id
stringlengths 3
8
| url
stringlengths 32
207
| title
stringlengths 1
114
| text
stringlengths 93
492k
|
---|---|---|---|
34139733 | https://en.wikipedia.org/wiki/Stephen%20Brobst | Stephen Brobst | Stephen Brobst (born September 21, 1962) is an American technology executive.
Early life and education
Stephen Brobst was born September 21, 1962 at the hospital on Stanford University campus where both of his parents did their undergraduate studies. In his childhood years he participated in chess tournaments sponsored by the United States Chess Federation (USCF) and in league competitions between high schools in Silicon Valley. He was president of his high school chess club.
He graduated as valedictorian from Milpitas High School in 1980.
For his undergraduate work he studied Electrical Engineering and Computer Science at University of California, Berkeley where he graduated in just three years and was bestowed the Bechtel Engineering Award as the highest honor for a graduating senior in the college of engineering for academic excellence and leadership.
Brobst performed masters and PhD research at the Massachusetts Institute of Technology (MIT) at the Laboratory for Computer Science where his dissertation work focused on load balancing and resource allocation for massively parallel computing architectures. He also holds an MBA with joint course and thesis work at the Harvard Business School and the MIT Sloan School of Management. At MIT he was bestowed the William Stewart Award for contributions to student life during his nearly ten years as a graduate resident and tutor at the Baker House undergraduate dormitory.
Career
Early career
After working at Lawrence Livermore National Laboratory, IBM Research Division in San Jose, and Hewlett-Packard Laboratories in Palo Alto, Brobst founded multiple start-up companies focused on data management products and services. He founded Strategic Technologies & Systems (STS) in 1983 while he was a graduate student at MIT. STS was acquired by NCR Corporation in 1999. From 1993 through 2000 he was co-founder and chief technology officer at Tanning Technology Corporation, a services firm focusing primarily on the implementation of Oracle databases for transaction processing. Tanning executed an initial public offering in 1999 and was later acquired by Platinum Technologies. He co-founded NexTek Software in 1994, a firm that created a software product for workload management for relational database management systems, as a spinoff from Tanning Technology Corporation. IBM acquired technology from NexTek in 1998 which provided the software foundation for early versions of the DB2 Query Patroller. Brobst was involved in the creation of eHealthDirect, a software start-up for automated claims adjudication using rule-based systems for the health care industry, between 1999 and 2002. eHealthDirect (later renamed to DeNovis) was acquired by HealthEdge in 2003.
Teradata
Simultaneous with the acquisition of Strategic Technologies & Systems in 1999, NCR Corporation created a separate division for the Teradata relational database management system. Brobst was appointed as Chief Technology Officer for the newly formed Teradata Division and continues to serve in this capacity today. Teradata was spun off as a separate company and went public on the New York Stock Exchange on October 1, 2007.
PCAST
During Barack Obama's first term Brobst was appointed to the United States President's Council of Advisors on Science and Technology (PCAST) in the working group on Networking and Information Technology Research and Development (NITRD). As part of this work he co-authored a report, “Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology”, delivered to Obama and the United States Congress in December, 2010. This report recommended that all federal agencies should have a Big Data strategy and initiated government investment in this area.
Brobst served as an advisor to the National Academy of Sciences in the area of IT workforce development in 1998 and 1999.
Teaching
Brobst lectured at Boston University in the computer science department between 1984 and 1992 while working toward his PhD at MIT. He taught undergraduate courses in operating system design, data structures and algorithms. He taught graduate courses in advanced database design as well as parallel computer architecture. Brobst has taught at the Data Warehouse Institute (later renamed Transforming Data With Intelligence) since 1996.
In 2001 Brobst worked with a team of academics in Pakistan to develop a course curriculum for database design and analytics.
He participates in the Girls Who Code initiative, teaching computer science concepts to high school girls.
Recognition
In 2014 Brobst was ranked by Advisory Cloud as the fourth best CTO in the United States. He is an elected member of the Eta Kappa Nu, Tau Beta Pi, and Sigma Pi engineering honor societies. He is also a nominated member of the New York Academy of Sciences.
Publications and patents
Brobst co-authored the chapter on big data for the Handbook of Computer Science (published by the Association for Computing Machinery in 2014). He also co-authored a report, “Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology”, delivered to President Barack Obama and the United States Congress in December, 2010. In addition, he co-authored “Building a Data Warehouse for Decision Support” (published by Prentice Hall PTR in both English and Polish in 1997 and 1999, respectively).
Brobst authored journal and conference papers in the fields of data management and parallel computing environments. He was a contributing editor for Intelligent Enterprise Magazine and published technical articles in The International Journal of High Speed Computing, Communications of the ACM, The Journal of Data Warehousing, Enterprise Systems Journal, DM Review, Database Programming and Design, DBMS Tools & Techniques, DB2 Magazine, Oracle Magazine, Teradata Magazine and many others.
Brobst holds patents in the area of advanced data management primarily in areas of workload management for database systems, advanced algorithms for cost-based optimization and SQL query re-writes, and health care analytics.
References
1962 births
American chief technology officers
Living people
MIT Sloan School of Management alumni
NCR Corporation people
Teradata
UC Berkeley College of Engineering alumni |
5272 | https://en.wikipedia.org/wiki/Printer%20%28computing%29 | Printer (computing) | In computing, a printer is a peripheral machine which makes a persistent representation of graphics or text, usually on paper. While most output is human-readable, bar code printers are an example of an expanded use for printers. Different types of printers include 3D printers, inkjet printers, laser printers, and thermal printers.
History
The first computer printer designed was a mechanically driven apparatus by Charles Babbage for his difference engine in the 19th century; however, his mechanical printer design was not built until 2000.
The first patented printing mechanism for applying a marking medium to a recording medium, or more particularly an electrostatic inking apparatus and a method for electrostatically depositing ink on controlled areas of a receiving medium, was in 1962 by C. R. Winston, Teletype Corporation, using continuous inkjet printing. The ink was a red stamp-pad ink manufactured by Phillips Process Company of Rochester, NY under the name Clear Print. This patent (US3060429) led to the Teletype Inktronic Printer product delivered to customers in late 1966.
The first compact, lightweight digital printer was the EP-101, invented by Japanese company Epson and released in 1968, according to Epson.
The first commercial printers generally used mechanisms from electric typewriters and Teletype machines. The demand for higher speed led to the development of new systems specifically for computer use. In the 1980s there were daisy wheel systems similar to typewriters, line printers that produced similar output but at much higher speed, and dot-matrix systems that could mix text and graphics but produced relatively low-quality output. The plotter was used for those requiring high-quality line art like blueprints.
The introduction of the low-cost laser printer in 1984, with the first HP LaserJet, and the addition of PostScript in next year's Apple LaserWriter set off a revolution in printing known as desktop publishing. Laser printers using PostScript mixed text and graphics, like dot-matrix printers, but at quality levels formerly available only from commercial typesetting systems. By 1990, most simple printing tasks like fliers and brochures were now created on personal computers and then laser printed; expensive offset printing systems were being dumped as scrap. The HP Deskjet of 1988 offered the same advantages as a laser printer in terms of flexibility, but produced somewhat lower-quality output (depending on the paper) from much less-expensive mechanisms. Inkjet systems rapidly displaced dot-matrix and daisy-wheel printers from the market. By the 2000s, high-quality printers of this sort had fallen under the $100 price point and became commonplace.
The rapid improvement of internet email through the 1990s and into the 2000s has largely displaced the need for printing as a means of moving documents, and a wide variety of reliable storage systems means that a "physical backup" is of little benefit today.
Starting around 2010, 3D printing became an area of intense interest, allowing the creation of physical objects with the same sort of effort as an early laser printer required to produce a brochure. These devices are in their earliest stages of development and have not yet become commonplace.
Types
Personal printers are primarily designed to support individual users, and may be connected to only a single computer. These printers are designed for low-volume, short-turnaround print jobs, requiring minimal setup time to produce a hard copy of a given document. However, they are generally slow devices ranging from 6 to around 25 pages per minute (ppm),
and the cost per page is relatively high. However, this is offset by the on-demand convenience. Some printers can print documents stored on memory cards or from digital cameras and scanners.
Networked or shared printers are "designed for high-volume, high-speed printing". They are usually shared by many users on a network and can print at speeds of 45 to around 100 ppm. The Xerox 9700 could achieve 120 ppm.
A virtual printer is a piece of computer software whose user interface and API resembles that of a printer driver, but which is not connected with a physical computer printer. A virtual printer can be used to create a file which is an image of the data which would be printed, for archival purposes or as input to another program, for example to create a PDF or to transmit to another system or user.
A barcode printer is a computer peripheral for printing barcode labels or tags that can be attached to, or printed directly on, physical objects. Barcode printers are commonly used to label cartons before shipment, or to label retail items with UPCs or EANs.
A 3D printer is a device for making a three-dimensional object from a 3D model or other electronic data source through additive processes in which successive layers of material (including plastics, metals, food, cement, wood, and other materials) are laid down under computer control. It is called a printer by analogy with an inkjet printer which produces a two-dimensional document by a similar process of depositing a layer of ink on paper.
Technology
The choice of print technology has a great effect on the cost of the printer and cost of operation, speed, quality and permanence of documents, and noise. Some printer technologies do not work with certain types of physical media, such as carbon paper or transparencies.
A second aspect of printer technology that is often forgotten is resistance to alteration: liquid ink, such as from an inkjet head or fabric ribbon, becomes absorbed by the paper fibers, so documents printed with liquid ink are more difficult to alter than documents printed with toner or solid inks, which do not penetrate below the paper surface.
Cheques can be printed with liquid ink or on special cheque paper with toner anchorage so that alterations may be detected. The machine-readable lower portion of a cheque must be printed using MICR toner or ink. Banks and other clearing houses employ automation equipment that relies on the magnetic flux from these specially printed characters to function properly.
Modern print technology
The following printing technologies are routinely found in modern printers:
Toner-based printers
A laser printer rapidly produces high quality text and graphics. As with digital photocopiers and multifunction printers (MFPs), laser printers employ a xerographic printing process but differ from analog photocopiers in that the image is produced by the direct scanning of a laser beam across the printer's photoreceptor.
Another toner-based printer is the LED printer which uses an array of LEDs instead of a laser to cause toner adhesion to the print drum.
Liquid inkjet printers
Inkjet printers operate by propelling variably sized droplets of liquid ink onto almost any sized page. They are the most common type of computer printer used by consumers.
Solid ink printers
Solid ink printers, also known as phase-change ink or hot-melt ink printers, are a type of thermal transfer printer, graphics sheet printer or 3D printer . They use solid sticks, crayons, pearls or granular ink materials. Common inks are CMYK-colored ink, similar in consistency to candle wax, which are melted and fed into a piezo crystal operated print-head. A Thermal transfer printhead jets the liquid ink on a rotating, oil coated drum. The paper then passes over the print drum, at which time the image is immediately transferred, or transfixed, to the page. Solid ink printers are most commonly used as color office printers and are excellent at printing on transparencies and other non-porous media. Solid ink is also called phase-change or hot-melt ink was first used by Data Products and Howtek, Inc., in 1984. Solid ink printers can produce excellent results with text and images. Some solid ink printers have evolved to print 3D models, for example, Visual Impact Corporation of Windham, NH was started by retired Howtek employee, Richard Helinski whose 3D patents US4721635 and then US5136515 was licensed to Sanders Prototype, Inc., later named Solidscape, Inc. Acquisition and operating costs are similar to laser printers. Drawbacks of the technology include high energy consumption and long warm-up times from a cold state. Also, some users complain that the resulting prints are difficult to write on, as the wax tends to repel inks from pens, and are difficult to feed through automatic document feeders, but these traits have been significantly reduced in later models. This type of thermal transfer printer is only available from one manufacturer, Xerox, manufactured as part of their Xerox Phaser office printer line. Previously, solid ink printers were manufactured by Tektronix, but Tektronix sold the printing business to Xerox in 2001.
Dye-sublimation printers
A dye-sublimation printer (or dye-sub printer) is a printer that employs a printing process that uses heat to transfer dye to a medium such as a plastic card, paper, or canvas. The process is usually to lay one colour at a time using a ribbon that has colour panels. Dye-sub printers are intended primarily for high-quality colour applications, including colour photography; and are less well-suited for text. While once the province of high-end print shops, dye-sublimation printers are now increasingly used as dedicated consumer photo printers.
Thermal printers
Thermal printers work by selectively heating regions of special heat-sensitive paper. Monochrome thermal printers are used in cash registers, ATMs, gasoline dispensers and some older inexpensive fax machines. Colours can be achieved with special papers and different temperatures and heating rates for different colours; these coloured sheets are not required in black-and-white output. One example is Zink (a portmanteau of "zero ink").
Obsolete and special-purpose printing technologies
The following technologies are either obsolete, or limited to special applications though most were, at one time, in widespread use.
Impact printers
Impact printers rely on a forcible impact to transfer ink to the media. The impact printer uses a print head that either hits the surface of the ink ribbon, pressing the ink ribbon against the paper (similar to the action of a typewriter), or, less commonly, hits the back of the paper, pressing the paper against the ink ribbon (the IBM 1403 for example). All but the dot matrix printer rely on the use of fully formed characters, letterforms that represent each of the characters that the printer was capable of printing. In addition, most of these printers were limited to monochrome, or sometimes two-color, printing in a single typeface at one time, although bolding and underlining of text could be done by "overstriking", that is, printing two or more impressions either in the same character position or slightly offset. Impact printers varieties include typewriter-derived printers, teletypewriter-derived printers, daisywheel printers, dot matrix printers, and line printers. Dot-matrix printers remain in common use in businesses where multi-part forms are printed. An overview of impact printing contains a detailed description of many of the technologies used.
Typewriter-derived printers
Several different computer printers were simply computer-controllable versions of existing electric typewriters. The Friden Flexowriter and IBM Selectric-based printers were the most-common examples. The Flexowriter printed with a conventional typebar mechanism while the Selectric used IBM's well-known "golf ball" printing mechanism. In either case, the letter form then struck a ribbon which was pressed against the paper, printing one character at a time. The maximum speed of the Selectric printer (the faster of the two) was 15.5 characters per second.
Teletypewriter-derived printers
The common teleprinter could easily be interfaced with the computer and became very popular except for those computers manufactured by IBM. Some models used a "typebox" that was positioned, in the X- and Y-axes, by a mechanism, and the selected letter form was struck by a hammer. Others used a type cylinder in a similar way as the Selectric typewriters used their type ball. In either case, the letter form then struck a ribbon to print the letterform. Most teleprinters operated at ten characters per second although a few achieved 15 CPS.
Daisy wheel printers
Daisy wheel printers operate in much the same fashion as a typewriter. A hammer strikes a wheel with petals, the "daisy wheel", each petal containing a letter form at its tip. The letter form strikes a ribbon of ink, depositing the ink on the page and thus printing a character. By rotating the daisy wheel, different characters are selected for printing. These printers were also referred to as letter-quality printers because they could produce text which was as clear and crisp as a typewriter. The fastest letter-quality printers printed at 30 characters per second.
Dot-matrix printers
The term dot matrix printer is used for impact printers that use a matrix of small pins to transfer ink to the page. The advantage of dot matrix over other impact printers is that they can produce graphical images in addition to text; however the text is generally of poorer quality than impact printers that use letterforms (type).
Dot-matrix printers can be broadly divided into two major classes:
Ballistic wire printers
Stored energy printers
Dot matrix printers can either be character-based or line-based (that is, a single horizontal series of pixels across the page), referring to the configuration of the print head.
In the 1970s and '80s, dot matrix printers were one of the more common types of printers used for general use, such as for home and small office use. Such printers normally had either 9 or 24 pins on the print head (early 7 pin printers also existed, which did not print descenders). There was a period during the early home computer era when a range of printers were manufactured under many brands such as the Commodore VIC-1525 using the Seikosha Uni-Hammer system. This used a single solenoid with an oblique striker that would be actuated 7 times for each column of 7 vertical pixels while the head was moving at a constant speed. The angle of the striker would align the dots vertically even though the head had moved one dot spacing in the time. The vertical dot position was controlled by a synchronized longitudinally ribbed platen behind the paper that rotated rapidly with a rib moving vertically seven dot spacings in the time it took to print one pixel column. 24-pin print heads were able to print at a higher quality and started to offer additional type styles and were marketed as Near Letter Quality by some vendors. Once the price of inkjet printers dropped to the point where they were competitive with dot matrix printers, dot matrix printers began to fall out of favour for general use.
Some dot matrix printers, such as the NEC P6300, can be upgraded to print in colour. This is achieved through the use of a four-colour ribbon mounted on a mechanism (provided in an upgrade kit that replaces the standard black ribbon mechanism after installation) that raises and lowers the ribbons as needed. Colour graphics are generally printed in four passes at standard resolution, thus slowing down printing considerably. As a result, colour graphics can take up to four times longer to print than standard monochrome graphics, or up to 8-16 times as long at high resolution mode.
Dot matrix printers are still commonly used in low-cost, low-quality applications such as cash registers, or in demanding, very high volume applications like invoice printing. Impact printing, unlike laser printing, allows the pressure of the print head to be applied to a stack of two or more forms to print multi-part documents such as sales invoices and credit card receipts using continuous stationery with carbonless copy paper. It also has security advantages as ink impressed into a paper matrix by force is harder to erase invisibly. Dot-matrix printers were being superseded even as receipt printers after the end of the twentieth century.
Line printers
Line printers print an entire line of text at a time. Four principal designs exist.
Drum printers, where a horizontally mounted rotating drum carries the entire character set of the printer repeated in each printable character position. The IBM 1132 printer is an example of a drum printer. Drum printers are also found in adding machines and other numeric printers (POS), the dimensions are compact as only a dozen characters need to be supported.
Chain or train printers, where the character set is arranged multiple times around a linked chain or a set of character slugs in a track traveling horizontally past the print line. The IBM 1403 is perhaps the most popular and comes in both chain and train varieties. The band printer is a later variant where the characters are embossed on a flexible steel band. The LP27 from Digital Equipment Corporation is a band printer.
Bar printers, where the character set is attached to a solid bar that moves horizontally along the print line, such as the IBM 1443.
A fourth design, used mainly on very early printers such as the IBM 402, features independent type bars, one for each printable position. Each bar contains the character set to be printed. The bars move vertically to position the character to be printed in front of the print hammer.
In each case, to print a line, precisely timed hammers strike against the back of the paper at the exact moment that the correct character to be printed is passing in front of the paper. The paper presses forward against a ribbon which then presses against the character form and the impression of the character form is printed onto the paper. Each system could have slight timing issues, which could cause minor misalignment of the resulting printed characters. For drum or typebar printers, this appeared as vertical misalignment, with characters being printed slightly above or below the rest of the line. In chain or bar printers, the misalignment was horizontal, with printed characters being crowded closer together or farther apart. This was much less noticeable to human vision than vertical misalignment, where characters seemed to bounce up and down in the line, so they were considered as higher quality print.
Comb printers, also called line matrix printers, represent the fifth major design. These printers are a hybrid of dot matrix printing and line printing. In these printers, a comb of hammers prints a portion of a row of pixels at one time, such as every eighth pixel. By shifting the comb back and forth slightly, the entire pixel row can be printed, continuing the example, in just eight cycles. The paper then advances, and the next pixel row is printed. Because far less motion is involved than in a conventional dot matrix printer, these printers are very fast compared to dot matrix printers and are competitive in speed with formed-character line printers while also being able to print dot matrix graphics. The Printronix P7000 series of line matrix printers are still manufactured as of 2013.
