id
stringlengths 3
8
| url
stringlengths 32
207
| title
stringlengths 1
114
| text
stringlengths 93
492k
|
---|---|---|---|
3410793 | https://en.wikipedia.org/wiki/Darnell%20Bing | Darnell Bing | Darnell Bing (born September 10, 1984) is a former American football linebacker. He was drafted by the Oakland Raiders in the fourth round of the 2006 NFL Draft. He played college football at Southern California.
Bing has also been a member of the San Francisco 49ers, New York Jets and Detroit Lions.
Early years
Bing attended Long Beach Polytechnic High School. He was a part of a Poly team that had five players ranked in the top 100 in the nation according to Rivals.com: tight end Marcedes Lewis, offensive tackle Winston Justice, defensive tackle Manuel Wright, running back Hershel Dennis and himself. Bing was a member of the USC football team in college along with all of these high school teammates, except for Lewis who played for USC's crosstown archrival, UCLA.
College career
Bing played safety for the USC Trojans, and received permission from USC athletic director Mike Garrett (USC's 1965 Heisman Trophy-winning tailback) to wear Garrett's retired No. 20 jersey. He was ruled academically ineligible his first year, but Bing started on all three other years of his collegiate career and was on two national championship teams. He was named a Jim Thorpe Award finalist as the nation's best collegiate football defensive back and an All-American in 2005. He was an early entry candidate in the 2006 NFL Draft, winding up in the fourth round.
In his final season at Southern California, Bing had an interception in the final minutes of the game against Fresno State that sealed the win for the Trojans.
Awards and honors
Honorable mention All-Pac-10 (2003)
Sporting News Pac-10 Freshman of the Year (2003)
Sporting News Freshman All-American (2003)
Second-team All-Pac-10 (2004)
First-team All-Pac-10 (2005)
First-team AP All-American (2005)
Jim Thorpe Award semifinalist (2005)
Lott Trophy quarterfinalist (2005)
Professional career
Oakland Raiders
He was drafted by the Oakland Raiders with the 101st pick of the 2006 NFL Draft. Although he was a safety in college, the Oakland Raiders planned to convert him to an outside linebacker, but before the 2007 season they moved him back to safety. Prior to the 2006 season, the Raiders placed Bing on the injured reserve list with a neck injury. On July 25, 2007 the Raiders released him.
San Francisco 49ers
The San Francisco 49ers claimed Bing off waivers on July 26, 2007. They released him on September 1 and re-signed him to the practice squad, where he spent the entire 2007 season.
New York Jets
On January 9, 2008, the New York Jets signed Bing to a future contract. He was waived by the team on July 29.
Detroit Lions
Bing was signed by the Detroit Lions on August 4, 2008 after the team placed linebacker Teddy Lehman on injured reserve. As the Raiders had unsuccessfully tried, the Lions also converted him to linebacker. He began the season on the team's practice squad before being promoted to the active roster on December 8, 2008 when linebacker Alex Lewis was placed on injured reserve. He was released on October 6, 2009.
Houston Texans
Bing signed a contract for the 2010 season on January 8, 2010. He was released at the end of the preseason and signed to the practice squad on October 14. On February 18, 2011, Bing was released from the Texans roster.
References
External links
Detroit Lions bio
Houston Texans bio
USC Trojans bio
1984 births
Living people
Players of American football from Long Beach, California
American football safeties
American football linebackers
USC Trojans football players
Oakland Raiders players
San Francisco 49ers players
New York Jets players
Detroit Lions players
Houston Texans players |
6852935 | https://en.wikipedia.org/wiki/IPv4%20address%20exhaustion | IPv4 address exhaustion | IPv4 address exhaustion is the depletion of the pool of unallocated IPv4 addresses. Because the original Internet architecture had fewer than 4.3 billion addresses available, depletion has been anticipated since the late 1980s, when the Internet started experiencing dramatic growth. This depletion is one of the reasons for the development and deployment of its successor protocol, IPv6. IPv4 and IPv6 coexist on the Internet.
The IP address space is managed globally by the Internet Assigned Numbers Authority (IANA), and by five regional Internet registries (RIRs) responsible in their designated territories for assignment to end users and local Internet registries, such as Internet service providers. The main market forces that accelerated IPv4 address depletion included the rapidly growing number of Internet users, always-on devices, and mobile devices.
The anticipated shortage has been the driving factor in creating and adopting several new technologies, including network address translation (NAT), Classless Inter-Domain Routing (CIDR) in 1993, and IPv6 in 1998.
The top-level exhaustion occurred on 31 January 2011. All RIRs have exhausted their address pools, except those reserved for IPv6 transition; this occurred on 15 April 2011 for the Asia-Pacific (APNIC), on 10 June 2014 for Latin America and the Caribbean (LACNIC), on 24 September 2015 for North America (ARIN), on 21 April 2017 for Africa (AfriNIC), and on 25 November 2019 for Europe, Middle East and Central Asia (RIPE NCC). These RIRs still allocate recovered addresses or addresses reserved for a special purpose. Individual ISPs still have pools of unassigned IP addresses, and could recycle addresses no longer needed by subscribers.
IP addressing
Every node of an Internet Protocol (IP) network, such as a computer, router, or network printer, is assigned an IP address for each network interface, used to locate and identify the node in communications with other nodes on the network. Internet Protocol version 4 provides 232 (4,294,967,296) addresses. However, large blocks of IPv4 addresses are reserved for special uses and are unavailable for public allocation.
The IPv4 addressing structure provides an insufficient number of publicly routable addresses to provide a distinct address to every Internet device or service. This problem has been mitigated for some time by changes in the address allocation and routing infrastructure of the Internet. The transition from classful network addressing to Classless Inter-Domain Routing delayed the exhaustion of addresses substantially. In addition, network address translation (NAT) permits Internet service providers and enterprises to masquerade private network address space with only one publicly routable IPv4 address on the Internet interface of a main Internet router, instead of allocating a public address to each network device.
Address depletion
While the primary reason for IPv4 address exhaustion is insufficient capacity in the design of the original Internet infrastructure, several additional driving factors have aggravated the shortcomings. Each of them increased the demand on the limited supply of addresses, often in ways unanticipated by the original designers of the network.
Mobile devices As IPv4 increasingly became the de facto standard for networked digital communication and the cost of embedding substantial computing power into hand-held devices dropped, mobile phones have become viable Internet hosts. New specifications of 4G devices require IPv6 addressing.
Always-on connections Throughout the 1990s, the predominant mode of consumer Internet access was telephone modem dial-up. The rapid increase in the number of the dial-up networks increased address consumption rates, although it was common that the modem pools, and as a result, the pool of assigned IP addresses, were shared amongst a large customer base. By 2007, however, broadband Internet access had begun to exceed 50% penetration in many markets. Broadband connections are always active, as the gateway devices (routers, broadband modems) are rarely turned off, so that the address uptake by Internet service providers continued at an accelerating pace.
Internet demographics The developed world consists of hundreds of millions of households. In 1990, only a small fraction of these had Internet access. Just 15 years later, almost half of them had persistent broadband connections. The many new Internet users in countries such as China and India are also driving address exhaustion.
Inefficient address use Organizations that obtained IP addresses in the 1980s were often allocated far more addresses than they actually required, because the initial classful network allocation method was inadequate to reflect reasonable usage. For example, large companies or universities were assigned class A address blocks with over 16 million IPv4 addresses each, because the next smaller allocation unit, a class B block with 65,536 addresses, was too small for their intended deployments.
Many organizations continue to utilize public IP addresses for devices not accessible outside their local network. From a global address allocation viewpoint, this is inefficient in many cases, but scenarios exist where this is preferred in the organizational network implementation strategies.
Due to inefficiencies caused by subnetting, it is difficult to use all addresses in a block. The host-density ratio, as defined in RFC 3194, is a metric for utilization of IP address blocks, that is used in allocation policies.
Mitigation efforts
Efforts to delay address space exhaustion started with the recognition of the problem in the early 1990s, and the introduction of a number of stop-gap refinements to make the existing structure operate more efficiently, such as CIDR methods and strict usage-based allocation policies.
The Internet Engineering Task Force (IETF) created the Routing and Addressing Group (ROAD) in November 1991 to respond to the scalability problem caused by the classful network allocation system in place at the time.
IPv6, the successor technology to IPv4, was designed to address this problem. It supports approximately network addresses. Although the predicted depletion was already approaching its final stages, most providers of Internet services and software vendors were just beginning IPv6 deployment at that time.
Other mitigation efforts and technologies include:
use of network address translation (NAT) which allows a private network to use one public IP address and permitting private addresses in the private network;
use of private network addressing;
name-based virtual hosting of web sites;
tighter control by regional Internet registries on the allocation of addresses to local Internet registries;
network renumbering and subnetting to reclaim large blocks of address space allocated in the early days of the Internet, when the Internet used inefficient classful network addressing.
Exhaustion dates and impact
On 31 January 2011, the last two unreserved IANA /8 address blocks were allocated to APNIC according to RIR request procedures. This left five reserved but unallocated /8 blocks. In accord with ICANN policies, IANA proceeded to allocate one of those five /8s to each RIR, exhausting the IANA pool, at a ceremony and press conference on 3 February 2011.
The various legacy address blocks with administration historically split among the RIRs were distributed to the RIRs in February 2011.
APNIC was the first regional Internet registry to run out of freely allocated IPv4 addresses, on 15 April 2011. This date marked the point where not everyone who needed an IPv4 address could be allocated one. As a consequence of this exhaustion, end-to-end connectivity as required by specific applications will not be universally available on the Internet until IPv6 is fully implemented. However, IPv6 hosts cannot directly communicate with IPv4 hosts, and have to communicate using special gateway services. This means that general-purpose computers must still have IPv4 access, for example through NAT64, in addition to the new IPv6 address, which is more effort than just supporting IPv4 or IPv6. The demand for IPv6 is expected to become pervasive over three to four years.
In early 2011, only 16–26% of computers were IPv6 capable, while only 0.2% preferred IPv6 addressing with many using transition methods such as Teredo tunneling. About 0.15% of the top million websites were IPv6 accessible in 2011. Complicating matters, 0.027% to 0.12% of visitors could not reach dual-stack sites, but a larger percentage (0.27%) could not reach IPv4-only sites. IPv4 exhaustion mitigation technologies include IPv4 address sharing to access IPv4 content, IPv6 dual-stack implementation, protocol translation to access IPv4 and IPv6-addressed content, and bridging and tunneling to bypass single protocol routers. Early signs of accelerated IPv6 adoption after IANA exhaustion are evident.
Regional exhaustion
All the RIRs have set aside a small pool of IP addresses for the transition to IPv6 (for example carrier-grade NAT), from which each LIR can typically get at most 1024 in total. ARIN and LACNIC reserves the last /10 for IPv6 transition. APNIC, and RIPE NCC have reserved the last obtained /8 block for IPv6 transition. AFRINIC reserves a /11 block for this purpose. When only this last block remains, the RIR's supply of IPv4 addresses is said to be "exhausted".
APNIC was the first RIR to restrict allocations to 1024 addresses for each member, as its pool reached critical levels of one /8 block on 14 April 2011. The APNIC RIR is responsible for address allocation in the area of fastest Internet expansion, including the emerging markets of China and India.
RIPE NCC, the regional Internet registry for Europe, was the second RIR to deplete its address pool on 14 September 2012.
On 10 June 2014, LACNIC, the regional Internet registry for Latin America and the Caribbean, was the third RIR to deplete its address pool.
ARIN was exhausted on 24 September 2015. ARIN has been unable to allocate large requests since July 2015, but smaller requests were still being met. After IANA exhaustion, IPv4 address space requests became subject to additional restrictions at ARIN, and became even more restrictive after reaching the last /8 in April 2014.
On 21 April 2017, AFRINIC became the last regional Internet registry to run down to its last /8 block of IPv4 addresses (102/8), thus triggering the final phase of its IPv4 exhaustion policy. Geoff Huston had projected AFRINIC to reach the /11 block-remaining level, marking exhaustion in the first half of 2018, but in 2019 forecasts this event is expected in 2020.
On 25 November 2019, RIPE NCC announced that it had made its "final /22 IPv4 allocation from the last remaining addresses in our available pool. We have now run out of IPv4 addresses." RIPE NCC will continue to allocate IPv4 addresses, but only "from organisations that have gone out of business or are closed, or from networks that return addresses they no longer need. These addresses will be allocated to our members (LIRs) according to their position on a new waiting list ..." The announcement also called for support for the implementation of the IPv6 roll-out.
Impact of APNIC RIR exhaustion and LIR exhaustion
Systems that require inter-continental connectivity will have to deal with exhaustion mitigation already due to APNIC exhaustion.
At APNIC, existing LIRs could apply for twelve months stock before exhaustion when they were using more than 80% of allocated space allocated to them. Since 15 April 2011, the date when APNIC reached its last /8 block, each (current or future) member will only be able to get one allocation of 1024 addresses (a /22 block) once. As the slope of the APNIC pool line on the "Geoff Huston's projection of the evolution of the IP pool for each RIR" chart to the right shows, the last /8 block would have been emptied within one month without this policy. By APNIC policy, each current or future member can receive only one /22 block from this last /8 (there are 16384 /22 blocks in the last /8 block). Since there are around 3000 current APNIC members, and around 300 new APNIC members each year, APNIC expects this last /8 block to last for many years. Since the redistribution of recovered space, APNIC is distributing an additional /22 to each member upon request.
The 1,024 addresses in the /22 block can be used by APNIC members to supply NAT44 or NAT64 as a service on an IPv6 network. However at a new large ISP, 1,024 IPv4 addresses might not be enough to provide IPv4 connectivity to all the customers due to the limited number of ports available per IPv4 address.
The regional Internet registries (RIRs) for Asia (APNIC) and North America have a policy called the Inter-RIR IPv4 Address Transfer Policy, which allows IPv4 addresses to be transferred from North America to Asia. The ARIN policy was implemented on 31 July 2012.
IPv4 broker businesses have been established to facilitate these transfers.
Notable exhaustion advisories
Estimates of the time of complete IPv4 address exhaustion varied widely in the early 2000s. In 2003, Paul Wilson (director of APNIC) stated that, based on then-current rates of deployment, the available space would last for one or two decades. In September 2005, a report by Cisco Systems suggested that the pool of available addresses would deplete in as little as 4 to 5 years. In the last year before exhaustion, IPv4 allocations were accelerating, resulting in exhaustion trending to earlier dates.
On 21 May 2007, the American Registry for Internet Numbers (ARIN), the RIR for the US, Canada and a number of island states (mostly in the Caribbean), advised the Internet community that, due to the expected exhaustion in 2010, "migration to IPv6 numbering resources is necessary for any applications which require ongoing availability from ARIN of contiguous IP numbering resources". "Applications" include general connectivity between devices on the Internet, as some devices only have an IPv6 address allocated.
On 20 June 2007, the Latin American and Caribbean Internet Addresses Registry (LACNIC), advised "preparing its regional networks for IPv6" by 1 January 2011, for the exhaustion of IPv4 addresses "in three years time".
On 26 June 2007, the Asia-Pacific Network Information Centre (APNIC), the RIR for the Pacific and Asia, endorsed a statement by the Japan Network Information Center (JPNIC) that to continue the expansion and development of the Internet a move towards an IPv6-based Internet is advised. This, with an eye on the expected exhaustion around 2010, would create a great restriction on the Internet.
On 26 October 2007, the Réseaux IP Européens Network Coordination Centre (RIPE NCC), the RIR for Europe, the Middle East, and parts of Central Asia, endorsed a statement by the RIPE community urging "the widespread deployment of IPv6 be made a high priority by all stakeholders".
On 15 April 2009, ARIN sent a letter to all CEO/Executives of companies who have IPv4 addresses allocated informing them that ARIN expects the IPv4 space will be depleted within the next two years.
In May 2009, the RIPE NCC launched IPv6ActNow.org to help explain "IPv6 in terms everyone can understand and providing a variety of useful information aimed at promoting the global adoption of IPv6".
On 25 August 2009, ARIN announced a joint series event in the Caribbean region to push for the implementation of IPv6. ARIN reported at this time that less than 10.9% of IPv4 address space is remaining.
World IPv6 Day was an event sponsored and organized by the Internet Society and several large content providers to test public IPv6 deployment. It started at 00:00 UTC on 8 June 2011 and ended at 23:59 the same day. The test primarily consisted of websites publishing AAAA records, allowing IPv6 capable hosts to connect to these sites using IPv6, and for misconfigured networks to be corrected.
World IPv6 Launch Day occurred on 6 June 2012, following the success of World IPv6 Day a year earlier. It involved many more participants and had a more ambitious goal of permanently enabling IPv6 on participant organizations' networks.
On 24 September 2015 ARIN declared exhaustion of the ARIN IPv4 addresses pool.
On 25 November 2019, RIPE NCC announced that it had made its "final /22 IPv4 allocation from the last remaining addresses in our available pool."
On 21 August 2020, LACNIC announced that it had made its final IPv4 allocation.
Post-exhaustion mitigation
By 2008 policy planning for the end-game and post-exhaustion era was underway. Several proposals have been discussed to delay shortages of IPv4 addresses:
Reclamation of unused IPv4 space
Before and during the time when classful network design was still used as allocation model, large blocks of IP addresses were allocated to some organizations. Since the use of CIDR the Internet Assigned Numbers Authority (IANA) could potentially reclaim these ranges and reissue the addresses in smaller blocks. ARIN, RIPE NCC and APNIC have a transfer policy, such that addresses can get returned, with the purpose to be reassigned to a specific recipient. However, it can be expensive in terms of cost and time to renumber a large network, so these organizations are likely to object, with legal conflicts possible. However, even if all of these were reclaimed, it would only result in postponing the date of address exhaustion.
Similarly, IP address blocks have been allocated to entities that no longer exist and some allocated IP address blocks or large portions of them have never been used. No strict accounting of IP address allocations has been undertaken, and it would take a significant amount of effort to track down which addresses really are unused, as many are in use only on intranets.
Some address space previously reserved by IANA has been added to the available pool. There have been proposals to use the class E network range of IPv4 addresses (which would add 268.4 million IP addresses to the available pool) but many computer and router operating systems and firmware do not allow the use of these addresses. For this reason, the proposals have sought not to designate the class E space for public assignment, but instead propose to permit its private use for networks that require more address space than is currently available through RFC 1918.
Several organizations have returned large blocks of IP addresses. Notably, Stanford University relinquished their Class A IP address block in 2000, making 16 million IP addresses available. Other organizations that have done so include the United States Department of Defense, BBN Technologies, and Interop.
Markets in IP addresses
The creation of markets to buy and sell IPv4 addresses has been considered to be a solution to the problem of IPv4 scarcity and a means of redistribution. The primary benefits of an IPv4 address market are that it allows buyers to maintain undisrupted local network functionality. IPv6 adoption, while in progress, is currently still in early stages. It requires a significant investment of resources, and poses incompatibility issues with IPv4, as well as certain security and stability risks.
The creation of a market in IPv4 addresses would only delay the practical exhaustion of the IPv4 address space for a relatively short time, since the public Internet is still growing.
The concept of legal ownership of IP addresses as property is explicitly denied by ARIN and RIPE NCC policy documents and by the ARIN Registration Services Agreement, although ownership rights have been postulated based on a letter from the National Science Foundation General Counsel. NSF later indicated that the view was not official, and a statement from the Department of Commerce was subsequently issued indicating that "The USG participates in the development of and is supportive of the policies, processes, and procedures agreed upon by the Internet technical community through ARIN."
Ad-hoc trading in addresses could lead to fragmented patterns of routing that could increase the size of the global routing table, potentially causing problems for routers with insufficient routing memory resources.
Microsoft bought 666,624 IPv4 addresses from Nortel's liquidation sale for 7.5 million dollars in a deal brokered by Addrex. Before exhaustion, Microsoft could have obtained addresses from ARIN without charge, provided that, as per ARIN policy, Microsoft could present ARIN with a need for them. The success of this transfer was contingent on Microsoft successfully presenting ARIN with such a justification. The purchase provided Microsoft with a supply that was sufficient for their claimed needs for growth over the next 12 months, rather than for a 3-months' period as is normally requested from ARIN.
Transition mechanisms
As the IPv4 address pool depletes, some ISPs will not be able to provide globally routable IPv4 addresses to customers. Nevertheless, customers are likely to require access to services on the IPv4 Internet. Several technologies have been developed for providing IPv4 service over an IPv6 access network.
In ISP-level IPv4 NAT, ISPs may implement IPv4 network address translation within their networks and assign private IPv4 addresses to customers. This approach may allow customers to keep using existing hardware. Some estimates for NAT argue that US ISPs have 5-10 times the number of IPs they need in order to service their existing customers.
However the allocation of private IPv4 addresses to customers may conflict with private IP allocations on the customer networks. Furthermore, some ISPs may have to divide their network into subnets to allow them to reuse private IPv4 addresses, complicating network administration. There are also concerns that features of consumer-grade NAT such as DMZs, STUN, UPnP and application-level gateways might not be available at the ISP level. ISP-level NAT may result in multiple-level address translation which is likely to further complicate the use of technologies such as port forwarding used to run Internet servers within private networks.
NAT64 translates IPv6 requests from clients to IPv4 requests. This avoids the need to provision any IPv4 addresses to clients and allows clients that only support IPv6 to access IPv4 resources. However this approach requires a DNS server with DNS64 capability and cannot support IPv4-only client devices.
DS-Lite (Dual-Stack Light) uses tunnels from the customer premises equipment to a network address translator at the ISP. The consumer premises equipment encapsulates the IPv4 packets in an IPv6 wrapper and sends them to a host known as the AFTR element. The AFTR element de-encapsulates the packets and performs network address translation before sending them to the public Internet. The NAT in the AFTR uses the IPv6 address of the client in its NAT mapping table. This means that different clients can use the same private IPv4 addresses, therefore avoiding the need for allocating private IPv4 IP addresses to customers or using multiple NATs.
Address plus Port allows stateless sharing of public IP addresses based on TCP/UDP port numbers. Each node is allocated both an IPv4 address and a range of port numbers to use. Other nodes may be allocated the same IPv4 address but a different range of ports. The technique avoids the need for stateful address translation mechanisms in the core of the network, thus leaving end users in control of their own address translation.
Long-term solution
Deployment of IPv6 is the standards-based solution to the IPv4 address shortage. IPv6 is endorsed and implemented by all Internet technical standards bodies and network equipment vendors. It encompasses many design improvements, including the replacement of the 32-bit IPv4 address format with a 128-bit address which provides an addressing space without limitations for the foreseeable future. IPv6 has been in active production deployment since June 2006, after organized worldwide testing and evaluation in the 6bone project ceased. Interoperability for hosts using only IPv4 protocols is implemented with a variety of IPv6 transition mechanisms.
See also
List of assigned /8 IPv4 address blocks
512K Day – an event in 2014, involving the exhaustion of the default allocation of hardware routing slots on many routers
References
External links
Official current state of IPv4 /8 allocations, as maintained by IANA
ICANN recovers Large Block of Internet Addresses (14.0.0.0/8) 2008-02-10
Global Policy Proposal for Remaining IPv4 Address Space – Background Report 2008-09-08
potaroo.net: IPv4 Address Report with countdown
RIR IPv4 status: APNIC RIPE
Technology hazards
Internet architecture
Exhaustion
Exhaustion
de:IPv6#Gründe für ein neues Internet-Protokoll |
46734896 | https://en.wikipedia.org/wiki/List%20of%20Brooklyn%20Nine-Nine%20characters | List of Brooklyn Nine-Nine characters | Brooklyn Nine-Nine is an American sitcom which premiered in September 2013 on Fox, and later moved to NBC. The show revolves around the detective squad of the fictional 99th Precinct of the New York Police Department, located in Brooklyn.
Cast
Main
Supporting
Main characters
Jake Peralta
Andy Samberg portrays Jacob Jeffrey Peralta, a talented but childish detective. His last name is of Spanish origin. Peralta often engages in pranks and makes immature jokes at the expense of his colleagues. He is fun-loving and sarcastic but is often motivated by his emotions more than his colleagues. Despite his goofiness, Peralta is smart, perceptive, and quick thinking, and as such has the best arrest rate in the precinct. In the pilot, Terry Jeffords explained to Captain Holt that Peralta is his best detective, that he likes putting away bad guys, and that he loves puzzles, although "the only puzzle he hasn't solved is how to grow up."
Jake's father, an airline pilot, abandoned his family during his childhood, and he feels a strong tie to memories involving his father as a result, such as his favorite Brooklyn pizza joint. He also initially refused to celebrate Thanksgiving, since he associated the holiday with his father's absenteeism. After Jake called his father out for his irresponsible parenting in "Captain Peralta", the two slowly began to mend their relationship over the course of the show. In the season 5 episode "Two Turkeys", Jake's father Roger reveals that Jake has three half-sisters, along with an unknown number of half-brothers. He later meets one of his half-sisters, Kate, in the episode "DFW".
Jake began his career as a patrol officer with the 74th Precinct and was partnered with Stevie Schillens; the two nicknamed themselves the "Beatsie Boys". He was promoted to detective with the 99th Precinct in 2005. In 2016, Jake was forced to arrest Stevie, now a detective with the neighboring 98th Precinct, for planting evidence. He had a strong emotional tie to his muscle car, a 1967 Ford Mustang, which he bought outright on his first day as a cop and always carried a positive association for him until he sold it to help pay for Terry's new child. He often quotes and makes references to his favorite movie trilogy, Die Hard. In "The Bet", it is revealed that Jake is Jewish, commenting on Amy who is wearing a dress he bought that she looks like "every girl at every bat mitzvah he ever had a crush on".
Peralta has a strong connection to several workers in the squad. His best friend is Charles Boyle, who works with him at the precinct and admires Peralta; Charles also encourages his eventual romance with Santiago. Peralta and Gina Linetti are childhood friends, and he helped Gina get a job at the precinct as a civilian administrator. Diaz and Peralta were classmates at the police academy.
While Jake initially struggled with Captain Holt's strict management style, he eventually matured under Holt's supervision and came to see the captain as a father figure; even calling him "Dad" on many occasions. In "The Oolong Slayer", Jake achieved his lifelong dream to catch a serial killer, but gave up credit for the arrest to the Chief of Brooklyn Detectives in exchange for effecting Holt's transfer back to the 99th Precinct. In season five, Holt put his career at risk by negotiating with mobster Seamus Murphy in order to free Jake and Rosa from prison after they were framed by Lt. Melanie Hawkins. The two also worked closely together to bring down Jimmy Figgis after being forced to go into witness protection in Florida.
Peralta continuously pranked and teased his partner Amy Santiago, masking his secret romantic feelings for her. Peralta confessed his feelings to her in "Charges and Specs" before going undercover for a mafia operation. His romantic feelings for her developed further throughout season two and they shared their first kiss in the season finale, "Johnny and Dora". Jake and Amy start dating in "New Captain" and decided to move in together in "Greg and Larry", but don't make it official until season four's "The Fugitive". Jake proposed to Amy at the end of their annual Halloween heist in HalloVeen and the two are later married by Captain Holt in the season five finale. In season 7, Amy became pregnant with their child. Their son McClane "Mac" Peralta-Santiago (who was named after John McClane from Die Hard) is born in the season 7 finale.
In the series finale, with Amy's new position taking up more of her time and making their parenting schedule difficult, Jake decides to quit his job to become a stay-at-home dad, not wanting his son to grow up without a father as he did. Jake is the only character, along with Captain Holt, to appear in every episode of the series.
Awards and decorations
The following are the medals and service awards fictionally worn by Peralta.
In "Stakeout", he received a commendation for his work on Rosa's drug task force.
Rosa Diaz
Stephanie Beatriz portrays Rosalita "Rosa" Diaz, a smart, tough, aloof, and mysterious detective. She attended parochial school and then later transferred to a prestigious ballet school. When she was younger, the pressure for her to succeed at ballet school eventually led her to commit several crimes (including "beating up ballerinas" and breaking into people's houses) which resulted in her leaving ballet school and eventually landing in juvenile detention. In response, her parents effectively cut her out of their lives, leaving Rosa to turn things around on her own. Sometime after, she was classmates with Jake at the police academy.
Though Rosa is a loyal and effective member of the squad, her anger management issues and lack of sympathy for others terrify most of her coworkers. If Rosa is angry enough, people are too scared to even walk past her to go to the bathroom, something Terry and Holt attempt to use to increase precinct efficiency. She is highly secretive about her personal life. It is also established that she does not stay in any accommodation for long periods of time, and her neighbors know her by both a different name and a completely different personality. In the episode "Greg and Larry", Rosa also suggests that her real identity is even hidden from the squad. As revealed in "Cop-Con", she and Amy are younger than most of the other precinct members as they are hurt by a device that emits a loud noise to those under 35, whereas Jake and Boyle only pretended to be affected by it. At some point, Rosa became an accomplished gymnast (which she considers her "deepest shame"), and is also highly skilled at yoga and archery. In "White Whale", she told Amy that she attended medical school, business school, and has a pilot's license. In her spare time, she also fixes up old cars to sell to famous people and uses bolt cutters to make jewellery. She is also often seen riding motorcycles.
In season two, Rosa dated Captain Holt's nephew, Marcus, but broke up with him in season three. Later in the season, she found love with former undercover detective Adrian Pimento; the two get engaged in "Paranoia" while chasing a drug dealer through an alley, but their wedding is delayed when Pimento was targeted by mob boss Figgis and forced to flee. Once he returned, they decided to slow down after realizing they were rushing their relationship.
At the end of season four, Rosa and Jake were framed by their idol Lt. Melanie Hawkins and arrested. After months in prison at the beginning of season five, the two are freed thanks to the precinct exposing Hawkins's crimes. Following her time in isolation, she started spending more time with her family and ended her relationship with Pimento. While on the road trip home from their former captain's funeral, Charles overheard a woman calling her "babe" over the phone, leading Rosa to admit she is bisexual. Later in the season, she officially came out to the precinct and her family. She had several relationships with other women over the course of the series such as an unseen woman that the squad nicknamed "Becky", one of Gina's friends, a cab driver named Alicia, and a woman nicknamed "Couscous", and a cosmetologist named Jocelyn. In season six, she started to patch up her relationship with her mother, who was initially disapproving of her bisexuality. In the episode "Valloweaster," she became the first three-time Halloween Heist Champion.
In season eight, Rosa left the NYPD after losing faith in the system in light of the George Floyd protests and became a private investigator. By the series finale, she is not in a serious relationship nor does she have children, but she makes it clear she is happy where she is in life.
Rosa appeared in every episode of the series but two: "Coral Palms: Part One" and "The Box".
Awards and decorations
The following are the medals and service awards fictionally worn by Diaz.
In "Stakeout", she received a commendation for her work as the leader of a drug Task Force.
Terry Jeffords
Terry Crews portrays Terrence "Terry" Vincent Jeffords, the supervisor of the 99th Precinct's detective squad. An avid bodybuilder, Terry's intimidating size and appearance are contrasted by his gentle-giant persona, being very caring and parental in nature. Jeffords is devoted to his wife and three young daughters, twins Cagney and Lacey, and Ava. He fears the danger of police work because of the possibility that he could leave his children fatherless. Following a panic attack prior to the show's beginning, Terry was removed from fieldwork, but returned after saving Holt's life. He is high-strung, prone to nervous excitement, loves yogurt, and has a tendency to refer to himself in the third person. He is an effective and caring leader to the detective squad, often having to play the mature adult in order to keep them in line.
A running gag throughout the series is for Terry to break things because of his incredible strength. He has been a detective since 1995 and used to be assigned to the 65th Precinct, where he was constantly mocked for a botched case which he and Jake later proved he was correct in. He was a linebacker at Syracuse University, where he graduated magna cum laude, as revealed in "The Swedes". He also studied abroad in Japan while in college and dated a Japanese student named Chiaki who broke his heart.
In season two, Terry almost got a vasectomy at his wife's request, but Jake convinced him not to when he found out Terry secretly wanted to have more kids. His wife became pregnant later in the season and gave birth to their third daughter, Ava, in season three; Terry names Jake as Ava's godfather.
While Terry was satisfied with his role as a sergeant, he aimed to become a lieutenant during the first six seasons. As revealed in "The Honeypot", he brought a new pair of suspenders that he planned to put on after he passed the lieutenant's exam but kept them in the box when he ended up failing and held onto them as a reminder of his higher goals. In "Moo Moo", he attempted to apply to be a city council liaison to take on more responsibilities but was rejected after reporting that another cop racially profiled him. In season six, Terry revealed to the group that he passed the lieutenant's exam weeks before the annual Halloween Heist. He was nearly transferred to Staten Island, but acting Commissioner Wuntch used her new position to allow him to stay at the Nine-Nine. In the series finale, after Holt was appointed as the deputy commissioner of the police reform program, Terry succeeded him as the new captain of the 99th Precinct.
Awards and decorations
The following are the medals and service awards fictionally worn by Jeffords.
Amy Santiago
Melissa Fumero portrays Amy Santiago, Jake's uptight, by-the-book, rule-following Cuban-American partner, and later wife. A self-acknowledged type A personality and neurotic overachiever, she continually tried to ingratiate herself with Holt, and any authority figure in arm's reach of her. In the pilot, Terry cites Amy's competitiveness to Holt as a result of her having seven brothers. Amy is a stickler for department protocol and is frequently exasperated by Jake's childishness, as well as the ease with which he succeeds as a detective. She was initially seen as Holt's teacher's pet, but over time is shown to command respect from others.
Amy was originally a patrol officer at the 64th precinct but requested a transfer to the 99th when her captain sexually assaulted her shortly after her promotion to detective. She didn't tell anyone for years out of fear of what it would do to her career, until she revealed it to Jake when they were investigating a sexual assault case in "He Said, She Said".
In the season one finale, Jake confessed that he wished something romantic could happen between them. She admitted to having feelings for Jake in "The Road Trip", which instigated issues in her relationship with Teddy Wells. The two shared their first kiss in "Johnny and Dora" and begin dating in "New Captain," although their working relationship did not change at all. They decided to move in together in the season three finale "Greg and Larry", but do not do so until season four's "The Fugitive". Jake proposed to Amy at the end of their annual Halloween heist in "HalloVeen" and the two eventually married in "Jake & Amy". In season seven, Amy became pregnant with Jake's child and gave birth to their son, McClane 'Mac' Peralta-Santiago in the season finale.
Near the end of season three, Amy went undercover as a pregnant inmate in a women's prison in Texas. This was done to cover Melissa Fumero's actual pregnancy at the time without making her character pregnant. Amy's actual pregnancy in season seven occurred when Fumero was pregnant with her second child.
After some uncertainty in taking the sergeant's exam as depicted in "Chasing Amy", she passed the exam and began wearing her sergeant's uniform as well as commanding her own uniformed officers in "NutriBoom". In season eight, thanks to her efforts for the police reform program, Amy was promoted to become chief of the program. The additional responsibilities that came with her job ultimately led Jake to quit so they would not have to worry about Mac's parenting schedule.
In season six's "Casecation", she was revealed to be 36 years old. In "The Golden Child", it is revealed that Amy has a relatively strained relationship with her brother and fellow NYPD lieutenant David Santiago, and Jake later chided her mother for glorifying David's accomplishments over Amy's. Amy enjoys solving crosswords and attending trivia sessions, generally at Jake's expense, who often embarrasses himself when attempting to participate or becomes awkwardly excluded in conversation. She also has a severe allergy to dogs.
Awards and decorations
The following are the medals and service awards fictionally worn by Santiago.
Charles Boyle
Joe Lo Truglio portrays Charles Boyle, a nervous and clumsy but honest and hard-working detective. He is Jake's best friend, and almost completely idolizes him. He is divorced from his wife Eleanor, who had numerous affairs during their marriage, to the point where she has to pay alimony to him. He is also a huge, unapologetic foodie, maintaining a weekly Brooklyn pizza-ranking email and often relishing bizarre foreign cuisine that disgusts his coworkers.
For saving Diaz's life during "Christmas", during which he was shot in the buttocks, he was awarded the NYPD Medal for Valor in "The Bet", though he was overshadowed by a revered and heroic NYPD horse named Sergeant Peanut Butter. He continued to have a one-sided rivalry with Sergeant (later Lieutenant) Peanut Butter until he needed his help in getting Jake to the precinct in the season seven finale. In "The Swedes", it is revealed that Boyle is a graduate of Sarah Lawrence College. In season eight, Charles discovered that he is actually not a Boyle by blood as his mother had an affair with a florist who rivaled his father, but Lynn still raised him as a Boyle regardless. Despite this, he was declared as the "One True Boyle" after he was the only one to successfully open the grandmother dough jar at the family farm.
In the show's first season, Charles was smitten with Rosa, but he eventually got over her when he started dating Vivian Ludley, whom he met at Holt's birthday party. They get engaged but break up after Charles refused to move to Canada with her. He and Gina start engaging in casual sex in season two, and their brief relationship results in the marriage of his father and Gina's mother. In season three, he started dating Genevieve Mirren-Carter after he and Jake clear her name from an art theft. They eventually move in together and adopt a son from Latvia named Nikolaj.
In season five, Charles started his own food truck business called "The One Thing", which specialized in meatball subs. The truck was burned down by one of Charles' former employees, but he was thankful it happened as running the food truck made him spend less time with his family and also built up a large debt. Outside of Hitchock and Scully, Charles is the only detective not to quit or change ranks by the end of the series. With Jake quitting his job in the series finale, Charles became the new senior detective of the precinct, and his new partner idolizes him similar to how he idolized Jake.
Charles has a habit of saying things that are overtly sexualized or otherwise inappropriate and rarely realizes it, despite the rest of the squad's disgust. He has appeared in every episode of the series except the season four opener "Coral Palms: Part One".
Awards and decorations
The following are the medals and service awards fictionally worn by Boyle.
Gina Linetti
Chelsea Peretti portrays Regina "Gina" Linetti, the 99th Precinct's sardonic and egomaniacal civilian administrator and Holt's assistant. Despite maintaining a clueless and dimwitted disposition most of the time, she can be surprisingly observant and often demonstrates signs of being more intelligent than she likes to show. Gina is obsessed with social media and is constantly on her phone. It is a running gag to try to pry her from her phone to the point where Holt becomes involved. She is extremely narcissistic and constantly praises and exalts herself, such as claiming to be a better dancer than Britney Spears in the episode "Karen Peralta". As the only civilian in the precinct, Gina often uses her outsider's perspective to assist the other detectives. In "The Party", to prevent the mostly working class detectives from embarrassing themselves in front of a crowd of academics, Rosa tricks Gina into talking to a group of psychology professors at Holt's birthday party, who then took copious notes about her narcissistic personality. They concluded that she has a complete overlap of ego and id, a condition previously thought to be purely theoretical.
She casually admits on myriad occasions that she doesn't value her colleagues – except for Jake – as people. She was also childhood friends with Jake, who got her the job at the precinct. Gina also ruined Jake's senior year of high school by framing him as "the Tattler", though she did it to avoid Jake getting involved with the wrong crowd. She transferred to the Public relations Division with Holt in "Johnny and Dora", and returned to the 99th Precinct with him in "The Oolong Slayer". In the episode "The Apartment", it is revealed that she has been engaged eight times, but never married. In "The Fugitive Pt. 2", she declared that Charles' texts are so strange that she would rather get hit by a bus than receive another one from him. At the end of the episode, she received Charles' first unchecked, quality text for her, but while congratulating him, she ironically does indeed get hit by a bus and spends the next few episodes recovering from the incident. The penultimate episode of season four revealed she became pregnant following a relationship with Charles' cousin, Milton (which coincided with Chelsea Peretti's actual pregnancy). She was absent for the first half of season five on maternity leave after giving birth to a girl she nicknames "Iggy" (short for Enigma).
In the episode "Halloween IV", Gina revealed that in the fourth grade at a classmate's birthday party, a bowling ball fell onto her face. This incident knocked out her two front teeth; she has been wearing false teeth since.
In season six, Jake helps Gina realize that her talents would be better spent elsewhere and she quits her job. She becomes an internet celebrity and hosts a web show called "The G-Hive," in which she gives her viewers life advice. Her work has made her too busy to spend time with her former coworkers, but she is aiming to improve after Jake confronted her for not talking to them for months. In the series finale, Gina appears to have become wealthy from her new job to the point where she can afford an armored truck with "The G-Hive" logo on it.
Raymond Holt
Andre Braugher portrays Raymond "Ray" Panuel Jacob Holt, the 99th Precinct's strict commanding officer. Holt is known for his cold, calm, robotic manner of speaking, overly formal demeanor, and lack of outwardly visible emotion, although his non-work friends frequently refer to him having a much more fun persona that is rarely seen by his colleagues. He has sophisticated and cultured interests, enjoying classical music, opera, and attending dinner parties with his husband's academic friends. The 99th Precinct is Holt's first command despite many years of outstanding service, and he attributes the delay to prejudice against both his race and homosexuality. He came out in 1987 and led a group that supported LGBTQ African-American NYPD members, which he himself created. He was a homicide detective in the 1980s, and spent twelve years in the Community Affairs Bureau immediately prior to promoting to Captain of the Nine-Nine.
Holt is married to Kevin Cozner, the Chair of Columbia University's Classics department. He and Kevin own a corgi named Cheddar, a well-trained dog that they are both significantly attached to. Holt had a longstanding professional rivalry with Madeline Wuntch, with whom he came up through the ranks. The two were once friends, but their friendship soured after Holt rejected Wuntch's sexual advances on account of his homosexuality; while his career stalled, she kept advancing. After he and Peralta successfully solve a major case in "The Chopper", Bureau Chief Wuntch nominated him for a promotion to head of the NYPD Public Affairs Division, a promotion he was forced to accept to avoid Wuntch transferring his staff to undesirable precincts. During the number of weeks Holt was in charge of Public Affairs, he was unable to accomplish anything significant thanks to Chief Wuntch's constant micromanaging. After helping Peralta solve a serial killer case, Holt found himself transferred back to command of the Nine-Nine by the Chief of Brooklyn Detectives thanks to Jake giving him credit for the case. He owned a burgundy Chevrolet Corvair named Gertie which was his prized possession until it was stolen in "The Fugitive". Doug Judy purchased him a new identical one and names it Sexarella. He also had a mysterious tattoo that was left unknown until the series finale, where it is revealed to be Kevin's head on the body of Cheddar.
At the end of season three, Jake and Holt were forced to go into witness protection in Florida when they were threatened by crime boss Jimmy "The Butcher" Figgis. He worked at a family entertainment center called the Fun Zone under the alias 'Greg Stickler' until he and Jake baited Figgis into coming to Florida and taking the criminal down with the Nine-Nine. In season five, his life and career were put at risk when he made a deal with mobster Seamus Murphy in exchange for information to clear Jake and Rosa's names from Lt. Hawkins, but the Nine-Nine and Kevin helped him capture Murphy.
Later in season five, Holt learned that the New York City Police Commissioner was retiring at the end of the year and that he was on the shortlist of candidates to replace him. He spent the rest of the season campaigning to win the Commissioner title, but ended up losing to John Kelly. In season six, Holt was encouraged by Jake and Amy to stand up to Kelly's regressive policies, leading the Commissioner to retaliate against the Nine-Nine. However, Peralta and Wuntch team up, without Holt's knowledge, to take Kelly down, resulting in Wuntch being named interim Commissioner. This détente becomes short-lived as Holt was demoted to a uniformed officer by Commissioner Wuntch after she found out he was promoted to detective too soon earlier in his career. Shortly after Wuntch's death, however, he is quickly promoted back to captain in the middle of the seventh season. At the beginning of season eight, Holt and Kevin were separated as a result of the hardships they endured in 2020, but they got back together and started attending couples counseling, which eventually resulted in the two renewing their vows. For his work in the police reform program proposal, he was also promoted to deputy commissioner of the program.
Over the course of the series, Jake matures under his direction and Holt becomes more lighthearted in return; the two acknowledge they have a father-son dynamic with each other. In the series finale, Holt tells Jake if he had a son like him, he would be proud of the man Jake became.
Awards and decorations
The following are the medals and service awards fictionally worn by Holt.
In "Stakeout", he received a commendation for his supervision of Det. Diaz's drug task force.
Michael Hitchcock
Dirk Blocker portrays Michael Hitchcock (season 2–present; recurring season 1), an enthusiastic but clueless detective who has been best friends and partners with Scully for over 30 years. Despite their inept nature, Hitchcock and Scully have both shown on occasion to be competent and even good detectives, though their laziness tends to keep them from demonstrating this most of the time. As revealed in "Hitchcock and Scully", the two were excellent detectives in their youths and had well-built bodies, but their careers and their physiques went downhill after they tried the buffalo wings at their eventual favorite restaurant, Wing Slutz, which they frequently went to for the food and to check in on the manager (who was secretly an informant who helped them bring down a notorious mafia boss). Unlike most police detectives, Hitchcock and Scully are more than happy to do paperwork rather than expend any energy in the field.
The majority of the precinct tends to be disgusted by Hitchcock's more perverted nature and attitude towards women. It is revealed in "The Last Ride" that Hitchcock held the all-time record for closed cases at the 99th Precinct, one more than Jeffords as of that episode. This was mainly due to him being at the precinct twenty years longer than Terry. To celebrate, Hitchcock got a tattoo of himself holding a gun and putting it in his mouth, oblivious to what it actually implies. In season eight, Hitchcock seemingly retired after receiving a package as a result of the Covid-19 pandemic and moved to Brazil while keeping in touch with Scully and the precinct via FaceTime. However, the series finale revealed that he didn't retire and was actually living in his van, allowing him to win the final heist in the series.
Awards and decorations
The following are the medals and service awards fictionally worn by Detective Hitchcock.
Norm Scully
Joel McKinnon Miller portrays Norman "Norm" Scully (season 2–present; recurring season 1), a middle-aged, lazy detective who has been best friends and partners with Hitchcock for over 30 years. Scully shows talent as a tenor opera singer and French speaker, has an understanding of Morse code and can "make great coffee", according to Jeffords. He also displays an uncanny ability to reassemble shredded documents in one episode. Scully routinely discloses disgusting medical issues like the entire bottom of his foot being a wart or having various strains of fungi. He claims to constantly have medical emergencies, and despite having a pacemaker fitted, he frequently suffers from heart attacks. He often embarrasses himself either unintentionally or willingly and admits to being indifferent to the judgment of others (most frequently, the fellow members of his squad.) In the early seasons, Scully is married and has a dog. The team is unsure which one of them is called Kelly, though it is later revealed in season seven that both of them had this name. After his wife left him, he began dating a woman named Cindy Shatz, who is very similar to him in her attire and personality. He has a twin brother named Earl, also portrayed by Miller.
Awards and decorations
The following are the medals and service awards fictionally worn by Detective Scully.
Recurring characters
NYPD and other law enforcement
Patton Oswalt as FDNY Fire Marshal Boone, the fire marshal of the local fire station. He leads the fire department in a rivalry against the detectives of the 99 but reaches a brief understanding with Jake when they discover that they both were abandoned at a young age by their fathers.
Dean Winters as Captain Keith Pembroke, nicknamed "The Vulture", an obnoxious detective in the Major Crimes Unit notorious for taking over cases that are nearly solved and receiving all of the credit for closing them. He frequently makes lewd comments toward the squad and has a greatly inflated sense of self. After the death of Seth Dozerman, Pembroke became the Commanding Officer of the 99th Precinct until Captain Holt returned, where he treated the squad with disrespect. In "The Venue", the Vulture stole Jake and Amy's venue at the last second to host his wedding to a kind charity worker named Jean Munhroe. When the two discovered that he is unfaithful to Jean and was lying to her about his character, they decided to tell Jean at the cost of the Vulture taking their venue on their wedding night. He is recruited onto Jake's "suicide squad" to help take down Commissioner John Kelly. However, he made a deal with Madeline Wuntch to betray the 99 in exchange for becoming captain of the 69th Precinct, though the betrayal was part of Jake and Wuntch's plan to trick John Kelly. He is a recipient of the American Flag Breast Bar, World Trade Center Breast Bar, NYPD Medal of Honor, and Marine Corps Service Award.
Kyle Bornheimer as Sergeant Teddy Ramos (né Wells), a detective at the 82nd Precinct. Teddy used to date Amy Santiago, and they resumed their relationship after meeting up at a training exercise. Later Amy broke up with him again because she dislikes his dull personality and is unable to show interest in his home pilsner-brewing hobby. In season four, Teddy evaluated the Nine-Nine when the crime rate dropped and one precinct had to close. He claimed to have changed but Jake and Amy agree that he is still "The most boring man in America". He also admitted to Amy that he still loves her and proposed to her several times over the next few seasons. In season five, Teddy joined the bomb squad to impress Amy and tried unsuccessfully to steal her away from Jake on the day of their wedding. In season seven, Teddy reveals he married someone named Elizabeth Ramos, took her last name, and was expecting a child around the same time Jake and Amy were expecting theirs. Despite having a wife and child, he still wants Amy to marry him.
Gabe Liedman as Oliver Cox, a lab technician who works as a DNA analyst and coroner at the 99th Precinct.
Jason Mantzoukas as Adrian Pimento, an emotionally unstable and volatile former detective who returned to the 99th Precinct after spending 12 years undercover in the organization of Jimmy "The Butcher" Figgis. He began dating Rosa in "Cheddar", and the two got engaged in "Paranoia", promptly before Pimento and the 99 were forced to fake his death. Pimento returned from hiding when Jimmy "The Butcher" Figgis was caught, but was refused his old job at the NYPD and became a Private Investigator. His relationship continued with Rosa, but she later broke up with him in season five. He spent the next couple of months in Alaska before returning to Brooklyn as an insurance agent in "Gray Star Mutual", but was fired and started working at a hand lotion store. In "Pimemento", he became a private investigator once more and started working with celebrities. In the series finale, after Rosa uses him as a distraction to try and win the final heist, he flew to Canada upon being hired to protect a diamond mine from a pack of wolves.
James M. Connor as Deputy Commissioner Podolski, the NYPD's arrogant deputy police commissioner who uses his position for his own personal means such as keeping his rebellious son, Trevor, out of jail in "The Tagger".
Michael G. Hagerty as Captain McGintley, the 99th Precinct's commanding officer before Raymond Holt, who was fired for his ineptitude and his permissive attitude toward the disruptive antics of Jake and his colleagues. McGintley later died in the episode "99" and the squad attended his funeral in Los Angeles.
Kyra Sedgwick as Madeline Wuntch, a callous and unethical NYPD deputy police chief who shared a deep mutual hostility with Captain Holt. Wuntch and Holt were once partners and friends, but they fell out after Holt rejected her sexual advances and Wuntch gained promotions for which Holt was passed over, resulting in Wuntch eventually becoming Holt's direct superior. Wuntch constantly went out of her way to undermine the 99th Precinct, and appeared to take great pleasure in its and Holt's failures; Holt, in turn, gleefully insulted and belittled Wuntch every time their paths cross. In "The Chopper" and "Johnny and Dora", she culminated her victory over Holt when she makes him head of the NYPD Public Affairs Division, where she humiliated him by making him do menial jobs, although he is eventually transferred back to the 99 thanks to Jake. In "Suicide Squad", she helped Jake and the Nine-Nine expose Commissioner Kelly's illegal wiretapping activity and became the acting commissioner until a new one was decided on. Wuntch died in the episode "Ding Dong" from unknown causes. At her memorial, Holt admitted that he will genuinely miss her and their rivalry.
Perry L. Brown as Marcus Marinovich, a judge at the New York Court of Appeals who sometimes oversees cases for the 99. He served as the judge when Peralta and Diaz were on trial in "Crime and Punishment".
Will Hines as Carl Kurm, the Kings County District Attorney who sometimes works with the 99 during court cases.
Ken Marino as Captain Jason "C.J." Stentley, the Nine-Nine's temporary, under-qualified captain when Jake and Holt were in witness protection. Not wanting his ineptitude to be evident, he gave everyone everything they asked for until Amy eventually requested he starts being more firm. This backfired after he rejected their request to go to Florida to assist Jake and Holt and he assigned them to the night shift. He was eventually removed from the Captain position after he was rewarded for taking down a major drug dealer (that Jake and Holt primarily took care of) and demonstrated his lack of professionalism in front of a group of reporters. It's revealed that Holt called the reporters in to help the crew return to the day shift. He is recruited onto Jake's "suicide squad" to help take down Commissioner John Kelly, with his role acting as a kidnapping victim, but his incompetence nearly derails their plans.
Allison Tolman as Captain Olivia Crawford, a candidate for the Commissioner position Holt was also seeking. She holds the belief that precincts should be eliminated, creating a rivalry with Holt. However, she and Holt realized that their competition will split the votes and cause John Kelly to win. She eventually withdrew her candidacy to thank Holt for publicly calling out the selection committee when they admitted they only nominated her for PR purposes and had no intention of actually considering her for the role.
Matt Walsh as Detective Lohank, a night-shift worker for the 99th precinct who shares Diaz's desk. Lohank is shown to have an unfortunate personal life; his wife is addicted to painkillers, whilst he suffers from prostate cancer. He owns a summer cabin, dubbed "Stink Puddle Manor", which he lends to Jeffords, Peralta, and Boyle in "Into the Woods".
Vanessa Bayer as Debbie Fogle, Holt's partner when he got demoted down to patrolman. She doesn't appear to have any friends and is very naive. It is later revealed that she was working for a notorious crime boss named Silvio Nucci and stole machine guns and cocaine from the evidence locker room. Jake and Rosa initially pretended to be dirty cops so they can get her to lead them to Nucci, but she overpowered both of them after ingesting some of the cocaine. After discovering most of Debbie's bad choices stemmed from her parents treating her poorly, Rosa empathized with her and convinced her to free them so they could take down Nucci together. Rosa later convinced the District Attorney to go easy on Debbie to give her a reduced sentence.
Family and friends of main characters
Kevin Dorff as Hank, the bartender at Shaw's Bar, the squad's favorite bar.
Marc Evan Jackson as Kevin M. Cozner, Holt's husband and the Chair of Columbia University's Classics Department. In "Christmas" (S01E11), Captain Holt reveals that his "cute nickname" for Kevin is simply "Kevin". He dislikes the NYPD due to their treatment of Holt and his homosexuality during his earlier years on the force but thaws a little when Jake shows him how much the 99th respects and cares for Holt. Like his husband, Kevin is cold, sardonic, formal, and unemotional, although he claims that Raymond is the "funny" one in their relationship, something that puzzles the detectives. Cozner develops a rapport with Holt's assistant Gina Linetti, referring to her by her first name (by contrast, he takes pains to always call Jake "Peralta"). He also learned a couple of self-defense techniques from his husband and used them to rescue Holt and Jake from Seamus Murphy. The two own a Pembroke Welsh Corgi named Cheddar.
Craig Robinson as Doug Judy, aka "The Pontiac Bandit", an intelligent, happy-go-lucky thief and forger who exclusively steals Pontiac vehicles and has appeared in one episode every season. Judy has a talent for staying one step ahead of Jake, who initially considers him his nemesis and tries to bring him to justice, but by season three Judy considers Jake his best friend. By season four, the feeling is mutual, and Judy is given immunity for his past crimes after helping Jake and Holt capture his brother, an escaped convicted murderer. In season five, he appears to have gone straight and has started selling cars to child celebrities. When a shady figure from his past shows up and threatens his mother, he enlists Jake's help in taking him down, but escapes the cops and steals diamonds, which nearly costs Jake his job. In season six, Doug works as a disc jockey for Bar Mitzvahs as his sister, Trudy, becomes the new Pontiac Bandit. In season seven, he married a federal judge named Katherine Joyner and asked Jake to be his best man. In season eight, he is finally arrested for his crimes in a different state and made one last attempt to evade Jake, but ends up saving him from one of Trudy's men. However, he escaped after Jake gave him a pen to get out of his handcuffs and moved to Amsterdam with his wife.
Eva Longoria as Sophia Perez, a defense attorney who dates Jake in season two. Jake and Sophia meet in "Jake and Sophia" and engage in a one-night stand before he discovers that she represents a criminal against whom he is testifying. Despite the initial hostility, they eventually reconcile and begin a relationship. In "The Defense Rests", Sophia ends the relationship due to their professional and personal incompatibility, which leaves Jake saddened.
Jillian Davis as Jenny Gildenhorn, Jake's childhood sweetheart. Throughout the first 2 seasons, Jake is shown to have a minor obsession with her, hung up from losing her to Eddie Fung at his bar mitzvah. Jenny makes her only appearance in "The Boyle-Linetti Wedding" as a wedding guest. Jake initially saw it as an opportunity to finally make a move on her. However, Jake moves on from Jenny after seeing her make out with another wedding guest. She isn't seen or mentioned afterward. Jenny is possibly bisexual, as it's mentioned she had a relationship with a woman named Tanya Astor. Tiffany Martin portrays Jenny as a teenager.
Stephen Root as Lynn Boyle, Charles's father who engaged in a romantic encounter with Gina's mother, Darlene. He married Darlene in "The Boyle-Linetti Wedding". He is a retired florist and is known to get overly eager and take big risks like his son. The two eventually divorce with encouragement from Gina. In "Game of Boyles", it is revealed that Charles is not his biological son as his wife had an affair with a rival florist, but still chose to raise him like a true Boyle.
Sandra Bernhard as Darlene Linetti, Gina's mother, who engaged in a romantic encounter with Charles's father, Lynn. She married Lynn in "The Boyle-Linetti Wedding". She is a travel agent and shares her daughter's confidence and superstitions. Gina convinced her mother to divorce Lynn after discovering she had been cheating on him to avoid further hurting the Boyle family.
Marilu Henner as Vivian Ludley, a food author who becomes romantically involved with Boyle. In "Full Boyle", she and Boyle become engaged, until she breaks it off in "Charges and Specs" when Boyle refuses to move to Canada with her.
Bradley Whitford as Captain Roger Peralta, Jake's absentee father and commercial airline pilot. He left his family when Jake was at a young age and has cheated on his wife with multiple women. He eventually attempts to reconcile with Jake and Karen even when the latter knew about an affair with their neighbor. In "Two Turkeys" it's revealed that besides Jake he has three daughters with other women and an unknown amount of other sons.
Katey Sagal as Karen Peralta, Jake's mother. She is a public school art teacher who worked hard to raise Jake as a single mother after Roger left the family. Despite their past, Karen eventually begins dating Roger again much to Jake's discomfort.
Martin Mull as Admiral Walter Peralta, Jake's grandfather on his father's side. A retired United States Navy Admiral who has a strained relationship with his son.
Nasim Pedrad as Katie Peralta, Jake's half-sister on his father's side as a result of Roger's affairs. She lives in Dallas, Texas, and has a chaotic personality that Jake and Amy have a hard time handling.
Merrin Dungey as Sharon Jeffords, Terry's wife. She is kind and supportive towards her husband and his profession, but can occasionally be stubborn and does not like being lied to. She is often seen taking care of their twin daughters Cagney and Lacey and eventually gives birth to their third daughter Ava in season three.
Kelsey and Skyler Yates (seasons 3–4) and Dani and Dannah Lockett (season 7) as Cagney and Lacey Jeffords, Terry and Sharon's twin daughters.
Jamal Duff as Zeke, Terry's brother-in-law. Zeke has an even more intimidating physique than Terry and is also significantly taller. He often taunts Terry, calling him "Tiny Terry", and mocking his police work, leaving Terry to turn to Captain Holt for help.
Jimmy Smits as Victor Santiago, Amy's father. He is a retired cop and is shown to be overly organized and competitive like his daughter. He initially does not approve of Amy's relationship with Jake, but changes his mind and respects his daughter's decision after the two solve one of Victor's older cases.
Bertila Damas as Camila Santiago, Amy's mother. Like her daughter, she can occasionally be over-controlling and competitive.
Lin-Manuel Miranda as David Santiago, Amy's older brother. He is an NYPD Lieutenant who often makes Amy jealous of his accomplishments and for being their parents' favorite child.
Nick Cannon as Marcus, Holt's nephew, who begins a romantic relationship with Detective Rosa Diaz in season two. Rosa breaks up with him in season three due to him being too emotional for her and also because he wanted to get married which she was not ready for.
Niecy Nash as Debbie, Holt's sister. Unlike her brother, she tends to be loud and overdramatic about her life, making it difficult for Holt to be around her.
L. Scott Caldwell as Laverne Holt, Holt's mother and a federal judge. Holt refers to her as "Your Honor".
Mary Lynn Rajskub as Genevieve Mirren-Carter, an art curator who was initially framed for stealing her own paintings for the insurance money. She was eventually vindicated by Charles and begins dating him over similar interests. Genevieve and Charles adopted a son, Nikolaj, on whom he dotes.
Antonio Raul Corbo as Nikolaj Boyle, Charles and Genevieve's adopted Latvian son.
Danny Trejo as Oscar Diaz, Rosa's father. He is a school teacher who is intimidating and tough like his daughter. When Rosa comes out as bisexual, he doesn't take it well at first but manages to accept his daughter for who she is.
Olga Merediz as Julia Diaz, Rosa's mother. Unlike her husband, it took longer for her to fully accept her daughter's bisexuality.
Sarah Baker as Kylie, Amy's only friend outside of the precinct, who works for the Department of Records.
Cameron Esposito as Jocelyn Pryce, Rosa's former girlfriend who works as a cosmetologist.
Joel McKinnon Miller as Earl Scully, Norm's twin brother who looks and behaves identically to him. The two had a brief falling out when Norm's wife cheated on him with Earl.
Winston Story as Bill Hummertrout, a male prostitute whom Charles and Jake hire on the fifth Halloween heist due to his resemblance to Charles. He later gets the two involved in a pyramid scheme called "Nutriboom," and appears in all the heists starting from the fourth. During the events of the seventh heist, he appears to have become homeless during the six months the heist took place.
Tim Meadows as Caleb John Gosche, Jake's cellmate, a cannibal child murderer into woodworking. Despite his carnivorous tendencies, he befriends Jake and saves his life from Jeff Romero, resulting in his transfer to a New York prison. In "Sicko", Jake and Charles turn to him for advice when they start tracking down a serial killer.
Antagonists
Chris Parnell as Geoffrey Hoytsman, Sophia's boss at the Public Defender's office who has issues with drugs. Jake arrests him for using cocaine in "The Defense Rests", which ultimately leads to Sophia breaking up with Jake. He returned in "Sabotage", where he attempted to get revenge on Jake for ruining his life, but was foiled by Amy and Rosa.
Aida Turturro as Maura Figgis, the sister of notorious gangster Jimmy "The Butcher" Figgis. She leads a prison gang in a maximum-security women's penitentiary in Texas. Amy goes undercover as "Isobel Cortez" within the prison to learn the identity of Figgis' FBI contact from Maura.
Eric Roberts as Jimmy "The Butcher" Figgis, a mobster whom Pimento went undercover to investigate. He made a threat against Jake and Holt's lives, forcing them to go into hiding. After months of witness protection, Jake and Holt lured Figgis into Florida to take him down with help from the Nine-Nine.
Dennis Haysbert as Bob Annderson, a former partner of Holt's who eventually worked for the FBI. He is brought in to help find info on the mole working for Jimmy "The Butcher" Figgis, but when going to interrogate a witness, Annderson pulls a gun on Holt and revealed that he was the mole the entire time. The Nine-Nine was able to capture Annderson and con him into revealing the files he has on Figgis, leading to Annderson's arrest and the destruction of Figgis' empire.
Gina Gershon as Lieutenant Melanie Hawkins, the head of the NYPD's most elite task force. Jake and Rosa both admired her and competed against each other for a spot on her team. However, they soon learned that her team was a bank robbery crew. When they tried to work undercover to bring her down, she framed Jake and Rosa and got them convicted for armed robbery. However, Holt received inside information from mobster Seamus Murphy, leading to Hawkins' arrest and Jake and Rosa's exoneration.
Paul Adelstein as Seamus Murphy, a notorious mobster. He assisted the Nine-Nine in exposing Hawkins' crimes, as the two sides saw Hawkins as a common threat. Murphy offered Amy incriminating information about Hawkins in exchange for a favor, which Holt told her to refuse. Holt later accepted the information himself to keep Amy safe and free Jake and Rosa from prison. When Murphy claimed his favor, Jake and Charles found a way to allow Holt to keep up his end of the bargain while secretly stopping Seamus' illegal activities. When Seamus discovered this, he threatened Kevin's life, leading to Jake and Kevin going into isolation for two months. Holt and Jake are captured by Seamus, but Kevin rescued both of them, and Murphy and his men were apprehended by the FBI.
Phil Reeves as Commissioner John Kelly. Kelly was named Commissioner at the beginning of Season 6, having won against Holt. His demeanor is extremely condescending and dismissive. Kelly planned to implement a "vigilant policing initiative", which Holt opposed as he believed it would simply be "stop-and-frisk" under a new name. Kelly retaliated by worsening the Nine-Nine's working conditions. In the episode "Sicko", he introduced an app that allows the public to send in anonymous tips; but it is revealed that Kelly has developed the app to cover up the illegal use of a Stingray Phone Tracker to spy on civilians. When Jake and the Nine-Nine--together with the "Suicide Squad", Vulture, CJ, and Madeleine Wuntch--exposed him, he was fired, though Wuntch, as acting Commissioner, told Holt that Kelly had secured a "higher-paying job in the private sector".
