Derctuo Derctuo-020201231, by Kragen Javier Sitaker, 02020

Total Page:16

File Type:pdf, Size:1020Kb

Derctuo Derctuo-020201231, by Kragen Javier Sitaker, 02020 Derctuo ⁘⁛⁛⁘ Kragen Javier Sitaker Buenos Aires December, 02020 Public domain work ⁘⁛⁛⁘ Derctuo is a book of notes on various topics, mostly science and engineering with some math, from the first year of the COVID-19 pandemic, 02020 CE. Its primary published form is a gzipped tarball of 9MB of HTML files and sources, although there’s also an inferior PDF version of about 1000 pages for reading on hand computers or printing. It uses a page size slightly smaller than standard for improved readability on hand computers. My original plan was to write a reproducible computation system so that the book would be entirely reproducible from a minimal computational core, allowing all of its calculations to be not only verified but also easily extended, reused, and studied. I didn’t get very far on that plan. Instead it’s mostly just about a quarter million words of dead text, with some static inline images, plus a bundled library of source material, which is not included in the PDF version. It contains some novel discoveries, but some of it is just my notes from exploring the enormous feast of knowledge now available on the internet to anyone who takes the time to taste of it, and some other parts are explorations that didn’t pan out — left here only as a cautionary tale to the next explorer. There are lots of notes in here that aren’t “finished” in the usual sense; they end in the middle of a sentence, or say “XXX”, or have a note in them that the foregoing is wrong in such-and-such a way. But I am publishing the final version of Derctuo today. I might make future versions of some of these notes, but not of Derctuo itself. Derctuo is the sequel to Dercuano, a larger collection of my notes which I published in 02019. Like Dercuano, Derctuo is lacking in scholarship: many of the notes reflect fields I understand poorly, and so often they fall victim to known pitfalls, and fail to describe how they relate to existing knowledge. It is best thought of as working notes published despite their incomplete state. Often in Derctuo, as in Dercuano, I refer to something being “published”. By this I generally mean “made public”. There’s a current fad in academia (over the last, say, half century) to use “published” to mean “brought up to the standards of scholarly publication and approved as such by means of scholarly peer review”. This is usually not what I mean. Public-domain dedication As far as I’m concerned, everyone is free to redistribute Derctuo, in whole or in part, modified or unmodified, with or without credit; I waive all rights associated with it to the maximum extent possible under applicable law. Where applicable, I abandon its copyright to the public domain. I wrote and published Derctuo in Argentina in 02020 (more conventionally called 2020, or 2020 AD). The exception to the above public-domain dedication is the ET Book font family used, licensed under the X11 license (p. 13). This doesn’t impede you from redistributing or modifying Derctuo but does prohibit you from removing the font’s copyright notice and license (unless you also remove the font). The PDF embeds part of FreeFont and of the DejaVu fonts, whose copyright notices are also included (p. 14), but DejaVu and FreeFont are not used in the HTML tarball. Gitlab At this writing, there’s a replica