Line printers are the fastest of all impact printers and are used for bulk printing in large computer centres. A line printer can print at 1100 lines per minute or faster, frequently printing pages more rapidly than many current laser printers. On the other hand, the mechanical components of line printers operate with tight tolerances and require regular preventive maintenance (PM) to produce a top quality print. They are virtually never used with personal computers and have now been replaced by high-speed laser printers. The legacy of line printers lives on in many operating systems, which use the abbreviations "lp", "lpr", or "LPT" to refer to printers.
Liquid ink electrostatic printers
Liquid ink electrostatic printers use a chemical coated paper, which is charged by the print head according to the image of the document. The paper is passed near a pool of liquid ink with the opposite charge. The charged areas of the paper attract the ink and thus form the image. This process was developed from the process of electrostatic copying. Color reproduction is very accurate, and because there is no heating the scale distortion is less than ±0.1%. (All laser printers have an accuracy of ±1%.)
Worldwide, most survey offices used this printer before color inkjet plotters become popular. Liquid ink electrostatic printers were mostly available in width and also 6 color printing. These were also used to print large billboards. It was first introduced by Versatec, which was later bought by Xerox. 3M also used to make these printers.
Plotters
Pen-based plotters were an alternate printing technology once common in engineering and architectural firms. Pen-based plotters rely on contact with the paper (but not impact, per se) and special purpose pens that are mechanically run over the paper to create text and images. Since the pens output continuous lines, they were able to produce technical drawings of higher resolution than was achievable with dot-matrix technology. Some plotters used roll-fed paper, and therefore had a minimal restriction on the size of the output in one dimension. These plotters were capable of producing quite sizable drawings.
Other printers
A number of other sorts of printers are important for historical reasons, or for special purpose uses.
Digital minilab (photographic paper)
Electrolytic printers
Spark printer
Barcode printer multiple technologies, including: thermal printing, inkjet printing, and laser printing barcodes
Billboard / sign paint spray printers
Laser etching (product packaging) industrial printers
Microsphere (special paper)
Attributes
Connectivity
Printers can be connected to computers in many ways: directly by a dedicated data cable such as the USB, through a short-range radio like Bluetooth, a local area network using cables (such as the Ethernet) or radio (such as WiFi), or on a standalone basis without a computer, using a memory card or other portable data storage device.
More than half of all printers sold at U.S. retail in 2010 were wireless-capable, but nearly three-quarters of consumers who have access to those printers weren't taking advantage of the increased access to print from multiple devices according to the new Wireless Printing Study.
Printer control languages
Most printers other than line printers accept control characters or unique character sequences to control various printer functions. These may range from shifting from lower to upper case or from black to red ribbon on typewriter printers to switching fonts and changing character sizes and colors on raster printers. Early printer controls were not standardized, with each manufacturer's equipment having its own set. The IBM Personal Printer Data Stream (PPDS) became a commonly used command set for dot-matrix printers.
Today, most printers accept one or more page description languages (PDLs). Laser printers with greater processing power frequently offer support for variants of Hewlett-Packard's Printer Command Language (PCL), PostScript or XML Paper Specification. Most inkjet devices support manufacturer proprietary PDLs such as ESC/P. The diversity in mobile platforms have led to various standardization efforts around device PDLs such as the Printer Working Group (PWG's) PWG Raster.
Printing speed
The speed of early printers was measured in units of characters per minute (cpm) for character printers, or lines per minute (lpm) for line printers. Modern printers are measured in pages per minute (ppm). These measures are used primarily as a marketing tool, and are not as well standardised as toner yields. Usually pages per minute refers to sparse monochrome office documents, rather than dense pictures which usually print much more slowly, especially colour images. Speeds in ppm usually apply to A4 paper in most countries in the world, and letter paper size, about 6% shorter, in North America.
Printing mode
The data received by a printer may be:
A string of characters
A bitmapped image
A vector image
A computer program written in a page description language, such as PCL or PostScript
Some printers can process all four types of data, others not.
Character printers, such as daisy wheel printers, can handle only plain text data or rather simple point plots.
Pen plotters typically process vector images. Inkjet based plotters can adequately reproduce all four.
Modern printing technology, such as laser printers and inkjet printers, can adequately reproduce all four. This is especially true of printers equipped with support for PCL or PostScript, which includes the vast majority of printers produced today.
Today it is possible to print everything (even plain text) by sending ready bitmapped images to the printer. This allows better control over formatting, especially among machines from different vendors. Many printer drivers do not use the text mode at all, even if the printer is capable of it.
Monochrome, colour and photo printers
A monochrome printer can only produce monochrome images, with only shades of a single colour. Most printers can produce only two colors, black (ink) and white (no ink). With half-tonning techniques, however, such a printer can produce acceptable grey-scale images too
A colour printer can produce images of multiple colours. A photo printer is a colour printer that can produce images that mimic the colour range (gamut) and resolution of prints made from photographic film.
Page yield
The page yield is number of pages that can be printed from a toner cartridge or ink cartridge—before the cartridge needs to be refilled or replaced.
The actual number of pages yielded by a specific cartridge depends on a number of factors.
For a fair comparison, many laser printer manufacturers use the ISO/IEC 19752 process to measure the toner cartridge yield.
Economics
In order to fairly compare operating expenses of printers with a relatively small ink cartridge to printers with a larger, more expensive toner cartridge that typically holds more toner and so prints more pages before the cartridge needs to be replaced, many people prefer to estimate operating expenses in terms of cost per page (CPP).
Retailers often apply the "razor and blades" model: a company may sell a printer at cost and make profits on the ink cartridge, paper, or some other replacement part. This has caused legal disputes regarding the right of companies other than the printer manufacturer to sell compatible ink cartridges. To protect their business model, several manufacturers invest heavily in developing new cartridge technology and patenting it.
Other manufacturers, in reaction to the challenges from using this business model, choose to make more money on printers and less on ink, promoting the latter through their advertising campaigns. Finally, this generates two clearly different proposals: "cheap printer – expensive ink" or "expensive printer – cheap ink". Ultimately, the consumer decision depends on their reference interest rate or their time preference. From an economics viewpoint, there is a clear trade-off between cost per copy and cost of the printer.
Printer steganography
Printer steganography is a type of steganography – "hiding data within data" – produced by color printers, including Brother, Canon, Dell, Epson, HP, IBM, Konica Minolta, Kyocera, Lanier, Lexmark, Ricoh, Toshiba and Xerox brand color laser printers, where tiny yellow dots are added to each page. The dots are barely visible and contain encoded printer serial numbers, as well as date and time stamps.
See also
History of printing
3D printing
Cardboard modeling
List of printer companies
Print (command)
Printer driver
Print screen
Print server
Label printer
Printer friendly (also known as a printable version)
Printer point
Printer (publishing)
Printmaking
References
External links
Computer printers
Office equipment
Typography
Articles containing video clips
Network appliances |
972842 | https://en.wikipedia.org/wiki/Central%20Queensland%20University | Central Queensland University | Central Queensland University (alternatively known as CQUniversity) is an Australian public university based in central Queensland. CQUniversity is the only Australian university with a campus presence in every mainland state. Its main campus is at Norman Gardens in Rockhampton, however, it also has campuses in Adelaide (Wayville), Brisbane, Bundaberg (Branyan), Cairns, Emerald, Gladstone (South Gladstone and Callemondah), Mackay (central business district and Ooralea), Melbourne, Noosa, Perth, Rockhampton City, Sydney and Townsville. CQUniversity also has delivery sites to support distance education in Biloela, Broome, Busselton, Charters Towers, Karratha and Yeppoon, and partners with university centres in Cooma, Geraldton and Port Pirie.
History
CQUniversity began as the Queensland Institute of Technology (Capricornia) in 1967, and after two years under the name of the University College of Central Queensland, in 1992 became an official university named the University of Central Queensland. In 1994, it adopted the name Central Queensland University. In 2008, it became CQUniversity in recognition of the institutions' expansion beyond the Central Queensland region.
Beginnings
CQUniversity's antecedent institution, the Queensland Institute of Technology (Capricornia), was established in Rockhampton in 1967 as a regional branch of the Queensland Institute of Technology (Brisbane).
However, the first steps to establish a university in Rockhampton were taken as early as the 1940s. In 1941, the Queensland Labor Premier, William Forgan Smith, introduced section 17 of the National Education Co-ordination and University of Queensland Amendment Act, which provided for the creation of university colleges outside Brisbane. In 1944 and 1945, a series of Rockhampton delegations lobbied the Queensland government for a university college, but after the University of Queensland established a network of provincial study centres in the late 1940s the issue became dormant.
Rockhampton's university campaign resumed in the 1950s as Central Queensland became an emerging heavy industry base, with developing coal mines and Gladstone emerging as a light metals centre. In the Queensland parliament in November 1956, the local member for Rockhampton (H R Gardner) stated "more adequate facilities for technical education" were required for the region and, appealing to the philosophy of a "fair go", he urged that Rockhampton people be given "the same opportunities as those in Brisbane". In 1958, P J Goldston, an engineer (later, Commissioner for Railways,) mooted the possibility of a Central Queensland university with Rockhampton engineers and after further community discussion, the Rockhampton Mayor, Alderman R B J Pilbeam, called the first public meeting on 3 March 1959 at which the Central Queensland University Development Association (UDA) was constituted.
The UDA presented university proposals to government and, in 1961, the Queensland government reserved 161 hectares (400 acres) of government land at Parkhurst (North Rockhampton) on the Bruce Highway near the Yeppoon turnoff as a tertiary education site. Establishment finally was resolved in March 1965, when the Commonwealth government's Martin Report (on expansion of tertiary education) was tabled in parliament by Prime Minister Menzies―who announced the foundation of a new style of tertiary institution at both Rockhampton and Toowoomba. The new institutes―Rockhampton's was named The Queensland Institute of Technology, Capricornia (QITC)―were affiliated with the main Queensland Institute of Technology campus in Brisbane and lacked the autonomy of universities, being controlled by the Queensland Education Department.
When the QITC first opened in February 1967, there was no extensive campus to greet the handful of staff and initial intake of 71 full-time and part-time students. While building progressed at Parkhurst, the first classes held on the top floor of the Technical College in Bolsover Street were a makeshift affair with no laboratories, library facilities or stock. By 1969, most staff and students had transferred to the Parkhurst campus, still a bushland site in progress―in the summer months, the campus was often ringed by spectacular bush fires or deluged with torrential rain: cars slid in the mud or were bogged and the QITC's foundation Principal, Dr Allan Skertchly, ferried people in his 4WD across floodwaters. Some students slept temporarily on mattresses in the canteen while waiting for the first residential college to open.
1970s onwards
After the passage of the amended Education Act in 1971, QITC became an autonomous, multi-functional college under the control of its own council and took the name of Capricornia Institute of Advanced Education (CIAE).
Along with creating a traditional university campus experience in a natural setting, the CIAE also developed engineering and science projects. The CIAE became the first college in Australia to introduce a Bachelor of Science externally in 1974.
By 1979, external enrolments at the CIAE had increased to 825 and by 1985 distance education had become a major campus operation, exceeding internal enrolments and offering 12 courses involving some 100 subjects and processing 23,980 study packages annually.
Between 1978 and 1989, the CIAE established branch campuses in Central Queensland at Gladstone, Mackay, Bundaberg and Emerald.
Expansion in the 1990s
The CIAE became the University College of Central Queensland in 1990 and gained full university status in 1992. At that time it was known as the University of Central Queensland. The name was changed in 1994 to Central Queensland University.
After the Australian government approved the enrolment of full-fee paying students in Australian institutions in 1986, the CIAE (and subsequently the university) began trans national education ventures with many countries, including Singapore, Hong Kong, Dubai and Fiji. Through a public-private partnership with CMS (which CQU fully acquired in 2011) the university opened its first international campus in Sydney in 1994, followed by international campuses in Melbourne in 1997, Brisbane in 1998 and the Gold Coast in 2001.
2000 onwards
In 2001, the university appointed Queensland's first female Vice-Chancellor, Professor Glenice Hancock, who retired in 2004.
From 2009 onward, CQUniversity launched a new strategic plan to grow student numbers and expand course offerings, especially within the health disciplines. New course offerings included physiotherapy, podiatry, occupational therapy, speech pathology, oral health sonography, and medical imaging. CQUniversity also delivers courses in discipline areas including apprenticeships, trades and training, business, accounting and law, creative, performing and visual arts, education and humanities, engineering and built environment, health, information technology and digital media, psychology, social work and community services, science and environment, and work and study preparation.
In 2014, CQUniversity merged with CQ TAFE to establish Queensland's first dual sector university. CQUniversity is now the public provider of TAFE in the central Queensland region and also delivers vocational courses at other locations across Australia and online. Following the merger CQUniversity now delivers more than 300 courses from short courses through to PhDs.
CQUniversity is the only Australian university to be accredited as a Changemaker Campus by global social innovation group Ashoka U.
Medicine
In March 2018 the university announced it was in talks to establish a Medical school at its Rockhampton and Bundaberg campuses. Discussions are with the Hospital and Health Services of Central Queensland and Wide Bay, the main physical organisation of Queensland Health in the two regions.
Organisation and governance
Governance
CQUniversity is governed by the CQUniversity Council, comprising the Chancellor, Vice-Chancellor and various elected and appointed representatives. Operationally, CQUniversity is managed by the Vice-Chancellor and five Deputy Vice-Chancellors who oversee portfolios including: International and Services, Research, Tertiary Education, Student Experience and Governance, Engagement and Campuses, Strategic Development and Finance and Planning. The Vice-Chancellor is appointed by the University Council and reports to the Council through the Chancellor.
Associate Vice-Chancellors manage the regions in which the university operates including Rockhampton, Mackay and Whitsunday, Wide Bay Burnett, Gladstone, Central Highlands, South East Queensland, Townsville and North West Queensland, Far North Queensland, Victoria, New South Wales, South Australia and Western Australia. Pro Vice-Chancellors manage the areas of learning and teaching, Indigenous engagement and vocational education. The Schools within the university are managed by Deans, within the Tertiary Education Division.
Vice-Chancellor
CQUniversity is led by Professor Nick Klomp who was appointed as Vice-Chancellor and President in 2018. He officially commenced his appointment on Monday, 4 February 2019. Professor Klomp is the university's sixth Vice-Chancellor, replacing Professor Scott Bowman who served in the role from 2009 - 2019.
University Council
The CQUniversity Council is the governing body of CQUniversity and was established under the Central Queensland University Act (1998). Mr John Abbott is the Chancellor of CQUniversity.
Tertiary Education Division
The Tertiary Education Division is led by the university's Provost and overseas the delivery of higher education and vocational education through the university's schools.
Research
The Research Division is led by the Deputy Vice-Chancellor, Research who is responsible for shaping and implementing the university's research strategy.
International & Services Division
The Senior Deputy Vice-Chancellor (International & Services) is responsible for oversight and strategic management of the facilities and services which support the overall operations of the university. The Vice President and Senior Deputy Vice Chancellor is responsible, as part of the Senior Executive for overall strategic planning, commercial operations and leadership of the business operations for the university.
Within the University Services Portfolio lie the Directorates of Marketing, Facilities Management, People and Culture, Library Services, Information Technology, and Commercial Services. The International Portfolio is responsible for management of the university's global operations including recruitment; delivery of programs; compliance; and government relations through embassies across the globe.
Student Experience and Governance Division
The Student Experience and Governance Division is led by the Deputy Vice-Chancellor (Student Experience & Governance) and is responsible for the management of governance processes within the university through the Council and sub-committees. The division is made up of three directorates including Governance, the Student Experience and Communications.
The Governance Directorate has day to day carriage of governance activities. The Internal Audit Directorate operates as an independent appraisal function which forms an integral part of the university's internal control framework. The Student Experience and Communications Directorate is responsible for promoting, supporting and enhancing the university's reputation, activities and achievements, through strategic communications.
Schools
CQUniversity has six schools, each of which are managed by specialist Deans.
The schools are:
School of Education and the Arts
School of Business & Law
School of Engineering & Technology
School of Medical and Applied Sciences
School of Human, Health and Social Sciences
School of Nursing and Midwifery
Major areas of study
CQUniversity runs programs in a wide range of disciplines, including apprenticeships, trades and training; business, accounting and law; creative, performing and visual arts; education and humanities; engineering and building environment; health; information technology and digital media; psychology, social work and community services, science and environment; and English (quality endorsed by NEAS Australia), work and study preparation.
Campuses
CQUniversity has the following campuses:
CQUniversity Adelaide
CQUniversity Brisbane
CQUniversity Bundaberg
CQUniversity Emerald
CQUniversity Gladstone, City
CQUniversity Gladstone, Marina
CQUniversity Mackay, City
CQUniversity Mackay, Ooralea
CQUniversity Melbourne
CQUniversity Noosa
CQUniversity Rockhampton, North
CQUniversity Rockhampton, City
CQUniversity Sydney
CQUniversity Cairns
CQUniversity Townsville
CQUniversity also operates delivery sites in Biloela, Cairns, Yeppoon, Cannonvale, Geraldton, Charters Towers and Edithvale (Melbourne)
Rockhampton campuses
Two campuses operate in the Rockhampton region: Rockhampton, City (formerly CQ TAFE) and Rockhampton, North. The Rockhampton City campus is centrally located and offers a wide range of study options from certificates and diplomas to undergraduate programs. It also offers short courses in a range of areas including business, hospitality and beauty. Key facilities include Wilby's Training Restaurant, Hair Essence Hair Salon, Engineering Technology Centre, Trade training workshops and an Adult Learning Centre. The Rockhampton North campus is the university's headquarters. The campus has facilities including an Engineering Precinct, Health Clinic, Student Residence, food court and Sports Centre.
The Engineering Precinct has labs for fluids, thermodynamics, thermofluids, geotech, concrete and structures, and electronics. There is also a new lecture theatre, a postgraduate area, a materials-testing area, an acoustic test cell, a soils store, and a multi-purpose project-based learning lab.
The public-access health clinic on campus caters for up to 160 clients per day. The clinic allows students to work with qualified health professionals in the areas of oral health, occupational therapy, physiotherapy, podiatry and speech pathology.
Mackay campuses
Two campuses operate in the Mackay region: CQUniversity Mackay, City (formerly CQ TAFE) and CQUniversity Mackay, Ooralea, including a Trades Training Centre. The Mackay City campus located on Sydney Street, in the Mackay CBD, delivers both vocational and academic courses. Facilities on the campus include 24-hour computer labs, training restaurants, hair dressing salon, beauty salon, canteen and library. The Mackay Ooralea campus is located on Mackay's southern outskirts and is about six kilometres from the city centre. The campus includes lecture theatres, a performance theatre, tutorial rooms, computer laboratories, a nursing laboratory, video-conference rooms, recording studios, student accommodation, a bookshop, a refectory and a library. On-site accommodation is provided at the Mackay Residential College.
The Trade Training Centre caters for 1500 students doing apprenticeship programs in electrical, plumbing, carpentry, furnishing, metal fabrication, mechanical fitting and light and heavy automotive training, as well as skills training for the building, construction, mines, minerals and energy sectors.
Bundaberg campus
CQUniversity's Bundaberg campus is located on a 23-hectare site on Bundaberg's southern outskirts. The campus specialises in small class sizes and individually focused learning and teaching Campus facilities include a library, bookshop, campus refectory, a 200-seat and a 100‑seat lecture theatre, four computer laboratories, nursing clinical laboratories and videoconferencing rooms. In 2012, Bundaberg Regional Council and CQUniversity signed an accord as a formal expression of their commitment to have Bundaberg recognised as a 'University City'. The campus has an academic and research building which includes a 64-seat scientific laboratory, sound studio and multi-media and science research facilities. The campus also hosts a forensic crash lab to support learning for students enrolled in the Bachelor of Accident Forensics.
