List of Persons∗

Total Page:16

File Type:pdf, Size:1020Kb

List of Persons∗ List of Persons∗ Ramses II, (ca. 1290 – 1214 BC), Egyptian pharaoh of the 19th Dynasty of the New Kingdom who established one of the first libraries in his memorial temple, the “Ramesseum,“ as reported by historian Diodorus Siculus. Under his reign, Egypt reached an economic and cultural prosperity that no other pharaoh afterwards could achieve. Assurbanipal, (669 – 627 BC), Assyrian king who founded the first large-scale library in world history with over 20,000 inscribed clay tablets. Thales of Miletus, (640 BC – 546 BC), Greek philosopher, mathematician and astronomer (also merchant, statesman and engineer), he is generally considered to be the founder and progenitor of Greek philosophy and science. Among his many contributions was an important work on geometry (Thales Theorem). He calculated the height of the pyramids from the length of their shadows and is said to have pre- dicted the solar eclipse of 585 BC (in all probability relying on Babylonian knowledge of the so-called Saros Cycle, which states that an eclipse can occur every 233 lunar month). He was the first to describe the magnetic effect of static electricity produced by rubbing amber with a cloth (frictional electricity). Cyrus II, (601 – 535 BC), founder of the ancient empire of Persia who established one of the first fixed postal services in his kingdom, including stations for mounted messengers to change horses at intervals of a day’s journey. Aeschylus, (525 – 456 BC), Greek poet who described the first torch telegraphy in his tragedy “Agamemnon.“ This method of communication was purportedly used to report the Fall of Troy in Greece, in approx. 1184 BC. Cratinus, (520 – 423 BC), Greek comedy writer in whose work the term “library,“ to mean a collection of books, was found for the first time. He also introduced the rule that in a comedy three actors should always share the stage . Panini, (5th c. BC), Indian scholar who wrote the oldest surviving textbook on the grammar of Sanskirt, which is therefore recognized as the oldest grammar book ever written. In the 19th century his work on grammar, containing nearly 4,000 rules, was also known in European countries as a result of the British colonization of India and inspired grammar studies in other languages. Socrates, (approx. 470 – 399 BC), Greek philosopher who was concerned with the study of humankind and the possibilities of self-knowledge. None of his own writings ∗ in chronological order C. Meinel and H. Sack, Digital Communication, X.media.publishing, 347 DOI: 10.1007/978-3-642-54331-9, Ó Springer-Verlag Berlin Heidelberg 2014 348 List of Persons have survived. His pupils Plato and Xenophon reported on Socrates’ life and philo- sophy as well as his criticism on the invention of writing. Convicted on the charges of impiety and corrupting the minds of the youth, he was sentenced to death. Lysander,(†395 BC), Spartan statesman and general in the Peloponnesian and Co- rinthian Wars. The ancient historian Plutarch describes in his Lysander biography the use of a scytale to encrypt messages during the Peloponnesian War. Thucydides, (ca. 460 – 399 BC), Greek general and historian, who founded with his manuscript “The Peloponnesian War“ the scientific historiography in which he reported on communication via smoke signal from the Peloponnesian War (431 – 404 BC). Plato, (427 – 348 BC), Greek philosopher and Socrates’ pupil who, with his own pupil Aristotle, is considered as the most influential Greek philosopher. Between 387 and 367 BC he founded the “Academy,“ an educational institution in Athens that existed until 529 AD when it was abolished by Byzantine emperor Justinian. Above the entrance to his school was the epithet he had commissioned reading: “Let no one ignorant of mathematics enter here“. (actually geometry is meant). Plato considered mathematics to be the foundation of all eduction and training. He founded the school of thought known as Platonism, in which mathematical objects and structures have an existence independent of human thought. Beside making important contributions to the areas of philosophy, logic and the ideal state, Plato outline his criticism on the development of writing in his dialogue “Phaedrus.