits. Expansion cards allowed a processor system to be adapted to the needs of the user, allowing variations in the type of devices connected, additions to memory, or optional features to the central processor (such as a floating point unit). Minicomputers, starting with the PDP-8, were made of multiple cards, all powered by and communicating through a passive backplane.
The first commercial microcomputer to feature expansion slots was the Micral N, in 1973. The first company to establish a de facto standard was Altair with the Altair 8800, developed 1974–1975, which later became a multi-manufacturer standard, the S-100 bus. Many of these computers were also passive backplane designs, where all elements of the computer, (processor, memory, and I/O) plugged into a card cage which passively distributed signals and power between the cards.
Proprietary bus implementations for systems such as the Apple II co-existed with multi-manufacturer standards.
IBM PC and descendants
IBM introduced what would retroactively be called the Industry Standard Architecture (ISA) bus with the IBM PC in 1981. At that time, the technology was called the PC bus. The IBM XT, introduced in 1983, used the same bus (with slight exception). The 8-bit PC and XT bus was extended with the introduction of the IBM AT in 1984. This used a second connector for extending the address and data bus over the XT, but was backward compatible; 8-bit cards were still usable in the AT 16-bit slots. Industry Standard Architecture (ISA) became the designation for the IBM AT bus after other types were developed. Users of the ISA bus had to have in-depth knowledge of the hardware they were adding to properly connect the devices, since memory addresses, I/O port addresses, and DMA channels had to be configured by switches or jumpers on the card to match the settings in driver software.
IBM's MCA bus, developed for the PS/2 in 1987, was a competitor to ISA, also their design, but fell out of favor due to the ISA's industry-wide acceptance and IBM's licensing of MCA. EISA, the 32-bit extended version of ISA championed by Compaq, was used on some PC motherboards until 1997, when Microsoft declared it a "legacy" subsystem in the PC 97 industry white-paper. Proprietary local buses (q.v. Compaq) and then the VESA Local Bus Standard, were late 1980s expansion buses that were tied but not exclusive to the 80386 and 80486 CPU bus. The PC/104 bus is an embedded bus that copies the ISA bus.
Intel launched their PCI bus chipsets along with the P5-based Pentium CPUs in 1993. The PCI bus was introduced in 1991 as a replacement for ISA. The standard (now at version 3.0) is found on PC motherboards to this day. The PCI standard supports bus bridging: as many as ten daisy chained PCI buses have been tested. Cardbus, using the PCMCIA connector, is a PCI format that attaches peripherals to the Host PCI Bus via PCI to PCI Bridge. Cardbus is being supplanted by ExpressCard format.
Intel introduced the AGP bus in 1997 as a dedicated video acceleration solution. AGP devices are logically attached to the PCI bus over a PCI-to-PCI bridge. Though termed a bus, AGP usually supports only a single card at a time (Legacy BIOS support issues). From 2005 PCI Express has been replacing both PCI and AGP. This standard, approved in 2004, implements the logical PCI protocol over a serial communication interface. PC/104(-Plus) or Mini PCI are often added for expansion on small form factor boards such as Mini-ITX.
For their 1000 EX and 1000 HX models, Tandy Computer designed the PLUS expansion interface, an adaptation of the XT-bus supporting cards of a smaller form factor. Because it is electrically compatible with the XT bus (a.k.a. 8-bit ISA or XT-ISA), a passive adapter can be made to connect XT cards to a PLUS expansion connector. Another feature of PLUS cards is that they are stackable. Another bus that offered stackable expansion modules was the "sidecar" bus used by the IBM PCjr. This may have been electrically comparable to the XT bus; it most certainly had some similarities since both essentially exposed the 8088 CPU's address and data buses, with some buffering and latching, the addition of interrupts and DMA provided by Intel add-on chips, and a few system fault detection lines (Power Good, Memory Check, I/O Channel Check). Again, PCjr sidecars are not technically expansion cards, but expansion modules, with the only difference being that the sidecar is an expansion card enclosed in a plastic box (with holes exposing the connectors).
Other families
Most other computer lines, including those from Apple Inc. such as the (Apple II and Macintosh), Tandy, Commodore, Amiga, and Atari, offered their own expansion buses. The Amiga used Zorro II. Apple used a proprietary system with seven 50-pin-slots for Apple II peripheral cards, then later used both variations on Processor_Direct_Slot and NuBus for its Macintosh series until 1995, when they switched to a PCI Bus.
Generally speaking, most PCI expansion cards will function on any CPU platform which incorporates PCI bus hardware provided there is a software driver for that type. PCI video cards and any other cards that contain their own BIOS or other ROM are problematic, although video cards conforming to VESA Standards may be used for secondary monitors. DEC Alpha, IBM PowerPC, and NEC MIPS workstations used PCI bus connectors. Both Zorro II and NuBus were plug and play, requiring no hardware configuration by the user.
Even many video game consoles, such as the Nintendo_Entertainment_System and Sega Genesis, included expansion buses in some form; In at least the case of the Genesis, the expansion bus was proprietary. In fact the cartridge slots of many cartridge-based consoles (not including the Atari 2600) would qualify as expansion buses, as they exposed both read and write capabilities of the system's internal bus. However, the expansion modules attached to these interfaces, though functionally the same as expansion cards, are not technically expansion cards, due to their physical form.
Other computer buses were used for industrial control, instruments, and scientific systems. One specific example is HP-IB (or Hewlett Packard Interface Bus) which was ultimately standardized as IEEE-488 (aka GPIB). Some well-known historical standards include VMEbus, STD Bus, SBus (specific to Sun's SPARCStations), and numerous others.
External expansion buses
Laptops are generally unable to accept most expansion cards intended for desktop computers. Consequently, several compact expansion standards were developed.
The original PC Card expansion card standard is essentially a compact version of the ISA bus. The CardBus expansion card standard is an evolution of the PC card standard to make it into a compact version of the PCI bus. The original ExpressCard standard acts like it is either a USB 2.0 peripheral or a PCI Express 1.x x1 device. ExpressCard 2.0 adds SuperSpeed USB as another type of interface the card can use. Unfortunately, CardBus and ExpressCard are vulnerable to DMA attack unless the laptop has an IOMMU that is configured to thwart these attacks.
One notable exception to the above is the inclusion of a single internal slot for a special reduced size version of the desktop standard. The most well known examples are Peripheral_Component_Interconnect#Mini_PCI or https://en.wikipedia.org/wiki/PCI_Express#MINI-CARD. Such slots were usually intended for a specific purpose such as offering "built-in" wireless networking or upgrading the system at production with a discrete GPU.
Applications
The primary purpose of an expansion card is to provide or expand on features not offered by the motherboard. For example, the original IBM PC did not have on-board graphics or hard drive capability. In that case, a graphics card and an ST-506 hard disk controller card provided graphics capability and hard drive interface respectively. Some single-board computers made no provision for expansion cards, and may only have provided IC sockets on the board for limited changes or customization. Since reliable multi-pin connectors are relatively costly, some mass-market systems such as home computers had no expansion slots and instead used a card-edge connector at the edge of the main board, putting the costly matching socket into the cost of the peripheral device.
In the case of expansion of on-board capability, a motherboard may provide a single serial RS232 port or Ethernet port. An expansion card can be installed to offer multiple RS232 ports or multiple and higher bandwidth Ethernet ports. In this case, the motherboard provides basic functionality but the expansion card offers additional or enhanced ports.
Physical construction
One edge of the expansion card holds the contacts (the edge connector or pin header) that fit into the slot. They establish the electrical contact between the electronics on the card and on the motherboard. Peripheral expansion cards generally have connectors for external cables. In the PC-compatible personal computer, these connectors were located in the support bracket at the back of the cabinet. Industrial backplane systems had connectors mounted on the top edge of the card, opposite to the backplane pins.
Depending on the form factor of the motherboard and case, around one to seven expansion cards can be added to a computer system. 19 or more expansion cards can be installed in backplane systems. When many expansion cards are added to a system, total power consumption and heat dissipation become limiting factors. Some expansion cards take up more than one slot space. For example, many graphics cards on the market as of 2010 are dual slot graphics cards, using the second slot as a place to put an active heat sink with a fan.
Some cards are "low-profile" cards, meaning that they are shorter than standard cards and will fit in a lower height computer chassis. (There is a "low profile PCI card" standard that specifies a much smaller bracket and board area). The group of expansion cards that are used for external connectivity, such as network, SAN or modem cards, are commonly referred to as input/output cards (or I/O cards).