From 2013, CQUniversity Bundaberg has also offer commercial pilot training through a partnership with the Australian Flight Academy.
Gladstone campuses
Two campuses operate in the Gladstone region: CQUniversity Gladstone, City (formerly CQ TAFE) and CQUniversity Gladstone, Marina. The Gladstone City campus is located in the CBD. It offers specialist training for the gas industry, instrumentation and business studies. Key facilities include a canteen, Engineering Technology Centre, computer labs, Adult Learning Centre, Hair Essence Hair Salon, beauty facilities and a sports oval. The Gladstone Marina campus is located within the Gladstone Marina precinct. It is home to the Gladstone Environmental Science Centre and the Gladstone Engineering Centre. Students at the campus use lecture theatre and training facilities, computer labs, the Cyril Golding Library, bookshop and a range of career counselling and support services.
Noosa campus
CQUniversity Noosa was first established in 2003 as a hub in the small Sunshine Coast village of Pomona, offering courses in Learning Management. In 2007, the Campus relocated to Goodchap Street, Noosaville and its capacity was doubled to accommodate 1200 students. The Noosa campus offers modern facilities and surrounds including clinical nursing laboratories, library and student resource centre facilities, state of the art collaborative learning spaces and is home to the Learning and Teaching Education Research Centre (LTERC).
Emerald campus
CQUniversity Emerald (formerly CQ TAFE) is located on the Capricorn Highway, 275 km west of Rockhampton, and delivers trade based apprenticeships. Campus facilities include workshops for apprenticeship training, student common room and an afterhours computer lab.
Brisbane campus
CQUniversity Brisbane is located in the heart of the CBD at 160 Ann Street, Brisbane. The campus comprises nine floors of facilities including lecture rooms, multimedia labs, bookshop, library and a student lounge.
Sydney campus
CQUniversity Sydney is located on 400 Kent Street. With over 2000 international students, Sydney campus has the largest student population. The campus comprises lecture theatres, multimedia labs, bookshop, library, café and a student lounge. In 2013 the basement of the campus building was renovated and is now used as a dedicated space for students to relax and socialise.
Melbourne campus
CQUniversity Melbourne is a city campus. the Campus comprises multimedia labs, CQUni Bookshop, library, student lounge, and presentation and audio-visual equipment.
Adelaide Campus
CQUniversity Adelaide is located in the south-west of the city in close proximity to the Adelaide Showgrounds. The Campus is home to The Appleton Institute, a multidisciplinary research hub formerly Adelaide's Centre for Sleep Research. The Institute specialises in research, teaching and community engagement in a wide range of areas including safety science, sleep and fatigue, human factors and safety management, applied psychology, human-animal interaction and cultural anthropology.
Cairns Distance Education Study Centre
A Cairns study centre was established in July 2012 to cater to around 350 CQUniversity distance education students in the Far North Queensland region. The centre allows students to form study groups, access e-library and internet resources, sit exams, lodge assignments, participate in live lectures broadcast via high-speed internet, and make academic enquiries.
Other sites
CQUniversity also operates distance education centres, hubs and sites in Charters Towers, Cooma, Cannonvale, Townsville, Perth, Karratha, Edithvale, and Geraldton.
Academic profile
Research centres & institutes
CQUniversity has numerous research centres, institutes and groups including:
Appleton Institute
Collaborative Research Network – Health (CRN)
Centre for Plant and Water Science
Centre for Environmental Management
Centre for Railway Engineering
Centre for Intelligent and Networked Systems
Process Engineering and Light Metals Centre (PELM)
Learning and Teaching Education Research Centre
Queensland Centre for Domestic and Family Violence Research (CDFVR)
Centre for Physical Activity Studies (CPAS)
Centre for Mental Health Nursing Innovation
Centre for Longitudinal and Preventative Health Research
Capricornia Centre for Mucosal Immunology
Institute for Health and Social Science Research (IHSSR)
Institute for Resources, Industry and Sustainability (IRIS)
Power Engineering Research Group
Business Research Group
The university is also a partner in the Queensland Centre for Social Science Innovation (QCSSI) together with the Queensland State Government, University of Queensland (UQ), Griffith University (GU), Queensland University of Technology (QUT) and James Cook University (JCU). The QCSSI is based at the St Lucia campus of UQ.
Engagement
CQUniversity's stated aim is to be Australia's most engaged university. To this end, the university has appointed a Pro Vice-Chancellor (Community & Engagement) and encourages staff to record their engagement experiences in a comprehensive engagement database known as E-DNA. The university also runs an award ceremony known as the Opal Awards, which recognise staff for excellence in engagement.
In March 2012, CQUniversity appointed former Queensland University of Technology and Monash University academic Bronwyn Fredericks to the role of Pro Vice-Chancellor (Indigenous Engagement). Professor Fredericks, a Murri woman, is also the inaugural BMA Chair in Indigenous Engagement, a position funded by coal mining group BMA. Her stated aim is to pursue engagement with the Central Queensland region's numerous Indigenous communities to improve education outcomes.
CQUniversity is a partner of Indian charity Salaam Baalak Trust, which rescues, cares for and educates street children. The university provides higher education scholarships to Salaam Baalak children and sponsors the charity's City Walk program.
As part of its commitment to engagement, CQUniversity implemented Ucroo's Digital Campus platform became a member of the Talloires Network.
University art collection
The university began collecting art in the 1970s and has since developed a collection of almost 600 art works, including international and Australian paintings, ceramics, prints and photographs. While there is not a gallery or museum space at the university, art works are displayed across the campus network and lent to other organisations, such as regional galleries and other universities, for display in temporary exhibitions.
Rankings
CQUniversity graduates were ahead of the national rate for graduate full-time employment according to figures compiled by Graduate Careers Australia (GCA). GCA published a full-time report of 71.3%, while a direct comparison had the CQUniversity graduate full-time employment rate at 81.1%.
In 2013 CQUniversity was awarded five stars for online delivery, internationalisation and access in its first foray into the global university ratings QS Stars. It also scored a 4 for teaching and for facilities.
In 2012, CQUniversity lifted its rankings in the Excellence in Research for Australia (ERA) audit from 28 (in 2010) to 21. The university picked up three five-star ratings in 2012, up from its 2010 result of just two three-star ratings. CQUniversity performed at or well above world standard in four areas of research according to ERA 2012, with nursing research continuing to perform at 'world standard', and research in applied mathematics, agriculture and land management, and other medical and health sciences deemed to be ranked at the highest levels of performance 'well above world standard'.
Students
As of 2014, CQUniversity had around 35,000 students enrolled across its various campuses as well as by distance education.
International students can study at CQUniversity campuses located at Brisbane, Adelaide, Melbourne and Sydney, or at CQUniversity's regional campuses in Bundaberg, Gladstone, Noosa, Mackay or Rockhampton.
Notable alumni
Some of the notable alumni and past students of CQUniversity and its predecessor institutions include:
Julian Assange, WikiLeaks founder
Wayne Blair, Indigenous Australian filmmaker
Martin Bowles, PSM, former Secretary of the Department of Health
Tom Busby and Jeremy Marou of Australian rock duo Busby Marou
Terry Effeney, chief executive officer of Energex
Craig Foster Former Socceroo Captain, prominent analyst, commentator, writer and advocate for human rights.
Alexander Horneman-Wren SC
Anna Meares, Olympic gold medal-winning track cyclist
William McInnes, actor and author
Peter Saide, Broadway performer
Paul Ettore Tabone, opera and musical theatre performer (The Ten Tenors)
Carolyn Hardy, International Board Member at Amnesty International
David Battersby, Vice-Chancellor of Federation University
Craig Zonca, breakfast presenter at ABC Radio Brisbane.
Yohani, Sri Lankan singer, songwriter and rapper.
See also
List of universities in Australia
Education in Australia
References
External links
Central Queensland University
Universities in Queensland
Educational institutions established in 1967
Rockhampton
Buildings and structures in Rockhampton
1967 establishments in Australia
Chiropractic schools in Australia
Schools in Queensland
Central Queensland |
5348289 | https://en.wikipedia.org/wiki/Task%20Manager%20%28Windows%29 | Task Manager (Windows) | Task Manager, previously known as Windows Task Manager, is a task manager, system monitor, and startup manager included with Microsoft Windows systems. It provides information about computer performance and running software, including name of running processes, CPU and GPU load, commit charge, I/O details, logged-in users, and Windows services. Task Manager can also be used to set process priorities, processor affinity, start and stop services, and forcibly terminate processes.
The program can be started in recent versions of Windows by pressing and then typing in taskmgr.exe, by pressing and clicking Start Task Manager, by pressing , by right-clicking on the Windows taskbar and selecting "Task Manager", or by typing taskmgr in the File Explorer address bar.
Task Manager was introduced in its current form with Windows NT 4.0. Prior versions of Windows NT, as well as Windows 3.x, include the Task List application, are capable of listing currently running processes and killing them, or creating new processes. Windows 9x has a program known as Close Program which lists the programs currently running and offers options to close programs as well shut down the computer.
Functionality
Since Windows 8, Task Manager has two views. The first time Task Manager is invoked by a user, it shows in a simplified summary mode (described in the user experience as Fewer Details). It can be switched to a more detailed mode by clicking More Details. This setting is remembered for that user on that machine.
Since at least Windows 2000, the CPU usage can be displayed as a tray icon in the task bar for quick glance.
Summary mode
In summary mode, Task Manager shows a list of currently running programs that have a main window. It has a "more details" hyperlink that activates a full-fledged Task Manager with several tabs.
Right-clicking any of the applications in the list allows switching to that application or ending the application's task. Issuing an end task causes a request for graceful exit to be sent to the application.
Processes and details
The Processes tab shows a list of all running processes on the system. This list includes Windows Services and processes from other accounts. The Delete key can also be used to terminate processes on the Processes tab. By default, the processes tab shows the user account the process is running under, the amount of CPU, and the amount of memory the process is currently consuming. There are more columns that can be shown. The Processes tab divides the process into three categories:
Apps: Programs with a main window
Windows processes: Components of Windows itself that do not have a main window, including services
Background process: Programs that do not have a main window, including services, and are not part of the Windows itself
This tab shows the name of every main window and every service associated with each process. Both a graceful exit command and a termination command can be sent from this tab, depending on whether the command is sent to the process or its window.
The Details tab is a more basic version of the Processes tab, and acts similar to the Processes tab in Windows 7 and earlier. It has a more rudimentary user experience and can perform some additional actions. Right-clicking a process in the list allows changing the priority the process has, setting processor affinity (setting which CPU(s) the process can execute on), and allows the process to be ended. Choosing to End Process causes Windows to immediately kill the process. Choosing to "End Process Tree" causes Windows to immediately kill the process, as well as all processes directly or indirectly started by that process. Unlike choosing End Task from the Applications tab, when choosing to End Process the program is not given a warning nor a chance to clean up before ending. However, when a process that is running under a security context different from the one which issued the call to Terminate Process, the use of the KILL command-line utility is required.
Performance
The Performance tab shows overall statistics about the system's performance, most notably the overall amount of CPU usage and how much memory is being used. A chart of recent usage for both of these values is shown. Details about specific areas of memory are also shown.
There is an option to break the CPU usage graph into two sections: kernel mode time and user mode time. Many device drivers, and core parts of the operating system run in kernel mode, whereas user applications run in user mode. This option can be turned on by choosing Show kernel times from the View menu. When this option is turned on the CPU usage graph will show a green and a red area. The red area is the amount of time spent in kernel mode, and the green area shows the amount of time spent in user mode.
The Performance tab also shows statistics relating to each of the network adapters present in the computer. By default, the adapter name, percentage of network utilization, link speed, and state of the network adapter are shown, along with a chart of recent activity.
App history
The App history tab shows resource usage information about Universal Windows Platform apps. Windows controls the life cycle of these apps more tightly. This tab is where the data that Windows has collected about them can be viewed.
Startup
The Startup tab manages software that starts with Windows shell.
Users
The Users tab shows all users that currently have a session on the computer. On server computers, there may be several users connected to the computer using Terminal Services (or the Fast User Switching service, on Windows XP). Users can be disconnected or logged off from this tab.
History
Task Manager was originally an external side project developed at home by Microsoft developer David Plummer; encouraged by Dave Cutler and coworkers to make it part of the main product "build", he donated the project in 1995. The original task manager design featured a different Processes page with information being taken from the public Registry APIs rather than the private internal operating system metrics.
Windows 9x
A Close Program dialog box comes up when is pressed in Windows 9x. Also, in Windows 9x, there is a program called Tasks (TASKMAN.EXE) located in the Windows directory. It is rudimentary and has fewer features. The System Monitor utility in Windows 9x contains process and network monitoring functionality similar to that of the Windows Task Manager. Also, the Tasks program is called by clicking twice on the desktop if Explorer process is down.
Windows XP
In Windows XP only, there is a Shutdown menu that provides access to Standby, Hibernate, Turn off, Restart, Log Off, and Switch User. Later versions of Windows make these options available through the start menu.
On the Performance tab, the display of the CPU values was changed from a display mimicking a LED seven-segment display, to a standard numeric value. This was done to accommodate non-Arabic numeral systems, such as Eastern Arabic numerals, which cannot be represented using a seven-segment display.
Prior to Windows XP, process names longer than 15 characters in length are truncated. This problem is resolved in Windows XP.
The users tab is introduced by Windows XP.
Beginning with Windows XP, the Delete key is enabled on the Processes tab.
Windows Vista
Windows Task Manager has been updated in Windows Vista with new features, including:
A "Services" tab to view and modify currently running Windows services and start and stop any service as well as enable/disable the User Account Control (UAC) file and registry virtualization of a process.
New "Image Path Name" and "Command Line", and "Description" columns in the Processes tab. These show the full name and path of the executable image running in a process, any command-line parameters that were provided, and the image file's "Description" property.
New columns showing DEP and virtualization statuses. Virtualization status refers to UAC virtualization, under which file and registry references to certain system locations will be silently redirected to user-specific areas.
By right-clicking on any process, it is possible to directly open the Properties of the process's executable image file or of the directory (folder) containing the process.
The Task Manager has also been made less vulnerable to attack from remote sources or viruses as it must be operating under administrative rights to carry out certain tasks, such as logging off other connected users or sending messages. The user must go into the "Processes" tab and click "Show processes from other users" in order to verify administrative rights and unlock these privileges. Showing processes from all users requires all users including administrators to accept a UAC prompt, unless UAC is disabled. If the user is not an administrator, they must enter a password for an administrator account when prompted to proceed, unless UAC is disabled, in which case the elevation does not occur.
By right-clicking on any running process, it is possible to create a dump. This feature can be useful if an application or a process is not responding, so that the dump file can be opened in a debugger to get more information.
The Shutdown menu containing Standby, Hibernate, Turn off, Restart, Log Off and Switch User has been removed. This was done due to low usage, and to reduce the overall complexity of Task Manager.
The Performance tab shows the system uptime.
Windows 8
In Windows 8, Windows Task Manager has been overhauled and the following changes were made:
Starting in Windows 8, the tabs are hidden by default and Task Manager opens in summary mode (Fewer details). This view only shows applications and their associated processes. Prior to Windows 8, what is shown in the summary mode was shown in the tab named "Applications".
Resource utilization in the Processes tab is shown with various shades of yellow, with darker color representing heavier use.
The Performance tab is split into CPU, memory, disk, ethernet, and wireless network (if applicable) sections. There are overall graphs for each, and clicking on one reaches details for that particular resource. This includes consolidating information that previously appeared in the Networking tab from Windows XP through Windows 7.
The CPU tab no longer displays individual graphs for every logical processor on the system by default. It now can show data for each NUMA node.
The CPU tab now displays simple percentages on heat-mapping tiles to display utilization for systems with many (64 up to 640) logical processors. The color used for these heat maps is blue, with darker color again indicating heavier utilization.
Hovering the cursor over any logical processor's data now shows the NUMA node of that processor and its ID.
A new Startup tab has been added that lists running startup applications. Previously, MSConfig was in charge of this task, or in Windows Vista only, the "Software Explorer" section of Windows Defender. The Windows Defender that shipped built-into Windows 7 lacked this option, and it was also not present in the downloadable Microsoft Security Essentials either.
The Processes tab now lists application names, application status, and overall usage data for CPU, memory, hard disk, and network resources for each process.
A new App History tab is introduced.
The application status can be changed to suspended.
The normal process information found in the older Task Manager can be found in the new Details tab.
Windows 10
The Processes tab is divided into categories.
Display GPU information in the Performance tab, if available.
Weakness
Task Manager is a common target of computer viruses and other forms of malware; typically malware will close the Task Manager as soon as it is started, so as to hide itself from users. Variants of the Zotob and Spybot worms have used this technique, for example. Using Group Policy, it is possible to disable the Task Manager. Many types of malware also enable this policy setting in the registry. Rootkits can prevent themselves from getting listed in the Task Manager, thereby preventing their detection and termination using it.
See also
Resource Monitor
Process Explorer
Taskkill
Tasklist
Windows Task Scheduler
References
External links
How to use and troubleshoot issues with Windows Task Manager, Microsoft Help and Support
Windows 8 Task Manager In-Depth, Gavin Gear, Blogging Windows
All articles to be expanded
Utilities for Windows
Windows components
Task managers |
4710169 | https://en.wikipedia.org/wiki/Comparison%20of%20BSD%20operating%20systems | Comparison of BSD operating systems | There are a number of Unix-like operating systems based on or descended from the Berkeley Software Distribution (BSD) series of Unix variant options. The three most notable descendants in current use are FreeBSD, OpenBSD, and NetBSD, which are all derived from 386BSD and 4.4BSD-Lite, by various routes. Both NetBSD and FreeBSD started life in 1993, initially derived from 386BSD, but in 1994 migrating to a 4.4BSD-Lite code base. OpenBSD was forked from NetBSD in 1995. Other notable derivatives include DragonFly BSD, which was forked from FreeBSD 4.8, and Apple Inc.'s iOS and macOS, with its Darwin base including a large amount of code derived from FreeBSD.
Most of the current BSD operating systems are open source and available for download, free of charge, under the BSD License, the most notable exceptions being macOS and iOS. They also generally use a monolithic kernel architecture, apart from macOS, iOS, and DragonFly BSD which feature hybrid kernels. The various open source BSD projects generally develop the kernel and userland programs and libraries together, the source code being managed using a single central source repository.
In the past, BSD was also used as a basis for several proprietary versions of UNIX, such as Sun's SunOS, Sequent's Dynix, NeXT's NeXTSTEP, DEC's Ultrix and OSF/1 AXP (which became the now discontinued Tru64 UNIX). Parts of NeXT's software became the foundation for macOS which, together with iOS, is among the most commercially successful BSD variants in the general market.
Aims and philosophies
FreeBSD
FreeBSD aims to make an operating system usable for any purpose. It is intended to run a wide variety of applications, be easy to use, contain cutting edge features, and be highly scalable on very high load network servers. FreeBSD is free software, and the project prefers the FreeBSD license. However, they sometimes accept non-disclosure agreements (NDAs) and include a limited number of nonfree hardware abstraction layer (HAL) modules for specific device drivers in their source tree, to support the hardware of companies who do not provide purely libre drivers (such as HALs to program software-defined radios so that vendors do not share their nonfree algorithms).
To maintain a high level of quality and provide good support for "production quality commercial off-the-shelf (COTS) workstation, server, and high-end embedded systems", FreeBSD focuses on a narrow set of architectures. A significant focus of development since 2000 has been fine-grained locking and SMP scalability. From 2007 on, most of the kernel was fine-locked and scaling improvements started to be seen. Other recent work includes Common Criteria security functionality, such as mandatory access control and security event audit support.