“ Aristotle, (384 – 322 BC), Greek mathematician, zoologist and philosopher. He is considered the founder of modern scientific work and was the first to describe, among other things, the principle of the pinhole camera. In 343 BC King Phillip of Mace- donia entrusted him with the education of his thirteen-year-old son who was later to become Alexander the Great. In 334 BC he founded his own school of philosophy at the Lyceum, a group of buildings and gardens dedicated to the god Apollo. It was known as the Peripatetic school, a name that was derived from the colonnades ([Gk.] peripatoi) where lessons were held. The canonical view of Aristotle’s zoological, ana- tomical and physiological writings held in the Middle Ages has affected advancement in these areas until modern times. Polybius, (208 – 120 BC), Greek historian who described using torch telegraphy as a means to transmit freely formulated messages. After achieving a leading political position, Polybios was deported to Rome. There he advanced in his station and eventually became advisor to the general Scipio the Younger, whom he accompanied on his campaigns. His most important work is the 40-volume history of Greece and Rome. Five volumes of this history exist today. Gaius Julius Caesar, (100 – 44 BC), Roman statesman and autocrat, he led Rome out of the age of revolutions and paved the way for the Roman Empire. The reforms he introduced include the Julian calender in 45 BC. Modified by Pope Gregory XIII in 1582 (with the support of the astronomer Sosigenes of Alexandria), it retained its validity within the Gregorian calender. He introduced the first daily newspaper in the western world, the “Acta Diurna.“The Roman historian Suetonius reported in his imperial biographies about Caesar’s implementation of a simple substitution encryp- tion method that was named after him. It was used to transport military messages. Each letter of the alphabet was substituted for another letter three positions away in the sequence. Marcus Vitruvius Pollio, (1st c. BC), Roman architect and writer. He is perhaps best known for his 10-volume work on the foundation of the Greek and Roman List of Persons 349 architecture, which had a considerable influence on the great architecture of the European Renaissance. In addition, Vitruvius was the first to compare the propagation of sound to the propagation of waves in water. Augustus, (31 BC – 14 AD), born Gaius Octavius, great-nephew and principal heir to Gaius Julius Caesar. Since 31 BC sole ruler of the Roman Empire and first Roman emperor, he institutionalized the “cursus publicus“ as the first regular postal service throughout the entire Mediterranean region. Plutarch, (45 – 125 AD), Greek writer and historian. In his biography of the Spartan commander Lysander he described the use of the scytale for transporting encrypted messages in the Peloponnesian War in the 5th century AD. Plutarch became famous for his imperial biographies, dual biographies – in which he juxtaposed a Greek biography with a Roman biography – and his moral writings. Gaius Suetonius Tranquillus, (45 – 125 AD), Roman writer and civil servant. In his imperial biography “De Vita Caesarum“ he describes how Julius Caesar used the simple substitution cipher, named after him, for the transmission of secret military messages. Ptolemy of Alexandria, (85 – 165 AD), Egyptian astronomer, mathematician and geographer. Among many other things he described the phenomenon of retina inertia, an essential concept for modern media such as film and television. His “Almagest“ is viewed as a ground-breaking work in astronomy and was a standard work until the 17th century. The geocentric world view, postulated in this work, prevented advances in astronomy for a considerable time due to the prevailing canonical position. Q. Septimius Florens Tertullianus, (approx. 160 – 220), was the first important Christian church writer in Latin. In around 205 he joined the early Christian move- ment of Montanism, named after its founder Montanus, at which time he composed theological and apologetic writings. He takes credit for being the first to use the word “alphabetum“ to describe the sum of all letters. Lucius Domitius Aurelianus, (214 – 275), Roman emperor who contributed in large part to the destruction of the great library of Alexandria while waging a campaign against Zenobia, the ruler of Palmyra (in modern-day Syria). Theophilus of Alexandria.,(†412), Christian patriarch of Alexandria. Acting on a decree of Emperor Theodosius, who ordered all pagan cults to be banned in the Roman Empire, he was responsible for having what remained of the Great Library of Alexandria torn down and the manuscripts burned as a testament to pagan beliefs. Theodosius I, (346 – 395), Christian Roman emperor, who was the last emperor to rule the Roman Empire in its entirety. He took strong measures against paganism, ordering the banning of all pagan cults and the closing of all pagan temples in 391. In an act of overzealousness, Theophilus, the patriarch of Alexandria, ordered what remained of the Great Library of Alexandria to be torn down. Its collection of manuscripts, seen as evidence of pagan beliefs, was burned. In the course of this imperial decree the Olympic Games were also declared a pagan cult and banned in 393. Publius Flavius Vegetius Renatus, (approx. 400), Roman veterinarian and war theo- rist who described the Roman version of an ancient optical telegraphic system. Mo- vable wooden beams were fastened to towers and messages exchanged by way of prearranged signals. His main work “Epitoma rei militaris“ deals with the art of war and siege technology. Its maxims have met with great interest throughout history and up to modern times.