Daughterboard
A daughterboard, daughtercard, mezzanine board or piggyback board is an expansion card that attaches to a system directly. Daughterboards often have plugs, sockets, pins or other attachments for other boards. Daughterboards often have only internal connections within a computer or other electronic devices, and usually access the motherboard directly rather than through a computer bus. Such boards are used to either improve various memory capacities of a computer, enable the computer to connect to certain kinds of networks that it previous could not connect to, or to allow for users to customize their computers for various purposes such as gaming.
Daughterboards are sometimes used in computers in order to allow for expansion cards to fit parallel to the motherboard, usually to maintain a small form factor. This form are also called riser cards, or risers. Daughterboards are also sometimes used to expand the basic functionality of an electronic device, such as when a certain model has features added to it and is released as a new or separate model. Rather than redesigning the first model completely, a daughterboard may be added to a special connector on the main board. These usually fit on top of and parallel to the board, separated by spacers or standoffs, and are sometimes called mezzanine cards due to being stacked like the mezzanine of a theatre. Wavetable cards (sample-based synthesis cards) are often mounted on sound cards in this manner.
Some mezzanine card interface standards include
the 400 pin FPGA Mezzanine Card (FMC);
the 172 pin High Speed Mezzanine Card (HSMC);
the PCI Mezzanine Card (PMC);
XMC mezzanines;
the Advanced Mezzanine Card;
IndustryPacks (VITA 4), the GreenSpring Computers Mezzanine modules;
etc.
Examples of daughterboard-style expansion cards include:
Enhanced Graphics Adapter piggyback board, adds memory beyond 64 KB, up to 256 KB
Expanded memory piggyback board, adds additional memory to some EMS and EEMS boards
ADD daughterboard
RAID daughterboard
Network interface controller (NIC) daughterboard
CPU Socket daughterboard
Bluetooth daughterboard
Modem daughterboard
AD/DA/DIO daughter-card
Communication daughterboard (CDC)
Server Management daughterboard (SMDC)
Serial ATA connector daughterboard
Robotic daughterboard
Access control List daughterboard
Arduino "shield" daughterboards
Beaglebone "cape" daughterboard
Raspberry Pi "HAT add-on board"
Network Daughterboard (NDB). Commonly integrates: bus interfaces logic, LLC, PHY and Magnetics onto a single board.
Standards
PCI Extended (PCI-X)
PCI Express (PCIe)
Mini PCIe
M.2
Accelerated Graphics Port (AGP)
Conventional PCI (PCI)
Industry Standard Architecture (ISA)
Micro Channel architecture (MCA)
VESA Local Bus (VLB)
CardBus/PC card/PCMCIA (for notebook computers)
ExpressCard (for notebook computers)
Audio/modem riser (AMR)
Communications and networking riser (CNR)
CompactFlash (for handheld computers and high speed cameras and camcorders)
SBus (1990s SPARC-based Sun computers)
Zorro (Commodore Amiga)
NuBus (Apple Macintosh)
See also
Compatibility card
Host adapter
i-RAM
M-Module, an industrial mezzanine standard for modular I/O
Network card
Physics card
POST card
Riser card
Sound card
TV tuner card
Video card
References
External links
Computer expansion slots listing and pinouts
Computer buses
Printed circuit board manufacturing |
1238415 | https://en.wikipedia.org/wiki/Z22%20%28computer%29 | Z22 (computer) | The Z22 was the seventh computer model Konrad Zuse developed (the first six being the Z1, Z2, Z3, Z4, Z5 and Z11, respectively). One of the early commercial computers, the Z22's design was finished about 1955. The major version jump from Z11 to Z22 was due to the use of vacuum tubes, as opposed to the electromechanical systems used in earlier models. The first machines built were shipped to Berlin and Aachen.
By the end of 1958 the ZMMD-group had built a working ALGOL 58 compiler for the Z22 computer. ZMMD was an abbreviation for Zürich (where Rutishauser worked), München (workplace of Bauer and Samelson), Mainz (location of the Z22 computer), Darmstadt (workplace of Bottenbruch).
In 1961, the Z22 was followed by a logically very similar transistorized version, the Z23. Already in 1954, Zuse had come to an agreement with Heinz Zemanek that his Zuse KG would finance the work of Rudolf Bodo, who helped Zemanek build the early European transistorized computer Mailüfterl, and that after that project Bodo should work for the Zuse KG—there he helped build the transistorized Z23. Furthermore, all circuit diagrams of the Z22 were supplied to Bodo and Zemanek.
The University of Applied Sciences, Karlsruhe still has an operational Z22 which is on permanent loan at the ZKM in Karlsruhe.
Altogether 55 Z22 computers were produced.
In the 1970s, clones of the Z22 using TTL were built by the company Thiemicke Computer.
Technical data
The typical setup of a Z22 was:
14 words of 38-bit as fast access RAM implemented as core memory
8192 word (38-bit each) magnetic drum memory as RAM
One teletype as console and main input/output device
Additional punch tape devices as fast input/output devices
600 tubes working as flip-flops
electrical cooling unit, needing a water tap connection (water cooling, so to say)
380V 16A three-phase power supply
The Z22 operated at 3kHz operating frequency, which was synchronous with the speed of the drum storage. The input of data and programs was possible via punch-tape reader and console commands. The Z22 also had glow-lamps which showed the memory state and machine state as output.
Programming
The Z22 was designed to be easier to program than previous first generation computers. It was programmed in machine code with 38-bit instruction words, consisting of five fields:
2 bits `10` to mark an instruction
18-bit instruction field, thereof:
5 bits condition symbols
13 bits operation symbols
5-bit fast storage (core) address
13-bit (drum) memory address
Unlike today's processor opcodes, the 18-bit instruction field did not contain a single opcode but each bit did control one functional unit of the CPU. Instructions were constructed from these. For example, the bit 'A' meaning to add the content of a memory location to the accumulator could be combined with `N` Nullstellen (zeroing) to turn the Add instruction into a Load. Many combinations are quite unusual by modern standards, like 'LLRA 4' equals to multiply the accumulator by three.
There also was an assembly-like programming language called "Freiburger Code". It was designed to make writing programs for solving mathematical problems easier than writing machine code, and reportedly did so.
See also
List of vacuum-tube computers
References
External links
Z22 computer emulator
Homepage of the Z22/13 of the university of Karlsruhe (in German), Google translation
1950s computers
Vacuum tube computers
Computer-related introductions in 1955
Konrad Zuse
Computers designed in Germany
Serial computers |
17548151 | https://en.wikipedia.org/wiki/Comparison%20of%20real-time%20operating%20systems | Comparison of real-time operating systems | This is a list of real-time operating systems (RTOSs). This is an operating system in which the time taken to process an input stimulus is less than the time lapsed until the next input stimulus of the same type.
References
External links
Embedded operating systems
Real-time operating systems |
5422780 | https://en.wikipedia.org/wiki/Ski%20jumping%20at%20the%201928%20Winter%20Olympics | Ski jumping at the 1928 Winter Olympics | The men's ski jumping at the 1928 Winter Olympics took place at the Olympiaschanze in St. Moritz, Switzerland, on 18 February. Thirty-eight competitors from thirteen nations competed, with the event being won by Norway's Alf Andersen ahead of countryman Sigmund Ruud and Czechoslovakia's Rudolf Burkert.
Norway sent a strong contingent with four jumpers able to win the event, including reigning Olympic and world champion Jacob Tullin Thams. Andersen had won all eight Norwegian qualification events. World record holder Nels Nelsen from Canada was not permitted to participate due to financial problems. Japan participated in an international ski jumping competition for the first time, also becoming the first Asian country to do so. After the first jump, three Norwegians were in the lead. A 40-minute discussion erupted regarding the speed, with Central European jumpers wanting it increased. This was complied with by the jury, resulting in falls by several favorites, including the most vocal speed increase proponents, Gérard Vuilleumier and Bruno Trojani. Andersen and Ruud won by reducing their speed on the in-run.
Venue
The event took place at Olympiaschanze, located in the neighborhood of St. Moritz Bad. The town's first ski jumping hill, Julierschanze, opened in 1895. However, it was not large enough for the Olympic tournaments, forcing the town to build a larger venue. Construction started in 1926 and the venue in inaugurated on 20 January 1927. Olympiaschanze had a size of and a crowd of 8,000 people attended the event. The venue had also hosted the Nordic combined event and would later be used for the 1948 Winter Olympics.