Derivatives:
TrueNAS/FreeNAS – a network-attached storage (NAS) operating system based on FreeBSD.
FuryBSD – a FreeBSD-based operating system, founded after Project Trident decided to build on Void Linux instead of TrueOS. Discontinued in October 2020.
GhostBSD – a FreeBSD-based operating system with OpenRC and OS packages.
Junos OS – a FreeBSD-based nonfree operating system distributed with Juniper Networks hardware.
NomadBSD – a persistent live system for USB flash drives, based on FreeBSD.
ClonOS – virtual hosting platform/appliance based on FreeBSD.
pfSense – an open source firewall/router computer software distribution based on FreeBSD.
OPNsense – an open source firewall/router computer software distribution based on FreeBSD.
BSDRP – BSD Router Project: Open Source Router Distribution based on FreeBSD.
HardenedBSD – HardenedBSD is a security-enhanced fork of FreeBSD.
StarBSD – is a Unix-like, server-oriented operating system based on FreeBSD for Mission-Critical Enterprise Environment.
TrueOS (previously PC-BSD) – was a FreeBSD based server operating system, previously a desktop operating system. The project was officially discontinued in May 2020.
XigmaNAS – a network-attached storage (NAS) server software with a dedicated management web interface.
helloSystem - a GUI-focused system with a macOS interface.
NetBSD
NetBSD aims to provide a freely redistributable operating system that professionals, hobbyists, and researchers can use in any manner they wish. The main focus is portability, through the use of clear distinctions between machine-dependent and machine-independent code. It runs on a wide variety of 32-bit and 64-bit processor architectures and hardware platforms, and is intended to interoperate well with other operating systems. NetBSD places emphasis on correct design, well-written code, stability, and efficiency. Where practical, close compliance with open API and protocol standards is also aimed for. In June 2008, the NetBSD Foundation moved to a two-clause BSD license, citing changes at UCB and industry applicability. NPF is a project spawned by NetBSD.
Derivatives:
OS108 – system with graphical desktop environment based on NetBSD.
OpenBSD
OpenBSD is a security-focused BSD known for its developers' insistence on extensive, ongoing code auditing for security and correct functionality, a "secure by default" philosophy, good documentation, and adherence to strictly open source licensing. The system incorporates numerous security features that are absent or optional in other versions of BSD. The OpenBSD policy on openness extends to hardware documentation and drivers, since without these, there can be no trust in the correct operation of the kernel and its security, and vendor software bugs would be hard to resolve.
OpenBSD emphasizes very high standards in all areas. Security policies include disabling all non-essential services and having sane initial settings; and integrated cryptography (originally made easier due to relaxed Canadian export laws relative to the United States), full public disclosure of all security flaws discovered; thoroughly auditing code for bugs and security issues; various security features, including the W^X page protection technology and heavy use of randomization to mitigate attacks. Coding approaches include an emphasis on searching for similar issues throughout the code base if any code issue is identified. Concerning software freedom, OpenBSD prefers the BSD or ISC license, with the GPL acceptable only for existing software which is impractical to replace, such as the GNU Compiler Collection. NDAs are never considered acceptable. In common with its parent, NetBSD, OpenBSD strives to run on a wide variety of hardware. Where licenses conflict with OpenBSD's philosophy, the OpenBSD team has re-implemented major pieces of software from scratch, which have often become the standard used within other versions of BSD. Examples include the pf packet filter, new privilege separation techniques used to safeguard tools such as tcpdump and tmux, much of the OpenSSH codebase, and replacing GPL licensed tools such as diff, grep and pkg-config with ISC or BSD licensed equivalents.
OpenBSD prominently notes the success of its security approach on its website home page. , only two vulnerabilities have ever been found in its default install (an OpenSSH vulnerability found in 2002, and a remote network vulnerability found in 2007) in a period of almost 22 years. According to OpenBSD expert Michael W. Lucas, OpenBSD "is widely regarded as the most secure operating system available anywhere, under any licensing terms."
OpenBSD has spawned numerous child projects such as OpenSSH, OpenNTPD, OpenBGPD, OpenSMTPD, PF, CARP, and LibreSSL. Many of these are designed to replace restricted alternatives.
Derivatives:
LibertyBSD – Aimed to be a 'deblobbed' version of OpenBSD. There are a number of reasons as to why blobs can be problematic, according to the project. LibertyBSD began going through the process to become Free Software Foundation FSDG certified, but ultimately never was accepted. LibertyBSD is no longer actively developed, and the project page directs people instead to HyperbolaBSD.
DragonFly BSD
DragonFly BSD aims to be inherently easy to understand and develop for multi-processor infrastructures. The main goal of the project, forked from FreeBSD 4.8, is to radically change the kernel architecture, introducing microkernel-like message passing which will enhance scaling and reliability on symmetric multiprocessing (SMP) platforms while also being applicable to NUMA and clustered systems. The long-term goal is to provide a transparent single system image in clustered environments. DragonFly BSD originally supported both the IA-32 and x86-64 platforms, however support for IA-32 was dropped in version 4.0. Matthew Dillon, the founder of DragonFly BSD, believes supporting fewer platforms makes it easier for a project to do a proper, ground-up symmetric multiprocessing implementation.
Popularity
In September 2005, the BSD Certification Group, after advertising on a number of mailing lists, surveyed 4,330 BSD users, 3,958 of whom took the survey in English, to assess the relative popularity of the various BSD operating systems. About 77% of respondents used FreeBSD, 33% used OpenBSD, 16% used NetBSD, 2.6% used Dragonfly, and 6.6% used other (potentially non-BSD) systems. Other languages offered were Brazilian and European Portuguese, German, Italian, and Polish. Note that there was no control group or pre-screening of the survey takers. Those who checked "Other" were asked to specify that operating system.
Because survey takers were permitted to select more than one answer, the percentages shown in the graph, which are out of the number survey of participants, add up to greater than 100%. If a survey taker filled in more than one choice for "other", this is still only counted as one vote for other on this chart.
Another attempt to profile worldwide BSD usage is the *BSDstats Project, whose primary goal is to demonstrate to hardware vendors the penetration of BSD and viability of hardware drivers for the operating system. The project collects data monthly from any BSD system administrators willing to participate, and currently records the BSD market share of participating FreeBSD, OpenBSD, NetBSD, DragonflyBSD, Debian GNU/kFreeBSD, TrueOS, and MirBSD systems.
In 2020, a new independent project was introduced to collect statistics with the goal of significantly increasing the number of observed parameters.
DistroWatch, well known in the Linux community and often used as a rough guide to free operating system popularity, publishes page hits for each of the Linux distributions and other operating systems it covers. As of 27 March 2020, using a data span of the last six months it placed FreeBSD in 21st place with 452 hits per day, GhostBSD in 51st place with 243 hits, TrueOS in 54th place with 182 hits per day, DragonflyBSD in 75th place with 180 hits, OpenBSD in 80th place with 169 hits per day and NetBSD in 109th place with 105 hits per day.
Names, logos, slogans
The names FreeBSD and OpenBSD are references to software freedom: both in cost and open source.
NetBSD's name is a tribute to the Internet, which brought the original developers together.
The first BSD mascot was the BSD daemon, named after a common type of Unix software program, a daemon. FreeBSD still uses the image, a red cartoon daemon named Beastie, wielding a pitchfork, as its mascot today. In 2005, after a competition, a stylized version of Beastie's head designed and drawn by Anton Gural was chosen as the FreeBSD logo. The FreeBSD slogan is "The Power to Serve."
The NetBSD flag, designed in 2004 by Grant Bissett, is inspired by the original NetBSD logo, designed in 1994 by Shawn Mueller, portraying a number of BSD daemons raising a flag on top of a mound of computer equipment. This was based on a World War II photograph, Raising the Flag on Iwo Jima. The Board of Directors of The NetBSD Foundation believed this was too complicated, too hard to reproduce and had negative cultural ramifications and was thus not a suitable image for NetBSD in the corporate world. The new, simpler flag design replaced this. The NetBSD slogan is "Of course it runs NetBSD", referring to the operating system's portability.
Originally, OpenBSD used the BSD daemon as a mascot, sometimes with an added halo as a distinguishing mark, but OpenBSD later replaced its BSD daemon with Puffy. Although Puffy is usually referred to as a pufferfish, the spikes on the cartoon images give him a closer likeness to the porcupinefish. The logo is a reference to the fish's defensive capabilities and to the Blowfish cryptography algorithm used in OpenSSH. OpenBSD also has a number of slogans including "Secure by default", which was used in the first OpenBSD song, "E-railed", and "Free, Functional & Secure", and OpenBSD has released at least one original song with every release since 3.0.
The DragonFly BSD logo, designed by Joe Angrisano, is a dragonfly named Fred. A number of unofficial logos by various authors also show the dragonfly or stylized versions of it. DragonFly BSD considers itself to be "the logical continuation of the FreeBSD 4.x series." FireflyBSD has a similar logo, a firefly, showing its close relationship to DragonFly BSD. In fact, the FireflyBSD website states that proceeds from sales will go to the development of DragonFly BSD, suggesting that the two may in fact be very closely related.
PicoBSD's slogan is "For the little BSD in all of us," and its logo includes a version of FreeBSD's Beastie as a child, showing its close connection to FreeBSD, and the minimal amount of code needed to run as a Live CD.
A number of BSD OSes use stylized version of their respective names for logos. This includes macOS, TrueOS, GhostBSD, DesktopBSD, ClosedBSD, and MicroBSD. TrueOS's slogan is "Personal computing, served up BSD style!", GhostBSD's "A simple, secure BSD served on a Desktop." DesktopBSD's "A Step Towards BSD on the Desktop." MicroBSD's slogan is "The small secure unix like OS."
MirOS's site collects a variety of BSD mascots and Tux, the Linux mascot, together, illustrating the project's aim of supporting both BSD and Linux kernels. MirOS's slogan is "a wonderful operating system for a world of peace."
General information
See also
List of BSD operating systems
BSD license
Comparison of open source operating systems
Comparison of operating systems
Notes and references
Other sources
A semi-official download page.
Comparison
BSD operating systems |
15167 | https://en.wikipedia.org/wiki/ICQ | ICQ | ICQ New is a cross-platform instant messaging (IM) and VoIP client. The name ICQ derives from the English phrase "I Seek You". Originally developed by the Israeli company Mirabilis in 1996, the client was bought by AOL in 1998, and then by Mail.Ru Group (now VK) in 2010.
The ICQ client application and service were initially released in November 1996, freely available to download. ICQ was among the first stand-alone instant messenger (IM) — while real-time chat was not in itself new (Internet Relay Chat [IRC] being the most common platform at the time), the concept of a fully centralized service with individual user accounts focused on one-on-one conversations set the blueprint for later instant messaging services like AIM, and its influence is seen in modern social media applications. ICQ became the first widely adopted IM platform.
At its peak around 2001, ICQ had more than 100 million accounts registered. At the time of the Mail.Ru acquisition in 2010, there were around 42 million daily users. Since 2013, ICQ has 11 million monthly users. In 2020, the Mail.Ru Group, which owns ICQ, decided to launch its new ICQ New software, based on its messenger. The updated messenger was presented to the general public on April 6, 2020.
During the second week of January 2021, ICQ saw a renewed increase in popularity in Hong Kong, spurred on by the controversy over WhatsApp's privacy policy update. The number of downloads for the application increased 35-fold in the region.
Features
Private chats are a conversation between two users. When logging into an account, the chat can be accessed from any device thanks to cloud synchronization. A user can delete a sent message at any time either in their own chat or in their conversation partner's, and a notification will be received instead indicating that the message has been deleted.
Any important messages from group or private chats, as well as an unlimited number and size of media content, can be sent to the conversation with oneself. Essentially, this chat acts as a free cloud storage.
These are special chats where chats can take place of up to 25 thousand participants at the same time. Any user can create a group. A user can hide their phone number from other participants; there is an advanced polling feature; there is the possibility to see which group members have read a message, and notifications can be switched off for messages from specific group members.
An alternative to blogs. Channel authors can publish posts as text messages and also attach media files. Once the post is published, subscribers receive a notification as they would from regular and group chats. The channel author can remain anonymous and does not have to show any information in the channel description.
A special API-bot is available and can be used by anyone to create a bot, i.e. a small program which performs specific actions and interacts with the user. Bots can be used in a variety of ways ranging from entertainment to business services.
Stickers (small images or photos expressing some form of emotion) are available to make communication via the application more emotive and personalized. Users can use the sticker library already available or upload their own. In addition, thanks to machine learning the software will recommend a sticker during communication by itself.
Masks are images that are superimposed onto the camera in real-time. They can be used during video calls, superimposed onto photos and sent to other users.
A nickname is a name made up by a user. It can replace a phone number when searching for and adding user contact. By using a nickname, users can share their contact details without providing a phone number.
Smart answers are short phrases that appear above the message box which can be used to answer messages. ICQ NEW analyzes the contents of a conversation and suggests a few pre-set answers.
ICQ NEW makes it possible to send audio messages. However, for people who do not want to or cannot listen to the audio, the audio can be automatically transcribed into text. All the user needs to do is click the relevant button and they will see the message in text form.
Aside from text messaging, users can call each other as well as arrange audio or video calls for up to five people. During the video call, AR-masks can be used.
UIN
ICQ users are identified and distinguished from one another by UIN, or User Identification Numbers, distributed in sequential order. The UIN was invented by Mirabilis, as the user name assigned to each user upon registration. Issued UINs started at '10,000' (5 digits) and every user receives a UIN when first registering with ICQ. As of ICQ6 users are also able to log in using the specific e-mail address they associated with their UIN during the initial registration process.
Unlike other instant messaging software or web applications, on ICQ the only permanent user info is the UIN, although it is possible to search for other users using their associated e-mail address or any other detail they have made public by updating it in their account's public profile. In addition the user can change all of his or her personal information, including screen name and e-mail address, without having to re-register. Since 2000 ICQ and AIM users were able to add each other to their contact list without the need for any external clients. (The AIM service has since been discontinued.) As a response to UIN theft or sale of attractive UINs, ICQ started to store email addresses previously associated with a UIN. As such UINs that are stolen can sometimes be reclaimed. This applies only if (since 1999 onwards) a valid primary email address was entered into the user profile.
History
The founding company of ICQ, Mirabilis, was established in June 1996 by five Israeli developers: Yair Goldfinger, Sefi Vigiser, Amnon Amir, Arik Vardi, and Arik's father Yossi Vardi. They recognized that many people were accessing the internet through non-UNIX operating systems, such as Microsoft Windows, and those users were unfamiliar with established chat technologies, e.g. IRC. ICQ was one of the first text-based messengers to reach a wide range of users.
The technology Mirabilis developed for ICQ was distributed free of charge. The technology's success encouraged AOL to acquire Mirabilis on June 8, 1998, for $287 million up front and $120 million in additional payments over three years based on performance levels. In 2002 AOL successfully patented the technology.
After the purchase the product was initially managed by Ariel Yarnitsky and Avi Shechter. ICQ's management changed at the end of 2003. Under the leadership of the new CEO, Orey Gilliam, who also assumed the responsibility for all of AOL's messaging business in 2007, ICQ resumed its growth; it was not only a highly profitable company, but one of AOL's most successful businesses. Eliav Moshe replaced Gilliam in 2009 and became ICQ's managing director.
In April 2010, AOL sold ICQ to Digital Sky Technologies, headed by Alisher Usmanov, for $187.5 million. While ICQ was displaced by AOL Instant Messenger, Google Talk, and other competitors in the U.S. and many other countries over the 2000s, it remained the most popular instant messaging network in Russian-speaking countries, and an important part of online culture. Popular UINs demanded over 11,000₽ in 2010.
In September of that year, Digital Sky Technologies changed its name to Mail.Ru Group. Since the acquisition, Mail.ru has invested in turning ICQ from a desktop client to a mobile messaging system. As of 2013, around half of ICQ's users were using its mobile apps, and in 2014, the number of users began growing for the first time since the purchase.
In March 2016 the source code of the client was released under the Apache license on github.com.
Development history
ICQ 99a/b the first releases that were widely available.
ICQ 2000 incorporated into Notes and Reminder features.
ICQ 2001 included server-side storage of the contact list. This provided synchronization between multiple computers and enforced obtaining consent before adding UINs to the contact list by preventing clients from modifying the local contact list directly.
On December 19, 2002, AOL Time Warner announced that ICQ had been issued a United States patent for instant messaging.
ICQ 2002 was the last completely advertising-free ICQ version.
ICQ Pro 2003b was the first ICQ version to use the ICQ protocol version 10. However, ICQ 5 and 5.1 use version 9 of the protocol. ICQ 2002 and 2003a used version 8 of the ICQ protocol. Earlier versions (ICQ 2001b and all ICQ clients before it) used ICQ protocol version 7.
ICQ 4 and later ICQ 5 (released on Monday, February 7, 2005), were upgrades on ICQ Lite. One addition was Xtraz, which offers games and features intended to appeal to younger users of the Internet. ICQ Lite was originally an idea to offer the lighter users of instant messaging an alternative client which was a smaller download and less resource-hungry for relatively slow computers.
ICQ 5 introduced skins support. There are few official skins available for the current ICQ 5.1 at the official website; however, a number of user-generated skins have been made available for download.
ICQ 6, released on April 17, 2007, was the first major update since ICQ 4. The user interface has been redesigned using Boxely, the same rendering engine used in AIM Triton. This change adds new features such as the ability to send IMs directly from the client's contact list. ICQ has recently started forcing users of v5.1 to upgrade to version 6 (and XP). Those who do not upgrade will find their older version of ICQ does not start up. Although the upgrade to version 6 should be seen as a positive thing, some users may find that useful features such as sending multiple files at one time is no longer supported in the new version. At the beginning of July 2008, a network upgrade forced users to stop using ICQ 5.1 - applications that identified themselves as ICQ 5, such as Pidgin, were forced to identify themselves as ICQ 6. There seems to be no alternative for users other than using a different IM program or patching ICQ 5.1 with a special application.
ICQ 7.0, released on January 18, 2010. This update includes integration with Facebook and other websites. It also allows custom personal status similar to Windows Live Messenger (MSN Messenger). ICQ 7.0 does not support traditional Chinese on standard installation or with the addition of an official language pack. This has made its adoption difficult with the established user base from Hong Kong and Taiwan where traditional Chinese is the official language.
ICQ 8, released on February 5, 2012 - "Meet the new generation of ICQ, Enjoy free video calls, messages and SMS, social networks support and more."
ICQ 10.0, released January 18, 2016. Newest update is 10.0 Build 12393, released on November 8, 2018.
Criticism
AOL pursued an aggressive policy regarding alternative ("unauthorized") ICQ clients.
In July 2008 changes were implemented on ICQ servers causing many unofficial clients to stop working. These users received an official notification from "ICQ System".
On December 9, 2008, another change to the ICQ servers occurred: clients sending Client IDs not matching ICQ 5.1 or higher stopped working.
On December 29, 2008, the ICQ press service distributed a statement characterizing alternative clients as dangerous.
On January 21, 2009, ICQ servers started blocking all unofficial clients in Russia and Commonwealth of Independent States countries. Users in Russia and Ukraine received a message from UIN 1:
"Системное сообщение
ICQ не поддерживает используемую вами версию. Скачайте бесплатную авторизованную версию ICQ с официального web-сайта ICQ.
System Message
The version you are using is not supported by ICQ. Download a free authorized ICQ version from ICQ's official website."