of this repo on Gitlab. Notes 02020-04 • Difficulty estimation of programming tasks (p. 16) 02020-04-20 (2 minutes) • Pure functional UI (p. 17) 02020-04-21 (4 minutes) • Pure functional VM (p. 19) 02020-04-21 (1 minute) • A reproducible vector-instruction VM? (p. 20) 02020-04-21 (updated 02020-06-17) (30 minutes) • Ballpoint SPIF (p. 36) 02020-04-25 (7 minutes) • Bitwise reproducibility (p. 39) 02020-04-25 (1 minute) 02020-05 • Reversible parsing (p. 40) 02020-05-11 (6 minutes) • Bloomtags: a Bloom-filter tree for efficient and flexible database queries (p. 44) 02020-05-13 (21 minutes) • Static hypertext on CCN (p. 51) 02020-05-16 (2 minutes) • Feeds or streams on CCNs (p. 52) 02020-05-16 (15 minutes) • Commit log transfer (p. 57) 02020-05-16 (1 minute) • One pass sort (p. 58) 02020-05-16 (15 minutes) • Optimized finger joints (p. 63) 02020-05-16 (4 minutes) • Solar furnace CPC (p. 65) 02020-05-16 (12 minutes) • Pandemic collapse (p. 69) 02020-05-17 (updated 02020-12-16) (22 minutes) • Font rendering with all-pass filters (p. 76) 02020-05-18 (7 minutes) • Single output build (p. 79) 02020-05-19 (4 minutes) • Electronics kit (p. 81) 02020-05-23 (updated 02020-12-20) (14 minutes) 02020-06 • Sodium silicate (p. 86) 02020-06-04 (32 minutes) • One big text file (p. 97) 02020-06-04 (updated 02020-06-06) (20 minutes) • Monoid prefix sum (p. 105) 02020-06-05 (13 minutes) • Writing a shopping list in TeX (p. 110) 02020-06-05 (4 minutes) • A 6-bit “variac casero” (p. 112) 02020-06-06 (22 minutes) • Tentative outline of a body of knowledge (p. 120) 02020-06-06 (updated 02020-10-28) (10 minutes) • Ghettobotics soldering iron (p. 124) 02020-06-17 (4 minutes) • An outline of the design process leading up to the Veskeno virtual machine (p. 126) 02020-06-17 (updated 02020-07-10) (88 minutes) • Convincingness (p. 164) 02020-06-20 (1 minute) • Lantern gears (p. 165) 02020-06-20 (updated 02020-06-28) (1 minute) • Segments and blocks (p. 166) 02020-06-20 (updated 02020-12-16) (51 minutes) • Slide rule addition (p. 183) 02020-06-22 (3 minutes) • Hacker calendar (p. 185) 02020-06-28 (updated 02020-12-03) (15 minutes) • Trying to drive a speaker with a buck converter (p. 191) 02020-06-29 (4 minutes) • Using Numpy for non-numerical computation: what would a good example be? (p. 193) 02020-06-29 (updated 02020-06-30) (3 minutes) 02020-07 • Modelica notes (p. 196) 02020-07-06 (updated 02020-07-07) (9 minutes) • Ultra machining (p. 200) 02020-07-06 (updated 02020-07-18) (5 minutes) • Importing the WHO’s COVID-19 data into SQLite (p. 202) 02020-07-10 (2 minutes) • Migrating app snapshots (p. 204) 02020-07-10 (updated 02020-07-11) (14 minutes) • Virtual machine setup (p. 209) 02020-07-10 (updated 02020-07-14) (17 minutes) • Long distance radio (p. 216) 02020-07-17 (19 minutes) • A generic universal entity-component simulatorium (p. 223) 02020-07-18 (1 minute) • Line-numbered ISAM buffers (p. 224) 02020-07-18 (updated 02020-07-23) (14 minutes) • Retro teletext (p. 229) 02020-07-18 (updated 02020-07-23) (18 minutes) • The orbital drive and stepped planetary drive (p. 235) 02020-07-28 (updated 02020-08-02) (10 minutes) 02020-08 • Fossil geothermal (p. 238) 02020-08-02 (updated 02020-11-13) (12 minutes) • Pyrolysis 3-D printing (p. 242) 02020-08-02 (updated 02020-11-24) (20 minutes) • Machine teeth (p. 251) 02020-08-02 (updated 02020-12-31) (8 minutes) • 3-D printing iron by electrodeposition? (p. 255) 02020-08-15 (11 minutes) • Peroxide