Background
Norway sent a strong delegation with four participants able to win the event. Jacob Tullin Thams had won the 1924 Winter Olympics event and has also won the 1926 World Championships, making him reigning Olympic and world champion. The rest of the delegation consisted Alf Andersen, Sigmund Ruud—the oldest of the Ruud brothers—and Hans Kleppen. Andersen had won all eight Norwegian qualifications for the Olympics. Other favorites were Rudolf Burkert, who had won and the ski jumping part of the Nordic combined event, and the host nation's Gérard Vuilleumier. Asia participated for the first time in an international tournament, represented by Japan's Motohiko Ban.
Canada had originally planned to send two ski jumpers, Nels Nelsen and Melbourne McKenzie. Nelsen held world record for the longest ski jump. However, lack of funding meant that they planned for work for their fare on a freighter. These plans were stopped by officials from the British delegation, who organized the Canadian team and who felt working for their fare was inappropriate and not fitting for the team, and Nelsen never competed in any Winter Olympics.
Race
The jury consisted of Østgaard of Norway, Jilek of Czechoslovakia and Straumann of Switzerland. Because of ice on the in-run, a reduced speed was used during the first round. Andersen jumped 60.0 meters, by far the longest jump. Lengthwise, Ruud and Vuilleumier were in joint second place with 57.5 meters, while Burket was in fourth with 57.0 meters. Thams, Kleppen and Poland's Bronisław Czech all jumped 56.5 meters, but both Kleppen and Czech fell. In terms of points, the three Norwegians Andersen, Ruud and Thams were in the lead, ahead of Burket and Vuilleumier.
In the break, a number of Central Europeans, including Vuilleumier and Bruno Trojani, asked for top speed. This was protested by the Scandinavian and United States jumpers, and a 40-minute discussion broke out. At one point, one of the facilitators at the in-run received a telephone call confirming top speed. The facilitator was skeptical, and chose to call back to the judges, who could confirm that they had not given such a go-ahead. In the end, the judges chose to allow higher speeds, with a compromise of 5.0 meters more distance. However, the facilitator only moved the rope 4.5 meters. This made the Swiss furious, and they used their knives to cut the rope. They then accused the participants who were opposed to full speed of being cowards.
Andersen and Ruud skied down the in-run in a standing position to reduce their speed, and had the two longest standing jumps.
The event is regarded as the international break-through for Ruud. Thams gave full speed and landed at 73.0 meters, but fell and ended on a 28th place. Had he stood, it would have been a new world record. The wounds were serious enough that he had to be taken to hospital. Afterwards he stated: "I at least showed those guys that we are not cowards". Also Vuillemiuer and Trojani became subject to the higher speeds, both falling and ending with a 30th and 32nd place, respectively. Ban had the shortest jump in both rounds, fell in the first round, and ended last.
Results
The following is a list of all participants, noting their rank, country, the length in the first and second round, and the judge score for each of the three judges, as well as the final score. (F) denotes a fall.
Participating nations
A total of 38 ski jumpers from 13 nations competed in the event:
References
Bibliography
1928 Winter Olympics events
1928
1928 in ski jumping
Ski jumping competitions in Switzerland |
29117754 | https://en.wikipedia.org/wiki/Chntpw | Chntpw | chntpw is a software utility for resetting or blanking local passwords used by Windows NT, 2000, XP, Vista, 7, 8, 8.1 and 10. It does this by editing the SAM database where Windows stores password hashes.
Features
There are two ways to use the program: via the standalone chntpw utility installed as a package available in most modern Linux distributions (e.g. Ubuntu) or via a bootable CD/USB image. There also was a floppy release, but its support has been dropped.
Limitations
chntpw has no support for fully encrypted NTFS partitions (the only possible exceptions to this are encrypted partitions readable by Linux such as e.g. LUKS), usernames containing Unicode characters, or Active Directory passwords (with the exception of local users of systems that are members of an AD domain). The password changing feature also isn't fully functional either, so password blanking is highly recommended (in fact, for later versions of Windows that's the only possible option). Furthermore, the bootable image might have problems with controllers requiring 3rd party drivers. In such cases use of the stand-alone program in a full-featured Linux environment is recommended.
Where it is used
The chntpw utility is included in many various Linux distributions, including ones focused on security:
Kali – security-focused Linux distribution
SystemRescueCD – recovery-focused Linux distribution
Fedora – general distribution
Ubuntu - linux distribution published by Canonical
(along with many others not listed here)
License change
For the software's 10th anniversary, the author changed the license from a non-commercial one to the GNU General Public License (GPL) Version 2.
References
External links
Free security software
Operating system distributions bootable from read-only media |
8216 | https://en.wikipedia.org/wiki/Dorians | Dorians | The Dorians (; , Dōrieîs, singular , Dōrieús) were one of the four major ethnic groups into which the Hellenes (or Greeks) of Classical Greece divided themselves (along with the Aeolians, Achaeans, and Ionians). They are almost always referred to as just "the Dorians", as they are called in the earliest literary mention of them in the Odyssey, where they already can be found inhabiting the island of Crete.
They were diverse in way of life and social organization, varying from the populous trade center of the city of Corinth, known for its ornate style in art and architecture, to the isolationist, military state of Sparta. And yet, all Hellenes knew which localities were Dorian, and which were not. Dorian states at war could more likely, but not always, count on the assistance of other Dorian states. Dorians were distinguished by the Doric Greek dialect and by characteristic social and historical traditions.
In the 5th century BC, Dorians and Ionians were the two most politically important Greek ethnē, whose ultimate clash resulted in the Peloponnesian War. The degree to which fifth-century Hellenes self-identified as "Ionian" or "Dorian" has itself been disputed. At one extreme Édouard Will concludes that there was no true ethnic component in fifth-century Greek culture, in spite of anti-Dorian elements in Athenian propaganda. At the other extreme John Alty reinterprets the sources to conclude that ethnicity did motivate fifth-century actions. Moderns viewing these ethnic identifications through the 5th and 4th century BC literary tradition have been profoundly influenced by their own social politics. Also, according to E.N. Tigerstedt, nineteenth-century European admirers of virtues they considered "Dorian" identified themselves as "Laconophile" and found responsive parallels in the culture of their day as well; their biases contribute to the traditional modern interpretation of "Dorians".
Origin
Accounts vary as to the Dorians' place of origin. One theory, widely believed in ancient times, is that they originated in the mountainous regions of northern Greece, such as Macedonia and Epirus, and obscure circumstances brought them south into the Peloponnese, to certain Aegean islands, Magna Graecia, Lapithos and Crete. Mythology gave them a Greek origin and eponymous founder, Dorus son of Hellen, the mythological patriarch of the Hellenes.
Peloponnesian dialect replacement
The origin of the Dorians is a multifaceted concept. In modern scholarship, the term has often meant the location of the population disseminating the Doric Greek dialect within a hypothetical Proto-Greek speaking population. The dialect is known from records of classical northwestern Greece, the Peloponnesus and Crete and some of the islands. The geographic and ethnic information found in the west's earliest known literary work, the Iliad, combined with the administrative records of the former Mycenaean states, prove to universal satisfaction that East Greek speakers were once dominant in the Peloponnesus but suffered a setback there and were replaced at least in official circles by West Greek speakers. An historical event is associated with the overthrow, called anciently the Return of the Heracleidai and by moderns the Dorian Invasion.
This theory of a return or invasion presupposes that West Greek speakers resided in northwest Greece but overran the Peloponnesus replacing the East Greek there with their own dialect. No records other than Mycenaean ones are known to have existed in the Bronze Age so a West Greek of that time and place can be neither proved nor disproved. West Greek speakers were in western Greece in classical times. Unlike the East Greeks, they are not associated with any evidence of displacement events. That provides circumstantial evidence that the Doric dialect disseminated among the Hellenes of northwest Greece, a highly-mountainous and somewhat-isolated region.
Dorian invasion
The Dorian invasion is a modern historical concept attempting to account for:
at least the replacement of dialects and traditions in southern Greece in pre-classical times
more generally, the distribution of the Dorians in Classical Greece
the presence of the Dorians in Greece at all
On the whole, none of the objectives has been met, but the investigations served to rule out various speculative hypotheses. Most scholars doubt that the Dorian invasion was the main cause of the collapse of the Mycenaean civilization. The source of the West Greek speakers in the Peloponnese remains unattested by any solid evidence.