Recommended publications
  • Data Compression: Dictionary-Based Coding 2 / 37 Dictionary-Based Coding Dictionary-Based Coding
    Dictionary-based Coding already coded not yet coded search buffer look-ahead buffer cursor (N symbols) (L symbols) We know the past but cannot control it. We control the future but... Last Lecture Last Lecture: Predictive Lossless Coding Predictive Lossless Coding Simple and effective way to exploit dependencies between neighboring symbols / samples Optimal predictor: Conditional mean (requires storage of large tables) Affine and Linear Prediction Simple structure, low-complex implementation possible Optimal prediction parameters are given by solution of Yule-Walker equations Works very well for real signals (e.g., audio, images, ...) Efficient Lossless Coding for Real-World Signals Affine/linear prediction (often: block-adaptive choice of prediction parameters) Entropy coding of prediction errors (e.g., arithmetic coding) Using marginal pmf often already yields good results Can be improved by using conditional pmfs (with simple conditions) Heiko Schwarz (Freie Universität Berlin) — Data Compression: Dictionary-based Coding 2 / 37 Dictionary-based Coding Dictionary-Based Coding Coding of Text Files Very high amount of dependencies Affine prediction does not work (requires linear dependencies) Higher-order conditional coding should work well, but is way to complex (memory) Alternative: Do not code single characters, but words or phrases Example: English Texts Oxford English Dictionary lists less than 230 000 words (including obsolete words) On average, a word contains about 6 characters Average codeword length per character would be limited by 1
    [Show full text]
  • Biographies of Computer Scientists
    1 Charles Babbage 26 December 1791 (London, UK) – 18 October 1871 (London, UK) Life and Times Charles Babbage was born into a wealthy family, and started his mathematics education very early. By . 1811, when he went to Trinity College, Cambridge, he found that he knew more mathematics then his professors. He moved to Peterhouse, Cambridge from where he graduated in 1814. However, rather than come second to his friend Herschel in the final examinations, Babbage decided not to compete for an honors degree. In 1815 he co-founded the Analytical Society dedicated to studying continental reforms of Newton's formulation of “The Calculus”. He was one of the founders of the Astronomical Society in 1820. In 1821 Babbage started work on his Difference Engine designed to accurately compile tables. Babbage received government funding to construct an actual machine, but they stopped the funding in 1832 when it became clear that its construction was running well over-budget George Schuetz completed a machine based on the design of the Difference Engine in 1854. On completing the design of the Difference Engine, Babbage started work on the Analytical Engine capable of more general symbolic manipulations. The design of the Analytical Engine was complete in 1856, but a complete machine would not be constructed for over a century. Babbage's interests were wide. It is claimed that he invented cow-catchers for railway engines, the uniform postal rate, a means of recognizing lighthouses. He was also interested in locks and ciphers. He was politically active and wrote many treatises. One of the more famous proposed the banning of street musicians.