On icq.com there was an "important message" for Russian-speaking ICQ users: "ICQ осуществляет поддержку только авторизированных версий программ: ICQ Lite и ICQ 6.5." ("ICQ supports only authorized versions of programs: ICQ Lite and ICQ 6.5.")
On February 3, 2009, the events of January 21 were repeated.
On December 27, 2018, ICQ announced it was to stop supporting unofficial clients, affecting many users who prefer a compact size using Miranda and other clients.
On December 28, 2018, ICQ stopped working on some unofficial clients.
In late March, 2019, ICQ stopped working on the Pidgin client, as initiated in December 2018.
Cooperation with Russian intelligence services
According to a Novaya Gazeta article published in May 2018, Russian intelligence agencies have access to online reading of ICQ users' correspondence. The article examined 34 sentences of Russian courts, during the investigation of which the evidence of the defendants' guilt was obtained by reading correspondence on a PC or mobile devices. Of the fourteen cases in which ICQ was involved, in six cases the capturing of information occurred before the seizure of the device. The reason for the article was the blocking of the Telegram service and the recommendation of the Advisor to the President of the Russian Federation Herman Klimenko to use ICQ instead.
Clients
AOL's OSCAR network protocol used by ICQ is proprietary and using a third party client is a violation of ICQ Terms of Service. Nevertheless, a number of third-party clients have been created by using reverse-engineering and protocol descriptions. These clients include:
Adium: supports ICQ, Yahoo!, AIM, MSN, Google Talk, XMPP, and others, for macOS
Ayttm: supports ICQ, Yahoo!, AIM, MSN, IRC, and XMPP
bitlbee: IRC gateway, supports ICQ, Yahoo!, AIM, MSN, Google Talk, and XMPP
centericq: supports ICQ, Yahoo!, AIM, MSN, IRC and XMPP, text-based
climm (formerly mICQ): text-based
Fire: supports ICQ, Yahoo!, AIM, MSN, IRC, and XMPP, for macOS
Jimm: supports ICQ, for Java ME mobile devices
Kopete: supports AIM, ICQ, MSN, Yahoo, XMPP, Google Talk, IRC, Gadu-Gadu, Novell GroupWise Messenger and others, for Unix-like
Meetro: IM and social networking combined with location; supports AIM, ICQ, MSN, Yahoo!
Miranda IM: supports ICQ, Yahoo!, AIM, MSN, IRC, Google Talk, XMPP, Gadu-Gadu, BNet and others, for Windows
Naim: ncurses-based
Pidgin (formerly Gaim): supports ICQ, Yahoo!, AIM, Gtalk, MSN, IRC, XMPP, Gadu-Gadu, SILC, Meanwhile, (IBM Lotus Sametime) and others
QIP: supports ICQ, AIM, XMPP and XIMSS
stICQ: supports ICQ, for Symbian OS
Trillian: supports ICQ, IRC, Google Talk, XMPP and others
AOL supported clients include:
AOL Instant Messenger (discontinued in 2017)
Messages/iChat: uses ICQ's UIN as an AIM screenname, for macOS
See also
Comparison of instant messaging clients
Comparison of instant messaging protocols
LAN messenger
Online chat
Windows Live Messenger
Tencent QQ
References
External links
Official ICQ Website
Instant messaging clients
1996 software
AIM (software) clients
AOL
BlackBerry software
IOS software
Symbian software
2010 mergers and acquisitions
Mergers and acquisitions of Israeli companies
Android (operating system) software
Formerly proprietary software
1996 establishments in Israel |
23954565 | https://en.wikipedia.org/wiki/IAcademy | IAcademy | Information and Communications Technology Academy, better known as iAcademy (stylized as iACADEMY) is a private, non-sectarian educational institution in the Philippines. The college offers specialized senior high school and undergraduate programs in fields relating to computer science, game development, multimedia arts, animation, and business management.
The college has two campuses, with the recent iACADEMY Nexus along Yakal and the previous Buendia Campus that is currently being renovated, both in the Central Business District of Makati.
History
Founded in 2002, iACADEMY offers specialized degree programs in BS Computer Science with specialization in Software Engineering, BS Computer Science with specialization in Cloud Computing Specialization Track in partnership with amazon Web Services, BS Computer Science with specialization in Data Science Specialization track, BS Information Technology with specialization in Web Development, BS Bachelor of Science in Entertainment
and Multimedia Computing Game Development, BS Business Administration with specialization in Marketing Management, BS in Accountancy, BS in Real Estate Management, BA in Psychology, BA Fashion Design and Technology, BA Multimedia Arts and Design, BS in Animation, BA in Film
and Visual Effects, and in 2007 iACADEMY was granted permission by the Commission on Higher Education, to offer the first Bachelor of Science animation program in the Philippines. is the one of the first college institutions in the Philippines offering BS Animation. iACADEMY's School of Continuing Education offers similar short courses aimed at working professionals.
iACADEMY uses an industry-aligned curriculum in its degree programs that is focused in Computing, Business, and Design. The four-year programs culminate in a six-month, 960-hour internship program that the students have to go through before graduating.
By 2014, iACADEMY moved to a new and bigger campus in Buendia to house its growing student population. On the same year, iACADEMY signed a Memorandum of Understanding with Aboitiz Weather Philippines to develop a website and application for a faster and more user-friendly experience on weather reports.
iACADEMY was also able to lock down a study tour partnership with Polimoda, Italy's leading school of Fashion and Marketing, as well as a transfer program with De Paul University in Chicago, USA. The school also, together with the Animation Council of the Philippines (ACPI) also hosted the Animahenasyon 2014, the biggest Animation Festival in the Philippines, drawing thousands of students and professionals to the event.
In 2018, due to its growing population, iACADEMY opens its second campus, iACADEMY Nexus, on Yakal Street, Makati.
Partnership
In 2009, iACADEMY became an Authorized Training Partner of Wacom, a Japanese company that produces graphics tablets and related products.
In 2010, iACADEMY partnered with TV5 during the first automated elections in the Philippines. Together with DZRH Manila Broadcasting Radio, Manila Broadcasting Company (MBC), Legal Network for Truthful Elections (LENTE), Stratbase, Inc. Public Affairs and Research Consultancy Group, ePLDT, Inc., and Social Weather Stations (SWS), they worked to bring up-to-date election coverage. In the same year, the college was appointed the first IBM Software Center of Excellence in the ASEAN Region and the first Lotus Academic Institute.
In 2011, iACADEMY was chosen by Solar Entertainment Corporation to be the official partner-school and workspace of the third season of Project Runway Philippines. In 2019, the school becomes the first and only Toon Boom Center of Excellence in Asia.
Academics
The college offers four Senior High School tracks, offering ten programs, and three schools that offers ten undergraduate degree programs in computer sciences, business managements, and arts. These programs offered include fields mainly in arts, computer science, and business management.
SHS Strands
There are four tracks that are being offered in iACADEMY. First is the Academic Track, which offers two strands in Accountancy Business and Management (ABM) and Humanities and Social Sciences (HUMSS), second is the Technical Vocational (Tech-Voc) Track, which offers four strands in Computer Programming (Software Development), Animation, Fashion Design, and Graphic Illustration, third is the Arts and Design Track offers two strands in Multimedia Arts and Audio Production, and last is the Science, Technology, Engineering, and Math (STEM) Track, which only offers Robotics as its strand.
School of Computing
The School of Computing is the first IBM Center of Excellence (CoE) in the ASEAN region and the official Microsoft Training Center in the Philippines. The school offers three Bachelor of Science degrees in Computer Science (Software Engineering) with specialization in Software Engineering Specialization track, Cloud Computing Specialization Track in partnership with amazon Web Services, or Data Science Specialization track, Entertainment and Multimedia Computing (Game Development), and IT (Web Development).
School of Business and Liberal Arts
The School of Business and Liberal Arts offers three Bachelor of Science degrees in Business Administration
with Specialization in Marketing Management, Accountancy, Real Estate Management, and one Bachelor of Arts degree in Psychology.
School of Design
The School of Design is the first to offer an animation program in the Philippines and the only Toon Boom Center of Excellence in Asia. It is also partnered with Wacom Authorized Training Partners to provide students with the latest technologies. The school offers a Bachelor of Science degree in Animation and two Bachelor of Arts degrees in Multimedia Arts and Design, Fashion Design and Technology, Film
and Visual Effects, and Music Production, which began in the school year 2021-2022.
Student life
The senior high school program follows the semester calendar which usually starts from August and ends in June, while the college follows a trimester calendar starting from July. New students are offered to join SOAR (Student Orientation and Registration), an event that is held a week before the start of classes, to introduce the students around the campus.
Traditions
SOAR (Student Orientation and Registration) - An event to orient new students to the school
Creative Camp - Free art workshops
Battle League - Gaming competition to promote the Game Development industry
Student organizations
Senior High School
Anime Habu
Basic Integrated Theater Arts Guild of iACT (BiTAG)
CTRL Dance Troupe
iACADEMY Contribute, Connect, Continuum (iCON)
iACADEMY Junior Software Developers Association (iJSDA)
iACADEMY Student Council (CS)
Juniors Games Developers Association of iACADEMY (JGDA)
Magnates - SHS Chapter
OCTAVE - SHS Chapter
Prima - SHS Chapter
Sining na Nakglilikha ng Buhay (SinLikHay)
Student Athletes Society - SHS Chapter
The Spines
Vektor
VELOCiTY - SHS Chapter
Young Filmmakers Society of iACADEMY (YFS)
College
RHYTHM
Creative Society
Filmmakers Society of iACADEMY (FSi)
iACADEMY Making Positive Action (iMPACT)
iACADEMY Photography Society (Optics)
iACADEMY Student Council (CSO)
iACT
International Games Developers Association of iACADEMY (IGDA)
Magnates - College Chapter
OCTAVE - College Chapter
Pikzel Graphic Design
Prima - College Chapter
Software Engineering through Academics and Leadership (SEAL)
Student Athletes Society - College Chapter
References
External links
Official website
Art schools in the Philippines
Design schools
Information technology institutes
Educational institutions established in 2002
Universities and colleges in Makati
2002 establishments in the Philippines |
54398950 | https://en.wikipedia.org/wiki/2004%20Troy%20State%20Trojans%20football%20team | 2004 Troy State Trojans football team | The 2004 Troy State Trojans football team represented Troy State University in the 2004 NCAA Division I-A football season. The Trojans played their home games at Movie Gallery Stadium in Troy, Alabama and competed in the Sun Belt Conference. The 2004 season was Troy State's first season as a member of the Sun Belt Conference. Troy State also made their first ever appearance in a Division I-A bowl game during this season since the program transitioned to I-A just three years prior, in 2001. The Trojans lost 34–21 to Northern Illinois in the Silicon Valley Football Classic.
Schedule
References
Troy State
Troy Trojans football seasons
Sun Belt Conference football champion seasons
Troy State Trojans football |
23983155 | https://en.wikipedia.org/wiki/Personal%20Antivirus | Personal Antivirus | Personal Antivirus is rogue anti-virus software created by a company named Innovagest (sometimes referred to as "Innovagest 2000"), and is related to other rogue software. It claims to be an anti-virus program, but instead merely displays false warnings about virus and spyware infections, and demands money to clean these infections.
Description
A common way that Personal Antivirus installs itself on a computer is through a malicious pop-up ad (though it may also be installed as part of a malicious video codec package). When a user visits a website hosting a Personal Antivirus ad, a pop-up window appears, claiming to be scanning the computer for virus infections. This "scan" inevitably finds a number of virus infections. Afterward, the user is told that they need to buy Personal Antivirus to clean these infections, and is directed to a site that accepts payments. If the user decides to buy and install the program, Personal Antivirus claims to have repaired the infections, but also regularly advertises additional programs or demands more money at regular intervals.
New York Times Web Site
In September, 2009, the New York Times web site unwittingly started to randomly display ads related to Personal Antivirus. The New York Times uses a mix of in-house advertising and advertising networks to display ads on their web site. The person responsible for the ads originally requested that the New York Times run ads for Vonage VoIP service. Because Vonage had previously advertised directly with the New York Times, the ads were approved and were delivered via a third-party ad network that was unfamiliar to the Times.
On September 11, 2009, the Vonage ads that were originally approved switched to Personal Antivirus ads. These ads continued to be displayed throughout the following weekend. The ads were eventually stopped when the New York Times temporarily disabled ads displayed by third-party networks and investigated the source of the Personal Antivirus ads.
The New York Times later advised readers that using a reputable, properly-updated anti-virus program would likely resolve any lingering infections from Personal Antivirus. They also discovered that during the same weekend, other sites had experienced similar malicious ads, possibly including the web site of the San Francisco Chronicle.
References
Rogue software |
8485448 | https://en.wikipedia.org/wiki/Integrated%20modular%20avionics | Integrated modular avionics | Integrated modular avionics (IMA) are real-time computer network airborne systems. This network consists of a number of computing modules capable of supporting numerous applications of differing criticality levels.
In opposition to traditional federated architectures, the IMA concept proposes an integrated architecture with application software portable across an assembly of common hardware modules. An IMA architecture imposes multiple requirements on the underlying operating system.
History
It is believed that the IMA concept originated with the avionics design of the fourth-generation jet fighters. It has been in use in fighters such as F-22 and F-35, or Dassault Rafale since the beginning of the '90s. Standardization efforts were ongoing at this time (see ASAAC or STANAG 4626), but no final documents were issued then.
First uses for this concept were in development for business jets and regional jets at the end of the 1990s and were seen flying at the beginning of the 2000s, but it had not been yet standardized.
The concept was then standardized and migrated to the commercial Airliner arena in the end of the 2000s (Airbus A380 then Boeing 787).
Architecture
IMA modularity simplifies the development process of avionics software:
As the structure of the modules network is unified, it is mandatory to use a common API to access the hardware and network resources, thus simplifying the hardware and software integration.
IMA concept also allows the Application developers to focus on the Application layer, reducing the risk of faults in the lower-level software layers.
As modules often share an extensive part of their hardware and lower-level software architecture, maintenance of the modules is easier than with previous specific architectures.
Applications can be reconfigured on spare modules if the primary module that supports them is detected faulty during operations, increasing the overall availability of the avionics functions.
Communication between the modules can use an internal high speed Computer bus, or can share an external network, such as ARINC 429 or ARINC 664 (part 7).
However, much complexity is added to the systems, which thus require novel design and verification approaches since applications with different criticality levels share hardware and software resources such as CPU and network schedules, memory, inputs and outputs. Partitioning is generally used in order to help segregate mixed criticality applications and thus ease the verification process.
ARINC 650 and ARINC 651 provide general purpose hardware and software standards used in an IMA architecture. However, parts of the API involved in an IMA network has been standardized, such as:
ARINC 653 for the software avionics partitioning constraints to the underlying Real-time operating system (RTOS), and the associated API
Certification considerations
RTCA DO-178C and RTCA DO-254 form the basis for flight certification today, while DO-297 gives specific guidance for Integrated modular avionics. ARINC 653 contributes by providing a framework that enables each software building block (called a partition) of the overall Integrated modular avionics to be tested, validated, and qualified independently (up to a certain measure) by its supplier.
The FAA CAST-32A position paper provides information (not official guidance) for certification of multicore systems, but does not specifically address IMA with multicore. A research paper by VanderLeest and Matthews addresses implementation of IMA principles for multicore"
Examples of IMA architecture
Examples of aircraft avionics that uses IMA architecture :
Airbus A220 : Rockwell Collins Pro Line Fusion
Airbus A350
Airbus A380
Airbus A400M
ATR 42
ATR 72
BAE Hawk (Hawk 128 AJT)
Boeing 777 : includes AIMS avionics from Honeywell Aerospace
Boeing 787 : GE Aviation Systems (formerly Smiths Aerospace) IMA architecture is called Common Core System
Boeing 777X: will include the Common Core System from GE Aviation
Bombardier Global 5000 / 6000 : Rockwell Collins Pro Line Fusion
Dassault Falcon 900, Falcon 2000, and Falcon 7X : Honeywell's IMA architecture is called MAU (Modular Avionics Units), and the overall platform is called EASy
F-22 Raptor
Gulfstream G280: Rockwell Collins Pro Line Fusion
Rafale : Thales IMA architecture is called MDPU (Modular Data Processing Unit)
Sukhoi Superjet 100
COMAC C919
See also
Annex: Acronyms and abbreviations in avionics
OSI model
Cockpit display system
ARINC 653 : a standard API for avionics applications
Def Stan 00-74 : ASAAC standard for IMA Systems Software
STANAG 4626
References
IMA Publications & Whitepapers
"Transitioning from Federated Avionics Architectures to Integrated Modular Avionics", Christopher B. Watkins, Randy Walter, 26th Digital Avionics Systems Conference (DASC), Dallas, Texas, October 2007.
"Advancing Open Standards in Integrated Modular Avionics: An Industry Analysis", Justin Littlefield-Lawwill, Ramanathan Viswanathan, 26th Digital Avionics Systems Conference (DASC), Dallas, Texas, October 2007.
"Application of a Civil Integrated Modular Architecture to Military Transport Aircraft", R. Ramaker, W. Krug, W. Phebus, 26th Digital Avionics Systems Conference (DASC), Dallas, Texas, October 2007.
"Integrating Modular Avionics: A New Role Emerges", Richard Garside, Joe F. Pighetti, 26th Digital Avionics Systems Conference (DASC), Dallas, Texas, October 2007.
"Integrated Modular Avionics: Managing the Allocation of Shared Intersystem Resources", Christopher B. Watkins, 25th Digital Avionics Systems Conference (DASC), Portland, Oregon, October 2006.
"Modular Verification: Testing a Subset of Integrated Modular Avionics in Isolation", Christopher B. Watkins, 25th Digital Avionics Systems Conference (DASC), Portland, Oregon, October 2006.
"Certification Concerns with Integrated Modular Avionics (IMA) Projects", J. Lewis, L. Rierson, 22nd Digital Avionics Systems Conference (DASC), October 2003.
Other External links
What is integrated avionics ?
Avionics
Aircraft instruments
Modularity |
46664449 | https://en.wikipedia.org/wiki/SnakeHead%20Software%2C%20LLC | SnakeHead Software, LLC | SnakeHead Software is an American mobile software development studio based in Austin, Texas.
History
SnakeHead Software was founded in October 2008 by Gerald Bailey. In December 2008 their combat flight simulator Flying Aces was released in Apple's App Store where it remained in the top 100 games for nearly two years. In February 2014, Austin App House (AAH) was created to develop mobile and web applications as an out-sourcing agency.
The company has built applications and games for clients including Volkswagen, Ford, Nissan, Toyota, RAM, FieldSolutions, Walton & Johnson, Byte and numerous other companies. SnakeHead Software has built several augmented reality apps for use within the automotive industry as well as social media, personal security and educational apps.
Games
On November 7, 2009, the company released Air Assault, a twist on the 1985 hit Airborne. In February 2010, Air Assault became the #2 app in the Apple App Store and now has over 5 million downloads. Other games by SnakeHead Software include iBob, Texas Tea and Guardian AlertME.
Acquisitions
The company has made a series of acquisitions including Techarati and Agile Poet. In October 2012, it acquired Techarati, an Austin-based mobile app developer founded in 2008 by Drew Moynihan, and in 2013, purchased Agile Poet, a mobile app development company. Agile Poet, which was founded by Joshua McClure, previously specialized in mobile payment gateways and building mobile apps for corporate clients. In April 2013, the transaction was reversed.
References
Rob Heidrick, "SnakeHead Software". Community Impact, April 2, 2010.
Christoper Calnan, "Game On". Austin Business Journal, May 21, 2010.