Post-migrational distribution of the Dorians
Though most of the Doric invaders settled in the Peloponnese, they also settled on Rhodes and Sicily and in what is now Southern Italy. In Asia Minor existed the Dorian Hexapolis (the six great Dorian cities): Halikarnassos (Halicarnassus) and Knidos (Cnidus) in Asia Minor, Kos, and Lindos, Kameiros, and Ialyssos on the island of Rhodes. The six cities would later become rivals with the Ionian cities of Asia Minor. The Dorians also invaded Crete. The origin traditions remained strong into classical times: Thucydides saw the Peloponnesian War in part as "Ionians fighting against Dorians" and reported the tradition that the Syracusans in Sicily were of Dorian descent. Other such "Dorian" colonies, originally from Corinth, Megara, and the Dorian islands, dotted the southern coasts of Sicily from Syracuse to Selinus. Also Taras was a Spartan colony.
Identity
Ethnonym
Dorian of Bronze Age Pylos
A man's name, Dōrieus, occurs in the Linear B tablets at Pylos, one of the regions later invaded and subjugated by the Dorians. Pylos tablet Fn867 records it in the dative case as do-ri-je-we, *Dōriēwei, a third- or consonant-declension noun with stem ending in w. An unattested nominative plural, *Dōriēwes, would have become Dōrieis by loss of the w and contraction. The tablet records the grain rations issued to the servants of "religious dignitaries" celebrating a religious festival of Potnia, the mother goddess.
The nominative singular, Dōrieus, remained the same in the classical period. Many Linear B names of servants were formed from their home territory or the places where they came into Mycenaean ownership. Carl Darling Buck sees the -eus suffix as very productive. One of its uses was to convert a toponym to an anthroponym; for example, Megareus, "Megarian", from Megara.
A Dōrieus would be from Dōris, the only classical Greek state to serve as the basis for the name of the Dorians. The state was a small one in the mountains of west central Greece. However, classical Doris may not have been the same as Mycenaean Doris.
Dorians of upland Doris
A number of credible etymologies by noted scholars have been proposed. Julius Pokorny derives Δωριεύς, Dōrieus from δωρίς, dōris, "woodland" (which can also mean upland). The dōri- segment is from the o-grade (either ō or o) of Proto-Indo-European *deru-, "tree", which also gives the Homeric Δούρειος Ἵππος (Doureios Hippos, "Wooden Horse"). This derivation has the advantage of naming the people after their wooded, mountainous country.
Lancers
A second popular derivation was given by the French linguist, Émile Boisacq, from the same root, but from Greek (doru) 'spear-shaft' (which was made of wood); i.e., "the people of the spear" or "spearmen." In this case the country would be named after the people, as in Saxony from the Saxons. However, R. S. P. Beekes doubted the validity of this derivation and asserted that no good etymology exists.
Chosen Greeks
It sometimes happens that different derivations of an Indo-European word exploit similar-sounding Indo-European roots. Greek doru, "lance," is from the o-grade of Indo-European *deru, "solid," in the sense of wood. It is similar to an extended form, *dō-ro-, of *dō-, (give), as can be seen in the modern Greek imperative δώσε (dose, "give [sing.]!") appearing in Greek as δῶρον (dōron, "gift"). This is the path taken by Jonathan Hall, relying on elements taken from the myth of the Return of the Herakleidai.
Hall cites the tradition, based on a fragment of the poet, Tyrtaeus, that "Sparta is a divine gift granted by Zeus and Hera" to the Heracleidae. In another version, Tyndareus gives his kingdom to Heracles in gratitude for restoring him to the throne, but Heracles "asks the Spartan king to safeguard the gift until his descendants might claim it."
Hall, therefore, proposes that the Dorians are the people of the gift. They assumed the name on taking possession of Lacedaemon. Doris was subsequently named after them. Hall makes comparisons of Spartans to Hebrews as a chosen people maintaining a covenant with God and being assigned a Holy Land. To arrive at this conclusion, Hall relies on Herodotus' version of the myth (see below) that the Hellenes under Dorus did not take his name until reaching the Peloponnesus. In other versions the Heracleidae enlisted the help of their Dorian neighbors. Hall does not address the problem of the Dorians not calling Lacedaemon Doris, but assigning that name to some less holy and remoter land. Similarly, he does not mention the Dorian servant at Pylos, whose sacred gift, if such it was, was still being ruled by the Achaean Atreid family at Lacedaemon.
A minor, and perhaps regrettably forgotten, episode in the history of scholarship was the attempt to emphasize the etymology of Doron with the meaning of 'hand'. This in turn was connected to an interpretation of the famous lambda on Spartan shields, which was to rather stand for a hand with outstanding thumb than the initial letter of Lacedaimon. Given the origin of the Spartan shield lambda legend, however, in a fragment by Eupolis, an Athenian comic poet, there has been a recent attempt to suggest that a comic confusion between the letter and the hand image may yet have been intended.
Social structure
Dorian social structure was characterized by a communal social structure and separation of the sexes. The lives of free men centered around military campaigns. When not abroad, men stayed in all-male residences focusing on military training until the age of 30, regardless of marital status.
Dorian women had greater freedom and economic power than women of other Greek ethnicities. Unlike other Hellenic women, Dorian women were able to own property, manage their husbands' estate, and delegate many domestic tasks to slaves. Women in ancient Sparta possessed the greatest agency and economic power, likely due to the prolonged absences of men during military campaigns. Dorian women wore the peplos, which was once common to all Hellenes. This tunic was pinned at the shoulders by brooches and had slit skirts which bared the thighs and permitted more freedom of movement than the voluminous Ionian chiton (costume).
Distinctions of language
The Doric dialect was spoken in northwest Greece, the Peloponnese, Crete, southwest Asia Minor, the southernmost islands of the Aegean Sea, and the various Dorian colonies of Magna Graecia in Southern Italy and Sicily. After the classical period, it was mainly replaced by the Attic dialect upon which the Koine or "common" Greek language of the Hellenistic period was based. The main characteristic of Doric was the preservation of Proto-Indo-European , long , which in Attic-Ionic became , . A famous example is the valedictory phrase uttered by Spartan mothers to their sons before sending them off to war: ἢ τὰν ἢ ἐπὶ τᾶς (ḕ tàn ḕ epì tâs, literally "either with it or on it": return alive with your shield
or dead upon it) would have been ἢ τὴν ἢ ἐπὶ τῆς (ḕ tḕn ḕ epì tês) in the Attic-Ionic dialect of an Athenian mother. Tsakonian, a descendant of Doric Greek, is still spoken in some parts of the southern Argolid coast of the Peloponnese, in the modern prefecture of Arcadia.
Other cultural distinctions
Culturally, in addition to their Doric dialect of Greek, Doric colonies retained their characteristic Doric calendar that revolved round a cycle of festivals, the Hyacinthia and the Carneia being especially important.
The Dorian mode in music also was attributed to Doric societies and was associated by classical writers with martial qualities.
The Doric order of architecture in the tradition inherited by Vitruvius included the Doric column, noted for its simplicity and strength.
The Dorians seem to have offered the central mainland cultus for Helios. The scattering of cults of the sun god in Sicyon, Argos, Ermioni, Epidaurus and Laconia, and his holy livestock flocks at Taenarum, seem to suggest that the deity was considerably important in Dorian religion, compared to other parts of ancient Greece. Additionally, it may have been the Dorians to import his worship to Rhodes.
Ancient traditions
In Greek historiography, the Dorians are mentioned by many authors. The chief classical authors to relate their origins are Herodotus, Thucydides and Pausanias. The most copious authors, however, lived in Hellenistic and Roman times, long after the main events. This apparent paradox does not necessarily discredit the later writers, who were relying on earlier works that did not survive. The customs of the Spartan state and its illustrious individuals are detailed at great length in such authors as Plutarch and Diodorus Siculus.
Homer
The Odyssey has one reference to the Dorians:There is a land called Crete, in the midst of the wine-dark sea, a fair, rich land, begirt with water, and therein are many men, past counting, and ninety cities. They have not all the same speech, but their tongues are mixed. There dwell Achaeans, there great-hearted native Cretans, there Cydonians, and Dorians of waving plumes, and goodly Pelasgians.
The reference is not compatible with a Dorian invasion that brought Dorians to Crete only after the fall of the Mycenaean states. In the Odyssey, Odysseus and his relatives visit those states. Two solutions are possible, either the Odyssey is anachronistic or Dorians were on Crete in Mycenaean times. The uncertain nature of the Dorian invasion defers a definitive answer until more is known about it. Also, the Messenian town of Dorium is mentioned in the Catalogue of Ships. If its name comes from Dorians, it would imply there were settlements of the latter in Messenia during that time as well.
Tyrtaeus
Tyrtaeus, a Spartan poet, became advisor of the Lacedaemonians in their mid-7th-century war to suppress a rebellion of the Messenians. The latter were a remnant of the Achaeans conquered "two generations before," which suggests a rise to supremacy at the end of the Dark Age rather than during and after the fall of Mycenae. The Messenian population was reduced to serfdom.