and bleach (p. 259) 02020-08-15 (2 minutes) • Cyclic fabrication systems (p. 260) 02020-08-17 (updated 02020-09-10) (56 minutes) • Foil-marking glass (p. 277) 02020-08-18 (4 minutes) 02020-09 • Inductively-coupled plasma torches (p. 279) 02020-09-10 (5 minutes) • Oxygen generator rocket (p. 281) 02020-09-10 (1 minute) • Penalized bits (p. 282) 02020-09-10 (3 minutes) • Phosphate precipitation (p. 284) 02020-09-10 (12 minutes) • Notable quotes from Steinmetz’s 1892 hysteresis paper (p. 288) 02020-09-10 (2 minutes) • The programmable world (p. 289) 02020-09-10 (0 minutes) • Smart plumbing (p. 290) 02020-09-10 (updated 02020-09-12) (11 minutes) • Inorganic burnout (p. 294) 02020-09-11 (updated 02020-09-12) (18 minutes) • Micro material sorting (p. 300) 02020-09-12 (2 minutes) • Sparse sinc (p. 301) 02020-09-17 (12 minutes) • An index of the 1880 edition of Cooley’s Cyclopædia (p. 305) 02020-09-17 (updated 02020-10-23) (9 minutes) • Spark gap logic (p. 309) 02020-09-20 (updated 02020-12-16) (25 minutes) • Copper salts (p. 317) 02020-09-21 (updated 02020-09-23) (8 minutes) • Hot fabrication (p. 320) 02020-09-21 (updated 02020-09-23) (16 minutes) • Aluminum-air batteries (p. 326) 02020-09-23 (4 minutes) • A digital Dagarti might save your life (p. 328) 02020-09-23 (3 minutes) • Solar netting (p. 330) 02020-09-23 (9 minutes) • Mild bases (p. 333) 02020-09-23 (updated 02020-10-01) (3 minutes) • Magnesium fuel (p. 335) 02020-09-23 (updated 02020-10-09) (13 minutes) • Ancient batteries (p. 340) 02020-09-23 (updated 02020-12-31) (4 minutes) • Modern material processing (p. 342) 02020-09-24 (updated 02020-09-26) (8 minutes) • Materials shopping list (p. 345) 02020-09-25 (updated 02020-12-20) (1 minute) • Toolpath optimization (p. 347) 02020-09-27 (updated 02020-09-30) (19 minutes) • Reducing sucrose (p. 354) 02020-09-30 (7 minutes) • Wang tile chemicals (p. 357) 02020-09-30 (updated 02020-12-31) (2 minutes) 02020-10 • Scraping Sciencemadness (p. 358) 02020-10-01 (updated 02020-10-05) (4 minutes) • Prate thoughts (p. 361) 02020-10-02 (updated 02020-12-30) (12 minutes) • Secure Scuttlebutt is a cool idea whose realization has fatal flaws (p. 365) 02020-10-02 (updated 02020-12-31) (17 minutes) • Lithium fuel (p. 371) 02020-10-04 (7 minutes) • Globoflexia (p.
Recommended publications
  • Perlin Textures in Real Time Using Opengl Antoine Miné, Fabrice Neyret
    Perlin Textures in Real Time using OpenGL Antoine Miné, Fabrice Neyret To cite this version: Antoine Miné, Fabrice Neyret. Perlin Textures in Real Time using OpenGL. [Research Report] RR- 3713, INRIA. 1999, pp.18. inria-00072955 HAL Id: inria-00072955 https://hal.inria.fr/inria-00072955 Submitted on 24 May 2006 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE Perlin Textures in Real Time using OpenGL Antoine Mine´ Fabrice Neyret iMAGIS-IMAG, bat C BP 53, 38041 Grenoble Cedex 9, FRANCE [email protected] http://www-imagis.imag.fr/Membres/Fabrice.Neyret/ No 3713 juin 1999 THEME` 3 apport de recherche ISSN 0249-6399 Perlin Textures in Real Time using OpenGL Antoine Miné Fabrice Neyret iMAGIS-IMAG, bat C BP 53, 38041 Grenoble Cedex 9, FRANCE [email protected] http://www-imagis.imag.fr/Membres/Fabrice.Neyret/ Thème 3 — Interaction homme-machine, images, données, connaissances Projet iMAGIS Rapport de recherche n˚3713 — juin 1999 — 18 pages Abstract: Perlin’s procedural solid textures provide for high quality rendering of surface appearance like marble, wood or rock.