John C. McGinley as Frank O'Sullivan. O'Sullivan is the hard-headed, stubborn, ignorant and bombastic President of the (fictional) NYPD 'Patrolman's Union', and a recurring antagonist in Season 8, constantly getting in the way of the Nine-Nine's attempts to help actually reform the NYPD. He still lives with his mother despite being in his fifties, is a big fan of Billy Joel and views cops as completely infallible and undeserving of any kind of consequences or punishment, regardless of their actions and will defend dirty or overzealous cops with every underhanded trick and loophole he knows. He has a preternaturally high alcohol tolerance, enjoying beers regularly even at breakfast. His LGBTQ views are archaic at best; he attempts to blackmail both Holt and Rosa by threatening to reveal their sexualities to the public and is visibly mystified and annoyed when they tell him that they came out ages ago. Despite his attempts to sabotage the reform program, it passed but O'Sullivan still gets reelected to his position for life, a feat Holt believed was impossible.
Guest stars (in order of appearance)
Fred Armisen as Mlepnos (also spelled Melipnos or Mlep(clay)nos), a confused foreign man living in a building where a murder took place. The detectives run into Mlepnos in the pilot episode while searching for witnesses. He shows up again in "Operation: Broken Feather". In "Jake and Amy", Hitchcock and Scully recruit him to perform the violin at Jake and Amy's wedding. In his recurring appearances, he denies meeting Jake before and changes his name.
Andy Richter as Hawley, a sarcastic and childish doorman who refuses to assist Jake during routine questioning.
Pete Davidson as Steve, an at-risk kid who interrupts and makes fun of Diaz and Santiago. When Gina lists her reasons for joining the program, he still doesn't sign up for the Junior Police program.
Helen Slayton-Hughes as Ethel Musterberg, a senile woman mistaken for a missing person.
Mary Elizabeth Ellis as Rossi, a medical examiner whom Jake hooks up with.
Kid Cudi as Dustin Whitman, a perpetrator Jake arrests on suspicion of burglary. Whitman mocks Jake by calling him "Joke Peralta" when he learns that Jake does not have sufficient evidence to convict him of a crime, but learns to his regret that he has underestimated Det. Peralta's ability.
Stacy Keach as Jimmy Brogan, a crime writer from the 1970s whom Peralta greatly admires. Brogan is revealed to be bigoted, racist, homophobic, vengeful, and manipulative, disillusioning Peralta and leading to a physical altercation between the two when Peralta punches Brogan for slurs against Holt.
Jerry Minor as Jerry Grundhaven, a defense attorney who antagonizes Diaz in court.
Joey Diaz as Sal, the owner of a pizzeria that got burned down; Jake and Charles have to deal with Fire Marshall Boone on the case.
Allen Evangelista as "Savant" (Corey Park), the 99th precinct's IT director. He is hired after he hacks the precinct's server out of boredom (he was caught because his mom tipped off the police).
Adam Sandler as himself, appearing at an auction Jake went undercover at. He proceeds to humiliate Jake onstage.
Joe Theismann as himself, appearing at an auction Jake went undercover at.
Nate Torrence as Super Dan, a local vigilante whom Rosa and Amy don't take seriously.
Sean Whalen as Bill Voss, a criminal with several warrants who accepts a fake trip to the Bahamas before being arrested by Diaz and Jeffords.
Beth Dover as Janice, a stationery store employee whom Charles and Jake go to pick up wedding invitations.
Ian Roberts as Lucas Wint, a civic leader who Jake suspects is laundering money for drug dealers.
Jenny Slate as Bianca, the girlfriend of a powerful Italian-American mobster.
Apollo Robbins as Dan "Fingers" McCreary, a thief Jake hires to help steal Holt's watch during the Halloween heist.
Dan Bakkedahl as Andrew Miller, a lieutenant and investigator from Internal Affairs. He investigates the 99th Precinct for a possible undercover mole until the detectives discover that he himself is spying on the precinct at the behest of Wuntch. Miller suffers from paranoid germophobia.
Ed Helms as Jack Danger (pronounced donger), an egomaniacal, incompetent, obnoxious agent for the United States Postal Inspection Service whom Jake had to deal with while tracking the Giggle Pig drug gang.
Nick Kroll as Kendrick, a condescending agent from the Department of Homeland Security who has no respect for the NYPD and makes detectives from the Nine-Nine serve as taped-up "hostages" during a counterterrorism training exercise for Federal law enforcement agencies. After Jake leads a 99th rebellion that sees the cops take out nearly all of the Feds, Kendrick manages to "shoot" Jake and informs him the NYPD will not be invited to any future events.
Garret Dillahunt as Dave Majors, New York City's best detective whom Jake and Amy greatly admire. He takes an interest in Amy much to Jake's dismay, but she turns him down, citing her previous relationship with Teddy.
Bill Hader as Seth Dozerman, the new Captain of the 99th Precinct after the transfer of Captain Holt to the Public Affairs Division. Within moments of meeting the squad, he rants about their lack of efficiency and his obsession with it, before suffering a heart attack. On his second day, he discloses that he has a genetic heart condition that drastically reduces his life expectancy. He then suffers another heart attack after witnessing Jake and Amy kiss and dies.
Archie Panjabi as Singh, an NYPD lieutenant who Boyle hooks up with at Dozerman's funeral.
Jon Daly as Bram Applebaum, a half-Scottish bagpipe player for the NYPD Pipes and Drums, who performs at Dozerman's funeral.
James Urbaniak as Nick Lingeman, Genevieve's ex-boyfriend and an art gallery owner who Jake and Charles suspect framed Genevieve.
Stormi Henley as Dvora, Nick's assistant who is romantically interested in him.
Nick Offerman as Frederick, Holt's ex-boyfriend who broke up with him after Holt threw Frederick's duck ornament off of the Brooklyn Bridge.
Anders Holm as Søren Knausgaard, a Swedish police officer who works a case involving stolen jewels from Sweden with Jake and Rosa.
Riki Lindhome as Agneta Carlsson, a Swedish police officer who works a case involving stolen jewels from Sweden with Jake and Rosa.
Neil deGrasse Tyson as himself, appearing in the precinct to aid Gina in her study of astrophysics. He is Terry's gym buddy.
Kathryn Hahn as Eleanor Horstweil, Charles's ex-wife who appears after Charles attempts to withdraw his sperm from cold storage.
Oscar Nunez as Dr. Porp, a doctor who diagnosed Jake and Holt with the mumps.
Paul F. Tompkins as Orleans, the captain of the cruise ship Jake and Amy go on.
Damon Wayans Jr. as Stevie Schillens, Jake's former partner who comes to the precinct after renovations commence at his own.
Brad Hall as John William Weichselbraun, a classical oboist who claims his instrument was stolen; also one of Holt's heroes.
Kate Flannery as "Mean" Marge Bronigan, the precinct's custodian.
Matt Besser as Holderton, a detective from the 65th precinct who makes fun of Terry for accusing a cat of being a thief.
Maya Rudolph as Karen Haas, a United States Deputy Marshal who serves as Jake's and Holt's contact while they are in Witness Protection in Florida.
Rhea Perlman as Estelle, a member of Holt's alias Greg's walking group.
Jorma Taccone as Taylor, the manager of a children's funhouse Holt works at while hiding as Greg.
Betsy Sodaro as Jordan Carfton, a lady who took a video that could expose Jake and Holt while they were in Witness Protection.
Esther Povitsky as Emily, Gina's new assistant granted by Captain Stentley. She's under strict orders from Gina to mock Amy whenever there's an opening.
Jim O'Heir as Reynolds, a homophobic police sheriff in Florida who detains Jake and Holt after stopping them with a copious number of guns and amount of ammo.
Zooey Deschanel as Jess Day, a Los Angeles resident who is visiting New York and unwillingly assists Jake in chasing a suspect. Deschanel's appearance is part of a crossover between Brooklyn Nine-Nine and New Girl.
Fred Melamed as DC Parlov, the author of the Skyfire books, which Terry (and later Jake) are huge fans of. He begins to receive death threats, resulting in Jake and Terry having to protect him. Later the manuscript for his upcoming book is stolen, but it turns out to be an inside job resulting in his arrest.
Eric Edelstein as Kurt Ovarp, a Skyfire fan who Jake and Terry suspect sent the threat to DC Parlov.
Marshawn Lynch as himself, who witnesses a prison escape after the transport van crashes.
Charles Baker as George Judy, an escaped convicted murderer, and Doug Judy's former foster brother.
Jama Williamson as Rachel, Teddy's girlfriend who witness him propose to Amy after Jazz brunch.
Kimberly Hébert Gregory as Veronica Hopkins, Terry's ex-girlfriend and fellow NYPD officer. She holds a massive grudge against Terry for their break-up (as she finds out Terry planned to break up with her a year earlier without telling her) and holds it against the precinct when she's assigned to audit it.
Nathan Fillion as Mark Deveraux, an actor who plays a detective on a series called Serve & Protect. Deveraux attempts to assist Jake and Rosa when a crime occurs on the show's set, though he's later revealed to be the culprit and is kicked off the show.
Greg Germann as Gary Lurmax, the executive producer of Serve & Protect. He nearly gives Jake a consulting position on the show, but after Jake lashes out at him and accuses him of a crime he didn't commit, he gets back at Jake by creating an unlikable character on the show named Jake Peralta and has him brutally murdered.
Kelly Sullivan as Cassie Sinclair, an actress who plays a detective on a series called Serve & Protect. She reports her laptop as stolen, prompting Peralta and Diaz to investigate the set. She is described as rapidly gaining popularity on the show, with a spin-off for her character being developed and causing tensions on the set.
Desmond Harrington as Maldack, an NYPD uniformed officer who used racial profiling to stop and question Sergeant Jeffords in "Moo Moo". After an unsuccessful meeting with Maldack, and much deliberation with Captain Holt, Jeffords filed an official complaint about the incident.
Andy Daly as Jeffrey Bouche, Holt's rival who hurts his presentation at Cop-Con.
Audrey Wasilewski as Cindy Shatz, a Cop-Con attendee who is extremely similar to Scully and later begins dating him.
Ryan Phillippe as Milton Boyle, Boyle's cousin who begins a relationship with Gina when he impregnates her.
Brent Briscoe as Matthew Langdon, an ex-NYPD officer who went into hiding once learning of Hawkins crookedness. It's later revealed he's an associate of Hawkins, tricking Jake and Rosa into bringing him in as a witness.
Eugene Cordero as Pandemic, a hacker and friend of Boyle who tries to help clear Peralta and Diaz from crimes.
Kulap Vilaysack as Jennifer "Nightmare" Huggins, a hacker and colleague of Pandemic who tries to help clear Peralta and Diaz of bank robbery.
Scott Aukerman as Glandis, a hacker and colleague of Pandemic who tries to help clear Peralta and Diaz of bank robbery.
Lou Diamond Phillips as Jeff Romero, another inmate whose gang Jake joins.
Toby Huss as Granville, a prison warden who tries to cut a deal with Jake to work as a snitch.
Danielle Aubuchon as Jenny, Hitchcock's prison hook-up, possibly girlfriend, who is incarcerated in the same penitentiary as Diaz.
Amy Okuda as Chiaki, Terry's girlfriend while living in Japan.
Maria Thayer as Jean Munhroe, The Vulture's ex-fiancé who works at a charity that provides rice to starving children in Africa.
Rob Huebel as Landon Lawson, a rival fantasy author to Parlov.
Reggie Lee as Ronald Yee, a forensic expert whom Holt and Amy try to impress.
Paul Scheer as Devin Cathertaur, the Cyber Crimes division leader who takes the precinct's bandwidth.
Mike Mitchell as Kyle Murphy, Seamus's dimwitted nephew who's been excluded from the Mafia family for his ineptitude.
Chris Bauer as Dennis Kole, a Negotiator for the NYPD Emergency Service Unit, with the terrible record of having 49 of his first 50 jumpers die. He was called onto what was his first hostage situation in a jewelry store on Atlantic Avenue in "The Negotiation". The hostage-taker, who turned out to be Doug Judy, called for Det. Peralta to negotiate instead, and then later Detectives Diaz and Scully, something that Kole was resentful about.
Sterling K. Brown as Philip Davidson, a dentist who is a suspect in a murder case that Holt and Peralta interrogate throughout a night.
Romy Rosemont as Claire Damont, Davidson's lawyer.
David Fumero as Melvin "Vin" Stermly, Amy's favorite crossword puzzle author who is also a swimsuit model.
Will Shortz as Sam Jepson, a friend of Vin's who Jake suspects is behind a series of fires.
Jay Chandrasekhar as himself, who gets conned into being the celebrity spokesperson for the pyramid scheme Nutriboom.
Kirk Fox as Kurt, Kate Peralta's ex-boyfriend.
Reginald VelJohnson as himself, whom Charles hires for Jake's Bachelor Party to give a clue for their scavenger hunt but ends up being their designated driver.
Blake Anderson as Constantine Kane, a member of a rock band whom Amy once dated. He is still in love with Amy and takes a gig to perform at Jake's and Amy's wedding to try to win her back, but Amy burns the contract before it can happen.
Akiva Schaffer as Brett Booth, a 63rd Precinct detective who is running a task-force which Peralta and Boyle both want to join, but Booth refuses them as he still holds Jake accountable for his visual impairment.
Gina Rodriguez as Alicia, a taxi driver and potential love interest for Rosa whom Terry tries to push towards.
Kyle Gass as Dario Moretti, a money launderer turned bomber whom Amy arrested. He attempted to ruin Jake's and Amy's nuptials by planting a bomb in the air vents of the recreation center on the day of their wedding.
Daniel Di Tomasso and Robert Maffia as Gio Costa, a well-mannered drug-running mafia boss whom Hitchcock and Scully apprehended in the 1980s.
Decker Sadowski and Donna D'Errico as Marissa Costa, ex-wife of criminal Gio Costa, who lives under a pseudonym as Donna, the manager of a Wing Slutz in Marine Park. She worked as a CI for Detectives Hitchcock and Scully in the mid-1980s and aided in the capture of her then-husband for his drug crimes. Hitchcock and Scully stole one of Gio Costa's bags of drug money to help protect her in her new identity, and frequently stopped by Wing Slutz to check in on Marissa's safety.
Paul Rust as Mikey Joseph, one of Jake's and Gina's former classmates who is still pursuing his high-school ambitions of making it as a Ska bassist.
Eugene Lee Yang as a staff member of The Manhattan Club, a bar which Jake and Gina visit.
Mario Lopez as himself, who gets tricked into attending Gina's going away party only to be rejected.
Nicole Byer as Trudy Judy, Doug Judy's younger sister who succeeds him as the new "Pontiac Bandit" after discovering his notes. Despite going to prison in her first appearance, she is released early for good behavior and remains close with Doug.
Rob Riggle as Rob Dulubnik, an NYFD firefighter whom the Nine-Nine compete against to have control over Shaw's.
Michael Mosley as Franco McCoy, a detective of the NYPD CSU. McCoy is self-enthusiastic to the point of arrogance and clashes with Peralta and Diaz at an 'unsolvable' crime scene.
Karan Soni as Gordon Lundt, a spy whom Commissioner Kelly sent to spy on Holt. He was trying to get the opening as the Civilian Administrator.
Jonathan Chase as Seth Haggerty, a banker whose penile injuries caught the imagination of the 99.
Briga Heelan as Keri Brennan, an expert in statistical arbitrage, who was sexually assaulted by her boss and decided to press charges in a "he said, she said" scenario.
Richard Finkelstein and E.J. Callahan as Ernest Zumowski aka "The Disco Strangler", Holt's most infamous collar from his career as a detective, who is feared dead in a prison van accident.
Ike Barinholtz as Gintars Irbe, a Latvian clothing counterfeiter who is Nikolaj's biological father.
David Paymer as William Tate, a therapist with a murdered client. He was investigated by Jake and Charles, and later revealed as the murderer.
Julia Sweeney as Pam, a patient in the hospital room next to where Jake and Amy are having their "Casecation" and constantly is entering their room.
Oliver Muirhead as Wesley Allister, the dean at the classics department Kevin works at and who thinks Captain Holt is unintelligent.
Bob Stephenson as Randy, a janitor at the university who stole the expensive coins and tried to frame another professor.
Sarah Claspell as Heather, one of the uniformed officers under Santiago's command.
Sean Astin as Knox, a murder suspect who disguises himself as an NYPD sergeant to erase the evidence of his crime.
Travis Coles as "Broadway" Brian Floomryde, a would-be performer who works as a civilian administrator in the records department of the 99th Precinct. Jeffords managed to convince Floomryde to quit his job to pursue his Broadway dreams so as to remain at the Precinct; however, after learning that he was vocally untalented and had a young family, Jeffords told Floomryde not to quit.
Nicole Bilderback as Julie Kim, the new Captain of the 99th Precinct for a day while Holt spends his time as a patrolman. She quits after she finds out that Peralta is trying to dig up some dirt on her.
Jim Rash as Dr. Jones, Pimento's doctor who claims he is suffering from anterograde amnesia when in reality, he is trying to kill Pimento since his wife hired Pimento to investigate if he was having an affair.
Michael McDonald as Adam Jarver, Wuntch's nephew. He initially pretends to be another nemesis to Wuntch at her memorial at his late aunt's request to expose Holt's insults toward her as a final attempt to ruin her rival's career, but Holt outsmarted both of them by throwing a fake memorial.
J. K. Simmons as Frank Dillman, a detective respected by Holt for his highly analytical approach. Despite his keen observational skills, he was fired by the NYPD and SFPD and worked part time at a Yarn Barn.
Eva La Dare as Captain Brenda Shawnks, the lead on the selection panel for the NYPD Police Band.
Will Hines as Carl Kurm, an Assistant district attorney who tries to get Hitchcock & Scully punished for not taking down the name of a witness needed in court.
Kenny Stevenson as Officer Mark, a uniformed officer at the 99 who often appears with the squad.
Jon Gabrus as Curt, a firefighter with the FDNY who responded to the 99's call when a powercut trapped Holt & Jeffords in an elevator, and later delivered Santiago's child.
Jill Basey as Dotty, an elderly civilian who asks Peralta & Boyle for help during a blackout, only to constantly criticise them and later be arrested.
Ellie Reed as Kayla, a bachelorette whose pedal pub is commandeered by Peralta & Boyle.
Brendan McNamara as Russ, a suspected drink-driver who stages a crash to cause a blackout.
Paul Witten as Todd, a man Amy and Rosa set Holt up on a date with in an attempt to bring him closer to Kevin.
Joanna Newsom as Caroline Saint-Jacques Renard, the associate principal cellist for the Berlin Philharmonic whom Holt hired to perform during the final heist.
Notes
References
Characters
Fictional characters from New York City
Television characters introduced in 2013
Fictional New York City Police Department detectives
Lists of American crime television series characters
Lists of American sitcom television characters
Fictional secret agents and spies |
18934536 | https://en.wikipedia.org/wiki/Asymmetric%20digital%20subscriber%20line | Asymmetric digital subscriber line | Asymmetric digital subscriber line (ADSL) is a type of digital subscriber line (DSL) technology, a data communications technology that enables faster data transmission over copper telephone lines than a conventional voiceband modem can provide. ADSL differs from the less common symmetric digital subscriber line (SDSL). In ADSL, bandwidth and bit rate are said to be asymmetric, meaning greater toward the customer premises (downstream) than the reverse (upstream). Providers usually market ADSL as an Internet access service primarily for downloading content from the Internet, but not for serving content accessed by others.
Overview
ADSL works by using spectrum above the band used by voice telephone calls. With a DSL filter, often called splitter, the frequency bands are isolated, permitting a single telephone line to be used for both ADSL service and telephone calls at the same time. ADSL is generally only installed for short distances from the telephone exchange (the last mile), typically less than , but has been known to exceed if the originally laid wire gauge allows for further distribution.
At the telephone exchange, the line generally terminates at a digital subscriber line access multiplexer (DSLAM) where another frequency splitter separates the voice band signal for the conventional phone network. Data carried by the ADSL are typically routed over the telephone company's data network and eventually reach a conventional Internet Protocol network.
There are both technical and marketing reasons why ADSL is in many places the most common type offered to home users. On the technical side, there is likely to be more crosstalk from other circuits at the DSLAM end (where the wires from many local loops are close to each other) than at the customer premises. Thus the upload signal is weakest at the noisiest part of the local loop, while the download signal is strongest at the noisiest part of the local loop. It therefore makes technical sense to have the DSLAM transmit at a higher bit rate than does the modem on the customer end. Since the typical home user in fact does prefer a higher download speed, the telephone companies chose to make a virtue out of necessity, hence ADSL.
The marketing reasons for an asymmetric connection are that, firstly, most users of internet traffic will require less data to be uploaded than downloaded. For example, in normal web browsing, a user will visit a number of web sites and will need to download the data that comprises the web pages from the site, images, text, sound files etc. but they will only upload a small amount of data, as the only uploaded data is that used for the purpose of verifying the receipt of the downloaded data (in very common TCP connections) or any data inputted by the user into forms etc. This provides a justification for internet service providers to offer a more expensive service aimed at commercial users who host websites, and who therefore need a service which allows for as much data to be uploaded as downloaded. File sharing applications are an obvious exception to this situation. Secondly internet service providers, seeking to avoid overloading of their backbone connections, have traditionally tried to limit uses such as file sharing which generate a lot of uploads.
Operation
Currently, most ADSL communication is full-duplex. Full-duplex ADSL communication is usually achieved on a wire pair by either frequency-division duplex (FDD), echo-cancelling duplex (ECD), or time-division duplex (TDD). FDD uses two separate frequency bands, referred to as the upstream and downstream bands. The upstream band is used for communication from the end user to the telephone central office. The downstream band is used for communicating from the central office to the end user.
With commonly deployed ADSL over POTS (Annex A), the band from 26.075 kHz to 137.825 kHz is used for upstream communication, while 138–1104 kHz is used for downstream communication. Under the usual DMT scheme, each of these is further divided into smaller frequency channels of 4.3125 kHz. These frequency channels are sometimes termed bins. During initial training to optimize transmission quality and speed, the ADSL modem tests each of the bins to determine the signal-to-noise ratio at each bin's frequency. Distance from the telephone exchange, cable characteristics, interference from AM radio stations, and local interference and electrical noise at the modem's location can adversely affect the signal-to-noise ratio at particular frequencies. Bins for frequencies exhibiting a reduced signal-to-noise ratio will be used at a lower throughput rate or not at all; this reduces the maximum link capacity but allows the modem to maintain an adequate connection. The DSL modem will make a plan on how to exploit each of the bins, sometimes termed "bits per bin" allocation. Those bins that have a good signal-to-noise ratio (SNR) will be chosen to transmit signals chosen from a greater number of possible encoded values (this range of possibilities equating to more bits of data sent) in each main clock cycle. The number of possibilities must not be so large that the receiver might incorrectly decode which one was intended in the presence of noise. Noisy bins may only be required to carry as few as two bits, a choice from only one of four possible patterns, or only one bit per bin in the case of ADSL2+, and very noisy bins are not used at all. If the pattern of noise versus frequencies heard in the bins changes, the DSL modem can alter the bits-per-bin allocations, in a process called "bitswap", where bins that have become noisier are only required to carry fewer bits and other channels will be chosen to be given a higher burden.
The data transfer capacity the DSL modem therefore reports is determined by the total of the bits-per-bin allocations of all the bins combined. Higher signal-to-noise ratios and more bins being in use gives a higher total link capacity, while lower signal-to-noise ratios or fewer bins being used gives a low link capacity. The total maximum capacity derived from summing the bits-per-bin is reported by DSL modems and is sometimes termed sync rate. This will always be rather misleading: the true maximum link capacity for user data transfer rate will be significantly lower because extra data are transmitted that are termed protocol overhead, reduced figures for PPPoA connections of around 84–87 percent, at most, being common. In addition, some ISPs will have traffic policies that limit maximum transfer rates further in the networks beyond the exchange, and traffic congestion on the Internet, heavy loading on servers and slowness or inefficiency in customers' computers may all contribute to reductions below the maximum attainable. When a wireless access point is used, low or unstable wireless signal quality can also cause reduction or fluctuation of actual speed.
In fixed-rate mode, the sync rate is predefined by the operator and the DSL modem chooses a bits-per-bin allocation that yields an approximately equal error rate in each bin. In variable-rate mode, the bits-per-bin are chosen to maximize the sync rate, subject to a tolerable error risk. These choices can either be conservative, where the modem chooses to allocate fewer bits per bin than it possibly could, a choice that makes for a slower connection, or less conservative in which more bits per bin are chosen in which case there is a greater risk case of error should future signal-to-noise ratios deteriorate to the point where the bits-per-bin allocations chosen are too high to cope with the greater noise present. This conservatism, involving a choice of using fewer bits per bin as a safeguard against future noise increases, is reported as the signal-to-noise ratio margin or SNR margin.
The telephone exchange can indicate a suggested SNR margin to the customer's DSL modem when it initially connects, and the modem may make its bits-per-bin allocation plan accordingly. A high SNR margin will mean a reduced maximum throughput, but greater reliability and stability of the connection. A low SNR margin will mean high speeds, provided the noise level does not increase too much; otherwise, the connection will have to be dropped and renegotiated (resynced). ADSL2+ can better accommodate such circumstances, offering a feature termed seamless rate adaptation (SRA), which can accommodate changes in total link capacity with less disruption to communications.
Vendors may support the usage of higher frequencies as a proprietary extension to the standard. However, this requires matching vendor-supplied equipment on both ends of the line, and will likely result in crosstalk problems that affect other lines in the same bundle.
There is a direct relationship between the number of channels available and the throughput capacity of the ADSL connection. The exact data capacity per channel depends on the modulation method used.
ADSL initially existed in two versions (similar to VDSL), namely CAP and DMT. CAP was the de facto standard for ADSL deployments up until 1996, deployed in 90 percent of ADSL installations at the time. However, DMT was chosen for the first ITU-T ADSL standards, G.992.1 and G.992.2 (also called G.dmt and G.lite respectively). Therefore, all modern installations of ADSL are based on the DMT modulation scheme.
Interleaving and fastpath
ISPs (but users rarely, apart from Australia where it's the default) have the option to use interleaving of packets to counter the effects of burst noise on the telephone line. An interleaved line has a depth, usually 8 to 64, which describes how many Reed–Solomon codewords are accumulated before they are sent. As they can all be sent together, their forward error correction codes can be made more resilient. Interleaving adds latency as all the packets have to first be gathered (or replaced by empty packets) and they, of course, all take time to transmit. 8 frame interleaving adds 5 ms round-trip-time, while 64 deep interleaving adds 25 ms. Other possible depths are 16 and 32.
"Fastpath" connections have an interleaving depth of 1, that is one packet is sent at a time. This has a low latency, usually around 10 ms (interleaving adds to it, this is not greater than interleaved) but it is extremely prone to errors, as any burst of noise can take out the entire packet and so require it all to be retransmitted. Such a burst on a large interleaved packet only blanks part of the packet, it can be recovered from error correction information in the rest of the packet. A "fastpath" connection will result in extremely high latency on a poor line, as each packet will take many retries.
Installation problems
ADSL deployment on an existing plain old telephone service (POTS) telephone line presents some problems because the DSL is within a frequency band that might interact unfavorably with existing equipment connected to the line. It is therefore necessary to install appropriate frequency filters at the customer's premises to avoid interference between the DSL, voice services, and any other connections to the line (for example intruder alarms). This is desirable for the voice service and essential for a reliable ADSL connection.
In the early days of DSL, installation required a technician to visit the premises. A splitter or microfilter was installed near the demarcation point, from which a dedicated data line was installed. This way, the DSL signal is separated as close as possible to the central office and is not attenuated inside the customer's premises. However, this procedure was costly, and also caused problems with customers complaining about having to wait for the technician to perform the installation. So, many DSL providers started offering a "self-install" option, in which the provider provided equipment and instructions to the customer. Instead of separating the DSL signal at the demarcation point, the DSL signal is filtered at each telephone outlet by use of a low-pass filter for voice and a high-pass filter for data, usually enclosed in what is known as a microfilter. This microfilter can be plugged by an end user into any telephone jack: it does not require any rewiring at the customer's premises.
Commonly, microfilters are only low-pass filters, so beyond them only low frequencies (voice signals) can pass. In the data section, a microfilter is not used because digital devices that are intended to extract data from the DSL signal will, themselves, filter out low frequencies. Voice telephone devices will pick up the entire spectrum so high frequencies, including the ADSL signal, will be "heard" as noise in telephone terminals, and will affect and often degrade the service in fax, dataphones and modems. From the point of view of DSL devices, any acceptance of their signal by POTS devices mean that there is a degradation of the DSL signal to the devices, and this is the central reason why these filters are required.
A side effect of the move to the self-install model is that the DSL signal can be degraded, especially if more than 5 voiceband (that is, POTS telephone-like) devices are connected to the line. Once a line has had DSL enabled, the DSL signal is present on all telephone wiring in the building, causing attenuation and echo. A way to circumvent this is to go back to the original model, and install one filter upstream from all telephone jacks in the building, except for the jack to which the DSL modem will be connected. Since this requires wiring changes by the customer, and may not work on some household telephone wiring, it is rarely done. It is usually much easier to install filters at each telephone jack that is in use.
DSL signals may be degraded by older telephone lines, surge protectors, poorly designed microfilters, repetitive electrical impulse noise, and by long telephone extension cords. Telephone extension cords are typically made with small-gauge, multi-strand copper conductors which do not maintain a noise-reducing pair twist. Such cable is more susceptible to electromagnetic interference and has more attenuation than solid twisted-pair copper wires typically wired to telephone jacks. These effects are especially significant where the customer's phone line is more than 4 km from the DSLAM in the telephone exchange, which causes the signal levels to be lower relative to any local noise and attenuation. This will have the effect of reducing speeds or causing connection failures.
Transport protocols
ADSL defines three "Transmission protocol-specific transmission convergence (TPS-TC)" layers:
Synchronous Transport Module (STM), which allows the transmission of frames of the Synchronous Digital Hierarchy (SDH)
Asynchronous Transfer Mode (ATM)
Packet Transfer Mode (starting with ADSL2, see below)
In home installation, the prevalent transport protocol is ATM. On top of ATM, there are multiple possibilities of additional layers of protocols (two of them are abbreviated in a simplified manner as "PPPoA" or "PPPoE"), with the all-important TCP/IP at layers 4 and 3 respectively of the OSI model providing the connection to the Internet.
ADSL standards
See also
ADSL loop extender can be used to expand the reach and rate of ADSL services.
Attenuation distortion
Broadband Internet access
Digital subscriber line access multiplexer
Flat rate
List of device bandwidths
Low-pass filter and ADSL splitter.
Rate-Adaptive Digital Subscriber Line (RADSL)
Single-pair high-speed digital subscriber line (SHDSL)
Symmetric Digital Subscriber Line (SDSL)
References
External links
ITU-T recommendations
Digital subscriber line
Internet terminology
Telecommunications-related introductions in 1998
Digital
sv:Digital Subscriber Line#ADSL |
6002866 | https://en.wikipedia.org/wiki/MSBuild | MSBuild | Microsoft Build Engine, better known as MSBuild, is a free and open-source build tool set for managed code as well as native C++ code and was part of .NET Framework. Visual Studio depends on MSBuild, but not the vice versa. Visual Studio Application Lifecycle Management depends on MSBuild to perform team builds via Azure DevOps Server.
Overview
MSBuild is a build tool that helps automate the process of creating a software product, including compiling the source code, packaging, testing, deployment and creating documentations. With MSBuild, it is possible to build Visual Studio projects and solutions without the Visual Studio IDE installed. MSBuild is free and open-source. MSBuild was previously bundled with .NET Framework; starting with Visual Studio 2013, however, it is bundled with Visual Studio instead. MSBuild is a functional replacement for the nmake utility, which remains in use in projects that originated in older Visual Studio releases.
MSBuild acts on MSBuild project files which have a similar XML syntax to Apache Ant or NAnt. Even though the syntax is based upon well-defined XML schema, the fundamental structure and operation is comparable to the traditional Unix make utility: the user specifies what will be used (typically source code files) and what the result should be (typically a static library, DLL or an executable application), but the utility itself decides what to do and the order in which to carry out the build.
MSBuild can build a project against a supported .NET Framework version of choice. This feature is called "multitargeting". Any given build of a project, however, can only target one version of the framework at a time.
History
MSBuild was first created in 2003 targeting .NET Framework 2.0 for use in Visual Studio 2005 (codenamed Whidbey) and Windows Vista (codenamed Longhorn).
Versions
Terminology
Target A Target contains a set of tasks for MSBuild to execute. The focus of MSBuild is the result Target specified when invoking MSBuild with the project file. This is because a Project may contain several Target entries, each executed sequentially (and conditionally). Subsequent dependent Targets are executed before the requested Target. The execution flow of the current Target can be directed using the following attributes: Condition, BeforeTargets, AfterTargets, & DependsOnTargets. Each Target may be self-contained with the necessary Tasks to complete itself. A Target is typically an action executed on a file, set of files or directory.
Task A Task is a command which is executed in order to complete a Target. Tasks are used to group and execute any number of actions during the build process. They are typically implemented in a .NET assembly as a class which inherits from the Task class or implements the ITask interface. Many basic tasks are shipped as part of the .NET Framework, and community developed tasks are freely available. Some examples of Tasks include copying files, creating directories, or parsing XML.
Properties and Items MSBuild provides Properties and Items, which are conceptually equivalent to make's macros. Properties specify static values, whereas Items are usually used to define sets of files or folders on which to perform Tasks. Specifying files on Items is made easy by the support of wildcards.
See also
List of build automation software
References
Further reading
External links
Build automation
Compiling tools
Free and open-source software
Microsoft free software
Microsoft Visual Studio
Software using the MIT license
2003 software |
46363723 | https://en.wikipedia.org/wiki/Nexway | Nexway | Nexway is a French software and service company for ecommerce and payment.
Nexway enables companies to sell their software and services online in more than 140 countries by connecting their e-store to its e-commerce and payment platform.
Avast, Eset, Fnac Darty, Kaspersky and Veepee are amongst Nexway's.
Headquartered in Paris (France), and with offices in Nîmes (France), Katowice (Poland), Milan (Italy), San Francisco (USA), and Tokyo (Japan), the company has 100 employees and generated a 95M€ turnover in 2019.
History
Nexway was created in 2002 to distribute software to consumers under the name Téléchargement.fr (meaning “download” in French).
In January 2009, Nexway acquires Boonty (en), and enters the market of casual video games’ distribution.
The Company then adds new ecommerce services to its portfolio to help software companies sell online: shopping cart, payment processing, subscription management, customer care…
In October 2018, Nexway SAS and its affiliates are grouped within the same holding company Nexway Group AG.
In January 2019, the German company asknet AG acquires 100% of Nexway Group AG.
In July 2019 asknet AG renames into Nexway AG. Both companies operate under the same brand since then.
In April 2020, asknet AG sells Nexway Group AG to the Swiss holding company BPI Bureau de Promotion Immobilière SA, which becomes the sole shareholder of the Nexway Group AG.
Offer
Nexway Monetize: payment and ecommerce platform to manage the shopping cart, handle payment in more than 140 countries, run subscriptions, invoicing, manage local tax and compliance to local regulations globally. The SaaS platform is based on microservices and APIs and is complemented by managed services such as customer care and marketing campaign management.
Nexway Connect: a digital distribution network that connects software and video games publishers with popular online merchants. The Connect platform acts as a single point of channel management for software companies, and is a lever for audience monetization for merchants that can diversify their offer with a 7000+ titles catalog of ready-to-sell software and games.
References
Companies established in 2002
Online companies of France
Multinational companies |
5392023 | https://en.wikipedia.org/wiki/NI%20Multisim | NI Multisim | NI Multisim (formerly MultiSIM) is an electronic schematic capture and simulation program which is part of a suite of circuit design programs, along with NI Ultiboard. Multisim is one of the few circuit design programs to employ the original Berkeley SPICE based software simulation. Multisim was originally created by a company named Electronics Workbench Group, which is now a division of National Instruments. Multisim includes microcontroller simulation (formerly known as MultiMCU), as well as integrated import and export features to the printed circuit board layout software in the suite, NI Ultiboard.
Multisim is widely used in academia and industry for circuits education, electronic schematic design and SPICE simulation.
History
Multisim was originally called Electronics Workbench and created by a company called Interactive Image Technologies. At the time it was mainly used as an educational tool to teach electronics technician and electronics engineering programs in colleges and universities. National Instruments has maintained this educational legacy, with a specific version of Multisim with features developed for teaching electronics.
In 1999, Multisim was integrated with Ultiboard after the original company merged with Ultimate Technology, a PCB layout software company.
In 2005, Interactive Image Technologies was acquired by National Instruments Electronics Workbench Group and Multisim was renamed to NI Multisim.
Pricing
See also
Comparison of EDA software
List of free electronics circuit simulators
Proteus Design Suite
Qucs
NI Ultiboard, the PCB layout software that is integrated with Multisim.
OrCAD
References
External links
National Instruments Circuit Design Community Circuit design blog and community to share components, models and footprints
Download Link for NI Multisim Allows a 30-day evaluation of the software
Introduction to Multisim Schematic Capture and SPICE Simulation
Getting Started with NI Ultiboard
Electronic design automation software
Electronic circuit simulators |
43628233 | https://en.wikipedia.org/wiki/Vienna%20Symphonic%20Library | Vienna Symphonic Library | Vienna Symphonic Library GmbH (VSL) is one of the leading developers of sample libraries and music production software for classical orchestral music. The company is located in a landmark protected building, called Synchron Stage Vienna based in the Austrian capital's 23rd district.
The Vienna Symphonic Library provides virtual instruments and the digital recreation of the acoustics of famous concert halls such as the Konzerthaus and the Große Sendesaal at Austrian Public Radio ORF's broadcasting house, both in Vienna, and the Sage Gateshead concert hall in England. The technique used is impulse response resulting in an authentic digital convolution reverb. The virtual instruments are based on digital samples of solo voices and instruments as well as orchestral ensembles. The VSL software acts as an interface for the music composer to play the real instruments on a MIDI keyboard.
History
The company was founded in Vienna in October 2000 by Herbert "Herb" Tucmandl. In the 1990s, Tucmandl, a former cellist (as a substitute member with the Vienna Philharmonic, amongst others), later cameraman, director and composer used some of the available first-generation sample libraries for the creation of his own film scores. Because the sounds available at the time did not meet his requirements, he developed his own concept for an authentic-sounding sample library for orchestral music. His idea stood out for his approach of recording not only single notes but also tone combinations (e.g. legato) and tone repetitions. Through their combination, they allowed users lively interpretations for the first time. He tested his concept with the cello himself and convinced the investor Markus Kopf with the tonal results.
While the largest libraries at the time covered the entire orchestra with about 6,000 samples, Herb Tucmandl developed a structure for over a million individual notes and phrases.
Silent Stage
Since no existing recording studio could guarantee constant acoustic conditions for recording orchestral samples, the company designed and built a custom recording facility; the so-called Silent Stage. It was located in Ebreichsdorf, a village near Vienna, in Llower Austria. Until the end of 2016, Tucmandl invited singers, musicians, ensembles, orchestras there and samples were recorded almost daily under the artistic direction of Michael Hula. Tucmandl always played the cello himself.
Synchron Stage Vienna
In 2013, the Vienna Symphonic Library took over the historic, landmarked "Synchronhalle" on the grounds of the Rosenhügel film studios of the Austrian Broadcasting Corporation. The hall, which dates back to the 1940s, was converted into a globally unique music production facility, in collaboration with the renowned Walters-Storyk Design Group and architects Schneider+Schumacher. Completed in September 2015, the building features several recording and control rooms, editing studios, individual booths ("iso booths"), two instrument storage facilities with several pianos and concert grand pianos and approximately 300 percussion instruments, a sheet music archive, lounges, and offices and lounges for composers, producers, staff, and guests, totalling more than 2,000 square meters. The heart of the modern music production facility is the large recording hall, Stage A: with its 540 m², it can accommodate an orchestra of up to 130 people.
The first production at Synchron Stage Vienna in October 2015 was the recording of the film score of the famous Sissi trilogy. The score was considered lost for a long time and had therefore never been released as a CD or download. The production was a historical bridge-building project: Back in 1955-1957, the original music for the three legendary films about Austria's Empress Elisabeth, which helped Romy Schneider to her international career, was recorded in what was then known as the "Synchronhalle." Based on the original manuscript by composer Anton Profes, Paul Hertel put together three suites which were recorded with the Synchron Stage Orchestra under Conrad Pope as conductor. Grammy Award winner Dennis Sands served as recording director.In March 2016, the Vienna Symphonic Library business offices moved into the new recording facility at Synchron Stage Vienna. On July 15, 2016, Synchron Stage Vienna was officially opened. More than 200 people got invited to the opening ceremony to see the state-of-the-art recording facility. Hollywood stars such as Grammy winner Nan Schwartz and Joe Kraemer were on the guest list, as were ORF Director General Alexander Wrabetz, Justice Minister Wolfgang Brandstetter and VfGH President Gerhart Holzinger. Karl Markovics hosted the evening.
In addition to sampling sessions for the products of the Vienna Symphonic Library, music recordings for national and international film and television productions have been taking place regularly at Synchron Stage Vienna since 2016. Shortly after the official opening, Remote Control Productions, the production company of Hans Zimmer, had several projects recorded here. Since 2021, Synchron Stage Vienna has been an official Dolby Atmos studio and can provide stereo and surround as well as Auro-3D recordings.
→ Main page: Synchron Stage Vienna
Product Overview
Vienna Symphonic Library's products range from a multitude of individual instruments and instruments recorded in groups to innovative software solutions for composition, instrumentation and orchestration on the computer. The range is constantly being expanded and also includes recordings of choirs.
Music creators and studio owners worldwide use the products of the Vienna Symphonic Library: well-known TV and film music composers such as Hans Zimmer, Danny Elfman, A.R. Rahman, Alan Silvestri, Alexandre Desplat, James Newton Howard, Pinar Toprak use it to produce mock-ups of their orchestral scores and also combine the virtual-orchestral sounds in the final mix with live recordings of the actual orchestra. Pop musicians such as Lenny Kravitz, Beyoncé, and Justin Timberlake are also VSL users.
The first products got released in December 2002. The "First Edition" consisted of the modules "Strings", "Brass & Woodwinds", "Percussion" as well as the "Performance Set". In summer 2003, the "Pro Edition" followed with twice as many samples. Both editions were available in formats for the software samplers TASCAM GigaStudio and Apple Logic EXS24 (Emagic at that time). From late 2003, smaller packages of the "Horizon Series" followed. They were also available in formats for Steinberg Halion and Native Instruments Kontakt. The first small software development was the MIDI utility "Performance Tool", which allowed playing legatos and repetitions in real-time.
To manage the vast amount of samples more user-friendly, VSL developed a dedicated sample, the "Vienna Instruments" player. The "Vienna Instruments Collections", released from autumn 2005, contain the free player, which runs in the formats AU, VST, AAX Native and RTAS under Mac OS X and Windows. Further software developments followed: The network-ready mixing host "Vienna Ensemble PRO", the effects plug-in bundle "Vienna Suite", and the mixing and reverberation software "Vienna MIR PRO".
Since 2012, the sound libraries are no longer delivered on DVD but exclusively via download or data carriers (flash drive or hard disk).
With the release of the first library of the "Synchron" series in April 2017, the Vienna Symphonic Library became the first sample library in the world to offer its instrument library in Auro-3D in addition to stereo and surround.
The characteristic multi-microphone setup of the series increased the amount of data to be processed, which required the development of a new software player: the "Synchron Player" was equipped with a new audio engine and innovative algorithms to deliver the necessary performance.
Sample Libraries
Vienna Instruments Series
The products of the "Vienna Instruments" series were recorded in the relatively dry environment of the Silent Stage. The only exception is the "Vienna Konzerthaus Organ", which was recorded in the famous Vienna Konzerthaus. With over 2.8 million samples included, it is by far the largest collection of orchestral sounds in the world. Since its introduction in late 2005, the series has been among the most powerful virtual instruments in the world. It offers intelligent performance algorithms under the user interface of easy-to-use VST/AU/AAX plug-ins. The amount of managed samples allows music creators to authentically reproduce almost any sonic nuance of an instrument or ensemble.
All products of the "Vienna Instruments" series are offered as Standard and Full Library. The differences lie in the number of included articulations.
Synchron Series
With the move to Synchron Stage Vienna, the new "Synchron" series was launched. All products in the series are recorded with a multi-microphone set up to capture the sonic character of individual instruments and their natural surround sound. Up to nine separate, phase-coherent microphone arrangements are used: microphones with medium to small distance to the sampled instrument and Decca tree und surround microphones. Depending on the sampled product, additional microphones such as condenser, ribbon, or ribbon room microphones are used. All microphone signals are available separately in the specially developed "Synchron Player".
Due to the many microphone positions, the "Synchron" products support all possible audio formats, from stereo to surround to immersive surround sound. With the release of the first "Synchron" library, "Synchron Percussion I", in April 2017, the Vienna Symphonic Library was the first sample library worldwide to offer its instrument library in Auro-3D in addition to stereo and surround.
All products of the "Synchron" series are offered as Standard and as Full Library. Both variants contain the same articulations but differ in the available number of microphone positions.
Big Bang Orchestra
The "Big Bang Orchestra" series was a premiere for the Vienna Symphonic Library, as it was the first time that the entire Synchron Stage Orchestra (or some ensembles and choir) was recorded playing together ("tutti"). The multi-microphone setup was also used, which presented a logistical and acoustic challenge in the crowded recording hall. The "Big Bang Orchestra" products mapped the entire alphabet with all product names based on astrological objects and phenomena.
The last library of the series was recorded in spring 2021 with the Gumpoldskirchner Spatzen: Before, the VSL community was asked for the first time, and they voted for producing a children's choir in the poll. With the release of "BBO: Ymir - Children's Choir" in May 2021, the "Big Bang Orchestra" series was concluded, a year and a half after the start of production.
Synchron Pianos
The pianos represent a separate subgroup within the "Synchron" series. As of the end of 2021, six "Synchron" pianos are offered: The Bösendorfer 290 Imperial, Blüthner 1895, Yamaha CFX and Steinway & Sons D-274 concert grand pianos, as well as the Bösendorfer 280VC piano and Bösendorfer Upright piano. Some of the pianos were sampled in Stage B, the smaller recording room at Synchron Stage Vienna. A multi-microphone setup was also used. VSL has developed a unique "piano robot" for its piano samplings.
VSL Piano Robot
It is a high-precision motion control system based on a magnet. The microcontroller controls an absolute silent "robot finger" with superhuman precision to provide flexible curvatures for touch and release movements that correspond to the preceding note length and various release speeds. Unlike a human finger, the robot strikes the keys with a consistent intensity, causing no noise that would end up on the recording. The robot plays one key at a time and must be repositioned after the key is sampled.
Software
The Vienna Symphonic Library offers various software solutions for digital audio production. Some of these can be used with third-party plug-ins.
Vienna Ensemble Pro
In 2009, the "Vienna Ensemble Pro" mixing and host software was the first network solution to connect PCs and Macs through a simple Ethernet cable. MIDI and audio data can be transferred synchronously and without time delays between host and slave computers of different 32- and 64-bit operating systems without additional audio hardware - an effective software solution that caused a sensation in the industry.
With "Vienna Ensemble Pro", all plug-ins and samples used can remain loaded, even when opening a new project or switching between existing projects. It supports macOS and Microsoft Windows and can manage both VSL instruments and third-party plug-ins in VST and AU formats.
Ludwig Göransson, Pinark Toprak, Junkie XL, Jeff Russo, Rolfe Kent, Brian Transeau, Roque Baños, Guy Fletcher and many other well-known music creators are using the software.
Vienna MIR Pro
"Vienna MIR PRO", a mixing and room simulation software for macOS and Microsoft Windows-based on the revolutionary "Multi Impulse Response" (MIR) convolution reverb technology, caused a sensation. It was presented at the Musikmesse Frankfurt on April 6, 2005, for the first time. In 2002 already, the concept for the development was awarded the 1st prize at the "Creative Industries Awards Vienna" and was funded by the Vienna Business Promotion Fund.
The software allows instruments to be virtually placed in different recording locations. In doing so, they are provided with the respective natural sound of the selected space. "The program is geared toward editing orchestral compositions and surround mixes. When positioning instruments on the virtual stage and changing volume, stereo width and rotation in three-dimensional space, the handling is said to be more comparable to the activity of a conductor than that of a sound engineer." "Vienna MIR PRO" was developed by Dietz Tinhof, who is also in charge of its sequel, "Vienna MIR 3D." The release date is still pending.
In the wake of the COVID-19 pandemic, Alan Meyerson used "Vienna MIR PRO" to mix the music for the film Mank: Since no usual orchestral recordings were possible, he merged the individual recordings in "Vienna MIR PRO" to create a homogeneous sound.
Sample Player
For its products, the Vienna Symphonic Library offers its own sample players, which are supplied free of charge with the respective product:
Vienna Instruments Player for the „Vienna Instruments“ series
Synchron Player for the „Synchron“ series, which is based on a rebuilt audio engine. A full-featured mixer, delay for runtime compensation and numerous other controls and effects are also part of the player.
Vienna Synchron Pianos Player with an adapted user interface and improved release sample technology
Vienna Organ Player für „Vienna Konzerthaus Organ“ with an adapted user interface and new sample engine
Synchron Harp Player für „Synchron Harp“, which has two modes:
In Chromatic Mode, the harp can be played like any usual keyboard instrument.
In Pedal Mode, the software emulates the pedal mechanism and the possibilities of a real harp.
Awards and nominations (selection)
2002: City of Vienna Creative Industries Award for the Vienna MIR concept
2002: Game Audio Network Guild Award for Orchestral Cube, Category: Best Sound Library
2003: Nomination NAMM Tec Award, Vienna Sypmphonic Library, Category: Musical Instrument Technology
2003: EQ Blue Ribbon Award for First Edition, Category: Best Synths/Sampling/MIDI
2003: Game Audio Network Guild Award for First Edition, Category: Best Sound Library
2003: MIPA Award for First Edition, Category: Sound Library
2004: Electronic Musician Editor’s Choice Award for Pro Edition, Category: Virtual Orchestra
2004: MIPA Award for Vienna Symphonic Library, Category: Sound Library
2006: MIPA Award for Vienna Symphonic Library, Category: Sound Library
2006: Future Music Platinum Award for Vienna Instruments
2006: NAMM TEC Award for Symphonic Cube, Category: Musical Instrument Technology
2006: Future Music Platinum Award for Orchestral Strings Bundle
2007: 1st place of the Vienna Future Prize, Category: Applications & Products
2007: Electronic Musician Editor’s Choice Award for Symphonic Cube, Category: Virtual Orchestra
2007: Future Music Platinum Award for Vienna Special Edition & Vienna Instruments Elements
2007: Keyboard Key Buy Award for Vienna Special Edition
2007: MIPA Award for Vienna Symphonic Library, Category: Sound Library
2008: Electronic Musician Editor’s Choice Award for Vienna Special Edition, Category: Virtual Orchestra
2008: Remix Technology Award for Appassionata Strings I, Category: Sample Playback Instrument
2009: MIPA Award for Vienna Special Edition, Category: Sound Library
2010: Future Music Platinum Award for Vienna Imperial
2010: MIPA Award for Vienna Symphonic Library, Category: Sound Library
2012: Austrian Economic Chamber Award as Top Exporter 2012
2016: Nomination NAMM TEC Award for Synchron Stage Vienna, Category: Studio Design Project
2021: Nomination NAMM TEC Award for Big Bang Orchestra-Serie, Category: Musical Instrument Software
2022: Nomination NAMM TEC Award for Synchron Elite Strings, Category: Musical Instrument Software
See also
Michael Cooper: A Digital Orchestra for Opera? Purists Take (and Play) Offense in The New York Times, June 11, 2014
Jacob Hale Russell, John Jurgensen: Fugue for Man & Machine, Wall Street Journal, May 5, 2007
A roundup of the company's history in the German Recording magazine, May 2012
References
External links
Vienna Symphonic Library
Synchron Stage Vienna
Austrian companies established in 2000
Companies based in Vienna
Orchestral music
Music production companies
Music organisations based in Austria |
25786325 | https://en.wikipedia.org/wiki/Digital%20Universe%20Atlas | Digital Universe Atlas | Digital Universe Atlas is a free open source software planetarium application, available under the terms of the Illinois Open Source License, and running on Linux, Windows, macOS (10.5 and above), AmigaOS 4, and IRIX.
It is a standalone 4-dimensional space visualization application built on the programmable Partiview data visualization engine designed by Stuart Levy of the National Center for Supercomputing Applications (NCSA) as an adjunct of the NCSA's Virtual Director virtual choreography project. The Virtual Universe Atlas project was launched by the American Museum of Natural History's Hayden Planetarium with significant programming support from the National Aeronautics and Space Administration as well as Stuart Levy. The database draws on the National Virtual Observatory.
Along with Celestia and Orbiter, and unlike most other planetarium applications, Digital Universe shares the capacity to visualize space from points outside Earth. Building on work by Japan's RIKEN, its planet renderings and zoom visualizations can match or exceed Celestia and Orbiter. Unlike Celestia and Orbiter, highly accurate visualization from distances beyond the Milky Way galaxy is integral to the software and the datasets. This allows for unrivaled flexibility in plotting itineraries that reveal true distances and configurations of objects in the observable sky. It therefore improves understanding of the surroundings of the solar system in terms of observer-neutral celestial coordinate systems—systems that are neither geocentric nor heliocentric—such as the galactic coordinate system and supergalactic coordinate system.
The Digital Universe Atlas has spun off a commercial-grade planetarium platform from SCISS called Uniview that was featured in the White House star party on October 7, 2009. The Atlas database and Partiview interface is compatible with professional planetarium software such as Evans & Sutherland's Digistar and Sky-Skan's DigitalSky 2.
The Digital Universe is now a critical component of the OpenSpace open source interactive data visualization software suite. In 2014, a NASA grant (supported by the NASA Science Mission Directorate in response to NASA Cooperative Agreement Number (CAN) NNH15ZDA004C, Amendment 1) was awarded to the American Museum of Natural History for the development of the OpenSpace project, to utilize the latest data visualization techniques and graphics card technologies for rapid data throughput. OpenSpace and its Digital Universe datasets work on all operating systems and is available for free download.
See also
Space flight simulation game
List of space flight simulation games
Planetarium software
List of observatory software
References
External links
Official Website
OpenSpace website
Partiview
Partiview user's guide
Peter Teubern & Stuart Levy, Partiview reference manual
Partiview mailing list
University of Chicago Department of Astronomy & Astrophysics, "Partiview for Developers"
Selden Ball, "Planets for Partiview"
Partiview on GeoWalls
University of Chicago Department of Astronomy & Astrophysics, "Downloads," other visualization plug-ins for Partiview
Uniview
Evans & Sutherland Digistar
Sky-Skan DigitalSky
"The Known Universe" video simulation, American Museum of Natural History, December 15, 2009, using the DUA database and visualized using UniView
Brian Abbott, Carter Emmart, and Ryan Wyatt, "Virtual Universe," Natural History, April 2004
"3-D Tour Puts Stars within Reach," Wired Magazine, June 3, 2003
Slashdot discussion, July 25, 2002
TED 2010 - A 3D atlas of the universe - Carter Emmart
AmigaOS 4 software
Astronomy software
Free astronomy software
Planetarium software for Linux
Science software for MacOS
Science software for Windows
Software using the NCSA license |
2664512 | https://en.wikipedia.org/wiki/Punjabi%20University | Punjabi University | Punjabi University is a collegiate state public university located in Patiala, Punjab, India. It was established on 30 April 1962, and is only the second university in the world to be named after a language, after Hebrew University of Israel. Originally it was conceived as a unitary multi-faculty teaching and research university, primarily meant for the development and enrichment of Punjabi language and culture, but alive to the social and education requirements of the state.
History
Punjabi University was established on 30 April 1962 under the Punjabi University Act 1961 as a residential and teaching university, not as an affiliating University. It started functioning from temporary accommodation in Barandari Palace building. Initially its jurisdictional area was fixed as the radius. There were only nine colleges – six professional and three art and science colleges in Patiala — which fell within its jurisdiction. The university moved to its present campus in 1965. The campus is spread over about . The campus at Patiala makes international standard facilities available for students and researchers.
Although initially the main task before the university was to develop and promote the language of the Punjabi people, it has since evolved into a multi-faculty educational institution. It grew into an affiliating university in 1969, with 43 colleges affiliated to it and covering Patiala, Sangrur and Bathinda districts of Punjab. Since then, it developed significantly and acquired a distinctive character among the centres of education and research in the country. Now, it has more than 278 affiliated colleges spread over nine districts of Punjab. The affiliated colleges are in districts of Patiala, Barnala, Fatehgarh Sahib, Sangrur, Bathinda, Malerkotla district, Mansa, Mohali, Rupnagar and Faridkot.
Campus
The university campus is spread over an area of over , on the Patiala-Chandigarh road, about 7 kilometers from Patiala. The institution has more than 70 teaching and research departments, covering disciplines in Humanities, Science, Engineering, Pharmacy, Law, Fine Arts, Computer Science and Business Management. University also conducts various degree, diploma and certificate courses through distance learning. University not only caters to students from northern region, but students from African countries also take admission here.
The campus has amenities like a State Bank of India branch, Post office, Science and Arts Auditorium, open-air theatre, guest and faculty houses, seminar complexes, faculty club, botanical garden and several spacious lawns, a model school and own fleet of buses for transportation of students and staff.
The university has undertaken the responsibility of maintaining the estate of Norah Richards at Andretta, Himachal Pradesh. Arrangements have been made for faculty members and students who wish to carry out study and research in the fields of theatre and television. The university manages Balbir Singh Sahitya Kendra at Dehradun, the capital city of the Uttarakhand. There is a rich library with rare books and manuscripts bequeathed by Bhai Vir Singh, Balbir Singh and Prof Puran Singh, the doyens of Punjabi literature. Research on comparative religions is carried out at this center.
Regional centres and Neighborhood campuses
The university has four regional centres: the Guru Kashi Regional Center at Bathinda, Guru Kashi Campus at Talwandi Sabo, Regional Centre for Information Technology and Management at Mohali, Nawab Sher Mohammad Khan Institute of Advanced Studies in Urdu, Persian and Arabic at Malerkotla. Punjabi University also maintains seven neighborhood campuses at Rampura Phul, Jhunir, Sardulgarh, Ralla, Maur, Jaito and Dehla Seehan.
Constituent colleges
The university has also established 13 constituent colleges at Mansa, Rampura Phul, Sardulgarh, Ghudda, Bahadurpur (Mansa), Barnala, Benra (Dhuri),Chuni Kalan, Dhilwan, Ghanaur, Jaito, Meera Pur and Moonak.
Landmarks
Guru Gobind Singh Bhawan
Bhai Kahn Singh Nabha Central Library
Guru Teg Bahadur Hall
Charlotte Aujla Auditorium, Kala Bhawan
Gol Market
Art Gallery
Yadavindra College of Engineering
Organization and administration
The governance of the university is conducted through the Syndicate, which is the highest decision-making body of the university. The Syndicate approves matters pertaining to the administration of the university as well as academics, once the academic council has passed the matter. The vice-chancellor is chairman of syndicate. The Governor of Punjab is chancellor of University and titular head of the university. The Senate and academic Council are other advisory and decision making bodies of the university. All these bodies of university were established under the Punjab Act no. 35 of 1961.
The teacher's elected body is Punjabi University Teacher Association (PUTA) and other staff is represented through employees association. The elections to both these association has been conducted annually.
Academics
Punjabi University is a large, primarily residential and affiliating university. University follows a semester system with Autumn semester usually starting in late July and Spring semester ending in early May. Academics at University is organized into eleven faculties and departments under various faculties.
Teaching and learning
The prominent university departments are:
University College of Engineering (CSE/ECE/ME/CE)
Department of Computer Science
School of Management Studies
Economics
Department of Physiotherapy
Department of Biotechnology
Department of Pharmaceutical Sciences & Drug Research
S.Daljit Singh Sethi Physics Department
Department of Education and Community services
Research centers and institutes
University has established various research departments and chairs to conduct research work in various fields of study.
Centre for Development Economics and Innovation Studies
Research Centre for Punjabi Language Technology
Sri Guru Granth Sahib Studies
Department of Development of Punjabi Language
Gurmat Sangeet Chair
Faculty and research
All the departments are involved to promote research culture and spirit. Most of the departments have been able to mobilize additional research funding from UGC, DST, CSIR, Planning Commission, government departments and other official funding agencies. Many of science departments have been able to develop research tie-ups with industry and have undertaken several consultancy assignments.
To ensure academic freedom, the departments organize seminars, symposia, conferences and workshops every year. The teachers are encouraged to participate in national and international seminars through liberal funding. Many teachers are invited to deliver plenary lectures and preside over the sessions at seminars and conferences.
Reputation and rankings
Punjabi University was ranked at 64th among universities and 23 in the pharmacy ranking in NIRF India Ranking in 2020.
Admissions
Admissions to various departments are conducted through centralized admission cell. University conducts many kinds of certificate, diploma, degree and PhD courses in various subjects.
University Library
Bhai Kahn Singh Nabha Central Library is a hub of academic and research activities. It stocks more than 415,000 books and subscribes to several hundred journals. The library is kept open for 360 days of the year from 8.15 a.m. to 8.15 p.m. The library has a reading hall, which has a capacity for 400 readers. A separate hall for using the personal books and a Reading Room has been provided at the ground floor. One night Reading Room remains open from 8.00 p.m. to 6.00 a.m. Ganda Singh Punjabi Reference Library, which is an integral part of the library, is housed in a new building interlinked with the main building. This part of the library has 41,548 books on Punjabi Language, Literature, Punjab History and Culture. The University Library is maintains libraries in some of the departments at the campus, Extension Library at S.A.S.Nagar (Mohali), and a Library at Regional Center Bathinda. Besides, Balbir Singh Sahitya Kendra, Dehradun has a library containing rare books and manuscripts.
Awards & Achievements
Punjabi University was awarded the Maulana Abul Kalam Azad (MAKA) Trophy for excellence in sports for a record six-times in year 2006–07, 2007–08 and 2013–17.
The Youth Welfare Department organizes activities all year round. The Punjabi University has won unique distinctions in youth festivals organized by the school's Association of Indian Universities in collaboration with the Ministry of Youth Affairs, government of India, and other events.
The university has won overall second position in National Inter-University Youth Festival, won overall championship in orth Zone Inter-University Youth Festival many times, has won overall championship in Punjab State Inter-University Youth Festival repeatedly and has won overall championship many times in All India Inter-University Punjabi Cultural Festival. Students of Punjabi University have had the privilege of representing India in the festivals of India held in the former USSR, Mauritius, Spain, China, Germany and U.A.E. (Dubai). Apart from the above-mentioned activities, the Department of Youth Welfare organizes hiking, trekking, mountaineering and rock climbing courses, holds youth leadership training camps, prepares the students for participation in All India Level Youth Festivals, organizes Rotract Club, Young Cultural Club, Lee Club and Youth Club. It organizes Yoga Training Camps for the benefit of students of the university teaching departments and colleges. The department publishes the Yuvak Sabha Magazine and holds literary and cultural competitions.
The National Service Scheme being implemented by the NSS Department helps students to participate in different programs of social service and national development.
The university has developed a particular expertise in Sikh Studies and Punjabi Historical Studies. Concerted efforts are being done in developing a translation programme in Punjabi and English. To develop an association with the outstanding scholars in Punjabi language, literature and culture, the university offers Life Fellowships, Senior Fellowships and Fellowships to the eminent scholars in these fields.
A new faculty of Arts and Culture has been created. Originality and authenticity in the pursuit of Sikh Studies is another area which is receiving more attention and energy. Balbir Singh Sahitya Kendra Dehradun is being developed as an Advanced Center for Sikh Studies. Punjabi University has established the first ever overseas center for teaching of Punjabi as a foreign language at Espanola, New Mexico.
The university established its own publication bureau which is actively engaged in publishing research work of the academic community. More than 2000 titles have been published.
Student life
Sports
Students are encouraged to take active part in sports. Facilities for games such as hockey, football, cricket, basketball, volleyball, athletics, etc. and well as indoor games are provided. The Punjabi University has a large gymnasium and a hall for indoor games. It is one of the very few institutions in India to possess its own velodrome.
The University has been awarded Maulana Abul Kalam Azad (MAKA) Trophy nine times, the latest being in the year 2016–2017. MAKA Trophy represents the highest award given for inter-university sports and university sportsperson performance in international and national arena by the Government of India.
Hostels
There are three residential hostels for boys and four residential hostels for girls. The hostels house 4000 students. In addition to this, separate boys and girls hostel for engineering college have started functioning.
Health services
A health center has an X-ray unit and a laboratory for medical tests. The center has an AIDS awareness wing. Students are entitled to free medical aid by the University Health Center.
Other facilities
The university has also established a placement cell for personality development and job assistance to students. An IAS training centre has been established at university, where coaching for various competitive exams have been imparted. The transport department runs a fleet of buses for linking the campus to various parts of Patiala city.
Notable people
Punjabi University's graduates have found success in a variety of diverse fields including cultural, political, film industry, social-service, public and private sectors. The list contains many people including current & former faculty and Alumni.