Only a few fragments of Tyrtaeus' five books of martial verse survive. His is the earliest mention of the three Dorian tribes: Pamphyli, Hylleis, Dymanes. He also says: For Cronus' Son Himself, Zeus the husband of fair-crowned Hera, hath given this city to the children of Heracles, with whom we came into the wide isle of Pelops from windy Erineus.
Erineus was a village of Doris. He helped to establish the Spartan constitution, giving the kings and elders, among other powers, the power to dismiss the assembly. He established a rigorous military training program for the young including songs and poems he wrote himself, such as the "Embateria or Songs of the Battle-Charge which are also called Enoplia or Songs-under-Arms." These were chants used to establish the timing of standard drills under arms. He stressed patriotism:For 'tis a fair thing for a good man to fall and die fighting in the van for his native land, ... let us fight with a will for this land, and die for our children and never spare our lives.
Herodotus
Herodotus was from Halicarnassus, a Dorian colony on the southwest coast of Asia Minor; following the literary tradition of the times he wrote in Ionic Greek, being one of the last authors to do so. He described the Persian Wars, giving a thumbnail account of the histories of the antagonists, Greeks and Persians.
Herodotus gives a general account of the events termed "the Dorian Invasion", presenting them as transfers of population. Their original home was in Thessaly, central Greece. He goes on to expand in mythological terms, giving some of the geographic details of the myth:1.56.2-3 And inquiring he found that the Lacedemonians and the Athenians had the pre-eminence, the first of the Dorian and the others of the Ionian race. For these were the most eminent races in ancient time, the second being a Pelasgian and the first a Hellenic race: and the one never migrated from its place in any direction, while the other was very exceedingly given to wanderings; for in the reign of Deucalion this race dwelt in Pthiotis, and in the time of Doros the son of Hellen in the land lying below Ossa and Olympos, which is called Histiaiotis; and when it was driven from Histiaiotis by the sons of Cadmos, it dwelt in Pindos and was called Makednian; and thence it moved afterwards to Dryopis, and from Dryopis it came finally to Peloponnesus, and began to be called Dorian.
1.57.1-3 What language however the Pelasgians used to speak I am not able with certainty to say. But if one must pronounce judging by those that still remain of the Pelasgians who dwelt in the city of Creston above the Tyrsenians, and who were once neighbours of the race now called Dorian, dwelling then in the land which is now called Thessaliotis, and also by those that remain of the Pelasgians who settled at Plakia and Skylake in the region of the Hellespont, who before that had been settlers with the Athenians, and of the natives of the various other towns which are really Pelasgian, though they have lost the name,—if one must pronounce judging by these, the Pelasgians used to speak a Barbarian language. If therefore all the Pelasgian race was such as these, then the Attic race, being Pelasgian, at the same time when it changed and became Hellenic, unlearnt also its language. For the people of Creston do not speak the same language with any of those who dwell about them, nor yet do the people of Phakia, but they speak the same language one as the other: and by this it is proved that they still keep unchanged the form of language which they brought with them when they migrated to these places.
1.58 As for the Hellenic race, it has used ever the same language, as I clearly perceive, since it first took its rise; but since the time when it parted off feeble at first from the Pelasgian race, setting forth from a small beginning it has increased to that great number of races which we see, and chiefly because many Barbarian races have been added to it besides. Moreover it is true, as I think, of the Pelasgian race also, that so far as it remained Barbarian it never made any great increase.
Thus, according to Herodotus, the Dorians did not name themselves after Dorus until they had reached Peloponnesus. Herodotus does not explain the contradictions of the myth; for example, how Doris, located outside the Peloponnesus, acquired its name. However, his goal, as he relates in the beginning of the first book, is only to report what he had heard from his sources without judgement. In the myth, the Achaeans displaced from the Peloponnesus gathered at Athens under a leader Ion and became identified as "Ionians".
Herodotus' list of Dorian states is as follows. From northeastern Greece were Phthia, Histiaea and Macedon. In central Greece were Doris (the former Dryopia) and in the south Peloponnesus, specifically the states of Lacedaemon, Corinth, Sicyon, Epidaurus and Troezen. Hermione was not Dorian but had joined the Dorians. Overseas were the islands of Rhodes, Cos, Nisyrus and the Anatolian cities of Cnidus, Halicarnassus, Phaselis and Calydna. Dorians also colonised Crete including founding of such towns as Lato, Dreros and Olous. The Cynurians were originally Ionians but had become Dorian under the influence of their Argive masters.
Thucydides
Thucydides professes little of Greece before the Trojan War except to say that it was full of barbarians and that there was no distinction between barbarians and Greeks. The Hellenes came from Phthiotis. The whole country indulged in and suffered from piracy and was not settled. After the Trojan War, "Hellas was still engaged in removing and settling."
Some 60 years after the Trojan War the Boeotians were driven out of Arne by the Thessalians into Boeotia and 20 years later "the Dorians and the Heraclids became masters of the Peloponnese." So the lines were drawn between the Dorians and the Aeolians (here Boeotians) with the Ionians (former Peloponnesians).
Other than these few brief observations Thucydides names but few Dorians. He does make it clear that some Dorian states aligned or were forced to align with the Athenians while some Ionians went with the Lacedaemonians and that the motives for alignment were not always ethnic but were diverse. Among the Dorians was Lacedaemon, Corcyra, Corinth and Epidamnus, Leucadia, Ambracia, Potidaea, Rhodes, Cythera, Argos, Carystus, Syracuse, Gela, Acragas (later Agrigentum), Acrae, Casmenae.
He does explain with considerable dismay what happened to incite ethnic war after the unity between the Greek states during the Battle of Thermopylae. The Congress of Corinth, formed prior to it, "split into two sections." Athens headed one and Lacedaemon the other:For a short time the league held together, till the Lacedaemonians and Athenians quarreled, and made war upon each other with their allies, a duel into which all the Hellenes sooner or later were drawn.
He adds: "the real cause I consider to be ... the growth of the power of Athens and the alarm which this inspired in Lacedaemon...."
Plato
In the Platonic work Laws is mentioned that the Achaeans who fought in the Trojan War, on their return from Troy were driven out from their homes and cities by the young residents, so they migrated under a leader named Dorieus and hence they were renamed "Dorians".
Now during this period of ten years, while the siege lasted, the affairs of each of the besiegers at home suffered much owing to the seditious conduct of the young men. For when the soldiers returned to their own cities and homes, these young people did not receive them fittingly and justly, but in such a way that there ensued a vast number of cases of death, slaughter, and exile. So they, being again driven out, migrated by sea; and because Dorieus was the man who then banded together the exiles, they got the new name of "Dorians", instead of "Achaeans". But as to all the events that follow this, you Lacedaemonians relate them all fully in your traditions.
Pausanias
The Description of Greece by Pausanias relates that the Achaeans were driven from their lands by Dorians coming from Oeta, a mountainous region bordering on Thessaly. They were led by Hyllus, a son of Heracles, but were defeated by the Achaeans. Under other leadership they managed to be victorious over the Achaeans and remain in the Peloponnesus, a mythic theme called "the return of the Heracleidae." They had built ships at Naupactus in which to cross the Gulf of Corinth. This invasion is viewed by the tradition of Pausanias as a return of the Dorians to the Peloponnesus, apparently meaning a return of families ruling in Aetolia and northern Greece to a land in which they had once had a share. The return is described in detail: there were "disturbances" throughout the Peloponnesus except in Arcadia, and new Dorian settlers. Pausanias goes on to describe the conquest and resettlement of Laconia, Messenia, Argos and elsewhere, and the emigration from there to Crete and the coast of Asia Minor.
Diodorus Siculus
Diodorus is a rich source of traditional information concerning the mythology and history of the Dorians, especially the Library of History. He does not make any such distinction but the fantastic nature of the earliest material marks it as mythical or legendary. The myths do attempt to justify some Dorian operations, suggesting that they were in part political.
Diodorus quoting from an earlier historian Hecataeus of Abdera details that during the Exodus many Israelites went into the islands of Greece and other places.
All the foreigners were forthwith expelled, and the most valiant and noble among them, under some notable leaders, were brought to Greece and other places, as some relate; the most famous of their leaders were Danaus and Cadmus. But the majority of the people descended into a country not far from Egypt, which is now called Judaea and at that time was altogether uninhabited.