Companies based in Austin, Texas |
4260161 | https://en.wikipedia.org/wiki/EAX%20mode | EAX mode | EAX mode (encrypt-then-authenticate-then-translate) is a mode of operation for cryptographic block ciphers. It is an Authenticated Encryption with Associated Data (AEAD) algorithm designed to simultaneously provide both authentication and privacy of the message (authenticated encryption) with a two-pass scheme, one pass for achieving privacy and one for authenticity for each block.
EAX mode was submitted on October 3, 2003 to the attention of NIST in order to replace CCM as standard AEAD mode of operation, since CCM mode lacks some desirable attributes of EAX and is more complex.
Encryption and authentication
EAX is a flexible nonce-using two-pass AEAD scheme with no restrictions on block cipher primitive to be used, nor on block size, and supports arbitrary-length messages. Authentication tag length is arbitrarily sizeable up to the used cipher's block size.
The block cipher primitive is used in CTR mode for encryption and as OMAC for authentication over each block through the EAX composition method, that may be seen as a particular case of a more general algorithm called EAX2 and described in The EAX Mode of Operation
The reference implementation in the aforementioned paper uses AES in CTR mode for encryption combined with AES OMAC for authentication.
Performance
Being a two-pass scheme, EAX mode is slower than a well designed one-pass scheme based on the same primitives.
EAX mode has several desirable attributes, notably:
provable security (dependent on the security of the underlying primitive cipher);
message expansion is minimal, being limited to the overhead of the tag length;
using CTR mode means the cipher need be implemented only for encryption, in simplifying implementation of some ciphers (especially desirable attribute for hardware implementation);
the algorithm is "on-line", that means that can process a stream of data, using constant memory, without knowing total data length in advance;
the algorithm can pre-process static Associated Data (AD), useful for encryption/decryption of communication session parameters (where session parameters may represent the Associated Data).
Notably, CCM mode lacks the last 2 attributes (CCM can process Associated Data, it can't pre-process it).
Patent status
The authors of EAX mode, Mihir Bellare, Phillip Rogaway, and David Wagner placed the work under public domain and have stated that they were unaware of any patents covering this technology. Thus, EAX mode of operation is believed to be free and unencumbered for any use.
Use
A modification of the EAX mode, so called EAX′ or EAXprime, is used in the ANSI C12.22 standard for transport of meter-based data over a network. In 2012 Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita and Tetsu Iwata published a paper that proves the security of the mode with messages longer than the key, but demonstrates a trivial attack against short messages using this mode. It is not possible to create vulnerable short messages compliant with the ANSI C12.22 standard, but in other contexts in which such short messages are possible, EAXprime cannot be securely used.
See also
Authenticated Encryption with Associated Data (AEAD)
Authenticated Encryption (AE)
CCM mode
CTR mode
OMAC
References
External links
NIST: Block Cipher Modes
A Critique of CCM (February 2003)
Software implementations
C++: Dr. Brian Gladman's crypto library implementing EAX mode of operation
Pascal / Delphi: Wolfgang Ehrhardt's crypto library implementing EAX mode of operation
Java: BouncyCastle crypto library implementing EAX mode of operation
C: libtomcrypt implementing EAX mode of operation
Hardware implementations
Block cipher modes of operation
Authenticated-encryption schemes |
3678080 | https://en.wikipedia.org/wiki/Steve%20Riley%20%28American%20football%29 | Steve Riley (American football) | Steven Bruce Riley (November 23, 1952 – September 16, 2021) was an American professional football player who was an offensive tackle for 10 seasons with the Minnesota Vikings of the National Football League (NFL).
High school career
Riley went to Castle Park High School in Chula Vista, California where he was a standout athlete on both the high school varsity basketball and football teams. Castle Park High School fielded very strong football teams. In his senior year, he was one of the co-captains and helped his team win the San Diego CIF championship. He also made first-team all-CIF and was voted offensive lineman of the year in his conference.
College career
Riley was recruited by Notre Dame, Colorado, New Mexico State, and San Diego State, among others. He played college football at the University of Southern California from 1970 to 1974. As a junior he started at tackle and was a part of the historic undefeated 1972 USC Trojans team.
He played in two Rose Bowls, one of those being the 1973 Rose Bowl, where the USC Trojans defeated the Ohio State Buckeyes, 42-17, to become the national champions. The 1972 USC Trojans team is regarded by some as the best college football team ever.
Professional career
Riley was picked 25th overall in the first round of the 1974 NFL draft by the Minnesota Vikings. He played 11 seasons, all with the Vikings, from 1974 to 1984. He appeared in 138 games, making 128 starts. He was a part of the 1974 and 1976 NFC championship teams. He played in Super Bowls IX and XI.
Riley took over the starting left tackle position in 1976 and started every game until early 1978 when a neck injury put him on the injured reserve game for 11 games. Riley returned to full-time duty in 1979 and started every game for the next five seasons. Over his career, Riley helped the Vikings reach the playoffs seven times. He started in Super Bowl XI to cap that season and helped Minnesota advance to the 1977 NFC Championship game.
In his last year, Riley started every game despite playing the entire season with his left hand in a cast because of a broken thumb. He started the first six games at left tackle however, in attempt to decrease the amount of contact to his injured hand, he was moved to right tackle for games 7 through 11. Riley went back to left tackle for the remainder of the season as his teammate said the blind side position was too challenging.
Awards and honors
While at USC, he earned All-American first team honors as a 1973 senior as the Trojans returned to the Rose Bowl. He then played in the 1974 College All-Star game.
Riley was voted by his teammates to be the recipient of the Ed Block Courage Award in 1984 largely in part of playing his entire last year with a broken thumb. His games played rank fourth-most in Vikings history among tackles.
Personal life
Riley resided in Southern California after his retirement where he owned a commercial property maintenance business in Irvine.
He appeared as an extra in the movies, "The Bear Bryant Story", "North Dallas Forty", and "Against All Odds".
He was married to his wife, Jan for 40 years. He had four daughters and ten grandchildren.
References
1952 births
2021 deaths
Sportspeople from Chula Vista, California
Players of American football from California
American football offensive tackles
USC Trojans football players
All-American college football players
Minnesota Vikings players |
198584 | https://en.wikipedia.org/wiki/Laptop | Laptop | A laptop, laptop computer, or notebook computer is a small, portable personal computer (PC) with a screen and alphanumeric keyboard. These typically have a clam shell form factor with the screen mounted on the inside of the upper lid and the keyboard on the inside of the lower lid, although 2-in-1 PCs with a detachable keyboard are often marketed as laptops or as having a laptop mode. Laptops are folded shut for transportation, and thus are suitable for mobile use. Its name comes from lap, as it was deemed practical to be placed on a person's lap when being used. Today, laptops are used in a variety of settings, such as at work, in education, for playing games, web browsing, for personal multimedia, and general home computer use.
As of 2021, in American English, the terms 'laptop computer' and 'notebook computer' are used interchangeably; in other dialects of English one or the other may be preferred. Although the terms 'notebook computers' or 'notebooks' originally referred to a specific size of laptop (originally smaller and lighter than mainstream laptops of the time), the terms have come to mean the same thing and notebook no longer refers to any specific size.
Laptops combine all the input/output components and capabilities of a desktop computer, including the display screen, small speakers, a keyboard, data storage device, sometimes an optical disc drive, pointing devices (such as a touch pad or pointing stick), with an operating system, a processor and memory into a single unit. Most modern laptops feature integrated webcams and built-in microphones, while many also have touchscreens. Laptops can be powered either from an internal battery or by an external power supply from an AC adapter. Hardware specifications, such as the processor speed and memory capacity, significantly vary between different types, models and price points.
Design elements, form factor and construction can also vary significantly between models depending on the intended use. Examples of specialized models of laptops include rugged notebooks for use in construction or military applications, as well as low production cost laptops such as those from the One Laptop per Child (OLPC) organization, which incorporate features like solar charging and semi-flexible components not found on most laptop computers. Portable computers, which later developed into modern laptops, were originally considered to be a small niche market, mostly for specialized field applications, such as in the military, for accountants, or traveling sales representatives. As portable computers evolved into modern laptops, they became widely used for a variety of purposes.
History
As the personal computer (PC) became feasible in 1971, the idea of a portable personal computer soon followed. A "personal, portable information manipulator" was imagined by Alan Kay at Xerox PARC in 1968, and described in his 1972 paper as the "Dynabook". The IBM Special Computer APL Machine Portable (SCAMP) was demonstrated in 1973. This prototype was based on the IBM PALM processor. The IBM 5100, the first commercially available portable computer, appeared in September 1975, and was based on the SCAMP prototype.
As 8-bit CPU machines became widely accepted, the number of portables increased rapidly. The first "laptop-sized notebook computer" was the Epson HX-20, invented (patented) by Suwa Seikosha's Yukio Yokozawa in July 1980, introduced at the COMDEX computer show in Las Vegas by Japanese company Seiko Epson in 1981, and released in July 1982. It had an LCD screen, a rechargeable battery, and a calculator-size printer, in a chassis, the size of an A4 notebook. It was described as a "laptop" and "notebook" computer in its patent.
The portable micro computer Portal of the French company R2E Micral CCMC officially appeared in September 1980 at the Sicob show in Paris. It was a portable microcomputer designed and marketed by the studies and developments department of R2E Micral at the request of the company CCMC specializing in payroll and accounting. It was based on an Intel 8085 processor, 8-bit, clocked at 2 MHz. It was equipped with a central 64 KB RAM, a keyboard with 58 alphanumeric keys and 11 numeric keys (separate blocks), a 32-character screen, a floppy disk: capacity = 140,000 characters, of a thermal printer: speed = 28 characters / second, an asynchronous channel, asynchronous channel, a 220 V power supply. It weighed 12 kg and its dimensions were 45 x 45 x 15 cm. It provided total mobility. Its operating system was aptly named Prologue.
The Osborne 1, released in 1981, was a luggable computer that used the Zilog Z80 and weighed . It had no battery, a cathode ray tube (CRT) screen, and dual single-density floppy drives. Both Tandy/RadioShack and Hewlett Packard (HP) also produced portable computers of varying designs during this period. The first laptops using the flip form factor appeared in the early 1980s. The Dulmont Magnum was released in Australia in 1981–82, but was not marketed internationally until 1984–85. The US$8,150 (US$ today) GRiD Compass 1101, released in 1982, was used at NASA and by the military, among others. The Sharp PC-5000, Ampere and Gavilan SC released in 1983. The Gavilan SC was described as a "laptop" by its manufacturer, while the Ampere had a modern clamshell design. The Toshiba T1100 won acceptance not only among PC experts but the mass market as a way to have PC portability.
From 1983 onward, several new input techniques were developed and included in laptops, including the touch pad (Gavilan SC, 1983), the pointing stick (IBM ThinkPad 700, 1992), and handwriting recognition (Linus Write-Top, 1987). Some CPUs, such as the 1990 Intel i386SL, were designed to use minimum power to increase battery life of portable computers and were supported by dynamic power management features such as Intel SpeedStep and AMD PowerNow! in some designs.
Displays reached 640x480 (VGA) resolution by 1988 (Compaq SLT/286), and color screens started becoming a common upgrade in 1991, with increases in resolution and screen size occurring frequently until the introduction of 17" screen laptops in 2003. Hard drives started to be used in portables, encouraged by the introduction of 3.5" drives in the late 1980s, and became common in laptops starting with the introduction of 2.5" and smaller drives around 1990; capacities have typically lagged behind physically larger desktop drives.
Common resolutions of laptop webcams are 720p (HD), and in lower-end laptops 480p. The earliest known laptops with 1080p (Full HD) webcams like the Samsung 700G7C were released in the early 2010s.
Optical disc drives became common in full-size laptops around 1997; this initially consisted of CD-ROM drives, which were supplanted by CD-R, DVD, and Blu-ray drives with writing capability over time. Starting around 2011, the trend shifted against internal optical drives, and as of 2021, they have largely disappeared; they are still readily available as external peripherals.
Etymology
While the terms laptop and notebook are used interchangeably today, there is some question as to the original etymology and specificity of either term—the term laptop appears to have been coined in the early 1980s to describe a mobile computer which could be used on one's lap, and to distinguish these devices from earlier and much heavier, portable computers (informally called "luggables"). The term "notebook" appears to have gained currency somewhat later as manufacturers started producing even smaller portable devices, further reducing their weight and size and incorporating a display roughly the size of A4 paper; these were marketed as notebooks to distinguish them from bulkier mainstream or desktop replacement laptops.
Types
Since the introduction of portable computers during the late 1970s, their form has changed significantly, spawning a variety of visually and technologically differing subclasses. Except where there is a distinct legal trademark around a term (notably, Ultrabook), there are rarely hard distinctions between these classes and their usage has varied over time and between different sources. Since the late 2010s, the use of more specific terms has become less common, with sizes distinguished largely by the size of the screen.
Smaller and Larger Laptops
There were in the past a number of marketing categories for smaller and larger laptop computers; these included "subnotebook" models, low cost "netbooks", and "Ultra-mobile PCs" where the size class overlapped with devices like smartphone and handheld tablets, and "Desktop replacement" laptops for machines notably larger and heavier than typical to operate more powerful processors or graphics hardware. All of these terms have fallen out of favor as the size of mainstream laptops has gone down and their capabilities have gone up; except for niche models, laptop sizes tend to be distinguished by the size of the screen, and for more powerful models, by any specialized purpose the machine is intended for, such as a "gaming laptop" or a "mobile workstation" for professional use.
Convertible, hybrid, 2-in-1
The latest trend of technological convergence in the portable computer industry spawned a broad range of devices, which combined features of several previously separate device types. The hybrids, convertibles, and 2-in-1s emerged as crossover devices, which share traits of both tablets and laptops. All such devices have a touchscreen display designed to allow users to work in a tablet mode, using either multi-touch gestures or a stylus/digital pen.
Convertibles are devices with the ability to conceal a hardware keyboard. Keyboards on such devices can be flipped, rotated, or slid behind the back of the chassis, thus transforming from a laptop into a tablet. Hybrids have a keyboard detachment mechanism, and due to this feature, all critical components are situated in the part with the display. 2-in-1s can have a hybrid or a convertible form, often dubbed 2-in-1 detachable and 2-in-1 convertibles respectively, but are distinguished by the ability to run a desktop OS, such as Windows 10. 2-in-1s are often marketed as laptop replacement tablets.
2-in-1s are often very thin, around , and light devices with a long battery life. 2-in-1s are distinguished from mainstream tablets as they feature an x86-architecture CPU (typically a low- or ultra-low-voltage model), such as the Intel Core i5, run a full-featured desktop OS like Windows 10, and have a number of typical laptop I/O ports, such as USB 3 and Mini DisplayPort.
2-in-1s are designed to be used not only as a media consumption device but also as valid desktop or laptop replacements, due to their ability to run desktop applications, such as Adobe Photoshop. It is possible to connect multiple peripheral devices, such as a mouse, keyboard, and several external displays to a modern 2-in-1.
Microsoft Surface Pro-series devices and Surface Book are examples of modern 2-in-1 detachable, whereas Lenovo Yoga-series computers are a variant of 2-in-1 convertibles. While the older Surface RT and Surface 2 have the same chassis design as the Surface Pro, their use of ARM processors and Windows RT do not classify them as 2-in-1s, but as hybrid tablets. Similarly, a number of hybrid laptops run a mobile operating system, such as Android. These include Asus's Transformer Pad devices, examples of hybrids with a detachable keyboard design, which do not fall in the category of 2-in-1s.
Rugged laptop
A rugged laptop is designed to reliably operate in harsh usage conditions such as strong vibrations, extreme temperatures, and wet or dusty environments. Rugged laptops are bulkier, heavier, and much more expensive than regular laptops, and thus are seldom seen in regular consumer use.
Hardware
The basic components of laptops function identically to their desktop counterparts. Traditionally they were miniaturized and adapted to mobile use, although desktop systems increasingly use the same smaller, lower-power parts which were originally developed for mobile use. The design restrictions on power, size, and cooling of laptops limit the maximum performance of laptop parts compared to that of desktop components, although that difference has increasingly narrowed.
In general, laptop components are not intended to be replaceable or upgradable by the end-user, except for components that can be detached; in the past, batteries and optical drives were commonly exchangeable. This restriction is one of the major differences between laptops and desktop computers, because the large "tower" cases used in desktop computers are designed so that new motherboards, hard disks, sound cards, RAM, and other components can be added. Memory and storage can often be upgraded with some disassembly, but with the most compact laptops, there may be no upgradeable components at all.
Intel, Asus, Compal, Quanta, and some other laptop manufacturers have created the Common Building Block standard for laptop parts to address some of the inefficiencies caused by the lack of standards and inability to upgrade components.
The following sections summarizes the differences and distinguishing features of laptop components in comparison to desktop personal computer parts.
Display
Internally, a display is usually an LCD panel, although occasionally OLEDs are used. These interface to the laptop using the LVDS or embedded DisplayPort protocol, while externally, it can be a glossy screen or a matte (anti-glare) screen. As of 2021, mainstream consumer laptops tend to come with either 13" or 15"-16" screens; 14" models are more popular among business machines. Larger and smaller models are available, but less common – there is no clear dividing line in minimum or maximum size. Machines small enough to be handheld (screens in the 6–8" range) can be marketed either as very small laptops or "handheld PCs," while the distinction between the largest laptops and "All-in-One" desktops is whether they fold for travel.
Sizes
In the past, there was a broader range of marketing terms (both formal and informal) to distinguish between different sizes of laptops. These included Netbooks, subnotebooks, Ultra-mobile PC, and Desktop replacement computers; these are sometimes still used informally, although they are essentially dead in terms of manufacturer marketing.
Resolution
Having a higher resolution display allows more items to fit onscreen at a time, improving the user's ability to multitask, although at the higher resolutions on smaller screens, the resolution may only serve to display sharper graphics and text rather than increasing the usable area. Since the introduction of the MacBook Pro with Retina display in 2012, there have been an increase in the availability of "HiDPI" (or high Pixel density) displays; as of 2021, this is generally considered to be anything higher than 1920 pixels wide. This has increasingly converged around 4K (3840-pixel-wide) resolutions.
External displays can be connected to most laptops, and models with a Mini DisplayPort can handle up to three.
Refresh rates and 3D
The earliest laptops known to feature a display with doubled 120 Hz of refresh rate and active shutter 3D system were released in 2011 by Dell (M17x) and Samsung (700G7A).
Central processing unit
A laptop's central processing unit (CPU) has advanced power-saving features and produces less heat than one intended purely for desktop use. Mainstream laptop CPUs made after 2018 have four processor cores, although some inexpensive models still have 2-core CPUs, and 6-core and 8-core models are also available.
For the low price and mainstream performance, there is no longer a significant performance difference between laptop and desktop CPUs, but at the high end, the fastest desktop CPUs still substantially outperform the fastest laptop processors, at the expense of massively higher power consumption and heat generation; the fastest laptop processors top out at 56 watts of heat, while the fastest desktop processors top out at 150 watts.
There has been a wide range of CPUs designed for laptops available from both Intel, AMD, and other manufacturers. On non-x86 architectures, Motorola and IBM produced the chips for the former PowerPC-based Apple laptops (iBook and PowerBook). Between around 2000 to 2014, most full-size laptops had socketed, replaceable CPUs; on thinner models, the CPU was soldered on the motherboard and was not replaceable or upgradable without replacing the motherboard. Since 2015, Intel has not offered new laptop CPU models with pins to be interchangeable, preferring ball grid array chip packages which have to be soldered;and as of 2021, only a few rare models using desktop parts.