Dalip Kaur Tiwana, famous Punjabi writer and faculty
Gulzar Singh Sandhu, journalism faculty
Gurdas Maan, Punjabi singer
Gurpreet Singh Lehal, Computer science faculty
Jagmeet Singh Brar
Navneet Kaur Dhillon, Miss India 2013
Pammi Bai, folk singer
Prem Singh Chandumajra
Sardar Anjum, famous poet and Urdu faculty
Sardara Singh Johl
Surjit Patar, famous Punjabi poet
See also
Punjabi University Guru Kashi Campus
Yadavindra College of Engineering
Photo gallery
References
External links
Punjabi University, Patiala
Admissions portal, Punjabi University
Official facebook page
Computer Science & Engineering Department,Punjabi University, Patiala
Placement Cell, Punjabi University
UGC-Human Resource Development Centre
Distance Education Department
online Examination services
Yadavindra College of Engineering, Talwandi Sabo
Education in Patiala
Academic language institutions
Recipients of the Maulana Abul Kalam Azad Trophy
1962 establishments in East Punjab
Educational institutions established in 1962 |
67789638 | https://en.wikipedia.org/wiki/Sally%20Fincher | Sally Fincher | Sally A. Fincher (born 1959) is a British Computer Scientist and Emerita Professor of Computing Education at the University of Kent. She was awarded the Suffrage Science award in 2018 the SIGCSE Award for Outstanding Contribution to Computer Science Education in 2010 and a National Teaching Fellowship in 2005.
Early life and education
Fincher was an undergraduate student at the University of Kent, where she studied philosophy and computer science. She moved to the United States for her graduate studies, where she was awarded a Master of Arts degree in English from Georgetown University.
Research and career
Fincher leads the University of Kent Computing Education Group. Here she has led computing education projects, including the bootstrapping research in Computer Science Education series and the UK sharing practice project. These programmes looked to identify best practise for computer science education and disseminate this information to the teaching community.
Beyond innovations in computing education, Fincher studies patterns and the development of patterns for human–computer interaction. She created a pattern library for user interfaces for human–computer interactions.
Awards and honours
Fincher was honoured by Ann Blandford for ‘making computer science education inclusive and effective’. She served as chair of the Council of Professors and Heads of Computing (CPHC) from 2018 to 2020. Other awards include:
2003 Mary Kenneth Keller Computer Science & Engineering Undergraduate Teaching Award
2004 Honorary Doctorate from Antenor Orrego Private University
2005 Awarded a National Teaching Fellowship by the Higher Education Academy (HEA)
2009 Awarded distinguished membership of the Association for Computing Machinery
2010 Outstanding Contribution to Computer Science Education from the Association for Computing Machinery (ACM) Special Interest Group (SIG) on Computer Science Education (SIGCSE)
2018 Suffrage Science award
Selected publications
Her publications include:
Computer Science Education Research with Marian Petre
The Cambridge Handbook of Computing Education Research with Anthony V. Robins
Programming Environments for Novices
Computer science project work : principles and pragmatics
References
Living people
1959 births
Fellows of the Royal Society of Arts
Computer scientists
Alumni of the University of Kent
Georgetown University alumni
Academics of the University of Kent |
40895720 | https://en.wikipedia.org/wiki/Samsung%20Ativ%20Tab%203 | Samsung Ativ Tab 3 | The Samsung Ativ Tab 3 is a tablet manufactured by Samsung. The Ativ Tab 3 was announced on June 20, 2013 at the Samsung Premier 2013 event in London, incorporates a dual-core 1.8 GHz Intel Atom Z2760 processor, and runs the Windows 8 operating system.
The incorporation of Windows 8 instead Windows RT operating system of its predecessor has received mostly favourable reviews, the Ativ Tab 3 itself received positive reviews for its lightweight design, its pre-loaded software such as a free Microsoft office suite, and its overall performance for a device positioned as a budget device.
Hardware
The design of the Ativ Tab is relatively similar to its Android-based counterparts (such as the Galaxy Tab 3 10.1 and the Galaxy Note 10.1 2014 Edition)built using a mixture of plastic and glass. A micro HDMI port and a microUSB port are incorporated into the design, as well as a volume rocker, power button and MicroSD slot are located on the top. A physical Windows button is located directly below the screen. A charging port and headphone jack located on the left edge. The Ativ Tab 3 uses a IPS display at a resolution of 1366x768. The tablet is available with either 32 GB or 64 GB of internal storage.
Reception
Whilst demoing the device at the Samsung Premier 2013 event, TechRadar praised the Ativ Tab 3's Windows 8 operating system, lightweight design, and the ability to expand its functionality and storage with its S-Pen and keyboard cover package. However, it was also said thought that there is a minimal amount of USB ports which was due to its slim design which was seen as similar only to that of its Android counterparts. Yet overall they deemed the device as "a decent device in its own right".
CNET said that despite not having the lightning speeds of processors such as the Intel i7, the Ativ Tab 3 performs exceptionally well in basic tasks for a budget Windows 8 tablet. The tablet's relatively fast performance, battery life, pre-loaded software, and lightweight design were regarded as positive aspectsdespite considering the design itself to be merely recycled from its Android counterparts. The Intel Z2760 chipset used in the Ativ Tab 3 was also judged as an adequate processor for the device noting that its performance was sufficient and responsive in comparison to the chipsets used in competing Windows 8 devices. The addition of the S-Pen and, in some regions, the free Bluetooth keyboard-cover accessory is greatly welcomed in increasing the device's productivity.
See also
List of Windows 8 devices
Samsung Ativ
References
Ativ Tab 3
Tablet computers
Tablet computers introduced in 2013
de:Samsung Ativ#Ativ Tab |
31082848 | https://en.wikipedia.org/wiki/Rexer%27s%20Annual%20Data%20Miner%20Survey | Rexer's Annual Data Miner Survey | Rexer Analytics’s Annual Data Miner Survey is the largest survey of data mining, data science, and analytics professionals in the industry. It consists of approximately 50 multiple choice and open-ended questions that cover seven general areas of data mining science and practice: (1) Field and goals, (2) Algorithms, (3) Models, (4) Tools (software packages used), (5) Technology, (6) Challenges, and (7) Future. It is conducted as a service (without corporate sponsorship) to the data mining community, and the results are usually announced at the PAW (Predictive Analytics World) conferences and shared via freely available summary reports. In the 2013 survey, 1259 data miners from 75 countries participated. After 2011, Rexer Analytics moved to a biannual schedule.
Surveys
2015 Survey: 1,220 participants from 72 countries.
2013 Survey: 68-item survey; 1259 participants from 75 countries.
2011 Survey: 52-item survey; 1319 participants from over 60 countries. Citations include:
2010 Survey: 50-item survey; 735 participants from 60 countries. Citations include:
2009 Survey: 40-item survey; 710 participants from 58 countries. Citations include:
2008 Survey: 34-item survey; 348 participants from 44 countries. Citations include:
2007 Survey: 27-item survey; 314 participants from 35 countries.
Recent survey results
While the five Data Miner surveys have covered many data mining topics, the three topics that get the most attention in citations and at conference presentations are:
Algorithms: Each year the surveys have consistently shown that decision trees, regression, and cluster analysis form a triad of core algorithms for most data miners. However, a wide variety of algorithms are being used. This is consistent with independent polls of data miners conducted by KDnuggets over the years.
Data Mining Tools: Data miners report using an average of four software tool to conduct their analyses. Over the survey years, R has risen in popularity. In 2010 it overtook SPSS Statistics and SAS to become the tool used by the most data miners. And the 2011 survey showed that R is now being used by close to half of all data miners (47%). STATISTICA has also grown in popularity. From 2007-2009 more data miners indicated that SPSS Clementine (now IBM SPSS Modeler) was their primary data mining tool than any other tool. However, in 2010 and 2011, STATISTICA was cited most frequently as data miners' primary tool. In terms of satisfaction with their tools, in the past few years, STATISTICA, SPSS Modeler, R, KNIME, RapidMiner and Salford Systems have received the strongest satisfaction ratings from data miners in these surveys. The growing popularity of R is consistent with independent polls of data miners conducted by KDnuggets, but the KDnuggets polls show a different picture regarding the popularity of commercial data mining software. Robert Muenchen has taken a multi-faceted approach to assessing the popularity of data analysis software - an approach that includes blog post counts, Google Scholar data, listserv subscribers, use in competitions, book publications, Google PageRank, and more. His analyses are consistent with the Rexer Analytics Surveys and KDnuggets in outlining the growth of R, but Muenchen illustrates that the popularity of software is more nuanced and one's conclusions will be different depending on what measure of popularity is used. The Rexer Analytics survey summary reports include analyses of the data miners' satisfaction with 20 dimensions of their software. Haughton et al. and Nisbet have also produced reviews of data mining software.
Challenges: Consistently across the years, dirty data, explaining data mining to others, and difficult access to data are the top challenges data miners report facing. Participants in the 2010 survey shared best practices for overcoming these challenges.
References
External links
Rexer Analytics home page
Data Miner Survey Shows Positive Signs
2009 Decisionstats interview of Karl Rexer, President of Rexer Analytics
The Popularity of Data Analysis Software
Predictive Analytics World
KDnuggets Polls: Many single-item polls of data miners conducted from 2000 to the present.
Data mining
Surveys (human research) |
49165567 | https://en.wikipedia.org/wiki/Ministry%20of%20Posts%2C%20Telecommunications%20and%20Information%20Technology | Ministry of Posts, Telecommunications and Information Technology | The Ministry of Posts, Telecommunications and Information Technology () is a Bangladeshi government ministry. It contains two divisions:
Posts and Telecommunications Division
Information and Communication Technology Division
It was formed on 10 February 2014, following the general election in January 2014.
History
Following the 2001 general election, the Ministry of Science and Technology (Bangladesh) was renamed on 18 September 2002 to become the Ministry of Science and Information & Communication Technology. To give more thrust for ICT sector the Information & Communication Technology Division was separated from Science and Technology ministry and it has upgraded as Ministry of Information & Communication Technology on 4 December 2011. The change is the evidence of understanding of the importance of ICT from the highest policy level and also an indication that the government is keen to keep pace with modern changing world. After 2014 election Ministry of Posts and Telecommunications and Ministry of ICT are integrated to Ministry of Posts, Telecommunications and Information Technology.
Operational functions
The Administrative Arrangements Order made on 14 September 2015 detailed the following responsibilities to the ministry:
Broadband policy and programs
Postal and telecommunications policies and programs
Spectrum policy management
National policy issues relating to the digital economy
Content policy relating to the information economy
Posts and Telecommunications Division
Organization of Posts and Telecommunications Division
Bangladesh Telecommunication Regulatory Commission
Bangladesh Post Office
Bangladesh Telecommunications Company Ltd
Bangladesh Submarine Cable Company Limited
Teletalk Bangladesh Ltd
Telephone Shilpa Sangstha
Bangladesh Cable Shilpa Limited
Directorates of Telephones
Information and Communication Technology Division
Organization of Information and Communication Technology Division
Bangladesh Hi-Tech Park
ICT Directorate
Bangladesh Computer Council
Controller of Certifying Authority
References
External links
Posts and Telecommunications Division
Information and Communication Technology Division
Posts, Telecommunications and Information Technology
Communications ministries
Communications in Bangladesh |
510078 | https://en.wikipedia.org/wiki/Stack%20machine | Stack machine | In computer science, computer engineering and programming language implementations, a stack machine is a computer processor or a virtual machine in which the primary interaction is moving short-lived temporary values to and from a push down stack. In the case of a hardware processor, a hardware stack is used. The use of a stack significantly reduces the required number of processor registers. Stack machines extend push-down automaton with additional load/store operations or multiple stacks and hence are Turing-complete.
Design
Most or all stack machine instructions assume that operands will be from the stack, and results placed in the stack. The stack easily holds more than two inputs or more than one result, so a rich set of operations can be computed. In stack machine code (sometimes called p-code), instructions will frequently have only an opcode commanding an operation, with no additional fields identifying a constant, register or memory cell, known as a zero address format. This greatly simplifies instruction decoding. Branches, load immediates, and load/store instructions require an argument field, but stack machines often arrange that the frequent cases of these still fit together with the opcode into a compact group of bits. The selection of operands from prior results is done implicitly by ordering the instructions. Some stack machine instruction sets are intended for interpretive execution of a virtual machine, rather than driving hardware directly.
Integer constant operands are pushed by or instructions. Memory is often accessed by separate or instructions containing a memory address or calculating the address from values in the stack. All practical stack machines have variants of the load–store opcodes for accessing local variables and formal parameters without explicit address calculations. This can be by offsets from the current top-of-stack address, or by offsets from a stable frame-base register.
The instruction set carries out most ALU actions with postfix (reverse Polish notation) operations that work only on the expression stack, not on data registers or main memory cells. This can be very convenient for executing high-level languages, because most arithmetic expressions can be easily translated into postfix notation.
For example, consider the expression A*(B-C)+(D+E), written in reverse Polish notation as A B C - * D E + +. Compiling and running this on a simple imaginary stack machine would take the form:
# stack contents (leftmost = top = most recent):
push A # A
push B # B A
push C # C B A
subtract # B-C A
multiply # A*(B-C)
push D # D A*(B-C)
push E # E D A*(B-C)
add # D+E A*(B-C)
add # A*(B-C)+(D+E)
The arithmetic operations 'subtract', 'multiply', and 'add' act on the two topmost operands of the stack. The computer takes both operands from the topmost (most recent) values of the stack. The computer replaces those two values with the calculated difference, sum, or product. In other words the instruction's operands are "popped" off the stack, and its result(s) are then "pushed" back onto the stack, ready for the next instruction.
Stack machines may have their expression stack and their call-return stack separated or as one integrated structure. If they are separated, the instructions of the stack machine can be pipelined with fewer interactions and less design complexity, so it will usually run faster.
Optimisation of compiled stack code is quite possible. Back-end optimisation of compiler output has been demonstrated to significantly improve code, and potentially performance, whilst global optimisation within the compiler itself achieves further gains.
Stack storage
Some stack machines have a stack of limited size, implemented as a register file. The ALU will access this with an index. A large register file uses a lot of transistors and hence this method is only suitable for small systems. A few machines have both an expression stack in memory and a separate register stack. In this case, software, or an interrupt may move data between them. Some machines have a stack of unlimited size, implemented as an array in RAM, which is cached by some number "top of stack" address registers to reduce memory access. Except for explicit "load from memory" instructions, the order of operand usage is identical with the order of the operands in the data stack, so excellent prefetching can be accomplished easily.
Consider . It compiles to ; ; . With a stack stored completely in RAM, this does implicit writes and reads of the in-memory stack:
Load X, push to memory
Load 1, push to memory
Pop 2 values from memory, add, and push result to memory
for a total of 5 data cache references.
The next step up from this is a stack machine or interpreter with a single top-of-stack register. The above code then does:
Load X into empty TOS register (if hardware machine) or Push TOS register to memory, Load X into TOS register (if interpreter)
Push TOS register to memory, Load 1 into TOS register
Pop left operand from memory, add to TOS register and leave it there
for a total of 5 data cache references, worst-case. Generally, interpreters don't track emptiness, because they don't have to—anything below the stack pointer is a non-empty value, and the TOS cache register is always kept hot. Typical Java interpreters do not buffer the top-of-stack this way, however, because the program and stack have a mix of short and wide data values.
If the hardwired stack machine has 2 or more top-stack registers, or a register file, then all memory access is avoided in this example and there is only 1 data cache cycle.
History and implementations
Description of such a method requiring only two values at a time to be held in registers, with a limited set of pre-defined operands that were able to be extended by definition of further operands, functions and subroutines, was first provided at conference by Robert S. Barton in 1961.
Commercial stack machines
Examples of stack instruction sets directly executed in hardware include
The F18A architecture of the 144-processor GA144 chip from GreenArrays, Inc.
the Z4 computer by Konrad Zuse.
the Burroughs large systems architecture (since 1961)
the Xerox Dandelion introduced April 27, 1981, utilized a stack machine architecture to save memory.
the English Electric KDF9 machine. First delivered in 1964, the KDF9 had a 19-deep pushdown stack of arithmetic registers, and a 17-deep stack for subroutine return addresses
the Collins Radio Collins Adaptive Processing System minicomputer (CAPS, since 1969) and Rockwell Collins Advanced Architecture Microprocessor (AAMP, since 1981).
the UCSD Pascal p-machine (as the Pascal MicroEngine and many others) supported a complete student programming environment on early 8-bit microprocessors with poor instruction sets and little RAM, by compiling to a virtual stack machine.
MU5 and ICL 2900 Series. Hybrid stack and accumulator machines. The accumulator register buffered the memory stack's top data value. Variants of load and store opcodes controlled when that register was spilled to the memory stack or reloaded from there.
HP 3000 (Classic, not PA-RISC)
Tandem Computers T/16. Like HP 3000, except that compilers, not microcode, controlled when the register stack spilled to the memory stack or was refilled from the memory stack.
the Atmel MARC4 microcontroller
Several "Forth chips" such as the RTX2000, the RTX2010, the F21 and the PSC1000
The Setun Ternary computer performed balanced ternary using a stack.
The 4stack processor by Bernd Paysan has four stacks.
Patriot Scientific's Ignite stack machine designed by Charles H. Moore holds a leading functional density benchmark.
Saab Ericsson Space Thor radiation hardened microprocessor
Inmos transputers.
ZPU A physically-small CPU designed to supervise FPGA systems.
Some technical handheld calculators use reverse Polish notation in their keyboard interface, instead of having parenthesis keys. This is a form of stack machine. The Plus key relies on its two operands already being at the correct topmost positions of the user-visible stack.
Virtual stack machines
Examples of virtual stack machines interpreted in software:
the Whetstone ALGOL 60 interpretive code, on which some features of the Burroughs B6500 were based
the Burroughs B5000
the UCSD Pascal p-machine; which closely resembled Burroughs
the Niklaus Wirth p-code machine
Smalltalk
the Java virtual machine instruction set
the WebAssembly bytecode
the Virtual Execution System (VES) for the Common Intermediate Language (CIL) instruction set of the .NET Framework (ECMA 335)
the Forth programming language, especially the integral virtual machine
Adobe's PostScript
Parakeet programming language
Sun Microsystems' SwapDrop programming language for Sun Ray smartcard identification
Adobe's ActionScript Virtual Machine 2 (AVM2)
Ethereum's EVM
the CPython bytecode interpreter
the Ruby YARV bytecode interpreter
the Rubinius virtual machine
the bs (programming language) in Unix uses a virtual stack machine to process commands, after first transposing provided input language form, into reverse-polish notation
the Lua (programming language) C API
Hybrid machines
(These should not be confused with hybrid computers that combine both digital and analogue features, e.g. an otherwise digital computer that accesses analogue multiplication or differential equation solving by memory mapping and conversion to and from an analogue device's inputs and outputs.)
Pure stack machines are quite inefficient for procedures which access multiple fields from the same object. The stack machine code must reload the object pointer for each pointer+offset calculation. A common fix for this is to add some register-machine features to the stack machine: a visible register file dedicated to holding addresses, and register-style instructions for doing loads and simple address calculations. It is uncommon to have the registers be fully general purpose, because then there is no strong reason to have an expression stack and postfix instructions.
Another common hybrid is to start with a register machine architecture, and add another memory address mode which emulates the push or pop operations of stack machines: 'memaddress = reg; reg += instr.displ'. This was first used in DEC's PDP-11 minicomputer. This feature was carried forward in VAX computers and in Motorola 6800 and M68000 microprocessors. This allowed the use of simpler stack methods in early compilers. It also efficiently supported virtual machines using stack interpreters or threaded code. However, this feature did not help the register machine's own code to become as compact as pure stack machine code. Also, the execution speed was less than when compiling well to the register architecture. It is faster to change the top-of-stack pointer only occasionally (once per call or return) rather than constantly stepping it up and down throughout each program statement, and it is even faster to avoid memory references entirely.
More recently, so-called second-generation stack machines have adopted a dedicated collection of registers to serve as address registers, off-loading the task of memory addressing from the data stack. For example, MuP21 relies on a register called "A", while the more recent GreenArrays processors relies on two registers: A and B.
The Intel x86 family of microprocessors have a register-style (accumulator) instruction set for most operations, but use stack instructions for its x87, Intel 8087 floating point arithmetic, dating back to the iAPX87 (8087) coprocessor for the 8086 and 8088. That is, there are no programmer-accessible floating point registers, but only an 80-bit wide, 8 deep stack. The x87 relies heavily on the x86 CPU for assistance in performing its operations.
Computers using call stacks and stack frames
Most current computers (of any instruction set style) and most compilers use a large call-return stack in memory to organize the short-lived local variables and return links for all currently active procedures or functions. Each nested call creates a new stack frame in memory, which persists until that call completes. This call-return stack may be entirely managed by the hardware via specialized address registers and special address modes in the instructions. Or it may be merely a set of conventions followed by the compilers, using generic registers and register+offset address modes. Or it may be something in between.
Since this technique is now nearly universal, even on register machines, it is not helpful to refer to all these machines as stack machines. That term is commonly reserved for machines which also use an expression stack and stack-only arithmetic instructions to evaluate the pieces of a single statement.
Computers commonly provide direct, efficient access to the program's global variables and to the local variables of only the current innermost procedure or function, the topmost stack frame. 'Up level' addressing of the contents of callers' stack frames is usually not needed and not supported as directly by the hardware. If needed, compilers support this by passing in frame pointers as additional, hidden parameters.
Some Burroughs stack machines do support up-level refs directly in the hardware, with specialized address modes and a special 'display' register file holding the frame addresses of all outer scopes. No subsequent computer lines have done this in hardware. When Niklaus Wirth developed the first Pascal compiler for the CDC 6000, he found that it was faster overall to pass in the frame pointers as a chain, rather than constantly updating complete arrays of frame pointers. This software method also adds no overhead for common languages like C which lack up-level refs.
The same Burroughs machines also supported nesting of tasks or threads. The task and its creator share the stack frames that existed at the time of task creation, but not the creator's subsequent frames nor the task's own frames. This was supported by a cactus stack, whose layout diagram resembled the trunk and arms of a Saguaro cactus. Each task had its own memory segment holding its stack and the frames that it owns. The base of this stack is linked to the middle of its creator's stack. In machines with a conventional flat address space, the creator stack and task stacks would be separate heap objects in one heap.
In some programming languages, the outer-scope data environments are not always nested in time. These languages organize their procedure 'activation records' as separate heap objects rather than as stack frames appended to a linear stack.
In simple languages like Forth that lack local variables and naming of parameters, stack frames would contain nothing more than return branch addresses and frame management overhead. So their return stack holds bare return addresses rather than frames. The return stack is separate from the data value stack, to improve the flow of call setup and returns.
Comparison with register machines
Stack machines are often compared to register machines, which hold values in an array of registers. Register machines may store stack-like structures in this array, but a register machine has instructions which circumvent the stack interface. Register machines routinely outperform stack machines, and stack machines have remained a niche player in hardware systems. But stack machines are often used in implementing virtual machines because of their simplicity and ease of implementation.
Instructions
Stack machines have higher code density. In contrast to common stack machine instructions which can easily fit in 6 bits or less, register machines require two or three register-number fields per ALU instruction to select operands; the densest register machines average about 16 bits per instruction plus the operands. Register machines also use a wider offset field for load-store opcodes. A stack machine's compact code naturally fits more instructions in cache, and therefore could achieve better cache efficiency, reducing memory costs or permitting faster memory systems for a given cost. In addition, most stack-machine instruction is very simple, made from only one opcode field or one operand field. Thus, stack-machines require very little electronic resources to decode each instruction.
A program has to execute more instructions when compiled to a stack machine than when compiled to a register machine or memory-to-memory machine. Every variable load or constant requires its own separate Load instruction, instead of being bundled within the instruction which uses that value. The separated instructions may be simple and faster running, but the total instruction count is still higher.
Most register interpreters specify their registers by number. But a host machine's registers can't be accessed in an indexed array, so a memory array is allotted for virtual registers. Therefore, the instructions of a register interpreter must use memory for passing generated data to the next instruction. This forces register interpreters to be much slower on microprocessors made with a fine process rule (i.e. faster transistors without improving circuit speeds, such as the Haswell x86). These require several clocks for memory access, but only one clock for register access. In the case of a stack machine with a data forwarding circuit instead of a register file, stack interpreters can allot the host machine's registers for the top several operands of the stack instead of the host machine's memory
In a stack machine, the operands used in the instructions are always at a known offset (set in the stack pointer), from a fixed location (the bottom of the stack, which in a hardware design might always be at memory location zero), saving precious in-cache or in-CPU storage from being used to store quite so many memory addresses or index numbers. This may preserve such registers and cache for use in non-flow computation.
Temporary / local values
Some in the industry believe that stack machines execute more data cache cycles for temporary values and local variables than do register machines.
On stack machines, temporary values often get spilled into memory, whereas on machines with many registers these temps usually remain in registers. (However, these values often need to be spilled into "activation frames" at the end of a procedure's definition, basic block, or at the very least, into a memory buffer during interrupt processing). Values spilled to memory add more cache cycles. This spilling effect depends on the number of hidden registers used to buffer top-of-stack values, upon the frequency of nested procedure calls, and upon host computer interrupt processing rates.
On register machines using optimizing compilers, it is very common for the most-used local variables to remain in registers rather than in stack frame memory cells. This eliminates most data cache cycles for reading and writing those values. The development of "stack scheduling" for performing live-variable analysis, and thus retaining key variables on the stack for extended periods, helps this concern.
On the other hand, register machines must spill many of their registers to memory across nested procedure calls. The decision of which registers to spill, and when, is made statically at compile time rather than on the dynamic depth of the calls. This can lead to more data cache traffic than in an advanced stack machine implementation.
Common subexpressions
In register machines, a common subexpression (a subexpression which is used multiple times with the same result value) can be evaluated just once and its result saved in a fast register. The subsequent reuses have no time or code cost, just a register reference. This optimization speeds simple expressions (for example, loading variable X or pointer P) as well as less-common complex expressions.
With stack machines, in contrast, results can be stored in one of two ways. Firstly, results can be stored using a temporary variable in memory. Storing and subsequent retrievals cost additional instructions and additional data cache cycles. Doing this is only a win if the subexpression computation costs more in time than fetching from memory, which in most stack CPUs, almost always is the case. It is never worthwhile for simple variables and pointer fetches, because those already have the same cost of one data cache cycle per access. It is only marginally worthwhile for expressions such as . These simpler expressions make up the majority of redundant, optimizable expressions in programs written in non-concatenative languages. An optimizing compiler can only win on redundancies that the programmer could have avoided in the source code.
The second way leaves a computed value on the data stack, duplicating it as needed. This uses operations to copy stack entries. The stack must be depth shallow enough for the CPU's available copy instructions. Hand-written stack code often uses this approach, and achieves speeds like general-purpose register machines. Unfortunately, algorithms for optimal "stack scheduling" are not in wide use by programming languages.
Pipelining
In modern machines, the time to fetch a variable from the data cache is often several times longer than the time needed for basic ALU operations. A program runs faster without stalls if its memory loads can be started several cycles before the instruction that needs that variable. Complex machines can do this with a deep pipeline and "out-of-order execution" that examines and runs many instructions at once. Register machines can even do this with much simpler "in-order" hardware, a shallow pipeline, and slightly smarter compilers. The load step becomes a separate instruction, and that instruction is statically scheduled much earlier in the code sequence. The compiler puts independent steps in between.
Scheduling memory accesses requires explicit, spare registers. It is not possible on stack machines without exposing some aspect of the micro-architecture to the programmer. For the expression A B -, B must be evaluated and pushed immediately prior to the Minus step. Without stack permutation or hardware multithreading, relatively little useful code can be put in between while waiting for the Load B to finish. Stack machines can work around the memory delay by either having a deep out-of-order execution pipeline covering many instructions at once, or more likely, they can permute the stack such that they can work on other workloads while the load completes, or they can interlace the execution of different program threads, as in the Unisys A9 system. Today's increasingly parallel computational loads suggests, however, this might not be the disadvantage it's been made out to be in the past.
Stack machines can omit the operand fetching stage of a register machine. For example, in the Java Optimized Processor (JOP) microprocessor the top 2 operands of stack directly enter a data forwarding circuit that is faster than the register file.
Out-of-order execution
The Tomasulo algorithm finds instruction-level parallelism by issuing instructions as their data becomes available. Conceptually, the addresses of positions in a stack are no different than the register indexes of a register file. This view permits the out-of-order execution of the Tomasulo algorithm to be used with stack machines.
Out-of-order execution in stack machines seems to reduce or avoid many theoretical and practical difficulties. The cited research shows that such a stack machine can exploit instruction-level parallelism, and the resulting hardware must cache data for the instructions. Such machines effectively bypass most memory accesses to the stack. The result achieves throughput (instructions per clock) comparable to RISC register machines, with much higher code densities (because operand addresses are implicit).
One issue brought up in the research was that it takes about 1.88 stack-machine instructions to do the work of a register machine's RISC instruction. Competitive out-of-order stack machines therefore require about twice as many electronic resources to track instructions ("issue stations"). This might be compensated by savings in instruction cache and memory and instruction decoding circuits.
Hides a faster register machine inside
Some simple stack machines have a chip design which is fully customized all the way down to the level of individual registers. The top of stack address register and the N top of stack data buffers are built from separate individual register circuits, with separate adders and ad hoc connections.
However, most stack machines are built from larger circuit components where the N data buffers are stored together within a register file and share read/write buses. The decoded stack instructions are mapped into one or more sequential actions on that hidden register file. Loads and ALU ops act on a few topmost registers, and implicit spills and fills act on the bottommost registers. The decoder allows the instruction stream to be compact. But if the code stream instead had explicit register-select fields which directly manipulated the underlying register file, the compiler could make better use of all registers and the program would run faster.
Microprogrammed stack machines are an example of this. The inner microcode engine is some kind of RISC-like register machine or a VLIW-like machine using multiple register files. When controlled directly by task-specific microcode, that engine gets much more work completed per cycle than when controlled indirectly by equivalent stack code for that same task.
The object code translators for the HP 3000 and Tandem T/16 are another example. They translated stack code sequences into equivalent sequences of RISC code. Minor 'local' optimizations removed much of the overhead of a stack architecture. Spare registers were used to factor out repeated address calculations. The translated code still retained plenty of emulation overhead from the mismatch between original and target machines. Despite that burden, the cycle efficiency of the translated code matched the cycle efficiency of the original stack code. And when the source code was recompiled directly to the register machine via optimizing compilers, the efficiency doubled. This shows that the stack architecture and its non-optimizing compilers were wasting over half of the power of the underlying hardware.
Register files are good tools for computing because they have high bandwidth and very low latency, compared to memory references via data caches. In a simple machine, the register file allows reading two independent registers and writing of a third, all in one ALU cycle with one-cycle or less latency. Whereas the corresponding data cache can start only one read or one write (not both) per cycle, and the read typically has a latency of two ALU cycles. That's one third of the throughput at twice the pipeline delay. In a complex machine like Athlon that completes two or more instructions per cycle, the register file allows reading of four or more independent registers and writing of two others, all in one ALU cycle with one-cycle latency. Whereas the corresponding dual-ported data cache can start only two reads or writes per cycle, with multiple cycles of latency. Again, that's one third of the throughput of registers. It is very expensive to build a cache with additional ports.
Since a stack is a component of most software programs, even when the software used is not strictly a stack machine, a hardware stack machine might more closely mimic the inner workings of its programs. Processor registers have a high thermal cost, and a stack machine might claim higher energy efficiency.
Interrupts
Responding to an interrupt involves saving the registers to a stack, and then branching to the interrupt handler code. Often stack machines respond more quickly to interrupts, because most parameters are already on a stack and there is no need to push them there. Some register machines deal with this by having multiple register files that can be instantly swapped but this increases costs and slows down the register file.
Interpreters
Interpreters for virtual stack machines are easier to build than interpreters for register machines; the logic for handling memory address modes is in just one place rather than repeated in many instructions. Stack machines also tend to have fewer variations of an opcode; one generalized opcode will handle both frequent cases and obscure corner cases of memory references or function call setup. (But code density is often improved by adding short and long forms for the same operation.)
Interpreters for virtual stack machines are often slower than interpreters for other styles of virtual machine. This slowdown is worst when running on host machines with deep execution pipelines, such as current x86 chips.
In some interpreters, the interpreter must execute a N-way switch jump to decode the next opcode and branch to its steps for that particular opcode. Another method for selecting opcodes is threaded code. The host machine's prefetch mechanisms are unable to predict and fetch the target of that indexed or indirect jump. So the host machine's execution pipeline must restart each time the hosted interpreter decodes another virtual instruction. This happens more often for virtual stack machines than for other styles of virtual machine.
One example is the Java programming language.
Its canonical virtual machine is specified as an 8-bit stack machine. However, the Dalvik virtual machine for Java used on Android smartphones is a 16-bit virtual-register machine - a choice made for efficiency reasons. Arithmetic instructions directly fetch or store local variables via 4-bit (or larger) instruction fields. Similarly version 5.0 of Lua replaced its virtual stack machine with a faster virtual register machine.
Since Java virtual machine became popular, microprocessors have employed advanced branch predictors for indirect jumps. This advance avoids most of pipeline restarts from N-way jumps and eliminates much of the instruction count costs that affect stack interpreters.
See also
Stack-oriented programming language
Concatenative programming language
Comparison of application virtual machines
SECD machine
Accumulator machine
Belt machine
Random-access machine
References
External links
Stack Computers: the new wave book by Philip J. Koopman, Jr. 1989
Homebrew CPU in an FPGA — homebrew stack machine using FPGA
Mark 1 FORTH Computer — homebrew stack machine using discrete logical circuits
Mark 2 FORTH Computer — homebrew stack machine using bitslice/PLD
Second-Generation Stack Computer Architecture — Thesis about the history and design of stack machines.
Models of computation
Stack machines
Microprocessors |
11977028 | https://en.wikipedia.org/wiki/Gateway%20Technical%20College | Gateway Technical College | Gateway Technical College is a public technical college in southeastern Wisconsin. It is one of the largest members of the state-run Wisconsin Technical College System, serving Kenosha, Racine, and Walworth counties.
With over 20,000 students, Gateway offers associate degrees in 47 fields, and 179 different diplomas and certifications. The college also offers certification and permit courses, as well as helping students attain GED and HSED diplomas. There are more than 37 standing credit transfer agreements with other colleges and universities, particularly UW–Parkside.
Gateway has three main campuses, in Elkhorn, Kenosha, and Racine, and six other educational centers located throughout the region.
History
The Wisconsin continuation school program was established by Governor Francis McGovern in 1911. Later that year, the Racine Continuation School became the first to open under this program, and the first publicly funded technical school in America. In its earliest years, the school rented space in downtown Racine, as well as using the high school and Bull Elementary buildings for night school classes. The first class consisted of about 150 students. By 1916, the enrollment had expanded to over 1,000, the bulk of which were taking English and/or citizenship classes. Renamed the Racine Vocational School in 1917, expansion continued and over 3,000 students were enrolled in 1920. Racine's program was said to be a model for other technical schools throughout the state and country. The school purchased a site west of downtown at 800 Center Street in 1928, and the completed building, which brought all of the school's programs under one roof, opened in 1931. The school, later known as the Racine Technical Institute, opened satellite campuses in Burlington, Union Grove, and Waterford in 1967. The Racine Technical Institute building, at 800 Center Street, is now used as an annex to Racine's city hall.
The Kenosha Vocational School was founded in 1912, at the request of Kenosha superintendent Mary Bradford. A building was constructed for the school in 1914, and by 1920, with 914 students enrolled, that building had already been outgrown, requiring the school to share space with local factories. A larger building was constructed later that decade, which is now part of the Kenosha Medical Center. The Vocational Act of 1963 authorized the school to construct a new building near Bradford High School, the cornerstone of which was laid in 1965 by Governor Warren Knowles. In 1968, Walworth County was added to the Kenosha vocational district, and a satellite campus began construction in Elkhorn, although it was not complete until after the 1971 merger.
The Racine and Kenosha vocational schools were partners for much of their histories – both provided the same service to heavily industrial cities in southeastern Wisconsin, both were operated by the state of Wisconsin. Together, they became the first vocational schools to offer nursing courses in 1949, and both began offering two-year associate degrees in 1959. In 1971, the Wisconsin Technical College System merged these school systems together to form what was designated District 6. The newly formed system was named the Tri-County Technical Institute. It became Gateway Technical Institute the following year. The current name, Gateway Technical College, was given in 1987, as part of a statewide change. Since the 1990s, Gateway has continually expanded both its enrollment and facilities, and has placed a focus on smaller educational centers that are separate from the major campuses. Today, Gateway has over 25,000 students, 6,000 of whom attend school full-time.
Campuses
Elkhorn campus
The Elkhorn Campus, which opened in 1971, is the primary Gateway facility in Walworth County. The campus consists of four buildings located southeast of Elkhorn, located near the interchange of I-43 and US 12. The North and South buildings make up most of the facility, containing classrooms, a library and bookstore, administration, and the student commons. The West Building houses the Walworth County Educational Consortium Alternative High School, a school created in 1990 by a partnership between Gateway and the five school districts in Walworth County, which serves high school students that are considered to be "at risk of not graduating". The school's veterinary science department is located in its own building.
Kenosha campus
The Kenosha Campus was constructed before the Kenosha Technical Institute was part of Gateway. The Vocational Act of 1963 authorized the school to construct the current campus near Bradford High School, the cornerstone of which was laid in 1965 by Governor Warren Knowles. The core of the campus is a cluster of five buildings – the Academic Building, library, Service Building, Science Building, and Technical Building – all of which are connected by an enclosed walkway. The other buildings included in the Kenosha campus are the Pike Creek Horticultural Center and the Kenosha Conference Center, which houses the Madrigrano Auditorium. Two of Gateway's satellite educational centers are located near the Kenosha campus: the Center for Sustainable Living and the Inspire Center.
Racine campus
Located along the lakefront south of downtown, Gateway's Racine Campus opened in 1972, on the former site of the University of Wisconsin–Racine. The Lincoln Building, named for the statue of Abraham Lincoln and Mary Todd Lincoln in neighboring East Park, is a three-story building with a cantilevered design that removes most of the indoor space on the first floor. The upper two floors feature classrooms and offices. The Lake Building is the campus' "key building for student access", featuring the S.C. Johnson Student Life Center, a common area named for the SC Johnson company, and the library, on the ground floor, with classrooms on the two upper floors. The five-story Technical Building is home to most of the school's labs, with mechanical engineering on the first floor, the IT Center of Excellence taking up all of the third floor, and the Barber/Cosmetologist program taking up most of the fifth. The Racine Building contains the school's administrative offices and conference rooms on its first floor, the Student Services Center on the third, with classrooms on the floor in between. All four of the Racine campus buildings are linked by a connecting hallway, most of which is underground.
Educational centers
The Burlington Center opened in Burlington in 2005. The single-story building, adjacent to Burlington High School, primarily offers general education courses. It is also home to the Adult Learning Center, which offers remedial education and helps students attain GEDs.
The Inspire Center (formerly the Center for Bioscience & Information Technology), located next to the Kenosha campus, is an educational center that offers additional facilities for information technology, nursing, and other health-related courses. The building also houses a childcare center, the office of the college president, and Gateway's radio station WGTD.
The Health and Emergency Response Occupations (HERO) Center, located next to the Burlington Center in Burlington, offers training for fire medic and EMS students. The facility offers realistic simulation of all stages of patient care.
The Horizon Center for Transportation Technology in Kenosha offers specialized training for automotive technicians and aircraft pilots. The Horizon Center is run by Gateway through a partnership with Snap-on.
The LakeView Advanced Technology Center, located in Pleasant Prairie, offers high school- and college-level courses to students at high schools in the Kenosha Unified School District. It shares a building with the LakeView Technology Academy, a specialized public high school. LakeView also offers technical courses in engineering, manufacturing, information technology, and biomedicine.
The SC Johnson Integrated Manufacturing and Engineering Technology (iMET) Center is an educational center located in Sturtevant. iMET, in cooperation with SC Johnson, offers courses in engineering and manufacturing. The facility includes Tarnowski Hall, a flexible manufacturing laboratory, and a precision measurement equipment laboratory sponsored by the Starrett Company.
References
External links
Official website
Educational institutions established in 1972
Wisconsin technical colleges
Racine, Wisconsin
Education in Kenosha County, Wisconsin
Education in Walworth County, Wisconsin
Education in Racine County, Wisconsin
Education in Kenosha, Wisconsin
Buildings and structures in Kenosha, Wisconsin
Buildings and structures in Racine, Wisconsin |
604013 | https://en.wikipedia.org/wiki/RTAI | RTAI | Real-time application interface (RTAI) is a real-time extension for the Linux kernel, which lets users write applications with strict timing constraints for Linux. Like Linux itself the RTAI software is a community effort. RTAI provides deterministic response to interrupts, POSIX-compliant and native RTAI real-time tasks. RTAI supports several architectures, including IA-32 (with and without FPU and TSC), x86-64, PowerPC, ARM (StrongARM and ARM7: clps711x-family, Cirrus Logic EP7xxx, CS89712, PXA25x), and MIPS.
RTAI consists mainly of two parts: an Adeos-based patch to the Linux kernel which introduces a hardware abstraction layer, and a broad variety of services which make lives of real-time programmers easier. RTAI versions over 3.0 use an Adeos kernel patch, slightly modified in the x86 architecture case, providing additional abstraction and much lessened dependencies on the "patched" operating system. Adeos is a kernel patch comprising an Interrupt Pipeline where different operating system domains register interrupt handlers. This way, RTAI can transparently take over interrupts while leaving the processing of all others to Linux. Use of Adeos also frees RTAI from patent restrictions caused by RTLinux project.
RTAI-XML
RTAI-XML is a server component of RTAI, implementing a service-oriented way to design and develop real-time (RT) control applications.
This project was born to fulfill the needs of a university group, mainly focused to have a flexible platform for learning control systems design, allowing the students to test their programs remotely, over the Internet. Leaving the first wishful thinking and going to the real implementation gave rise to the alpha version of RTAI-XML, that showed the potential impact of the basic idea of a net separation of hard and soft real-time tasks in the programmation logic. What was necessary to assure that students could not crash the RT process, is now becoming a new RTAI paradigm.
RTAI-XML consists of a server component waiting for incoming calls on a box where a real-time process, the Target, is running (or ready to). A generic client program, the Host, can reach the server through the TCP/IP network, using a standard protocol based on XML, and hence interact with the Target, in order to monitor the status of the RT process, to see the signals collected (or generated) by the system and also to fetch and change the RT parameters (for example, the gains of a PID feedback ring). In other words, RTAI-XML provides a simple way towards remoting of control applications, adding flexibility to the RTAI project, without losing the key features of an open and standard implementation.
The RTAI-XML section of this site presents the details of the implementation. The general architecture is revised, in order to focus the three key components, the Server, the Server-Target interface and the Server-Host communication. The Applications section contains some examples of control systems based on RTAI-XML and the References section contains hints and links for further readings on this topic.
See also
Xenomai
References
External links
Univ. di Padova - RTAI / Xenomai presentation
RTAI-XML official website
Linux kernel
Real-time operating systems |
1971984 | https://en.wikipedia.org/wiki/Zekr%20%28software%29 | Zekr (software) | Zekr (Arabic:ذكر) is an open source Quranic desktop application. It is an open platform Quran study tool for browsing and researching on the Quran. Zekr is a Quran-based project, planned to be a universal, open source, and cross-platform application to perform most of the usual refers to the Quran, according to the project website. Zekr is included in the default installation of Sabily Linux distribution.
Zekr is capable of having multiple add-ons, that is different translation packs, themes, recitations and revelation packs.
As of Zekr 0.7.0, it is possible to search through different Quran translations both with indexed (Lucene-based) search and basic search. Moreover, this release introduces paging support for Quran text.
Zekr accepts different add-ons to make application as customizable as possible. Currently it accepts different Quraan translation packs, language packs, Quran revelation order pack and theme packs. Revelation order packs are used to sort search results based on different revelation order schemes.
Zekr comes with an NSIS installer for Windows and an Application bundle for Mac. There is always a base package for (all) Linux machines as well as Debian packages for Debian-compliant Linux distributions.
See also
Quranic Arabic Corpus
JQuranTree
References
External links
Quran.com
Quran software
Free software programmed in Java (programming language)
Unix software
Windows text-related software
MacOS text-related software
MacOS software
Java platform software |
7031374 | https://en.wikipedia.org/wiki/Microsoft%20Software%20Updater | Microsoft Software Updater | Microsoft Software Updater (earlier Nokia Software Updater and Ovi Suite Software Updater) is a Windows and OS X (though the Mac version is only in Beta) based application launched in 2006, that enables customers to update and recover their mobile device firmware of a S40 or S60 or Lumia device from any Internet enabled access point. To avoid data loss users are prompted with on-screen advice on how to safely update their device.
In 2015 Microsoft Mobile offers 4 distinct software update applications, the Microsoft Software Updater serves primarily to update their feature phones, while the Lumia Software Recovery Tool and Windows Phone Recovery Tools are applications used to update and recover Windows Phone devices, though the Lumia Software Recovery Tool also supports Symbian and other Nokia platforms, and the Nokia Care Suite enables users to install Microsoft Mobile firmware updates for Microsoft Lumia devices. Further Microsoft Mobile offers desktop synchronisation applications which also offer updates to device components such as the Nokia Suite and its predecessor the Nokia PC Suite for legacy Nokia telephones, though the Nokia Suite also supports content migration for Microsoft Lumia devices such as messages, contacts, and device software.
All software suites except for the Windows Phone Recovery Tool were originally developed under Nokia while the Windows Phone Recovery Tool was created specifically for the Windows 10 Technical Preview for phones.
History
The service was launched in beta in 2006, and the Nokia Software Updater's beta phase ended at 25 August 2011. Nokia Software Updater 3.0.495 was released to consumers in 2011. After acquisition of Nokia's devices and services divisions by Microsoft, the application was renamed to Microsoft Software Updater. the Microsoft Software Updater does not install any pre-release of Nokia device software, but will restore the latest updates.
The service can be used to restore the firmware on "bricked" phones which previously could only be done at local Microsoft Care customer service centres. Microsoft Care's range of software update and recovery programs also include a software recovery tool for Lumia-branded Windows Phones that don't start up or respond which may restore the latest firmware. The Recovery tool requires the telephone to have 70-80% battery charge and works only with Windows Phone 8 or higher devices.
In 2015 Microsoft used the software to update their Series 30+ based Nokia 130 devices.
Lumia Software Recovery Tool
The Microsoft Care division of Microsoft Mobile had several other specialised versions of the Microsoft Software Updater. This included the Nokia Software Recovery Tool which can recover lost software and unbrick phones in a similar manner to the Microsoft Software Updater. Its primary aim is to restore lost data after failed update installation attempts. The 1.3.1 version requires Windows 7 or later and was a re-released version of the older Symbian recovery tool. As part of Microsoft's new wave of rebranding it was renamed the Lumia Software Recovery Tool. It was updated and renamed to Nokia Software Recovery Tool again in 2015. In 2016 Microsoft closed down all Nokia sites and download servers. This affected all Nokia firmware downloader softwares. In 2017 Microsoft has outsourced the old Nokia phone software service to a rather unknown company named B2X.
Windows Device Recovery Tool
In February 2015, to coincide with the launch with the technical preview of Windows 10 Mobile, Microsoft launched a similar application for Windows Insiders known as the Windows Phone Recovery Tool. This application will remove Windows 10 from the device and restore the most current Windows Phone 8.1 software and the device's latest available firmware (i.e. Lumia Cyan or Lumia Denim).
Microsoft issued an update to the Windows Phone Recovery Tool in April 2015 to address difficulties for Nokia Lumia 520 and other low-memory devices while installing the Windows 10 technical preview, because their limited (512 MB) memory caused these devices to become "bricked". The update resolved these issues by lowering the data blocks being fed to the device from 2MB to 128kBs at a time while recovering these defective models.
On 13 May 2015 Microsoft added support for the HTC One (M8) for Windows devices in version 2.0.3 while earlier the Windows Phone Recovery Tool exclusively worked with Microsoft/Nokia Lumia devices. In September 2015 Microsoft updated the Windows Phone Recovery Tool which renamed it to the Windows Device Recovery Tool alongside several minor fixes such as improved support features, and some accessibility improvements. In November 2015 Microsoft added additional support for another non-Microsoft made Windows mobile device, the LG Lancet.
On 30 March 2016 Microsoft added support for the Microsoft HoloLens and the Microsoft HoloLens Clicker devices which is a Windows 10-based augmented reality headset and companion device based on Windows Holographic.
Microsoft Care
Microsoft Care (formerly Nokia Care) centres are physical locations created to deliver personalised customer support services and fix broken Lumia and Nokia-branded devices. This centres employ highly skilled engineers to repair and fix Nokia and Microsoft devices, though initially Nokia Care centres were the only place where customers could upgrade their Symbian devices prior to the launch of the Nokia Software Updater.
In rural African areas Microsoft Mobile operates Microsoft Care as a service to deliver customer support with vans by sending engineers, which can be reached via an SMS-warranty scheme.
In June 2015, Microsoft announced it will rebrand its Nokia Care centres to Microsoft Care and then Lumia Care Point Locations. It was later reported that Microsoft would close the majority of their care facilities in Poland and other European countries in favour of having more large centralised facilities as opposed to smaller ones being a part of the larger restructuring within Microsoft's mobile devices strategy based on their plan of laying off former Nokia employees.
See also
Nokia Suite
Nokia PC Suite
Ovi (Nokia)
Zune software
Microsoft Mobile Services
References
External links
Official site
Windows 10 Mobile Upgrade
List of supported telephones, tablets, desktops and laptops
Windows Phone software
Nokia services
Symbian software |
9088198 | https://en.wikipedia.org/wiki/Polytechnic%20University%20of%20the%20Philippines%20Santa%20Maria | Polytechnic University of the Philippines Santa Maria | Polytechnic University of the Philippines, Santa Maria, Bulacan Campus or PUP-SMBC () is a PUP extension campus in Sitio Gulod, Brgy. Pulong-Buhangin, municipality of Santa Maria, Bulacan province, Philippines, offering undergraduate programs.
The extension was created through a Memorandum of Agreement between the university and the Santa Maria Municipality government. Professor Emilia C. Mateo, MAT, MBE served as the extension's first directress, followed by Prof. Arlene R. Queri then Prof. Orlando Batongbakal (as OIC), Engr. Aureluz L. Torres, Prof. Kathryn Placido (as Acting Director), Lualhati dela Cruz, Prof. Jose M. Abat and Prof. Ricardo F. Ramiscal took the position followed by Prof. Artemus G. Cruz, Dr. Marissa Baybay and the current director is Prof. Len Isip.
Last September 2018, PUP Santa Maria Bulacan Campus celebrated its 13th Founding Anniversary.
Courses
College of Accountancy (COA)
Bachelor of Science in Accountancy (BSA)
College of Business (CB)
Bachelor of Science in Entrepreneurship (BSEntrep)
College of Engineering (CE)
Bachelor of Science in Civil Engineering (BSCE)
Bachelor of Sciencce in Computer Engineering (BSCpe)
College of Education (COED)
Bachelor in Secondary Education Major in English (BSEd-English)
Bachelor in Secondary Education Major in Mathematics (BSEd-Math)
College of Computer Management and Information Technology (CCMIT)
Bachelor of Science in Information Technology (BSIT)
College of Tourism and Hotel and Restaurant Management (CTHRM)
Bachelor of Science in Hospitality Management (BSHM)
College of Technology (CT)
Diploma in Office Management Technology (DOMT)
University Organizations
PUP Santa Maria Bulacan Student Council
Junior Philippine Institute of Accountants
Philippine Institute of Civil Engineering PUP SMB Chapter
Association of Future Teachers
Alliance of Computer Engineering Students
Chambers of Entrepreneurs and Managers
Hospitality Management Society
Integrated Students of Information Technology
Office Management Technology Sy-Quest
External links
Polytechnic University of the Philippines – Official website
Polytechnic University of the Philippines
Universities and colleges in Bulacan
Education in Santa Maria, Bulacan |
40890222 | https://en.wikipedia.org/wiki/Lucidpress | Lucidpress | Lucidpress is a web-based desktop publishing software application developed by Lucid Software. It is used to create brochures, flyers, newsletters, business cards, posters, magazines and presentations. Built on web standards such as HTML5 and JavaScript, Lucidpress is supported in modern web browsers including Google Chrome, Firefox, Safari and Internet Explorer 8+. Though it started as a platform for single users and small businesses, Lucidpress has found substantial user bases in both education and enterprise spaces.
History
In October 2013, Lucid Software announced Lucidpress as a public beta version. Following its release, Lucidpress was featured in TechCrunch, VentureBeat and PC World, with TechCrunch noting: "I had a chance to test the app before its launch and it is indeed very easy to use. If you've ever used a desktop publishing app in the past, you'll feel right at home with Lucidpress, as it features the same kind of standard top-bar menu and layout options as most other publishing apps. In terms of features, it can also hold its own against similar desktop-based apps."
In October 2013, Lucidpress became available in the Google Workspace Marketplace (formerly G Suite Marketplace).
In May 2015, Lucidpress hit 1 million users. One year later in June 2016, Lucidpress hit 2 million users and announced its Advanced Template Locking feature.
In November 2016, Lucidpress announced its Print & Ship feature, by which users can order printed versions of the documents they create in Lucidpress.
In May 2021, Lucidpress announced that it had been acquired by Charles Thayne Capital ("CTC"), a growth-oriented and technology-focused private investment firm.
Research
In October 2016, Lucidpress conducted a survey with research firm Demand Metric about the impact of brand consistency. The report, titled "The Impact of Brand Consistency," contains insights from over 200 senior marketing and brand leaders. It found, among other insights, that consistent brand marketing is worth an estimated 23% increase in revenue.
Investment
Lucid Software raised $1 million in Seed in 2011, led by Google Ventures.
In May 2014, the company received a $5 million investment. The round was led by Salt Lake-based Kickstart Seed Fund.
In September 2016, the company received a $36 million investment from Spectrum Equity, whose previous investments include other online platforms such as Ancestry.com, Lynda.com, Prezi, and SurveyMonkey. Kickstart Seed Fund and Grayhawk Capital also participated in the round.
Features
Lucidpress is an alternative to complex design programs like Adobe InDesign and Microsoft Publisher (especially for Mac users). Its design capabilities range from single-page documents like business cards and flyers to multi-page documents like annual reports and digital magazines.
Cloud-based
Lucidpress is accessible anywhere through modern web browsers, and all documents are securely stored in the cloud. The application does not require a download.
Collaboration
Incorporating a real-time collaborative editor, Lucidpress allows multiple users to edit a document simultaneously. Users can also make comments and chat with collaborators in real time.
Publication
Lucidpress content can be published through several different mediums, including:
On the web (generates a unique URL)
On social media (Facebook, Instagram, Twitter and LinkedIn)
Via email
Embedded on a website
Exported for printing
Printed documents ordered directly from Lucidpress
Template library
Lucidpress offers a large library of templates for designing both print and digital content. Template categories include:
Banners
Brochures
Business cards
Cards
Ebooks
Flyers
Holiday
Invitations
Labels
Leaflets
Lesson plans
Letterheads
Magazines
Newsletters
Pamphlets
Postcards
Posters
Print Banners
Reports
Resumes
Social Media
Integration
Lucidpress is fully integrated with Google Drive and Google Workspace (formerly G Suite and Google Apps for Work). Lucidpress's integration is consistently one of the top productivity apps in the Google Workspace Marketplace.
Users can import images from Flickr, Facebook, and Dropbox.
See also
Adobe InDesign
Scribus
Lucidchart
Canva
References
External links
Lucid Software website
Graphics software
Cloud applications
Collaborative software
Web applications |
1311937 | https://en.wikipedia.org/wiki/Joey%20Browner | Joey Browner | Joey Matthew Browner (born May 15, 1960) is an American former professional football player who was a strong safety in the National Football League (NFL) for the Minnesota Vikings from 1983 to 1991 and for the Tampa Bay Buccaneers in 1992. Browner played college football for the USC Trojans.
High school career
Browner attended Western Reserve High in Warren, Ohio for two years but moved for his junior and senior seasons to Atlanta, Georgia where he attended Southwest High. He was an All State defensive lineman as a junior, played basketball with future NBA forward Gerald Wilkins, and ran track and field, qualifying twice for the Ohio State meet.
As a senior, Browner had 120 unassisted tackles and three interceptions earning Parade All-American Honors as well as the Georgia class 3-A lineman of the year. Browner was also named Atlanta Area Player of the Year. After high school it was generally believed that Browner would follow his three brothers to Notre Dame, but he instead decided on the University of Southern California.
College career
At USC, Browner was the team's Most Valuable Player in 1982. Other members of the Trojan defensive backfield included Dennis Smith, Hall of Famer Ronnie Lott, and future Los Angeles Rams head coach Jeff Fisher. Browner also played with Anthony Muñoz, Marcus Allen, Charles White, and Paul McDonald. He was also selected to the first team All-Pac-10, first team All-Coast. Browner notched 243 total tackles, nine interceptions, 40 passes defended, seven fumble recoveries and three touchdown returns in his collegiate career.
His USC teams compiled a 36–8–1 mark. He played in one Rose Bowl Game and one Fiesta Bowl.
Professional career
Browner was the first round draft pick and 19th overall selection as safety of the Minnesota Vikings in 1983.
An outstanding defensive player and tackler, Browner was selected to six Pro Bowls (1985–1990) while playing with the Minnesota Vikings. He finished his career with the Tampa Bay Buccaneers in 1992. Browner was a four time member of the John Madden "All-Madden Team".
While with the Vikings, Browner travelled to China with the NFL players association in 1988, to Germany with the 1989 USO Tour, and to Paris to kick off the French Federation of American Football Annual Championship game in 1991.
Browner amassed over 1,100 total tackles, caused 18 fumbles and recovered 16 of them; he also led the Vikings in nine defensive categories over his NFL career.
Browner holds the NFL Pro Bowl record with three fumble recoveries returned for touchdowns. He had 40 interceptions in his career for 505 total yards including the playoffs.
The Minnesota Vikings placed Browner in the team's Ring of Honor in October 2013 on a Sunday night football game vs the Packers. Joey Browner was the 21st overall selection into the Minnesota Vikings Ring of Honor that night.
In 2019, the Professional Football Researchers Association named Browner to the PFRA Hall of Very Good Class of 2019
Personal
The Browner family has produced six NFL players: brothers Ross Browner (Cincinnati Bengals & Green Bay Packers), Jim Browner (Cincinnati Bengals), and Keith Browner all played in the NFL, as do Ross's son Max Starks (Pittsburgh Steelers) and Keith's son, Keith Browner, Jr. (Houston Texans). Browner's next eldest brother Willard was drafted by the Chicago White Sox as a pitcher and also served as the starting tailback for Notre Dame with brother Ross's teams. Youngest and late brother Gerald played at the University of Georgia.
Browner is a member of the NFL Gridiron Legends team along with former Viking teammate Cris Carter on the EA Sports game, NFL Street 2. Joey Browner was enshrined into the African-American hall of fame in 2004 for his work in radio sports broadcasting with his longtime friend Rich Perez in Las Vegas and Hawaii.
Browner has been nominated for Pro Football Hall of Fame selection nine times. He is the 21st member of the Ring of Honor and the 17th player in Minnesota Vikings history. Browner was inducted into the All "Mall of America Field" team signifying the best players who played for the Vikings during their years at the Metrodome/Mall of America Field.
References
External links
1960 births
Living people
American football safeties
Minnesota Vikings players
USC Trojans football players
Tampa Bay Buccaneers players
National Conference Pro Bowl players
Sportspeople from Warren, Ohio
Players of American football from Atlanta
Players of American football from Ohio
African-American players of American football
21st-century African-American people
20th-century African-American sportspeople |
1202269 | https://en.wikipedia.org/wiki/Personal%20software%20process | Personal software process | The Personal Software Process (PSP) is a structured software development process that is designed to help software engineers better understand and improve their performance by bringing discipline to the way they develop software and tracking their predicted and actual development of the code. It clearly shows developers how to manage the quality of their products, how to make a sound plan, and how to make commitments. It also offers them the data to justify their plans. They can evaluate their work and suggest improvement direction by analyzing and reviewing development time, defects, and size data. The PSP was created by Watts Humphrey to apply the underlying principles of the Software Engineering Institute's (SEI) Capability Maturity Model (CMM) to the software development practices of a single developer. It claims to give software engineers the process skills necessary to work on a team software process (TSP) team.
"Personal Software Process" and "PSP" are registered service marks of the Carnegie Mellon University.
Objectives
The PSP aims to provide software engineers with disciplined methods for improving personal software development processes. The PSP helps software engineers to:
Improve their estimating and planning skills.
Make commitments they can keep.
Manage the quality of their projects.
Reduce the number of defects in their work.
PSP structure
PSP training follows an evolutionary improvement approach: an engineer learning to integrate the PSP into his or her process begins at the first level – PSP0 – and progresses in process maturity to the final level – PSP2.1. Each Level has detailed scripts, checklists and templates to guide the engineer through required steps and helps the engineer improve their own personal software process. Humphrey encourages proficient engineers to customize these scripts and templates as they gain an understanding of their own strengths and weaknesses.
Process
The input to PSP is the requirements; requirements document is completed and delivered to the engineer.
PSP0, PSP0.1 (Introduces process discipline and measurement)
PSP0 has 3 phases: planning, development (design, code, compile, test) and a post mortem.
A baseline is established of current process measuring: time spent on programming, faults injected/removed, size of a program.
In a post mortem, the engineer ensures all data for the projects has been properly recorded and analysed.
PSP0.1 advances the process by adding a coding standard, a size measurement and the development of a personal process improvement plan (PIP). In the PIP, the engineer records ideas for improving his own process.
PSP1, PSP1.1 (Introduces estimating and planning)
Based upon the baseline data collected in PSP0 and PSP0.1, the engineer estimates how large a new program will be and prepares a test report (PSP1).
Accumulated data from previous projects is used to estimate the total time.
Each new project will record the actual time spent.
This information is used for task and schedule planning and estimation (PSP1.1).
PSP2, PSP2.1 (Introduces quality management and design)
PSP2 adds two new phases: design review and code review. Defect prevention and removal of them are the focus at the PSP2. Engineers learn to evaluate and improve their process by measuring how long tasks take and the number of defects they inject and remove in each phase of development.
Engineers construct and use checklists for design and code reviews.
PSP2.1 introduces design specification and analysis techniques
(PSP3 is a legacy level that has been superseded by TSP.)
The importance of data
One of the core aspects of the PSP is using historical data to analyze and improve process performance. PSP data collection is supported by four main elements:
Scripts
Measures
Standards
Forms
The PSP scripts provide expert-level guidance to following the process steps and they provide a framework for applying the PSP measures. The PSP has four core measures:
Size – the size measure for a product part, such as lines of code (LOC).
Effort – the time required to complete a task, usually recorded in minutes.
Quality – the number of defects in the product.
Schedule – a measure of project progression, tracked against planned and actual completion dates.
Applying standards to the process can ensure the data is precise and consistent.
Data is logged in forms, normally using a PSP software tool. The SEI has developed a PSP tool and there are also open source options available, such as Process Dashboard.
The key data collected in the PSP tool are time, defect, and size data – the time spent in each phase; when and where defects were injected, found, and fixed; and the size of the product parts. Software developers use many other measures that are derived from these three basic measures to understand and improve their performance. Derived measures include:
estimation accuracy (size/time)
prediction intervals (size/time)
time in phase distribution
defect injection distribution
defect removal distribution
productivity
reuse percentage
cost performance index
planned value
earned value
predicted earned value
defect density
defect density by phase
defect removal rate by phase
defect removal leverage
review rates
process yield
phase yield
failure cost of quality (COQ)
appraisal COQ
appraisal/failure COQ ratio
Planning and tracking
Logging time, defect, and size data is an essential part of planning and tracking PSP projects, as historical data is used to improve estimating accuracy.
The PSP uses the PROxy-Based Estimation (PROBE) method to improve a developer's estimating skills for more accurate project planning. For project tracking, the PSP uses the earned value method.
The PSP also uses statistical techniques, such as correlation, linear regression, and standard deviation, to translate data into useful information for improving estimating, planning and quality. These statistical formulas are calculated by the PSP tool.
Using the PSP
The PSP is intended to help a developer improve their personal process; therefore PSP developers are expected to continue adapting the process to ensure it meets their personal needs.
PSP and the TSP
In practice, PSP skills are used in a TSP team environment. TSP teams consist of PSP-trained developers who volunteer for areas of project responsibility, so the project is managed by the team itself. Using personal data gathered using their PSP skills; the team makes the plans, the estimates, and controls the quality.
Using PSP process methods can help TSP teams to meet their schedule commitments and produce high quality software. For example, according to research by Watts Humphrey, a third of all software projects fail, but an SEI study on 20 TSP projects in 13 different organizations found that TSP teams missed their target schedules by an average of only six percent.
Successfully meeting schedule commitments can be attributed to using historical data to make more accurate estimates, so projects are based on realistic plans – and by using PSP quality methods, they produce low-defect software, which reduces time spent on removing defects in later phases, such as integration and acceptance testing.
PSP and other methodologies
The PSP is a personal process that can be adapted to suit the needs of the individual developer. It is not specific to any programming or design methodology; therefore it can be used with different methodologies, including Agile software development.