Heracles was a Perseid, a member of the ruling family of Greece. His mother Alcmene had both Perseids and Pelopids in her ancestry. A princess of the realm, she received Zeus thinking he was Amphitryon. Zeus intended his son to rule Greece but according to the rules of succession Eurystheus, born slightly earlier, preempted the right. Attempts to kill Heracles as a child failed. On adulthood he was forced into the service of Eurystheus, who commanded him to perform 12 labors.
Heracles became a warrior without a home, wandering from place to place assisting the local rulers with various problems. He took a retinue of Arcadians with him acquiring also over time a family of grown sons, the Heraclidae. He continued this mode of life even after completing the 12 labors. The legend has it that he became involved with Achaean Sparta when the family of king Tyndareus was unseated and driven into exile by Hippocoön and his family, who in the process happened to kill the son of a friend of Heracles. The latter and his retinue assaulted Sparta, taking it back from Hippocoön. He recalled Tyndareus, set him up as a guardian regent, and instructed him to turn the kingdom over to any descendants of his that should claim it. Heracles went on with the way of life to which he had become accustomed, which was by today's standards that of a mercenary, as he was being paid for his assistance. Subsequently, he founded a colony in Aetolia, then in Trachis.
After displacing the Dryopes, he went to the assistance of the Dorians, who lived in a land called Hestiaeotis under king Aegimius and were campaigning against the numerically superior Lapithae. The Dorians promised him of Doris (which they did not yet possess). He asked Aegimius to keep his share of the land "in trust" until it should be claimed by a descendant. He went on to further adventures but was poisoned by his jealous wife, Deianeira. He immolated himself in full armor dressed for combat and "passed from among men into the company of the gods."
Strabo
Strabo, who depends of course on the books available to him, goes on to elaborate:
Beside this sole reference to Dorians in Crete, the mention of the Iliad of the Heraclid Tlepolemus, a warrior on the side of Achaeans and colonist of three important Dorian cities in Rhodes has been also regarded as a later interpolation.
See also
Language
Ancient Greek dialects
Doric Greek
Mythology
Dorus, the eponymous founder
Dymas
Heracleidae
History
Dorian invasion
Greek Dark Ages
Sea Peoples
List of Dorian states
Acragas
Ambracia
Argos
Calydna
Cameiros
Cnidus
Corinth
Corcyra
Crete various cities
Cos
Cythera
Doris (Asia Minor)
Doris (Greece)
Epidaurus
Gela
Halicarnassus
Histiaea
Ialyssos
Leucadia
Lindos
Macedon
Megara
Nisyros
Phaselis
Phthia
Potidaea
Rhodes
Sparta
Sicyon
Syracuse
Troezen
Footnotes
References
Bibliography
Five editions between 1993 and 1995.
Müller, Karl Otfried, Die Dorier (1824) was translated by Henry Tufnel and Sir George Cornewall Lewis and published as The History and Antiquities of the Doric Race, (London: John Murray), 1830, in two vols.
External links
.
Ancient tribes in Greece
Ancient Greeks
Mycenaean Greece
Ancient tribes in Macedonia
Ancient tribes in Epirus
Ancient tribes in Crete
Ancient tribes in Rhodes
Ancient peoples of Anatolia
Greek tribes |
20661106 | https://en.wikipedia.org/wiki/Composers%20Desktop%20Project | Composers Desktop Project | The Composers Desktop Project (CDP) is an international cooperative network based in the United Kingdom that has been developing software for working with sound materials since 1986. Working on a cooperative basis and motivated by user-specific compositional needs, the project has focused on the development of precise, detailed and multifaceted DSP-based sound transformation tools. Currently, CDP provides sound transformation software (named after the project itself) for Windows and Mac OS X that has been evolving for over 20 years.
In 2014 the main components of the CDP were released as an open-source package licensed under the LGPL. Makefiles are now available for Windows, OSX, and Linux.
Originally, after a study to determine if it was possible and/or feasible to port CMusic from UNIX mainframe systems, the project released the CDP software along with corresponding SoundSTreamer hardware for the Atari ST and later ported the software to DOS. The software tool-set is designed specifically to transform sound samples mostly via offline processing (non-real time); the software is considered complementary to real-time processing and audio sequencers.
References
Further reading
A. Endrich (1996), Composers' Desktop Project: a musical imperative, Organised Sound, Volume 2, Issue 01, Apr 1997, pp 29–33.
R.W Dobson (1993), The Operation of the Phase Vocoder – a non-mathematical introduction to the Fast Fourier Transform (FFT), a CDP publication, Somerset.
Wishart T. (1994), Audible Design: A Plain and Easy Introduction to Sound Composition. Orpheus the Pantomime Ltd. ().
Electronic music software
Acoustics software
1986 establishments in the United Kingdom |
1042722 | https://en.wikipedia.org/wiki/Resource%20Access%20Control%20Facility | Resource Access Control Facility |
Introduction
RACF, [pronounced Rack-Eff] short for Resource Access Control Facility, is an IBM software product. It is a security system that provides access control and auditing functionality for the z/OS and z/VM operating systems. RACF was introduced in 1976. Originally called RACF it was renamed to z/OS Security Server (RACF) although most mainframe folks still refer to it as RACF.
Its main features are:
Identification and verification of a user via user id and password check (authentication)
Identification, classification and protection of system resources
Maintenance of access rights to the protected resources (authorization)
Controlling the means of access to protected resources
Logging of accesses to a protected system and protected resources (auditing)
RACF establishes security policies rather than just permission records. It can set permissions for file patterns — that is, set the permissions even for files that do not yet exist. Those permissions are then used for the file (or other object) created at a later time .
Community
There is a long established technical support community for RACF based around a LISTSERV operated out of the University of Georgia. The list is called RACF-L which is described as RACF Discussion List. The email address of the listserv is RACF-L@LISTSERV.UGA.EDU and can also be viewed via a webportal at https://listserv.uga.edu/scripts/wa-UGA.exe .
Books
The first text book published (first printing December 2007) aimed at giving security professionals an introduction to the concepts and conventions of how RACF is designed and administered was Mainframe Basics for Security Professionals: Getting Started with RACF by Ori Pomerantz (Author), Barbara Vander Weele (Author), Mark Nelson (Author), Tim Hahn (Author).
Evolution
RACF has continuously evolved to support such modern security features as digital certificates/public key infrastructure services, LDAP interfaces, and case sensitive IDs/passwords. The latter is a reluctant concession to promote interoperability with other systems, such as Unix and Linux. The underlying zSeries (now IBM Z) hardware works closely with RACF. For example, digital certificates are protected within tamper-proof cryptographic processors. Major mainframe subsystems, especially DB2 Version 8, use RACF to provide multi-level security (MLS).
Its primary competitors have been ACF2 and TopSecret, both now produced by CA Technologies.
References
External links
What is RACF?
RACF - An Overview
IBM mainframe operating systems
Operating system security
IBM mainframe technology |
46453136 | https://en.wikipedia.org/wiki/Stephanie%20Seneff | Stephanie Seneff | Stephanie Seneff (born April 20, 1948) is a senior research scientist at the Computer Science and Artificial Intelligence Laboratory (CSAIL) of the Massachusetts Institute of Technology (MIT). Working primarily in the Spoken Language Systems group, her research at CSAIL relates to human-computer interaction, and algorithms for language understanding and speech recognition. In 2011, she began publishing controversial papers in low-impact, open access journals on biology and medical topics; the articles have received "heated objections from experts in almost every field she's delved into," according to the food columnist Ari LeVaux.
Career
Seneff attended the Massachusetts Institute of Technology (MIT), earning her bachelor of science (BS) in biophysics in 1968, a master's (MS) in electrical engineering in 1980, and a doctoral degree (PhD) in computer science in 1985. She is a senior research scientist at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL). Her research career focused on using computational modeling and analysis of the human auditory system to improve communication between humans and computers. She was elected a Fellow of the International Speech and Communication Association (ISCA) in 2012 as recognition for her "contributions to conversational human-computer systems and computer-assisted language learning". Seneff collaborates with and is married to MIT professor Victor Zue.