    [Show full text]
  • Middleware in Action 2007
    Technology Assessment from Ken North Computing, LLC Middleware in Action Industrial Strength Data Access May 2007 Middleware in Action: Industrial Strength Data Access Table of Contents 1.0 Introduction ............................................................................................................. 2 Mature Technology .........................................................................................................3 Scalability, Interoperability, High Availability ...................................................................5 Components, XML and Services-Oriented Architecture..................................................6 Best-of-Breed Middleware...............................................................................................7 Pay Now or Pay Later .....................................................................................................7 2.0 Architectures for Distributed Computing.................................................................. 8 2.1 Leveraging Infrastructure ........................................................................................ 8 2.2 Multi-Tier, N-Tier Architecture ................................................................................. 9 2.3 Persistence, Client-Server Databases, Distributed Data ....................................... 10 Client-Server SQL Processing ......................................................................................10 Client Libraries ..............................................................................................................
    [Show full text]
  • Digital Communication Systems 2.2 Optimal Source Coding
    Digital Communication Systems EES 452 Asst. Prof. Dr. Prapun Suksompong [email protected] 2. Source Coding 2.2 Optimal Source Coding: Huffman Coding: Origin, Recipe, MATLAB Implementation 1 Examples of Prefix Codes Nonsingular Fixed-Length Code Shannon–Fano code Huffman Code 2 Prof. Robert Fano (1917-2016) Shannon Award (1976 ) Shannon–Fano Code Proposed in Shannon’s “A Mathematical Theory of Communication” in 1948 The method was attributed to Fano, who later published it as a technical report. Fano, R.M. (1949). “The transmission of information”. Technical Report No. 65. Cambridge (Mass.), USA: Research Laboratory of Electronics at MIT. Should not be confused with Shannon coding, the coding method used to prove Shannon's noiseless coding theorem, or with Shannon–Fano–Elias coding (also known as Elias coding), the precursor to arithmetic coding. 3 Claude E. Shannon Award Claude E. Shannon (1972) Elwyn R. Berlekamp (1993) Sergio Verdu (2007) David S. Slepian (1974) Aaron D. Wyner (1994) Robert M. Gray (2008) Robert M. Fano (1976) G. David Forney, Jr. (1995) Jorma Rissanen (2009) Peter Elias (1977) Imre Csiszár (1996) Te Sun Han (2010) Mark S. Pinsker (1978) Jacob Ziv (1997) Shlomo Shamai (Shitz) (2011) Jacob Wolfowitz (1979) Neil J. A. Sloane (1998) Abbas El Gamal (2012) W. Wesley Peterson (1981) Tadao Kasami (1999) Katalin Marton (2013) Irving S. Reed (1982) Thomas Kailath (2000) János Körner (2014) Robert G. Gallager (1983) Jack KeilWolf (2001) Arthur Robert Calderbank (2015) Solomon W. Golomb (1985) Toby Berger (2002) Alexander S. Holevo (2016) William L. Root (1986) Lloyd R. Welch (2003) David Tse (2017) James L.
    [Show full text]
  • Convention Program
    AAEESS 112244tthh CCOONNVVEENNTTIIOONN PPRROOGGRRAAMM May 17 – 20, 2008 RAI International Exhibition & Congress Centre, Amsterdam The AES has launched a new opportunity to recognize 1University of Salford, Salford, Greater student members who author technical papers. The Stu- Manchester, UK dent Paper Award Competition is based on the preprint 2ICW, Ltd., Wrexham, Wales, UK manuscripts accepted for the AES convention. Forty-two student-authored papers were nominated. This paper gives an account of work carried out The excellent quality of the submissions has made the to assess the effects of metallized film selection process both challenging and exhilarating. polypropylene crossover capacitors on key sonic The award-winning student paper will be honored dur- attributes of reproduced sound. The capacitors ing the convention, and the student-authored manuscript under investigation were found to be mechani- will be published in a timely manner in the Journal of the cally resonant within the audio frequency band, Audio Engineering Society. and results obtained from subjective listening Nominees for the Student Paper Award were required tests have shown this to have a measurable to meet the following qualifications: effect on audio delivery. The listening test methodology employed in this study evolved (a) The paper was accepted for presentation at the from initial ABX type tests with set program AES 124th Convention. material to the final A/B tests where trained test (b) The first author was a student when the work was subjects used program material that they were conducted and the manuscript prepared. familiar with. The main findings were that (c) The student author’s affiliation listed in the manu- capacitors used in crossover circuitry can exhibit script is an accredited educational institution.