Software engineering methods can be considered to vary from predictive through adaptive. The PSP is a predictive methodology, and Agile is considered adaptive, but despite their differences, the TSP/PSP and Agile share several concepts and approaches – particularly in regard to team organization. They both enable the team to:
Define their goals and standards.
Estimate and schedule the work.
Determine realistic and attainable schedules.
Make plans and process improvements.
Both Agile and the TSP/PSP share the idea of team members taking responsibility for their own work and working together to agree on a realistic plan, creating an environment of trust and accountability. However, the TSP/PSP differs from Agile in its emphasis on documenting the process and its use of data for predicting and defining project schedules.
Quality
High-quality software is the goal of the PSP, and quality is measured in terms of defects. For the PSP, a quality process should produce low-defect software that meets the user needs.
The PSP phase structure enables PSP developers to catch defects early. By catching defects early, the PSP can reduce the amount of time spent in later phases, such as Test.
The PSP theory is that it is more economical and effective to remove defects as close as possible to where and when they were injected, so software engineers are encouraged to conduct personal reviews for each phase of development. Therefore, the PSP phase structure includes two review phases:
Design Review
Code Review
To do an effective review, you need to follow a structured review process. The PSP recommends using checklists to help developers to consistently follow an orderly procedure.
The PSP follows the premise that when people make mistakes, their errors are usually predictable, so PSP developers can personalize their checklists to target their own common errors. Software engineers are also expected to complete process improvement proposals, to identify areas of weakness in their current performance that they should target for improvement. Historical project data, which exposes where time is spent and defects introduced, help developers to identify areas to improve.
PSP developers are also expected to conduct personal reviews before their work undergoes a peer or team review.
Certification
A certification covering PSP is offered by the SEI at Carnegie Mellon University. The steps to becoming an SEI-Certified PSP Developer are: learn the PSP; take the certification exam; maintain credentials.
The PSP Developer examination is based on concepts found in the PSP Body of Knowledge. The SEI maintains an FAQ on certification.
See also
Agile software development
Capability Maturity Model Integration (CMMI)
Carnegie Mellon University
Proxy-based estimating (PROBE)
Software Engineering Institute (SEI)
Team software process (TSP)
Watts Humphrey
References
Further reading
"Using a defined and measured Personal Software Process" by Watts S. Humphrey, published in IEEE Software, May 1996, pages 77–88.
PSP: A Self-Improvement Process for Software Engineers, 2005.
Delivering Successful Projects with TSP(SM) and Six Sigma: A Practical Guide to Implementing Team Software Process, Mukesh Jain, 2008.
"Delivering Successful Projects With Challenges of New Teams" by Mukesh Jain (http://www.sei.cmu.edu/tspsymposium/2009/2006/deliver.pdf), September 2006.
Software Engineering: A Practitioner's Approach 7th Edition. Roger S Pressman. McGraw-Hill Higher Education. 2009. , , pages 57–58.
"The Personal Software Process (PSP) Body of Knowledge" article from the Software Engineering Institute at Carnegie Mellon.
"Personal Quality Management with the Personal Software Process" article.
External links
Software Process Dashboard, Open-source (GPL3) PSP and TSP tool; offered both without and with proprietary SEI scripts, latter requiring free SEI registration.
Software development process
Carnegie Mellon University |
15693143 | https://en.wikipedia.org/wiki/Legality%20of%20piggybacking | Legality of piggybacking | Laws regarding "unauthorized access of a computer network" exist in many legal codes, though the wording and meaning differs from one to the next. However, the interpretation of terms like "access" and "authorization" is not clear, and there is no general agreement on whether piggybacking (intentional access of an open Wi-Fi network without harmful intent) falls under this classification. Some jurisdictions prohibit it, some permit it, and others are not well-defined.
For example, a common but untested argument is that the 802.11 and DHCP protocols operate on behalf of the owner, implicitly requesting permission to access the network, which the wireless router then authorizes. (This would not apply if the user has other reason to know that their use is unauthorized, such as a written or unwritten notice.)
In addition to laws against unauthorized access on the user side, there are the issues of breach of contract with the Internet service provider on the network owner's side. Many terms of service prohibit bandwidth sharing with others, though others allow it. The Electronic Frontier Foundation maintains a list of ISPs that allow sharing of the Wi-Fi signal.
Australia
Under Australian Law, "unauthorized access, modification or impairment" of data held in a computer system is a federal offence under the Criminal Code Act 1995. The act refers specifically to data as opposed to network resources (connection).
Canada
In Canadian law, unauthorized access is addressed the Criminal Code, s 342.1, which provides that: "Every one who, fraudulently and without colour of right" obtains "computer services" from an access point is subject to criminal charges.
Section 326(1) of the Criminal Code may also be used to address unauthorized access of a computer network: '(1) Every one commits theft who fraudulently, maliciously, or without colour of right', '(b) uses any telecommunication facility or obtains any telecommunication service.'
In Morrisburg, Ontario in 2006, a man was arrested under section 326 of the Criminal Code. Ultimately the arrest was poorly reported, there does not seem to be any information available with regards to conviction.
European Union
In September 2016, the European Court of Justice decided in "McFadden" C-484/14 that "a businessman providing a public wifi network is not responsible for copyright infringement incurred by users. But he can be ordered to protect the network with a password, to prevent copyright infringement". The Electronic Frontier Foundation had lobbied for not requiring passwords.
Germany
Hong Kong
Under HK Laws. Chapter 200 Crimes Ordinance Section 161 Access to computer with criminal or dishonest intent:
Italy
Unauthorized access to a protected system is illegal.
Japan
On April 28, 2017 the Tokyo District Court ruled that accessing a wireless LAN network without authorization is not a crime, even if the network is protected with a password. In a case brought before the court involved a man named Hiroshi Fujita, who was accused of accessing a neighbors wi-fi network without authorization and sending virus-infected emails, and then using that to steal internet banking information and send funds to his own bank account without authorization. Hiroshi was found guilty of most of what he was accused of and sentenced to 8 years in prison. Regarding the unauthorized access of wireless networks, prosecutors argued that wi-fi passwords fall under the category of "secrets of wireless transmission" (無線通信の秘密) and that therefore obtaining and using passwords without permission of the network operator would fall under the category of unauthorized use of wireless transmission secrets, which is prohibited by law. However, the court ruled that the defendant is not guilty, stating in their ruling that wi-fi passwords do not fall under that category and therefore the unauthorized obtainment of passwords and subsequent accessing of protected wireless networks is not a crime.
Russia
Although Russian criminal law does not explicitly forbid access to another person's network, there is a common judicial practice to qualify these cases as an "unathorized access to an information" (a broadly interpreted concept in Russian law regarding computer crimes) according to Article 272 of the Criminal Code. To construct the accusation, one considers ISP's billing data the information which has been accessed.
In addition, if the defendant have used any program (network scanner, for example) to access the network, he may also be charged by Article 273 (creation, usage and distribution of malware).
Singapore
Piggybacking another person's unsecured wireless network is illegal in Singapore under section 6(1)(a) of the Computer Misuse and Cybersecurity Act. The offender is liable to a fine of $10,000, imprisonment for up to 3 years, or both.
In November 2006, the 17-year-old Garyl Tan Jia Luo, was arrested for tapping into his neighbour's wireless Internet connection. On 19 December, Tan pleaded guilty to the charge, and on 16 January 2007 he became the first person in Singapore to be convicted of the offense. He was sentenced by the Community Court to 18 months' probation, half of which was to be served at a boys' home. For the remaining nine months, he had to stay indoors from 10:00 pm to 6:00 am. He was also sentenced to 80 hours of community service and banned from using the Internet for 18 months; his parents risked forfeiting a S$5,000 bond if he failed to abide by the ban. Tan was also given the option of enlisting early for National Service. If he did so, he would not have to serve whatever remained of his sentence.
On 4 January 2007, Lin Zhenghuang was charged for using his neighbour's unsecured wireless network to post a bomb hoax online. In July 2005, Lin had posted a message entitled "Breaking News – Toa Payoh Hit by Bomb Attacks" on a forum managed by HardwareZone. Alarmed by the message, a user reported it to the authorities through the Government of Singapore's eCitizen website. Lin faced an additional 60 charges for having used his notebook computer to repeatedly access the wireless networks of nine people in his neighborhood. Lin pleaded guilty to one charge under the Telecommunications Act and another nine under the Computer Misuse Act on 31 January. He apologised for his actions, claiming he had acted out of "stupidness" and not due to any "malicious or evil intent". On 7 February he was sentenced by District Judge Francis Tseng to three months' jail and a S$4,000 fine. The judge also set sentencing guidelines for future 'mooching' cases, stating that offenders would be liable to fines and not to imprisonment unless offences were "committed in order to facilitate the commission of or to avoid detection for some more serious offence", as it was in Lin's case.
United Kingdom
The Computer Misuse Act 1990, section 1 reads:
In London, 2005, Gregory Straszkiewicz was the first person to be convicted of a related crime, "dishonestly obtaining an electronics communication service" (under s.125 Communications Act 2003). Local residents complained that he was repeatedly trying to gain access to residential networks with a laptop from a car. There was no evidence that he had any other criminal intent. He was fined £500 and given a 12-month conditional discharge.
In early 2006, two other individuals were arrested and received an official caution for "dishonestly obtaining electronic communications services with intent to avoid payment."
United States
There are federal and state laws (in all 50 states) addressing the issue of unauthorized access to wireless networks. The laws vary widely between states. Some criminalize the mere unauthorized access of a network, while others require monetary damages for intentional breaching of security features. The majority of state laws do not specify what is meant by "unauthorized access". Regardless, enforcement is minimal in most states even where it is illegal, and detection is difficult in many cases.
Some portable devices, such as the Apple iPad and iPod touch, allow casual use of open Wi-Fi networks as a basic feature, and often identify the presence of specific access points within the vicinity for user geolocation.
Arrests
In St. Petersburg, 2005, Benjamin Smith III was arrested and charged with "unauthorized access to a computer network", a third-degree felony in the state of Florida, after using a resident's wireless network from a car parked outside.
An Illinois man was arrested in January 2006 for piggybacking on a Wi-Fi network. David M. Kauchak was the first person to be charged with "remotely accessing another computer system" in Winnebago County. He had been accessing the Internet through a nonprofit agency's network from a car parked nearby and chatted with the police officer about it. He pleaded guilty and was sentenced to a fine of $250 and one year of court supervision.
In Sparta, Michigan, 2007, Sam Peterson was arrested for checking his email each day using a café's wireless Internet access from a car parked nearby. A police officer became suspicious, stating, "I had a feeling a law was being broken, but I didn't know exactly what". When asked, the man explained to the officer what he was doing, as he did not know the act was illegal. The officer found a law against "unauthorized use of computer access", leading to an arrest and charges that could result in a five-year felony and $10,000 fine. The café owner was not aware of the law, either. "I didn't know it was really illegal, either. If he would have come in [to the coffee shop] it would have been fine." They did not press charges, but he was eventually sentenced to a $400 fine and 40 hours of community service. This case was featured on The Colbert Report.
In 2007, in Palmer, Alaska, 21-year-old Brian Tanner was charged with "theft of services" and had his laptop confiscated after accessing a gaming website at night from the parking lot outside the Palmer Public Library, as he was allowed to do during the day. The night before, the police had asked him to leave the parking lot, which he had started using because they had asked him not to use residential connections in the past. He was not ultimately charged with theft, but could still be charged with trespassing or not obeying a police order. The library director said that Tanner had not broken any rules, and local citizens criticized police for their actions.
Legislation
In 2003, the New Hampshire House Bill 495 was proposed, which would clarify that the duty to secure the wireless network lies with the network owner, instead of criminalizing the automatic access of open networks. It was passed by the New Hampshire House in March 2003 but was not signed into law. The current wording of the law provides some affirmative defenses for use of a network that is not explicitly authorized:
There are additional provisions in the NH law, Section 638:17 Computer Related Offenses, as found by searching NH RSA's in December 2009. They cover actual use of someone else's computer rather than simply "access":
New York law is the most permissive. The statute against unauthorized access only applies when the network "is equipped or programmed with any device or coding system, a function of which is to prevent the unauthorized use of said computer or computer system". In other words, the use of a network would only be considered unauthorized and illegal if the network owner had enabled encryption or password protection and the user bypassed this protection, or when the owner has explicitly given notice that use of the network is prohibited, either orally or in writing. Westchester County passed a law, taking effect in October 2006, that requires any commercial business that stores, utilizes or otherwise maintains personal information electronically to take some minimum security measures (e.g., a firewall, SSID broadcasting disabled, or using a non-default SSID) in an effort to fight identity theft. Businesses that do not secure their networks in this way face a $500 fine. The law has been criticized as being ineffectual against actual identity thieves and punishing businesses like coffee houses for normal business practices.
See also
Piggybacking (Internet access)
Wardriving
References
Wireless networking
Wireless access points
Piggybacking |
43884105 | https://en.wikipedia.org/wiki/The%20Kingstonians | The Kingstonians | The Kingstonians were a Jamaican rocksteady/reggae vocal group best known for their late 1960s recordings for producer Derrick Harriott.
History
Formed in 1966, the group comprised Cebert "Jackie" Bernard, his brother Lloyd "Footy" Bernard, and Lloyd Kerr. They first recorded for producer J.J. Johnson, and had their first hit with "Winey Winey" in 1967. Between 1968 and 1970 they recorded for producer Derrick Harriott, and had chart-topping singles with "Singer Man" (later covered by Three Dog Night and UB40) and "Sufferer". The group's only album released while they were together, Sufferer, was released in 1970 on Trojan Records, and featured material recorded for Harriott. They went on to record with other producers including Leslie Kong and Rupie Edwards before splitting up in the early 1970s.
The group's primary songwriter Jackie Bernard pursued a solo career, with several releases credited to Jackie Bernard & the Kingstonians. He recorded "Economic Crisis" for Lee "Scratch" Perry in the late 1970s under the pseudonym 'Jack Lord'.
Jackie Bernard fell on hard times and became ill with diabetes; Unable to afford medication, a foundation was set up in 2014 to provide him with financial assistance. He died from pneumonia on 14 September 2014, aged 66.
Discography
Albums
Sufferer (1970), Trojan - reissued 1991
Singles
"Winey Winey" (1967), Rio
"Mix It Up" (1968), Trojan
"Mommy and Daddy" (1968), Doctor Bird
"Fun Galore" (1968), Doctor Bird
"Put Down Your Fire" (1968), Doctor Bird
"Mother Miserable" (1968), Coxsone
"Make You a Woman", Studio One
"Nice Nice" (1969), Big Shot
"Singer Man" (1969), Big Shot
"The Clip" (1969), Crab
"I am Just a Minstrel" (1969), Bullet
"I'm Gonna Make It" (1969), Beverley's
"Hold Down" (1969), Crab
"Rumble Rumble" (1970), Song Bird
"Out There" (1970), Song Bird
"Love Is the Greatest Science" (2011), Caltone
"You Don't Remember Me" (2012), Tennors
Jackie Bernard/Jackie Bernard & the Kingstonians
"Way Down in the Ghetto" (1973), Leal
"Jah Children" (1974), Wambesi
"Never Changing Harmony" (1975), Stun King
"Original Style" (1975), Tough Jack
References
Jamaican reggae musical groups |
17696835 | https://en.wikipedia.org/wiki/Fi-linx | Fi-linx | fi-linx (intentionally lower-case) is a credit union service organization owned by Maps Service Agency, a subsidiary of Maps Credit Union, and headquartered in Salem, Oregon. A financial software development company, fi-linx products are specifically marketed to credit unions. Their services are offered both directly and through the Credit Union Executives Society (CUES).
History
fi-linx was founded by a group of Maps Credit Union employees in Autumn 2006. After trying unsuccessfully to find Deposit Reclassification software that met the needs of the credit union, fi-linx was formed to create its own software, using in-house software developers.
Products and services
fi-linx offers two credit union technology solutions: Deposit Reclassification and Check Checker.
Deposit Reclassification, the primary service provided by fi-linx, provides an automated method for credit unions to reclassify their deposit accounts to significantly lower their Federal Reserve balance. This is done by splitting each transaction account into a checking subaccount (which carries a reserve requirement) and a savings subaccount (which does not carry a reserve requirement), a process allowed by the Federal Reserve Bank in 1993. The service has been reported to have saved Maps Credit Union $145,000 per year and it is estimated that $154 million could be saved industry-wide if every credit union were to use the service. Check Checker is a form of check fraud deterrent software that uses real-time validation to check the routing number of a check with the Federal Reserve, as well as checking fraud alerts from the National Credit Union Administration and Federal Deposit Insurance Corporation.
Competition
Both deposit reclassification and check fraud deterrent software are offered by other organizations. For example, although not specifically marketing to credit unions, Ceto and Associates also offers deposit reclassification services, with over 1500 clients in all 50 states.
References
Credit unions based in Oregon
Banks established in 2006
Companies based in Salem, Oregon
2006 establishments in Oregon |
4525859 | https://en.wikipedia.org/wiki/School%20of%20Science%20and%20Engineering | School of Science and Engineering | The School of Science and Engineering Magnet (known as the School of Science and Engineering or SEM) is a magnet college preparatory high school located in the Yvonne A. Ewell Townview Magnet Center, home of six magnet high schools in the Dallas Independent School District. SEM's mascot is an eagle, and its school colors are maroon and white. Its current principal is Andrew Palacios. Past principals include: Tiffany Huitt (who was promoted to DISD Executive Director), Jovan Carisa Wells, and Richard White.
Academics
On admission, each student is placed into one of three math and science "tracks" based on your middle school—a Regular Track, a Fast Track, and a Super Fast Track. Each track doesn't really matter when college comes and completes a different number and difficulty of math and science courses.
SEM stresses a philosophy of hands-on science education, and specializes in offering science, technology, engineering, and mathematics courses. Its mathematics courses range in complexity from Pre-AP Algebra II (the lowest-level course offered) to AP Calculus BC and its own unique Advanced Topics of the Theory of Applied Mathematics (A. T. T. A. M.) course. Science courses range from basic-level courses such as Pre-AP Biology to higher-level courses such as AP Physics C and AP Chemistry. Of special note is SEM's unique "SuperLab" class, a laboratory-based course which combines the material of both AP Physics C and AP Chemistry. Tech courses that instruct students in Computer Science concepts and the Java programming language are also available in the form of Pre-AP Computer Science A and AP Computer Science A.
Recognition
In both 2005 & 2011, SEM has received the Blue Ribbon School award by the U.S. Department of Education.
SEM was ranked as second best high school in the United States in 2007 according to the survey "The 1200 Best Public High Schools in the USA", it was eighth in 2006 and sixth in 2005. In 2007, SEM was ranked as the 18th best public high school in America by U.S. News & World Report.
The College Board announced that SEM is number 1 in the world for passing minorities in Calculus AB and number one in the United States for passing Hispanics in Computer Science. In 2006, SEM was visited by President George W. Bush for excellence in education and the school's philosophy of emphasising math and science, something he stressed in his 2006 State of the Union address.
The school consistently ranks number one in D Magazine's Best Public High Schools in Dallas and has been named the Academic UIL District Champion for District 9-5A and 11-5A in 2006 and 2007 respectively.
In 2011, SEM was ranked the number 1 high school in America by the Washington Post. The school was also ranked number 1 in the Newsweek list of America's Best High Schools. In 2012, it was ranked the number one high school in the North Texas area by Children at Risk, a research and advocacy institute dedicated to helping children.
2012 - SEM wins the Intel School of Distinction Award for the Best High School Math Program in the Country.
2012 - SEM Ranked #2 (out of 1900 public high schools) -Washington Post High School Challenge
2012 - SEM Ranked #4 (out of 1000 public high schools) -Newsweek.com [1]
In 2018, SEM was ranked as the 13th best public high school in America by U.S. News & World Report.
In 2019, SEM was ranked as the number 1 best public high school in Texas by the U.S. News & World Report. SEM also ranked 12th place as the best public high school in America.
Extracurricular activities
Due to rules and regulations involving magnet schools, SEM has no sports teams (although students may participate in those of their home schools). However, it does provide a wide variety of extracurricular activities and UIL teams:
Orchestra
UIL Calculator Team
UIL Journalism Team
Academic Decathlon
"Big D" Marching Band
UIL Number Sense Team
Townview Theatre Company
Choir
UIL Current Issues & Events Team
Intergirls
French Club
Environmental Science/Volunteering Club
Chess Club
Latin Club
Robotics
UIL Literary Criticism
National Honor Society
National Latin Honor Society
UIL Math Team
SEM Yearbook
UIL One Act Play
UIL Current Events
UIL Science Team
Finance/Economics Club
Debate
UIL Social Studies
UIL Computer Science Team
SEM won the AAAAA individual UIL Computer Science event at the UIL State competition in Austin, Texas in 2001, and also won the AAAAA team UIL Computer Science competition in both 2000 and 2001. SEM also won the 2012 and 2013 Academic UIL Region 2 5A competition. At the 2015 UIL State competition in Austin, SEM put up the highest team score in UIL Calculator Applications in all of Texas.
References
External links
Science and Engineering Website
Dallas ISD home page
Student Council Announcements Site for the Class of 2009
Dallas Independent School District high schools
Public high schools in Dallas
Public magnet schools in Dallas |
649437 | https://en.wikipedia.org/wiki/B32%20Business%20Basic | B32 Business Basic | B32 Business Basic was a competitor to Data General Business Basic written by Murray Haszard in 1986. It ran on the Data General Eclipse MV line of computers initially, and was ported to Unix in 1989 and to DOS in 1991.
B32 Software was the company that developed and supported B32 Business Basic, with the original site in Auckland, New Zealand supplemented by a sales and support centre in Blue Ash, Ohio.
The B32 interpreter was highly compatible with Data General Business Basic (DGBB), but it also enhanced and extended that language in many ways. Like DGBB, B32 could access Data General's INFOS II database and it could use DGBB's lock server or its own improved version. B32 was over twice as fast for number crunching, string manipulation, and disk I/O. Many of the internal restrictions of DGBB were removed. B32 allowed 32,767 line numbers (65,535 in later versions), compared with DGBB's 9,999. B32 allowed more memory for programs, more simultaneous locks, and more files to be open at once. Language enhancements included a high-speed internal sort routine, do-while blocks, and the ability to step backwards through an indexed file. Debugging facilities were also significantly improved over DGBB.
B32 allowed programs to run with full cursor positioning and attribute support on non-Data General terminals, even programs which had Data General control sequences hard-coded into them.
B32 carried out all arithmetic at "quad precision", i.e. 64-bit, and emulated the "triple precision" and "double precision" versions of DGBB at runtime. This avoided the subtle incompatibilities between the two versions of DGBB.
On Unix and DOS, B32 emulated all commonly used system calls of Data General's AOS/VS and RDOS operating systems, including implementing its own symbolic links on SCO Xenix and DOS.
In 1991, a features war between B32 and one of its competitors, Transoft's Universal Business Basic, saw major improvements to the B32 language. B32 added a Bluebird Business Basic emulation mode, made line numbers optional, and added subroutine calls by name with parameter passing.
Transoft had greater financial resources than B32, and more effective marketing. It purchased B32 in 1992. The DOS and Unix versions of B32 were discarded as Universal Business Basic ran on those operating systems, but the Eclipse MV version of B32 continued to be sold while the MV line lasted. Some of the B32 Software staff in Blue Ash moved to Transoft's Atlanta, Georgia office. The New Zealand staff went on to found Binary Research.
References
DG Review article on the acquisition of B32 by Transoft
Data General
BASIC interpreters |
20259801 | https://en.wikipedia.org/wiki/Text%20Template%20Transformation%20Toolkit | Text Template Transformation Toolkit | Text Template Transformation Toolkit (usually referred to as "T4") is a free and open-source template-based text generation framework. T4 source files are usually denoted by the file extension ".tt".
Overview
T4 is used by developers as part of an application or tool framework to automate the creation of text files with a variety of parameters. These text files can ultimately be any text format, such as code (for example C#), XML, HTML or XAML.
T4 uses a custom template format which can contain .NET code and string literals in it, this is parsed by the T4 command line tool into .NET code, compiled and executed. The output of the executed code is the text file generated by the template. T4 can also be completely run within the .NET applications via the use of the TextTransformation class which eliminates the need for the end user to have Visual Studio installed.
T4 is used within Microsoft in ASP.NET MVC for the creation of the views and controllers, ADO.NET Entity Framework for entity generation, and ASP.NET Dynamic Data. It is also used outside of Microsoft in projects such as SubSonic.
T4 templating is supported in Visual Studio, MonoDevelop and JetBrains Rider.
Controls
There are four types of controls handed by the T4 template transformation engine.
Criticism
Microsoft has often been criticized for the lack of tooling support for T4 within the Visual Studio IDE, and relies on third parties namely Tangible Engineering, however later revisions have included better tooling support.
History
2005: Microsoft released the first version of T4 as an out of band release for Visual Studio 2005
2008: Microsoft includes it with Visual Studio 2008
2010: Microsoft includes it with Visual Studio 2010 which included significant new features to improve performance, usability for both template authors and tool builders and better integration into Visual Studio's DSL tools.
2015: Visual Studio 2015 Update 2 can use C# version 6.0 features
2017: Open source version of engine released which supports .NET Core
2019: JetBrains adds support for T4 in Rider
See also
Comparison of code generation tools
m4 (computer language)
Smarty
References
External links
GitHub - mono/t4: T4 text templating engine
.NET
Free and open-source software
Microsoft free software
Microsoft Visual Studio
Software that uses Mono (software)
Software using the MIT license
Template engines
2005 software
2008 software
2010 software |
13011648 | https://en.wikipedia.org/wiki/Reason%20Studios | Reason Studios | Reason Studios (formerly known as Propellerhead Software) is a music software company, based in Stockholm, Sweden, and founded in 1994. It produces the studio emulation Reason.
History
Propellerhead Software was founded in 1994 by Ernst Nathorst-Böös, Marcus Zetterquist and Peter Jubel, who still hold prominent positions within the company. Their first release was ReCycle, a sample loop editor that could change the tempo of a loop without affecting the pitch. The export medium was Propellerhead's own REX format. ReCycle was launched in conjunction with Steinberg, who marketed it as a companion to Cubase, as it brought a simple way of gaining control over tempo and timing of audio loops.
In 1997, Propellerhead released ReBirth RB-338, a step based, programmable sequencer which emulated classic Roland instruments commonly associated with techno: TB-303 Bass Line Synthesizer and the TR-808 and TR-909 drum machines. It was hailed as an affordable alternative to buying old, unreliable hardware devices. Roland Corporation requested that an acknowledgment be added to the ReBirth packaging and splash screen; the unofficial endorsement became a marketing boost for Propellerhead, and they have retained a close relationship with Roland ever since.
ReWire was developed jointly between Propellerhead and Steinberg for use with their Cubase sequencer. Released in 1998, it provided a virtual audio and synchronization connection between Cubase and ReBirth. In January 1999 the protocol was opened for general use by third parties without any license fee, to allow communication between different sequencers.
Propellerhead soon focused their attention on their new product, the award-winning Reason, released in 2000. Reason was an entire studio emulation complete with virtual cables and representations of a subtractive synthesizer, sampler and drum machine, alongside a REX file loop player, a pattern step sequencer and a multitude of effects units. Making Reason's appeal even greater was the ability to create as many of each device as a computer could handle and a simple sequencer for notes and device automation. Additionally, Reason could run on average spec computers and was extremely competitively priced.
In May 2009, Propellerhead announced a new product, Record. Designed for recording, arrangement and mixing, Record is made along the lines of Reason and continues the tradition of emulating hardware and the rack.
Record emulates a recording studio, with a mixing desk, a rack of virtual instruments and effects, and an audio sequencer (similar to traditional MIDI sequencing.) It is also made to work alongside Reason; if Record is installed on a computer with Reason on it, the modules from Reason will be usable inside of Record.
Released 9 September 2009, Record has been praised for its stability, seamless integration with Reason, and sound quality, and has received a number of awards, including Future Music's Platinum Award, Computer Music Editor's Choice and Performance awards, and the MusicTech Excellence award.
In April 2010, Propellerhead released their first app for mobile platforms; a remake of their ReBirth RB-338 software for the Apple iPhone, iPod Touch and iPad. Developed together with Retronyms, it's a 100% port of the original with added functionality for sharing song files with other iPhone users, zooming and panning.
In July 2011, Propellerhead announced plans for Reason version 6 which includes all the features of Record 1.5. This allowed Propellerhead to discontinue Record and create two different versions of Reason.
In March 2012, Propellerhead announced Rack Extensions and the Rack Extension store, a software architecture that will allow 3rd party developers to use their own instruments and effect devices inside of Reason. This technology was announced to appear alongside Reason 6.5 as a free update. Rack Extensions will be sold in an app store similar in a fashion in which Apple Inc. sells applications for the popular iOS platform. Hosted by Propellerhead Software, developers are free to use their own DSP and existing code to develop instruments and effects for use in Reason. When purchased, the Rack Extensions appear in Reason as a native Reason instrument or effect module and are privy to all of the features that Reason offers in its native instruments and effect devices.
In April 2017, Propellerhead announced plans to support VST plugins in Reason, starting from version 9.5
Name
The name propellerhead comes from the pejorative term used to deprecate science fiction fans and other technophiles, who are stereotypically drawn wearing propeller beanies. The company is not related to the British big beat musical ensemble Propellerheads.
On August 26, 2019, Propellerhead announced they would change their name to Reason Studios to have a name more closely tied to their core product: Reason.
Use of the Internet
From early on, Propellerhead used the Internet as both a marketing tool and as a method of ensuring they could communicate with their user base. An alpha version of ReBirth was made available for free download on the Propellerhead website in December 1996, and the company even searched the internet for active users of the TB-303 and sent them invitation emails to try the new software.
The user forum has always been at the forefront of the Propellerhead community, with many employees checking them every day. Allowing users to make requests and suggestions directly to the developers led to the first downloadable ReBirth update in 1997, and still today registered users of Propellerhead software can download updates and much additional content online. In November 2013, the forums were shut down indefinitely due to security concerns with the forum software. On 17 December they were resurrected with 4 new forum categories: Beginner, Advanced User, Rack Extensions and Post Your Music.
On 16 January 2014 Propellerhead Software announced that they will close down the 15-year-old Reason community forums, shifting online customer interaction to their social media accounts instead. The unofficial new forum, run by Reason users rather than by Propellerhead, is Reason Talk. Though this is an independent forum, some Propellerhead employees have posted there and the forum hosted the official Reason beta test forum for Reason Version 9.
Current products
Reason - The full reason DAW
Reason Rack Plugin - Included with the Reason DAW (VST3/AU/AAX) works in all major DAWS.
Reason+ - Reason Studios Subscription Service. Available since Jan 2021.
ReCycle
Reason Adapted - a cut down version of Reason distributed as part of various software bundles
Figure - an iOS app that utilizes some technology from Reason's Thor synthesizer and Kong drum machine. It allows users to compose short loops by drawing figures on a touch screen device.
Rebirth for iOS - an iOS app that brings almost all of the functionality of the desktop version of now discontinued ReBirth RB-338.
Reason Compact - an iOS app that combines some of the devices from Reason, most notably the Europa synthesizer
Take - an iOS app for recording song ideas
Thor - an iOS app version of the powerful synthesizer that was introduced in Reason 4
Rack extensions
Algorithm FM Synthesizer
Beat Map Algorhythmic Drummer
Complex-1 modular synthesizer
Drum Sequencer
Fingerpicking Nylon A-list Acoustic Guitarist
Friktion Modeled Strings
Layers
Layers Wave Edition
Parsec
Polar
PolyStep Sequencer
Processed Pianos
Quad Note Generator
Radical Keys
Reason Drum Kits
Reason Electric Bass
Rotor
Scenic Hybrid Instrument
Umpf Club Drums
Umpf Retro Beats
Rack extensions that are now included in Reason
Audiomatic Retro Transformer (included in Reason 9)
Pulsar - Dual LFO (included in Reason 9 )
Radical Piano (included in Reason since version 10 )
Synchronous (included in Reason since version 10 )
Technologies
REX2
Remote - a communication protocol for use between control surfaces and software applications, first incorporated into Reason 3.
Rack Extensions - a software platform that allows the use of instruments and effects developed by 3rd party companies for use inside of Reason.
Reason ReFills
ReFills compress sounds, settings and instrument configurations into single files, and are the only way of mass importing additional sounds into Reason.
Reason Pianos
Reason Drum Kits
Reason Soul School
Reason Electric Bass ReFill
RDK Vintage Mono ReFill
ElectroMechanical 2.0 ReFill
Strings ReFill
Abbey Road Keyboards - discontinued, developed with Abbey Road Studios
Discontinued products
ReBirth RB-338 - now reworked as an iOS app
Record (incorporated into Reason as of version 6)
Europa - a VST implementation of this synthesizer that was introduced in Reason 10. Discontinued with Reason 11 as Reason 11 can now be used as a plugin in other DAWs.
ReWire - discontinued since Reason 11 as it can now be used as a plugin in other DAWs
Balance - an audio interface with optimizations for use with Reason
A-List Series Rack Extensions - The A-List series of rack extensions were a set of samplebased rack extensions.
PX7 FM Synthesizer
A-List Acoustic Guitarist
A-list Classic Drummer
A-list Power Drummer
A-list Studio Drummer
Pop Chords A-list Electric Guitarist
Power Chords A-list Electric Guitarist
Reason Intro - an entry level version of Reason with fewer devices
Reason Suite - the full Reason package plus all rack extensions from Reason Studios. Available since version 11
References
External links
Official website
Allihoopa (Closed as of January 17th 2019)
ReBirth Museum
LearnReason - A Propellerhead Reason website by Matthew Hess
ReasonExperts - A Propellerhead Reason website by Hydlide
Reasonistas - A Propellerhead Reason website and apparel shop by Noel G.
ReasonTalk - A Propellerhead Reason Forum by Kenni
Music production Tips/Techniques/Reviews (Reason,Reason Rack)
ReasonHeads - A Propellerhead Reason Forum by Heigen5
Companies based in Stockholm
Software companies of Sweden
Electronic music organizations
Music equipment manufacturers
Digital audio workstation software
Software synthesizers |
420471 | https://en.wikipedia.org/wiki/You%20Don%27t%20Know%20Jack%20%28franchise%29 | You Don't Know Jack (franchise) | You Don't Know Jack is a series of video games developed by Jackbox Games (formerly known as Jellyvision Games) and Berkeley Systems, as well as the title of the first You Don't Know Jack game in the series. You Don't Know Jack, framed as a game show "where high culture and pop culture collide", combines trivia with comedy. While it is primarily a PC and Mac-based franchise with over two dozen releases and compilations for those platforms, there have been a few entries released for consoles: two for the original PlayStation, and the 2011 release which had versions for the Xbox 360, PlayStation 3, Nintendo DS and Wii. In 2012, Jackbox Games developed and published a social version of the game on Facebook with cross-platform versions subsequently released for iOS, Android and Kindle. On November 5, 2013, the majority of the franchise's many volumes and spinoffs were reissued onto Steam by Jackbox Games. On November 18, 2014, You Don’t Know Jack 2015 was released as part of The Jackbox Party Pack on Windows, macOS, Xbox 360, Xbox One, PlayStation 3, PlayStation 4, and later Nintendo Switch, iPad, Amazon Fire TV, Android TV, Nvidia Shield, Apple TV, and Xfinity X1. On October 17, 2018, You Don't Know Jack: Full Stream was released as part of The Jackbox Party Pack 5 for the same platforms as You Don't Know Jack 2015.
History
In 1991, Jellyvision's former identity, Learn Television, released the award-winning film The Mind's Treasure Chest, which featured lead character Jack Patterson. When Learn Television sought to use new multimedia technologies to create a more active learning experience, the company teamed up with Follett Software Company and developed "That's a Fact, Jack!", a reading motivation CD-ROM game show series covering young adult fiction, targeted to 3rd through 10th graders. The game would give a title for a child to read, and then ask questions related to that title.
The idea for You Don't Know Jack began while That's a Fact, Jack! was still in development. The game's title comes from the more vulgar version of the phrase: "You don't know jack shit".
Gameplay
Most versions of the game can be played by up to three players. The game can be played by only one player on the website and the iOS app. The game can be played by up to four players on the tabletop version, You Don't Know Jack 2011 (except for the PC and Nintendo DS versions, which are limited to two players), the OUYA version, Party and the game in The Jackbox Party Pack titled You Don't Know Jack 2015. The Full Stream edition in The Jackbox Party Pack 5 can accommodate up to eight players plus up to 10,000 additional "Audience" members. All versions of the game feature the voice of an off-screen host, who reads questions aloud, provides instructions regarding special question types, and pokes fun at the players.
The game usually opens with a green room segment, in which the players are prompted to enter their names and given instructions for play. The audio during this segment includes rehearsing singers, a busy producer, and a harassed studio manager/host. The only graphics are a large "On Air/Stand By" sign in the middle of the screen, visual representations of the players' button assignments, and a box for name entry. If the players take too long to think of their names or if the players press the "return" or "enter" key without typing in their names, then the announcer will name the players. In games starting with the Netshow, on certain days, such as Christmas Eve, or certain times such as a Saturday night, or even during Twilight, the announcer will mention the time of day or the special holiday, and sometimes grumble about the game being played at that time or on that day. There is no box for name entry in the second episode of The Ride. In the PlayStation versions, after the game is finished, players can name themselves next to the score recorded. In the console versions of You Don't Know Jack 2011, the OUYA version, and the single-player games of You Don't Know Jack 2015, the players are prompted to choose their names that they typed in before starting the game. (The console versions of You Don't Know Jack 2011 also allows players to make new names in the "Contestants" section.) If one or more players choose the "I don't care" option, the announcer or the host will tell that they refused to enter their names. Additionally in these games, the sign-in screen is famous for an Easter egg where if the player types in the phrase "fuck you" as their name. The phrase will be changed to a good name afterwards. In You Don't Know Jack 2011 and OUYA, the announcer will tell the player that they have no friends or didn't use proper English. In You Don't Know Jack 2015, the host will punish the player for typing the offending name. If the player does it once, the host will deduct $1,000 from their score. If the player does it again, the host will deduct $50,001 from their score. (The deduction is only cinematic, and does not persist to the first question of the game.) If the player does it three or more times, the host will end the game with a goat, forcing the player to quit to the main menu of Jack 2015.
Most versions of You Don't Know Jack offer the choice of playing a 7- or 21-question game; some versions offer only 15 questions (the Netshow, Louder! Faster! Funnier!, 5th Dementia and Mock 2), and others offer only 13 questions (The Ride), 11 questions (HeadRush, You Don't Know Jack 2011, iOS, OUYA, Party, You Don't Know Jack 2015 and Full Stream), or 7 questions ("The Lost Gold" and the Flash website). In a 21-question game, there is a brief intermission after the tenth question. Most questions are multiple choice, with some occasional free-entry questions, or mini-games. The Facebook version offers only 5 questions.
In its original format (Vol. 1, Sports, Vol. 2, Movies, TV, Vol 3, HeadRush, Offline, Louder! Faster! Funnier! and "The Lost Gold"), before each question, one player is given a choice of three categories. Each has a humorous title that has some connection to the topic of the corresponding question. After a short animated introduction, which is often followed by a sung jingle about the question number, the host asks the question. Typically, the question is multiple choice and players are given 10 seconds to select an answer. The first player to "buzz in" and give the correct answer wins the money for that question and gets to choose the next category. If a player answers incorrectly, they lose money, but not before the host wisecracks about it. If all players answer incorrectly, or if none of the players buzz in and answer the question before the timer runs out, the host will reveal the correct answer; not answering doesn't give any players money, the host will then randomly choose a player to select another category. In The Ride, 5th Dementia, Mock 2, the website, You Don't Know Jack 2011, iOS, the Facebook version, OUYA, Party, You Don't Know Jack 2015 and Full Stream, the category is chosen by the host or pre-assigned to an episode. Players can still buzz and answer within 10 seconds in The Ride, 5th Dementia and Mock 2, while in You Don't Know Jack 2011, the Facebook version, OUYA, Party, You Don't Know Jack 2015 and Full Stream, all players answer separately within 20 seconds (more than one player can select the same answer). There are occasionally other question types offered (see below).
In earlier versions' multi-player games, each player is allowed one chance to "screw" an opponent in each half of a full (21-question) game, or once in an entire short (7-question) game. Using the "screw" forces the opponent to give an answer to a question within 10 seconds. If the player who is "screwed" answers correctly, they win the money while the player who "screwed" them loses money. This basic design has changed slightly in some versions of the game. For example, in the teen spinoff HeadRush, the screws are replaced by pairs of false teeth, so players "bite" their opponent instead. In The Ride, the feature is known as "FlakJack" and allows a player to fire multiple screws into the screen, partially or totally obscuring the question and answers. The player then chooses an opponent, who must answer even if the question is no longer readable. In German-language versions of the series, nails are used instead of screws.
In You Don't Know Jack 2011, OUYA, Party and You Don't Know Jack 2015, if a player uses the screw on an opponent, they only have 5 seconds to answer the question. If the screwed player answers incorrectly or fails to answer before the 5 seconds are up, the player who used the screw takes the money from them. It is possible to use the screw on yourself, but after the host tells you about the screw, you will still lose the money based on the time you used it at.
In Full Stream, either one or two screws (depending on the total number of players in the game, not counting Audience members) could be awarded in one of two ways: (1) they could be given to the player(s) who gave the fewest correct answers in Question 3, the "DisOrDat" round; and (2) to the lowest-scoring player(s) at the break before Question 6, which starts Round Two. (Several factors—too numerous to name here—determined how many screws would be awarded in each case, and players could only hold one screw at a time.) Unlike previous versions of the game, screws can affect all other players instead of just one (most notably if they have not yet answered before the screw is activated), and they make the question more difficult to answer for the players instead of forcing them to answer within a short amount of time. Those include removing all vowels from the answers on their devices, flipping the text of the question and the answers upside-down or backwards on their devices, making the text of the question and the answers on their devices extremely small or large, making the answers hashtagged on their devices, putting the answers on their devices into shades of gray, or bouncing the answers around the screen in the style of a screensaver program. Others include forcing the players to enter a password, scroll through an excessively long "Terms of Service" form, or change their screen names before being able to select an answer. After the correct answer is revealed, the player who used the screw earns extra money.
In earlier games, different category options were worth differing amounts of money, which was revealed after a category was chosen. This amount indicated how difficult the question would be. Amounts initially varied between $1,000, $2,000, & $3,000, and were doubled during the second round of questions. However, Vol. 1, Sports, Vol. 2 and Movies occasionally featured questions hosted by guests spawned from Fiber Optic Field Trips and Celebrity Collect Calls; these were worth $5,000 and appeared as the first question of the second round. Later games in the series didn't give players three randomly generated categories, but instead gave a set number of questions in a set order. In The Ride, players 'buzz in' to set the amount of money the question is worth. Values could range from only a few hundred dollars to $10,000 or more. In 5th Dementia, the amounts of money each player sets add up to the total amount. In Mock 2, the host chooses a category and sets the amount of money to either $1,000, $2,000, or $3,000. In the website, You Don't Know Jack 2011, iOS, the Facebook version, OUYA, Party and You Don't Know Jack 2015, players win money based on how long it took to answer correctly within the 20 seconds. The money is not doubled on the website or the Facebook version, but it was doubled in You Don't Know Jack 2011, iOS, OUYA, Party and You Don't Know Jack 2015. In Full Stream, all questions in categories the host selected are worth $1,000 (double in Round 2).
Some of the volumes have a feature called "Don't Be a Wimp", which is activated if one player has a very large lead. If no one answers a question, the host may deride the leading player, calling on the audience to shout "Don't be a wimp!", and forcing the leader to answer the question.
In some volumes, the host also punishes a player who buzzes in too early; the question disappears and a text box shows up, leaving the player with 10 seconds to type the answer. For The Ride and 5th Dementia, this is replaced by different punishments: the player is forced to pick from a list of four nonsensical answers, all of which are wrong, or both the question and answers are scrambled. This punishment is only triggered if a player buzzes in at the very instant that the question appears on the screen. In those three instances, the player that buzzed in too early is not permitted to "screw" the other players.
In some volumes, the host removes the question so the players don't cheat; the four possible choices are still shown.
Question types
The majority of You Don't Know Jack questions are multiple choice, with four possible choices. Some questions are fill-in-the-blank, requiring a typed response.
Special questions are also played during the game. Each version of You Don't Know Jack has its own different types of special questions, but some of the most common are:
DisOrDat: This exists in all versions except Vol. 1 and Sports. Only one player plays the DisOrDat with a 30-second time limit (in earlier games, this is played by the player that got the question right, in later games, this is played by the player with the lowest score). The player is given two categories and seven different subjects, and it is up to the player to determine which category the subject falls under (or, in some cases, whether the subject fits both of the two categories). For example, the player might have to determine if Jay Leno was a daytime or a nighttime talk show host, if orecchiette is a type of pasta or a parasite, or if "Urban" is the name of a Pope or a Britney Spears song. Money is added for every correct answer, and deducted (or stolen by the other player(s) in the offline version of You Don't Know Jack 2011, Roku, OUYA, Party and You Don't Know Jack 2015) for every wrong answer, as usual; any questions not answered before the 30 seconds expires are treated as wrong, and penalized accordingly. In Full Stream, all players play the DisOrDat simultaneously with a 5- or 10-second time limit for each subject.
Gibberish Questions: These exist in all versions except HeadRush, the PlayStation versions, the website, You Don't Know Jack 2011, iOS, Roku, OUYA, Party and You Don't Know Jack 2015. Players are given a mondegreen: a nonsensical phrase whose syllables rhyme with a more common phrase or title. For example, "Pre-empt Tires, Like Crack" could be the gibberish to The Empire Strikes Back. The question has a time limit of 30 seconds, and the first player to buzz in and type the correct answer wins the money. Clues are given as time passes, but the money decreases by 5% of the initial starting value with every 1.5 seconds that elapse. The money could go unrewarded if the amount goes down to $0. In The Ride, the money decreases steadily over the entire 30 seconds. This question is famous for an Easter egg where if the first player types in the phrase "fuck you" ("fuck off" in the British version, and "Arschloch" in the German versions) as the answer, the host will respond annoyed and will either deduct $50,000 from their score or reset their score to $0 (whichever punishment is bigger), may deduct an additional $100,000 from their score, and may change their name. If another player does it, the host will respond by chastising that player for a lack of originality, but will not deduct any money from their score or change their name. If a third player does it, the host will declare the game to be over and leave, automatically closing out the software. If the player presses any key while the host is talking, the host will say an extra statement regarding that the game is ending regardless of what the player does before the software closes out. This Easter egg varies in later volumes of the game. In the 5th Dementia, the host will respond by deducting $100,000 from the first player that typed the offending answer and replacing the player's spaceship avatar with a bare foot. If another player does it, the host will deduct $2 from that player's score. If a third player does it, the host will declare the game to be over and leave, automatically closing out the software as usual. No additional dialogue from the host is provided from pressing any keys. Furthermore, no name change is given to any of the players. In "The Lost Gold", the host will respond by deducting $52,681 from the first player that typed the offending answer and changing the player's name to "Arschloch" (a hold-over from the German Vol. 4, where the easter egg is triggered by typing "Arschloch"). If another player does it, the host will deduct $92,681 from that player's score, but will not change their name. If a third player does it, the host will declare the game to be over and leave, but instead of forcing the software to close out, the host will take the players to a joke mini-game called "Gorilla Hunter"; the player is given six bullets, but there's nothing to shoot at and the gun cannot be reloaded, forcing the players to quit the software manually through the pause menu. In the Facebook version, the host mocks the player saying that he can say the "nasty words" as well and proceeds to say a lot of them bleeped-out of context; no extra money is lost other than the normal wrong answer penalty. In Full Stream, after the answer is revealed, the host will beam an Easter egg to the device of any players who entered in “fuck you” which explains the history of the Easter egg to them, with the host assuming they entered it in only for the Easter egg, and like in the Facebook version, no extra money is lost.
Anagram Questions: These only exist in 5th Dementia and "The Lost Gold", and follow the same rules as the Gibberish Questions; however, instead of trying to figure out a rhyme, players must rearrange the letters given into a saying, name, or other group (as in the famous example of "genuine class" being an anagram of "Alec Guinness"). Unlike in other question types requiring a typed-in answer, the answer to an Anagram Question must be spelled exactly right to win the money. This type of question also appears in the Facebook version, but instead of being text-based, it is multiple choice.
HeadButt: Only existing in HeadRush, these also follow the rules of the Gibberish Questions. Players are given a word equation (for example, "color of pickles + opposite of night") and have to put it together to form a name or other group (in this case, the color of pickles is "Green", and the opposite of night is "Day", so the answer would be "Green Day").
Fiber Optic Field Trips: These only exist in Vol. 1, Sports, Vol. 2, and Movies, and only appear in full (21-question) games. The host calls a random person from out of the phonebook and asks them to come up with a trivia question. Fiber Optic Field Trips are initiated during the first half of the game, and the trivia question hosted by the special guest is the first question of the second half. All categories for this question type are worth $5,000.
Celebrity Collect Calls: These only exist in Vol. 2 and follow the same basic format as the Fiber Optic Field Trips. The host calls a celebrity and asks them to come up with a trivia question. Celebrities include Tim Allen, Florence Henderson, and Vanessa L. Williams. Sometimes, the conversation between the host and the celebrity lasts a very long time.
Pub Quizzes: These replace the Fiber Optic Field Trips and Celebrity Collect Calls in the British version of the game. Instead of calling a random person in a city, the host calls a bartender in a random pub within the UK to give the players a question.
Trash Talkin' with Milan: Only existing in HeadRush, "Milan the Janitor" (voiced by Igor Gasowski) hosts a standard multiple choice question about grammar.
Bug Out: This only exists in 5th Dementia. The goal is simple: Bugs will crawl and display a choice. When you see a choice that does not match the clue, buzz in. In a multiplayer match, if you are right, your opponents pay you money, but if you are wrong, you pay your opponents.
Fill in the Blank: Instead of having four answers to choose from, you have to type the answer out.
Sequel Question: Some questions have questions that refer to them and are guaranteed to appear immediately after them. When this happens, all three selectable categories will refer to the Sequel Question. In The Ride, 5th Dementia, Mock 2, the website, You Don't Know Jack 2011, iOS, OUYA, Party and You Don't Know Jack 2015, all questions are arranged into 'episodes' whose questions always appear in the same order. This allows for a question to refer to any previous question, and for running jokes to be made. In You Don't Know Jack 2011, as the question sets are set into episodes, there will be questions that are 20 or 30 questions after the first. ('A Harp out of Harp' related to Cookie's party episode.) In Full Stream, there are also Sequel Questions, most notably in a series of questions with a "Special Guest" (see Guest Host Question below). Additionally, in Full Stream, certain series of questions can also trigger a specific post-game event, like with the question “This Question Is Computer Generated”, which is followed by Nate Shapiro hosting an episode of Truth Talk 23/7 after the game.
Pissed About A Question: A special kind of Sequel Question. This only exists in both Offline volumes. Jellyvision creates new questions about angry letters they have received from irritated players. Each of these questions is based upon a letter from a viewer who complained about the previous question.
RoadKill/Coinkydink: This only exists in The Ride (as RoadKill) and Mock 2 (as Coinkydink). In this fast-paced question type, players are given two clues (for example, "Sexy voice" and "Hefty kid"). Several words fly past in rapid succession, and the players must buzz in when the word on the screen connects the two clues in a pair (in this case, the answer is "husky"). At the end of the question, players can earn a bonus for choosing the category which all the correct answers have in common.
Jack BINGO: This only exists in The Ride. A five-letter word related to the episode's theme is first given (for example, W-I-M-P-S in an episode about gym class). A clue to an answer is provided, after which the letters in the given word are randomly lit. The players must buzz in when the first letter to the clue's answer is lit. (In the example, the clue may be "SNL's Doug and Wendy __"; the player rings in when the "W" is lit for the word "Whiner.") $500 and that answer's letter is given to the first player who is correct, and the next clue is given; a $500 penalty is received for wrongly timed responses. The first to collect enough answers to spell out the given word wins the prize declared before the start of this mini-round; it can go unrewarded if nobody finishes the word after a set number of clues.
ThreeWay: This only exists in Vol. 3 and the first PlayStation version. Players are given three words that have something in common (for example, solid, liquid, and gas) and several clues that only relate to one of the words (for example, "__ Plumr"). Players must match the clues to the proper words. The possible answers flash up on the screen, and the players must buzz in when the correct answer appears (in this case, "liquid").
Wendithap'n: This exists in Louder! Faster! Funnier!, Mock 2 and "The Lost Gold" and its German version You Don't Know Jack Vol. 4 (as Wann War Was?) and follows the same rules as the ThreeWay. The player is given an event (either in pop culture history, or in sequence order) and must decide if several other events occurred before it, after it, or never occurred at all.
Guest Host Question: Someone else hosts the question, and it appears in Vol. 3 and The Ride. In Full Stream, this question is known as a "Special Guest" Question with Jimmy Fallon (which bleeds over into the rest of that particular game).
Impossible Questions: Only existing in Vol. 3 and the first PlayStation version, Impossible Questions are worth very large amounts of money, but as the name implies, they are almost always very, very difficult. Examples of Impossible Questions include what color eyes the bald guy has on the box of You Don't Know Jack Sports, the number of years between the invention of the can and that of the first practical can opener within a two-year range (high or low), what number between one and nine the host is thinking of, or what the third word is in the third scene in the third act of Richard III. They can be either multiple choice or fill-in-the-blank. In a case of double-bluffing, one question, 'What has four legs, a tail, and barks?', has the category 'It's a Dog!' and the answer 'a dog'. "The Lost Gold" has a variation of this question as well, not formally named and consisting of Pirate-themed questions such as "What was the name of Blackbeard's Parrot?" This was connected to the game's plot - as explained in the game's introduction, a pirate has been cursed to haunt the game until its players accrue enough 'booty'. The pirate has thus secretly arranged the pirate-themed questions, which he believes are still common knowledge, in an attempt to speed up the process, not realizing how obscure and archaic his knowledge has become.
Super Audio Question: A sound will play, and the host will ask you a question about it.
Whatshisname Question: In this question, the host is trying to remember a certain name of a person, place, or other group. A clue is provided every few seconds, and the player must buzz in and type the name to win the money. This question is known in HeadRush as Old Man's Moldy Memories and in You Don't Know Jack 2015 as Foggy Facts with Old Man which both feature the character of "Old Man" (voiced by Andy Poland) in which he hosts the question.
Picture Question: This is similar to the Super Audio Question, but based on a picture rather than a sound.
Who's The Dummy?: This exists in You Don't Know Jack 2011, iOS, the Facebook version, OUYA, Party and You Don't Know Jack 2015. The host has taken up ventriloquism, and asks a trivia question by way of his ventriloquist dummy, Billy O'Brien (or his sister Betty O'Brien). As the host explains, he has difficulty pronouncing consonant sounds such as B's, P's, and M's (which become D's, T's, and N's, respectively, and are translated as such in the text of the question and the answer choices), which adds a minor layer of difficulty to the question. The dummy also hosts one question in Full Stream.
Cookie's Fortune Cookie Fortunes (with Cookie "Fortune Cookie" Masterson): This exists in You Don't Know Jack 2011, iOS, the Facebook version, OUYA, Party and You Don't Know Jack 2015. This mini-round appears randomly and includes trivia questions inspired by cliche fortune cookie messages that Cookie Masterson receives. For example, the fortune "You have a magnetic personality." leads to a question regarding which metal-based fictional character might be most attracted to him.
Funky Trash: This exists in You Don't Know Jack 2011, iOS, the Facebook version, OUYA, Party and You Don't Know Jack 2015. The host roots through the trash of a famous person, and the players must identify that person by his or her trash. For example, a World War I ambulance driver's license, cigar butts from Cuba, and a can of ointment for 6-toed cats would be clues to Ernest Hemingway.
It's The Put The Choices Into Order Then Buzz In And See If You Are Right... Question: This exists in You Don't Know Jack 2011, iOS, the Facebook version, OUYA, Party and You Don't Know Jack 2015. The host gives three or four items and the player has to buzz in to the corresponding correct answer. The question is multiple choice, meaning that, technically, the player does not have to put the answers into the right order themselves but rather just pick the right order out of the four possibilities. For example, the player might have to determine the order in which the St. Louis Arch, the McDonald's Golden Arches, and the Archie comic book series debuted. Answering correctly awards the player an extra $1,000, however, the extra money is not lost if a player is wrong.
Nocturnal Admissions (with Cookie Masterson): Only existing in You Don't Know Jack 2011, Cookie Masterson tells the player about a dream he had, which is based on a movie. The player then has to tell which movie that dream was about. The characters of the movie are replaced by Cookie himself, his cats and his mother, which often makes it difficult to figure out the correct one. For example, Cookie tells of a dream in which he transferred his mind into a fake cat body so he could learn the culture of his two cats. He does this to help with his mother's research, but falls into love with the cat world and is therefore attacked by his mother's troops. The correct answer to this dream would be James Cameron's Avatar.
Wrong Answer of the Game: Not a question in and of itself, the Wrong Answer of the Game appears in You Don't Know Jack 2011, OUYA, Party and You Don't Know Jack 2015. Before the beginning of the game, Schmitty announces a satirical sponsor for the episode (similar to The Ride). If a player manages to buzz in with the wrong answer associated with the sponsor, they win $4,000 (double in Round 2) and a 'prize' from the sponsor, instead of losing money. For example, in the episode sponsored by 'BloodCo.', answering with the incorrect answer 'Dracula' awards money and a bucket of human blood.
Elephant, Mustard, Teddy Roosevelt or Dracula? / Kangaroo, Peanut, Albert Einstein or Uranus? / Octopus, Coffee, Queen Elizabeth or Frankenstein?: First appeared in the iOS and Facebook versions, questions in this category always have the same four answer choices: Elephant, Mustard, Teddy Roosevelt and Dracula. The question is posed in definition form, such as "Could be considered a Bull Moose". The player must decide, of the four answer choices, which one fits the definition. In this case, the answer is Teddy Roosevelt; he ran for president in 1912 as the Progressive Party's candidate, and his party was nicknamed the Bull Moose Party. The concept is the same in You Don't Know Jack 2015 with Kangaroo, Peanut, Albert Einstein, and Uranus, and in Full Stream with Octopus, Coffee, Queen Elizabeth, and Frankenstein, which could be either the monster or the Doctor (and is specified in the question's animation).
Data Mining: This only exists in Full Stream. A selection of a well-known personality's search history, in the form of queries or statements, are read to the players, who then have to choose the correct person the searches came from. For example, the searches "Directions to get around that track", "Is 'I ain't no' grammatically correct?", and "Why do these bananas taste like [REDACTED]?" would belong to Gwen Stefani (referencing lyrics from her song Hollaback Girl). Data Mining is a spiritual successor to Funky Trash.
Player's Choice: This only exists in Full Stream. At a moment of the game, the Binjpipe host asks players, including the audience, to vote between two question categories. The question with the highest percentage of the votes is the question that will be asked. (In case of a 50%/50% tie, the Binjpipe host chooses between the two, presumably at random.) Examples of choices include: "An easy question" or "A hard question", and "A question with airhorns" or "A question ABOUT airhorns".
Binjpipe Recommends: This only exists in Full Stream. A question is based on the genre, subject(s) or rating of a movie or TV show that is recommended by Binjpipe, presumably influenced by your prior "viewing choices" or internet research as referred to in the question.
Jack Attack
The final round of the game, called the Jack Attack in most versions and also known as the HeadRush in HeadRush, is a word association question. The category for this final round—which generally describes the desired correct answers—was determined differently, depending on which version of the game is being played. In earlier versions of the game, this was based on the final selected category; in later versions, the category is selected by the game or pre-assigned to an episode.
In most versions of the game, a word, phrase, or name appears in the middle of the screen, to which the player must find an associated word or phrase that fits the overall category. For example, Star Wars might be the associated word, and the correct answer fitting "movie stars" could be Harrison Ford. Other possibilities offered might include actors not in that film, or other objects or concepts related to the film but which are not stars of the movie. For each associated subject, several potential matches appear on screen one-at-a-time for only a few seconds each before disappearing, and only one is correct. The topics and/or potential answers are sometimes humorous.
Players win money if they buzz in when the correct match is displayed on the screen. An incorrect guess deducts money from the player's score—not just once, but every time the player buzzes in incorrectly (it is possible to buzz in incorrectly multiple times while the same incorrect answer is shown). The money earned or lost was $2,000 in most You Don't Know Jack volumes, $5,000 in HeadRush, an amount set by the players in The Ride and 5th Dementia, $4,000 in You Don't Know Jack 2011, iOS and Roku, $1,000 in the Facebook version, and $100, $500, or $1,000 in Full Stream depending on how long it takes the player to press the answer. Multiple players play simultaneously, playing to the same words. The words that are not matched will be cycled back in once all seven subjects have been attempted.
Jack Attack ends after either all seven subjects are either (a) matched with the right answer, or (b) attempted twice (some subjects are attempted three times). The exceptions are in some episodes of You Don't Know Jack 2011 and iOS, and all episodes of the Facebook version and You Don't Know Jack 2015, where all seven subjects are only shown once.
In Full Stream, only six subjects are given per "Attack". In each case, the same clue and subject in the center of the screen are presented to the players, with six associated words—added two at a time—can all be available at once, and more than one answer can be correct. Players earn money for correct choices and lose money for incorrect choices. Then the players choose their answers, the less money is earned or lost per choice (either $1,000, $500, or $100). And since each player answers separately on their device, all players can score—either positively or negatively—on all the answers, but only once per selected answer.
In all versions of the game, the running total of each player's score is not shown anywhere on the screen during Jack Attack, and this part of the game is usually accompanied by ominous music or ambient sounds. This creates tension between players because of the uncertainty of ranking, and the unsettling atmosphere.
Game show theme
Throughout the You Don't Know Jack franchise, there has been a running theme of You Don't Know Jack taking place on a self-titled televised game show where the players are the contestants. This idea is shown by satirical fake commercials that can be heard while starting the game, and in most games, after the game has finished (see below).
In Full Stream, instead of the game taking place on a traditional broadcast TV game show, the game becomes a show hosted on a fictional streaming service called Binjpipe. Between questions, the game navigates through the Binjpipe interface. During the game, a new female host (representing Binjpipe) speaks before the game, and hosts some question types like Binjpipe Recommends and Data Mining.
Commercials
One of the unique features of the game takes place after it has ended. Before you start a new game, you can choose to listen to You Don't Know Jack staff performing parodies of various radio commercials. The commercials vary in absurdity, selling products such as scented suppositories or foreign language cassettes to help you learn how to speak American.
They also featured phony news stories about everyday things. Examples: "Oxygen: Gas of Life? or Secret Military Death-Vapor?" or "People are falling unconscious for 8 hours every night. What is the 'sleeping disease'? Do you have it? Find out tonight."
Most You Don't Know Jack games feature recurring characters like "Chocky the Chipmunk", a breakfast cereal mascot with the catchphrase "Pink and tartie!" or "Xenora: Queen of Battle", a parody of Xena, Warrior Princess that gets involved in overtly erotic situations. Others are "The Movie Ending Phone", "1-800-me4-sale", "Cancer Stick tobacco lip balm", "Momma's Pride Human Breast Milk", "Buster's Bait Shop" and parodies of public service announcements from the fictional "United States Department of Condescending Paternalism".
The first CD-ROM for The Ride features a CD of a selection of these commercials from the previous games in the series. The disc was titled You Don't Hear Jack and has since been released as a separate product on CD. A second disc titled You Don't Hear Jack 2 was also released featuring commercials from newer versions of You Don't Know Jack. Both are available for digital download.
In Full Stream, commercials for Binjpipe are heard during the sign-in screen while players join in the game. In the post-game, radio shows are heard instead of commercials.
Hosts
There have been many different hosts of You Don't Know Jack over the years. The following is a list of hosts and the games they appear in.
Nate Shapiro (voiced by Harry Gottlieb) – Nate Shapiro was the first host of the series. He hosts Vol. 1, the Netshow, the tabletop game, and episodes 49 to 58 of The Ride. He also hosts a post-game radio show known as Truth Talk 23/7 in Full Stream. He is not to be confused with "Nate the Intern" from the Flash incarnation (voiced by Production & SQA Coordinator Nathan Fernald).
Guy Towers (voiced by Andy Poland) – He hosts Sports, Sports: The Netshow, and episodes 17 to 32 of The Ride.
Buzz Lippman (voiced by Peter B. Spector) – He hosts Vol. 2 and appears in some episodes of The Ride. He is Nate Shapiro's cousin.
Cookie Masterson (voiced by Tom Gottlieb) – Cookie Masterson is the most well-known host of the franchise. He originally served as the sign-in host, taking down players' names in the opening green room segments of Vol. 1, Sports and Vol. 2. He hosts the Netshow, Movies, Vol. 3, the first PlayStation version, episodes 1 to 16 of The Ride, Offline, You Don't Know Jack 2011, iOS, the Facebook version, OUYA, Party, You Don't Know Jack 2015 and Full Stream. He also hosted the daily webshows that appeared on the You Don't Know Jack website from December 2006 through September 2008 (with one special episode in November 2010). He was also the announcer for the short-lived You Don't Know Jack TV show in 2001.