Biology and medical topics
In 2011, Seneff began publishing articles on topics related to biology and medicine in low-impact, open access journals, such as Interdisciplinary Toxicology and eight papers in the journal Entropy between 2011 and 2015. According to food columnist Ari LeVaux, Seneff's work in this area has made her "a controversial figure in the scientific community" and she has received "heated objections from experts in most every field she's delved into". In 2013, she coauthored a paper that associated the herbicide glyphosate with a wide variety of diseases such as cancer and disorders such as autism. Discover magazine writer Keith Kloor criticized the uncritical republication of the study's results by other media outlets. Jerry Steiner, the executive vice president of sustainability at Monsanto, said in an interview regarding the study that "We are very confident in the long track record that glyphosate has. It has been very, very extensively studied." Seneff's claim that glyphosate is a major cause of autism and that, "At today's rates, by 2025, half the kids born will be diagnosed with autism," has also been criticized. For example, Pacific Standard noted that, contrary to Seneff's claims, many scientific reviews have found that the rise in autism rates over the past 20 years is due to changes in diagnostic practices, and that a number of studies, including a 2012 review in the Journal of Toxicology and Environmental Health, have found little evidence that glyphosate is associated with adverse development outcomes.
Seneff and her MIT colleagues have also published on the health impacts of fat and cholesterol consumption in America. Based on this work, Seneff claimed that Americans are suffering from a cholesterol deficiency, not an excess. In 2014–2016 Seneff was proposed as an expert witness for litigators seeking damages from Pfizer associated with their cholesterol drug Lipitor, but the court dismissed the claim largely because Seneff lacked expert status and failed to provide credible evidence linking Lipitor to any specific harm.
Response from scientists and academics
Clinical neurologist and skeptic Steven Novella criticized Seneff's Entropy publication for making "correlation is causation" assumptions using broad statistical extrapolations from limited data, saying "she has published only speculations and gives many presentations, but has not created any new data". Scientists and scholars such as Derek Lowe, a medicinal chemist, and Jeffrey Beall, a library scientist known for his criticism of predatory open access publishers, have separately criticized Seneff's paper for misrepresenting the results and conclusions of other researchers' work. Lowe and Beall also noted that Entropy and its publisher, MDPI, have a known history of publishing studies without merit.
A 2017 Review Article written by Kings College of London researchers and published by Frontiers in Public Health called Seneff's glyphosate health-risk research claims "a deductive reasoning approach based on syllogism" and "at best unsubstantiated theories, speculations or simply incorrect." Consumers Union senior scientist Michael Hansen characterized Seneff and her glyphosate claims as "nutty", "truly unhinged", and "dangerous".
References
External links
Seneff's page at MIT
MIT Computer Science and Artificial Intelligence Laboratory people
Living people
Massachusetts Institute of Technology School of Science alumni
Speech processing researchers
1948 births
People from Columbia, Missouri
American women computer scientists
American computer scientists
People in alternative medicine
MIT School of Engineering alumni
American women academics
21st-century American women |
63341771 | https://en.wikipedia.org/wiki/Skirmish%20near%20Brooklyn%2C%20Kansas | Skirmish near Brooklyn, Kansas | The skirmish near Brooklyn, Kansas was a skirmish of the American Civil War on August 21, 1863, between Quantrill's Raiders and pursuing Union forces immediately after the Lawrence massacre. James Henry Lane led a small group of survivors of the massacre in pursuit of Quantrill's men, and were joined by a force of about 200 Union Army cavalrymen, commanded by Major Preston B. Plumb. Lane's and Plumb's men fought with Quantrill's Raiders to the south of the town of Brooklyn, Kansas, which the raiders had burned. The Confederates began to panic, but a charge led by George Todd halted the Union pursuit. Quantrill's men escaped across the state line into Missouri and then scattered; a few were later caught and executed.
Background
During the American Civil War, much of the fighting in the state of Missouri was guerrilla warfare. The neighboring state of Kansas was largely abolitionist, while some of Missouri's residents supported slavery. Informal military forces from Kansas were known as Jayhawkers, and the pro-slavery Missouri guerrillas were known as bushwhackers. Both sides committed atrocities, such as murder, theft, and wanton destruction. One of the most notorious bushwhacker groups was Quantrill's Raiders, which was led by William Clarke Quantrill, who had a captain's commission in the Confederate States Army; the historian James M. McPherson described the band as containing "some of the most psychopathic killers in American history". In August 1863, Quantrill gathered 450 men and entered Kansas. They kidnapped locals, forced them to serve as guides on the way to the city of Lawrence, Kansas, and then murdered them.
Lawrence was selected as the target for the raid, as it was viewed in Missouri as a center of abolitionism and Jayhawkers. The city was also home to Jayhawker leader Jim Lane, who was hated in Missouri as a notorious Jayhawker leader. Quantrill stated that the raid was revenge for the earlier Sacking of Osceola, Missouri. The historian Albert E. Castel suggests that it was unlikely that the bushwhackers had motivations other than stealing and killing. In the ensuing Lawrence Massacre on August 21, Quantrill's men destroyed 185 buildings and killed 182 men and boys, having been told by their leader to "kill every male and burn every house".
Skirmish
Later that day, after the massacre, some of Quantrill's men detected Union soldiers approaching, and the guerrillas left the town, moving the roads towards Baldwin, until they reached the Santa Fe Trail at Brooklyn, Kansas. Brooklyn was from Lawrence. Local farmers had warned Brooklyn's residents of the approach of Quantrill, so the town was abandoned when the bushwhackers arrived. Quantrill expected Union forces to already be blocking the route he had taken into Kansas, so he decided to withdraw in a southeasterly direction towards some woods around the Marais des Cygnes River. He also ordered Brooklyn burned. All of the town's buildings were destroyed except for the saloon. Historian Katie Armitage suggests that the burning of the town was possibly fueled by adrenaline and alcohol consumption, while a research paper published with Baker University proposes that Quantrill's men may have been targeting local members of a pacifist sect who had earlier been forced out of Missouri by pro-slavery advocates.
Lane, who had survived the massacre by hiding in a cornfield, gathered about a dozen men after the bushwhackers left, and followed after Quantrill, armed with pepperbox revolvers, knives, and shotguns. Lane's force gathered more men during the pursuit, and reached Brooklyn with about 35 men. Lane's men kicked up a cloud of dust, which alerted Quantrill's guerrillas of their approach; the bushwhackers began a retreat. A force of about 200 Union Army cavalrymen under Major Preston B. Plumb who had been trying to locate Quantrill's force since before the massacre met up with Lane's force, and made contact with the bushwhackers beyond Brooklyn. Shots were fired to no effect, and Quantrill's men began to become disorderly and panic while passing down a lane through a cornfield. Guerrilla leader George M. Todd rallied 20 bushwhackers and charged the Federal cavalry, driving them back with losses on both sides. Todd was given command of the rearguard and a pattern of brief firefights ensued as Todd's men would set up a defense and hold off the Union vanguard until the main Union force would catch up. At that point the raiders would ride to reach Quantrill and repeat the pattern as they withdrew towards Paola.
Aftermath
Union forces attempted to set a trap for Quantrill in the area of Paola, but the bushwhackers fought off a small Union charge and then bypassed a planned ambush. The bushwhackers avoided a force of 150 Missouri militiamen at the Missouri/Kansas state line, and had scattered within Missouri by the end of August 22. A handful of the bushwhackers were later caught and executed. The Lawrence Massacre caused widespread outrage, and led to Union Brigadier General Thomas Ewing Jr. issuing General Order No. 11, which depopulated 10,000 civilians from parts of four counties in western Missouri.
See also
List of battles fought in Kansas
List of massacres in Kansas
References
Sources
Battles of the Trans-Mississippi Theater of the American Civil War
Battles of the American Civil War in Kansas
Raids of the American Civil War
Conflicts in 1863
August 1863 events
1863 in the American Civil War |
1927833 | https://en.wikipedia.org/wiki/Video%20lottery%20terminal | Video lottery terminal | A video lottery terminal (VLT), also sometimes known as a video gaming terminal, video slots, or the video lottery, is a type of electronic gambling machine. They are typically operated by a region's lottery, and situated at licensed establishments such as bars and restaurants.
VLTs typically feature a selection of multiple games, primarily video slot machines and Keno. Their exact operation depends on local law: many VLTs are stand-alone devices containing a random number generator. Each terminal is connected to a centralized computer system that allows the lottery jurisdiction to monitor gameplay and collect its share of revenue. The outcome of each wager on a VLT is random. VLT operators are not able to program the total amount wagered, or payouts, through the central computer system. A minimum percentage payout usually is written into that jurisdiction's law. That percentage is realized not by manipulation of the game, but by adjusting the expected overall payout.
In some jurisdictions, VLTs do not contain a random number generator, and display results from a fixed pool controlled by the central system (in similar fashion to scratch-off lottery tickets).
Canada
VLT programs are operated in nine Canadian provinces, with the only major exception being British Columbia. These machines are typically governed by the region's lottery and gaming boards, and are situated inside licensed establishments such as bars. In several provinces, VLTs were deployed primarily to help counter illegal underground video gambling operations, while several (particularly those whose economies are reliant on natural resources) cited economic development as a factor in their use.