In the past, some laptops have used a desktop processor instead of the laptop version and have had high-performance gains at the cost of greater weight, heat, and limited battery life; this is not unknown as of 2021, but since around 2010, the practice has been restricted to small-volume gaming models. Laptop CPUs are rarely able to be overclocked; most use locked processors. Even on gaming models where unlocked processors are available, the cooling system in most laptops is often very close to its limits and there is rarely headroom for an overclocking–related operating temperature increase.
Graphical processing unit
On most laptops, a graphical processing unit (GPU) is integrated into the CPU to conserve power and space. This was introduced by Intel with the Core i-series of mobile processors in 2010, and similar accelerated processing unit (APU) processors by AMD later that year.
Before that, lower-end machines tended to use graphics processors integrated into the system chipset, while higher-end machines had a separate graphics processor. In the past, laptops lacking a separate graphics processor were limited in their utility for gaming and professional applications involving 3D graphics, but the capabilities of CPU-integrated graphics have converged with the low-end of dedicated graphics processors since the mid-2010s.
Higher-end laptops intended for gaming or professional 3D work still come with dedicated and in some cases even dual, graphics processors on the motherboard or as an internal expansion card. Since 2011, these almost always involve switchable graphics so that when there is no demand for the higher performance dedicated graphics processor, the more power-efficient integrated graphics processor will be used. Nvidia Optimus and AMD Hybrid Graphics are examples of this sort of system of switchable graphics.
Memory
Since around the year 2000, most laptops have used SO-DIMM RAM, although, as of 2021, an increasing number of models use memory soldered to the motherboard. Before 2000, most laptops used proprietary memory modules if their memory was upgradable.
In the early 2010s, high end laptops such as the 2011 Samsung 700G7A have passed the 10 GB RAM barrier, featuring 16 GB of RAM.
When upgradeable, memory slots are sometimes accessible from the bottom of the laptop for ease of upgrading; in other cases, accessing them requires significant disassembly. Most laptops have two memory slots, although some will have only one, either for cost savings or because some amount of memory is soldered. Some high-end models have four slots; these are usually mobile engineering workstations, although a few high-end models intended for gaming do as well.
As of 2021, 8 GB RAM is most common, with lower-end models occasionally having 4GB. Higher-end laptops may come with 16 GB of RAM or more.
Internal storage
The earliest laptops most often used floppy disk for storage, although a few used either RAM disks or tape, by the late 1980s hard disk drives had become the standard form of storage.
Between 1990 and 2009, almost all laptops typically had a hard disk drive (HDD) for storage; since then, solid-state drives (SSD) have gradually come to supplant hard drives in all but some inexpensive consumer models. Solid-state drives are faster and more power-efficient, as well as eliminating the hazard of drive and data corruption caused by a laptop's physical impacts, as they use no mechanical parts such as a rotational platter. In many cases, they are more compact as well. Initially, in the late 2000s, SSDs were substantially more expensive than HDDs, but as of 2021 prices on smaller capacity (under 1 terabyte) drives have converged; larger capacity drives remain more expensive than comparable-sized HDDs.
Since around 1990, where a hard drive is present it will typically be a 2.5-inch drive; some very compact laptops support even smaller 1.8-inch HDDs, and a very small number used 1" Microdrives. Some SSDs are built to match the size/shape of a laptop hard drive, but increasingly they have been replaced with smaller mSATA or M.2 cards. SSDs using the newer and much faster NVM Express standard for connecting are only available as cards.
As of 2021, many laptops no longer contain space for a 2.5" drive, accepting only M.2 cards; a few of the smallest have storage soldered to the motherboard. For those that can, they can typically contain a single 2.5-inch drive, but a small number of laptops with a screen wider than 15 inches can house two drives.
A variety of external HDDs or NAS data storage servers with support of RAID technology can be attached to virtually any laptop over such interfaces as USB, FireWire, eSATA, or Thunderbolt, or over a wired or wireless network to further increase space for the storage of data. Many laptops also incorporate a card reader which allows for use of memory cards, such as those used for digital cameras, which are typically SD or microSD cards. This enables users to download digital pictures from an SD card onto a laptop, thus enabling them to delete the SD card's contents to free up space for taking new pictures.
Removable media drive
Optical disc drives capable of playing CD-ROMs, compact discs (CD), DVDs, and in some cases, Blu-ray discs (BD), were nearly universal on full-sized models between the mid-1990s and the early 2010s. As of 2021, drives are uncommon in compact or premium laptops; they remain available in some bulkier models, but the trend towards thinner and lighter machines is gradually eliminating these drives and players – when needed they can be connected via USB instead.
Inputs
An alphanumeric keyboard is used to enter text, data, and other commands (e.g., function keys). A touchpad (also called a trackpad), a pointing stick, or both, are used to control the position of the cursor on the screen, and an integrated keyboard is used for typing. Some touchpads have buttons separate from the touch surface, while others share the surface. A quick double-tap is typically registered as a click, and operating systems may recognize multi-finger touch gestures.
An external keyboard and mouse may be connected using a USB port or wirelessly, via Bluetooth or similar technology. Some laptops have multitouch touchscreen displays, either available as an option or standard. Most laptops have webcams and microphones, which can be used to communicate with other people with both moving images and sound, via web conferencing or video-calling software.
Laptops typically have USB ports and a combined headphone/microphone jack, for use with headphones, a combined headset, or an external mic. Many laptops have a card reader for reading digital camera SD cards.
Input/output (I/O) ports
On a typical laptop there are several USB ports; if they use only the older USB connectors instead of USB-C, they will typically have an external monitor port (VGA, DVI, HDMI or Mini DisplayPort or occasionally more than one), an audio in/out port (often in form of a single socket) is common. It is possible to connect up to three external displays to a 2014-era laptop via a single Mini DisplayPort, using multi-stream transport technology.
Apple, in a 2015 version of its MacBook, transitioned from a number of different I/O ports to a single USB-C port. This port can be used both for charging and connecting a variety of devices through the use of aftermarket adapters. Google, with its updated version of Chromebook Pixel, shows a similar transition trend towards USB-C, although keeping older USB Type-A ports for a better compatibility with older devices. Although being common until the end of the 2000s decade, Ethernet network port are rarely found on modern laptops, due to widespread use of wireless networking, such as Wi-Fi. Legacy ports such as a PS/2 keyboard/mouse port, serial port, parallel port, or FireWire are provided on some models, but they are increasingly rare. On Apple's systems, and on a handful of other laptops, there are also Thunderbolt ports, but Thunderbolt 3 uses USB-C. Laptops typically have a headphone jack, so that the user can connect external headphones or amplified speaker systems for listening to music or other audio.
Expansion cards
In the past, a PC Card (formerly PCMCIA) or ExpressCard slot for expansion was often present on laptops to allow adding and removing functionality, even when the laptop is powered on; these are becoming increasingly rare since the introduction of USB 3.0. Some internal subsystems such as Ethernet, Wi-Fi, or a wireless cellular modem can be implemented as replaceable internal expansion cards, usually accessible under an access cover on the bottom of the laptop. The standard for such cards is PCI Express, which comes in both mini and even smaller M.2 sizes. In newer laptops, it is not uncommon to also see Micro SATA (mSATA) functionality on PCI Express Mini or M.2 card slots allowing the use of those slots for SATA-based solid-state drives.
Battery and power supply
Since the late 1990s, laptops have typically used lithium ion or lithium polymer batteries, These replaced the older nickel metal-hydride typically used in the 1990s, and nickel–cadmium batteries used in most of the earliest laptops. A few of the oldest laptops used non-rechargeable batteries, or lead–acid batteries.
Battery life is highly variable by model and workload and can range from one hour to nearly a day. A battery's performance gradually decreases over time; a substantial reduction in capacity is typically evident after one to three years of regular use, depending on the charging and discharging pattern and the design of the battery. Innovations in laptops and batteries have seen situations in which the battery can provide up to 24 hours of continued operation, assuming average power consumption levels. An example is the HP EliteBook 6930p when used with its ultra-capacity battery.
Laptops with removable batteries may support larger replacement batteries with extended capacity.
A laptop's battery is charged using an external power supply, which is plugged into a wall outlet. The power supply outputs a DC voltage typically in the range of 7.2—24 volts. The power supply is usually external and connected to the laptop through a DC connector cable. In most cases, it can charge the battery and power the laptop simultaneously. When the battery is fully charged, the laptop continues to run on power supplied by the external power supply, avoiding battery use. If the used power supply is not strong enough to power computing components and charge the battery simultaneously, the battery may charge in a shorter period of time if the laptop is turned off or sleeping. The charger typically adds about to the overall transporting weight of a laptop, although some models are substantially heavier or lighter. Most 2016-era laptops use a smart battery, a rechargeable battery pack with a built-in battery management system (BMS). The smart battery can internally measure voltage and current, and deduce charge level and State of Health (SoH) parameters, indicating the state of the cells.
Power connectors
Historically, DC connectors, typically cylindrical/barrel-shaped coaxial power connectors have been used in laptops. Some vendors such as Lenovo made intermittent use of a rectangular connector.
Some connector heads feature a center pin to allow the end device to determine the power supply type by measuring the resistance between it and the connector's negative pole (outer surface). Vendors may block charging if a power supply is not recognized as original part, which could deny the legitimate use of universal third-party chargers.
With the advent of USB-C, portable electronics made increasing use of it for both power delivery and data transfer. Its support for 20 V (common laptop power supply voltage) and 5 A typically suffices for low to mid-end laptops, but some with higher power demands such as gaming laptops depend on dedicated DC connectors to handle currents beyond 5 A without risking overheating, some even above 10 A. Additionally, dedicated DC connectors are more durable and less prone to wear and tear from frequent reconnection, as their design is less delicate.
Cooling
Waste heat from the operation is difficult to remove in the compact internal space of a laptop. The earliest laptops used passive cooling; this gave way to heat sinks placed directly on the components to be cooled, but when these hot components are deep inside the device, a large space-wasting air duct is needed to exhaust the heat. Modern laptops instead rely on heat pipes to rapidly move waste heat towards the edges of the device, to allow for a much smaller and compact fan and heat sink cooling system. Waste heat is usually exhausted away from the device operator towards the rear or sides of the device. Multiple air intake paths are used since some intakes can be blocked, such as when the device is placed on a soft conforming surface like a chair cushion. Secondary device temperature monitoring may reduce performance or trigger an emergency shutdown if it is unable to dissipate heat, such as if the laptop were to be left running and placed inside a carrying case. Aftermarket cooling pads with external fans can be used with laptops to reduce operating temperatures.
Docking station
A docking station (sometimes referred to simply as a dock) is a laptop accessory that contains multiple ports and in some cases expansion slots or bays for fixed or removable drives. A laptop connects and disconnects to a docking station, typically through a single large proprietary connector. A docking station is an especially popular laptop accessory in a corporate computing environment, due to a possibility of a docking station transforming a laptop into a full-featured desktop replacement, yet allowing for its easy release. This ability can be advantageous to "road warrior" employees who have to travel frequently for work, and yet who also come into the office. If more ports are needed, or their position on a laptop is inconvenient, one can use a cheaper passive device known as a port replicator. These devices mate to the connectors on the laptop, such as through USB or FireWire.
Charging trolleys
Laptop charging trolleys, also known as laptop trolleys or laptop carts, are mobile storage containers to charge multiple laptops, netbooks, and tablet computers at the same time. The trolleys are used in schools that have replaced their traditional static computer labs suites of desktop equipped with "tower" computers, but do not have enough plug sockets in an individual classroom to charge all of the devices. The trolleys can be wheeled between rooms and classrooms so that all students and teachers in a particular building can access fully charged IT equipment.
Laptop charging trolleys are also used to deter and protect against opportunistic and organized theft. Schools, especially those with open plan designs, are often prime targets for thieves who steal high-value items. Laptops, netbooks, and tablets are among the highest–value portable items in a school. Moreover, laptops can easily be concealed under clothing and stolen from buildings. Many types of laptop–charging trolleys are designed and constructed to protect against theft. They are generally made out of steel, and the laptops remain locked up while not in use. Although the trolleys can be moved between areas from one classroom to another, they can often be mounted or locked to the floor or walls to prevent thieves from stealing the laptops, especially overnight.
Solar panels
In some laptops, solar panels are able to generate enough solar power for the laptop to operate. The One Laptop Per Child Initiative released the OLPC XO-1 laptop which was tested and successfully operated by use of solar panels. Presently, they are designing an OLPC XO-3 laptop with these features. The OLPC XO-3 can operate with 2 watts of electricity because its renewable energy resources generate a total of 4 watts. Samsung has also designed the NC215S solar–powered notebook that will be sold commercially in the U.S. market.
Accessories
A common accessory for laptops is a laptop sleeve, laptop skin, or laptop case, which provides a degree of protection from scratches. Sleeves, which are distinguished by being relatively thin and flexible, are most commonly made of neoprene, with sturdier ones made of low-resilience polyurethane. Some laptop sleeves are wrapped in ballistic nylon to provide some measure of waterproofing. Bulkier and sturdier cases can be made of metal with polyurethane padding inside and may have locks for added security. Metal, padded cases also offer protection against impacts and drops. Another common accessory is a laptop cooler, a device that helps lower the internal temperature of the laptop either actively or passively. A common active method involves using electric fans to draw heat away from the laptop, while a passive method might involve propping the laptop up on some type of pad so it can receive more airflow. Some stores sell laptop pads that enable a reclining person on a bed to use a laptop.
Modularity
Some of the components of earlier models of laptops can easily be replaced without opening completely its bottom part, such as keyboard, battery, hard disk, memory modules, CPU cooling fan, etc.
Some of the components of recent models of laptops reside inside. Replacing most of its components, such as keyboard, battery, hard disk, memory modules, CPU cooling fan, etc., requires removal of its either top or bottom part, removal of the motherboard, and returning them.
In some types, solder and glue are used to mount components such as RAM, storage, and batteries, making repairs additionally difficult.
Obsolete features
Features that certain early models of laptops used to have that are not available in most current laptops include:
Reset ("cold restart") button in a hole (needed a thin metal tool to press)
Instant power off button in a hole (needed a thin metal tool to press)
Integrated charger or power adapter inside the laptop
Floppy disk drive
Serial port
Parallel port
Modem
Shared PS/2 input device port
IrDA
S-video port
S/PDIF audio port
PC Card / PCMCIA slot
ExpressCard slot
CD/DVD Drives (starting with 2013 models)
VGA port (starting with 2013 models)
Comparison with desktops
Advantages
Portability is usually the first feature mentioned in any comparison of laptops versus desktop PCs. Physical portability allows a laptop to be used in many places—not only at home and the office but also during commuting and flights, in coffee shops, in lecture halls and libraries, at clients' locations or a meeting room, etc. Within a home, portability enables laptop users to move their devices from the living room to the dining room to the family room. Portability offers several distinct advantages:
Productivity: Using a laptop in places where a desktop PC cannot be used can help employees and students to increase their productivity on work or school tasks, such as an office worker reading their work e-mails during an hour-long commute by train, or a student doing their homework at the university coffee shop during a break between lectures, for example.
Immediacy: Carrying a laptop means having instant access to information, including personal and work files. This allows better collaboration between coworkers or students, as a laptop can be flipped open to look at a report, document, spreadsheet, or presentation anytime and anywhere.
Up-to-date information: If a person has more than one desktop PC, a problem of synchronization arises: changes made on one computer are not automatically propagated to the others. There are ways to resolve this problem, including physical transfer of updated files (using a USB flash memory stick or CD-ROMs) or using synchronization software over the Internet, such as cloud computing. However, transporting a single laptop to both locations avoids the problem entirely, as the files exist in a single location and are always up-to-date.
Connectivity: In the 2010s, a proliferation of Wi-Fi wireless networks and cellular broadband data services (HSDPA, EVDO and others) in many urban centers, combined with near-ubiquitous Wi-Fi support by modern laptops meant that a laptop could now have easy Internet and local network connectivity while remaining mobile. Wi-Fi networks and laptop programs are especially widespread at university campuses.
Other advantages of laptops:
Size: Laptops are smaller than desktop PCs. This is beneficial when space is at a premium, for example in small apartments and student dorms. When not in use, a laptop can be closed and put away in a desk drawer.
Low power consumption: Laptops are several times more power-efficient than desktops. A typical laptop uses 20–120 W, compared to 100–800 W for desktops. This could be particularly beneficial for large businesses, which run hundreds of personal computers thus multiplying the potential savings, and homes where there is a computer running 24/7 (such as a home media server, print server, etc.).
Quiet: Laptops are typically much quieter than desktops, due both to the components (quieter, slower 2.5-inch hard drives) and to less heat production leading to the use of fewer and slower cooling fans.
Battery: a charged laptop can continue to be used in case of a power outage and is not affected by short power interruptions and blackouts. A desktop PC needs an uninterruptible power supply (UPS) to handle short interruptions, blackouts, and spikes; achieving on-battery time of more than 20–30 minutes for a desktop PC requires a large and expensive UPS.
All-in-One: designed to be portable, most 2010-era laptops have all components integrated into the chassis (however, some small laptops may not have an internal CD/CDR/DVD drive, so an external drive needs to be used). For desktops (excluding all-in-ones) this is usually divided into the desktop "tower" (the unit with the CPU, hard drive, power supply, etc.), keyboard, mouse, display screen, and optional peripherals such as speakers.
Disadvantages
Compared to desktop PCs, laptops have disadvantages in the following areas:
Performance
While the performance of mainstream desktops and laptops are comparable, and the cost of laptops has fallen less rapidly than desktops, laptops remain more expensive than desktop PCs at the same performance level. The upper limits of performance of laptops remain much lower than the highest-end desktops (especially "workstation class" machines with two processor sockets), and "leading-edge" features usually appear first in desktops and only then, as the underlying technology matures, are adapted to laptops.
For Internet browsing and typical office applications, where the computer spends the majority of its time waiting for the next user input, even relatively low-end laptops (such as Netbooks) can be fast enough for some users. Most higher-end laptops are sufficiently powerful for high-resolution movie playback, some 3D gaming and video editing and encoding. However, laptop processors can be disadvantaged when dealing with a higher-end database, maths, engineering, financial software, virtualization, etc. This is because laptops use the mobile versions of processors to conserve power, and these lag behind desktop chips when it comes to performance. Some manufacturers work around this performance problem by using desktop CPUs for laptops.
Upgradeability
The upgradeability of laptops is very limited compared to thoroughly standardized desktops. In general, hard drives and memory can be upgraded easily. Optical drives and internal expansion cards may be upgraded if they follow an industry standard, but all other internal components, including the motherboard, CPU, and graphics, are not always intended to be upgradeable. Intel, Asus, Compal, Quanta and some other laptop manufacturers have created the Common Building Block standard for laptop parts to address some of the inefficiencies caused by the lack of standards. The reasons for limited upgradeability are both technical and economic. There is no industry-wide standard form factor for laptops; each major laptop manufacturer pursues its own proprietary design and construction, with the result that laptops are difficult to upgrade and have high repair costs. Moreover, starting with 2013 models, laptops have become increasingly integrated (soldered) with the motherboard for most of its components (CPU, SSD, RAM, keyboard, etc.) to reduce size and upgradeability prospects. Devices such as sound cards, network adapters, hard and optical drives, and numerous other peripherals are available, but these upgrades usually impair the laptop's portability, because they add cables and boxes to the setup and often have to be disconnected and reconnected when the laptop is on the move.
Ergonomics and health effects
Wrists
Prolonged use of laptops can cause repetitive strain injury because of their small, flat keyboard and trackpad pointing devices. Usage of separate, external ergonomic keyboards and pointing devices is recommended to prevent injury when working for long periods of time; they can be connected to a laptop easily by USB, Bluetooth or via a docking station. Some health standards require ergonomic keyboards at workplaces.