Josh "Schmitty" Schmitstinstein (voiced by Phil Ridarelli) – Josh Schmitstinstein, or "Schmitty", well known as the host of Lie Swatter, the Quiplash series and Bracketeering is the most recent of all the American CD-ROM hosts. He hosts the Netshow, TV, episodes 33 to 48 of The Ride, Louder! Faster! Funnier! (the second Offline game), 5th Dementia (the Online game), Mock 2 (the second PlayStation game), and "The Lost Gold". He also hosted one particular question in Cookie's volume of Offline. He also announced the sponsors in You Don't Know Jack 2011, the Facebook version, OUYA, Party and You Don't Know Jack 2015. In Full Stream, he hosts a post-game radio show called You Don't Know Jack: Oldies Radio.
Bob (voiced by Andy Poland) – The host of HeadRush.
Jack Cake (voiced by Paul Kaye) – The host of the only British version of You Don't Know Jack.
Quizmaster Jack (voiced by Axel Malzacher in Vol. 1 and Kai Taschner in Vol. 2, Vol. 3: 'Abwärts!, & Vol. 4) – The host of the German versions of You Don't Know Jack.
Masatoshi Hamada – The host of the only Japanese version of You Don't Know Jack, and the only host who is not a fictional character.
Troy Stevens (played by Paul Reubens) – The host of the 2001 You Don't Know Jack TV show. He is the only host whose full physical appearance is known.
Game list
This is a list of the You Don't Know Jack games released:
You Don't Know Jack (Vol. 1) – September 12, 1995
You Don't Know Jack Question Pack – 1996 (You Don't Know Jack Vol. 1 must already be installed to play)
You Don't Know Jack Sports – September 30, 1996
You Don't Know Jack Vol. 2 – November 30, 1996
You Don't Know Jack the Netshow – 1996–2000
You Don't Know Jack Movies – April 30, 1997
You Don't Know Jack TV – May 9, 1997
You Don't Know Jack Sports: The Netshow – 1997
You Don't Know Jack Vol. 3 – October 31, 1997
HeadRush (a teen spin-off game) – April 20, 1998
You Don't Know Jack (tabletop edition) by Tiger Electronics - 1998
NOTE: Game came with 500 General Knowledge questions on 125 cards; additional 113-card, 450-question Expansion Packs with TV, Movies and Sports themed trivia were also released.
You Don't Know Jack Vol. 4: The Ride – November 30, 1998
You Don't Know Jack Offline (the best of the Netshow on Disk) – 1999
You Don't Know Jack (PlayStation, has similarities to Vol. 3) – 1999
You Don't Know Jack Louder! Faster! Funnier! (2nd Offline game) – March 28, 2000
You Don't Know Jack 5th Dementia (Online game) – November 1, 2000
You Don't Know Jack Mock 2 (2nd PlayStation game) – November 1, 2000
You Don't Know Jack Vol. 6: "The Lost Gold" – December 1, 2003
You Don't Know Jack (Online beta game on the You Don't Know Jack website) – 2006–2008
You Don't Know Jack – February 8, 2011
You Don't Know Jack (iOS) – April 2011
You Don't Know Jack (Facebook) – May 26, 2012 (shut down March 1, 2015)
You Don't Know Jack (second mobile game) (shut down March 1, 2015)
iOS - December 13, 2012
You Dont Know Jack Lite – 2012
You Dont Know Jack (Roku) – 2012
Android - May 21, 2013
You Don't Know Jack (OUYA) - June 11, 2013
You Don't Know Jack Party (has similarities to OUYA) - September 19, 2013
You Don't Know Jack 2015 (Part of The Jackbox Party Pack) - November 18, 2014
NOTE: Game contains 15 episodes from OUYA and Party.
You Don't Know Jack: Full Stream (Part of The Jackbox Party Pack 5) - October 17, 2018
There is also a British version, a French version, a Japanese version, and the following German versions:
You Don't Know Jack Vol. 1 – based on U.S. Vol. 2
You Don't Know Jack Vol. 2 – based on U.S. Vol. 3
You Don't Know Jack Vol. 3: 'Abwärts!''' – based on U.S. Vol. 4 ("The Ride")
You Don't Know Jack Vol. 4 – later used as a base for U.S. Vol. 6 ("The Lost Gold")
Reception
The You Don't Know Jack series shipped 500,000 units by December 1996. Shipments in the United States alone rose to nearly 1 million by February 1998. By 2001, the You Don't Know Jack series had totaled sales of 3.5 million copies. YDKJ sold above 4.5 million copies and drew revenues above $100 million by 2008.
Inside Mac Games named You Don't Know Jack 2 the best puzzle game of 1996. The editors wrote that it "continues the high standards established by Berkeley's breakaway classic". It received a score of 4 out of 5 from MacUser.You Don't Know Jack Movies was a runner-up for Computer Gaming Worlds 1997 "Puzzle Game of the Year" award, which ultimately went to Smart Games Challenge 2. The editors called Movies a "hilarious party game", and noted that it "came a close second".You Don't Know Jack XL won two 1996 Spotlight Awards, for "Best Script, Story or Interactive Writing" and "Best Trivia or Puzzle Game".You Don't Know Jack Vol. 3 was the finalist for GameSpot's 1997 "Best Puzzles and Classics Game" award, which ultimately went to Chessmaster 5500. The editors wrote, "[I]f it weren't for the addition of the Threeway question format (which is a complete dud), You Don't Know Jack III would have reached instant-classic status."You Don't Know Jack Vol. 4: The Ride won Computer Gaming Worlds award for the best classic game of 1998. The editors wrote, "You Don't Know Jack Vol. 4: The Ride ranks easily as the best since the first of the series found its way into the CGW Hall of Fame. And for that we salute the folks at Berkeley Systems and Jellyvision, game designers who really do know Jack, at least where our funny bones are concerned." It also won the 1998 Spotlight Award for "Best Trivia, Puzzle or Classic Game" from the Game Developers Conference.You Don't Know Jack: Huge received a score of 4.5 out of 5 from Michael Gowan of Macworld, who wrote that the game "will strain your brain while amusing you with its witty banter and rapid-fire action." In 1998, The Huge collection was named the 48th-best computer game of all time by PC Gamer US, whose editors called it "essential stuff."
Other media
During the 2000 presidential election, Sierra On-Line president David Grenewetzki challenged the presidential candidates to play a political version of You Don't Know Jack. The game had been distributed to a few radio stations, and was described as a "litmus test" of the candidates' political knowledge.You Don't Know Jack also appeared as two books: You Don't Know Jack: The Book and You Don't Know Jack: The TV Book. Both were published in 1998 by Running Press.
There was also a Tiger Electronic tabletop game of You Don't Know Jack, emceed by Nate Shapiro. It featured question cards with a number code on them and a grey button to open a sliding door to show the answers. It was the first game to feature 4 players instead of 3 players. There were also "Sports", "Movies", and "TV" question packs that were sold separately. A standalone handheld version was also released.
An actual television show version of You Don't Know Jack had a brief run on ABC in prime time during the summer of 2001. It starred Paul Reubens (the actor and comedian best known for his character Pee-wee Herman) as over-the-top game show host Troy Stevens, with Tom Gottlieb's 'Cookie' as the announcer. The show lasted only six episodes, as it received very little buzz and most You Don't Know Jack fans weren't even aware of its existence until long after its cancellation. A previous attempt had been made by Telepictures Productions and Warner Bros. Television in 1996, produced by Ron Greenberg in Chicago; this version, intended as a weekday syndicated show, was not picked up (after initial tests and run-throughs necessitated a retooling of the show; Telepictures subsequently chose to drop the project).
After the You Don't Know Jack TV show ended, another show from the makers of You Don't Know Jack called Smush aired on USA Network in late 2001. It was a game of taking two or more words and combining them into one long word. The show started late at night, but was later pushed to later and later times, even up to 3:00 A.M.; until it was eventually canceled.
In 2001, AMC released You Don't Know Jack about MonsterFest'', an online game on their website emceed by Schmitty, and the MonsterFest movie marathon was hosted by Clive Barker and Carmen Electra, who gave clues for the game.
References
External links
Official You Don't Know Jack website (now redirects to the Jackbox Party Pack 1 store page)
Video game franchises
Quiz video games
Windows games
Classic Mac OS games
PlayStation (console) games
Xbox 360 games
PlayStation 3 games
Wii games
Nintendo DS games
Tiger handheld games
Cancelled Game Boy games
Cancelled Game.com games
Webby Award winners
Webfoot Technologies games
Video games adapted into television shows
Video games developed in the United States
Video game franchises introduced in 1995 |
15160530 | https://en.wikipedia.org/wiki/Greg%20Panos | Greg Panos | Gregory Peter Panos (born September 24, 1956 in Bronxville, New York) is an American writer, futurist, educator, strategic planning consultant, conference / event producer, and technology evangelist in Augmented Reality, virtual reality, human simulation, motion capture, performance animation, 3D character animation, human-computer interaction, and user experience design.
Morton Heilig, Dr. Phillip Mittleman, Dr. Alexander Schure, and John Whitney Sr. were mentors to Greg during his early exploration of computer graphics as a career path.
Greg has also worked as an actor and production assistant in several American films including White Trash (1992).
Education
Theodore Roosevelt High School (Yonkers, New York) – 1974
Ohio University – Bachelor of Science (BSc) cum laude in Communications and minor in Film – 1978.
While at OU, he worked in all aspects of television production for WOUB-TV a PBS TV station based in Athens, Ohio, as he also studied electronic music, journalism, and photography.
California State University, Long Beach (CSULB) – 1994 – As a graduate level instructor in "advanced virtual reality" for the CSULB Media Arts department.
Career
Marketing
In New York, Greg worked with pioneering computer animation studios MAGI-Synthavision and Digital Effects.
While briefly serving as an instructor for basic television production at New York Institute of Technology (NYIT) in Old Westbury, New York, he was recruited into CGL, Inc. (the newly created commercial venture) to market, forecast and plan strategy to spin off technology developed at the legendary NYIT Computer Graphics Lab.
While at NYIT Greg rubbed shoulders with many CGL veterans including Lance Williams, Pat Hanrahan, Carter Burwell, Fred Parke, Peter Oppenheimer and many others.
Engineering
Mr. Panos moved to California in 1982 to work with GTI Inc. (subsequently acquired by Rediffusion Simulation) as an applications engineer for their novel real-time (computer) image generation system the "POLY2000" which found a place in many aerospace companies including Rockwell International.
Greg joined the Rockwell Space Station Systems Division (SSSD) as a member of the technical staff (MTS) and lead engineer instrumental in creating their premiere visualization / simulation laboratory to employing real-time, flight simulation technology toward visualization of preliminary designs for early proposals to NASA for the International Space Station project.
After Space Station, Greg was employed as an applications engineer in the West Coast offices of Star Technologies, Inc. While there, his fellow Star colleagues were Michael T. Jones (current CTO, Google Earth) and Dave Orton former CEO, ATI Technologies.
Consultant
As a consultant to film director Brett Leonard during pre-production, Greg was instrumental in helping define some of the key visual props used in the "Lawnmower Man" a seminal film which first used virtual reality as plot vehicle for a major motion picture.
Writer
Augmented Reality Sourcebook
As an author, Greg is writing, editing and will publish the "Augmented Reality Sourcebook" in 2012. This work will be the first comprehensive research directory, forecasting and strategic planning compendium for the emerging field of Augmented Reality, AR App developers, Component suppliers, AR design studios, research labs, consultants, events, publications, seminars, etc.
Virtual Reality Sourcebook
As an author, Greg wrote, edited and published the "Virtual Reality Sourcebook" the first comprehensive research directory, forecasting and strategic planning compendium for the emerging market of virtual reality, human-computer interaction and real-time synthetic environment design / production. The evolving document found a home in libraries of many major corporations and institutions aiding their diligence in research and new market development.
Virtual Reality Magazine (Editor) (1994–1996)
Computer Graphics World (Magazine) (freelance writer)
Animation World Network (Magazine) (freelance writer)
Professional organizations
As twice-elected Chairman of SIGGRAPH-LA (in Los Angeles and the largest local chapter for the SIGGRAPH professional organization) he worked to promote and recognize computer graphics and animation with emerging organizations in the CGI / Visual FX industry for motion pictures / TV, virtual reality, virtual actors and performance animation. Greg also held the title of Co-Chairman for SIGGRAPH-LA in the late 1990s.
SIGGRAPH – Professional Member, Chairman Local Chapter
NCGA (National Computer Graphics Association) – Professional Member
Association for Computing Machinery (ACM) – Professional Member
Performance Animation Society – Founding Co-Director
Greg co-founded the "Performance Animation Society" with Broadway actor / singer Richard Cray in the early 1990s to educate and inform the creative, performing and acting community about the emerging, evolving tools of computer-generated character animation, real-time actor driven performance using motion capture techniques and 3D human digitization to create life-like virtual actors.
1993 Greg produced "A Musical Performance Animation", the first musical, operatic vocal performance by a real-time 3D computer generated character.
Speaking engagements
Greg has been invited to make numerous presentations and demonstrations at major conferences to illustrate the relevancy of virtual reality and computer generated imagery technology to enhance the future of human civilization:
World Science Fiction Convention
California State University, Northridge (CSUN) 1994 VR Conference
SIGGRAPH – LA-SIGGRAPH, National Conference participation
National Association of Broadcasters - "Virtualization of Hollywood SuperSession" 1999
Consumer Electronics Show
Screen Actors Guild (SAG) - "The Future of Virtual Actors"
American Film Institute (AFI) - "Aspects of Virtual Reality in Film"
Comdex
Digital Hollywood "Building Compelling 3D Communities and E-commerce Venues on the Net" 2000
Virtual Reality World
VR & Persons with Disabilities - "Using VR to Document Human Existence"
The Learning Annex
USC School of Cinematic Arts
University of California, Los Angeles
California State University, Long Beach (CSULB)
California State University, Los Angeles
Los Angeles Future Salon – Human Simulation 2003
Current direction
Persona Foundation
In the year 2000, Greg founded the "Persona Foundation" to further initiatives in human simulation, motion capture, 3D body and facial scanning, digital persona creation and custom platform development / operating system design for human simulation systems.
Works
Filmography
The Wanderers (1979) – (as production assistant)
The Warriors (1979) – (as production assistant)
White Trash (1992) – (as actor)
The Lawnmower Man (1992) – (as consultant to director)
Publications
Humans Enter the Age of Avatarism (2020)
Augmented Reality Sourcebook (2011- onward)
Virtual Reality Sourcebook (1991–1998)
Virtual Reality Magazine (1994–1996)
Computer Graphics World (Magazine)
Animation World Network Magazine (1998) - "Who's Data is that Anyway"
Papers
"Using Virtual Reality to Document Human Existence" – CSUN 1994 VR Conference
References
External links
Persona Foundation
Los Angeles Future Salon
Animation World Network (Magazine) - "Who's Data is that Anyway"
Digital Hollywood 2016 - "CG Humans: Integration of the Virtual Character in Film - TV – VR - Games"
American male actors
Ohio University alumni
California State University, Long Beach alumni
1956 births
People from Bronxville, New York
Living people
American male writers
New York Institute of Technology faculty |
1410468 | https://en.wikipedia.org/wiki/The%20Best%20of%20John%20Wyndham | The Best of John Wyndham | The Best of John Wyndham is a paperback collection of science fiction short stories by John Wyndham, published after his death by Sphere Books, first in 1973. Michael Joseph Limited has published the book as a hardcover under the title The Man from Beyond and Other Stories in 1975. For the 1977 Sphere paperback edition it was split into two parts, both containing the full bibliography and the introduction by Leslie Flood.
Contents
The Best of John Wyndham 1932-1949 ()
"The Lost Machine" (1932)
"The Man from Beyond" (1934)
"The Perfect Creature" (1937)
"The Trojan Beam" (1939)
"Vengeance by Proxy" (1940)
"Adaptation (1949)
The Best of John Wyndham 1951-1960 ()
"Pawley's Peepholes" (1951)
"The Red Stuff" (1951)
"And the Walls Came Tumbling Down" (1951)
"Dumb Martian" (1952)
"Close Behind Him" (1952)
"The Emptiness of Space" (1960)
Plots
"The Lost Machine" is the posthumous history of an artificial intelligence's experiences on the barbaric planet Earth in the primitive times of the early 20th Century. This story is directly related to Wyndham's 1936 novel, Planet Plane, in which some of the elements of this story are outlined by the character, Joan.
"The Man From Beyond" sees a human desperately attempting to convince the people of Venus to have nothing to do with their neighbours in space as they are without hope of redemption.
"The Perfect Creature" has also been published as "Una" in Jizzle and tells the story of a scientist's attempts to create the 'perfect' creature, and what happens when he gets the hormone balance wrong.
"The Trojan Beam" sees a British secret agent used as a go-between with the warring states of China and Japan and sees the Trojan Beam used to alter the balance of power.
"Vengeance by Proxy" is a horror story updating the vampire myth to modern Eastern Europe and pastiching the story telling form of Bram Stoker's Dracula.
Adaption dramatises the need for life to be adapted to the world in which it grows on as a father searches desperately for his long lost daughter.
"Pawley's Peepholes" sees time travelers from the future disrupting small-town life by treating it as a quaint place to sight see.
"The Red Stuff" is a mysterious, fast growing entity that first consumes a meteorite, then an entire space ship and ends up on a moon base.
"And the Walls Came Tumbling Down" is the report of a silicone based life form experiencing hostility on Earth.
"Dumb Martian" tells of a Human and his Martian 'wife' out deep in space, far away from civilisation and the man's slow descent into brutality and madness.
"Close Behind Him" is a horror story about a burglar who becomes convinced that the spirit of a man killed during a break in is coming ever closer behind him.
"The Emptiness of Space" is a story of the Troon family as seen in The Outward Urge. In New Caledonia, 2194, an astronaut suffers the after effects of the urge to travel in space and fears he has lost his soul.
External links
1973 short story collections
Short story collections by John Wyndham
Books published posthumously |
15982592 | https://en.wikipedia.org/wiki/Elonex%20ONE | Elonex ONE | The Elonex ONE (also known as ONE) was a netbook computer marketed to the education sector by Elonex. The ONE's operating system was called Linos, based on Linux kernel 2.6.21, and the device had Wi-Fi connectivity, Ethernet networking, a solid-state hard drive, two USB ports and weighed less than 1 kg.
The ONE was described by Elonex at the time as the cheapest laptop in the UK at a retail price of £99 in the UK. Its official unveiling took place on 28 February 2008 at The Education Show at the NEC in Birmingham and a shipping date of June 2008 was announced. Customer deliveries started in August 2008.
In February 2008, Elonex stated their vision was for "every pupil to have their own laptop" to "improve computer literacy across the nation". Elonex aligned the cost of the ONE with the aims of the DCSF closing the achievement gap between those from low-income and disadvantaged backgrounds and their peers. To support this initiative Elonex committed to "donate 1 ONE to underprivileged children from disadvantaged areas for every hundred sold".
Hardware
The hardware specifications were published on 28 February 2008. The "LNX Code 8" is also the CPU used in the Elonex One+, One T, and One T+ ultra-low-cost notebook computers. While Elonex declined to release information on the designer and manufacturer of the processor, Engadget reported that the One could be a rebranded Fontastic A-View laptop, which would make the processor an x86-compatible 300 MHz Aday5F.
Processor, main memory
LNX Code 8 Mobile 300 MHz Processor
Dedicated Linux Memory 128 MB DDR-II SD RAM (256 MB in upgraded model)
On-board 1 GB Flash Memory, optimised for Linux (2 GB in upgraded model)
Removable 1 GB, 2 GB, 4 GB, 8 GB, 16 GB wristvault (sold separately)
Dimensions, casing
Display: 7 inch (18 cm) High Resolution TFT LCD display; 800 x 480px Widescreen
Dimension: 22 cm x 15 cm x 3 cm (W x L x H)
Weight: 0.95 kg
Interchangeable Outer Rubberised Skin (Optional)
Splash-proof, removable QWERTY keyboard
Networking
Wi-Fi 802.11b/g (Wireless) (54Mbit/s)
Ethernet (Wired) (10/100 Mbit/s)
Bluetooth (Wireless) in upgraded model
Peripherals, ports
2 USB 2.0 ports
2 built-in speakers
3.5 mm audio-in/mic
3.5 mm headphones
2 Mouse emulators (one on keyboard and one on rear of device, advertised as for Tablet use)
Power
Integrated 3 cell Battery – approximately 4 hours usage
Power adapter
Operating system
Linux – Linos 2.6.21 operating system, with pre-installed software bundle
Similar devices
The ONE is similar to the A-View or AW-300 A-BOOK products from Aware. They use an Aday 5F-300 MHz X86 processor. An earlier Aware product the AW-150 is sold in the US for $199 as the MiTYBOOK.
Elonex revealed further notebook models at Computex in June 2008. Elonex introduced the One successor at IFA 2009. It's a smartbook based on ARM 11 CPA and Windows CE OS.
References
Linux-based devices
Subnotebooks |
11132789 | https://en.wikipedia.org/wiki/Architecture-driven%20modernization | Architecture-driven modernization | Architecture-driven modernization in computing and computer science, is the name of the initiative of the Object Management Group (see OMG ADM Task Force website) related to building and promoting standards that can be applied to modernize legacy systems. The objective of this initiative is to provide standard representations of views of existing systems, in order to enable common modernization activities, such as code analysis and comprehension, and software transformation.
History
In June 2003, The Object Management Group (OMG) formed a task force to modeling in the context of existing software systems. Initially, the group was called Legacy Transformation Task Force, but then the name was unanimously changed to Architecture-Driven Modernization Task Force (ADMTF). ADMTF is co-chaired by Djenana Campara, from KDM Analytics and William Ulrich, from Tactical Strategy Group.
In November 2003, the OMG's Architecture-Driven Modernization Task Force recommended, and the Platform Technical Committee issued, the Knowledge Discovery Metamodel Request For Proposal (RFP).
In February 2005, the OMG's Architecture-Driven Modernization Task Force recommended, and the Platform Technical Committee issued, the Abstract Syntax Tree Metamodel (ASTM) Request For Proposal (RFP). This work is still in progress. OMG has not yet adopted this specification.
In May 2006, the Team's submission—the Knowledge Discovery Metamodel—was adopted by the OMG and moved into the finalization stage of the OMG's standards adoption process. The OMG adopted Specification for KDM became publicly available (OMG document ptc/06-06-07).
In September 2006, the OMG's Architecture-Driven Modernization Task Force recommended, and the Platform Technical Committee issued, the Software Metrics Metamodel (SMM) Request For Proposal (RFP). This work is still in progress.
In March 2007, the KDM Finalization Task Force finished the finalization stage of OMG's standards adoption process. The recommended specification KDM 1.0 is available from OMG.
Knowledge Discovery Metamodel (KDM)
The foundation of the architecture-driven modernization initiative is the OMG specification Knowledge Discovery Metamodel (KDM).
Usually the knowledge obtained from existing software is presented in the form of models to which specific queries can be made when necessary. An entity relationship diagram is a frequent format of representing knowledge obtained from existing software. Knowledge Discovery Metamodel defines an ontology for the software assets and their relationships for the purpose of performing knowledge discovery of existing code. The KDM Analytics company maintains an open portal for the Knowledge Discovery Metamodel (see KDM Portal).
Relationship to MDA
Existing (or legacy) software has been one of biggest obstacles for applying model-driven architecture. The acronym for architecture-driven modernization (ADM) is coincidentally MDA in reverse. MDA is the acronym for OMG's model-driven architecture, which purports the use of models and transformations to deliver new software. ADM is related to the concept of reverse engineering. Software modernization is architecture-driven when there is the need to capture and retool various architectural aspects of existing application environments. This modernization does not preclude source-to-source migrations (where appropriate), but encourages user organizations to consider modernization from an analysis and design based perspective. In doing so, project teams will ensure that obsolete concepts or designs are not propagated into modern languages and platforms. The bottom-line results deliver modernized systems that conform more effectively to current business practices and strategic requirements.
Vendors
Some of the vendors providing Architecture-Driven Modernization software tooling & methods:
Blu Age
TSRI (The Software Revolution)
Delta Software Technology
See also
Reverse engineering
Software Metrics Metamodel
Software mining
Software modernization
References
Software architecture |
11181000 | https://en.wikipedia.org/wiki/Becky%20Sharp | Becky Sharp | Rebecca "Becky" Sharp, later describing herself as Rebecca, Lady Crawley, is the main protagonist of William Makepeace Thackeray's 1847–48 novel Vanity Fair. She is presented as a cynical social climber who uses her charms to fascinate and seduce upper-class men. This is in contrast with the clinging, dependent Amelia Sedley, her friend from school. Becky then uses Amelia as a stepping stone to gain social position. Sharp functions as a picara—a picaresque heroine—by being a social outsider who is able to expose the manners of the upper gentry to ridicule.
The book—and Sharp's career—begins in a traditional manner of Victorian fiction, that of a young orphan (Sharp) with no source of income who has to make her own way in the world. Thackeray twisted the Victorian tradition, however, and quickly turned her into a young woman who knew what she wanted from life—fine clothes, money and a social position—and knew how to get them. The route was to be by marriage, and the novel follows Sharp's efforts at snaring a wealthy, but simple, husband, and being outdone by fate in her attempt. Eventually, she achieves her aims, but her husband catches her with a member of the aristocracy. Finding herself in Brussels during the Waterloo campaign, as the mistress of a British general, she in no way shares in the alarm felt by other Britons; to the contrary, she soberly makes a contingency plan—should the French win, she would strive to attach herself to one of Napoleon's marshals.
It is probable that Thackeray based the Becky Sharp character on real women. A number of historical figures have been proposed, and it is generally considered that Sharp is a composite of them. Sharp has been portrayed on stage and in films and television many times between 1911 and 2018, and has been the subject of much scholarly debate on issues ranging from 19th-century social history, Victorian fashions, female psychology and gendered fiction.
Context
Rebecca Sharp—generally known as Becky—is the main character in Thackeray's satirical novel, Vanity Fair: A Novel without a Hero, which was published incrementally between 1847 and 1848. Thackeray wished to counter the prevailing belief in society that it was impossible for women to create a fashionable self-image.
Set in high regency society at the time of the Waterloo Campaign—in which three of the main male characters go to fight—the book is a "vast satirical panorama of materialist society" and an early work of the realist school. A comedic and semi-historical novel, Vanity Fair brought its author immediate renown on its 1847 publication.
According to 19th-century literary norms, the book's heroine should have been the upper-class Amelia Sedley; Thackeray, though, ensures that she is outshone by the lower-class Becky Sharp throughout. Sedley is a "dull and colourless foil"; she has all the positive traits that Sharp lacks, yet these bring her none of the benefits that Sharp experiences. Structurally, Amelia and Becky are joint-main characters, but as John P. Frazee points out, readers instinctively identify the latter as the sole protagonist due to her energy and forcefulness, while Amelia's colourlessness pushes her into the background.
Sharp is shown to be continually on the lookout for a wealthy but simple husband who will indulge her while turning a blind eye to her associations. The book traces hers and Amelia's respective paths in life, from the finishing school where they first meet, through their marriages, to their respective middle age.
Synopsis
The story is framed as a puppet show taking place at an 1814 London fair and is narrated by a highly unreliable master of ceremonies who repeats gossip at second or third hand. Vanity Fair tells the story of Rebecca ("Becky") Sharp, the orphaned daughter of an English art teacher and a French dancer. She is a strong-willed, cunning, and moneyless young woman determined to make her way in society. After leaving school, Becky stays with Amelia ("Emmy") Sedley, the good-natured and ingenuous daughter of a wealthy London family.
At Amelia's house, Becky meets the dashing and self-obsessed Captain George Osborne — actually engaged to Amelia — and Amelia's brother Joseph ("Jos") Sedley, a clumsy and vainglorious but rich civil servant home from the East India Company. Hoping to marry Sedley, the richest young man she has met, Becky entices him, but she fails. Osborne's friend, Captain William Dobbin, loves Amelia, but, putting her happiness first, does not attempt to compete with Osborne. Sharp goes into service with the crude and profligate baronet Sir Pitt Crawley, as governess to his daughters; she soon gains his favour. Sir Pitt's wife dies and he proposes to Becky. By then, though, she has married his son, Rawdon, which she soon regrets.
News arrives that Napoleon has escaped from Elba, and the stock market crashes, bankrupting Amelia's father. George's rich father forbids George to marry Amelia, because she is now poor. Dobbin persuades George to marry Amelia; George is disinherited. George, Dobbin and Rawdon are despatched to Brussels for the campaign. Osborne, tiring of Amelia, grows attracted to Becky.
At the Duchess of Richmond's ball in Brussels, Becky embarrasses Amelia by making snide remarks about the quality of the latter's frock; meanwhile, the army receives marching orders to Waterloo. The battle can be heard from Brussels, but Becky is indifferent to the result, making plans for whoever wins (for example, if Napoleon wins, she decides, she intends to become the mistress of one of his marshals). Osborne is killed, while Dobbin and Rawdon survive. Amelia lives in genteel poverty caring for their son.
Becky also has a son, to whom she is cold and distant, being far more interested in first Paris and then London society where she meets the wealthy Marquis of Steyne, by whom she is eventually presented at court to the Prince Regent. She charms Steyne at a game of "acting charades" where she plays the roles of Clytemnestra and Philomela. This point is the peak of Becky's social success, but Rawdon is arrested for debt, possibly at Becky's connivance. Steyne had given Becky money, jewels, and other gifts, but she makes no effort to free her husband.
When Rawdon is released, he finds Becky entertaining Steyne, whom Rawdon beats up, assuming the two to be having an affair. Steyne is indignant, having assumed the £1000 he had just given Becky was part of an arrangement with her husband. Rawdon finds Becky's hidden bank records and leaves her, expecting Steyne to challenge him to a duel. Instead, Steyne arranges for Rawdon to be made Governor of Coventry Island, a pest-ridden location. Becky, having lost both husband and credibility, leaves England and wanders the continent, leaving her son in care.
Amelia, Jos, George and Dobbin go to the fictional Pumpernickel (based on Weimar, Germany), where they find Becky destitute. She lives among card sharps and con artists, drinking heavily and gambling. Becky enchants Jos Sedley all over again, and Amelia is persuaded to let Becky join them. Becky decides that Amelia should marry Dobbin, notwithstanding that Dobbin is Becky's nemesis, the only person to ever see through her before it is too late. Amelia and Dobbin return to England, while Becky and Jos stay in France. Jos dies in suspicious circumstances — likely poisoned — shortly after signing much of his wealth to Becky, giving her an income. She returns to England and lives as a demi-mondaine. Her former associates refuse to have anything to do with her.
Character
For much of the book, due to her lower-class origins, Sharp is not treated as a social equal to her associates, who are at least middle if not upper class. She is "notoriously immoral" — indeed, according to one commentator, she is the "embodiment of moral transgression"—with a "ruthless determination ... but unfailing good temper". Her energy repeatedly creates a "whirlwind" around her.
Sharp "manages to cheat, steal and lie without getting caught by the agents of social, moral and economic order who pursue her", which she does by creating for herself a new set of circumstances each time. This makes her "dangerous", in contemporary eyes, says Montz, and Sharp plays many such discrete roles throughout the book. However, each time she reinvents herself in order to overcome the next adversity, her previous reputation always catches up with her. Jennifer Hedgecock has commented that:
Origins, appearance and personality
Born in Soho, Becky Sharp is the daughter of an impoverished English artist and a French "opera girl" — possibly a prostitute — and is thus half-French herself. To the English in the novel, her English ancestry is invisible; to them, she is wholly a Frenchwoman. She appears to have loved her father: Thackeray tells how, as a girl, she would sit with him "and [hear] the talk of many of his wild companions — often but ill-suited for a girl to hear", and when he dies Sharp misses both his companionship and the freedom that she had living with him.
Sharp is a "flamboyant coquette" with bright green eyes. She is waif-like and attractive although not necessarily beautiful. A picara, she has talents for, and enjoyment of, acting, and is an excellent mimic. She has been described as "ever-adaptable" with a will to live and a vitality. However, she is also a duplicitous trickster, — "an outlaw, female insubordination personified", says Marion Meade — with an aggressive streak in her, who, however, never loses her femininity. She also has, says the Narrator, "wit, cleverness and flippancy", and a gift for "fun and mimicry".
Sharp is, says Harold Bloom, "famously a bad woman, selfish and endlessly designing, rarely bothered by a concern for truth, morals, or the good of the community." E. M. Forster describes Sharp as being "on the make"; for example, when she first sees Amelia's brother Jos, who is a revenue collector for the East India Company in Calcutta, she immediately asks Amelia whether he is very rich, because, "they say all Indian Nabobs are enormously rich".
She is obsessed by money; unlike Amelia, who thinks that £2,000 () will last her a lifetime, Sharp thinks that nothing less than £5,000 () a year would be sufficient. Sharp's selfishness is even more highlighted when her husband is preparing to leave on the Waterloo campaign; she is more concerned that he has protected her income in case he is killed than over the risk to his life. Her subsequent attempt at appearing sorrowful at his departure is unrealistic to both her husband and the reader. The only time she cries for real is when she learns she could have married Sir Pitt Crawley, rather than, as she did, his son, whose fortunes were far less prosperous. "Her financial gains are always achieved through the exploitation of the affections of others", wrote Ulrich Knoepflmacher; Sharp understood, very early on, that sentiment is a profitable commodity and one to be used and disposed of when circumstances demanded it.
Sharp knows what an English lady should look like, and her impersonation is impeccable: "dressed in white, with bare shoulders as white as snow—the picture of youth, unprotected innocence and humble virgin simplicity". She understands the power that a fashionable appearance brings; "and revels in it", says Montz; thus she deliberately stages tableaux and parlour games in order to take centre stage, and as an excuse to dress even more flamboyantly. Her English companions consider her obsession with fashionable clothes the product of her French blood. Clothes, though, for Sharp, are an essential tool; they enable her to blend in with her upper-class associates. Sharp's "desire for fashion and worldliness" is in tune with the snobbish affectations—which she emulates—and hypocrisies of English society, which she identifies immediately. She is, however, sufficiently socially adaptable as to be able to blend in with the Bohemians she later meets in Germany.
Career
Educated at Miss Pinkerton's Academy, Sharp was an orphan. With no parents to guide her, either towards a good marriage or a career, she set out on her own to take what she could get from life. Her opening scene has her leaving the academy in a coach and throwing her copy of Johnson's Dictionary — given her by Miss Pinkerton — out of the window as she goes. As a penniless young lady of marriageable age alone in the world, hers is a traditional Burneyean entrance to the adult world. She starts on her career with the degenerate English gentry, and moves in with Sir Pitt Crawley as governess to his daughters.
Sharp is dissatisfied, seeing herself as capable of far greater things: "in her imagination ... the princess de jure is only the governess de facto". She ends up in a more equal relationship with Crawley, who was described by Roger B. Henkle as "rascally, wenching, brawling ... drinks to all hours with Horrocks the Butler and smells of the stables".
She makes herself indispensable to the soon-to-be-widowed Sir Pitt as his amanuensis, by doing his accounts and other paperwork. Partly due to this reliance on her, he proposes marriage after his second wife dies. She soon, however, realises the limitations of Crawley's position, and moves out when invited to London by Crawley's rich half-sister.
She successfully insinuates herself into the British ruling class with almost nobody noticing. When she first meets Mr Sedley, she tells him her story, of her penniless orphanhood and he gives her gifts; the only character who ever sees through her now well-to-do English facade is Dobbin, who says to himself, "what a humbug that woman is!" Sharp's debut is at the Duchess of Richmond's ball, held on 15 June 1815 in Brussels, which celebrates the Duke of Wellington's army on the eve of the Battle of Quatre Bras against the exiled Napoleon who has returned to France and raised an army. However, she had no means of transport to the ball, and eventually only manages to travel by simpering to the owner of the only carriage available and flattering him over "the courage he does not possess". The ball is a perfect opportunity for Sharp to dress up in her finest, offset against the glamour of a military campaign and the presence of an entire officer corp. Compared to Amelia Sedley — whose own appearance there is described as being an abject failure — Sharp's "debut was, on the contrary, very brilliant. She arrived very late. Her face was radiant; her dress perfection". In Brussels, everyone is panicking due to the proximity of Napoleon's army and the unexpected arrival of the French King, Louis XVIII of France into Brussels exile, yet Sharp's main interest is in humiliating Amelia at the ball over her — in Sharp's eyes — poor quality gown.
Soon after, Jos wants to propose to Sharp, but he loses his nerve and subsequently disappears — escaping back to Calcutta — and by the time he eventually does propose, comments Knoepflmacher, "both Becky Sharp and our attitude toward her have moved on". Meanwhile, for Sharp, "he has become her last straw, not her first". Rawdon and Sharp have wed and have a son, also named Rawdon, but his role in her life is more in the manner of being a prop for Sharp to demonstrate her marital bliss. She makes her sitting room a salon — with "ice and coffee ... the best there is in London — where she can be surrounded by admirers, among whom she ranks men of a "small but elite crowd". It is no surprise, suggests Frazee, that Sharp eventually meets the King — who had been regent, now George IV— and in his "high presence Mrs Rawdon passed her examination, and as it were, took her degree in reputation" from him: the King, suggests Thackeray, had created the very conditions which allowed Sharp to flourish.
Sharp's marriage to Rawdon Crawley is a major step up the social ladder, although, comments Bloom, this "ladder was a magic one and could withdraw itself at will". When her husband is arrested and held for a £100 debt, she writes to him from bed, insisting that she is doing everything in her power to release her "pauvre prisonnier". When he finally returns, finding her with Lord Steyne, he complains that she has not left him even £100 to take with him. Sharp was not sleeping with Steyne; rather, she reckoned that she needed what she calls a "moral sheepdog", and that that was to be Steyne. Rawdon was mistaken: she was further ingratiating herself with Steyne as a stepping-stone to reaching the pinnacle of English society.
Sharp finishes her days self-styling herself the Lady Crawley, a demi-mondaine living in penury in Curzon Street. Lisa Jadwin has described the book as ending "on a note of malignant irresolution". Sharp's fate is, to some degree ambiguous, and it is possible that Thackeray pastiches the classic Victorian novel's denouement in which the heroine makes a "death-in-life renunciation of worldly pleasures"—or the guise of one. Ulrich Knoepflmacher summarised Becky's experience:
Love life
Amelia Sedley's husband, George Osborne, wants to seduce Sharp: he too fails to see through Sharp's projected image, "blinded by Becky's constructed self". Sharp has sexual adventures, but Thackeray never makes the connection between Sharp's sexual relationships and rise in social status explicit.
For Becky Sharp, sexuality and femininity are primarily tools with which to improve her social and financial position in both the short- and long-term. She is unmotivated, says Claudia Nelson, "by either heart or libido". Sharp herself comments, early in the book that "she never had been a girl ... she had been a woman since she was eight years old." Any capacity for love she does possess is narcissistic, and similarly, she puts her financial and social advancement before motherhood.
Reception
Critical
Mid-Victorian literature was still somewhat orientated towards "young ladies literature" where the readership was morally sensitive. Thackeray took a degree of risk in presenting a character such as Sharp, says Michael Schmidt, but he remained within boundaries, and whilst he was satirical, he broke no taboos. Sharp, then, was a new phenomenon in Victorian fiction, which until Vanity Fair knew only of insipid heroines bound by convention or Smollett-esque grotesques. Amelia herself was one of the former, but Sharp was an original creation. Sharp has been called a "love to hate her and hate to love her" character, and this was radically different from previous representations of young women in literature. Thackeray has been described as "radical" in making his heroine(s) not only female, but also one of them conventionally wicked in character yet sympathetic to the audience.
Sharp's way of intruding her life into that of others has led to comparisons by one scholar to other Victorian literary characters. Both Joseph Conrad's Mr Vladmir in The Secret Agent, and in a comic rather than serious setting, Trollope's Mr Slope in Barchester Towers, play similar roles. In a modern sense what made her dangerous to contemporary eyes was her ambition; women did not, in nineteenth-century England, climb the social ladder—at least, not in an obvious manner.
That Sharp survives, and at times, thrives, despite her moral ambiguity indicates that Thackeray believed society was no longer able to cure wrongdoing. Sharp was, according to Hughes, "a measure of how debased society had come". Sharp's machinations can only work within the world of Vanity Fair — and Victorian society more broadly — because vanity and artificiality make it susceptible to her. Another plot device favoured by Victorian writers was that of children playing adult roles in society, and vice versa, and Sharp's comment that she had not been a girl since she was eight years' old has led to her being identified as one such "child-woman".
Vanity Fair was the first major novel to have a governess, whether a heroine or an anti-heroine, as its main character. They had always been in the background, but Sharp was the first time a governess' ambitions to break out of her limited society were placed centre stage. Sharp's orphan status reflected a common theme in writers of the period; as Kathryn Hughes notes, for Emily Morton from Amy Herbert, Charlotte Brontë's eponymous character from Jane Eyre, and Jane Fairfax from Emma, their positions as orphans are central to the books' subsequent plots. Similarly central are their roles as governesses, but whereas for Emily and the two Janes it symbolised class distinctions and the gap between the governess and her employers, for Sharp it was a means of role reversal.
Unlike Jane Eyre, Sharp is aware of the ways of the world from a very young age. Henkle suggests that Sharp, with her carefree and radical approach to social barriers, is symbolic of the change that Victorian society was undergoing in the mid-19th century. There was greater fluidity than ever before as a result of the massively increased wealth among the middle class as a result of the Industrial Revolution, and this fluidity allowed the courtesan to flourish in the Regency era.
The events portrayed in Vanity Fair are described by narration, but the narrator is uninterested in Sharp's thoughts, only her actions. For example, when she goes to bed wondering whether Jos will call on her the next morning, the very next sentence informs us that he did. What Sharp thought, in the meantime, is deemed irrelevant to the reader's enjoyment and understanding of the novel. However, although the Narrator repeatedly draws attention to Sharp's immoralities, he does recognise that her behaviour reflects the hypocrisy of the world — "that has, perhaps, no particular objection to vice, but an insuperable repugnance to hearing vice called by its proper name". Writes Montz, "Becky Sharp is artificial because she chooses to be so: the reader never sees any sign that there is a real Becky beneath the facade of the performer, the flirtatious lover, the good wife, the social climber, the capricious friend". Such women as Sharp, writes Frazee, contributed "nearly as much to the pungent flavour of the period as did the regent himself".
Margaret Atwood has praised Sharp as a character, writing how she "makes no pretensions to goodness. She is wicked, she enjoys being wicked, and she does it out of vanity and her own profit, tricking and deluding English society in the process". She compares Sharp to Edith Wharton's Undine Spragg in The Custom of the Country: both live on their wits "and use men as ambulatory bank accounts", although the latter did not have the spirit or sense of humour that Sharp is portrayed with. More personally, suggests Henkle, to Thackeray himself she represented the power of the artist and the writer, in how she overcomes obstacles to achieve her aims. Her entire career, says F. M. Salter, is "one supreme irony", and Patricia Marks suggests that Becky, although a rounded character, remains "nothing without her finery", and compared with her, the other characters appear "tattered".
Commentator Heather L. Braun describes Becky at the end of the novel as akin to a Rhine maiden, a Clytemnestra: "she has become 'an apparition' that 'glides' rather than walks into a room; her hair 'floats' around her pale face, framing a 'ghastly expression' that elicits fear and trembling in those who look upon her". Braun compares Becky's wanderings around Europe to the toils of Circe.
Popular
Thackeray personally disapproved of Sharp's behaviour, and contemporaries would have understood how, from Sharp's actions, she was a bad woman. However, their judgement would be based as much on actual expectations of real social morality as on what they read in Thackeray's pages. More, that they thought she was bad need not have meant they were necessarily unsympathetic. Thackeray himself compared Sharp's career as "resembling the slitherings of a mermaid", and Bloom says that she is enough of a character to make her fundamentally likeable, to the extent that "any reader who does not like Becky is almost certainly not very likeable herself or himself". Poet Dorothy Parker—herself orphaned at age nine—"strongly identified" with Sharp, and effectively treated her as a role model. Meade, in her biography of Parker, says Sharp became Parker's alter ego, and that it was from her that Parker learnt "the rules of the game".
To Eva M. Dadlez, Sharp is a character to be admired, particularly for her intelligence — which is more acute than any of the other characters (aside from Dobbin, who sees through her) — her overcoming a difficult childhood, and ultimately "her talent to survive disasters". She notes that Sharp looks better when the general unprincipled foolishness of the rest of the cast is taken into account.
Thackeray's character made a strong impression on contemporaries. Elizabeth Browning's protagonist of Aurora Leigh (1856), Marian Erle, is a similar character to Sharp. In 1872 The Spectator reviewed Anthony Trollope's The Eustace Diamonds and made an unfavourable comparison between Trollope's main female lead, Lady Eustace, and Becky Sharp. The reviewer wrote how "we had supposed that in Lady Eustace we were to have Mr Trollope's equivalent for Thackeray's Becky Sharp, but we hardly think that we have got it; or if we have, Mr Trollope's equivalent for Thackeray's Becky Sharp is but a poor one." Henry James called Sharp an "epic governess" of literature. In 1848, writing in The Spectator, R. S. Rintoul wrote
In the 21st century, Sharp's character has been used in diverse ways. For example, it has been the subject of a book on business ethics, and a work of fiction by Sarra Manning transposes her life and adventures onto a contemporary woman.
Real-life models
Oscar Wilde said that he asked a female friend of Thackeray's whether Sharp had any real-life basis. She said that although the character was strictly fictional, her general character had been suggested to Thackeray by a governess in Kensington Square, who was a lady's companion to a wealthy but irascible elderly woman. In an unpublished 1911 essay, novelist Charles Reade used the accepted image of Sharp to illustrate Madame du Barry's assertion that the most foolish woman can trick a man, by using against him the education that he has paid for. Says Reade, had she known of Thackeray's creation, du Barry would have asserted "the wisest of the sex is a Becky Sharp". It has in turn been suggested that du Barry was a direct model for Thackeray's Sharp, with both women being "careless beauties cursed with ambition beyond reason, who venture into activities beyond morals". Another possible model for Sharp from the same era suggested Andrew Lang, may be Jeanne de Valois, notorious for her involvement in the affair of the Diamond Necklace. Like de Valois, Sharp had a childhood of financial hardship, and Sharp's later boast of how she was related to the French noble family of de Montmorency could have been based on de Valois' own claims to have French royal blood in her veins.
Gordon Ray suggested that the character of Sharp had no single source; rather, it was the combination of aspects of different women that Thackeray had observed and read about. Other possible models for the Sharp character have been suggested as Mary Anne Clarke and Harriette Wilson, two of the most well known English courtesans of the Regency era. Clarke was originally Mistress of the Regent's brother, the Duke of York, and in 1809 had been at the centre of a scandal in which she acknowledged selling officers' commissions with the duke's knowledge, who—being Commander-in-chief—subsequently resigned. Clarke attempted to publish her memoirs on the matter; they were suppressed, but she received a £10,000 payment and an annuity from the King. Harriette Wilson—described by Walter Scott as having "lived with half the gay world at hack and manger"—also published her memoirs. She too had profited from her liaisons with important society men, and had become mistress to the Earl of Craven at the age of 15; her memoirs went through over 30 editions in their year of publication. Says Frazee, "these two most celebrated courtesans of the Regency provided Thackeray with material which, when added to that he acquired from first-hand knowledge of women like Becky and from his reading of fiction" enabled him to create a realistic Regency courtesan in Sharp.
Dramatic portrayals
In 1899, Langdon Mitchell's production of Vanity Fair toured the United States with Minnie Maddern Fiske as Sharp, a role Fiske received critical praise for. The following year his production was plagiarised by Gertrude Coghlan's Delcher & Hennessy theatre company, with herself in the lead role, until Mitchell sued.
The first film version of Vanity Fair was released in 1915. This was a silent movie directed by Charles Brabin and also starring Fiske in the main role. Another silent version, directed by Walter Courtney Rowden and starring Kyrie Bellew, was made and released in Britain seven years later. The following year saw another silent production released by Samuel Goldwyn; this was directed by Hugo Ballin and starred his wife, Mabel, as Sharp. The film is now considered lost.
The first spoken-word release was Chester M. Franklin's 1932 film of Vanity Fair, with Sharp played by Myrna Loy; her marriage scene was filmed in Boston's Louisburg Square, representing Russell Square in London. Three years later Miriam Hopkins played Sharp in Rouben Mamoulian's production, which was the first feature film to use three-strip Technicolor. Hopkins was nominated for an Academy Award for her portrayal. Reese Witherspoon played Sharp in Mira Nair's 2004 film based on the novel; Rotten Tomatoes criticized the film's version of the character, writing "A more likable Becky Sharp makes for a less interesting movie."
Vanity Fair has also been produced numerous times for television. It was first serialised by the BBC in 1956, and starred Joyce Redman. The second BBC version in 1967, starred Susan Hampshire. This was followed twenty years later, also by the BBC at the Pebble Mill studios, with Eve Matheson as Sharp. Andrew Davies wrote the screenplay of a BBC television drama of Vanity Fair which was screened in 1998; Natasha Little played Becky Sharp. Little won the Best Actress in a Drama Series category in the following year's Biarritz International Television Festival as well as a BAFTA nomination for Best Actress in a Leading Role for her portrayal of Sharp. Olivia Cooke played Sharp in a 2018 television series, screened on ITV over seven episodes.
Notes
References
Bibliography
External links
Thackeray's Vanity Fair at Wikisource
Characters in British novels of the 19th century
Female characters in literature
Fictional governesses
Literary characters introduced in 1847
Orphan characters in literature
Articles containing video clips |
13588528 | https://en.wikipedia.org/wiki/Stuart%20Umpleby | Stuart Umpleby | Stuart Anspach Umpleby (born March 5, 1944) is an American cybernetician and professor in the Department of Management and Director of the Research Program in Social and Organizational Learning in the School of Business at the George Washington University.
Biography
Umpleby attended the University of Illinois Urbana-Champaign where he received degrees in engineering in 1967, in political science in 1967 and in 1969, and a PhD in communications in 1975.
In the 1960s, while a student at the University of Illinois, Umpleby worked in the Institute of Communications Research, The Biological Computer Laboratory, and the Computer-based Education Research Laboratory, the PLATO system. From 1967 to 1975 he and other students developed computer conferencing systems and other applications for time shared computers.
After moving to George Washington University, he was the moderator from 1977 to 1980, of a computer conference on general systems theory supported by the National Science Foundation. Between 1982 and 1988 he arranged scientific meetings involving American and Soviet scientists in the area of cybernetics and general systems theory.
From 1975 to present he has been a professor in the Department of Management at The George Washington University, where he teaches courses ranging from cybernetics, systems theory, and system dynamics to the philosophy of science, cross-cultural management, and organizational behavior. From 1994 to 1997 he was the faculty facilitator of a Quality and Innovation Initiative in the GW School of Business.
He is a past president of the American Society for Cybernetics (ASC). In 2007 Stuart Umpleby was awarded The Wiener Gold Medal of the American Society for Cybernetics.
In 2010 he was elected an Academician in the International Academy for Systems and Cybernetic Sciences, an honor society created by the International Federation for Systems Research.
He is twice divorced and has two sons.
Work
Umpleby's research interests are in the fields of cybernetics and systems theory, the philosophy of science, and management methods. Other interests have been demography, the year 2000 computer crisis, academic globalization, and the transitions in the post-communist countries.
Cybernetics
In the early 1970s Umpleby studied cybernetics with Heinz von Foerster and Ross Ashby in the Biological Computer Laboratory at the University of Illinois Urbana-Champaign. With Heinz von Foerster and Leo Steg he organized the first Gordon Research Conference on cybernetics in 1984. He worked to develop and promote second order cybernetics or biological cybernetics. He also helped to create social cybernetics. He provided an example of the amplification of management capability. He clarified the nature of information in descriptions of the physical relationships among matter, energy, and information.
And he has pointed out that George Soros's reflexivity theory is quite compatible with cybernetics.
Philosophy of science
Following his work on biological cybernetics and social cybernetics Umpleby suggested a way of unifying the philosophies of realism, constructivism, and pragmatism by combining world, description, and observer.
Building on the work of E.A. Singer, Jr., C. West Churchman, and Russell L. Ackoff, Umpleby has suggested that, since managers are part of the system they seek to influence, methods rather than theories are more effective ways to present knowledge of management.
Management methods
Umpleby recently has worked to further develop the Quality Improvement Priority Matrix, a method for determining priorities for improvement and for monitoring perceived improvement.
Demography
In 1960 Heinz von Foerster published an article in Science showing that if demographic trends of the past two millennia continue, world population would go to infinity in approximately 2026. Although contested in the 1960s, the equation proved remarkably accurate, indeed even conservative, until the early 1990s.
Discussions of the doomsday equation revealed that demographers and natural scientists have fundamentally different ways of dealing with estimates and that these differences are not generally known by the public, science journalists, or other scientists.
Year 2000 computer problem
From 1997 to 2000 Umpleby worked on the Year 2000 Computer Problem, viewing it as an opportunity to test social science theories using a before and after research design.
Academic globalization
Between 1977 and 1980 he was the moderator of a computer conference on general systems theory supported by the National Science Foundation. This project was one of nine "experimental trials of electronic information exchange for small research communities". About sixty scientists in the United States, Canada, and Europe interacted for a period of two and a half years using the Electronic Information Exchange System (EIES) located at New Jersey Institute of Technology.
Continuing the work with computer-based communications media, Umpleby has experimented with applications of the internet. Currently he is developing the idea of academic globalization, since it is now possible for academics to collaborate via the internet with colleagues in foreign countries for purposes of education, research or community service.
Transitions in post-communist countries
With the collapse of communism in 1989 many social scientists both in Russia and the West said that, although Karl Marx had described the transition from capitalism to socialism to communism, there were no theories to guide the transition from communism to capitalism. Umpleby refuted this claim by organizing meetings in 1990 in both Washington, DC, and Vienna, Austria, to discuss the theories of economic, political, and social development that can guide the transformation of socialist societies.
Since 1994 the Research Program in Social and Organizational Learning at The George Washington University, which Umpleby heads, has hosted over 150 visiting scholars supported by the U.S. Department of State. Most of these scholars have come from the former Soviet Union and Southeast Europe. While on campus the scholars work with professors in their fields. They also learn process improvement and group facilitation methods, so they can be more effective in introducing changes when they return home. In this way Umpleby has experimented with ways to encourage the use of participatory methods in other countries. He has found that the Participatory Strategic Planning methods developed by the Institute of Cultural Affairs not only improve the effectiveness of organizations but also lead to more humane management practices and build mutual trust among the participants.
International Academy for Systems and Cybernetic Sciences
Umpleby has been an Academician in the International Academy for Systems and Cybernetic Sciences, an honor society created by the International Federation for Systems Research, since 2010.
Publications
Stuart Umpleby has written numerous articles, edited several special issues of the journal Cybernetics and Systems, and edited two books:
1991. Stuart Umpleby and Vadim Sadovsky (eds.). A Science of Goal Formulation, Taylor & Francis, 255 pages.
2018. Alexander Reigler, Karl H. Mueller, and Stuart A. Umpleby (eds.), New Horizons for Second Order Cybernetics, World Scientific, 388 pages.
Articles and papers, a selection
1983. "A Group Process Approach to Organizational Change." in Horst Wedde (ed.), Adequate Modeling of Systems, Springer-Verlag, pp. 116–128.
1986. "Methods for Making Social Organizations Adaptive." in Robert Trappl (ed.) Power, Autonomy, Utopia: New Approaches toward Complex Systems, Plenum Publishing, pp. 133–138.
1987. "ASC Glossary on Cybernetics and Systems Theory". By Stuart Umpleby (ed.) from the American Society for Cybernetics.
1990. "The Science of Cybernetics and the Cybernetics of Science". In: Cybernetics and Systems. Vol 21/1: 109-121.
1999. "The Origins and Purposes of Several Traditions in Systems Theory and Cybernetics". With Eric B. Dent (1999). In: Cybernetics and Systems: An International Journal, 30:79-103, 1999.
See also
Conceptual system
Cyberneticist
Glossary of systems theory
Management cybernetics
Mental Health Research Institute (Michigan)
Second Order Cybernetics
Russell L. Ackoff
Principia Cybernetica
The Institute of Cultural Affairs International
Constructivist Foundations
References
External links
Homepage Stuart A. Umpleby at George Washington University
VITAE Stuart A. Umpleby 3/2009.
1944 births
Grainger College of Engineering alumni
Computer-based Education Research Laboratory
George Washington University School of Business faculty
Cyberneticists
American systems scientists
Living people |
2020 | https://en.wikipedia.org/wiki/Achaeans%20%28Homer%29 | Achaeans (Homer) | The Achaeans (; Akhaioí, "the Achaeans" or "of Achaea") constitute one of the collective names for the Greeks in Homer's Iliad (used 598 times) and Odyssey. The other common names are Danaans (; Danaoi; used 138 times in the Iliad) and Argives (; ; used 182 times in the Iliad) while Panhellenes ( Panhellenes, "All of the Greeks") and Hellenes (; Hellenes) both appear only once; all of the aforementioned terms were used synonymously to denote a common Greek civilizational identity. In the historical period, the Achaeans were the inhabitants of the region of Achaea, a region in the north-central part of the Peloponnese. The city-states of this region later formed a confederation known as the Achaean League, which was influential during the 3rd and 2nd centuries BC.
In some English translations of the Iliad, the Achaeans are simply called the Greeks throughout.
Homeric versus later use
The Homeric "long-haired Achaeans" would have been a part of the Mycenaean civilization that dominated Greece from circa 1600 BC until 1100 BC. Later, by the Archaic and Classical periods, the term "Achaeans" referred to inhabitants of the much smaller region of Achaea. Herodotus identified the Achaeans of the northern Peloponnese as descendants of the earlier, Homeric Achaeans. According to Pausanias, writing in the 2nd century CE, the term "Achaean" was originally given to those Greeks inhabiting the Argolis and Laconia.
Pausanias and Herodotus both recount the legend that the Achaeans were forced from their homelands by the Dorians, during the legendary Dorian invasion of the Peloponnese. They then moved into the region later called Achaea.
A scholarly consensus has not yet been reached on the origin of the historic Achaeans relative to the Homeric Achaeans and is still hotly debated. Former emphasis on presumed race, such as John A. Scott's article about the blond locks of the Achaeans as compared to the dark locks of "Mediterranean" Poseidon, on the basis of hints in Homer, has been rejected by some. The contrasting belief that "Achaeans", as understood through Homer, is "a name without a country", an ethnos created in the Epic tradition, has modern supporters among those who conclude that "Achaeans" were redefined in the 5th century BC, as contemporary speakers of Aeolic Greek.
Karl Beloch suggested there was no Dorian invasion, but rather that the Peloponnesian Dorians were the Achaeans. Eduard Meyer, disagreeing with Beloch, instead put forth the suggestion that the real-life Achaeans were mainland pre-Dorian Greeks. His conclusion is based on his research on the similarity between the languages of the Achaeans and pre-historic Arcadians. William Prentice disagreed with both, noting archeological evidence suggests the Achaeans instead migrated from "southern Asia Minor to Greece, probably settling first in lower Thessaly" probably prior to 2000 BC.
Hittite documents
Emil Forrer, a Swiss Hittitologist who worked on the Boghazköy tablets in Berlin, said the Achaeans of pre-Homeric Greece were directly associated with the term "Land of Ahhiyawa" mentioned in the Hittite texts. His conclusions at the time were challenged by other Hittitologists (i.e. Johannes Friedrich in 1927 and Albrecht Götze in 1930), as well as by Ferdinand Sommer, who published his Die Ahhijava-Urkunden ("The Ahhiyawa Documents") in 1932.
Some Hittite texts mention a nation lying to the west called Ahhiyawa. In the earliest reference to this land, a letter outlining the treaty violations of the Hittite vassal Madduwatta, it is called Ahhiya. Another important example is the Tawagalawa Letter written by an unnamed Hittite king (most probably Hattusili III) of the empire period (14th–13th century BC) to the king of Ahhiyawa, treating him as an equal and implying Miletus (Millawanda) was under his control. It also refers to an earlier "Wilusa episode" involving hostility on the part of Ahhiyawa. Ahhiya(wa) has been identified with the Achaeans of the Trojan War and the city of Wilusa with the legendary city of Troy (note the similarity with early Greek Wilion, later Ilion, the name of the acropolis of Troy). The exact relationship of the term Ahhiyawa to the Achaeans beyond a similarity in pronunciation was hotly debated by scholars, even following the discovery that Mycenaean Linear B is an early form of Greek; the earlier debate was summed up in 1984 by Hans G. Güterbock of the Oriental Institute. More recent research based on new readings and interpretations of the Hittite texts, as well as of the material evidence for Mycenaean contacts with the Anatolian mainland, came to the conclusion that Ahhiyawa referred to the Mycenaean world, or at least to a part of it.
Egyptian sources
It has been proposed that Ekwesh of the Egyptian records may relate to Achaea (compared to Hittite Ahhiyawa), whereas Denyen and Tanaju may relate to Classical Greek Danaoi. The earliest textual reference to the Mycenaean world is in the Annals of Thutmosis III (ca. 1479–1425 BC), which refers to messengers from the king of the Tanaju, circa 1437 BC, offering greeting gifts to the Egyptian king, in order to initiate diplomatic relations, when the latter campaigned in Syria. Tanaju is also listed in an inscription at the Mortuary Temple of Amenhotep III. The latter ruled Egypt in circa 1382–1344 BC. Moreover, a list of the cities and regions of the Tanaju is also mentioned in this inscription; among the cities listed are Mycenae, Nauplion, Kythera, Messenia and the Thebaid (region of Thebes).
During the 5th year of Pharaoh Merneptah, a confederation of Libyan and northern peoples is supposed to have attacked the western delta. Included amongst the ethnic names of the repulsed invaders is the Ekwesh or Eqwesh, whom some have seen as Achaeans, although Egyptian texts specifically mention these Ekwesh to be circumcised (which does not seem to have been a general practice in the Aegean at the time). Homer mentions an Achaean attack upon the delta, and Menelaus speaks of the same in Book IV of the Odyssey to Telemachus when he recounts his own return home from the Trojan War. Some ancient Greek authors also say that Helen had spent the time of the Trojan War in Egypt, and not at Troy, and that after Troy the Greeks went there to recover her.
Greek mythology
In Greek mythology, the perceived cultural divisions among the Hellenes were represented as legendary lines of descent that identified kinship groups, with each line being derived from an eponymous ancestor. Each of the Greek ethne were said to be named in honor of their respective ancestors: Achaeus of the Achaeans, Danaus of the Danaans, Cadmus of the Cadmeans (the Thebans), Hellen of the Hellenes (not to be confused with Helen of Troy), Aeolus of the Aeolians, Ion of the Ionians, and Dorus of the Dorians.
Cadmus from Phoenicia, Danaus from Egypt, and Pelops from Anatolia each gained a foothold in mainland Greece and were assimilated and Hellenized. Hellen, Graikos, Magnes, and Macedon were sons of Deucalion and Pyrrha, the only people who survived the Great Flood; the ethne were said to have originally been named Graikoi after the elder son but later renamed Hellenes after Hellen who was proved to be the strongest. Sons of Hellen and the nymph Orseis were Dorus, Xuthos, and Aeolus. Sons of Xuthos and Kreousa, daughter of Erechthea, were Ion and Achaeus.
According to Hyginus, 22 Achaeans killed 362 Trojans during their ten years at Troy.
Genealogy of the Argives
Etymology
According to Margalit Finkelberg, the name Ἀχαιοί/Ἀχαιϝοί is derived from Hittite Aḫḫiyawā. However, Robert S. P. Beekes doubted the validity of this derivation and suggested a Pre-Greek proto-form *Akaywa-.
The etymology of Danaoi is uncertain; according to Beekes, "the name is certainly Pre-Greek".
See also
Achaea (modern province)
Achaea (Roman province)
Achaean League
Achaean Federation
Aegean civilization
Denyen
Historicity of the Iliad
Homer
Mycenaean Greece
Mycenaean language
Military of Mycenaean Greece
Troy
References
Citations
Sources
External links
Mycenaean Greece
Ancient tribes in Greece
Sea Peoples
Ancient tribes in Crete
Denyen |
4257599 | https://en.wikipedia.org/wiki/Windows%20Anytime%20Upgrade | Windows Anytime Upgrade | Windows Anytime Upgrade (Add Features to Windows) is a discontinued service by Microsoft introduced in Windows Vista that facilitated upgrades across successive editions of Windows Vista. Prices for upgrades purchased through Windows Anytime Upgrade were lower than prices for upgrades purchased at retail.
Windows Anytime Upgrade is included in Windows 7 to allow users to upgrade to Windows 7 editions. In Windows 8 and Windows 8.1 it was rebranded as Add Features to Windows and was used to purchase an upgrade license for the Pro edition or to add Windows Media Center to an existing Pro installation. Support for this feature was discontinued on October 31, 2015. However, if the user got an upgrade key before the discontinuation date, the tool still works on Windows 7.
History
Windows Anytime Upgrade was in development prior to the development reset of Windows Vista, then known by its codename "Longhorn." A preliminary version of the feature can be seen in build 4093.
On February 26, 2006, Microsoft announced the editions of Windows Vista to be released to retail and original equipment manufacturers (OEMs). After this announcement, various technology-related outlets reported that Anytime Upgrade would enable users to upgrade to successive editions.