    [Show full text]
  • Virtual Machine Technologies and Their Application in the Delivery of ICT
    Virtual Machine Technologies and Their Application In The Delivery Of ICT William McEwan accq.ac.nz n Christchurch Polytechnic Institute of Technology Christchurch, New Zealand [email protected] ABSTRACT related areas - a virtual machine or network of virtual machines can be specially configured, allowing an Virtual Machine (VM) technology was first ordinary user supervisor rights, and it can be tested implemented and developed by IBM to destruction without any adverse effect on the corporation in the early 1960's as a underlying host system. mechanism for providing multi-user facilities This paper hopes to also illustrate how VM in a secure mainframe computing configurations can greatly reduce our dependency on environment. In recent years the power of special purpose, complex, and expensive laboratory personal computers has resulted in renewed setups. It also suggests the important additional role interest in the technology. This paper begins that VM and VNL is likely to play in offering hands-on by describing the development of VM. It practical experience to students in a distance e- discusses the different approaches by which learning environment. a VM can be implemented, and it briefly considers the advantages and disadvantages Keywords: Virtual Machines, operating systems, of each approach. VM technology has proven networks, e-learning, infrastructure, server hosting. to be extremely useful in facilitating the Annual NACCQ, Hamilton New Zealand July, 2002 www. Annual NACCQ, Hamilton New Zealand July, teaching of multiple operating systems. It th offers an alternative to the traditional 1. INTRODUCTION approaches of using complex combinations Virtual Machine (VM) technology is not new. It was of specially prepared and configured OS implemented on mainframe computing systems by the images installed via the network or installed IBM Corporation in the early 1960’s (Varian 1997 pp permanently on multiple partitions or on 3-25, Gribben 1989 p.2, Thornton 2000 p.3, Sugarman multiple physical hard drives.
    [Show full text]
  • Wikipedia, the Free Encyclopedia 03-11-09 12:04
    Tea - Wikipedia, the free encyclopedia 03-11-09 12:04 Tea From Wikipedia, the free encyclopedia Tea is the agricultural product of the leaves, leaf buds, and internodes of the Camellia sinensis plant, prepared and cured by various methods. "Tea" also refers to the aromatic beverage prepared from the cured leaves by combination with hot or boiling water,[1] and is the common name for the Camellia sinensis plant itself. After water, tea is the most widely-consumed beverage in the world.[2] It has a cooling, slightly bitter, astringent flavour which many enjoy.[3] The four types of tea most commonly found on the market are black tea, oolong tea, green tea and white tea,[4] all of which can be made from the same bushes, processed differently, and in the case of fine white tea grown differently. Pu-erh tea, a post-fermented tea, is also often classified as amongst the most popular types of tea.[5] Green Tea leaves in a Chinese The term "herbal tea" usually refers to an infusion or tisane of gaiwan. leaves, flowers, fruit, herbs or other plant material that contains no Camellia sinensis.[6] The term "red tea" either refers to an infusion made from the South African rooibos plant, also containing no Camellia sinensis, or, in Chinese, Korean, Japanese and other East Asian languages, refers to black tea. Contents 1 Traditional Chinese Tea Cultivation and Technologies 2 Processing and classification A tea bush. 3 Blending and additives 4 Content 5 Origin and history 5.1 Origin myths 5.2 China 5.3 Japan 5.4 Korea 5.5 Taiwan 5.6 Thailand 5.7 Vietnam 5.8 Tea spreads to the world 5.9 United Kingdom Plantation workers picking tea in 5.10 United States of America Tanzania.