Neck and spine
A laptop's integrated screen often requires users to lean over for a better view, which can cause neck or spinal injuries. A larger and higher-quality external screen can be connected to almost any laptop to alleviate this and to provide additional screen space for more productive work. Another solution is to use a computer stand.
Possible effect on fertility
A study by State University of New York researchers found that heat generated from laptops can increase the temperature of the lap of male users when balancing the computer on their lap, potentially putting sperm count at risk. The study, which included roughly two dozen men between the ages of 21 and 35, found that the sitting position required to balance a laptop can increase scrotum temperature by as much as . However, further research is needed to determine whether this directly affects male sterility. A later 2010 study of 29 males published in Fertility and Sterility found that men who kept their laptops on their laps experienced scrotal hyperthermia (overheating) in which their scrotal temperatures increased by up to . The resulting heat increase, which could not be offset by a laptop cushion, may increase male infertility.
A common practical solution to this problem is to place the laptop on a table or desk or to use a book or pillow between the body and the laptop. Another solution is to obtain a cooling unit for the laptop. These are usually USB powered and consist of a hard thin plastic case housing one, two, or three cooling fans – with the entire assembly designed to sit under the laptop in question – which results in the laptop remaining cool to the touch, and greatly reduces laptop heat buildup.
Thighs
Heat generated from using a laptop on the lap can also cause skin discoloration on the thighs known as "toasted skin syndrome".
Durability
Laptops are less durable than desktops/PCs. However, the durability of the laptop depends on the user if proper maintenance is done then the laptop can work longer.
Equipment wear
Because of their portability, laptops are subject to more wear and physical damage than desktops. Components such as screen hinges, latches, power jacks, and power cords deteriorate gradually from ordinary use and may have to be replaced. A liquid spill onto the keyboard, a rather minor mishap with a desktop system (given that a basic keyboard costs about US$20), can damage the internals of a laptop and destroy the computer, result in a costly repair or entire replacement of laptops. One study found that a laptop is three times more likely to break during the first year of use than a desktop. To maintain a laptop, it is recommended to clean it every three months for dirt, debris, dust, and food particles. Most cleaning kits consist of a lint-free or microfiber cloth for the LCD screen and keyboard, compressed air for getting dust out of the cooling fan, and a cleaning solution. Harsh chemicals such as bleach should not be used to clean a laptop, as they can damage it.
Heating and cooling
Laptops rely on extremely compact cooling systems involving a fan and heat sink that can fail from blockage caused by accumulated airborne dust and debris. Most laptops do not have any type of removable dust collection filter over the air intake for these cooling systems, resulting in a system that gradually conducts more heat and noise as the years pass. In some cases, the laptop starts to overheat even at idle load levels. This dust is usually stuck inside where the fan and heat sink meet, where it can not be removed by a casual cleaning and vacuuming. Most of the time, compressed air can dislodge the dust and debris but may not entirely remove it. After the device is turned on, the loose debris is reaccumulated into the cooling system by the fans. Complete disassembly is usually required to clean the laptop entirely. However, preventative maintenance such as regular cleaning of the heat sink via compressed air can prevent dust build-up on the heat sink. Many laptops are difficult to disassemble by the average user and contain components that are sensitive to electrostatic discharge (ESD).
Battery life
Battery life is limited because the capacity drops with time, eventually requiring replacement after as little as a year. A new battery typically stores enough energy to run the laptop for three to five hours, depending on usage, configuration, and power management settings. Yet, as it ages, the battery's energy storage will dissipate progressively until it lasts only a few minutes. The battery is often easily replaceable and a higher capacity model may be obtained for longer charging and discharging time. Some laptops (specifically ultrabooks) do not have the usual removable battery and have to be brought to the service center of their manufacturer or a third-party laptop service center to have their battery replaced. Replacement batteries can also be expensive.
Security and privacy
Because they are valuable, commonly used, portable, and easy to hide in a backpack or other type of travel bag, laptops are often stolen. Every day, over 1,600 laptops go missing from U.S. airports. The cost of stolen business or personal data, and of the resulting problems (identity theft, credit card fraud, breach of privacy), can be many times the value of the stolen laptop itself. Consequently, the physical protection of laptops and the safeguarding of data contained on them are both of great importance. Most laptops have a Kensington security slot, which can be used to tether them to a desk or other immovable object with a security cable and lock. In addition, modern operating systems and third-party software offer disk encryption functionality, which renders the data on the laptop's hard drive unreadable without a key or a passphrase. As of 2015, some laptops also have additional security elements added, including eye recognition software and fingerprint scanning components.
Software such as LoJack for Laptops, Laptop Cop, and GadgetTrack have been engineered to help people locate and recover their stolen laptops in the event of theft. Setting one's laptop with a password on its firmware (protection against going to firmware setup or booting), internal HDD/SSD (protection against accessing it and loading an operating system on it afterward), and every user account of the operating system are additional security measures that a user should do. Fewer than 5% of lost or stolen laptops are recovered by the companies that own them, however, that number may decrease due to a variety of companies and software solutions specializing in laptop recovery. In the 2010s, the common availability of webcams on laptops raised privacy concerns. In Robbins v. Lower Merion School District (Eastern District of Pennsylvania 2010), school-issued laptops loaded with special software enabled staff from two high schools to take secret webcam shots of students at home, via their students' laptops.
Sales
Manufacturers
There are many laptop brands and manufacturers. Several major brands that offer notebooks in various classes are listed in the adjacent box.
The major brands usually offer good service and support, including well-executed documentation and driver downloads that remain available for many years after a particular laptop model is no longer produced. Capitalizing on service, support, and brand image, laptops from major brands are more expensive than laptops by smaller brands and ODMs. Some brands specialize in a particular class of laptops, such as gaming laptops (Alienware), high-performance laptops (HP Envy), netbooks (EeePC) and laptops for children (OLPC).
Many brands, including the major ones, do not design and do not manufacture their laptops. Instead, a small number of Original Design Manufacturers (ODMs) design new models of laptops, and the brands choose the models to be included in their lineup. In 2006, 7 major ODMs manufactured 7 of every 10 laptops in the world, with the largest one (Quanta Computer) having 30% of the world market share. Therefore, identical models are available both from a major label and from a low-profile ODM in-house brand.
Market share
Battery-powered portable computers had just 2% worldwide market share in 1986. However, laptops have become increasingly popular, both for business and personal use. Around 109 million notebook PCs shipped worldwide in 2007, a growth of 33% compared to 2006. In 2008 it was estimated that 145.9 million notebooks were sold, and that the number would grow in 2009 to 177.7 million. The third quarter of 2008 was the first time when worldwide notebook PC shipments exceeded desktops, with 38.6 million units versus 38.5 million units.
May 2005 was the first time notebooks outsold desktops in the US over the course of a full month; at the time notebooks sold for an average of $1,131 while desktops sold for an average of $696. When looking at operating systems, for Microsoft Windows laptops the average selling price (ASP) showed a decline in 2008/2009, possibly due to low-cost netbooks, drawing an average US$689 at U.S. retail stores in August 2008. In 2009, ASP had further fallen to $602 by January and to $560 in February. While Windows machines ASP fell $129 in these seven months, Apple macOS laptop ASP declined just $12 from $1,524 to $1,512.
Disposal
The list of materials that go into a laptop computer is long, and many of the substances used, such as beryllium (used in beryllium-copper alloy contacts in some connectors and sockets), lead (used in lead-tin solder), chromium, and mercury (used in CCFL LCD backlights) compounds, are toxic or carcinogenic to humans. Although these toxins are relatively harmless when the laptop is in use, concerns that discarded laptops cause a serious health risk and toxic environmental damage, were so strong, that the Waste Electrical and Electronic Equipment Directive (WEEE Directive) in Europe specified that all laptop computers must be recycled by law. Similarly, the U.S. Environmental Protection Agency (EPA) has outlawed landfill dumping or the incinerating of discarded laptop computers.
Most laptop computers begin the recycling process with a method known as Demanufacturing, this involves the physical separation of the components of the laptop. These components are then either grouped into materials (e.g. plastic, metal and glass) for recycling or more complex items that require more advanced materials separation (e.g.) circuit boards, hard drives and batteries.
Corporate laptop recycling can require an additional process known as data destruction. The data destruction process ensures that all information or data that has been stored on a laptop hard drive can never be retrieved again. Below is an overview of some of the data protection and environmental laws and regulations applicable for laptop recycling data destruction:
Data Protection Act 1998 (DPA)
EU Privacy Directive (Due 2016)
Financial Conduct Authority
Sarbanes-Oxley Act
PCI-DSS Data Security Standard
Waste, Electronic & Electrical Equipment Directive (WEEE)
Basel Convention
Bank Secrecy Act (BSA)
FACTA Sarbanes-Oxley Act
FDA Security Regulations (21 C.F.R. part 11)
Gramm-Leach-Bliley Act (GLBA)
HIPAA (Health Insurance Portability and Accountability Act)
NIST SP 800–53
Add NIST SP 800–171
Identity Theft and Assumption Deterrence Act
Patriot Act of 2002
PCI Data Security Standard
US Safe Harbor Provisions
Various state laws
JAN 6/3
Gramm-leach-Bliley Act
DCID
Extreme use
The ruggedized Grid Compass computer was used since the early days of the Space Shuttle program. The first commercial laptop used in space was a Macintosh portable in 1991 aboard Space Shuttle mission STS-43. Apple and other laptop computers continue to be flown aboard crewed spaceflights, though the only long-duration flight certified computer for the International Space Station is the ThinkPad. As of 2011, over 100 ThinkPads were aboard the ISS. Laptops used aboard the International Space Station and other spaceflights are generally the same ones that can be purchased by the general public but needed modifications are made to allow them to be used safely and effectively in a weightless environment such as updating the cooling systems to function without relying on hot air rising and accommodation for the lower cabin air pressure. Laptops operating in harsh usage environments and conditions, such as strong vibrations, extreme temperatures, and wet or dusty conditions differ from those used in space in that they are custom designed for the task and do not use commercial off-the-shelf hardware.
See also
List of computer size categories
List of laptop brands and manufacturers
Netbook
Smartbook
Chromebook
Ultrabook
Smartphone
Subscriber Identity Module
Mobile broadband
Mobile Internet device (MID)
Personal digital assistant
VIA OpenBook
Tethering
XJACK
Open-source computer hardware
Novena
Portal laptop computer
Mobile modem
Stereoscopy glasses
Notes
References
Classes of computers
Japanese inventions
Mobile computers
Office equipment
Personal computers
1980s neologisms |
61496206 | https://en.wikipedia.org/wiki/1913%20Auckland%20Rugby%20League%20season | 1913 Auckland Rugby League season | The 1913 Auckland Rugby League season was the 5th season of the Auckland Rugby league.
The first grade competition began on 3 May with the same 6 teams that had competed in the 1912 season, however Manukau Rovers pulled out of the competition midway through the season as they struggled to put a full team on the field. The Eden Ramblers also pulled out at the same time. North Shore Albions were crowned champions for the first time.
Other clubs competing in lower grades were Otahuhu, Northcote Ramblers now known as the Northcote Tigers, and Ellerslie Wanderers, who later became known as the Ellerslie Eagles. A match was also played between Avondale and New Lynn in Avondale on 13 September. The match was won by New Lynn by 23 points to 8.
Switching codes
Karl Ifwersen switched from rugby union where he had been playing in Auckland and made his debut appearance for North Shore Albions. He was to go on to have a remarkable rugby league career and his scoring feats were un-rivalled through the 1910s in Auckland rugby league. While New Zealand representatives Graham Cook and Cecil King had moved from Wellington and made debut appearances for Newton Rangers.
Charles Savory controversy
In a match involving Ponsonby and Manukau in Onehunga, Charles Savory was accused of kicking an opponent. The incident was not seen by the referee but an Auckland Rugby League official claimed to have seen it and as a result Savory was banned for life by Auckland Rugby League. Savory had been selected to play for New Zealand on their tour of Australia and as a result of the ban was unable to make the trip. When the evidence was presented to New Zealand League they said that the evidence was not sufficient to justify the penalty and refused to confirm it. Auckland Rugby League then decided to strike Savory off the list of registered players thus making him ineligible to play in Auckland. Auckland selector Ronald MacDonald chose Savory to play against Wellington in their match on 23 August but was told at an Auckland Rugby League meeting that he was ineligible and they questioned why he had chosen him to play. MacDonald replied "one reason is because he is one of the best forwards in the Dominion. What was he suspended for?". A lengthy discussion followed and MacDonald refused to withdraw Savory's name from selection and a motion was then passed that MacDonald be removed from his position as Auckland selector. This was carried unanimously with Mr Angus Campbell appointed selector, and Morgan Hayward chosen to replace Savory in the side for the match with Wellington.
Death of Adolphus Theodore Bust whilst playing
Tragedy struck in May in a 3rd grade match between Ellerslie and Ponsonby when 26 year old Adolphus Theodore Bust was severely injured and later passed away as a result of his injuries. The death occurred at the Ellerslie Domain. He was said to have collided with an opposing player and the two of them fell to the ground with a third player falling on top of them. The other two men rose to their feet to carry on playing but Bust remained stationary on the ground. Dr. Baber was called to attend from his residence in Remuera but he found that Bust's spinal cord was fractured near the base of the skull and he recommended he be taken to hospital however Bust's father decided to have him taken to his home in Ellerslie. He was unable to be revived and died at 8.30am the following morning. After the incident the deceased father said he witnessed the incident and was satisfied that it was an accident. Martin Ellis, the player involved in the tackle said that he was running down the field and Bust was waiting to tackle him and had dived and caught Ellis by the legs but his neck struck him on the hip and they both fell to the ground. The coroner returned the verdict that nobody was to blame for the death. None of the Ellerslie teams took the field the following weekend out of respect.
Myers Cup (first grade competition)
Eighteen regular season matches were played before North Shore Albions were awarded the title with a 5 win, 1 draw, 1 loss record.
Myers Cup standings
Myers Cup fixtures
Round 1
Round 2
Round 3
Round 4
In the Ponsonby match with North Shore Harry Fricker was ordered off for striking an opponent. The act was missed by the referee but seen by the line umpire. The match between Manukau and Eden was reported as a win to Manukau and a win to Eden in differing reports.
Round 5
Manukau defaulted their match to North Shore Albions. The later arrived in Onehunga to find that their opponents could not muster a team. Jim Rukutai and other prominent players were said to be suffering from influenza. This was to be Manukau's last game in the senior grade for decades as they forfeited the following week along with Eden and dropped out of the senior competition. Rukutai was diagnosed with smallpox and was put into isolation in a Point Chevalier hospital. However it was soon after realised that he was actually suffering from a severe case of chicken pox and he made a full recovery soon after. Eden were to cease playing as a club a few seasons later and never returned.
Round 6
A somewhat unusual event occurred in the match between Ponsonby and North Shore when it was briefly suspended after a player from North Shore dropped his false teeth. He was inevitably subjected to some “good-natured banter from the crowd”.
Round 7
With Manukau and Eden both disbanding their senior teams Pullen from Manukau transferred to North Shore and played for them, while Don Kenealy of Eden transferred and played for City.
Knockout competition
After North Shore had won the championship the league decided to play a knockout competition between the four remaining teams. Newton and City both won their matches and progressed to the final.
Round 1
Knockout final
City were joined by Jim Rukutai for the match following Manukau's senior team disbanding.
Top try and point scorers
Scoring included both the first grade championship and the knockout matches. A large number of matches did not have the scorers named meaning the following lists are incomplete. Points missing are as follows: Newton Rangers (22), City Rovers (18), Ponsonby United (25), Eden Ramblers (15), and Manukau Rovers (18).
Exhibition Match
Hamilton v City Rovers
On July 19 City Rovers travelled to Hamilton to play the local side.
Avondale v New Lynn
On September 13 Avondale played New Lynn in their "annual football match". Several of the players including Bert and John Denyer, Kenealy, Bond, and Bob Biggs had played for the recently folded Eden Ramblers who were based in the Avondale/Point Chevalier area.
Thacker Shield
On 7 September North Shore Albions journeyed to Christchurch to play against Sydenham to play for the Thacker Shield. At the start of the season Dr. Thacker, president of the Canterbury league had presented the shield for competition amongst the senior clubs of Christchurch but he had stipulated that it was open to competition to any club in New Zealand. When North Shore won the Auckland championship they immediately issued a challenge to Sydenham. North Shore sent a strong team south but were without Karl Ifwersen and Stan Walters who were representing New Zealand against the touring New South Wales side.
Lower grades
Grades were made of the following teams with the winning team in bold:
Second Grade: City Rovers, Ellerslie United, Newton Rangers, North Shore Albions, Northcote Ramblers, Otahuhu United (runner up), Ponsonby United
Third Grade: City Rovers (runner up), Ellerslie United, Eden Ramblers A, Eden Ramblers B, Manukau Rovers A, Manukau Rovers B, North Shore Albions, Northcote Ramblers, Otahuhu United, Ponsonby United
Fourth Grade: City Rovers, Manukau Rovers, Newton Rangers, North Shore Albions, Otahuhu United, Ponsonby United
Representative season
1913 was a very busy year for the Auckland representative team as they played 10 matches recording a 7 win, 3 loss record. Their three defeats were against the touring New South Wales team and then on a two match end of season tour to Taranaki and Wellington.
The first representative fixture of the season was played on 28 June against a Country selection at Victoria Park, Auckland. Three thousand spectators attended and 117 pounds was collected. Further matches were played against Taranaki, Hawke's Bay, Nelson, Canterbury, Wellington, and New South Wales. Auckland also played an exhibition match in Pukekohe against the Auckland club champions North Shore Albions.
On August 9 Auckland Juniors beat Waikato Juniors 33-5 in Huntly.
Representative matches
Auckland v Waikato Country
Auckland v Taranaki (Northern Union C.C.)
Auckland V Hawke’s Bay (Northern Union C.C.)
Auckland V Nelson (Northern Union C.C.)
Auckland v Canterbury (Northern Union C.C.)
Auckland v North Shore Albions (exhibition match)
Auckland v Wellington (Northern Union C.C.)
Auckland v New South Wales
Auckland v Taranaki
Thomas McClymont injured his arm late in the first half and went off but came back on. Then early in the second half he retired permanently meaning Auckland only had 12 players. Bob Mitchell and Stan Walters joined the team in New Plymouth having left Wellington after the New Zealand match there. Karl Ifwersen was supposed to also join but he had been injured in New Zealand's match so went directly back to Auckland. George Seagar who had gone on tour was refereeing at late notice as Taranaki had been unable to organise a suitable referee. The Taranaki forwards were said to have dominated the match and while the Auckland backs played brilliantly they failed to finish many chances.
Auckland v Wellington
A player named 'Murdoch' appeared for Auckland and this is likely to have been the treasurer/manager of the Auckland side Adam Murdoch. There were no team lists in any of the newspapers and only 12 players were mentioned by name in the match reports. When Murdoch passed away in September of 1944 the Auckland Rugby League sent their condolences to his family. Those were Mansell, Cook, Woodward, Kenealy, Tobin, Seagar, Webb, Murdoch, Mitchell, Walters, Rukutai, and Denize. The other one who may have played is Clark, Manning, or Fricker who had all been with the touring side in Taranaki.
Auckland representative matches played and scorers
Adam Murdoch was a member of the Ponsonby United club but non-playing. Was on tour as manager for the Taranaki and Wellington games.
References
External links
Auckland Rugby League Official Site
Auckland Rugby League seasons
Auckland Rugby League |
End of preview. Expand
in Dataset Viewer.
- Downloads last month
- 47