Overview
Windows Vista
All editions of Windows Vista (excluding Enterprise) are stored on the same retail and OEM optical media—a license key for the edition purchased determines which edition is eligible for installation. When first announced, Anytime Upgrade enabled users to purchase a digital license from an online merchant to upgrade their edition of Windows Vista. Once a license had been purchased, a user's product license, billing and other information would be stored within a user's digital locker at the Windows Marketplace digital distribution platform; this would allow a user to retain this information at an off-site location for reference purposes and to reinstall the operating system, if necessary. A user could then initiate an upgrade to the edition for which the license was purchased either through components stored on the hard drive by the OEM of the personal computer, through an Anytime Upgrade DVD supplied by the OEM, or through retail installation media compatible with Anytime Upgrade. If none of these options were available, Anytime Upgrade provided an option for a user to purchase a DVD online and have it delivered by mail.
Microsoft also released retail packaging for Anytime Upgrade. The retail products were made available during the consumer launch of Windows Vista on January 30, 2007. The initial version of these products included only an upgrade license, but this was later modified in May 2007 to include both a DVD and a product license. In an effort to streamline the upgrade process, Microsoft announced that digital license distribution would cease on February 20, 2008; licenses purchased prior to this date would not be affected. As a result of this change, users would be required to purchase the aforementioned retail packaging in order to use Anytime Upgrade functionality and Windows Vista Service Pack 1 omitted the option to purchase a license online. DVDs for Anytime Upgrade were only produced for Windows Vista.
Anytime Upgrade in Windows Vista performs a full reinstallation of the new product edition while retaining the user's data, programs, and settings. This process can take a considerable amount of time, up to a few hours.
Windows 7
Anytime Upgrade in Windows 7 no longer performs a full reinstallation of Windows. Components for the upgraded editions are instead pre-installed directly in the operating system; a notable result of this change is that the speed of the upgrade process has been significantly increased. Microsoft stated that an upgrade should take approximately 10 minutes. Anytime Upgrade also does not require physical media or additional software. Instead, Windows 7 requires a user to purchase a license online, in a manner similar to the initial functionality that was later removed from Windows Vista starting with Service Pack 1. Microsoft would also release Anytime Upgrade packaging for Windows 7 at retail. The packaging, however, would only include a license for the edition to be upgraded, as Anytime Upgrade in the operating system does not require physical media.
Windows 8 and later
In Windows 8, the process has changed. Users will need to go to the Control Panel and search for Add Features to Windows. In Windows 10, this is located in Settings > System > About > Change Product Key or Upgrade Your Version of Windows.
Results after upgrading
This process works the same way as in Windows 7, with a few exceptions:
If a user purchases a new PC with Windows 8 or later preinstalled, and then the user upgrades that PC with a Windows 8 Pro Pack, Windows 8 Media Center Pack, a volume license edition, or a retail edition, he/she will no longer be able to install apps that are provided exclusively from the OEM through the Microsoft Store.
On Windows 10, when upgrading from Windows 10 Home to Pro or from Home to Pro for Workstations, in addition to the above consequence, the upgraded PC will no longer be supported and is no longer entitled to receive firmware updates from the OEM, even though it will still get Windows operating system updates. Damages that occur due to Windows edition upgrades are not covered under the manufacturer's warranty. However, if the user buys a PC with Windows 10 Pro installed and later upgrades that PC to Pro for Workstations, these consequences do not apply.
Region availability
When first announced, Anytime Upgrade was available in the United States, Canada, EMEA, European Union, Norway, Switzerland, and Japan, with Microsoft stating that availability of the program would expand after launch of Windows Vista. English version retail packaging for Anytime Upgrade was made available at the consumer launch of Windows Vista for North America and Asia-Pacific regions.
In 2009, Ars Technica reported that Anytime Upgrade retail packaging for Windows 7 may only have been available in regions without broadband Internet access or where retail packaging was ineligible to be offered. Anytime Upgrade was available for Windows 7 in select regions.
See also
Windows Easy Transfer
Windows Vista editions
Windows Ultimate Extras
Windows 7 editions
References
Discontinued Windows components |
3123740 | https://en.wikipedia.org/wiki/LXR%20Cross%20Referencer | LXR Cross Referencer | LXR Cross Referencer, usually known as LXR, is a general-purpose source code indexer and cross-referencer for code comprehension that provides web-based browsing of source code, with links to the definition and usage of any identifier.
History
LXR was born from a need for a tool to keep a synthetic eye on the Linux kernel during its development (whence its original name: LXR stood for "Linux Cross-Referencer"). Such a tool is all the more necessary as documentation is scarce and contributor number is high.
Two Norwegian students, Arne Georg Gleditsch and Per Kristian Gjermshus, curious about Linux architecture, began writing a small program displaying its files through a web-browser and showing variables usages after a click on the name. Aware of general interest, they posted it rapidly on SourceForge (as early as 1994?).
Time passing, fans joined the development team to give code more maturity; however their number never exceeded ten. With these characteristics, LXR is a typical SourceForge-hosted project but exhibits an exceptional life duration among small projects.
One of the initial creators explored new technologies giving the LXRng spin-off. This experimental development does not contain all features present in the traditional version and departs notably from LXR founding principles.
Though no communication was really ever done around the tool, LXR made its way through some paper columns, e.g. Linux Journal. However, when collecting references to LXR on the Internet, there is ambiguity between the tool itself and instances of LXR displaying indexed source code (since many sites use "LXR" in its original sense of "Linux Cross-Referencer").
After adopting LXR to index the source code for the Mozilla Application Suite, Mozilla forked LXR to into MXR (the Mozilla Cross Reference). MXR was forked in order to meet the needs of Mozilla development, namely code navigation of a mixed C++ and JavaScript codebase. After years of MXR use, Mozilla began work on a new tool with a focus on better static analysis and a dynamic Ajax UI. The result is DXR (the Dehydra Cross Reference). After DXR reached maturity, the MXR instance at mxr.mozilla.org was decommissioned.
Technology
LXR is minimalist and adheres to the least-effort principle.
The deliberate bias towards minimalism avoids using too many different technologies. Thus, it limits the dependencies and the software can be supported by many configurations without special adaptation.
The design choices include interpreted languages (such as Java or JavaScript) barring or strict HTML 4.01 conformance.
Least-effort principle forbids tool programming if it already exists (at least as open source).
This results in web browser usage for display (HTML and CSS allow for fancy page lay-out), definitions and references stored in an available relational data base and file parsing with Exuberant ctags tool.
LXR is written in Perl, handy choice for CGI scripts, but not really fit for lexical or syntactic parsing.
LXR tries to impose as few constraints as possible:
several database choices: MySQL, PostgreSQL, SQLite or Oracle,
choices for full text search between Glimpse and SWISH-E,
free choice for HTTP server provided it can execute CGI scripts (instructions are given for Apache, Cherokee, lighttpd, Nginx and thttpd),
source-file stored in real directory or in version management system repository (choice between CVS, Git, Mercurial and Subversion).
Usage
After software installation, which is not a trivial task but does not require expertise, source code must be pre-processed and LXR configured to display it.
The different source code versions are implemented as sub-directories.
An alternative stores source code in a version management system.
Code is indexed during a second phase: identifiers are gathered and their locations entered in a data base. Reindexing is only necessary when source code is modified or a new version added.
Afterwards, all is needed is to launch a web browser with an URL corresponding to the source code and navigate across files through the hyperlinks associated to identifiers.
Capabilities and limitations
Source code can be written in any language that Exuberant ctags can handle, but parsers are not equally fine-grained.
Two versions of the same file can be compared side by side with differences visually enhanced (through diff command launched by LXR).
Besides hyperlinks under variables, a form allows searching for an identifier typed by the user.
To work around the indexing phase limitations, any character sequence may be (full text) searched at the cost of an extensive source files traversal.
LXR limitations are those of the support tools, mainly Exuberant ctags. But the primary cause of difficulties comes essentially from incorrect access permissions to files.
Another limitation comes from the design choice to only do static code analysis, in contrast to other solutions which do semantic analysis as a compile step,
An advanced user may change LXR layout and rendering through customizing page templates (written in HTML) and cascading style sheet (CSS).
LXR collections
LXR itself
Linux kernel browsing
LXR (formerly "the Linux Cross Referencer") (running the experimental LXRng fork provided by lxr.linux.no)
Linux kernels browsing (ran a very old LXR version until 2017)
Glibc 2.3.2
A few other LXRs from the same site
(archives only shows directory structure - March 2016)
Mozilla Cross Reference, for several projects from Mozilla.org
LXR for Apache HTTPD
(archive only shows directory structure - March 2016)
KDE Cross Reference
GNOME Cross Reference
(archive not available - March 2016)
See also
OpenGrok
References
External links
Source code on SourceForge
LXRng (fork)
Code comprehension tools
Code navigation tools
Code search engines |
41432539 | https://en.wikipedia.org/wiki/Digital%20ceramic%20printing%20on%20glass | Digital ceramic printing on glass | Digital ceramic printing on glass is a technological development used for the application of imagery, pattern or text to the surface of flat glass. Like other printing on glass methods, it uses a form of printmaking. Digital ceramic printing on glass has allowed for new possibilities and improvements in flat glass decoration and treatment such as high levels of customization, translucency and opacity control, light diffusion and transmission, ability to calculate solar heat gain co-efficiency, electrical conductivity, slip resistance, and reduced incidences of bird collision.
History
Unlike paper or fabric, glass is nonabsorbent and transparent so applying digital printing technology had to be adapted to overcome the challenges presented by the glass itself. Until 2007 the two main methods of printing on glass were silk screen printing and digital UV printing. Silk screen printing, where the ink is applied directly onto the surface of the glass through a mesh stencil, was patented in 1907. Screen printed transfers, where the image is transferred from a paper onto the glass, was patented in the 1930s by Johnson Mattey. Firing is necessary in both methods in order for the ink to be permanently infused with the glass.
Printing on glass with UV pinning and curable inks came about almost 60 years later. In this method of printing, ultraviolet waves are applied on the inks, drying them to the glass. This method was the first to enable the digital printing on glass of any digital image including multi color and complex images. Since UV curable inks are not fused with the glass the same way ceramic inks are, the printed outcome lacks a level of durability necessary for certain projects, namely external applications for automotive glass and architectural glass.
Process
Digital printing with ceramic inks, desirable for decorative, functional and environmental purposes, poses a new set of challenges addressed through technological innovations. At the most advanced level, digital glass printers, ceramic inks, and image processing software are fully integrated with one another and each contributes to the overall advancements in the digital printing on glass process. The three part system allows for control and flexibility over the application of the ceramic inks. Transparency and levels of translucency and opacity can be precisely manipulated. There is a high level of control over color matching, and multiple colors can be printed simultaneously. Unlike screen printing, digital ceramic printing on glass does not require screens and the files are stored digitally making printing of all sizes and replacement of any panel simple, in high resolution, full color.
When using ceramic frit based inks the glass is fired or tempered to fuse the inks with the glass. Due to the extreme temperatures of this process there is first a decomposition of organic additives and binders of the ink. Next there is a fusion of the frit to the substrate and pigments followed by the expulsion of voids to give a compacted structure. Lastly there is a formation of a surface with the desire properties. A successful firing of the glass and ceramic ink will result in a bubble free layer of constant thickness and homogeneous pigment dispersion within the glass.
Essential elements
Digital glass printer
The digital glass printer is a flatbed digital printer designed with print heads to jet ceramic inks directly onto the glass. The glass remains stationary while only the printer carriage sweeps across the print table. A key feature of the printer is drop fixation in which ink droplets are dried immediately to prevent drop gain. The fixation of the ink enables a single pass of the print carriage even when printing multi layer and multi color files. The drop fixation makes inline double vision printing possible. Double vision is creating a different vision depending on which side of the glass is being viewed it is achieved by printing different graphics one on top of the other.
An inline dryer was developed for real time drying to occur and to maximize factory space. A smooth color switching system in included so machine operators can easily shift between print jobs and increase throughput. The high resolution print quality - up to 720 dpi - and the precision of the printers allow glass processors to print anything from fine, sharp, small elements to complex full color images on glasses up to 3.3X18 meters in size.
Digital ceramic inks
The inks used in digital printing on glass mimic the CMYK color model and are made of ceramic frit and inorganic pigments and elements. The development of inks is a highly controlled production process to remove any variability in the final product. The consistency in a replication of the inks results in high compatibility with the entire color palette of inks. The inks can therefore be digitally mixed and designers will know the precise outcome of the color every time. Printed glass panels can also be replaced when necessary without the risk of the new panels not matching the colors of the existing panels. The inks are also fully integrated with the machine and the image processing software meaning the development and the application of the inks required innovations both in science and technology.
Image processing software
The image processing software bridges the glass printer and the inks and is also the design tool for preparing the graphic file for printing. The software is more than a photo raster; it calculates ink usage to control levels of translucency and opacity, to control color matching and mixing, and to compensate for different glass sizes and thicknesses. The precision and complexity of the calculations and measurements executed by the software allow designers can achieve their desired outcome.
Digital ceramic printing on glass has expanded the options for printing on glass. UV and silk screen printing have limitations that digital printing overcomes. Digitally printed glass can be applied both to the interior and exterior surfaces, the most simple to complex graphic illustrations can be printed in the CMYK color model.
References
External links
Printed glass performance
Digital glass printing
Digital printing on glass - Bird-Safe Solutions
Digital press
Printing processes |
680553 | https://en.wikipedia.org/wiki/Stresslinux | Stresslinux | Stresslinux is a lightweight Linux distribution designed to test a computer's hardware by running the components at high load while monitoring their health. It is designed to be booted from CD-ROM or via PXE.
See also
Inquisitor (hardware testing software) — Linux distribution for hardware stress testing
Phoronix Test Suite — Linux distribution for benchmarking purposes
External links
Home page
Light-weight Linux distributions
Linux distributions |
729586 | https://en.wikipedia.org/wiki/Eggdrop | Eggdrop | Eggdrop is a popular IRC bot and the oldest still being maintained.
Development History
It was originally written by Robey Pointer in December 1993 to help manage and protect the EFnet channel #gayteen; one Eggdrop bot version was named Valis.
Eggdrop was originally intended to help manage and protect channels from takeover attempts and other forms of IRC war.
Features
The bot is written in the C programming language and features interfaces for C modules and Tcl scripts that allow users to further enhance the functionality of the bot.
A large number of Tcl scripts are available to expand the bot's functionality, most of them written by Eggdrop users.
Scripts are available to add and extend support for: online games, stats, user and channel management, information storage and lookup, greeting channel members, tracking last seen times, botnet management, anti-spam, file serving and distribution (usually via the DCC protocol), IRC services (similar to ChanServ and NickServ), and much more.
Eggdrop includes built-in support for sharing user information and channel bans. However, a script is required to simultaneously control multiple bots and for bots to coordinate channel management and modes.
The bot also features a botnet, which allows multiple bots to be linked together to share data and act in a coordinated fashion. The botnet supports a "party line", which is accessible via DCC CHAT and Telnet. People can communicate within the botnet on various channels in an equivalent to a miniature IRC. Channel 0, the default, is referred to as the "party line".
Popularity
Over the years Eggdrop has become one of the most popular bots run by IRC users.
See also
Internet Relay Chat
Internet Relay Chat bot
Comparison of Internet Relay Chat bots
Shell account
Tcl
References
External links
Tcl/Tk tutorials YouTube playlist in an Android application for your Eggdrop Tcl Scripts
The IRC bot uptime project
Internet Relay Chat
Internet Relay Chat bots
Free software programmed in C
Free software programmed in Tcl
Cross-platform free software
Internet software for Linux
Unix Internet software
Windows Internet software
1993 software |
50373 | https://en.wikipedia.org/wiki/Type%20B%20Cipher%20Machine | Type B Cipher Machine | In the history of cryptography, the "System 97 Typewriter for European Characters" (九七式欧文印字機) or "Type B Cipher Machine", codenamed Purple by the United States, was an encryption machine used by the Japanese Foreign Office from February 1939 to the end of World War II. The machine was an electromechanical device that used stepping-switches to encrypt the most sensitive diplomatic traffic. All messages were written in the 26-letter English alphabet, which was commonly used for telegraphy. Any Japanese text had to be transliterated or coded. The 26-letters were separated using a plug board into two groups, of six and twenty letters respectively. The letters in the sixes group were scrambled using a 6 × 25 substitution table, while letters in the twenties group were more thoroughly scrambled using three successive 20 × 25 substitution tables.
The cipher codenamed "Purple" replaced the Type A Red machine previously used by the Japanese Foreign Office. The sixes and twenties division was familiar to U.S. Army Signals Intelligence Service (SIS) cryptographers from their work on the Type A cipher and it allowed them to make early progress on the sixes portion of messages. The twenties cipher proved much more difficult, but a breakthrough in September 1940 allowed the Army cryptographers to construct a machine that duplicated the behavior (was an analog) of the Japanese machines, even though no one in the U.S. had any description of one.
The Japanese also used stepping-switches in systems, codenamed Coral and Jade, that did not divide their alphabets. American forces referred to information gained from decryptions as Magic.
Development of Japanese cipher machines
Overview
The Imperial Japanese Navy did not cooperate with the Army in pre-war cipher machine development, and that lack of cooperation continued into World War II. The Navy believed the Purple machine was sufficiently difficult to break that it did not attempt to revise it to improve security. This seems to have been on the advice of a mathematician, Teiji Takagi, who lacked a background in cryptanalysis. The Ministry of Foreign Affairs was supplied Red and Purple by the Navy. No one in Japanese authority noticed the weak points in both machines.
Just before the end of the war, the Army warned the Navy of a weak point of Purple, but the Navy failed to act on this advice.
The Army developed their own cipher machines on the same principle as Enigma -- 92-shiki injiki, 97-shiki injiki and 1-shiki 1-go injiki -- from 1932 to 1941. The Army judged that these machines had lower security than the Navy's Purple design, so the Army's two cipher machines were less used.
Prototype of Red
Japanese diplomatic communications at negotiations for the Washington Naval Treaty were broken by the American Black Chamber in 1922, and when this became publicly known, there was considerable pressure to improve their security. In any case, the Japanese Navy had planned to develop their first cipher machine for the following London Naval Treaty. Japanese Navy Captain Risaburo Ito, of Section 10 (cipher & code) of the Japanese Navy General Staff Office, supervised the work.
The development of the machine was the responsibility of the Japanese Navy Institute of Technology, Electric Research Department, Section 6. In 1928, the chief designer Kazuo Tanabe and Navy Commander Genichiro Kakimoto developed a prototype of Red, "Roman-typewriter cipher machine".
The prototype used the same principle as the Kryha cipher machine, having a plug-board, and was used by the Japanese Navy and Ministry of Foreign Affairs at negotiations for the London Naval Treaty in 1930.
Red
The prototype machine was finally completed as "Type 91 Typewriter" in 1931. The year 1931 was year 2591 in the Japanese Imperial calendar. Thus it was prefixed "91-shiki" from the year it was developed.
The 91-shiki injiki Roman-letter model was also used by the Ministry of Foreign Affairs as "Type A Cipher Machine", codenamed "Red" by United States cryptanalysts.
The Red machine was unreliable unless the contacts in its half-rotor switch were cleaned every day. It enciphered vowels (AEIOUY) and consonants separately, perhaps to reduce telegram costs, and this was a significant weak point. The Navy also used the 91-shiki injiki Kana-letter model at its bases and on its vessels.
Purple
In 1937, the Japanese completed the next generation "Type 97 Typewriter". The Ministry of Foreign Affairs machine was the "Type B Cipher Machine", codenamed Purple by United States cryptanalysts.
The chief designer of Purple was Kazuo Tanabe. His engineers were Masaji Yamamoto and Eikichi Suzuki. Eikichi Suzuki suggested the use of a stepping switch instead of the more troublesome half-rotor switch.
Clearly, the Purple machine was more secure than Red, but the Navy did not recognize that Red had already been broken. The Purple machine inherited a weakness from the Red machine that six letters of the alphabet were encrypted separately. It differed from Red in that the group of letters was changed and announced every nine days, whereas in Red they were permanently fixed as the Latin vowels 'a', 'e', 'i', 'o', 'u' and 'y'. Thus US Army SIS was able to break the cipher used for the six letters before it was able to break the one used for the 20 others.
Design
The Type B Cipher Machine consisted of several components. As reconstructed by the US Army, there were electric typewriters at either end, similar to those used with the Type A Machine. The Type B was organized for encryption as follows:
An input typewriter
An input plugboard that permutes the letters from the typewriter keyboard and separates them into a group of 6 letters and a group of 20 letters
A stepping switch with 6 layers wired to select one out of 25 permutations of the letters in the sixes group
Three stages of stepping switches (I, II, and III), connected in series. Each stage is effectively a 20 layer switch with 25 outputs on each layer. Each stage selects one out of 25 permutations of the letters in the twenties group. The Japanese used three 7-layer stepping switches geared together to build each stage (see photos). The U.S. SIS used four 6-layer switches per stage in their first analog machine.
An output plug board that reverses the input permutation and sends the letters to the output typewriter for printing
The output typewriter
For decryption, the data flow is reversed. The keyboard on the second typewriter becomes the input and the twenties letters pass through the stepping switch stages in the opposite order.
Stepping switches
A stepping switch is a multi-layer mechanical device that was commonly used at the time in telephone switching systems. Each layer has a set of electrical connects, 25 in the Type B, arranged in a semicircular arc. These do not move and are called the stator. A wiper arm on a rotor at the focus of the semicircle connects with one stator contact at a time. The rotors on each layer are attached to a single shaft that advances from one stator contact to the next whenever an electromagnet connected to a ratchet is pulsed. There are actually two wiper arms on each level, connected together, so that when one wiper advance past the last contact in the semicircle, the other engages the first contact. This allows the rotor connections to keeps cycling through all 25 stator contacts as the electromagnet is pulsed.
To encrypt the twenties letters, a 20-layer stepping switch was needed in each of the three stages. Both the Japanese version and the early American analog constructed each stage from several smaller stepping switches of the type used in telephone central offices. The American analog used four 6-level switches to create one 20-layer switch. The four switches in each stage were wired to step synchronously. The fragment of a Type 97 Japanese machine on display at the National Cryptologic Museum, the largest piece known in existence, has three 7-layer stepping switches (see photo). The U.S. Army developed an improved analog in 1944 that has all the layers needed for each stage on a single shaft. An additional layer was used in the improved analog to automatically set each switch bank to the initial position specified in the key.
However implemented, the 20-layer stepping switch in each stage had 20 rotor connections and 500 stator connections, one wiper and 25 stator contacts on each layer. Each stage must have exactly 20 connections on each end to connect with the adjacent stage or plugboard. On the rotor side, that is not a problem as there are 20 rotors. On the stator end of a stage, every column of stator contacts corresponding to the same rotor position on each of the 20 layers is connected to the 20 output wires (leads in the diagram) in a scrambled order, creating a permutation of the 20 inputs. This is done differently for each of the rotor positions. Thus each stator output wire has 25 connections, one from each rotor position, though from different levels. The connections needed to do this created a "rats nest" of wires in the early U.S. analog. The improved analog organized the wiring more neatly with three matrices of soldering terminals visible above each stepping switch in the photograph.
Stepping order
The stages were bi-directional. Signals went through each stage in one direction for encryption and in the other direction for decryption. Unlike the system in the German Enigma machine, the order of the stages was fixed and there was no reflector. However the stepping arrangement could be changed.
The sixes switches stepped one position for each character encrypted or decrypted. The motions of the switches in the twenties stages were more complex. The three stages were assigned to step fast, medium or slow. There were six possible ways to make this assignment and the choice was determined by a number included at the beginning of each message called the message indicator. The U.S. improved analog has a six-position switch for making this assignment, see photo. The message indicator also specified the initial positions of the twenties switches. The indicator was different for each message or part of a message, when multi-part messages were sent. The final part of the key, the alphabet plugboard arrangement, was changed daily.
The twenties switch stepping was controlled in part by the sixes switch. Exactly one of the three switches stepped for each character. The fast switch stepped for each character except when the sixes switch was in its 25th position. Then the medium switch stepped, unless it too was in its 25th position, in which case the slow switch stepped.
Weaknesses and cryptanalysis
The SIS learned in 1938 of the forthcoming introduction of a new diplomatic cipher from decoded messages. Type B messages began to appear in February 1939.
The Type B had several weaknesses, some in its design, others in the way it was used. Frequency analysis could often make 6 of the 26 letters in the ciphertext alphabet letters stand out from the other 20 letters, which were more uniformly distributed. This suggested the Type B used a similar division of plaintext letters as used in the Type A. The weaker encryption used for the "sixes" was easier to analyze. The sixes cipher turned out to be polyalphabetic with 25 fixed permuted alphabets, each used in succession. The only difference between messages with different indicators was the starting position in the list of alphabets. The SIS team recovered the 25 permutations by 10 April 1939. The frequency analysis was complicated by the presence of romanized Japanese text and the introduction in early May of a Japanese version of the Phillips Code.
Knowing the plaintext of 6 out of 26 letters scattered throughout the message sometimes enabled parts of the rest of the message to be guessed, especially when the writing was highly stylized. Some diplomatic messages included the text of letters from the U.S. government to the Japanese government. The English text of such messages could usually be obtained. Some diplomatic stations did not have the Type B, especially early in its introduction, and sometimes the same message was sent in Type B and in the Type A Red cipher, which the SIS had broken. All these provided cribs for attacking the twenties cipher.
William F. Friedman was assigned to lead the group of cryptographers attacking the B system in August 1939. Even with the cribs, progress was difficult. The permutations used in the twenties cipher were "brilliantly" chosen, according to Friedman, and it became clear that periodicities would be unlikely to be discovered by waiting for enough traffic encrypted on a single indicator, since the plugboard alphabets changed daily. The cryptographers developed a way to transform messages sent on different days with the same indicator into homologous messages that would appear to have been sent on the same day. This provided enough traffic based on the identical settings (6 messages with indicator 59173) to have a chance of finding some periodicity that would reveal the inner workings of the twenties cipher.
On 20 September 1940 at about 2 pm Genevieve Grotjan, carrying a set of work sheets walked up to a group of men engrossed in conversation and politely attempted to get Frank Rowlett's attention. She had found evidence of cycles in the twenties cipher. Celebration ensued at this first break in the 20s cipher and it soon enabled a replica machine to be built. A pair of other messages using indicator 59173 were decrypted by 27 September, coincidentally the date that the Tripartite Agreement between Nazi Germany, Italy, and Japan was announced. There was still a lot of work to do to recover the meaning of the other 119 possible indicators. As of October 1940, one third of the indicator settings had been recovered. From time to time the Japanese instituted new operating procedures to strengthen the Type B system, but these were often described in messages to diplomatic outputs in the older system, giving the Americans warning.
Reconstruction of the Purple machine was based on ideas of Larry Clark. Advances into the understanding of Purple keying procedures were made by Lt Francis A. Raven, USN. After the initial break, Raven discovered that the Japanese had divided the month into three 10-days periods, and, within each period, they used the keys of the first day, with small, predictable changes.
The Japanese believed Type B to be unbreakable throughout the war, and even for some time after the war, even though they had been informed otherwise by the Germans. In April 1941, Hans Thomsen, a diplomat at the German embassy in Washington, D.C., sent a message to Joachim von Ribbentrop, the German foreign minister, informing him that "an absolutely reliable source" had told Thomsen that the Americans had broken the Japanese diplomatic cipher (that is, Purple). That source apparently was Konstantin Umansky, the Soviet ambassador to the US, who had deduced the leak based upon communications from U.S. Undersecretary of State Sumner Welles. The message was duly forwarded to the Japanese; but use of the code continued.
American analogs
The SIS built its first machine that could decrypt Purple messages in late 1940. A second Purple analog was built by the SIS for the US Navy. A third was sent to England in January 1941 on HMS King George V, which had brought Ambassador Halifax to the U.S. That Purple analog was accompanied by a team of four American cryptologists, two Army, two Navy, who received information on British successes against German ciphers in exchange. This machine was subsequently sent to Singapore, and after Japanese moves south through Malaya, on to India. A fourth Purple analog was sent to the Philippines and a fifth was kept by the SIS. A sixth, originally intended for Hawaii, was sent to England for use there. The Purple intercepts proved important in the European theater due to the detailed reports on German plans sent in that cipher by the Japanese ambassador in Berlin.
Fragmentary recovery of Japanese machines
The United States obtained portions of a Purple machine from the Japanese Embassy in Germany following Germany's defeat in 1945 (see image above) and discovered that the Japanese had used a stepping switch almost identical in its construction to the one Leo Rosen of SIS had chosen when building a duplicate (or Purple analog machine) in Washington in 1939 and 1940. The stepping switch was a uniselector; a standard component used in large quantities in automatic telephone exchanges in countries like America, Britain, Canada, Germany and Japan, with extensive dial-telephone systems. The U.S. used four 6-level switches in each stage of its Purple analogs, the Japanese used three 7-level switches. Both represented the 20s cipher identically. Note however that these were not two-motion or Strowger switches as sometimes claimed: twenty-five Strolger-type (sic) stepper switches ...
Apparently, all other Purple machines at Japanese embassies and consulates around the world (e.g. in Axis countries, Washington, London, Moscow, and in neutral countries) and in Japan itself, were destroyed and ground into small particles by the Japanese. American occupation troops in Japan in 1945−52 searched for any remaining units. A complete Jade cipher machine, built on similar principles but without the sixes and twenties separation, was captured and is on display at NSA's National Cryptologic Museum.
Impact of Allied decryption
The Purple machine itself was first used by Japan in June 1938, but American and British cryptanalysts had broken some of its messages well before the attack on Pearl Harbor. US cryptanalysts decrypted and translated Japan's 14-part message to its Washington embassy to break off negotiations with the United States at 1 p.m., Washington time, on 7 December 1941, before the Japanese Embassy in Washington had done so. Decryption and typing difficulties at the embassy, coupled with ignorance of the importance of it being on time, were major reasons for the "Nomura Note" to be delivered late.
During World War II, the Japanese ambassador to Nazi Germany, General Hiroshi Oshima, was well-informed on German military affairs. His reports went to Tokyo in Purple-enciphered radio messages. One had a comment that Hitler told him on 3 June 1941 that "in every probability war with Russia cannot be avoided." In July and August 1942, he toured the Eastern Front, and in 1944, he toured the Atlantic Wall fortifications against invasion along the coasts of France and Belgium. On 4 September, Hitler told him that Germany would strike in the West, probably in November.
Since those messages were being read by the Allies, they provided valuable intelligence about German military preparations against the forthcoming invasion of Western Europe. He was described by General George Marshall as "our main basis of information regarding Hitler's intentions in Europe."
The decrypted Purple traffic and Japanese messages generally were the subject of acrimonious hearings in Congress after World War II in connection with an attempt to decide who, if anyone, had allowed the attack at Pearl Harbor to happen and so should be blamed. It was during those hearings that the Japanese for the first time learned that the Purple cipher machine had indeed been broken. (See the Pearl Harbor advance-knowledge conspiracy theory article for additional detail on the controversy and the investigations.)
The Soviets also succeeded in breaking the Purple system in late 1941, and together with reports from Richard Sorge, learned that Japan was not going to attack the Soviet Union. Instead, its targets were southward, toward Southeast Asia and American and British interests there. That allowed Stalin to move considerable forces from the Far East to Moscow in time to help stop the German push to Moscow in December.
References
Further reading
Big Machines, by Stephen J. Kelley (Aegean Park Press, Walnut Creek, 2001, ) – Contains a lengthy, technically detailed description of the history of the creation of the PURPLE machine, along with its breaking by the US SIS, and an analysis of its cryptographic security and flaws
- Appendix C: Cryptanalysis of the Purple Machine
Clark, Ronald W. "The Man Who Broke Purple: the Life of Colonel William F. Friedman, Who Deciphered the Japanese Code in World War II", September 1977, Little Brown & Co, .
Combined Fleet Decoded by J. Prados
The Story of Magic: Memoirs of an American Cryptologic Pioneer, by Frank B. Rowlett (Aegean Park Press, Laguna Hills, 1998, ) – A first-hand memoir from a lead team member of the team which 'broke' both Red and Purple, it contains detailed descriptions of both 'breaks'
External links
The Japanese Wikipedia article on the Type B machine has much technical information including the substitution tables, detailed stepping algorithm, punctuation codes and a sample decryption. It also has reactions from Japanese sources to the American decryption. Entering the website link https://ja.wikipedia.org/wiki/パープル暗号 into Google Translate and clicking "Translate this page" will provide a serviceable English translation.
Red and Purple: A Story Retold NSA analysts' modern-day attempt to duplicate solving the Red and Purple ciphers. Cryptologic Quarterly Article (NSA), Fall/Winter 1984-1985 - Vol. 3, Nos. 3-4 (last accessed: 22 August 2016).
A web-based Purple Simulator (last accessed: 10 February 2019)
A Purple Machine simulator written in Python
A GUI Purple Machine simulator written in Java
Purple, Coral, and Jade
The Purple Machine Information and a simulator (for very old Windows).
Attack on Pearl Harbor
Encryption devices
Japan–United States relations
World War II Japanese cryptography |
16160256 | https://en.wikipedia.org/wiki/Saamana | Saamana | Saamana is a Marathi-language newspaper published in Maharashtra, India. The paper was launched on 23 January 1988 by Bal Thackeray, the founder of the Shiv Sena, a local, regional and language driven; political party; in the Indian state of Maharashtra. A Hindi version of the paper, Dopahar Ka Saamana popularly known as Hindi Saamana, was launched on 23 February 1993.
History
Firstpost attributes the founding of Saamana to Thackeray's dissatisfaction about the amount of press he and his party received in other news outlets. It has been described it as a mouthpiece of the Shiv Sena, providing a link to Thackeray that did not exist previously. Firstpost also reports that while other newspapers allowed bias to creep into their news coverage, Saamana provided relatively unbiased news coverage of government policy and civic matters. It was only news about the Shiv Sena that was biased.
According to the Hindustan Times, Saamana played a "significant role during the 1992–93 riots", and Thackeray was "not beyond publishing lies and exaggerating the extent of the violence indulged in by the opposing groups and inciting Shiv Sainiks to do their worst."
Bal Thackeray edited both newspapers until his death on 17 November 2012. To honour him, Thackeray's son Uddhav Thackeray named him as the "founder-editor".
Till 27 November 2019 the chief editor of both newspapers was Uddhav Thackeray, but as he was elected as Chief Minister designate he resigned for his position. Now the executive editor of marathi newspaper is Rashmi Thackeray and the resident editor of the Hindi newspaper is Anil Tiwari.
In September 2020, the newspaper came into controversy for publishing an article with the title 'Tod Diya' which means 'We Broke It' in Hindi. This article was written in relation the demolition of the office of the Bollywood actress Kangana Ranaut by the BMC (Brihanmumbai Municipal Corporation).
See also
List of Marathi-language newspapers
List of newspapers in India
References
External links
Saamana e-Paper
At the launch of Saamana
Newspapers published in Mumbai
Marathi-language newspapers
Daily newspapers published in India
Shiv Sena
Bal Thackeray
1998 establishments in Maharashtra
Publications established in 1998 |
28257117 | https://en.wikipedia.org/wiki/Real-time%20Delphi | Real-time Delphi | Real-time Delphi (RTD) is an advanced form of the Delphi method. The advanced method “is a consultative process that uses computer technology” to increase efficiency of the Delphi process.
Definition and idea
Gordon and Pease define the advanced approach as an innovative way to conduct Delphi studies that do not involve sequential “rounds” and consequently lead to a higher degree of efficiency with regard to the time frame needed to perform such studies. Friedewald, von Oertzen, and Cuhls underline that aspect by writing, in “a Real-Time-Delphi, the participants do not only judge twice but can change their opinion as often as they like when they see the aggregated results of the other participants”. So, here it becomes clear that the Real-Time Delphi approach requires real-time calculation and provision of group responses. Friedewald et al. further state that the Real-Time Delphi method has beneath its explorative and predictive elements also normative and communicative elements. These latter are investigated by Bolognini, who explores the potential of computer-based Delphi as a communication technique for electronic democracy.
Comparative studies of von der Gracht and colleagues have revealed that Real-time Delphi studies are comparable to the outcome of conventional round-based Delphi surveys.
History
The basic idea of a real-time, therefore computer-based (usually web-based), Delphi approach originates in a paper published by Turoff back in 1972 about an online Delphi conference conducted in the United States. The conference was characterized by remote locations of participants, an online tool to access and give judgments, anonymity of the participants, continuous operations and analysis of results (i.e. participants were able to see given answers of the other participants in real-time), as well as asynchronous participation (i.e. participants could independently login and logout how often and when they desired). The stated aspects are some of the key characteristics of Real-Time Delphi studies, which shows that the original idea of conducting such studies can be traced back to the respective year. Today, nevertheless, technological innovations and advanced computer aided design possibilities (e.g. high-speed internet connections, high definition graphic, and advanced processor performance) facilitate more sophisticated studies in this context.
The general idea to develop a faster advanced form of Delphi studies by using ideas and basic concepts of Turoff, was initiated by the U.S. Defense Advanced Research Projects Agency (DARPA), which awarded a grant in 2004 to develop an approach to improve “speed and efficiency of collecting judgments in tactical situations”. A small software company named Articulate Software in San Francisco was awarded an innovation research grant to develop what DARPA was asking for. Adam Pease, principal consultant and CEO of Articulate Software, published the findings and methodology together with Theodore Gordon in 2006.
Based on the findings in this seminal paper, Heiko von der Gracht developed a second Real-time Delphi platform until 2008. In subsequent years, von der Gracht and colleagues used the platform extensively for prospective research studies. In 2011, von der Gracht and Gordon presented a joint paper at WFS Annual Summit 2011, which summarizes the lessons learned of 40 RTD studies across the two platforms.
In 2017, Angenheyster and colleagues published a study, which compares various Real-time Delphi platforms. Analysis criteria include among others visual appearance, data output, user friendliness, administration, and types of questions.
A cross-disciplinary study by Beiderbeck et al. focused on new directions and advancements of the Delphi method, including real-time formats. The authors provide a methodological toolbox for designing Delphi surveys including among others sentiment analyses of the field of psychology.
Differences between conventional and real-time Delphi method
The question arises how a Real-Time Delphi study differs from a Conventional Delphi study. The basic framework is to think of a Delphi study which is conducted in form of an online questionnaire. However, a Conventional round-based Delphi study conducted via the internet is called “Internet Delphi”. The basic difference to Internet Delphi is that the process of a Real-Time Delphi is not characterised by single iterated rounds. In fact, real-time calculation and provision of responses are the key characteristics of Real-Time Delphis. Various other labels for Real-Time Delphi can be found in literature and many authors are not completely aware of the differences: “Electronic Delphi”, “Computer Delphi”, “Computer-aided Delphi”, and “Technology Delphi”. However, it is important to truly understand the design and process a researcher has chosen to find out whether real-time calculations and provisions have been applied or not.
The typical Real-Time Delphi process can be described in the way that participants get access to an online questionnaire portal for a certain time frame, within which they are allowed to log in and log out as often as they want. Whenever they login, they will see all their quantitative and qualitative answers of previous sessions and they can change all answers as desired within the given period of time. Besides their own answers they will see the ongoing – hence, real-time – responses of other participants, and with regard to metric assessments the group as a whole will be visualised in terms of median, average, and interquartile range (IQR). It has to be pointed out that the numerical visualisations as well as the qualitative inputs change in the course of other participants changing their responses. Consequently, a participant can find out to what extent his own responses from an earlier point of time are still within the group opinion (i.e. IQR). The core innovation, then, of Real-Time Delphi studies is the real-time calculation and provision of results.
Methodological advancements
The core methodological innovation of Real-Time Delphi studies are the absence of iterated rounds and the real-time calculation and provision of group responses. Whereas Conventional Delphi studies are characterised by repeating sequential rounds, the Real-Time Delphi approach is characterised by a continuous round-less procedure leading to a reduced time frame needed to conduct such studies. Consequently, conducting large-scale studies of huge complexity in a relatively short period of time becomes possible. Another core methodological innovation is the fact that experts may not only judge once or twice, depending on the number of rounds, as it has been usual in a Conventional Delphi study. During a Real-Time Delphi, experts can independently reassess their responses as often as they want.
Hartman and Baldwin discuss further advantages of the Real-Time Delphi approach: First, the number of experts participating in the real-time study can be increased due to a higher degree of automation during and improved possibilities for analysis after the study. Additionally, the Internet provides the possibility to invite a worldwide expert panel to participate in the study. Second, the degree of interaction among the experts can be increased due to the fact that they can immediately react on others’ comments. Additionally, the time frame between giving own answers and getting insights into others’ responses is very short, which encourages stronger cognitive examination with the respective issue in question. Hartman and Baldwin argue that with the help of this procedure the validity of results is maximised.
In order to conduct a Real-Time Delphi study, computer software – usually web-based – is needed for facilitating real-time calculations and visualisation of results. It is generally proposed in the existing literature that the experts participating in the study see not only their own answers but also the median and interquartile range of all given responses immediately after answering a quantitative question. Besides the quantitative assessment a qualitative judgment of participants can be shown which serves as a justification for their numerical assessment of the question. Additionally, it can be shown to the expert how many respondents have already given their answers. To examine the qualitative arguments of others participants can click on a button, and a “reasons window” opens, which shows the statements of other participants to underline their point of view. So, the respective legitimisations given by others may cause a respondent to recapture his own point of view. In the next step the expert can change his own answer, add new arguments to underline his point of view, or leave his answer unchanged. In addition, the respondent will be shown an attention indicator, a so-called “flag”, if his answer is within or outside the interquartile range or significantly different from the median. This application helps to see and understand immediately the own assessment and to think about reasons for the deviation from group opinions or else a high degree of consent. The respondent's attention will be called by highlighting questions with a high degree of deviation with a different colour and by asking him to give further reasons for his deviation from the group opinion.
After operating a question in the described procedure, the participant can continue to the next question or press a “save”-button in the program, which leads to an immediate update of the median, interquartile range, and given arguments, and then leave the program. A second advantage of the round-less approach is the fact that, in order to take part in the study, participants can login and logout with their personalised account as often as they want during the time frame provided. Their already given answers will be saved and recalled when they login the next time. So, by design of the study, there are no explicit single rounds to answer the questions. Updating and playing back the information to the other participants follow immediately in succession to the process of answering. Here, it becomes clear that the process of answering can be synchronous or asynchronous and a worldwide expert panel can be reached, which is one of the major advantages of web-based tools. Turoff and Hiltz argue that the issue of asynchronous interaction is probably one of the least understood characteristics of Real-Time Delphis. Zipfinger points out two advantages of asynchronous participation of the experts: First, they can login to the portal whenever they want; therefore, one could argue that the degree of convenience of taking part is increased for the participant due to a 24h-availability of the portal. Second, panellists can contribute to whatever aspects in the questionnaire they want, especially when having gone through each question at least once. Here, a substantial aspect of Real-Time Delphis becomes obvious: Turoff and Hiltz explain that a Real-Time Delphi study offers a design of structured communication which allows every individual to choose the sequence and speed to contribute to the problem solution process. So, in comparison to face-to-face discussions, the Real-Time Delphi approach gives room for individuality and different cognitive abilities of the participants.
A further advantage is the fact that the administrator of the study can set an arbitrary time frame in which participants have to log in and take part in the questionnaire. So, whenever the researcher or administrator of the study is satisfied with the existing answers (i.e. in terms of quantity and quality), he can declare the study to be ended and close the online tool (i.e. “freeze” the responses).
The key features of Delphi studies, such as anonymity, controlled feedback and group response, are also met in the context of Real-Time Delphi studies. However, the issue of iteration is, by design of the technique, not valid for Real-Time Delphi studies anymore. Instead of answering each question a first time and getting a second sheet with the group responses in the second round, the Real-Time Delphi already shows the second screen (i.e. group responses) immediately after answering each question. Having answered each question at least once, the participant can usually control which question to reassess from a “consensus portal”, which serves as a kind of control panel to access single questions again. So, on the one hand, the procedure differs from a Conventional Delphi and, on the other hand, the iteration into single rounds is missing.
Having asked the question how the accomplishment of a Real-Time Delphi study differs from conducting a usual Delphi study, Gordon and Pease point out that a Real-Time Delphi study can be implemented via a site on the Internet or in any other network (e.g. intra-company network, local area network) and is, therefore, not conducted in paper-and-pencil form any more.
As with all Delphi studies, the process of defining and selecting experts is still extremely important. The Conventional Delphi study is then divided into several steps of response round, analysis through the facilitator, playing back the information, next response round, and so on. However, the Real-Time Delphi study is, after granting access to the online tool, rather a self-running process.
The basic strengths of a Real-Time Delphi study are its efficiency and applicability to all Delphi topics (i.e. common problem sets, decision making issues, cross impact studies, etc.). Figure 2 illustrates that the process of a Real-Time Delphi differs. Important is to point out that the number of interventions of the facilitator needed during the response phases (i.e. after opening the online tool) are usually less. Having developed the online tool in advance, the intermediate analysis done by the facilitator of the study is rather uncomplicated in comparison to the Conventional Delphi. The overall shortened time period needed to conduct a real-time study underlines that the approach can be regarded as generally more efficient.
Gordon and Pease point out that a Real-Time Delphi study is applicable for a wide range of possible circumstances under which the consultation of experts is necessary. On the one hand, the authors give the example of a “small group operating synchronously in a conference room with laptop computers connected wirelessly to the web site where the software resides, with anticipated completion of the exercise in say 20 min.”. On the other hand, it can be thought of a larger panel of experts operating asynchronously from remote locations within a longer period of time.
The greatest weakness of the real-time approach is that it is missing a wholly integrated, scientifically founded concept. The real-time Delphi idea is still a very new concept, which requires further research and application to become a tool for full-scale operations. Especially the editing of the alpha (i.e. the first) inputs of respondents, the real-time presentation of group results, and the tracking of progress over time should be integrated in a kind of administrator package to make the accomplishment of a Real-Time Delphi less difficult.
Examples of real-time Delphi applications
Numerous examples for real-time Delphi applications can be found. Among them, The Millennium Project conducted by Glenn, Gordon, & Florescu in 2009 provides a context for global thinking and improved understanding of global issues, opportunities, challenges, and strategies. More information on the project can be found on www.millennium-project.org
Another stream of projects based on real-time Delphi studies was conducted by the former Institute for Futures Studies and Knowledge Management of EBS University of Business and Law in Germany, among them the T&L2030 Series of five different studies together with PricewaterhouseCoopers: Transportation & Logistics 2030 Series. Further illustrative examples in academic journals include cases from logistics, social business, professional services, retail, and automotive.
Notes
References
Detailed description of RTD platform and comparison of classical vs. RT Delphi: Validating an Innovative Real-Time Delphi Approach – A methodological comparison between real-time and conventional Delphi studies. In: Technological Forecasting & Social Change. 78, 9, 2011, p. 1681–1694, doi:10.1016/j.techfore.2011.04.006.
Comparison of different RTD platforms: Real-Time Delphi in practice — A comparative analysis of existing software-based tools. In: Technological Forecasting & Social Change. 118, 2017, p. 15-27, doi:10.1016/j.techfore.2017.01.023.
Early research in the field: Using the Delphi method to engage stakeholders: A comparison of two studies. In: Evaluation and Program Planning. 33, 2, 2010, p. 147-154, doi:10.1016/j.evalprogplan.2009.06.006.
Forecasting
Systems thinking
Estimation methods
Futures techniques |
3832898 | https://en.wikipedia.org/wiki/Brian%20Cantwell%20Smith | Brian Cantwell Smith | Brian Cantwell Smith is a scholar in the fields of cognitive science, computer science, information studies, and philosophy, especially ontology. His research has focused on the foundations and philosophy of computing, both in the practice and theory of computer science, and in the use of computational metaphors in other fields, such as philosophy, cognitive science, physics, and art. Smith was Dean of the University of Toronto Faculty of Information from 2003–2008; he is currently professor of information, computer science, and philosophy at University of Toronto.
Smith's 1982 doctoral dissertation introduced the notion of computational reflection in programming languages, an area of active ongoing research in computer science. Past publications have addressed questions in computational reflection, meta-level architecture, programming languages, and knowledge representation. Over the last decade, his work has focused on fundamental issues in the foundations of epistemology, ontology, and metaphysics.
Smith received his BS, MS and PhD degrees from the Massachusetts Institute of Technology. He was a founder of the Center for the Study of Language and Information at Stanford University, and a founder and first president of Computer Professionals for Social Responsibility. Smith served as principal scientist at the Xerox Palo Alto Research Center, in the 1980s.
Smith is the author of more than 35 articles and three books,. One of his books is called On the Origin of Objects, MIT Press, 1996. He had promised for several years that he is about to publish a seven-volume series entitled The Age of Significance: An Essay on the Origins of Computation and Intentionality but so far only a forty-three page introduction has been released.
Smith previously held a Canada Research Chair in the Foundations of Information, and is cross-appointed as Professor in the departments of Philosophy and Computer Science and in the Program in Communication, Culture and Technology at University of Toronto at Mississauga. His father was the celebrated scholar of religion Wilfred Cantwell Smith.
External links
Brian Cantwell Smith 'On the Origin of Objects'
References
Year of birth missing (living people)
Living people
Massachusetts Institute of Technology alumni
American computer scientists
University of Toronto faculty
Duke University faculty
Scientists at PARC (company)
Stanford University Department of Philosophy faculty
Canada Research Chairs
Stanford University School of Engineering faculty
Scientists from Missouri |
54778639 | https://en.wikipedia.org/wiki/Kendall%20Ellis | Kendall Ellis | Kendall Ellis (born March 8, 1996) is an American sprinter. Ellis won gold in the 4x400 m relay and bronze in the Mixed 4x400 metres at the Tokyo Olympics. She competed in the 400 meters at the 2017 and 2019 World Championships, winning gold medals as a part of prelim 4×400 m relays. As a junior, Ellis took gold in the 4×400 m relay and bronze in the 400 meters at the 2015 Pan American Junior Championships.
On June 10, 2018, she gained widespread distinction after her come from behind victory in the 1600 meter relay at the NCAA Track and Field Championships. She caught Purdue's Jaheya Mitchel at the finish line, giving University of Southern California the team event and its second women's track and field national title in program history. Ellis is a 3-time NCAA champion, 14-time NCAA Division I All-American, 7-time Pac-12 Conference champion and 5-time Mountain Pacific Sports Federation champion. Ellis set 2 NCAA indoor track and field records, a North American, Central American and Caribbean Athletic Association indoor 400 meters record and United States collegiate records in 400 m and 4 x 400 m relay.
Career
Ellis won gold in the 4x400 m relay and bronze in the Mixed 4x400 metres (participating in the prelims) at the Tokyo Olympics.
She placed 4th in the 400 m at the 2020 U.S. Olympic Trials with a time of 50.10 secs.
Ellis competed in the women's 400 metres and won gold in the 4x400 m relay (participating in the prelim) at the 2019 World Athletics Championships.
In January 2019, she was announced to sign with New Balance and won her professional debut later that week at New Balance Indoor Grand Prix.
Ellis competed in the women's 400 metres and won gold in the 2017 World Championships in Athletics – Women's 4 × 400 metres relay (participating in the prelim) at the 2017 World Championships in Athletics. Ellis competed in 2015 Pan American Junior Athletics Championships and won gold in the 4×400 m relay and bronze in the 400 meters.
Ellis is 2015 USA U20 Outdoor Track and Field 400 m women Champion.
NCAA
Ellis is a 3-time NCAA champion, 14-time NCAA Division I All-American, 7-time Pac-12 Conference champion and 5-time Mountain Pacific Sports Federation champion. Ellis is the current North America, Central American and Caribbean record, American and Collegiate Record Holder for the indoor 400-meter dash with a time of 50.34 seconds.
Early life and prep
Ellis grew up volunteering at the West Pembroke Pines Optimist Track Club.
Ellis works with children as a volunteer for Coaching Corps.
Ellis graduated from St. Thomas Aquinas High School (Florida) c/o 2014 as a 7-time FHSAA state champion with high school personal best times of 24.18 (200 meters) and 52.95 (400 meters).
Ellis was St. Thomas Aquinas High School (Florida) teammates / relay partner with IAAF World U 18 and U 20 medalist Khalifa St. Fort.
In 2014, Ellis placed 1st in the 400 m (52.95) and 1st in the 4x400 m (3:41.01) at Florida High School Athletic Association 4A state meet.
In 2013, Ellis placed 1st in the 400 m (54.96), 6th in the 200 m (24.45) and 1st in the 4x400 m (3:45.01) at Florida High School Athletic Association 4A state meet.
In 2012, Ellis placed 1st in the 400 m (53.22), 5th in the 200 m (24.93) and 1st in the 4x400 m (3:47.67) at Florida High School Athletic Association 4A state meet.
In 2011, Ellis placed 1st in the 400 m (54.83), 9th in the 200 m (24.88) and 1st in the 4x400 m (3:51.67) at Florida High School Athletic Association 4A state meet.
References
External links
2018 USC Trojan Kendall Ellis Profile
2018 USC Trojan Kendall Ellis Results
Kendall Ellis coverage from NBC Sports
1996 births
Living people
American female sprinters
World Athletics Championships athletes for the United States
World Athletics Championships medalists
World Athletics Championships winners
Sportspeople from Pembroke Pines, Florida
Track and field athletes from Florida
USC Trojans women's track and field athletes
University of Southern California alumni
St. Thomas Aquinas High School (Florida) alumni
Athletes (track and field) at the 2020 Summer Olympics
Medalists at the 2020 Summer Olympics
Olympic gold medalists for the United States in track and field
Olympic bronze medalists for the United States in track and field |
2968099 | https://en.wikipedia.org/wiki/Hangul%20%28word%20processor%29 | Hangul (word processor) | Hangul Office () is a proprietary word processing application published by the South Korean company Hancom Inc. Hangul's specialized support for the Korean written language has gained it widespread use in South Korea, especially by the government. Hancom has published their HWP binary format specification online for free.
The software's name is derived from the Korean word Hangul () for the alphabet used to write Korean. In Korean, the software's name is officially stylised () using the obsolete letter in place of the modern in , and is also frequently referred to as () or ().
Hangul Office in English
As of May 11, 2020, Hancom rebranded their former English language ThinkFree as Hancom Office 2020. See website https://office.hancom.com.
Haansoft near bankruptcy
Haansoft was on the verge of bankruptcy after the release of its 2002 version, due to the widespread use of illegal copies. A campaign to support the development of Korean software and promote the purchase of legal copies of Hangul allowed Haansoft to recover.
Versions
Hangul has many versions, the latest of which is Hancom Office 2020.
Previous versions have included:
Windows
Hangul 3.0, 3.0a, 3.0b (1995)
Hangul 96, International, Japanese (1996)
Hangul 97, 97 strengthen, 815 special edition (1998)
Hangul Wordian, Hangul for Kids (2000)
Hangul 2002 (2001, widely used for government e-document system)
Hangul 2004 (2003)
Hangul 2005 (2004)
Hangul 2007 (2006)
Hangul 2010 (2010)
Hancom Office 2010 SE(English Edition)
Hangul 2014 (2013)
Hangul NEO (2016)
ThinkFree (2017)
macOS
Hangul 2006 (2006) : PPC binary
Hangul 2014 for Mac (2013)
Linux
Hangul X R4 (1999, bundled in Mizi Linux 1 and 1.1)
Hangul X R5 (2000, included in Hancom Office 2)
Hangul 2008 Linux (2008, included in Hancom Office 2008 Linux)
References
External links
Communications in South Korea
Windows word processors
Linux word processors
MacOS word processors
1989 software |
715809 | https://en.wikipedia.org/wiki/Meditech | Meditech | Medical Information Technology, Incorporated (stylized as MEDITECH), is a privately held Massachusetts-based software and service company that develops and sells information systems for health care organizations.
History
In 1969, Neil Pappalardo began development of the programming language MIIS. This was one of several proprietary implementations of MUMPS, a programming language which at the time had not been standardized. In July that year, Pappalardo and Morton E. Ruderman, Curtis W. Marble, Jerome H. Grossman and Edward B. Roberts founded the company, with a $500,000 investment from EG&G. MIIS users and developers later influenced efforts toward MUMPS standardization during the early 1970s; the MUMPS standard was complete by 1974 and approved by 1977. Between 1971 and 1979, Pappalardo developed various other systems, but those associated with integrated health care information remained his primary focus.
In 1982, Meditech adopted the then-new MAGIC programming language for its health care information systems. In 1994, the company adopted client/server, a second software platform. While client/server utilized the same programming language, MAGIC runs all code on a central server, and clients are in effect dumb terminals. Client/server executes the code on a user's PC, although all code remained centralized. Client-server supports only Microsoft Windows-based operating systems. Meditech announced its version 6.0 in 2006.
In 2003, Howard Messing was named president, and in 2010 also became chief executive officer.
MEDITECH announced the launch of Expanse, the company’s mobile, web-based EHR, on February 27, 2018.
On January 29, 2020, Meditech announced the launch of Expanse Patient Care, a web-based application software that allows nurses and therapists to conduct administrative tasks through a mobile device.
In 2021, Michelle O’Connor was named president and chief executive officer.
Markets
Meditech expanded from the United States and Canada into the United Kingdom, South Africa, Australia, and several other communities, including the Spanish-speaking world.
Products and services
Meditech offers software for health care organizations of various types and sizes. Some of the software modules include:
Health Information Management, Revenue Cycle, Scanning and Archiving, Scheduling and Referral Management, Emergency Department Management, Electronic Health Record, Physician Care Manager, Ambulatory, Patient Care and Patient Safety, Oncology, Genomics, Population Health, Virtual Assistant, Quality and Surveillance, Case Management, Laboratory and Microbiology, Blood Bank, Anatomical Pathology, Critical Care, Pharmacy, Imaging and Documentation Management, Cost Accounting, Business and Clinical Analytics, Data Repository, General Accounting, Human Resource Planning, Supply Chain, Surgical Services, Labor and Delivery, Long Term Care, Home Health, Hospice, Patient and Consumer Health Portal, High Availability Snapshot, Expanse Now, Virtual Care, and Expanse Patient Connect.
While the company supports multiple legacy platforms, it's go-forward solution is MEDITECH Expanse.
Some other developments include:
Working with partners and other companies to provide new technology in the areas of business continuance, identity management, and RFID
Incorporating evidence-based medicine into practice through integration with Zynx Health, Inc.
The development of an oncology product to manage the needs of oncology departments
Expanding medication management capabilities to include e-prescribing and medication reconciliation from DrFirst, Inc.
Offering standard interoperability suites to help customers transition to electronic health record standards
Partnerships
Meditech South Africa, founded in 1982, provides software and services to the health care industry in Africa and the Middle East. Other companies such as BridgeHead Software produce software designed to be used with Meditech software. On June 6, 2012, Meditech announced its partnership with Intelligent Medical Objects to provide mapping of clinician-friendly diagnosis and procedure terminologies to billing codes and medical concepts.
Locations
Meditech owns several facilities in eastern Massachusetts located in Westwood (two offices, three buildings), Canton, Fall River, and Foxborough. Meditech also has a facility in Atlanta, Georgia that was formerly Patient Care Technologies (PtCT). It is chiefly responsible for the company's Home Care line of clinical and billing software. Meditech also owns a building in Minnetonka, Minnesota.
References
Health care companies based in Massachusetts
Health care companies established in 1969
Software companies based in Massachusetts
Software companies established in 1969
Privately held companies based in Massachusetts
MUMPS programming language family
Health information technology companies
1969 establishments in Massachusetts
American companies established in 1969
Software companies of the United States |
1637709 | https://en.wikipedia.org/wiki/Mystic%20BBS | Mystic BBS | Mystic BBS is a bulletin board system software program that began in 1995 and was first released to the public in December 1997 for MS-DOS. It has been ported to Microsoft Windows, OS/2, OS X, and Linux (Intel and ARM based systems such as the Raspberry Pi). Mystic was designed to be a spiritual successor to the Renegade (BBS) and Telegard bulletin board systems.
Some of the more notable capabilities of Mystic BBS include:
Integrated Telnet, SSH, RLogin, FTP, BinkP, HTTP, NNTP, POP3, SMTP servers with IPv4 + IPv6 support
Full 5D compliant FidoNet BSO mailer and tosser, including BINKP & FTP mailers
Built in AreaFix and FileFix functionality and full fileecho support
Integrated QWK and QWKE networking via FTP
Integrated text and ANSI editors, message editing with on-the-fly spell checking and word suggestions
Proprietary scripting language called Mystic Programming Language (MPL)
Embedded PYTHON 2.x and 3.x programming languages
DOS CP437 and UTF8 character translations, terminal sizes up to 160x60
Dynamic menus including menu editor, and fully customizable prompts
Multiple user-selectable themes
DOOR32 support in addition to various DOS-type door formats
A fully featured ACS (access control system) and MCI display codes
Modern security features such as TLS v1.2+, 512-bit PBKDF2 password storage, and AES-256 encrypted Netmail
Highly integrated with ANSI graphics including full screen editor, lightbar menus, lightbar file listings and message reading
Advanced, feature-rich JAM message base system with QWK/QWKE offline mail
Multiple platform distributions available including Windows, OS X, Linux and ARM Linux (Raspberry Pi, ODROID, etc.)
A more complete list of capabilities can be found at http://www.mysticbbs.com/features.html
Attracted to the flexibility and potential that the scripting language provides, a number groups, such as ACiDic BBS modding, Cyberia, Demonic, DoRE, Vanguard, wOE!mODDING and Wicked formed for the sole purpose of writing BBS mods for SysOps who run Mystic.
External links
Software & Configuration
Mystic BBS Website
Mystic BBS Wiki
Bulletin Board Systems
Here's a small selection of BBS that currently use Mystic software (alphabetical by BBS name):
Agency BBS (New Zealand BBS, run by Avon since '13)
Another F-ing BBS (Anotherbbs.bbsindex.com , Run by Gary Crunk since January '17)
Arcadia BBS (Arcadia BBS, run by Nazferiti - Features Games, Files, and Gated Usenet)
BlackICE BBS (German BBS, since '13)
Central Ontario Remote BBS
Clutch BBS (Originally launched in `95 - home of the Acidic Paging Module)
Cyberia BBS telnet to cyberia.darktech.org
Datanet BBS Melbourne, Australia SysOp: rEApZ
Distortion BBS
Error 1202 BBS (Located in Perrysburg Ohio ran by Solaris since '19)
Error 404 BBS (Located in Perrysburg Ohio ran by Solaris since '14)
flupH BBS Survnet *Survival & Self reliance Hq* Blocktronic member board
Leisure Time BBS (Located in New Baden, IL, USA)
Necronomicon BBS (Originally started on Amiga CNet. Run by Necromaster. Home of RetroNet)
Never Never Land BBS (419 area code oldest bbs since '89)
Piranha BBS (<ACiD> board run by caphood, since '95)
Sinner's Haven II (Originally Created in '89 telegard, '92 OBV/2, recreated in '13 under Mystic)
The Vortex BBS 864s longest running BBS created in 1996.
THE VOiD BBS (Located in Troy, Ohio ran by Terra-X)
Lunatic Fringe (Located in Vancouver, WA)
The Zone BBS (Located in Lorain, Ohio)
The ByteXchange BBS - Texas - Home of Cyber-Net Network and running since 1992!
SLiME CiTY BBS - Sweden - Dedicated to retro computing and computer security! Running since 2013
To connect to these systems, a Telnet client designed to access BBS systems such as NetRunner is recommended.
Bulletin board system software |
3986747 | https://en.wikipedia.org/wiki/PopTop%20Software | PopTop Software | PopTop Software Inc. was an American video game developer based in Fenton, Missouri. The company was founded in 1993 by Phil Steinmeyer, acquired by Take-Two Interactive in July 2000, became part of the 2K label in January 2005, and was closed down in March 2006. It was known for its construction and management simulation games.
History
PopTop Software was founded by video game programmer and designer Phil Steinmeyer in 1993. On July 24, 2000, Take-Two Interactive announced that it had acquired PopTop Software. The deal saw a transaction of 559,100 shares in Take-Two Interactive, valued at an estimated . On January 25, 2005, Take-Two Interactive announced the opening of publishing label 2K, which would henceforth manage their development studios, including PopTop Software.
Steinmeyer left PopTop Software in late 2004 and founded New Crayon Games, which later developed Bonnie's Bookstore, in May 2005. On March 7, 2006, it was announced that PopTop Software's operations had been merged into Firaxis Games, another 2K studio.
Games developed
References
Take-Two Interactive divisions and subsidiaries
Video game companies established in 1993
Video game companies disestablished in 2006
Defunct video game companies of the United States
Video game development companies
Defunct companies based in Missouri |
33879 | https://en.wikipedia.org/wiki/Windows%20XP | Windows XP | Windows XP is a major release of Microsoft's Windows NT operating system. It is the direct successor to Windows 2000 for professional users and Windows Me for home users. It was released to manufacturing on August 24, 2001, and later to retail on October 25, 2001.
Development of Windows XP began in the late 1990s under the codename "Neptune", built on the Windows NT kernel explicitly intended for mainstream consumer use. An updated version of Windows 2000 was also initially planned for the business market. However, in January 2000, both projects were scrapped in favor of a single OS codenamed "Whistler", which would serve as a single platform for both consumer and business markets. As a result, Windows XP is the first consumer edition of Windows not based on the Windows 95 kernel and MS-DOS.
