Using C-Kermit 2Nd Edition

Total Page:16

File Type:pdf, Size:1020Kb

Using C-Kermit 2Nd Edition << Previous file Chapter 1 Introduction An ever-increasing amount of communication is electronic and digital: computers talking to computers Ð directly, over the telephone system, through networks. When you want two computers to communicate, it is usually for one of two reasons: to interact directly with another computer or to transfer data between the two computers. Kermit software gives you both these capabilities, and a lot more too. C-Kermit is a communications software program written in the C language. It is available for many different kinds of computers and operating systems, including literally hundreds of UNIX varieties (HP-UX, AIX, Solaris, IRIX, SCO, Linux, ...), Digital Equipment Corporation (Open)VMS, Microsoft Windows NT and 95, IBM OS/2, Stratus VOS, Data General AOS/VS, Microware OS-9, the Apple Macintosh, the Commodore Amiga, and the Atari ST. On all these platforms, C-Kermit's services include: • Connection establishment. This means making dialup modem connections or (in most cases) network connections, including TCP/IP Telnet or Rlogin, X.25, LAT, NET- BIOS, or other types of networks. For dialup connections, C-Kermit supports a wide range of modems and an extremely sophisticated yet easy-to-use dialing directory. And C-Kermit accepts incoming connections from other computers too. • Terminal sessions. An interactive terminal connection can be made to another com- puter via modem or network. The Windows 95, Windows NT, and OS/2 versions of C-Kermit also emulate specific types of terminals, such as the Digital Equipment Cor- poration VT320, the Wyse 60, or the ANSI terminal types used for accessing BBSs or PC UNIX consoles, with lots of extras such as scrollback, key mapping, printer con- trol, colors, and mouse shortcuts. 1 • File transfer. Transferring either text or binary files from your computer to the other one, or vice versa, free of errors, using the most advanced and high-performance im- plementation of Columbia University's Kermit file transfer protocol available anywhere. On some platforms, other protocols such as ZMODEM are also included. • Client / server features. These allow uniform and convenient access from your desktop computer to the wide variety of other computers and services for which Kermit servers are available, in which you may initiate all sorts of file transfer and management func- tions from your client software. • International character-set conversion. Kermit software stands alone among com- munications protocols and software in its ability to reconcile the differences among in- compatible character sets used to represent text in many languages. • Automation. C-Kermit's command language is also a script programming language that is both powerful and easy to use, as well as portable across hundreds of platforms and diverse communication methods. Use it to automate all your routine communica- tion tasks, ranging from paging, to simple data exchange, to complex update opera- tions, to network monitoring and reporting. All of C-Kermit's features are configurable and customizable, giving you an unprecedent- ed and unparalleled degree of control over your connections. This book is the technical reference manual for C-Kermit in its many incarnations. It con- centrates on what all the versions have in common: the communications functions, the command language, file transfer, the character-set conversion features, and the scripting language. The specifics of each version are covered either in a separate publication such as the Kermit 95 manual, in an appendix to this book, or in an online file. Why Kermit? In the present age of graphical user interfaces, Web browsers, and near-universal Internet access, what use is a text-mode serial communications program like C-Kermit? Let's clear up two misconceptions right away. First, C-Kermit is not just a serial communica- tions program any more; it is also both a network client and a network server. And second, its text-mode user interface can be (and often is) concealed behind a graphical in- terface but can still brought bear on the hard problems when real power is needed. The world of computing and data communications is still surprisingly heterogeneous. To this day there remains a vast diversity of computers large and small, as well as devices that most of us might not think of as computers Ð laboratory equipment, cash registers, bar-code scanners, you name it Ð that do not fit the Internet-connected, multimedia, Web-browsing model, yet still need to exchange data with other computers. Minis and 2 Introduction / Chapter 1 mainframes still exist despite all attempts to kill them off, not to mention countless dis- continued ``legacy'' systems ranging from CP/M microcomputers to Soviet-era supercom- puters, still in good service, that would be powerless to communicate without Kermit. Kermit conforms to well-established open standards. It gives you freedom of choice. It does not lock you into a particular brand of hardware or operating system, or a particular or proprietary communication method. Learn it once, use it everywhere. • Kermit software is universal. Kermit programs have been written for hundreds of dif- ferent kinds of computers (see page 11). Kermit software is available for just about any computer and operating system you can think of. • Kermit software communicates not only over dialup connections, but also over direct serial connections, local area networks, and wide area networks, so you can use the same software