    [Show full text]
  • A Practical Attack on Broadcast RC4
    A Practical Attack on Broadcast RC4 Itsik Mantin and Adi Shamir Computer Science Department, The Weizmann Institute, Rehovot 76100, Israel. {itsik,shamir}@wisdom.weizmann.ac.il Abstract. RC4is the most widely deployed stream cipher in software applications. In this paper we describe a major statistical weakness in RC4, which makes it trivial to distinguish between short outputs of RC4 and random strings by analyzing their second bytes. This weakness can be used to mount a practical ciphertext-only attack on RC4in some broadcast applications, in which the same plaintext is sent to multiple recipients under different keys. 1 Introduction A large number of stream ciphers were proposed and implemented over the last twenty years. Most of these ciphers were based on various combinations of linear feedback shift registers, which were easy to implement in hardware, but relatively slow in software. In 1987Ron Rivest designed the RC4 stream cipher, which was based on a different and more software friendly paradigm. It was integrated into Microsoft Windows, Lotus Notes, Apple AOCE, Oracle Secure SQL, and many other applications, and has thus become the most widely used software- based stream cipher. In addition, it was chosen to be part of the Cellular Digital Packet Data specification. Its design was kept a trade secret until 1994, when someone anonymously posted its source code to the Cypherpunks mailing list. The correctness of this unofficial description was confirmed by comparing its outputs to those produced by licensed implementations. RC4 has a secret internal state which is a permutation of all the N =2n possible n bits words.
    [Show full text]
  • Randomized Lempel-Ziv Compression for Anti-Compression Side-Channel Attacks
    Randomized Lempel-Ziv Compression for Anti-Compression Side-Channel Attacks by Meng Yang A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Applied Science in Electrical and Computer Engineering Waterloo, Ontario, Canada, 2018 c Meng Yang 2018 I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. ii Abstract Security experts confront new attacks on TLS/SSL every year. Ever since the compres- sion side-channel attacks CRIME and BREACH were presented during security conferences in 2012 and 2013, online users connecting to HTTP servers that run TLS version 1.2 are susceptible of being impersonated. We set up three Randomized Lempel-Ziv Models, which are built on Lempel-Ziv77, to confront this attack. Our three models change the determin- istic characteristic of the compression algorithm: each compression with the same input gives output of different lengths. We implemented SSL/TLS protocol and the Lempel- Ziv77 compression algorithm, and used them as a base for our simulations of compression side-channel attack. After performing the simulations, all three models successfully pre- vented the attack. However, we demonstrate that our randomized models can still be broken by a stronger version of compression side-channel attack that we created. But this latter attack has a greater time complexity and is easily detectable. Finally, from the results, we conclude that our models couldn't compress as well as Lempel-Ziv77, but they can be used against compression side-channel attacks.