    [Show full text]
  • Embedded DRAM
    Embedded DRAM Raviprasad Kuloor Semiconductor Research and Development Centre, Bangalore IBM Systems and Technology Group DRAM Topics Introduction to memory DRAM basics and bitcell array eDRAM operational details (case study) Noise concerns Wordline driver (WLDRV) and level translators (LT) Challenges in eDRAM Understanding Timing diagram – An example References Slide 1 Acknowledgement • John Barth, IBM SRDC for most of the slides content • Madabusi Govindarajan • Subramanian S. Iyer • Many Others Slide 2 Topics Introduction to memory DRAM basics and bitcell array eDRAM operational details (case study) Noise concerns Wordline driver (WLDRV) and level translators (LT) Challenges in eDRAM Understanding Timing diagram – An example Slide 3 Memory Classification revisited Slide 4 Motivation for a memory hierarchy – infinite memory Memory store Processor Infinitely fast Infinitely large Cycles per Instruction Number of processor clock cycles (CPI) = required per instruction CPI[ ∞ cache] Finite memory speed Memory store Processor Finite speed Infinite size CPI = CPI[∞ cache] + FCP Finite cache penalty Locality of reference – spatial and temporal Temporal If you access something now you’ll need it again soon e.g: Loops Spatial If you accessed something you’ll also need its neighbor e.g: Arrays Exploit this to divide memory into hierarchy Hit L2 L1 (Slow) Processor Miss (Fast) Hit Register Cache size impacts cycles-per-instruction Access rate reduces Slower memory is sufficient Cache size impacts cycles-per-instruction For a 5GHz
    [Show full text]
  • Fast, High Quality Noise
    The Importance of Being Noisy: Fast, High Quality Noise Natalya Tatarchuk 3D Application Research Group AMD Graphics Products Group Outline Introduction: procedural techniques and noise Properties of ideal noise primitive Lattice Noise Types Noise Summation Techniques Reducing artifacts General strategies Antialiasing Snow accumulation and terrain generation Conclusion Outline Introduction: procedural techniques and noise Properties of ideal noise primitive Noise in real-time using Direct3D API Lattice Noise Types Noise Summation Techniques Reducing artifacts General strategies Antialiasing Snow accumulation and terrain generation Conclusion The Importance of Being Noisy Almost all procedural generation uses some form of noise If image is food, then noise is salt – adds distinct “flavor” Break the monotony of patterns!! Natural scenes and textures Terrain / Clouds / fire / marble / wood / fluids Noise is often used for not-so-obvious textures to vary the resulting image Even for such structured textures as bricks, we often add noise to make the patterns less distinguishable Ех: ToyShop brick walls and cobblestones Why Do We Care About Procedural Generation? Recent and upcoming games display giant, rich, complex worlds Varied art assets (images and geometry) are difficult and time-consuming to generate Procedural generation allows creation of many such assets with subtle tweaks of parameters Memory-limited systems can benefit greatly from procedural texturing Smaller distribution size Lots of variation
    [Show full text]
  • Virtual Alpha User Guide for Avanti, Avantiflex, & Freeaxp 05-JAN-2018 Version 3.0: This Manual Covers All Releases of Avanti™, Avantiflex™ and Freeaxp™
    Migration Specialties International, Inc. 217 West 2nd Street, Florence, CO 81226-1403 +1 719-784-9196 E-mail: [email protected] www.MigrationSpecialties.com Continuity in Computing Virtual Alpha User Guide for Avanti, AvantiFlex, & FreeAXP 05-JAN-2018 Version 3.0: This manual covers all releases of Avanti™, AvantiFlex™ and FreeAXP™. This manual describes how to install and use Avanti, AvantiFlex, and FreeAXP, Migration Specialties' AlphaServer 400 hardware emulators. AvantiFlex and Avanti are commercial products that require purchase of a product license. AvantiFlex and Avanti include 30 days of manufacturer support after purchase and the option to buy an extended support contract. FreeAXP can be used for personal and commercial purposes. FreeAXP is unsupported without purchase of a support contract. If you have questions or problems with FreeAXP and have not purchased a support contract, visit the FreeAXP forum at the OpenVMS Hobbyist web site. Avanti & Avanti Flex Links Product Info: http://www.migrationspecialties.com/Emulator-Alpha.html User Guide: http://www.migrationspecialties.com/pdf/VirtualAlpha_UserGuide.pdf