Upon its release, Windows XP received critical acclaim, noting increased performance and stability (especially compared to Windows Me), a more intuitive user interface, improved hardware support, and expanded multimedia capabilities. However, some industry reviewers were concerned by the new licensing model and product activation system. Windows XP and Windows Server 2003 were succeeded by Windows Vista and Windows Server 2008, released in 2007 and 2008, respectively. Market share of Windows XP fell below 1% by the end of 2021, right when Windows 10 was released
Mainstream support for Windows XP ended on April 14, 2009, and extended support ended on April 8, 2014. After that, the operating system ceased receiving further support. Windows Embedded POSReady 2009, based on Windows XP Professional, received security updates until April 2019. After that, unofficial methods were made available to apply the updates to other editions of Windows XP. Still, Microsoft discouraged this practice, citing incompatibility issues. , 0.5% of Windows PCs run Windows XP (on all continents, the share is below 1%), and 0.18% of all devices across all platforms run Windows XP. Windows XP is still very prevalent in many countries, such as Armenia, where 50–60% of computers use it.
Development
In the late 1990s, initial development of what would become Windows XP was focused on two individual products: "Odyssey", which was reportedly intended to succeed the future Windows 2000; and "Neptune", which was reportedly a consumer-oriented operating system using the Windows NT architecture, succeeding the MS-DOS-based Windows 98.
However, the projects proved to be too ambitious. In January 2000, shortly prior to the official release of Windows 2000, technology writer Paul Thurrott reported that Microsoft had shelved both Neptune and Odyssey in favor of a new product codenamed "Whistler", named after Whistler, British Columbia, as many Microsoft employees skied at the Whistler-Blackcomb ski resort. The goal of Whistler was to unify both the consumer and business-oriented Windows lines under a single, Windows NT platform: Thurrott stated that Neptune had become "a black hole when all the features that were cut from Windows Me were simply re-tagged as Neptune features. And since Neptune and Odyssey would be based on the same code-base anyway, it made sense to combine them into a single project".
At PDC on July 13, 2000, Microsoft announced that Whistler would be released during the second half of 2001, and also unveiled the first preview build, 2250, which featured an early implementation of Windows XP's visual styles system and interface changes to Windows Explorer and the Control Panel.
Microsoft released the first public beta build of Whistler, build 2296, on October 31, 2000. Subsequent builds gradually introduced features that users of the release version of Windows XP would recognize, such as Internet Explorer 6.0, the Microsoft Product Activation system and the Bliss desktop background.
Whistler was officially unveiled during a media event on February 5, 2001, under the name Windows XP, where XP stands for "eXPerience".
Release
In June 2001, Microsoft indicated that it was planning to, in conjunction with Intel and other PC makers, spend at least 1 billion US dollars on marketing and promoting Windows XP. The theme of the campaign, "Yes You Can", was designed to emphasize the platform's overall capabilities. Microsoft had originally planned to use the slogan "Prepare to Fly", but it was replaced because of sensitivity issues in the wake of the September 11 attacks.
On August 24, 2001, Windows XP build 2600 was released to manufacturing (RTM). During a ceremonial media event at Microsoft Redmond Campus, copies of the RTM build were given to representatives of several major PC manufacturers in briefcases, who then flew off on decorated helicopters. While PC manufacturers would be able to release devices running XP beginning on September 24, 2001, XP was expected to reach general, retail availability on October 25, 2001. On the same day, Microsoft also announced the final retail pricing of XP's two main editions, "Home" (as a replacement for Windows Me for home computing) and "Professional" (as a replacement for Windows 2000 for high-end users).
New and updated features
User interface
While retaining some similarities to previous versions, Windows XP's interface was overhauled with a new visual appearance, with an increased use of alpha compositing effects, drop shadows, and "visual styles", which completely changed the appearance of the operating system. The number of effects enabled are determined by the operating system based on the computer's processing power, and can be enabled or disabled on a case-by-case basis. XP also added ClearType, a new subpixel rendering system designed to improve the appearance of fonts on liquid-crystal displays. A new set of system icons was also introduced. The default wallpaper, Bliss, is a photo of a landscape in the Napa Valley outside Napa, California, with rolling green hills and a blue sky with stratocumulus and cirrus clouds.
The Start menu received its first major overhaul in XP, switching to a two-column layout with the ability to list, pin, and display frequently used applications, recently opened documents, and the traditional cascading "All Programs" menu. The taskbar can now group windows opened by a single application into one taskbar button, with a popup menu listing the individual windows. The notification area also hides "inactive" icons by default. A "common tasks" list was added, and Windows Explorer's sidebar was updated to use a new task-based design with lists of common actions; the tasks displayed are contextually relevant to the type of content in a folder (e.g. a folder with music displays offers to play all the files in the folder, or burn them to a CD).
Fast user switching allows additional users to log into a Windows XP machine without existing users having to close their programs and log out. Although only one user at the time can use the console (i.e. monitor, keyboard, and mouse), previous users can resume their session once they regain control of the console.
Infrastructure
Windows XP uses prefetching to improve startup and application launch times. It also became possible to revert the installation of an updated device driver, should the updated driver produce undesirable results.
A copy protection system known as Windows Product Activation was introduced with Windows XP and its server counterpart, Windows Server 2003. All Windows licenses must be tied to a unique ID generated using information from the computer hardware, transmitted either via the internet or a telephone hotline. If Windows is not activated within 30 days of installation, the OS will cease to function until it is activated. Windows also periodically verifies the hardware to check for changes. If significant hardware changes are detected, the activation is voided, and Windows must be re-activated.
Networking and internet functionality
Windows XP was originally bundled with Internet Explorer 6, Outlook Express 6, Windows Messenger, and MSN Explorer. New networking features were also added, including Internet Connection Firewall, Internet Connection Sharing integration with UPnP, NAT traversal APIs, Quality of Service features, IPv6 and Teredo tunneling, Background Intelligent Transfer Service, extended fax features, network bridging, peer to peer networking, support for most DSL modems, IEEE 802.11 (Wi-Fi) connections with auto configuration and roaming, TAPI 3.1, and networking over FireWire. Remote Assistance and Remote Desktop were also added, which allow users to connect to a computer running Windows XP from across a network or the Internet and access their applications, files, printers, and devices or request help. Improvements were also made to IntelliMirror features such as Offline Files, Roaming user profiles and Folder redirection.
Backwards compatibility
To enable running software that targets or locks out specific versions of Windows, "Compatibility mode" has been added. The feature allows pretending a selected earlier version of Windows to software, starting at Windows 95.
While this ability was first introduced in Windows 2000 Service Pack 2, it had to be activated through the "register server" and was only available to administrator users, whereas Windows XP has it activated out of the box and also grants it to regular users.
Other features
Improved application compatibility and shims compared to Windows 2000.
DirectX 8.1, upgradeable to DirectX 9.0c.
A number of new features in Windows Explorer including task panes, thumbnails, and the option to view photos as a slideshow.
Improved imaging features such as Windows Picture and Fax Viewer.
Faster start-up, (because of improved Prefetch functions) logon, logoff, hibernation, and application launch sequences.
Numerous improvements to increase the system reliability such as improved System Restore, Automated System Recovery, and driver reliability improvements through Device Driver Rollback.
Hardware support improvements such as FireWire 800, and improvements to multi-monitor support under the name "DualView".
Fast user switching.
The ClearType font rendering mechanism, which is designed to improve text readability on liquid-crystal display (LCD) and similar monitors, especially laptops.
Side-by-side assemblies and registration-free COM.
General improvements to international support such as more locales, languages and scripts, MUI support in Terminal Services, improved Input Method Editors, and National Language Support.
Removed features
Some of the programs and features that were part of the previous versions of Windows did not make it to Windows XP. Various MS-DOS commands available in its Windows 9x predecessor were removed, as were the POSIX and OS/2 subsystems.
In networking, NetBEUI, NWLink and NetDDE were deprecated and not installed by default. Plug-and-play–incompatible communication devices (like modems and network interface cards) were no longer supported.
Service Pack 2 and Service Pack 3 also removed features from Windows XP, but to a less noticeable extent. For instance, support for TCP half-open connections was removed in Service Pack 2, and the address bar on the taskbar was removed in Service Pack 3.
Editions
Windows XP was released in two major editions on launch: Home Edition and Professional Edition. Both editions were made available at retail as pre-loaded software on new computers and as boxed copies. Boxed copies were sold as "Upgrade" or "Full" licenses; the "Upgrade" versions were slightly cheaper, but require an existing version of Windows to install. The "Full" version can be installed on systems without an operating system or existing version of Windows. The two editions of XP were aimed at different markets: Home Edition is explicitly intended for consumer use and disables or removes certain advanced and enterprise-oriented features present on Professional, such as the ability to join a Windows domain, Internet Information Services, and Multilingual User Interface. Windows 98 or Me can be upgraded to either edition, but Windows NT 4.0 and Windows 2000 can only be upgraded to Professional. Windows' software license agreement for pre-loaded licenses allows the software to be "returned" to the OEM for a refund if the user does not wish to use it. Despite the refusal of some manufacturers to honor the entitlement, it has been enforced by courts in some countries.
Two specialized variants of XP were introduced in 2002 for certain types of hardware, exclusively through OEM channels as pre-loaded software. Windows XP Media Center Edition was initially designed for high-end home theater PCs with TV tuners (marketed under the term "Media Center PC"), offering expanded multimedia functionality, an electronic program guide, and digital video recorder (DVR) support through the Windows Media Center application. Microsoft also unveiled Windows XP Tablet PC Edition, which contains additional pen input features, and is optimized for mobile devices meeting its Tablet PC specifications. Two different 64-bit editions of XP were made available. The first, Windows XP 64-Bit Edition, was intended for IA-64 (Itanium) systems; as IA-64 usage declined on workstations in favor of AMD's x86-64 architecture, the Itanium edition was discontinued in January 2005. A new 64-bit edition supporting the x86-64 architecture, called Windows XP Professional x64 Edition, was released in April of the same year.
Microsoft also targeted emerging markets with the 2004 introduction of Windows XP Starter Edition, a special variant of Home Edition intended for low-cost PCs. The OS is primarily aimed at first-time computer owners, containing heavy localization (including wallpapers and screen savers incorporating images of local landmarks), and a "My Support" area which contains video tutorials on basic computing tasks. It also removes certain "complex" features, and does not allow users to run more than three applications at a time. After a pilot program in India and Thailand, Starter was released in other emerging markets throughout 2005. In 2006, Microsoft also unveiled the FlexGo initiative, which would also target emerging markets with subsidized PCs on a pre-paid, subscription basis.
As a result of unfair competition lawsuits in Europe and South Korea, which both alleged that Microsoft had improperly leveraged its status in the PC market to favor its own bundled software, Microsoft was ordered to release special editions of XP in these markets that excluded certain applications. In March 2004, after the European Commission fined Microsoft €497 million (US$603 million), Microsoft was ordered to release "N" editions of XP that excluded Windows Media Player, encouraging users to pick and download their own media player software. As it was sold at the same price as the edition with Windows Media Player included, certain OEMs (such as Dell, who offered it for a short period, along with Hewlett-Packard, Lenovo and Fujitsu Siemens) chose not to offer it. Consumer interest was minuscule, with roughly 1,500 units shipped to OEMs, and no reported sales to consumers. In December 2005, the Korean Fair Trade Commission ordered Microsoft to make available editions of Windows XP and Windows Server 2003 that do not contain Windows Media Player or Windows Messenger. The "K" and "KN" editions of Windows XP were released in August 2006, and are only available in English and Korean, and also contain links to third-party instant messenger and media player software.
Service packs
A service pack is a cumulative update package that is a superset of all updates, and even service packs, that have been released before it. Three service packs have been released for Windows XP. Service Pack 3 is slightly different, in that it needs at least Service Pack 1 to have been installed, in order to update a live OS. However, Service Pack 3 can still be embedded into a Windows installation disc; SP1 is not reported as a prerequisite for doing so.
Service Pack 1
Service Pack 1 (SP1) for Windows XP was released on September 9, 2002. It contained over 300 minor, post-RTM bug fixes, along with all security patches released since the original release of XP. SP1 also added USB 2.0 support, the Microsoft Java Virtual Machine, .NET Framework support, and support for technologies used by the then-upcoming Media Center and Tablet PC editions of XP. The most significant change on SP1 was the addition of Set Program Access and Defaults, a settings page which allows programs to be set as default for certain types of activities (such as media players or web browsers) and for access to bundled, Microsoft programs (such as Internet Explorer or Windows Media Player) to be disabled. This feature was added to comply with the settlement of United States v. Microsoft Corp., which required Microsoft to offer the ability for OEMs to bundle third-party competitors to software it bundles with Windows (such as Internet Explorer and Windows Media Player), and give them the same level of prominence as those normally bundled with the OS.
On February 3, 2003, Microsoft released Service Pack 1a (SP1a). It was the same as SP1, except, the Microsoft Java Virtual Machine was excluded.
Service Pack 2
Service Pack 2 (SP2) for Windows XP Home edition and Professional edition was released on August 25, 2004. Headline features included WPA encryption compatibility for Wi-Fi and usability improvements to the Wi-Fi networking user interface, partial Bluetooth support, and various improvements to security systems.
The security improvements (codenamed "Springboard", as these features were intended to underpin additional changes in Longhorn) included a major revision to the included firewall (renamed Windows Firewall, and now enabled by default), and an update to Data Execution Prevention, which gained hardware support in the NX bit that can stop some forms of buffer overflow attacks. Raw socket support is removed (which supposedly limits the damage done by zombie machines) and the Windows Messenger service (which had been abused to cause pop-up advertisements to be displayed as system messages without a web browser or any additional software) became disabled by default. Additionally, security-related improvements were made to e-mail and web browsing. Service Pack 2 also added Security Center, an interface that provides a general overview of the system's security status, including the state of the firewall and automatic updates. Third-party firewall and antivirus software can also be monitored from Security Center.
The unique boot screens that identified the edition of Windows XP currently running, including a green progress bar for Home Edition and a blue progress bar for other editions, were removed and replaced with a generic "Windows XP" boot screen with a blue progress bar with this service pack.
In August 2006, Microsoft released updated installation media for Windows XP and Windows Server 2003 SP2 (SP2b), in order to incorporate a patch requiring ActiveX controls in Internet Explorer to be manually activated before a user may interact with them. This was done so that the browser would not violate a patent owned by Eolas. Microsoft has since licensed the patent, and released a patch reverting the change in April 2008. In September 2007, another minor revision known as SP2c was released for XP Professional, extending the number of available product keys for the operating system to "support the continued availability of Windows XP Professional through the scheduled system builder channel end-of-life (EOL) date of January 31, 2009."
Service Pack 3
The third and final Service Pack, SP3, was released through different channels between April and June 2008, about a year after the release of Windows Vista, and about a year before the release of Windows 7. Service Pack 3 was not available for Windows XP x64 Edition, which was based on the Windows Server 2003 kernel and, as a result, used its service packs rather than the ones for the other editions.
It began being automatically pushed out to Automatic Updates users on July 10, 2008. A feature set overview which detailed new features available separately as stand-alone updates to Windows XP, as well as backported features from Windows Vista, was posted by Microsoft. A total of 1,174 fixes are included in SP3. Service Pack 3 could be installed on systems with Internet Explorer versions 6, 7, or 8; Internet Explorer 7 was not included as part of SP3.
Service Pack 3 included security enhancements over and above those of SP2, including APIs allowing developers to enable Data Execution Prevention for their code, independent of system-wide compatibility enforcement settings, the Security Support Provider Interface, improvements to WPA2 security, and an updated version of the Microsoft Enhanced Cryptographic Provider Module that is FIPS 140-2 certified.
In incorporating all previously released updates not included in SP2, Service Pack 3 included many other key features. Windows Imaging Component allowed camera vendors to integrate their own proprietary image codecs with the operating system's features, such as thumbnails and slideshows. In enterprise features, Remote Desktop Protocol 6.1 included support for ClearType and 32-bit color depth over RDP, while improvements made to Windows Management Instrumentation in Windows Vista to reduce the possibility of corruption of the WMI repository were backported to XP SP3.
In addition, SP3 contains updates to the operating system components of Windows XP Media Center Edition (MCE) and Windows XP Tablet PC Edition, and security updates for .NET Framework version 1.0, which is included in these editions. However, it does not include update rollups for the Windows Media Center application in Windows XP MCE 2005. SP3 also omits security updates for Windows Media Player 10, although the player is included in Windows XP MCE 2005. The Address Bar DeskBand on the Taskbar is no longer included because of antitrust violation concerns.
Unofficial SP3 ZIP download packages were released on a now-defunct website called The Hotfix from 2005 to 2007. The owner of the website, Ethan C. Allen, was a former Microsoft employee in Software Quality Assurance and would comb through the Microsoft Knowledge Base articles daily and download new hotfixes Microsoft would put online within the articles. The articles would have a "kbwinxppresp3fix" and/or "kbwinxpsp3fix" tag, thus allowing Allen to easily find and determine which fixes were planned for the official SP3 release to come. Microsoft publicly stated at the time that the SP3 pack was unofficial and users should not install it. Allen also released a Vista SP1 package in 2007, for which Allen received a cease-and-desist email from Microsoft.
System requirements
System requirements for Windows XP are as follows:
Notes
Physical memory limits
The maximum amount of RAM that Windows XP can support varies depending on the product edition and the processor architecture. Most 32-bit editions of XP support up to 4 GB, with the exception of Windows XP Starter, which is limited to 512 MB. 64-bit editions support up to 128 GB.
Processor limits
Windows XP Professional supports up to two physical processors;
Windows XP Home Edition is limited to one.
However, XP supports a greater number of logical processors:
32-bit editions support up to 32 logical processors, whereas 64-bit editions support up to 64 logical processors.
Support lifecycle
Support for the original release of Windows XP (without a service pack) ended on August 30, 2005. Both Windows XP Service Pack 1 and 1a were retired on October 10, 2006, and both Windows 2000 and Windows XP SP2 reached their end of support on July 13, 2010, about 24 months after the launch of Windows XP Service Pack 3. The company stopped general licensing of Windows XP to OEMs and terminated retail sales of the operating system on June 30, 2008, 17 months after the release of Windows Vista. However, an exception was announced on April 3, 2008, for OEMs producing what it defined as "ultra low-cost personal computers", particularly netbooks, until one year after the availability of Windows 7 on October 22, 2010. Analysts felt that the move was primarily intended to compete against Linux-based netbooks, although Microsoft's Kevin Hutz stated that the decision was due to apparent market demand for low-end computers with Windows.
Variants of Windows XP for embedded systems have different support policies: Windows XP Embedded SP3 and Windows Embedded for Point of Service SP3 were supported until January and April 2016, respectively. Windows Embedded Standard 2009, which was succeeded by Windows Embedded Standard 7, and Windows Embedded POSReady 2009, which was succeeded by Windows Embedded POSReady 7, were supported until January and April 2019, respectively. These updates, while intended for the embedded editions, could also be downloaded on standard Windows XP with a registry hack, which enabled unofficial patches until April 2019. However, Microsoft advised Windows XP users against installing these fixes, citing incompatibility issues.
End of support
On April 14, 2009, Windows XP exited mainstream support and entered the extended support phase; Microsoft continued to provide security updates every month for Windows XP, however, free technical support, warranty claims, and design changes were no longer being offered. Extended support ended on April 8, 2014, over 12 years after the release of Windows XP; normally Microsoft products have a support life cycle of only 10 years. Beyond the final security updates released on April 8, no more security patches or support information are provided for XP free-of-charge; "critical patches" will still be created, and made available only to customers subscribing to a paid "Custom Support" plan. As it is a Windows component, all versions of Internet Explorer for Windows XP also became unsupported.
In January 2014, it was estimated that more than 95% of the 3 million automated teller machines in the world were still running Windows XP (which largely replaced IBM's OS/2 as the predominant operating system on ATMs); ATMs have an average lifecycle of between seven and ten years, but some have had lifecycles as long as 15. Plans were being made by several ATM vendors and their customers to migrate to Windows 7-based systems over the course of 2014, while vendors have also considered the possibility of using Linux-based platforms in the future to give them more flexibility for support lifecycles, and the ATM Industry Association (ATMIA) has since endorsed Windows 10 as a further replacement. However, ATMs typically run the embedded variant of Windows XP, which was supported through January 2016. As of May 2017, around 60% of the 220,000 ATMs in India still run Windows XP.
Furthermore, at least 49% of all computers in China still ran XP at the beginning of 2014. These holdouts were influenced by several factors; prices of genuine copies of later versions of Windows in the country are high, while Ni Guangnan of the Chinese Academy of Sciences warned that Windows 8 could allegedly expose users to surveillance by the United States government, and the Chinese government would ban the purchase of Windows 8 products for government use in May 2014 in protest of Microsoft's inability to provide "guaranteed" support. The government also had concerns that the impending end of support could affect their anti-piracy initiatives with Microsoft, as users would simply pirate newer versions rather than purchasing them legally. As such, government officials formally requested that Microsoft extend the support period for XP for these reasons. While Microsoft did not comply with their requests, a number of major Chinese software developers, such as Lenovo, Kingsoft and Tencent, will provide free support and resources for Chinese users migrating from XP. Several governments, in particular those of the Netherlands and the United Kingdom, elected to negotiate "Custom Support" plans with Microsoft for their continued, internal use of Windows XP; the British government's deal lasted for a year, and also covered support for Office 2003 (which reached end-of-life the same day) and cost £5.5 million.
On March 8, 2014, Microsoft deployed an update for XP that, on the 8th of each month, displays a pop-up notification to remind users about the end of support; however, these notifications may be disabled by the user. Microsoft also partnered with Laplink to provide a special "express" version of its PCmover software to help users migrate files and settings from XP to a computer with a newer version of Windows.
Despite the approaching end of support, there were still notable holdouts that had not migrated past XP; many users elected to remain on XP because of the poor reception of Windows Vista, sales of newer PCs with newer versions of Windows declined because of the Great Recession and the effects of Vista, and deployments of new versions of Windows in enterprise environments require a large amount of planning, which includes testing applications for compatibility (especially those that are dependent on Internet Explorer 6, which is not compatible with newer versions of Windows). Major security software vendors (including Microsoft itself) planned to continue offering support and definitions for Windows XP past the end of support to varying extents, along with the developers of Google Chrome, Mozilla Firefox, and Opera web browsers; despite these measures, critics similarly argued that users should eventually migrate from XP to a supported platform. The United States' Computer Emergency Readiness Team released an alert in March 2014 advising users of the impending end of support, and informing them that using XP after April 8 may prevent them from meeting US government information security requirements.
Microsoft continued to provide Security Essentials virus definitions and updates for its Malicious Software Removal Tool (MSRT) for XP until July 14, 2015. As the end of extended support approached, Microsoft began to increasingly urge XP customers to migrate to newer versions such as Windows 7 or 8 in the interest of security, suggesting that attackers could reverse engineer security patches for newer versions of Windows and use them to target equivalent vulnerabilities in XP. Windows XP is remotely exploitable by numerous security holes that were discovered after Microsoft stopped supporting it.
Similarly, specialized devices that run XP, particularly medical devices, must have any revisions to their software—even security updates for the underlying operating system—approved by relevant regulators before they can be released. For this reason, manufacturers often did not allow any updates to devices' operating systems, leaving them open to security exploits and malware.
Despite the end of support for Windows XP, Microsoft has released three emergency security updates for the operating system to patch major security vulnerabilities:
A patch released in May 2014 to address recently discovered vulnerabilities in Internet Explorer 6 through 11 on all versions of Windows.
A patch released in May 2017 to address a vulnerability that was being leveraged by the WannaCry ransomware attack.
A patch released in May 2019 to address a critical code execution vulnerability in Remote Desktop Services which can be exploited in a similar way as the WannaCry vulnerability.
Researchers reported in August 2019 that Windows 10 users may be at risk for "critical" system compromise because of design flaws of hardware device drivers from multiple providers. In the same month, computer experts reported that the BlueKeep security vulnerability, , that potentially affects older unpatched Microsoft Windows versions via the program's Remote Desktop Protocol, allowing for the possibility of remote code execution, may now include related flaws, collectively named DejaBlue, affecting newer Windows versions (i.e., Windows 7 and all recent versions) as well. In addition, experts reported a Microsoft security vulnerability, , based on legacy code involving Microsoft CTF and ctfmon (ctfmon.exe), that affects all Windows versions from the older Windows XP version to the most recent Windows 10 versions; a patch to correct the flaw is currently available.
Microsoft announced in July 2019 that the Microsoft Internet Games services on Windows XP and Windows Me would end on July 31, 2019 (and for Windows 7 on January 22, 2020). Others, such as Steam, had done the same, ending support for Windows XP and Windows Vista in January 2019.
In 2020, Microsoft announced that it would disable the Windows Update service for SHA-1 endpoints; since Windows XP did not get an update for SHA-2, Windows Update Services are no longer available on the OS as of late July 2020. However, as of October 2021, the old updates for Windows XP are still available on the Microsoft Update Catalog.
Reception
On release, Windows XP received critical acclaim. CNET described the operating system as being "worth the hype", considering the new interface to be "spiffier" and more intuitive than previous versions, but feeling that it may "annoy" experienced users with its "hand-holding". XP's expanded multimedia support and CD burning functionality were also noted, along with its streamlined networking tools. The performance improvements of XP in comparison to 2000 and Me were also praised, along with its increased number of built-in device drivers in comparison to 2000. The software compatibility tools were also praised, although it was noted that some programs, particularly older MS-DOS software, may not work correctly on XP because of its differing architecture. They panned Windows XP's new licensing model and product activation system, considering it to be a "slightly annoying roadblock", but acknowledged Microsoft's intent for the changes. PC Magazine provided similar praise, although noting that a number of its online features were designed to promote Microsoft-owned services, and that aside from quicker boot times, XP's overall performance showed little difference over Windows 2000. Windows XP's default theme, Luna, was criticized by some users for its childish look.
Despite extended support for Windows XP ending in 2014, many users – including some enterprises – were reluctant to move away from an operating system they viewed as a stable known quantity despite the many security and functionality improvements in subsequent releases of Windows. Windows XP's longevity was viewed as testament to its stability and Microsoft's successful attempts to keep it up to date, but also as an indictment of its direct successor's perceived failings.
Market share
According to web analytics data generated by Net Applications, Windows XP was the most widely used operating system until August 2012, when Windows 7 overtook it (later overtaken by Windows 10), while StatCounter indicates it happening almost a year earlier. In January 2014, Net Applications reported a market share of 29.23% of "desktop operating systems" for XP (when XP was introduced there was not a separate mobile category to track), while W3Schools reported a share of 11.0%.
, in most regions or continents, Windows XP market share on PCs, as a fraction of the total Windows share, has gone below 1% (1.72% in Africa, where it was previously at 0.8%). XP still has a double-digit market share in a few countries, such as Armenia at over 50%, at 57%, where Windows 7 was highest ranked, and with it being replaced by Windows 10, Windows XP got highest ranked for the longest time, and had over 60% share on some weekends in summer of 2019.
Source code leak
On September 23, 2020, source code for Windows XP with Service Pack 1 and Windows Server 2003 was leaked onto the imageboard 4chan by an unknown user. Anonymous users managed to compile the code, as well as a Twitter user who posted videos of the process on YouTube proving that the code was genuine. The videos were later removed on copyright grounds by Microsoft. The leak was incomplete as it was missing the Winlogon source code and some other components. The original leak itself was spread using magnet links and torrent files whose payload originally included Server 2003 and XP source code and which was later updated with additional files, among which were previous leaks of Microsoft products, its patents, media about conspiracy theories on Bill Gates by anti-vaccination movements and an assortment of PDF files on different topics.
Microsoft issued a statement stating that it was investigating the leaks.
See also
BlueKeep (security vulnerability)
Comparison of operating systems
History of operating systems
List of operating systems
References
Further reading
External links
Windows XP End of Support
Security Update for Windows XP SP3 (KB4012598)
2001 software
Products and services discontinued in 2014
XP
IA-32 operating systems
Obsolete technologies |
4811889 | https://en.wikipedia.org/wiki/Free%20University%20of%20Bozen-Bolzano | Free University of Bozen-Bolzano | The Free University of Bozen-Bolzano (Italian: Libera Università di Bolzano, German: Freie Universität Bozen, Ladin: Università Liedia de Bulsan) is a university primarily located in Bolzano, South Tyrol, Italy. It was founded on 31 October 1997 and is organized into five Faculties.
The Free University of Bozen-Bolzano (unibz) aims to offer students a multilingual, practice-oriented education that meets the demands of the local and the European labor market. Lectures and seminars are held in Italian, German and English. The only exception is the Faculty of Education, which offers Italian, German and Ladin speaking students separate training sections. The university offers study programmes ranging from bachelor's degrees to doctorates.
The emphasis of teaching is to provide theoretically sound and practice-orientated training. A large proportion of educational activities take place as seminars, lectures given by guest speakers, practical training and workshops. Within the framework of the academic exchange program students are encouraged to spend one or more semesters at universities abroad.
Campus
The university has three campuses: at Bolzano, Brixen and Bruneck. The buildings in Bolzano were designed by the architects Matthias Bischoff and Roberto Azzola of Zürich and those at Brixen by Regina Kohlmeyer and Jens Oberst from Stuttgart. The latter won in 2005 the 9th architecture prize of the city of Oderzo.
Rectors
The rectors of the university have been Alfred Steinherr, an economist from Luxembourg, from 1998 to 2003, the Swiss linguist Rita Franceschini, from 2004 to 2008, and the German sociologist Walter Lorenz, from 2008 to 2016. The Italian engineer Paolo Lugli is the actual rector since 2017.
Faculty of Economics and Management
The Faculty of Economics and Management is based at Bolzano and Bruneck. It offers three bachelor's and three master's degree programs.
Bachelor in Economics and Management
Bachelor in Economics and Social Sciences PPE (Philosophy, Politics and Economics)
Bachelor in Tourism, Sport and Event Management (in Bruneck)
Master in Entrepreneurship and Innovation
Master in Economics and Management of the Public Sector
Master in Accounting and Finance
PhD in Management and Economics
The research clusters of the faculty are:
Tourism, Marketing and Regional Development
Law, Economics and Institutions
Financial Markets and Regulations
Entrepreneurship and Innovation
Quantitative Methods and Economic Modelling
Faculty of Education
The Faculty of Education is in Brixen and the following courses are active:
Bachelor in Social Work
Bachelor for Social Education
Bachelor in Communication Sciences and Culture
Master in Primary Education (5 years)
Master in Innovation and Research for Social Work and Social Education (IRIS)
Master in Musicology
PhD in General Pedagogy, Social Pedagogy and General Education
Main research areas at the faculty are:
Educational and development projects and processes for different age groups and contexts
Social dynamics, social cohesion, citizenship and solidarity systems
Languages and communication for a multicultural and multilingual society
Faculty of Computer Science
The Faculty of Computer Science is based in Bolzano and has the following courses:
Bachelor in Computer Science
Bachelor in Informatics and Management of Digital Business
Master in Software Engineering for Information Systems
Master in Computational Data Science
PhD in Computer Science
The faculty's research centres are:
Research Centre for Information and Database Systems Engineering (IDSE)
Research Centre for Knowledge and Data (KRDB)
Research Centre for Software and Systems Engineering (SwSE)
Faculty of Science and Technology
The Faculty of Science and Technology has the following active courses:
Bachelor in Agricultural and Agro-Environmental Sciences
Bachelor in Industrial and Mechanical Engineering
Bachelor in Wood Engineering
Master in Industrial Mechanical Engineering
Master in Energy Engineering
Master in Environmental Management of Mountain Areas
International Master in Horticulture Science
Master in Viticulture, Enology and Wine Marketing
PhD in Mountain Environment and Agriculture
PhD in Sustainable Energy and Technologies
Food Engineering and Biotechnology
The main research areas of the faculty are:
Agricultural Sciences
Energy Resources and Energy Efficiency
Food Sciences
Fundamental Sciences for Innovative Applications
Management and Technologies for Mountain Environments
Industrial Engineering and Automation
Faculty of Design and Art
The Faculty of Design and Art offers the following courses:
Bachelor in Design and Art - Major in Design
Bachelor in Design and Art - Major in Art
Master in Eco-Social Design
1st Level Master in Design for Children
The main research areas of the faculty are:
Visual culture and its impact on society
Phenomena, processes and results of three-dimensional projects
Theories, forms and languages of design, art and visual culture
The faculty also operates a fab lab named Bitz, which is also open to users not affiliated with unibz.
European Master Programmes
The Faculty of Computer Science at the Free University of Bozen-Bolzano is very active in this way and is amongst the research centers recognized by the European Union as a leader in this program. There are two European Master Programmes in the area of computer science running in this university, under Erasmus Mundus Programme:
European Master Program in Computational Logic
European Master on Software Engineering
Studium Generale
Since 2011, there has been a multidisciplinary Studium Generale course, which offers a wide range of lectures in fields of general interest.
Research
A total of 917 projects of basic and applied research have been conducted within the university since 1998.
The university has scientific and technological laboratories at each of its sites, at the NOI Techpark, a local technological and innovation hub, and at the Versuchszentrum Laimburg, an agronomy research institute.
Library
According to library ranking system issued by German library networks (BIX project) in 2009, this university has the second best library amongst German-speaking states (Germany, Switzerland, Austria and South Tyrol in Italy).
Students activities
The members of the student advisory board are elected every two years, however, between two elections a petition for the representative could be announced. Student representative are members of the University Council, the Academic Senate, the Faculty Council, the Course Council, the Equal Opportunities Committee and the Didactic Joint Committee.
The South Tyrolean Student association is the most important South Tyrolean association for students. Beside the head office in Bolzano there are seven branch offices in Austria and Italy. The sh.asus was founded in 1955 as a non-profit association. It represents South Tyrolean students studying abroad and students in South Tyrol.
The M.U.A., Movimento Universitario Altoatesino, is an association which has been recognize by the Autonomous Province of Bozen-Bolzano and has been founded in the 1993. Its principal purposes are "to defend and ease the right to study of the students and the working students of the university" and "to organize conferences, debatings, conventions, cultural, social and university seminar". The association operates in Bolzano and promotes the project WEBZ, "the first web-tv of South-Tyrol made by youngs for youngs."
Kikero is a cultural association, which has been founded in 2000 and organizes activities such as the debating club and the movie nights. Furthermore, Kikero is also responsible for the university magazine "Kflyer".
SCUB, Sports Club University Bozen-Bolzano, is the students' association that mainly deals with sports activities and that organizes every year the SNOWDAYS, Europe's biggest wintersport event for students from all over Italy and the EU. SCUB comprises also the UniParty team, which is in charge of throwing university parties for unibz students.
A further student association is the Bozen – Bolzano local committee AIESEC, which organizes international exchange programmes to permit university students to get in touch with the working world.
PRO – Students for Business also encourages students to connect with the working environment through the enhancement of economic and business activities.
The university also has a choir called UnibzVoices, conducted by Prof. Johann Van der Sandt who teaches "Music and Communication" at the Brixen College of Education.
The most recent student association is the Alumni Club that comprises graduates of the Free University of Bozen–Bolzano.
Bibliography
Hans Karl Peterlini & Hannes Obermair (eds), Universitas Est. Essays and documents on the history of education in Tyrol/South-Tyrol, 2 Vol. (Bozen-Bolzano University Press, Raetia Verlag, Bozen/Bolzano 2008),
Klaus Kempf, Franz Berger, The Library as a Service Point. The Case of the Bozen University Library: Planning, Building, Financing, in "Liber Quarterly", 10, 2000, pp. 108–116. (Download PDF 52 KB)
Universitätsreden an der Freien Universität Bozen / Discorsi d'ateneo alla Libera Università di Bolzano / Public Talks at the Free University of Bozen, 6 voll., Bolzano, Bozen-Bolzano University Press, 2005-ss. ISBN (ISSN) 2494716-7
List of universities in Italy
See also
Library of the Free University of Bozen-Bolzano
References
External links
The official website of the unibz
The faculty of design's student blog
The library of the Free University of Bozen-Bolzano
Pagina dello Sports Club Universitario
Free University of Bozen-Bolzano
Bolzano
Educational institutions established in 1997
Education in South Tyrol
1997 establishments in Italy |
56746492 | https://en.wikipedia.org/wiki/Arun%20Jain | Arun Jain | Arun Jain (born 30 December 1959) is a Chennai-based Indian industrialist, investor and philanthropist. He is the chairman and managing director of Intellect Design Arena Limited, an IT software products company in the banking, financial services and insurance space which is listed in the National Stock Exchange as Intellect. He was also the founder, Chairman and CEO of Polaris Consulting and Services Ltd. (formerly known as Polaris Software Labs), an IT services company. On 4 March 2016, Virtusa Corporation acquired a majority stake in Polaris Consulting & Services Limited.
Arun has also been appointed the Chief Mentor of the Centre of Excellence for FinTech set up by Ministry of Electronics & Information Technology (MeitY), Govt. of India, Member of National Software Product Mission, strategic forum for implementation of National Policy on Software Products 2019 constituted by MeitY. He is a Governing Council Member of STPI and also a Member in the Advisory Council of TechNest, an incubation facility provided by STPI-Chennai. He has held, and continues to hold, positions in CII, MMA, National Institute of Electronics and Information Technology (NIELIT) and the Indo-American Chamber of Commerce.
Career
After his graduation, Arun interned with Wang Laboratories.
After his internship, Arun, along with some friends started International Information Systems (IIS) in 1983 as a partnership firm. In 1986, IIS was renamed Nucleus Software Workshop Pvt. Ltd. At a professional level, his first major enterprise was the establishment of the Nucleus Software Workshop in 1986.
In 1993, he founded Polaris Software Lab with an initial capital of $250, which recorded a CAGR of over 100% during the seven-year period 1993–2000. Intellect Design Arena Ltd. is his fourth venture.
Personal life
Arun was born in a middle-class family of nine siblings (eight sisters and an elder brother). His father was an Accounts officer in the Govt. of India's Postal & Telegraph (P&T) department. He completed his bachelor's degree in Electrical Engineering from Delhi College of Engineering (now known as Delhi Technological University).
Ullas Trust: Encouraging Academic Excellence
Ullas Trust was started in 1997 by Arun Jain, with an aim to integrate associates of Polaris, and later Intellect, with the larger community and enable them to enjoy the satisfaction of working with young minds in the country. The Trust is a joint initiative of the employees and the organisation.
Awards and recognition
Lifetime Achievement Award by the Confederation of Indian Industry (CII) at India's premier ICT Event, Connect 2016.
Visionary of India 2014–15 Award, at the Brand Vision India 2020 Summit & Awards.
Indo-ASEAN Business Initiative Award 2008 from the then Indian High Commissioner and currently India's External Affairs Minister, Dr. S. Jaishankar, at the ’Zak Salaam India’ expo in Singapore.
ICICI Venture-CII Connect 2006 Awards along with Mr. Shiv Nadar, founder of HCL Technologies and Mr. Kumar Mahadeva, founder of Cognizant Technology Systems.
Business Mentor Award 2019 – Vikatan Group.
Dronacharya Award – TiECON Chennai – 2019.
For the Sake of Honour Award – by Rotary – 2019.
Lifetime Achievement Award at the 4th edition of the Design Thinking Conclave & Awards 2018.
References/Notes and references
External links
Intellect Design Arena
Ullas Trust
1959 births
Living people
Delhi Technological University alumni
Indian industrialists
Indian investors
Indian philanthropists
Businesspeople in software
Indian Wikimedians
Chennai |
140456 | https://en.wikipedia.org/wiki/Micro%20Channel%20architecture | Micro Channel architecture | Micro Channel architecture, or the Micro Channel bus, was a proprietary 16- or 32-bit parallel computer bus introduced by IBM in 1987 which was used on PS/2 and other computers until the mid-1990s. Its name is commonly abbreviated as "MCA", although not by IBM. In IBM products, it superseded the ISA bus and was itself subsequently superseded by the PCI bus architecture.
Background
The development of Micro Channel was driven by both technical and business pressures.
Technology
The IBM AT bus, which later became known as the Industry Standard Architecture (ISA) bus, had a number of technical design limitations, including:
A slow bus speed.
A limited number of interrupts, fixed in hardware.
A limited number of I/O device addresses, also fixed in hardware.
Hardwired and complex configuration with no conflict resolution.
Deep links to the architecture of the 80x86 chip family
In addition, it suffered from other problems:
Poor grounding and power distribution.
Undocumented bus interface standards that varied between systems and manufacturers.
These limitations became more serious as the range of tasks and peripherals, and the number of manufacturers for IBM PC-compatibles, grew. IBM was already investigating the use of RISC processors in desktop machines, and could, in theory, save considerable money if a single well-documented bus could be used across their entire computer lineup.
Market share
It was thought that by creating a new standard, IBM would regain control of standards via the required licensing. As patents can take three years or more to be granted, however, only those relating to ISA could be licensed when Micro Channel was announced. Patents on important Micro Channel features, such as Plug and Play automatic configuration, were not granted to IBM until after PCI had replaced Micro Channel in the marketplace. The overall reception was tepid and the impact of Micro Channel in the worldwide PC market was minor.
Design
The Micro Channel architecture was designed by engineer Chet Heath. A lot of the Micro Channel cards that were developed used the CHIPS P82C612 MCA interface controller; allowing MCA implementations to become a lot easier.
Overview
The Micro Channel was primarily a 32-bit bus, but the system also supported a 16-bit mode designed to lower the cost of connectors and logic in Intel-based machines like the IBM PS/2.
The situation was never that simple, however, as both the 32-bit and 16-bit versions initially had a number of additional optional connectors for memory cards which resulted in a huge number of physically incompatible cards for bus attached memory. In time, memory moved to the CPU's local bus, thereby eliminating the problem. On the upside, signal quality was greatly improved as Micro Channel added ground and power pins and arranged the pins to minimize interference; a ground or a supply was thereby located within 3 pins of every signal.
Another connector extension was included for graphics cards. This extension was used for analog output from the video card, which was then routed through the system board to the system's own monitor output. The advantage of this was that Micro Channel system boards could have a basic VGA or MCGA graphics system on board, and higher-level graphics (XGA or other accelerator cards) could then share the same port. The add-on cards were then able to be free of 'legacy' VGA modes, making use of the on-board graphics system when needed, and allowing a single system board connector for graphics that could be upgraded.
Micro Channel cards also featured a unique, 16-bit software-readable ID, which formed the basis of an early plug and play system. The BIOS and/or OS can read IDs, compare against a list of known cards, and perform automatic system configuration to suit. This led to boot failures whereby an older BIOS would not recognize a newer card, causing an error at startup. In turn, this required IBM to release updated Reference Disks (The CMOS Setup Utility) on a regular basis. A fairly complete list of known IDs is available (see External links section). To accompany these reference disks were ADF files which were read by setup which in turn provided configuration information for the card. The ADF was a simple text file, containing information about the card's memory addressing and interrupts.
Although MCA cards cost nearly double the price of comparable non-MCA cards, the marketing stressed that it was simple for any user to upgrade or add more cards to their PC, thus saving the considerable expense of a technician. In this critical area, Micro Channel architecture's biggest advantage was also its greatest disadvantage, and one of the major reasons for its demise. To add a new card (video, printer, memory, network, modem, etc.) the user simply plugged in the MCA card and inserted a customized floppy disk (that came with the PC) to blend the new card into the original hardware automatically, rather than bringing in an expensively trained technician who could manually make all the needed changes. All choices for interrupts (an often perplexing problem) and other changes were accomplished automatically by the PC reading the old configuration from the floppy disk, which made necessary changes in software, then wrote the new configuration to the floppy disk. In practice, however, this meant that the user must keep that same floppy disk matched to that PC. For a small company with a few PCs, this was annoying, but practical. But for large organizations with hundreds or even thousands of PCs, permanently matching each PC with its own floppy disk was logistically unlikely or impossible. Without the original, updated floppy disk, no changes could be made to the PC's cards. After this experience repeated itself thousands of times, business leaders realized their dream scenario for upgrade simplicity did not work in the corporate world, and they sought a better process.
Data transmission
The basic data rate of the Micro Channel was increased from ISA's 8 MHz to 10 MHz. This may have been a modest increase in terms of clock rate, but the greater bus width, coupled with a dedicated bus controller that utilized burst mode transfers, meant that effective throughput was up to five times higher than ISA. For faster transfers the address bus could be reused for data, further increasing the effective width of the bus. While the 10 MHz rate allowed 40 MB/s of throughput at 32-bit width, later models of RS/6000 machines increased the data rate to 20 MHz, and the throughput to 80 MB/s. Some higher throughput functions of the Micro Channel bus were available to RS/6000 platform only, and were not initially supported on cards operating on an Intel platform.
With bus mastering, each card could talk to another directly. This allowed performance that was independent of the CPU. One potential drawback of multi-master design was the possible collisions when more than one card would try to bus master, but Micro Channel included an arbitration feature to correct for these situations, and also allowed a master to use a burst-mode. Micro Channel cards had complete control for up to 12 milliseconds. This was long enough to permit the maximum number of other devices on the bus to buffer inbound data from over-runnable devices like tape and communications.
Multiple bus-master support and improved arbitration mean that several such devices could coexist and share the system bus. Micro Channel bus-master-capable devices can even use the bus to talk directly to each other (peer to peer) at speeds faster than the system CPU, without any other system intervention. In theory, Micro Channel architecture systems could be expanded, like mainframes, with only the addition of intelligent masters, without periodic need to upgrade the central processor.
Arbitration enhancement ensures better system throughput since control is passed more efficiently. Advanced interrupt handling refers to the use of level-sensitive interrupts to handle system requests. Rather than a dedicated interrupt line, several lines can be shared to provide more possible interrupts, addressing the ISA-bus interrupt line conflict problems.
All interrupt request signals were "public" on Micro Channel architecture permitting any card on the bus to function as an I/O processor for direct service of I/O device interrupts. ISA had limited all such processing to just the system's CPU. Likewise, bus master request and grant signals were public, such that bus attached devices could monitor latency to control internal buffering for I/O processors. These features were not adopted for PCI, requiring all I/O support to come uniquely from the system board processor.
The final major Micro Channel architecture improvement was POS, the Programmable Option Select, which allowed all setup to take place in software. This feature is taken for granted now, but at the time setup was a huge chore for ISA systems. POS was a simple system that included device IDs in firmware, which the drivers in the computer were supposed to interpret. (This type of software-configuration system is known as plug and play today.) The feature did not really live up to its promise; the automatic configuration was fine when it worked, but it frequently did not - resulting in an unbootable computer - and resolving the problem by manual intervention was much more difficult than configuring an ISA system, not least because the documentation for the MCA device would tend to assume that the automatic configuration would work and so did not provide the necessary information to set it up by hand, unlike ISA device documentation which by necessity provided full details (however having to physically remove and check all IRQ settings, then find and set the new IRQ for a new device—if a suitable one was available—for ISA was no fun at all, and beyond many users... it is obvious why the attempt was made to move to software arbitrated configuration, and why this was to later succeed in the form of PnP.)
Reception
In November 1983 The Economist stated that the IBM PC standard's dominance of the personal computer market was not a problem because "it can help competition to flourish". The magazine predicted that
Micro Channel architecture was first introduced at the launch of the PS/2 range in 1987, with three out of four of the new machines featuring it. Its use in IBM spread to the RS/6000, AS/400, and eventually to the IBM 9370 systems - smallest members of the System/370 range.
IBM licensed the architecture to other companies for one to five percent of revenue. Tandy Corporation was the first to ship a Micro Channel-based computer, the 5000 MC, but company head John Roach said "I'm surprised anybody at all would want it"; Tandy only sold the computer, he said, because there was some demand for it. NCR Corporation adopted Micro Channel comprehensively - they designed and built high-performance personal computer, workstation and server platforms supporting it, including their own Micro Channel architecture-based logic componentry, including SCSI, graphics, networking, and audio. A small number of other manufacturers, including Apricot, Dell, Research Machines, and Olivetti adopted it, but only for part of their PC range.
Despite the fact that MCA was a huge technical improvement over ISA, it soon became clear that its introduction and marketing by IBM was poorly handled. IBM had strong patents on Micro Channel architecture system features, and required Micro Channel system manufacturers to pay a licence fee - and actively pursued patents to block third parties from selling unlicensed implementations of it. The PC clone market did not want to pay royalties to IBM in order to use this new technology, and stayed largely with the 16-bit AT bus, (embraced and renamed as ISA to avoid IBM's "AT" trademark) and manual configuration, although the VESA Local Bus (VLB) was briefly popular for Intel '486 machines.
For servers the technical limitations of the old ISA were too great, and, in late 1988, the "Gang of Nine", led by Compaq, announced a rival high-performance bus - Extended Industry Standard Architecture (EISA). This offered similar performance benefits to Micro Channel, but with the twin advantage of being able to accept older ISA boards and being free from IBM's control.
For several years EISA and Micro Channel battled it out in the server arena, but, in 1996, IBM effectively conceded defeat, when they themselves produced some EISA-bus servers. In 2001 IBM executive Robert Moffat said that of the company's mistakes in the PC market, "the most obvious one is Micro Channel".
Within a few years of its arrival in 1992, PCI had largely superseded Micro Channel, EISA, and VLB.
Cards
Expansion cards for the Micro Channel bus typically targeted high-end graphic workstation or server requirements, with SCSI, Token Ring, Ethernet, IBM 5250 and IBM 3270 connections.
Sound cards
Very few MCA sound cards were ever produced. Some examples include:
AdLib MCA Music Synthesizer Card
ChipChat Sound-16
ChipChat Sound-32
Creative Labs Sound Blaster MCV, SKU:CT5320
Creative Labs Sound Blaster Pro 2 MCV, SKU:CT5330
IBM Rexon/Tecmar M-ACPA, SKU: 95F1288, 34F2787
IBM Audiovation, SKU: 92G7463, 92G7464
IBM Ultimedia Audio Adapter 7-6, only compatible with RS/6000 systems, or PS/2 systems under NT with a special procedure
Reply SB16
Roland MPU-IMC
Piper Research SoundPiper 16
See also
Industry Standard Architecture (ISA)
Extended Industry Standard Architecture (EISA)
NuBus
Channel I/O
VESA Local Bus (VLB)
Peripheral Component Interconnect (PCI)
Accelerated Graphics Port (AGP)
PCI Express (PCIe)
List of device bit rates
Notes
References
External links
MCA Enthusiasts Page
Computer buses
X86 IBM personal computers
Proprietary hardware
Products introduced in 1987 |
24028613 | https://en.wikipedia.org/wiki/Laurie%20Thacker | Laurie Thacker | Lawrence "Laurie"/"Lawrie" William Thacker (19 or 20 March 1909 – 2 March 1952) was an English professional rugby league footballer who played in the 1930s and 1940s. He played at representative level for England, British Empire and Yorkshire, and at club level for Hull FC, as a , i.e. number 8 or 10, during the era of contested scrums.
Background
Laurie Thacker was born in Sculcoates, East Riding of Yorkshire, England and he died aged 42 in Driffield, East Riding of Yorkshire, England.
Playing career
International honours
Thacker represented British Empire while at Hull in 1937 against France, and won caps for England while at Hull in 1938 against France, and Wales, in 1939 against France, and in 1941 against Wales.
County Cup Final appearances
Thacker played left-, i.e. number 8, in Hull FC's 10-18 defeat by Huddersfield in the 1938 Yorkshire County Cup Final during the 1938–39 season at Odsal Stadium, Bradford on Saturday 22 October 1938.
Other notable matches
Thacker played left-, i.e. number 8 for a Rugby League XIII against Northern Command XIII at Thrum Hall, Halifax on Saturday 21 March 1942.
Genealogical information
Lawrence Thacker's marriage to Gladys (née Baines) was registered during second ¼ 1947 in Hull district. They had children; Diane L. Thacker (birth registered during fourth ¼ in Hull district), Roger W. Thacker (birth registered during fourth ¼ in Hull district), and Andrea Thacker (birth registered during second ¼ in Hull district).
References
External links
(archived by web.archive.org) Past Players → T at hullfc.com
(archived by web.archive.org) Statistics at hullfc.com
1909 births
1952 deaths
British Empire rugby league team players
England national rugby league team players
English rugby league players
Hull F.C. players
People from Sculcoates
Rugby league props
Rugby League XIII players
Rugby league players from Kingston upon Hull
Yorkshire rugby league team players |
56637698 | https://en.wikipedia.org/wiki/Jigsaw%20%28ransomware%29 | Jigsaw (ransomware) | Jigsaw is a form of encrypting ransomware malware created in 2016. It was initially titled "BitcoinBlackmailer" but later came to be known as Jigsaw due to featuring an image of Billy the Puppet from the Saw film franchise. The malware encrypts computer files and gradually deletes them unless a ransom is paid to decrypt the files.
History
Jigsaw was designed in April 2016 and released a week after creation. It was designed to be spread through malicious attachments in spam emails. Jigsaw is activated if a user downloads the malware programme which will encrypt all user files and master boot record. Following this, a popup featuring Billy the Puppet will appear with the ransom demand in the style of Saw's Jigsaw (one version including the "I want to play a game" line from the franchise) for Bitcoin in exchange for decrypting the files. If the ransom is not paid within one hour, one file will be deleted. Following this for each hour without a ransom payment, the amount of files deleted is exponentially increased each time from a few hundred to thousands of files until the computer is wiped after 72 hours. Any attempt to reboot the computer or terminate the process will result in 1,000 files being deleted. A further updated version also makes threats to dox the victim by revealing their personal information online.
Jigsaw activates purporting to be either Firefox or Dropbox in task manager. As the code for Jigsaw was written within the .NET Framework, it can be reverse engineered to remove the encryption without paying the ransom.
Reception
The Register wrote that "Using horror movie images and references to cause distress in the victim is a new low." In 2017, it was listed among 60 versions of ransomware that utilised evasive tactics in its activation.
References
2016 in computing
Ransomware
Saw (franchise) |
41496961 | https://en.wikipedia.org/wiki/PetSynth | PetSynth | PetSynth is an open-source music software for the Commodore PET computer, created in 2007 by Chiron Bramberger. It is noteworthy for being the only keyboard playable synthesizer for the Commodore PET that supports MIDI, stereo sound, and is released under a GPL license. It has been featured in print and web publications such as Return Magazin, TPUG Magazine, Commodore Free Magazine, Retrothing, and MatrixSynth.
History
Having been unable to find any software that allows the Commodore PET to be played like an instrument, and after having found similar software for other computers systems in his collection, such as the Apple II, Apple IIGS, Commodore VIC-20, and Commodore 64, creator Chiron Bramberger decided to create his own software. The first version of PetSynth was released in 2007. Since then, there have been several revisions, with the third version demonstrated at the TPUG World of Commodore in 2013.
Features
The original version of the software allowed a user to play on the keyboard layout as if it were a musical piano keyboard. It included several effects that allowed the player to change the sounds in interesting ways as they played. The third version, as of 2013, included support for a MIDI adapter, and a second voice feature never before realized. This allowed for stereo sound on a Commodore PET for the first time.
See also
List of music software
References
External links
http://www.petsynth.org/
Music software |
419111 | https://en.wikipedia.org/wiki/Casio%20Cassiopeia | Casio Cassiopeia | Casio Cassiopeia was the brand name of a PDA manufactured by Casio. It used Windows CE as the Operating system. Casio was one of the first manufacturers of PDAs, developing at the beginning small pocket-sized computers with keyboards and grayscale displays and subsequently moving to smaller units in response to customer demand.
Cassiopeia A-10, A-11 and A-11+
Operating system: Microsoft Windows CE 1.0 Handheld PC edition
Size: 175 mm x 92 mm x 26.5 mm :: 380 g
CPU: Hitachi SH-3 at 44 MHz
Memory: RAM 2 MB and ROM 4 MB
Display: FSTN LCD, 480 x 240 Pixel, 4 shades of gray
Interface: Serial and IrDA (ver. 1.0)
Expansion slot: PC card Type II
Battery: 2x AA, up to 20 hours of running time; CR2032 for memory protection
Input: Keyboard and Touch Screen
Extras: Speaker
1997 Feb
Cassiopeia A-20, A-21S, A-22T, A-23G
Operating system: Microsoft Windows CE 2.0 Handheld PC edition
Size: 185 mm x 94 mm x 24.5 mm :: 430 g
CPU: Hitachi SH3 at 80 MHz
Memory: RAM 8 MB and ROM 8 MB
Display: FSTN LCD, 640 x 240 Pixel, 4 shades of gray
Interface: Serial and IrDA (Infrared) (ver. 1.0)
Expansion slots: CompactFlash Type I and PC card Type II
Battery: 2x AA,(And rechargeable battery pack) up to 25 hours of running time; CR2032 for memory protection
Input: Keyboard and Touch Screen
Extras: Speaker, Microphone
1999 May
It was quickly discovered that most consumers wanted smaller devices, so the Palm-size PCs were developed. Japanese models of these units differ in both model number as well as appearance. The E-5x and/or E-5xx models are Japanese versions, colored blue instead of silver. The following versions were developed; A21-S for Student, A22-T for Teachers, A-23G for German with AZERTY keyboard, A-20F for French.
Cassiopeia A-50, A-51, A-55 and A-60
Operating system: Microsoft Windows CE 1.01 and 2.0 Handheld PC edition
Size: 185 mm x 94 mm x 24.5 mm
CPU: Hitachi SH3 at 80 MHz
Memory: RAM 4 or 8 MB and ROM 8 MB
Display: FSTN LCD, 480 x 240 Pixel, 4 shades of gray
Interface: Serial and IrDA (Infrared) (ver. 1.0)
Expansion slots: CompactFlash Type I and PC card Type II
Battery: 2x AA,(And rechargeable battery pack) up to 25 hours of running time; CR2032 for memory protection
Input: Keyboard and Touch Screen
Extras: Speaker, Microphone
Cassiopeia E-10
Operating system: Microsoft Windows CE 2.01 Palm-size PC edition
Size: 80 mm x 120 mm x 20 mm :: 184 g
CPU: NEC VR4111 MIPS at 69 MHz
Memory: RAM 4 MB and ROM 8 MB
Display: FSTN LCD, 240 x 320 Pixel, 4 shades of gray
Interface: Serial and IrDA (ver. 1.0)
Expansion slots: CompactFlash Type I and II
Battery 2x AAA, up to 25 hours of running time; CR2016 for memory protection
Input: Touch Screen, Microphone, 4 user-configurable buttons and a control pad
Extras: Speaker and Stereo 3.5 mm headphone jack
Cassiopeia E-11
Operating system: Microsoft Windows CE 2.01 Palm-size PC edition
Size: 80 mm x 120 mm x 20 mm :: 184 g
CPU: NEC VR4111 MIPS at 69 MHz
Memory: RAM 8 MB and ROM 8 MB
Display: FSTN LCD, 240 x 320 Pixel, 4 shades of gray
Interface: Serial and IrDA (ver. 1.0)
Expansion slots: CompactFlash Type I and II
Battery 2x AAA, up to 25 hours of running time; CR2016 for memory protection
Input: Touch Screen, Microphone, 4 user-configurable buttons and a control pad
Extras: Speaker and Stereo 3.5 mm headphone jack
1998 Sep
Cassiopeia E-15
The Cassiopeia E-15 was the last model of Palm-size PC introduced by Casio that used a grayscale display. It appeared at the same time as the E-105, and functioned identically to that device, except for the screen.
Operating system: Microsoft Windows CE 2.11 Palm-size PC edition
Size: 127 mm x 80 mm x 15.2 mm :: 190 g
CPU: NEC VR4111 MIPS at 69 MHz
Memory: RAM 16 MB and ROM 16 MB
Display: FSTN LCD, 240 x 320 Pixel, 16 shades of gray
Interface: Serial and IrDA (ver. 1.0)
Expansion slots: CompactFlash Type I and II
Battery 2x AAA rechargeable, up to 25 hours of running time; CR2032 for memory protection
Input: Touch Screen, Microphone, 3 user-configurable buttons, a control pad
Extras: Speaker and Stereo 3.5 mm headphone jack
Cassiopeia E-100
The first Palm-size PC model by Casio to have a color screen, the E-100 was outwardly identical to the E-15.
Operating system: Microsoft Windows CE 2.11 Palm-size PC edition
Size: 81.2 mm x 132 mm x 20.1 mm :: 255 g
CPU: NEC VR4121 MIPS at 131 MHz
Memory: RAM 16 MB and ROM 16 MB
Display: HAST LCD, 240 x 320 Pixel, 65536 colors
Interface: Serial and IrDA (ver. 1.0)
Expansion slots: CompactFlash Type I and II
Battery: Li-Ion rechargeable, up to 6 hours of running time; CR2032 for memory protection
Input: Touch Screen, Microphone, 3 user-configurable buttons, a control pad.
Extras: Speaker and Stereo 3.5 mm headphone jack
Cassiopeia E-105
Operating system: Microsoft Windows CE 2.11 Palm-size PC edition
Size: 81.2 mm x 132 mm x 20.1 mm :: 255 g
CPU: NEC VR4121 MIPS at 131 MHz
Memory: RAM 32 MB and ROM 16 MB
Display: HAST LCD, 240 x 320 Pixel, 65536 colors
Interface: Serial and IrDA (ver. 1.0)
Expansion slots: CompactFlash Type I and II
Battery: Li-Ion rechargeable, up to 6 hours of running time; CR2032 for memory protection
Input: Touch Screen, Microphone, 3 user-configurable buttons, a control pad.
Extras: Speaker and Stereo 3.5 mm headphone jack
Cassiopeia E-115
Operating system: Microsoft Windows CE 3.0 PocketPC edition
Size: 81.2 mm x 132 mm x 20.1 mm :: 256 g
CPU: NEC VR4121 MIPS at 131 MHz
Memory: RAM 32 MB and ROM 16 MB
Display: HAST LCD, 240 x 320 Pixel, 65536 colors
Interface: Serial and IrDA (ver. 1.2)
Expansion slots: CompactFlash Type I and II
Battery: Li-Ion rechargeable, up to 6 hours of running time; CR2032 for memory protection
Input: Touch Screen, Microphone, 3 user-configurable buttons, a control pad.
Extras: Speaker and Stereo 3.5 mm headphone jack
Casio always advertised the fact that their devices could be updated. Casio decided it would not issue an update for the E-100 and E-105, and a lot of owners of the devices complained. Because of the complaints, Casio offered to update the devices to the newest version of the Operating system if the owners sent in the device and paid a fee. Since the operating system was stored in ROM and not flash memory, the only way to upgrade was by replacing the ROM.
Cassiopeia E-125
Operating system: Microsoft Windows CE 3.0 PocketPC edition
Size: 81.2 mm x 132 mm x 20.1 mm :: 256 g
CPU: NEC VR4122 MIPS at 150 MHz
Memory: RAM 32 MB and ROM 16 MB
Display: HAST LCD, 240 x 320 Pixel, 65536 colors
Interface: Serial/USB and IrDA (ver. 1.2)
Expansion slots: CompactFlash Type I and II
Battery: Li-Ion rechargeable, up to 6 hours of running time; CR2032 for memory protection
Input: Touch Screen, Microphone, 3 user-configurable buttons, a control pad.
Extras: Speaker and Stereo 3.5 mm headphone jack
After using the MIPS processor in the E-15 and the E-1xx series devices, the E-200 switched over to the StrongARM CPU, in keeping with Microsoft's specifications.
Cassiopeia E-200
Operating system: Microsoft PocketPC 2002
Size: 82 mm x 130 mm x 17.5 mm :: 190 g
CPU: Intel StrongARM 1110 at 206 MHz
Memory: RAM 64 MB and ROM 32 MB
Display: TFT, 240 x 320 Pixel, 65536 colors
Interface: Serial/USB and IrDA (ver. 1.2)
Expansion slots: SD-Card (MultiMediaCard) and CompactFlash Type I and II as well as PC card via an extension module
Battery: Li-Ion rechargeable, up to 12 hours of running time CR2032 for memory protection
Input: Touch Screen, Microphone, 3 user-configurable buttons, a control pad.
Extras: Speaker and Stereo 3.5mm headphone jack
2001 Dec
Successors of the Cassiopeia E-200
After experiencing difficulties in the market following the release of the E-200, Casio decided not to produce any further units for the US and European markets, instead focusing on the Japanese market. Some Japanese-only models are the Cassiopeia E-3000, using the PocketPC 2002 operating system, and the DT-10 with Windows Mobile 2003.
Other Models
C120/C140/C120+ are Compaq-branded equivalents to the Cassiopeia A-10/A-11/A-10+.
E-55 Japanese version of the E-15
E-707 Japanese model with wireless/phone antenna and both SD and CF card slots.
E-5xx Japanese versions of the E-1xx models.
EM-500 USA model, slightly smaller than the USA E-1xx with 16MB RAM and came in multiple colors.
E-700 Japanese version of the EM-500, but with 32MB RAM and came in many additional colors like white, carbon, silver.
E-750 Japanese successor to the E-1xx series with 32MB RAM and a 200 MHz MIPS CPU.
E-3000/3100 Later Japanese model with 400 MHz XSCALE CPU and CF + SD card slots. 3000/3100 ran PPC/CE.NET respectively.
SX-45 designed in cooperation with Siemens, this is a Cellphone integrated with an E-125.
BE-300 Pocket Manager (not a Pocket PC) running on Windows CE 3.0 with a Casio-designed user interface. Released in 2001.