    [Show full text]
  • Thomas Edison Alexander Graham Bell
    The Inventing Game Cut out the images. Cut out the name of the inventor separately. Read out the text as a clue. Can people match the correct name and image? THOMAS EDISON Clue The first great invention developed by (don’t say the name) Thomas Edison was the tin foil phonograph. A prolific producer, Edison is also known for his work with light bulbs, electricity, film and audio devices, and much more. ALEXANDER GRAHAM BELL Clue In 1876, at the age of 29, (don’t say the name) Alexander Graham Bell invented his telephone. Among one of his first innovations after the telephone was the "photophone," a device that enabled sound to be transmitted on a beam of light. GEORGE WASHINGTON CARVER Clue (Don’t say the name) George Washington Carver was an agricultural chemist who invented 300 uses for peanuts and hundreds of more uses for soybeans, pecans, and sweet potatoes. His contributions chang ed the history of agriculture in the south. ELI WHITNEY Clue (Don’t say the name) Eli Whitney invented the cotton gin in 1794. The cotton gin is a machine that separates seeds, hulls, and other unwanted materials from cotton after it has been picked. JOHANNES GUTTENBERG Clue (don’t say the name) Johannes Gutenberg was a German goldsmith and inventor best known for the Gutenberg press, an innovative printing machine that used movable type. JOHN LOGIE BAIRD Clue (don’t say the name) John Logie Baird is remembered as the inventor of mechanical television (an earlier version of television). Baird also patented inventions related to radar and fibre optics.
    [Show full text]
  • Principles of Communications ECS 332
    Principles of Communications ECS 332 Asst. Prof. Dr. Prapun Suksompong (ผศ.ดร.ประพันธ ์ สขสมปองุ ) [email protected] 1. Intro to Communication Systems Office Hours: Check Google Calendar on the course website. Dr.Prapun’s Office: 6th floor of Sirindhralai building, 1 BKD 2 Remark 1 If the downloaded file crashed your device/browser, try another one posted on the course website: 3 Remark 2 There is also three more sections from the Appendices of the lecture notes: 4 Shannon's insight 5 “The fundamental problem of communication is that of reproducing at one point either exactly or approximately a message selected at another point.” Shannon, Claude. A Mathematical Theory Of Communication. (1948) 6 Shannon: Father of the Info. Age Documentary Co-produced by the Jacobs School, UCSD- TV, and the California Institute for Telecommunic ations and Information Technology 7 [http://www.uctv.tv/shows/Claude-Shannon-Father-of-the-Information-Age-6090] [http://www.youtube.com/watch?v=z2Whj_nL-x8] C. E. Shannon (1916-2001) Hello. I'm Claude Shannon a mathematician here at the Bell Telephone laboratories He didn't create the compact disc, the fax machine, digital wireless telephones Or mp3 files, but in 1948 Claude Shannon paved the way for all of them with the Basic theory underlying digital communications and storage he called it 8 information theory. C. E. Shannon (1916-2001) 9 https://www.youtube.com/watch?v=47ag2sXRDeU C. E. Shannon (1916-2001) One of the most influential minds of the 20th century yet when he died on February 24, 2001, Shannon was virtually unknown to the public at large 10 C.
    [Show full text]
  • Proposal to Encode 0D5F MALAYALAM LETTER ARCHAIC II
    Proposal to encode 0D5F MALAYALAM LETTER ARCHAIC II Shriramana Sharma, jamadagni-at-gmail-dot-com, India 2012-May-22 §1. Introduction In the Malayalam Unicode encoding, the independent letter form for the long vowel Ī is: ഈ where the length mark ◌ൗ is appended to the short vowel ഇ to parallel the symbols for U/UU i.e. ഉ/ഊ. However, Ī was originally written as: As these are entirely different representations of Ī, although their sound value may be the same, it is proposed to encode the archaic form as a separate character. §2. Background As the core Unicode encoding for the major Indic scripts is based on ISCII, and the ISCII code chart for Malayalam only contained the modern form for the independent Ī [1, p 24]: … thus it is this written form that came to be encoded as 0D08 MALAYALAM LETTER II. While this “new” written form is seen in print as early as 1936 CE [2]: … there is no doubt that the much earlier form was parallel to the modern Grantha , both of which are derived from the old Grantha Ī as seen below: 1 ma - īdṛgvidhā | tatarāya īṇ Old Grantha from the Iḷaiyānputtūr copper plates [3, p 13]. Also seen is the Vatteḻuttu Ī of the same time (line 2, 2nd char from right) which also exhibits the two dots. Of course, both are derived from old South Indian Brahmi Ī which again has the two dots. It is said [entire paragraph: Radhakrishna Warrier, personal communication] that it was the poet Vaḷḷattōḷ Nārāyaṇa Mēnōn (1878–1958) who introduced the new form of Ī ഈ.