Release Notes: http://www.migrationspecialties.com/pdf/VirtualAlpha_ReleaseNotes.pdf License: http://www.migrationspecialties.com/pdf/AvantiLicense.pdf SPD: http://www.migrationspecialties.com/pdf/Avanti_SPD.pdf Pricing Guide: http://www.migrationspecialties.com/pdf/VirtualAlphaPricingGuide.pdf FreeAXP Links Product Info: http://www.migrationspecialties.com/FreeAXP.html User Guide: http://www.migrationspecialties.com/pdf/VirtualAlpha_UserGuide.pdf Release Notes: http://www.migrationspecialties.com/pdf/VirtualAlpha_ReleaseNotes.pdf License: http://www.migrationspecialties.com/pdf/FreeAXP_License.pdf SPD: http://www.migrationspecialties.com/pdf/FreeAXP_SPD.pdf User Forum: http://www.vmshobbyist.com/forum/viewforum.php?forum_id=163 Download: http://www.migrationspecialties.com/FreeAXP.html Copyright 2018, Migration Specialties.
    [Show full text]
  • Design and Control of a Large Modular Robot Hexapod
    Design and Control of a Large Modular Robot Hexapod Matt Martone CMU-RI-TR-19-79 November 22, 2019 The Robotics Institute School of Computer Science Carnegie Mellon University Pittsburgh, PA Thesis Committee: Howie Choset, chair Matt Travers Aaron Johnson Julian Whitman Submitted in partial fulfillment of the requirements for the degree of Master of Science in Robotics. Copyright © 2019 Matt Martone. All rights reserved. To all my mentors: past and future iv Abstract Legged robotic systems have made great strides in recent years, but unlike wheeled robots, limbed locomotion does not scale well. Long legs demand huge torques, driving up actuator size and onboard battery mass. This relationship results in massive structures that lack the safety, portabil- ity, and controllability of their smaller limbed counterparts. Innovative transmission design paired with unconventional controller paradigms are the keys to breaking this trend. The Titan 6 project endeavors to build a set of self-sufficient modular joints unified by a novel control architecture to create a spiderlike robot with two-meter legs that is robust, field- repairable, and an order of magnitude lighter than similarly sized systems. This thesis explores how we transformed desired behaviors into a set of workable design constraints, discusses our prototypes in the context of the project and the field, describes how our controller leverages compliance to improve stability, and delves into the electromechanical designs for these modular actuators that enable Titan 6 to be both light and strong. v vi Acknowledgments This work was made possible by a huge group of people who taught and supported me throughout my graduate studies and my time at Carnegie Mellon as a whole.
    [Show full text]
  • Chapter 6 : Memory System
    Computer Organization and Architecture Chapter 6 : Memory System Chapter – 6 Memory System 6.1 Microcomputer Memory Memory is an essential component of the microcomputer system. It stores binary instructions and datum for the microcomputer. The memory is the place where the computer holds current programs and data that are in use. None technology is optimal in satisfying the memory requirements for a computer system. Computer memory exhibits perhaps the widest range of type, technology, organization, performance and cost of any feature of a computer system. The memory unit that communicates directly with the CPU is called main memory. Devices that provide backup storage are called auxiliary memory or secondary memory. 6.2 Characteristics of memory systems The memory system can be characterised with their Location, Capacity, Unit of transfer, Access method, Performance, Physical type, Physical characteristics, Organisation. Location • Processor memory: The memory like registers is included within the processor and termed as processor memory. • Internal memory: It is often termed as main memory and resides within the CPU. • External memory: It consists of peripheral storage devices such as disk and magnetic tape that are accessible to processor via i/o controllers. Capacity • Word size: Capacity is expressed in terms of words or bytes. — The natural unit of organisation • Number of words: Common word lengths are 8, 16, 32 bits etc. — or Bytes Unit of Transfer • Internal: For internal memory, the unit of transfer is equal to the number of data lines into and out of the memory module. • External: For external memory, they are transferred in block which is larger than a word.