VLTs were first popularized in Atlantic Canada, with New Brunswick becoming the first province to introduce them in 1990, and the other Atlantic provinces following suit in 1991. In New Brunswick, sites were initially limited to a maximum of five machines each, and they were later removed from locations that did not hold liquor licenses. Since 2002, the Atlantic Lottery Corporation has been fully responsible for all VLT operations in the province, rather than having their costs covered by private owner-operators. The ALC had already operated the VLT programs in Newfoundland and Labrador and Nova Scotia since their launch, while Prince Edward Island transferred its VLTs to the ALC in 2003. Quebec introduced VLTs in 1994.
VLTs also began to appear in Western Canada in 1991, with Alberta trialling them during the Calgary Stampede and Klondike Days events before beginning a province-wide program the following year. Manitoba initially deployed them at rural locations only, but expanded them to Winnipeg in 1993, and the Assiniboia Downs race track. Saskatchewan introduced VLTs in 1993, primarily to encourage business at establishments in smaller communities (which faced competition from out-of-province casinos, prior to the opening of several commercial and First Nations casinos in the province). Saskatchewan's VLT program also includes games offering regional and province-wide progressive jackpots.
To address problem gambling concerns, VLTs in Canada are typically equipped with features and restrictions as safeguards in comparison to a casino-style slot machine, including the display of a player's credits as a cash value rather than units of a denomination, on-screen display of the current time, maximum session lengths with mandatory cash-out after time expires, limits on hours of operation, no Stop button (to regulate the pace of play), wager limits, limits on the amount of cash that can be deposited during a single session, and problem gambling resources. Some VLTs may also offer integrated account systems for tracking usage and setting limits on cash spent. In 2012, Nova Scotia began to mandate that users enroll in an account card system known as My-Play in order to use VLTs. The government discontinued the scheme in 2014, citing its decision to allow players to register anonymously without personal information ("light" enrollment) as having defeated the purpose of the system—as many players only used the cards temporarily before disposing them. The government claimed it would save $200,000 a year by removing the system.
Each province has imposed caps on the number of VLTs that may operate in their province, and Nova Scotia has enforced a moratorium on new VLT sites and attrition on existing sites outside of First Nations reservations (taking VLTs out of service permanently if a site closes or removes them). In the 2000s, Alberta reallocated some of its VLTs to increase the number allowed at specific sites, in effect reducing the total number of sites in operation. Some provinces also have regulations that allow individual municipalities to hold referendums to opt out of VLT operation in their communities. In January 2017, Quebec announced that it would similarly re-allocate and cut its VLTs from 12,000 to under 10,000 over the next two years, including making the number of sites and machines present in a region proportional to population, and focus more on placing them in leisure venues such as billiard halls and bowling alleys to "promote socialization and group entertainment".
Ontario, a long hold-out, introduced a form of VLTs in the mid-2010's, with the Ontario Lottery and Gaming Corporation branding them as "Tap 'N Play" machines (formerly "TapTix"). Unlike the VLTs in other Canadian jurisdictions, they are deployed at charitable gaming centres, and based on the outcomes of a bingo or pull-tab game while using slots as an entertainment display. They were deployed as part of a modernization program for Ontario's charity bingo halls; in turn, some of these halls rebranded themselves as gaming centres to emphasize the machines and appeal towards younger adult demographics not associated with bingo.
The Moncton, New Brunswick-based Spielo has been heavily involved in the VLT market; it was acquired in 2004 by GTECH Corporation, which was in turn acquired by Lottomatica of Italy, which then acquired and merged with IGT in 2015. Alberta and the Atlantic Lottery both deployed modernizations to their VLT networks in the early-2010s, entering into supply deals with multiple gaming vendors, collectively including Aristocrat, and the present IGT (IGT, Spielo) and Scientific Games (Bally Technologies and WMS).
United States
Lotteries in the U.S. were considering VLTs as early as 1981, when a planned experiment with 20 machines by the New York State Lottery was scrapped, after the Attorney General determined they would be illegal. A similar plan by the New Jersey Lottery died in 1983 after ties between state officials and VLT manufacturers raised conflict of interest concerns.
The first VLTs in the country were installed in late 1983 by Bellevue, Nebraska as part of its municipal lottery. Eleven other local lotteries in Nebraska followed suit, until the state banned the devices, effective 1985.
South Dakota became on October 16, 1989, the first state to adopt VLTs. In a unique arrangement with private industry, the machines are owned by private companies but monitored by the South Dakota Lottery via a centralized computer system that assures the integrity of the games. South Dakota imposes a substantial tax on the net income (gross income minus player winnings) of the games. Beginning in 1992, four attempts were made to repeal South Dakota's video lottery; all were widely rejected by public votes. Most recently, in May 2006, petitions were filed containing over 21,000 signatures in order to place the issue on the November ballot; voters again agreed to keep video lottery, by a 66%-34% margin.
Other US jurisdictions which have had legal video lottery include Oregon, South Carolina (formerly), Rhode Island, Delaware, New York, Ohio, West Virginia, Louisiana, Maryland, Montana and Illinois. Of these, Delaware, Rhode Island, and West Virginia formerly participated in a shared VLT game, Cashola.
The U.S. Virgin Islands also has a legalized video lottery, managed by Southland Gaming of the Virgin Islands. The local governments in St. Thomas and St. John use the funds generated by the video lottery to fund various government programs on the islands; primarily focusing on educational efforts.
Racinos
In 1990, West Virginia introduced the concept of racinos when it allowed MTR Gaming Group to add VLTs to Mountaineer Race Track & Gaming Resort in Chester.
Racinos differ from traditional VLTs in that all video lottery games are played on a gaming machine.
Other states that have legalized VLTs in racinos are Delaware, Rhode Island, Louisiana, New York, Ohio, and West Virginia.
Non-lottery
In Montana, VLT-type poker, keno and bingo machines are legal to operate in the private sector. Since the 1970s, Montana was the first state, other than Nevada and New Jersey, to legalize machine gaming.
Keno and Bingo machines were first introduced in Montana in 1975. Although subject to legal challenge, these machines were deemed legal in 1976 after the Montana Supreme Court ruled in favor of Treasure State Games, a private company that brought the first games of this type to the state. (See Justia.com - Treasure State Games v. State of Montana)
Unlike in other states, the gaming devices are not under the jurisdiction of the state lottery. In 2011 the state legislature added another class of games, so-called "line games", to the list of approved games.
All establishments licensed for the on-premises consumption of alcohol within the state of Montana are allowed to operate such machines provided they have the correct permits. In addition, there are some Montana establishments (such as some truck stops) that do not possess "on-sale" licenses but hold "grandfather" licenses allowing them to operate gaming machines.
The maximum prize awarded on these machines is $800, with a maximum bet of $2 per hand. The legal age to gamble in Montana is 18, although people under the age of 21 cannot gamble in bars.
As in Louisiana, the games in Montana are not technically part of its lottery.
Class III video lottery
Currently, only Oregon and South Dakota employ Class III gaming technology (incorporating a random number generator) into their VLT games. Oregon's VLT program was modeled upon those deployed in Canada. The devices operated in Montana are also Class III machines, but as they are not connected to the Montana Lottery are technically not "video lottery terminals". This means that unlike any of the Class II states (which have a fixed number of winners, analogous to scratch cards), Oregon and South Dakota lottery players compete against a house edge rather than other lottery players. This is the same type of gaming offered in Nevada, Connecticut and Atlantic City, New Jersey as well as in the majority of tribal casinos. Currently, the state of Oregon offers its players a 91-95% payout on each of its games. South Dakota and Montana law specifies that payouts must be greater than 80%, although in reality actual payouts in these two jurisdictions are around 88-92%.
Most US jurisdictions do not allow VLTs and those that do have attracted the same criticism the Canadian provinces have. However, some non-players have expressed tolerance for the machines.
Other terminology
In certain jurisdictions, VLTs are known as video gaming devices (VGD) or video slot machines along with video gaming terminals (VGT). Most VLTs are multi-game devices, allowing the players to select, from an on-screen menu, the games they wish to play. They are also known as poker machines and fruit machines in some areas.
See also
Fixed odds betting terminal
Slot machine
Video poker
References
External links
VLTs: Nova Scotia's Billion Dollar Gamble An investigative website on VLTs in the Canadian province of Nova Scotia prepared by University of King's College students.
Lotteries
Canadian culture
Slot machines
Gaming devices |