    [Show full text]
  • Alphabetization† †† Wendy Korwin*, Haakon Lund** *119 W
    Knowl. Org. 46(2019)No.3 209 W. Korwin and H. Lund. Alphabetization Alphabetization† †† Wendy Korwin*, Haakon Lund** *119 W. Dunedin Rd., Columbus, OH 43214, USA, <[email protected]> **University of Copenhagen, Department of Information Studies, DK-2300 Copenhagen S Denmark, <[email protected]> Wendy Korwin received her PhD in American studies from the College of William and Mary in 2017 with a dissertation entitled Material Literacy: Alphabets, Bodies, and Consumer Culture. She has worked as both a librarian and an archivist, and is currently based in Columbus, Ohio, United States. Haakon Lund is Associate Professor at the University of Copenhagen, Department of Information Studies in Denmark. He is educated as a librarian (MLSc) from the Royal School of Library and Information Science, and his research includes research data management, system usability and users, and gaze interaction. He has pre- sented his research at international conferences and published several journal articles. Korwin, Wendy and Haakon Lund. 2019. “Alphabetization.” Knowledge Organization 46(3): 209-222. 62 references. DOI:10.5771/0943-7444-2019-3-209. Abstract: The article provides definitions of alphabetization and related concepts and traces its historical devel- opment and challenges, covering analog as well as digital media. It introduces basic principles as well as standards, norms, and guidelines. The function of alphabetization is considered and related to alternatives such as system- atic arrangement or classification. Received: 18 February 2019; Revised: 15 March 2019; Accepted: 21 March 2019 Keywords: order, orders, lettering, alphabetization, arrangement † Derived from the article of similar title in the ISKO Encyclopedia of Knowledge Organization Version 1.0; published 2019-01-10.
    [Show full text]
  • In the United States Bankruptcy Court for the District of Delaware
    Case 21-10527-JTD Doc 285 Filed 04/14/21 Page 1 of 68 IN THE UNITED STATES BANKRUPTCY COURT FOR THE DISTRICT OF DELAWARE ) In re: ) Chapter 11 ) CARBONLITE HOLDINGS LLC, et al.,1 ) Case No. 21-10527 (JTD) ) Debtors. ) (Jointly Administered) ) AFFIDAVIT OF SERVICE I, Victoria X. Tran, depose and say that I am employed by Stretto, the claims and noticing agent for the Debtors in the above-captioned case. On April 10, 2021, at my direction and under my supervision, employees of Stretto caused the following documents to be served via first-class mail on the service list attached hereto as Exhibit A, and via electronic mail on the service list attached hereto as Exhibit B: Notice of Proposed Sale or Sales of Substantially All of the Debtors’ Assets, Free and Clear of All Encumbrances, Other Than Assumed Liabilities, and Scheduling Final Sale Hearing Related Thereto (Docket No. 268) Notice of Proposed Assumption and Assignment of Designated Executory Contracts and Unexpired Leases (Docket No. 269) Furthermore, on April 10, 2021, at my direction and under my supervision, employees of Stretto caused the following documents to be served via first-class mail on the service list attached hereto as Exhibit C, and via electronic mail on the service list attached hereto as Exhibit D: Notice of Proposed Sale or Sales of Substantially All of the Debtors’ Assets, Free and Clear of All Encumbrances, Other Than Assumed Liabilities, and Scheduling Final Sale Hearing Related Thereto (Docket No. 268, Pages 1-4) Notice of Proposed Assumption and Assignment of Designated Executory Contracts and Unexpired Leases (Docket No.
    [Show full text]