PA-2400W (SH3 80 MHz, 8 MB RAM, 16 MB ROM, 480 x 240 4-level grayscale touchscreen, Windows CE 2.11)
IT-10 M20 from 2005 Rugged (IP54 Rated) Windows Mobile 2003/2 416MHz Intel PXA270 (800 MIPS at 624 MHz) 64MB RAM, 64MB ROM 3.7" VGA Transflective (640 x 480 TFT, 65536 colours) screen with 2,300 mAh Lithium Ion battery (up to 27 hours use) & CompactFlash and SDIO slots
References
External links
http://www.casio-europe.com
https://web.archive.org/web/20070318005113/http://casio.jp/cassiopeia/
Casio personal digital assistants
Personal digital assistants
Windows CE devices
Windows Mobile Classic devices
Windows Mobile Professional devices |
40186132 | https://en.wikipedia.org/wiki/Bristol%20Packet%20Boat%20Trips | Bristol Packet Boat Trips | Bristol Packet Boat Trips is a limited company offering public and charter excursions in Bristol Harbour and on the River Avon. The company has four boats: the river launch Tower Belle, narrowboat Redshank, glass-topped Bagheera and locally built Flower of Bristol. The company also has an interest in Bristol Hydrogen Boats which has commissioned and built a hydrogen powered ferry boat.
History
The Bristol Packet was founded in 1973 by Nick and Corrina Gray. At that time there were no passenger boats operating in the city docks or on the river Avon, the last services had been offered by the Kingstonian in the 1960s. The docks were semi-derelict and there were few visitors. Trips were initially offered around the docks on the narrowboat Redshank, which along with her accompanying butty Greenshank, had been brought from the Midlands by the Grays. Nick offered "interesting, anecdotal commentaries which added some depth and interest to the trips", according to the Bristol Post.
In 1976 the river launch Tower Belle was brought to Bristol enabling trips upstream to Hanham and downstream to the Avon Gorge. Avon Gorge trips had not been available to the public since the demise of P & A Campbells in the 1970s. The Grays eventually sold the company in 1980. Tickets for boat trips were sold from a 1910 showman's wagon at Wapping Wharf.
In 1995, The Bristol Packet commenced operations on the Flower of Bristol, enabling a further extension of the evening charter business. The most recent addition, in 2002, to the company's fleet was Amsterdam built sightseeing boat Bagheera.
Boats
Redshank
Redshank is a traditional English narrowboat, built in 1936 by W. J. Yarwood & Sons in Northwich, Cheshire. The original name was Reading and she was operated by the Grand Union Canal Carrying Company. In the 1950s, she was acquired by the Willow Wren Canal Carrying Company, who renamed her as Redshank.
Tower Belle
Tower Belle started life as a river launch named the Wincomblee on the Tyne, built in 1920 by Armstrong Whitworth. After the Second World War, she worked on the Thames, before she was brought to Bristol in 1976.
Flower of Bristol
Flower of Bristol was built by Abels Shipbuilders in the Albion Dockyard, Bristol in 1980 for Avon River Cruises, and was acquired by the Bristol Packet in the late 1995.
Bagheera
Bagheera is a glass-topped tourist boat, built in Amsterdam in 1973. She was acquired from a company in Ghent, Belgium that offered canal cruises to Antwerp Zoo. She had also worked previously in Switzerland and the Netherlands.
Bristol Hydrogen Boats
Bristol Hydrogen Boats is a consortium of three companies: Number Seven Boat Trips, Auriga Energy and the Bristol Packet. With aid of a grant of £250,000 from Bristol City Council, they have built a hydrogen powered ferry boat, named Hydrogenesis. This started operations in the spring of 2013 and is claimed to be "Britain's first hydrogen-powered ferry". It operated as a public ferry for 6 months, but fuel was expensive, and the boat was transferred to Bristol Packet for private hire.
References
External links
Bristol Packet Boat Trips
Bristol Hydrogen Boats
Transport in Bristol
Tourist attractions in Bristol
Bristol Harbourside
Ferry transport in England
Ferry companies of England |
26861471 | https://en.wikipedia.org/wiki/GQM%2BStrategies | GQM+Strategies | GQM+Strategies is a method that provides concepts and actionable steps for creating the link between goals and strategies across an organization and allows for measurement-based decision-making. It was developed by Victor Basili, Jens Heidrich, Mikael Lindvall, Jürgen Münch, Myrna Regardie, Carolyn B. Seaman, and Adam Trendowicz. The method was originally developed for organizations having a strong focus on IT and the development of software systems, but the method's popularity has grown to other domains and can be applied to any organization. The book Aligning Organizations through Measurement gives a comprehensive overview of the method, provides actionable guidance, case studies, and practical applications.
Background
In today's competitive markets organizational survival and growth requires effective means of aligning the large variety of organizational goals and strategies to achieve business objectives. Effective alignment helps all parts of the organization move in the same direction. Determining the impact of business goals and strategies is crucial for effective decision making within a company. Different goals and strategies exist at different levels of an organization (e.g., on the management level, the department level, the project level). In practice, these goals and strategies are often not aligned and their success or failure is often determined as a gut feeling. For instance, in a software organization, engineers are frequently faced with apparently unrealistic goals related to software development. There is rarely a discussion of trade-offs or other options for such decisions in order to avoid deviations of budget and schedule. Goals and strategies need to be defined explicitly and derived from high-level business goals in a systematic and transparent way. Moreover, underlying assumptions and environmental factors are often not documented, which makes it hard to determine the reasons for failed strategies. Furthermore, if measurement data is collected on the project level, it is often unclear how the activities performed there and the data collected contribute to higher-level goals of the organization. Moreover, building an effective measurement program is a challenging task in itself. It involves observation, experience facilitation, collaboration, decision making, analysis, and synthesis regarding goals, context factors, and assumptions. Furthermore, it assumes an organizational structure that sustains the process and learns.
Idea
The major output of applying the GQM+Strategies approach is the so-called GQM+Strategies grid. The grid specifies goals and strategies across all levels of an organization including the measurement program needed to monitor and control them. The underlying meta-model allows multiple goal levels and permits deriving multiple strategies for each of these goal levels. A goal may be realized by a set of strategies, which may in turn lead to a sequence of goals. Selection and adaptation of predefined goals and strategies as well as definition of new goals and strategies is driven by so-called context factors and assumptions. Context factors are environmental variables that represent the organizational environment and affect the kind of models and data that can be used (e.g., the type of business, the market of an organization). Assumptions are estimated unknowns that can affect the interpretation of the data (e.g., improving customer satisfaction will increase sales). The entire GQM+Strategies model provides an organization with a mechanism not only for defining measurement consistent with larger, upper-level organizational concerns, but also for interpreting and rolling up the resulting measurement data at each level. At each goal level, measurement plans are defined in order to measure the achievement of the defined goal in combination with the chosen strategy though GQM.
The GQM+Strategies application process supports building a grid in different ways depending on whether you want to start from the top level, from the bottom level, or from somewhere in the middle of an organization. In consequence the approach addresses relevant stakeholders throughout different organizational levels.
Benefits
The GQM+Strategies method makes high-level goals, strategies, and related measurement goals explicit across all levels of an organization. The entire method provides an organization with a mechanism for defining software measurement addressing larger, upper-level organizational concerns and for interpreting and rolling up the resulting measurement data at each level. GQM+Strategies has numerous benefits such as the effective use of resources and rapid and focused improvement. It enables an organization to consistently align goals and strategies across different units, enable measurement-based decision making, transparently communicating goals and strategies within the organization, and objectively monitoring goal attainment and the success/failure of defined strategies. The approach works as an integrator for existing measurement approaches in an organization.
Experiences and Practical Applications
GQM+Strategies is typically used to link strategies with their impacts on goals and to identify existing gaps in aligning goals and strategies. Experiences from case studies in industry and evaluations of the method have been reported in literature, e.g., experiences from applying GQM+Strategies at Elektrobit and an evaluation with respect to the effects of GQM+Strategies on organizational alignment.
Current research evaluated the approach utilizing revised Bloom's taxonomy as a framework for assessing the practitioners’ cognition level of the concepts. Recent research also applied the GQM+Strategies approach to the IT Services domain.
The evaluation showed that the method has practical value and addresses current real-world problems. The approach has been applied in different industrial settings and different domains so far reaching from telecommunication, automotive, and aerospace to classical information system. Most of the case studies were focusing on setting up a grid. As organizational goals and strategies change, the grid needs to be adapted accordingly and needs to be deployed to organization in a controlled manner. Therefore, future work addresses deployment and maintenance aspects of the approach.
Other Approaches
Several approaches to (software) measurement have been developed using different mechanisms for guiding the choice of data to be collected and analyzed:
The GQM approach provides a method for defining goals, refining them into questions and finally data to be collected, and then analyzing and interpreting them. Several instruments and tools are available for visualizing the GQM model (e.g., as an abstraction sheet or a GQM tree).
Balanced Scorecard (BSC) links strategic objectives and measures. The typical visualization consists of four perspectives: financial, customer, internal business processes, and learning and growth. Strategy maps are used to link strategies associated with those perspectives.
Practical Software Measurement (PSM) offers detailed guidance on software measurement. Tree-like structures are used to link issues, measurement categories, and measures.
Becker and Bostelman address the misalignment between strategy at the organizational level and the project level of software organizations. They focus on two causes of misalignment: (1) project data that does not address organizational goals and (2) organizational goals that are not operationalized through processes and metrics at the project level. The authors propose a common measurement framework to support the alignment of organizational and project-level goals. Their approach is to embed a GQM structure within each of the four BSC perspectives.
The M3P – Model, Measure, Manage Paradigm – is an extension of the QIP and GQM presented by Offen and Jeffery. Similar to Becker and Bostelman's approach, M3P embeds GQM as a measurement definition technique within a larger framework that encompasses higher-level organizational concerns.
COBIT and ITIL are approaches from the IT governance/service domain and offer connections between sets of goals and attributes of the IT infrastructure. COBIT uses a fixed linkage structure between outcome measures and performance indicators on the business, IT, process, and activity levels. Although these approaches recognize the need to link organizational goals and measures, they do not support building up a comprehensive grid of goals and strategies at different levels of the organization that are linked explicitly.
References
Software metrics |
51252358 | https://en.wikipedia.org/wiki/Onshape | Onshape | Onshape is a computer-aided design (CAD) software system, delivered over the Internet via a software as a service (SAAS) model. It makes extensive use of cloud computing, with compute-intensive processing and rendering performed on Internet-based servers, and users are able to interact with the system via a web browser or the iOS and Android apps.
Onshape allows teams to collaborate on a single shared design, the same way multiple writers can work together editing a shared document via cloud services. It is primarily focused on mechanical CAD (MCAD) and is used for product and machinery design across many industries, including consumer electronics, mechanical machinery, medical devices, 3D printing, machine parts, and industrial equipment.
Onshape upgrades are released directly to the web interface, and the software does not require maintenance work from the user.
Company history
Onshape was developed by a company with the same name. Founded in 2012, Onshape was based in Cambridge, Massachusetts (USA), with offices in Singapore and Pune, India. Its leadership team includes several engineers and executives who originated SolidWorks, a popular 3D CAD program that runs on Microsoft Windows. Onshape’s co-founders include two former SolidWorks CEOs, Jon Hirschtick and John McEleney.
In November 2012, former SolidWorks CEOs Jon Hirschtick and John McEleney led six co-founders launching Belmont Technology, a placeholder name that was later changed to Onshape. The company’s first round of funding was $9 million from North Bridge Venture Partners and Commonwealth Capital.
In March 2015, Onshape released the public beta version of its cloud CAD software, after pre-production testing with more than a thousand CAD professionals in 52 countries. Included in the beta launch was Onshape for iPhone.
In August 2015, the company released its Onshape for Android app.
In December 2015, Onshape launched its full commercial release. The company also launched the Onshape App Store, offering CAM, simulation, rendering and other cloud-based engineering tools. The Onshape App Store was launched with 24 developer partners.
In April 2016, Onshape introduced its Education Plan, with a free version of Onshape Professional geared for college students and educators.
In May 2016, Onshape released FeatureScript, a new open source (MIT licensed) programming language for creating and customizing CAD features.
In October 2019, Onshape agreed to be acquired by PTC. The acquisition closed in November 2019 for $470 million.
Funding
Onshape was a venture-backed company with investments from firms including Andreessen Horowitz, Commonwealth Capital Ventures, New Enterprise Associates (NEA) and North Bridge Venture Partners. Total venture funding amounted to $169 million.
See also
Comparison of CAD software
References
Cloud computing
Solid mechanics
Product design
Computer-aided engineering software
2015 software
IOS software
Android (operating system) software
Linux software
MacOS computer-aided design software
Computer-aided design software for Windows |
1212044 | https://en.wikipedia.org/wiki/GEOS%20%2816-bit%20operating%20system%29 | GEOS (16-bit operating system) | GEOS (later renamed GeoWorks Ensemble, NewDeal Office, and Breadbox Ensemble) is a computer operating environment, graphical user interface (GUI), and suite of application software. Originally released as PC/GEOS, it runs on DOS-based, IBM PC compatible computers. Versions for some handheld platforms were also released and licensed to some companies.
PC/GEOS was first created by Berkeley Softworks, which later became GeoWorks Corporation. Version 4.0 was developed in 2001 by Breadbox Computer Company, limited liability company (LLC), and was renamed Breadbox Ensemble. In 2015, Frank Fischer, the CEO of Breadbox, died and efforts on the operating system stopped until later in 2017 when it was bought by blueway.Softworks.
PC/GEOS should not be confused with the 8-bit GEOS product from the same company, which runs on the Commodore 64 and Apple II.
PC/GEOS
GeoWorks Ensemble
In 1990, GeoWorks released PC/GEOS for IBM PC compatible systems. Commonly referred to as GeoWorks Ensemble, it was incompatible with the earlier 8-bit versions of GEOS for Commodore and Apple II computers, but provided numerous enhancements, including scalable fonts and multitasking on IBM PC XT- and AT-class PC clones. GeoWorks saw a market opportunity to provide a graphical user interface for the 16 million older model PCs that were unable to run Microsoft Windows 2.x.
GEOS was packaged with a suite of productivity applications. Each had a name prefixed by "Geo": GeoWrite, GeoDraw; GeoManager; GeoPlanner; GeoDex, and GeoComm. It was also bundled with many PCs at the time, but like other GUI environments for the PC platform, such as Graphics Environment Manager (GEM), it ultimately proved less successful in the marketplace than Windows. Former CEO of GeoWorks claims that GEOS faded away "because Microsoft threatened to withdraw supply of MS-DOS to hardware manufacturers who bundled Geoworks with their machines".
In December 1992, NEC and Sony bundled an original equipment manufacturer (OEM) version of GeoWorks named the CD Manager with their respective CD-ROM players that sold as retail box add-on peripherals for consumers. The NEC Bundle retailed for around $500.00 with a 1x external CD-ROM, Small Computer System Interface (SCSI) interface controller, Labtec CD-150 amplified stereo speakers and 10 software titles.
A scaled-down version of GeoWorks was used by America Online for their DOS-based AOL client software from the time of introduction on IBM compatible PCs until the late 1990s when America Online dropped development for graphical DOS in favor of Microsoft Windows. During that time, the popular single 3.5" self-booting disk that AOL was distributing could be hacked to boot the GeoWorks environment.
IBM released the PC/GEOS-based EduQuest SchoolView network management tool for K-12 schools in 1994. Negotiations to make PC/GEOS an integral part of PC DOS 7.0 failed.
GeoWorks attempted to get third-party developers but was unable to get much support due to expense of the developer kit, which cost $1,000 for the manuals only, and the difficult programming environment, which required a second PC networked via serial port to run the debugger.
Even though PC/GEOS is referred to as an "operating system", it still requires DOS in load. GEOS and its applications were written in a mix of 8086 assembly language (Espire) and C (GEOS Object C: GOC), both with non-standard language extensions to support the object-oriented design.
Under DR DOS 6.0, if TASKMAX was loaded before PC/GEOS, PC/GEOS registered as graphical menu system for TASKMAX. This still worked under the pre-emptive multitasker (EMM386 /MULTI + TASKMGR) provided by Novell DOS 7, OpenDOS 7.01 and DR-DOS 7.02 (and higher), allowing for multiple GEOS and DOS applications to run concurrently.
After release of Ensemble 2.01, GeoWorks ended support for the desktop version to focus on handhelds and smart devices.
Geoworks Ensemble won the 1991 Software Publishers Association Excellence in Software Award for Best Consumer Program.
NewDeal Office
A newer version of PC/GEOS was marketed in the late 1990s as NewDeal Office from NewDeal Inc. in hopes of creating a market among owners of i386, i486 and Pentium PCs that could not run Windows 95 or Windows 98 effectively. NewDeal released 3 new versions of NewDeal Office (NewDeal Office 2.5, NewDeal Office 3/98 and NewDeal Office 2000) until it went bankrupt in 2000.
NDO or NDO 2000 came with a webbrowser named Skipper or Skipper 2000, respectively.
Breadbox Ensemble
After "NewDeal Inc." went out of business, Breadbox purchased the rights in the software from GeoWorks in 2001. Their newest PC/GEOS, 4.x, is now a full productivity and internet suite, including web browser (named WebMagick) as well as email. Other essential programs such as word processing, spreadsheet, flat file database and graphics applications are integrated into this package.
On 14 November 2015, Frank S. Fischer, the CEO and owner of Breadbox Ensemble LLC, died of a heart attack, some while after announcing plans to bring GEOS to Android.
Versions
1990: OS/90 beta version
1990: geoDOS beta version
1990: GeoWorks 1.0
1991: GeoWorks 1.2
1992: GeoWorks 1.2 Pro (with Borland Quattro Pro for DOS with PC/GEOS "Look and Feel")
1992: GeoWorks DTP
1992: GeoWorks CD Manager
1993: GeoWorks Ensemble 2.0 (new kernel PC/GEOS 2.0)
1993: Geopublish 2.0
1994: Geoworks Ensemble 2.01
1996: NewDeal Office 2.2
1996: NewDeal Office 2.5
1996: NewDeal Publish 2.5 shareware version
1997: NewDeal Office 97
1998: NewDeal Office 98
1999: NewDeal Office release 3 (new kernel PC/GEOS 3.0)
1999: NewDeal Office release 3 evaluation
1999: NewDeal Office 3.2
2000: NewDeal Office 3.2d (German patch)
2000: NewDeal Office 2000 (new kernel PC/GEOS 4.0)
2000: NewDeal Office 2000 for (for a Surf´n´Office PC from Ted Turner IV (MyTurn, Inc.) with help from CNN)
2001: BreadBox Ensemble beta version 4.0.1.1
2001: BreadBox Ensemble beta version 4.0.1.x
2002: Breadbox Ensemble beta version 4.0.2.0
2005–March: Breadbox Ensemble version 4.1.0.0
2005–November: Breadbox Ensemble version 4.1.2.0
2009–August: Breadbox Ensemble version 4.1.3.0
PEN/GEOS
PEN/GEOS 1.0 was the new name for PC/GEOS 2.0 when GeoWorks released it on 9 April 1992. PEN/GEOS 1.0 was a pioneering personal digital assistant (PDA) technology. GEOS was also used in the low-end GeoBook laptop from Brother Industries and in several Nokia Communicator models (GEOS 3.0 in models 9000, 9110). PEN/GEOS 2.0 was released in 1992, and version 3.0 was released in 1995.
Zoomer devices; Tandy Z-PDA, AST GRiDPad 2390, Casio Z-7000 & XL 7000
PEN/GEOS 1.0 was used as the operating system for the Tandy Corporation Z-PDA, which was introduced shortly after the first Apple Newton MessagePad. Palm Computing had been incorporated to create software for this device and shipped its first handwriting recognition software, PalmPrint, personal information manager, Palm Organizer, and synchronization software, PalmConnect, on the Z-PDA. Palm Organizer included the PalmSchedule date book, PalmAddress address book, PalmNotes notebook, a dictionary, calculator, clock, forms calculator, 26 language translation dictionary, on-line help, holiday, and travel information. The device was also sold under license as the AST GRiDPad 2390 and as the Casio Z-7000 which was the best selling version. In the US, Casio sold it under the name XL-7000 without the multi-lingual interface, but added an AOL client and some USA specific help files. These devices were all named Zoomer and were the first PDAs with a connection to the online services CompuServe and AOL. This was made possible through the pre-installed dial-up software CompuServeAOL.
HP OmniGo 100 & 120
In 1993, GeoWorks released PEN/GEOS 2.0, again based on PC/GEOS 2.0. In 1995, this version of GEOS appeared (running on top of DOS) on the HP OmniGo 100. It featured Graffiti handwriting recognition. The OmniGo is a flip-around clamshell handheld computer powered by a Vadem VG230 integrated PC-on-a-chip. The VG230 chip includes an Intel 80186-instruction set compatible NEC V30 core. It was soon followed by the HP OmniGo 120, which added a high-contrast screen.
Brother LW-Writing System
Brother LW-screen typewriters use PEN/GEOS and are the only version of the operating system that ships with vendor-provided drivers for scanner and it included a GEOS scanning application. In Germany, the Brother LW750ic system is equipped with PEN/GEOS.
Brother GeoBook
In 1997, Brother, in collaboration with IBM, brought the GeoBook series of notebooks to market. GeoBook models NB-60, NB-80C, and PN-9100GR used a modified version of PEN/GEOS using the Yago user interface. The GeoBook series was marketed mainly in education and was part of the IBM Eduquest School View strategy.
Nokia Communicator 9000(i) and 9110(i)
In 1996, the Nokia 9000 Communicator smartphone was introduced. This phone uses PEN/GEOS 3.0 and established the smartphone market. Nokia followed with Communicator models 9000i, 9110, and 9110i.
GEOS-SC
GEOS-SC was a 32-bit reduced instruction set computer (RISC) CPU smartphone, OS, and GUI for the Japanese cellphone market. It was released in 1997. Originally built as GeoWorks' planned future OS and codenamed 'Liberty', GEOS-SC became the basis for cellphones designed by Mitsubishi Electric Company (MELCO) of Japan.
GEOS-SE
Alongside this, GEOS-SE which was an OS designed and developed by Eden Ltd., a UK-based company acquired in 1997 by Geoworks. It became the basis of several other devices, most notably the Seiko Epson Locatio which was a multifunction device incorporating browser, PIM software, phone, GPS and Camera. It was launched in Japan in 1998.
FreeGEOS
Since 2016, the source code of PC/GEOS has been made available as FreeGEOS and can be compiled and edited freely.
References
Further reading
GEOWORKS. (1990). "Product Packaging (a printed card box with corrugated card liner) Part number: 16-2001-0101 Bar Code: 0 14233 20010 6". GeoWorks, Berkeley, CA 94704.
Oerttel, Burkhard. Das große Buch zu GeoWorks Pro, Ensemble & DTP, Data Becker GmbH, 1992, .
Oerttel, Burkhard. Das große Buch zu GeoWorks 2.0, Data Becker GmbH, 1994, .
Wegen, Andreas. GeoWorks DTP, Pro, Ensemble, te-wi Verlag bzw. TLC The Learning Companie, Series: Grundlagen und Praxis - Betriebssysteme, 1992, .
Wegen, Andreas. GeoWorks 2.0 - Bedienung, Applikationen, Beispiele, Tips, Interna, Referenz, te-wi Verlag, 1993, .
Seibert, Axel. GeoWorks - Ensemble Erfolgreich starten - sicher nutzen, Markt & Technik Verlag München, Series: Workshop - PC, 1991, .
Roßkamp, Alfred. GeoWorks Ensemble - Einführung in die Benutzerschnittstelle, Deutscher Taschenbuch Verlag (dtv), Series: Beck EDV-Berater im dtv (Basiswissen - GeoWorks), 1993, .
Bartel, Rainer. GeoWorks 1.2 & Pro - Der Einstieg in 20 Schritten, Sybex Verlag Düsseldorf, Series: Quick Start, 1992, .
Schölles, Reiner. GeoWorks 2.0 - Schnellanleitung, Data Becker GmbH, 1994, .
External links
Usenet
Breadbox Computer Company, former developer and publisher of GEOS
GEOS FAQ
GEOS-InfoBase
blueway.Softworks
DOS software
Formerly proprietary software
Graphical user interfaces
Mobile operating systems
Operating system APIs
Software using the Apache license
Assembly language software
Window-based operating systems
X86 operating systems
1990 software
cs:GEOS |
352709 | https://en.wikipedia.org/wiki/Feistel%20cipher | Feistel cipher | In cryptography, a Feistel cipher (also known as Luby–Rackoff block cipher) is a symmetric structure used in the construction of block ciphers, named after the German-born physicist and cryptographer Horst Feistel, who did pioneering research while working for IBM (USA); it is also commonly known as a Feistel network. A large proportion of block ciphers use the scheme, including the US Data Encryption Standard, the Soviet/Russian GOST and the more recent Blowfish and Twofish ciphers. In a Feistel cipher, encryption and decryption are very similar operations, and both consist of iteratively running a function called a "round function" a fixed number of times.
History
Many modern symmetric block ciphers are based on Feistel networks. Feistel networks were first seen commercially in IBM's Lucifer cipher, designed by Horst Feistel and Don Coppersmith in 1973. Feistel networks gained respectability when the U.S. Federal Government adopted the DES (a cipher based on Lucifer, with changes made by the NSA) in 1976. Like other components of the DES, the iterative nature of the Feistel construction makes implementing the cryptosystem in hardware easier (particularly on the hardware available at the time of DES's design).
Design
A Feistel network uses a round function, a function which takes two inputs a data block and a subkey and returns one output of the same size as the data block. In each round, the round function is run on half of the data to be encrypted, and its output is XORed with the other half of the data. This is repeated a fixed number of times, and the final output is the encrypted data. An important advantage of Feistel networks compared to other cipher designs such as substitution–permutation networks is that the entire operation is guaranteed to be invertible (that is, encrypted data can be decrypted), even if the round function is not itself invertible. The round function can be made arbitrarily complicated, since it does not need to be designed to be invertible. Furthermore, the encryption and decryption operations are very similar, even identical in some cases, requiring only a reversal of the key schedule. Therefore, the size of the code or circuitry required to implement such a cipher is nearly halved.
Theoretical work
The structure and properties of Feistel ciphers have been extensively analyzed by cryptographers.
Michael Luby and Charles Rackoff analyzed the Feistel cipher construction and proved that if the round function is a cryptographically secure pseudorandom function, with Ki used as the seed, then 3 rounds are sufficient to make the block cipher a pseudorandom permutation, while 4 rounds are sufficient to make it a "strong" pseudorandom permutation (which means that it remains pseudorandom even to an adversary who gets oracle access to its inverse permutation). Because of this very important result of Luby and Rackoff, Feistel ciphers are sometimes called Luby–Rackoff block ciphers.
Further theoretical work has generalized the construction somewhat and given more precise bounds for security.
Construction details
Let be the round function and let be the sub-keys for the rounds respectively.
Then the basic operation is as follows:
Split the plaintext block into two equal pieces: (, ).
For each round , compute
where means XOR. Then the ciphertext is .
Decryption of a ciphertext is accomplished by computing for
Then is the plaintext again.
The diagram illustrates both encryption and decryption. Note the reversal of the subkey order for decryption; this is the only difference between encryption and decryption.
Unbalanced Feistel cipher
Unbalanced Feistel ciphers use a modified structure where and are not of equal lengths. The Skipjack cipher is an example of such a cipher. The Texas Instruments digital signature transponder uses a proprietary unbalanced Feistel cipher to perform challenge–response authentication.
The Thorp shuffle is an extreme case of an unbalanced Feistel cipher in which one side is a single bit. This has better provable security than a balanced Feistel cipher but requires more rounds.
Other uses
The Feistel construction is also used in cryptographic algorithms other than block ciphers. For example, the optimal asymmetric encryption padding (OAEP) scheme uses a simple Feistel network to randomize ciphertexts in certain asymmetric-key encryption schemes.
A generalized Feistel algorithm can be used to create strong permutations on small domains of size not a power of two (see format-preserving encryption).
Feistel networks as a design component
Whether the entire cipher is a Feistel cipher or not, Feistel-like networks can be used as a component of a cipher's design. For example, MISTY1 is a Feistel cipher using a three-round Feistel network in its round function, Skipjack is a modified Feistel cipher using a Feistel network in its G permutation, and Threefish (part of Skein) is a non-Feistel block cipher that uses a Feistel-like MIX function.
List of Feistel ciphers
Feistel or modified Feistel:
Blowfish
Camellia
CAST-128
DES
FEAL
GOST 28147-89
ICE
KASUMI
LOKI97
Lucifer
MARS
MAGENTA
MISTY1
RC5
Simon
TEA
Triple DES
Twofish
XTEA
Generalised Feistel:
CAST-256
CLEFIA
MacGuffin
RC2
RC6
Skipjack
SMS4
See also
Cryptography
Stream cipher
Substitution–permutation network
Lifting scheme for discrete wavelet transform has pretty much the same structure
Format-preserving encryption
Lai–Massey scheme
References
Cryptography
Feistel ciphers |
4057446 | https://en.wikipedia.org/wiki/LinuxFund | LinuxFund | Linux Fund is an organization that has been raising money and making donations to Free and Open Source Software (FOSS) projects since 1999.
IRS 501(c)(3) status was granted to Linux Fund in August 2007, allowing direct solicitations to individuals and charitable foundations.
Prior to receiving the 501(c)(3) letter, the principal funding source had been an affinity credit card program with credit cards bearing a graphic of Tux, the Linux Penguin. Visa cards are currently offered in the US by US Bank;
Roots
Linux Fund was founded at the peak of the 1999 high-tech boom with an affinity credit card from MBNA. They gave away their first T-shirt in the summer of 1999 at the LinuxWorld Expo. By the summer of 2000, their Grants to Developers Program had begun.
Confusion and stagnation
A few years after surviving the dot-com bubble, the organization fell into stagnation. In June 2005, investigating reports that their website was down, NewsForge's Jay Lyman revealed that the organization was not actively distributing funds to FOSS projects. Lyman reported that funds from the MBNA cards continued to flow and the organization had $126,155.29 (and growing) in the bank. Then-executive-director, Jerritt Collord, told Lyman that he had gotten "burned out" and that the "largely one-man organization" was sitting idle after lackluster success with his Open Oregon Technology Center.
Rebuilding
In the Fall of 2005 the founding directors met, decided to clean up the organizational backlog and start funding FOSS projects again.
In June 2005, Bank of America bought MBNA. In April 2007, Bank of America gave Linux Fund notice that the affinity MasterCard program would be discontinued effective June 30, 2007.
On July 1, 2007 US Bank released a Linux Fund Visa card.
In August 2007 the IRS granted Linux Fund 501(c)(3) status.
In May 2009 the Open Hardware Foundation joined Linux Fund.
Current projects
Prior to cancellation by Bank of America, Linux Fund was supporting about 10 different projects including Debian, the Wikimedia Foundation, Blender (software), Free Geek, freenode, and OpenSSH. A typical grant was $500/month with renewable 6 and 12-month commitments. Linux Fund has also given lump-sum donations on the order of $1,000–$5,000.
Project funding was frozen briefly when Bank of America canceled the USA MasterCard agreement. Funding has since resumed with the new US Bank Visa card. Current projects include a mix of open-source software and hardware projects including Gnash, Inkscape, LiVES, and the Open Graphics Project.
Funding model
In 2005 Debian Project Leader Branden Robinson thanked the Linux Fund for their continued support of the Debian Project and noted the benefit of long-term grants to FOSS projects:
This funding will ... enable us to do a bit more forward planning. Debian runs entirely on donations ... and a steady, predictable flow of revenue should help us feel comfortable with some more long-range resource planning. Linux Fund deserves not just our thanks, but credit for pioneering new funding models for the Free Software community.
Cards
The original USA Linux Fund card was a MasterCard issued by MBNA.
The current USA Linux Fund card is a Visa issued by US Bank.
The current and original USA BSD Fund card is a Visa issued by US Bank.
The Canadian Linux Fund card was a MasterCard issued by MBNA. It is no longer offered.
Board members
Ilan Rabinovitch, Jeremy Garcia, Randal Schwartz
Current officers
Ilan Rabinovitch, President; Jeremy Garcia, Secretary. Randal Schwartz
Former Board Members
Scott Rainey, Michael Dexter, Iris Oren, Benjamin Cox, Candace Ramcharan, Dan Carrere.
References
Sources
http://www.linuxfund.org/team/
http://ask.slashdot.org/article.pl?sid=05/06/03/1845234
http://www.linuxpr.com/releases/11204.html
External links
Linux Fund
Linux organizations
Philanthropic organizations based in the United States
Organizations established in 1999
1999 establishments in the United States |
3656897 | https://en.wikipedia.org/wiki/PSP%20Media%20Manager | PSP Media Manager | Media Manager for PSP is a commercial application from Sony Creative Software that managed content on the PlayStation Portable (PSP), serving a similar function to that of iTunes for a personal computer. Media Manager is able to automatically convert and copy certain types of content (such as music & photos) to a PlayStation Portable, as well as download and copy video podcasts to the device; music could be downloaded from the Sony Connect Internet-based music store, in countries where this service was offered and from version 3.x onwards, the PlayStation Store was integrated directly into the software.
Media Manager for PSP was typically not included with the purchase of a PlayStation Portable and had to be purchased separately for a small fee, however from version 3.x onwards, a "basic" version of the software was made available for free in most countries via their respective PlayStation Web site; users of the "basic" version were able to purchase a "Pro" version for a small fee, that primarily offered the benefit of being able to convert and copy video files to a PlayStation Portable (this feature was unavailable in the "basic", free version from version 3.x onwards).
In the past, Sony Creative Software offered a range of "Media Manager" titles for different devices (such as the PlayStation Portable, Sony Walkman range and compatible Sony Ericsson cell phones), however Sony Creative Software have recently combined some of the Media Manager applications for different devices into one application, calling it "Media Go" – this includes Media Manager for PSP (PlayStation Portable), which is no longer being sold because of this reason.
External links
Media Go product page & free download
PSP (PlayStation Portable) Web site
Media Manager
Sony software |
65930 | https://en.wikipedia.org/wiki/ANSI%20escape%20code | ANSI escape code | ANSI escape sequences are a standard for in-band signaling to control cursor location, color, font styling, and other options on video text terminals and terminal emulators. Certain sequences of bytes, most starting with an ASCII escape character and a bracket character, are embedded into text. The terminal interprets these sequences as commands, rather than text to display verbatim.
ANSI sequences were introduced in the 1970s to replace vendor-specific sequences and became widespread in the computer equipment market by the early 1980s. They are used in development, scientific, commercial text-based applications as well as bulletin board systems to offer standardized functionality.
Although hardware text terminals have become increasingly rare in the 21st century, the relevance of the ANSI standard persists because a great majority of terminal emulators and command consoles interpret at least a portion of the ANSI standard.
History
Almost all manufacturers of video terminals added vendor-specific escape sequences to perform operations such as placing the cursor at arbitrary positions on the screen. One example is the VT52 terminal, which allowed the cursor to be placed at an x,y location on the screen by sending the character, a character, and then two characters representing with numerical values equal to the x,y location plus 32 (thus starting at the ASCII space character and avoiding the control characters). The Hazeltine 1500 had a similar feature, invoked using , and then the X and Y positions separated with a comma. While the two terminals had identical functionality in this regard, different control sequences had to be used to invoke them.
As these sequences were different for different terminals, elaborate libraries such as termcap ("terminal capabilities") and utilities such as tput had to be created so programs could use the same API to work with any terminal. In addition, many of these terminals required sending numbers (such as row and column) as the binary values of the characters; for some programming languages, and for systems that did not use ASCII internally, it was often difficult to turn a number into the correct character.
The ANSI standard attempted to address these problems by making a command set that all terminals would use and requiring all numeric information to be transmitted as ASCII numbers. The first standard in the series was ECMA-48, adopted in 1976. It was a continuation of a series of character coding standards, the first one being ECMA-6 from 1965, a 7-bit standard from which ISO 646 originates. The name "ANSI escape sequence" dates from 1979 when ANSI adopted ANSI X3.64. The ANSI X3L2 committee collaborated with the ECMA committee TC 1 to produce nearly identical standards. These two standards were merged into an international standard, ISO 6429. In 1994, ANSI withdrew its standard in favor of the international standard.
The first popular video terminal to support these sequences was the Digital VT100, introduced in 1978. This model was very successful in the market, which sparked a variety of VT100 clones, among the earliest and most popular of which was the much more affordable Zenith Z-19 in 1979. Others included the Qume QVT-108, Televideo TVI-970, Wyse WY-99GT as well as optional "VT100" or "VT103" or "ANSI" modes with varying degrees of compatibility on many other brands. The popularity of these gradually led to more and more software (especially bulletin board systems and other online services) assuming the escape sequences worked, leading to almost all new terminals and emulator programs supporting them.
In 1981, ANSI X3.64 was adopted for use in the US government by FIPS publication 86. Later, the US government stopped duplicating industry standards, so FIPS pub. 86 was withdrawn.
ECMA-48 has been updated several times and is currently at its 5th edition, from 1991. It is also adopted by ISO and IEC as standard ISO/IEC 6429. A version is adopted as a Japanese Industrial Standard, as JIS X 0211.
Related standards include ITU T.61, the Teletex standard, and the ISO/IEC 8613, the Open Document Architecture standard (mainly ISO/IEC 8613-6 or ITU T.416). The two systems share many escape codes with the ANSI system, with extensions that are not necessarily meaningful to computer terminals. Both systems quickly fell into disuse, but ECMA-48 does mark the extensions used in them as reserved.
Platform support
Unix-like systems
On these systems the terminal (or emulator) self-identifies using the $TERM environment variable. A database library such as termcap or terminfo would perform a lookup to derive the capabilities of the terminal and specific escape sequences to use the capabilities, which may deviate from ANSI in early days.
Although such libraries were primarily developed on and for Unix, by the mid-1980s programs running on Unix-like operating systems could almost always assume they were using a terminal or emulator that supported ANSI sequences; this led to widespread use of ANSI by programs running on those platforms. For instance, many games and shell scripts, and utilities such as color directory listings, directly write the ANSI sequences and thus cannot be used on a terminal that does not interpret them. Many programs, including text editors such as vi and GNU Emacs, use termcap or terminfo, or use libraries such as curses that use termcap or terminfo, and thus in theory support non-ANSI terminals, but this is so rarely tested nowadays that they are unlikely to work with those terminals.
Terminal emulators for communicating with local programs as well as remote machines and the text system console almost always support ANSI escape codes. This includes terminal emulators such as xterm, rxvt, GNOME Terminal, and Konsole on systems with X11-based or Wayland-based window systems, and Terminal.app and third-party terminal emulators such as iTerm2 on macOS.
CP/M
CP/M machines varied and several competing terminals existed, like for printers, each with their own control sequences. Some early systems were headless (needing an external terminal) and personal computers with a native screen typically emulated a terminal. Application developers had to support various popular terminals and to provide an installation program to configure them. Despite the CP/M hardware abstraction layer (BIOS), even for the same microprocessor, vendors provided platform-specific versions due to the competing disk formats, that would also be preconfigured for the native terminal (for example, various machine-specific WordStar adaptations were released).
The headless Altair 8800 was typically connected to a teletype such as the Model 33 ASR or to an external terminal like the TeleVideo 920C, needing to output their respective sequences. The Osborne 1 and Kaypro II computers natively emulated a subset of the TeleVideo 920C and ADM-3A control codes, respectively. The TRS-80 Model 4 and the Xerox 820 also emulated the Lear Siegler ADM-3A. The Zenith Z-89, Heathkit H8 and Amstrad PCW CP/M-80 computers implemented the Zenith Z19 (Heathkit H19) terminal codes, mostly compatible with VT52, the Z-89 manual also describes it as supporting ANSI.
The Microsoft Z-80 SoftCard for the Apple II emulated a limited subset of the Videx Videoterm, corresponding to the Datamedia 1520 sequences that the UCSD-based Apple Pascal supported. Its CP/M had the CONFIGIO command to adapt external terminals or run local applications that issued other control codes. Supported external terminals were the Soroc IQ 120/140 and Hazeltine 1500/1510.
DOS, OS/2, and Windows
MS-DOS 1.x did not support the ANSI or any other escape sequences. Only a few control characters (BEL, CR, LF, BS) were interpreted by the underlying BIOS, making it almost impossible to do any kind of full-screen application. Any display effects had to be done with BIOS calls, which were notoriously slow, or by directly manipulating the IBM PC hardware.
DOS 2.0 introduced the ability to add a device driver for the ANSI escape sequences – the de facto standard being , but others like , and are used as well (these are considerably faster as they bypass the BIOS). Slowness and the fact that it was not installed by default made software rarely take advantage of it; instead, applications continued to directly manipulate the hardware to get the text display needed. ANSI.SYS and similar drivers continued to work in Windows 9x up to Windows Me, and in NT-derived systems for 16-bit legacy programs executing under the NTVDM.
Many clones of DOS were able to interpret the sequences and do not require a separate ANSI driver to be loaded. PTS-DOS as well as Concurrent DOS, Multiuser DOS and REAL/32 have built-in support (plus a number of extensions). OS/2 had an command that enabled the sequences.
The Windows Console did not support ANSI escape sequences, nor did Microsoft provide any method to enable them. Some replacements or additions for the console window such as JP Software's TCC (formerly 4NT), Michael J. Mefford's ANSI.COM, Jason Hood's and Maximus5's ConEmu interpreted ANSI escape sequences printed by programs. A Python package named colorama internally interpretes ANSI escape sequences in text being printed, translating them to win32 calls to modify the state of the terminal, to make it easier to port Python code using ANSI to Windows. Cygwin performs similar translation to all output written to the console using Cygwin file descriptors, the filtering is done by the output functions of , to allow porting of POSIX C code to Windows.
In 2016, Microsoft released the Windows 10 version 1511 update which unexpectedly implemented support for ANSI escape sequences, over two decades after the debut of Windows NT. This was done alongside Windows Subsystem for Linux, allowing Unix-like terminal-based software to use the sequences in Windows Console. Unfortunately this defaults to off, but Windows PowerShell 5.1 enabled it. PowerShell 6 made it possible to embed the necessary ESC character into a string with .
Windows Terminal, introduced in 2019, supports the sequences by default, and Microsoft intends to replace the Windows Console with Windows Terminal.
Atari ST
The Atari ST used the command system adapted from the VT52 with some expansions for color support, rather than supporting ANSI escape codes.
AmigaOS
AmigaOS not only interprets ANSI code sequences for text output to the screen, the AmigaOS printer driver also interprets them (with extensions proprietary to AmigaOS) and translates them into the codes required for the particular printer that is actually attached.
VMS / OpenVMS
VMS was designed to be controlled using Digital's text-based video terminals such as the aforementioned VT100; thus software tends to write the ANSI escape sequences directly (and will not work on non-ANSI terminals).
Description
Control characters
Though not technically part of the standard, almost all users assume some functions of some single-byte characters. This is used to shorten the amount of data transmitted, or to perform some functions that are unavailable from escape sequences:
Escape sequences vary in length. The general format for an ANSI-compliant escape sequence is defined by ANSI X3.41 (equivalent to ECMA-35 or ISO/IEC 2022). The escape sequences consist only of bytes in the range (all the non-control ASCII characters), and can be parsed without looking ahead. The behavior when a control character, a byte with the high bit set, or a byte that is not part of any valid sequence, is encountered before the end is undefined.
Fe Escape sequences
If the is followed by a byte in the range 0x40 to 0x5F it is of this
type. Delegated to the applicable C1 control code
standard. Accordingly, all escape sequences
corresponding to C1 control codes from ANSI X3.64 / ECMA-48 follow this format.<ref
name="ECMA-48"/>
The standard says that, in 8-bit environments, the control functions corresponding to
type escape sequences (those from the set of C1 control codes) can be
represented as single bytes in the 0x80–0x9F range.
However, on modern devices those codes are often used for other purposes, such as
parts of UTF-8 or for CP-1252 characters, so only the 2-byte sequence is
typically used. In the case of UTF-8 a C1 control code can be encoded as two bytes
(e.g. for ), but no space is saved this way.
CSI (Control Sequence Introducer) sequences
For Control Sequence Introducer, or CSI, commands, the is followed by any number (including none) of "parameter bytes" in the range 0x30–0x3F (ASCII 0–9:;<=>?), then by any number of "intermediate bytes" in the range 0x20–0x2F (ASCII space and ), then finally by a single "final byte" in the range 0x40–0x7E (ASCII @A–Z[\]^_`a–z{|}~).
All common sequences just use the parameters as a series of semicolon-separated numbers such as . Missing numbers are treated as ( acts like the middle number is , and no parameters at all in acts like a reset code). Some sequences (such as CUU) treat as in order to make missing parameters useful.
A subset of arrangements was declared "private" so that terminal manufacturers could insert their own sequences without conflicting with the standard. Sequences containing the parameter bytes <=>? or the final bytes 0x70–0x7E (p–z{|}~) are private.
The behavior of the terminal is undefined in the case where a CSI sequence contains any character outside of the range 0x20–0x7E. These illegal characters are either C0 control characters (the range 0–0x1F), DEL (0x7F), or bytes with the high bit set. Possible responses are to ignore the byte, to process it immediately, and furthermore whether to continue with the CSI sequence, to abort it immediately, or to ignore the rest of it.
SGR (Select Graphic Rendition) parameters
Select Graphic Rendition (SGR) sets display attributes. Several attributes can be set in the same sequence, separated by semicolons. Each display attribute remains in effect until a following occurrence of SGR resets it. If no codes are given, is treated as (reset / normal).
Colors
3-bit and 4-bit
The original specification only had 8 colors, and just gave them names. The SGR parameters 30–37 selected the foreground color, while 40–47 selected the background. Quite a few terminals implemented "bold" (SGR code 1) as a brighter color rather than a different font, thus providing 8 additional foreground colors. Usually you could not get these as background colors, though sometimes inverse video (SGR code 7) would allow that. Examples: to get black letters on white background use , to get red use , to get bright red use . To reset colors to their defaults, use (not supported on some terminals), or reset all attributes with . Later terminals added the ability to directly specify the "bright" colors with 90–97 and 100–107.
When hardware started using 8-bit digital-to-analog converters (DACs) several pieces of software assigned 24-bit color numbers to these names. The chart below shows the default values sent to the DAC for some common hardware and software; in most cases they are configurable.
8-bit
As 256-color lookup tables became common on graphic cards, escape sequences were added to select from a pre-defined set of 256 colors:
ESC[38;5;m Select foreground color
ESC[48;5;m Select background color
0- 7: standard colors (as in ESC [ 30–37 m)
8- 15: high intensity colors (as in ESC [ 90–97 m)
16-231: 6 × 6 × 6 cube (216 colors): 16 + 36 × r + 6 × g + b (0 ≤ r, g, b ≤ 5)
232-255: grayscale from black to white in 24 steps
The ITU's T.416 Information technology - Open Document Architecture (ODA) and interchange format: Character content architectures uses ':' as separator characters instead:
ESC[38:5:m Select foreground color where n is a number from the table below
ESC[48:5:m Select background color
There has also been a similar but incompatible 88-color encoding using the same escape sequence, seen in and . Not much is known about the scheme besides the color codes. It uses a 4×4×4 color cube.
24-bit
As "true color" graphic cards with 16 to 24 bits of color became common, applications began to support 24-bit colors. Terminal emulators supporting setting 24-bit foreground and background colors with escape sequences include Xterm, KDE's Konsole, and iTerm, as well as all libvte based terminals, including GNOME Terminal.
ESC[ 38;2;;; m Select RGB foreground color
ESC[ 48;2;;; m Select RGB background color
The syntax is likely based on the ITU's T.416 Open Document Architecture (ODA) and interchange format: Character content architectures, which was adopted as ISO/IEC 8613-6 but ended up as a commercial failure. The ODA version is more elaborate and thus incompatible:
The parameters after the '2', i.e. even the r,g,b are optional.
Semicolons are replaced by colons, as above.
There is a leading "colorspace ID". The definition of the colorspace ID is not included in that document so it may be blank to represent the unspecified default.
In addition to the '2' value after 48 to specify a Red-Green-Blue format (and the '5' above for a 0-255 indexed color), there are alternatives of '0' for implementation defined and '1' for transparent - neither of what have any further parameters; '3' specifies colors using a Cyan-Magenta-Yellow scheme, and '4' for a Cyan-Magenta-Yellow-Black one, the latter using the position marked as "unused" for the Black component:
ESC[ 38:2::::::: m Select RGB foreground color
ESC[ 48:2::::::: m Select RGB background color
The ITU-RGB variation is supported by xterm, with the colorspace ID and tolerance parameters ignored. The simpler scheme using semicolons is initially found in Konsole.
Unix environment variables relating to color support
Before termcap and terminfo could indicate support for colors, the S-Lang library used to indicate whether a terminal emulator could use colors at all (later reinterpreted as 256-colors) and whether it supports 24-bit color. This system, although poorly documented, became widespread enough for Fedora and RHEL to use it as a simpler and more universal detection mechanism compared to querying the now-updated libraries. However, gnome-terminal 3.14 dropped this variable as its authors considered it incorrect and no longer necessary.
Some terminal emulators (urxvt, konsole) set to report the color scheme of the terminal (mainly light vs. dark background). This behavior originated in S-Lang and is used by vim. Again, gnome-terminal refuses to add this behavior, as the more "proper" xterm OSC 4/10/11 sequences already exist.
OSC (Operating System Command) sequences
Mostly these were defined by Xterm. For historical reasons xterm can end the command with as well as the standard .
Xterm allows the window title to be set by .
A non-xterm extension is the hyperlink, from 2017, used by VTE, iTerm2, and mintty.
The Linux console uses to change the palette, which, if hard-coded into an application, may hang other terminals. However, appending will be ignored by Linux and form a proper, ignorable sequence for other terminals.
Fs Escape sequences
If the is followed by a byte in the range it is of this type. Used for control functions
individually registered with the ISO-IR registry and, consequently, available
even in contexts where a different C1 control code set is used. Specifically, they
correspond to single control functions approved by ISO/IEC JTC 1/SC 2 and
standardized by ISO or an ISO-recognised body. Some
of these are specified in ECMA-35 (ISO 2022 / ANSI X3.41), others in ECMA-48 (ISO
6429 / ANSI X3.64). ECMA-48 refers to these as
"independent control functions".
Fp Escape sequences
If the is followed by a byte in the range it is of
this type. Set apart for private-use control functions.
nF Escape sequences
If the is followed by a byte in the range
it is of this type. Followed by any number of additional bytes in this range, and
then a byte in the range . They
are further subcategorised by the low four bits of the first
byte, e.g. "type " for sequences where the first byte
is ; and by whether the final byte is in the private use range
(e.g. "type ") or not (e.g. "type
"). They are mostly used for ANSI/ISO
code-switching mechanisms such as those used by ISO-2022-JP, except for type
sequences (those where the first intermediate byte is ),
which are used for individual control functions. Type sequences are
reserved for additional ISO-IR registered individual control functions,<ref
name="ECMA-35"/> while type sequences are available for
private-use control functions.
Examples
— This clears the screen and, on some devices, locates the cursor to the y,x position 1,1 (upper left corner).
— This makes text green. The green may be a dark, dull green, so you may wish to enable Bold with the sequence which would make it bright green, or combined as . Some implementations use the Bold state to make the character Bright.
— This reassigns the key F10 to send to the keyboard buffer the string "DIR" and ENTER, which in the DOS command line would display the contents of the current directory. (MS-DOS ANSI.SYS only) This was sometimes used for ANSI bombs. This is a private-use code (as indicated by the letter p), using a non-standard extension to include a string-valued parameter. Following the letter of the standard would consider the sequence to end at the letter D.
— This saves the cursor position. Using the sequence will restore it to the position. Say the current cursor position is 7(y) and 10(x). The sequence will save those two numbers. Now you can move to a different cursor position, such as 20(y) and 3(x), using the sequence or . Now if you use the sequence CSI u the cursor position will return to 7(y) and 10(x). Some terminals require the DEC sequences / instead which is more widely supported.
In shell scripting
ANSI escape codes are often used in UNIX and UNIX-like terminals to provide syntax highlighting. For example, on compatible terminals, the following list command color-codes file and directory names by type.
Users can employ escape codes in their scripts by including them as part of standard output or standard error. For example, the following GNU sed command embellishes the output of the make command by displaying lines containing words starting with "WARN" in reverse video and words starting with "ERR" in bright yellow on a dark red background (letter case is ignored). The representations of the codes are highlighted.
make 2>&1 | sed -e 's/.*\bWARN.*/\x1b[7m&\x1b[0m/i' -e 's/.*\bERR.*/\x1b[93;41m&\x1b[0m/i'
The following Bash function flashes the terminal (by alternately sending reverse and normal video mode codes) until the user presses a key.
flasher () { while true; do printf \\e[?5h; sleep 0.1; printf \\e[?5l; read -s -n1 -t1 && break; done; }
This can be used to alert a programmer when a lengthy command terminates, such as with .
printf \\033c
This will reset the console, similar to the command on modern Linux systems; however it should work even on older Linux systems and on other (non-Linux) UNIX variants.
In C
#include <stdio.h>
int main(void)
{
int i, j, n;
for (i = 0; i < 11; i++) {
for (j = 0; j < 10; j++) {
n = 10 * i + j;
if (n > 107) break;
printf("\033[%dm %3d\033[m", n, n);
}
printf("\n");
}
return 0;
}
Terminal input sequences
Pressing special keys on the keyboard, as well as outputting many xterm CSI, DCS, or OSC sequences, often produces a CSI, DCS, or OSC sequence, sent from the terminal to the computer as though the user typed it.
When typing input on a terminal keypresses outside the normal main alphanumeric keyboard area can be sent to the host as ANSI sequences. For keys that have an equivalent output function, such as the cursor keys, these often mirror the output sequences. However, for most keypresses there isn't an equivalent output sequence to use.
There are several encoding schemes, and unfortunately most terminals mix sequences from different schemes, so host software has to be able to deal with input sequences using any scheme.
To complicate the matter, the VT terminals themselves have two schemes of input, normal mode and application mode that can be switched by the application.
(draft section)
<char> -> char
<esc> <nochar> -> esc
<esc> <esc> -> esc
<esc> <char> -> Alt-keypress or keycode sequence
<esc> '[' <nochar> -> Alt-[
<esc> '[' (<modifier>) <char> -> keycode sequence, <modifier> is a decimal number and defaults to 1 (xterm)
<esc> '[' (<keycode>) (';'<modifier>) '~' -> keycode sequence, <keycode> and <modifier> are decimal numbers and default to 1 (vt)
If the terminating character is '~', the first number must be present and is a
keycode number, the second number is an optional modifier value. If the terminating
character is a letter, the letter is the keycode value, and the optional number is
the modifier value.
The modifier value defaults to 1, and after subtracting 1 is a bitmap of modifier
keys being pressed: Meta-Ctrl-Alt-Shift. So, for example, <esc>[4;2~ is
Shift-End, <esc>[20~ is function key 9, <esc>[5C is Ctrl-Right.
In other words, the modifier is the sum of the following numbers:
vt sequences:
<esc>[1~ - Home <esc>[16~ - <esc>[31~ - F17
<esc>[2~ - Insert <esc>[17~ - F6 <esc>[32~ - F18
<esc>[3~ - Delete <esc>[18~ - F7 <esc>[33~ - F19
<esc>[4~ - End <esc>[19~ - F8 <esc>[34~ - F20
<esc>[5~ - PgUp <esc>[20~ - F9 <esc>[35~ -
<esc>[6~ - PgDn <esc>[21~ - F10
<esc>[7~ - Home <esc>[22~ -
<esc>[8~ - End <esc>[23~ - F11
<esc>[9~ - <esc>[24~ - F12
<esc>[10~ - F0 <esc>[25~ - F13
<esc>[11~ - F1 <esc>[26~ - F14
<esc>[12~ - F2 <esc>[27~ -
<esc>[13~ - F3 <esc>[28~ - F15
<esc>[14~ - F4 <esc>[29~ - F16
<esc>[15~ - F5 <esc>[30~ -
xterm sequences:
<esc>[A - Up <esc>[K - <esc>[U -
<esc>[B - Down <esc>[L - <esc>[V -
<esc>[C - Right <esc>[M - <esc>[W -
<esc>[D - Left <esc>[N - <esc>[X -
<esc>[E - <esc>[O - <esc>[Y -
<esc>[F - End <esc>[1P - F1 <esc>[Z -
<esc>[G - Keypad 5 <esc>[1Q - F2
<esc>[H - Home <esc>[1R - F3
<esc>[I - <esc>[1S - F4
<esc>[J - <esc>[T -
<esc>[A to <esc>[D are the same as the ANSI output sequences. The <modifier> is normally omitted if no modifier keys are pressed, but most implementations always emit the <modifier> for F1-F4. (draft section)
Xterm has a comprehensive documentation page on the various function-key and mouse input sequence schemes from DEC's VT terminals and various other terminals it emulates. Thomas Dickey has added a lot of support to it over time; he also maintains a list of default keys used by other terminal emulators for comparison.
On the Linux console, certain function keys generate sequences of the form CSI [ char. The CSI sequence should terminate on the [.
Old versions of Terminator generate SS3 1; modifiers char when F1–F4 are pressed with modifiers. The faulty behavior was copied from GNOME Terminal.
xterm replies CSI row ; column R if asked for cursor position and CSI 1 ; modifiers R if the F3 key is pressed with modifiers, which collide in the case of row == 1. This can be avoided by using the ? private modifier as CSI ? 6 n, which will be reflected in the response as CSI ? row ; column R.
many terminals prepend ESC to any character that is typed with the alt key down. This creates ambiguity for uppercase letters and symbols @[\]^_, which would form C1 codes.
Konsole generates SS3 modifiers char when F1–F4 are pressed with modifiers.
See also
ANSI art
Control character
Advanced Video Attribute Terminal Assembler and Recreator (AVATAR)
ISO/IEC JTC 1/SC 2
C0 and C1 control codes
Notes
References
External links
Standard ECMA-48, Control Functions For Coded Character Sets. (5th edition, June 1991), European Computer Manufacturers Association, Geneva 1991 (also published by ISO and IEC as standard ISO/IEC 6429)
vt100.net DEC Documents
Xterm / Escape Sequences
AIXterm / Escape Sequences
A collection of escape sequences for terminals that are vaguely compliant with ECMA-48 and friends.
ITU-T Rec. T.416 (03/93) Information technology – Open Document Architecture (ODA) and interchange format: Character content architectures
Computer standards
Ecma standards
American National Standards Institute standards
ISO standards
Text user interface |
19926152 | https://en.wikipedia.org/wiki/NIST%20RBAC%20model | NIST RBAC model | The NIST RBAC model is a standardized definition of role-based access control. Although originally developed by the National Institute of Standards and Technology, the standard was adopted and is copyrighted and distributed as INCITS 359-2004 by the International Committee for Information Technology Standards (INCITS).
The latest version is INCITS 359-2012.
It is managed by INCITS committee CS1.
History
In 2000, NIST called for a unified standard for RBAC, integrating the RBAC model published in 1992 by Ferraiolo and Kuhn with the RBAC framework introduced by Sandhu, Coyne, Feinstein, and Youman (1996). This proposal was published by Sandhu, Ferraiolo, and Kuhn
and presented at the ACM 5th Workshop on Role Based Access Control. Following debate and comment within the RBAC and security communities, NIST made revisions and proposed a U.S. national standard for RBAC through the INCITS. In 2004, the standard received ballot approval and was adopted as INCITS 359-2004. Sandhu, Ferraiolo, and Kuhn later published an explanation of the design choices in the model.
In 2010, NIST announced a revision to RBAC, incorporating features of attribute-based access control (ABAC).
See also
Role-based access control
References
External links
NIST RBAC web site
INCITS web site
Computer access control
Computer security models
Data security
Firewall software
Packets (information technology) |
919083 | https://en.wikipedia.org/wiki/Yanshan%20University | Yanshan University | Yanshan University () is a university in Qinhuangdao, Hebei, China under the provincial government. It has a student population of 39,000 and a staff population of 3,200 (2,058 are teachers, including 413 full professors and 630 associate professors). It is a national key school and runs state key labs on its campus.
History
The origin of Yanshan University can be traced back to the Harbin Institute of Technology, founded in 1920.
In 1958, the Department of Heavy Machinery of Harbin Institute of Technology and its related specialties moved to the strategic industrial town of Fulaerji, Qiqihar in northeast China's Heilongjiang Province and was renamed the School of Heavy Machinery of the Harbin Institute of Technology. In 1960, the school became independent as the Northeast Heavy Machinery Institute; in 1978, it was accredited as one of the 88 national key institutions of higher learning. Starting in 1985, it began to relocate southward to the historic seaside city of Qinhuangdao in Hebei Province and completed the migration in 1997 when it was accredited by the former State Education Commission to adopt the present name of Yanshan University.
Campus
The Yanshan University campus covers an area of 5,000 mu (or 330 hectares) with a total construction area of nearly one million square meters. At present, the university has a faculty and staff of 3000, including 2,000 teachers, of which 413 are professors (including 200 doctoral advisors) and 630 are associate professors. The university has a student population of 39,000.
Academics
Yanshan University has five postdoctoral research stations, six disciplines of 35 subdisciplines conferring doctoral degrees, 13 disciplines of 80 subdisciplines conferring master's degrees, 16 masters of engineering programs, one Master of Public Administration (MPA) program, one Master of Business Administration (MBA) program, as well as 60 undergraduate programs. With such a wide range of programs, Yanshan University has become a multiversity with emphasis laid on engineering studies and importance attached to liberal arts, sciences, economics, management, law and education.
Yanshan University consists of 21 colleges and schools. It runs five national key disciplines, four key disciplines of national defence, 13 key provincial disciplines, one key national laboratory, 13 key provincial laboratories and engineering centres.
Main schools
School of Electrical Engineering
At present, the School of Electrical Engineering has 233 staff and faculty members, of which 61 are professors (including 36 doctoral advisors, 1 Yangtze River Scholar, 2 China National Funds for Distinguished Young Scholars, 1 National Science Fund for Excellent Young Scholars and 3 Humboldt scholars), and 58 are associate professors. The school has 3859 students (including 85 Ph.D students, 964 postgraduates and 2810 undergraduates).
The school consists of 3 postdoctoral research stations (Control Science and Engineering, Instrument Science and technology and Electrical engineering), 3 first-level disciplines conferring doctoral degrees (16 second-level disciplines conferring doctoral degrees), 4 first-level disciplines conferring master's degrees, 4 masters of engineering programs, 1 strong discipline group of Hebei Province, 3 key disciplines of Hebei Province, 3 Key Laboratories of Hebei Province, 1 National Experimental Teaching Demonstration Center, 1 national characteristic specialty, 1 undergraduate education innovation highlands of Hebei Province, and 1 teaching team of Hebei Province.
School of Information Science and Engineering (School of Software Engineering)
There are 185 staff and faculty in the school, of which 130 are teachers, including 40 professors (23 doctoral supervisors), 58 associate professors, 98 teachers with doctorates. The school has 87 doctoral degree candidates, 736 master's degree candidates, and 2580 undergraduates.
There are two post-doctoral research station in the school, the station of Electronic Science and Technology and the station of Computer Science and Technology, with 4 first level disciplines of doctoral degree awarding entitlement in Electronic Science and Technology, Computer Science and Technology, Optical Engineering and Software Engineering 8 second level disciplines of doctoral degree programs. The school also has 5 first level
disciplines of master's degree awarding entitlement in Optical Engineering, Electronic Science and Technology, Information and Communication Engineering, Computer Science and Technology and Software Engineering, of which are 11 second level disciplines of master's degree awarding entitlement in Optical Engineering, Physical Electronics, Circuits and Systems, Micro-electronics and Solid State Electronics, Electromagnetic Field and Microwave Technology, Communications and Information Systems, Signal and Information Processing, Computer Architecture,
Computer Software and Theory, Computer Application Technology and Software Engineering. Information Science and Technology are strong discipline group of Hebei Province, and Optical Engineering, Circuits and Systems, Computer Application Technology are key disciplines of Hebei Province. The school has 2 Key Provincial Laboratories, "the special optical fibre and fibre optic sensing laboratory" and "the Computer virtualisation technology and system integration laboratory". Furthermore, there are four master programs awarding entitlement in Computer Technology, Software Engineering, Electronics and Communication Engineering, Optical Engineering.
During the past 5 years, there are 130 projects including National "973" project, "863" project, the key program and general program of National Natural Science Foundation of China, provincial fund projects and the other related industries’ researching and developing projects. The school receives research funding of more than 37 million RMB, has more than 10 patents, 16 teaching and research awards of provincial and ministerial level. More than 500 papers published in high-level international journals and more than 20 monographs and textbooks.
School of Mechanical Engineering
At present, there are a total of 3918 students in the School of Mechanical Engineering, including 2394 undergraduate students, 1339 master students and 185 PhD students.
There are more than 300 teachers in the SME, among whom 82 are professors (including 47 PhD supervisors) and 77 are associate professors.
School of Materials Science and Engineering
The school currently enrols 1201 students including 753 undergraduates, 310 master students, and 138 PhD students. Since 2007, over 50% undergraduates in the school were enrolled into graduate programs.
The school employs 103 faculty members and staff, including 50 professors (39 PhD supervisors), 13
associate professors, and 8 senior engineers.
International relations
Notable alumni
References
External links
Yanshan University official website
Universities and colleges in Hebei |