    [Show full text]
  • ICACC Abstracts Book
    The American Ceramic Society 42nd International Conference & Exposition on Advanced Ceramics and Composites ABSTRACT BOOK January 21–26, 2018 Daytona Beach, Florida Introduction This volume contains abstracts for over 900 presentations during the 42nd International Conference & Exposition on Advanced Ceramics & Composites in Daytona Beach, Florida. The abstracts are reproduced as submitted by authors, a format that provides for longer, more detailed descriptions of papers. The American Ceramic Society accepts no responsibility for the content or quality of the abstract content. Abstracts are arranged by day, then by symposium and session title. An Author Index appears at the back of this book. The Meeting Guide contains locations of sessions with times, titles and authors of papers, but not presentation abstracts. How to Use the Abstract Book Refer to the Table of Contents to determine page numbers on which specific session abstracts begin. At the beginning of each session are headings that list session title, location and session chair. Starting times for presentations and paper numbers precede each paper title. The Author Index lists each author and the page number on which their abstract can be found. Copyright © 2018 The American Ceramic Society (www.ceramics.org). All rights reserved. MEETING REGULATIONS The American Ceramic Society is a nonprofit scientific organization that facilitates whether in print, electronic or other media, including The American Ceramic Society’s the exchange of knowledge meetings and publication of papers for future reference. website. By participating in the conference, you grant The American Ceramic Society The Society owns and retains full right to control its publications and its meetings.
    [Show full text]
  • Freier Download BA 104 Als
    BAD 104 ALCHEMY Gone, gone, gone... [31 May 2019] Roky Erickson (The 13th Floor Elevators), 71 [01 Jun 2019] Michel Serres (Philosoph der Parasiten, Gemenge und Gemische), 88 [06 Jun 2019] Dr. John Mac Rebennack (the Night Tripper w/ New Orleans R&B), 77 [22 July 2019] Brigitte Kronauer (Teufelsbrück, Zwei schwarze Jäger), 78 [11 Sep 2019] Daniel Johnston (American singer-songwriter), 58 [30 Sep 2019] Gianni Lenoci (italienischer NowJazz-Pianist), 56 [06 Oct 2019] Ginger Baker (Trommelfeuerkopf bei Cream, Air Force...), 80 [03 Nov 2019] Katagiri Nobukazu (der Drummer von Ryorchestra) Hirnschlag BA's Top Ten 2019 Arashi - Jikan (PNL) d.o.o.r - Songs from a Darkness (poise) Fire! Orchestra - Arrival (Rune Grammofon) Kamilya Jubran & Werner Hasler - Wa (Everest) Land of Kush - Sand Enigma (Constellation) Les Comptes De Korsakoff - Nos Amers (Puzzle) MoE & Pinquins - Vi som elsket kaos (ConradSound) Stephanie Pan - Have Robot Dog, Will Travel (Arteksounds) Andrew Poppy - Hoarse Songs (Field Radio) La STPO - L'Empreinte (The Legacy) (Azafran Media) Die Macht eines Buches, ganz gleich welchen Buches, ... liegt darin, daß es eine offenstehende Tür ist, durch die man abhauen kann. Ich unterstreiche abhauen. Julien Green ...ein Kraut Schmerzenlos, einen Tropfen Todvorbei, einen Löffel Barmherzigkeit. Alles auf des Messers Schneide: Lachen, Weinen, Worte. Ernst Wiechert Honoré de Balzac - Verlorene Illusionen Karl Heinz Bohrer - Granatsplitter Charlotte Brontë - Erzählungen aus Angria Albert Camus - Der Fall ... Das Exil und das Reich Joseph Conrad - Taifun Jean-Pierre Gibrat - Mattéo: August 1936 André Gide - Die Verliese des Vatikan Julien Green - Der Geisterseher; Tagebücher 1996 bis 1998 Ernst Jünger - Eumeswil [nochmal] Daniel Kehlmann - Tyll Esther Kinsky - Hain Sibylle Lewitscharoff - Blumenberg Henry de Montherlant - Das Chaos und die Nacht [noch besser als beim ersten Mal] Walter Muschg - Tragische Literaturgeschichte Raymond Queneau - Mein Freund Pierrot Hugo Pratt - Corto Maltese: Das Goldene Haus von Samarkand ..
    [Show full text]
  • Apple2 Woz Sweet16info.Pdf
    www.6502.org: Source: Porting Sweet 16 11/5/04 10:25 PM [Return to Main Page] Porting Sweet 16 by Carsten Strotmann ([email protected]) [Up to Source Code Repository] Sweet 16 is a metaprocessor or "pseudo microprocessor" implemented in 6502 assembly language. Originallywritten by Steve Wozniak and used in the Apple II, Sweet 16 can also be ported to other 6502-based systemsto provide useful 16-bit functionality. This article includes the source code for Sweet 16, along with a brief history,programming instructions, and notes to help port it. This material was provided by Carsten Strotmann, who has built a working Atari Port of Sweet 16. Porting Sweet 16 The Story of Sweet 16 Sweet 16 - Introduction Sweet 16: A Pseudo 16-bit Microprocessor Description Instruction Descriptions Sweet 16 Opcode Summary Register Instructions Theory of Operation When is an RTS really a JSR? Opcode Subroutines Memory Allocation User Modifications Notes from Apple II System Description Sweet 16 S-C Macro Assembler Text Programming Model Sweet 16 Opcodes Porting Sweet 16 Sweet 16 is not a teen-magazine, nor is it a brand name for candy. It is areally tricky und useful extension to a 6502 computer. It was originallywritten by Apple's Steve "Woz" Wozniak and can be found in the ROM of someAPPLE ][ Computers. Sweet 16 is a kind of virtual machine that gives the 6502programmer a 16 bit extension to the CPU. Sweet 16 creates sixteen 16-bitregisters/pointers (in zero page) and new opcodes to use this registers.Although Sweet 16 is not as fast as standard 6502 code, it can reduce the codesize of your programms and ease programming.
    [Show full text]
  • Forensic Investigation of P2P Cloud Storage Services and Backbone For
    Forensic investigation of P2P cloud storage services and backbone for IoT networks : BitTorrent Sync as a case study Yee Yang, T, Dehghantanha, A, Choo, R and Yang, LK http://dx.doi.org/10.1016/j.compeleceng.2016.08.020 Title Forensic investigation of P2P cloud storage services and backbone for IoT networks : BitTorrent Sync as a case study Authors Yee Yang, T, Dehghantanha, A, Choo, R and Yang, LK Type Article URL This version is available at: http://usir.salford.ac.uk/id/eprint/40497/ Published Date 2016 USIR is a digital collection of the research output of the University of Salford. Where copyright permits, full text material held in the repository is made freely available online and can be read, downloaded and copied for non-commercial private study or research purposes. Please check the manuscript for any further copyright restrictions. For more information, including our policy and submission procedure, please contact the Repository Team at: [email protected]. Note: This is authors accepted copy – for final article please refer to International Journal of Computers & Electrical Engineering Forensic Investigation of P2P Cloud Storage: BitTorrent Sync as a Case Study 1 2 3 1 Teing Yee Yang , Ali Dehghantanha , Kim-Kwang Raymond Choo , Zaiton Muda 1 Department of Computer Science, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, UPM Serdang, Selangor, Malaysia 2 The School of Computing, Science & Engineering, Newton Building, University of Salford, Salford, Greater Manchester, United Kingdom 3 Information Assurance Research Group, University of South Australia, Adelaide, South Australia, Australia. Abstract Cloud computing has been regarded as the technology enabler for the Internet of Things (IoT).
    [Show full text]