for practically any kind of connection. • Kermit software is flexible. It is adaptable to the styles and formats of the many com- puter manufacturers and communication service providers. • Kermit software is easy to use. The commands are ordinary words, rather than cryptic codes. Menus are available upon demand. Some Kermit programs, such as Kermit 95 and Kermit/2, have a graphical user interface in addition to the traditional command interface described in this book. • Kermit software is powerful. Procedures can be automated using a script program- ming language composed of ordinary Kermit commands. • Kermit scripts are portable. The same scripting language is usable on hundreds of dif- ferent platforms. • Kermit file transfer is robust. It works in hostile or restrictive communication en- vironments where other protocols and software fail. • Kermit file transfer Ð perhaps contrary to popular belief Ð can be fast. • Kermit file transfer is international. It can transfer text in many languages and charac- ter sets without scrambling the special characters. • Kermit software is accessible. Because it offers a character-mode user interface, it is compatible with speech, Braille, and other enabling devices. One software package for practically all your communication needs: no switching from package to package to access different kinds of computers or services or to use different communication methods; no need to learn or support multiple packages. And as an added benefit, most Kermit software programs have the same basic set of commands and procedures Ð once you've learned one Kermit program, you've learned them all. Why Kermit? 3 Figure 1-1 Remote and Local Computers How Kermit Works Picture two computers, like the ones in Figure 1-1. You are using one of them directly: it is a PC or workstation on your desk, or it is a timesharing system connected to a terminal (or terminal emulator) on your desk. Let's call this the local computer. You want to con- nect your local computer to a more distant, remote computer or service and transfer data. IMPORTANT: Remember the terms local and remote. They are used through- out this book. The local computer is the one you are making the connection from. The remote computer is the one you are making the connection to. Let's say you are connecting the two computers by telephone. First be sure that each computer has a modem. Then you must know the name of the device on your local com- puter that the modem is connected to, the transmission speed to use, and the telephone number to call. Let's look at Figure 1-2. We start the local Kermit program simply by typing the word kermit. IMPORTANT: In the figures, and in all examples used in this book, the text you type is underlined. When you are typing commands to your operating sys- tem or to a Kermit program, you must terminate them by pressing the Return or Enter key at the point where the underlining ends (unless otherwise indicated). 4 Introduction / Chapter 1 Figure 1-2 Connecting the Local and Remote Computers When the local Kermit's prompt appears, tell it the modem type and the communication device name and speed, and then tell it to dial the other computer's phone number. When the other computer answers the phone, give your local Kermit the CONNECT command2 and now you are talking to the remote computer just as if you were using it directly. Log in as shown in Figure 1-3 and carry on a dialog to conduct your business. Eventually you might decide that you want to move a file from one computer to the other. To transfer a file, both computers must be running Kermit programs. Your local computer already is. Simply type ``kermit'' on the remote computer to start the remote Kermit program.3 Now you must tell each Kermit program what to do: one of them must be told to send a file of a certain name and the other must be told to receive the file. The basic rule is: (1) tell the remote computer what to do first (SEND or RECEIVE), then (2) get back to the local computer and tell it the opposite (RECEIVE or SEND)4 , as shown in Figure 1-4. 2If you give the DIAL command at the C-Kermit prompt and the call is answered successfully, C-Kermit CONNECTs automatically, so in this case no CONNECT command is needed.
Recommended publications
  • The Control of Routine Fish Maneuvers: Connecting Midline Kinematics to Turn Outcomes
    Received: 16 June 2020 | Accepted: 17 June 2020 DOI: 10.1002/jez.2398 RESEARCH PAPER The control of routine fish maneuvers: Connecting midline kinematics to turn outcomes Stephen P. Howe | Henry C. Astley Department of Biology, Biomimicry Research and Innovation Center, University of Akron, Abstract Akron, Ohio Maneuverability is an important factor in determining an animal's ability to navigate Correspondence its environment and succeed in predator–prey interactions. Although fish are cap- Stephen P. Howe, Department of Biology, Biomimicry Research and Innovation Center, able of a wide range of maneuvers, most of the literature has focused on escape University of Akron, 235 Carroll St., Rm D401, maneuvers while less attention has been paid to routine maneuvers, such as those Akron, OH 44325‐3908. Email: [email protected] used for habitat navigation. The quantitative relationships between body deforma- tions and maneuver outcomes (displacement of the center of mass and change in trajectory) are fundamental to understanding how fish control their maneuvers, yet remain unknown in routine maneuvers. We recorded high‐speed video of eight giant danios (Devario aquepinnatus) performing routine and escape maneuvers and quan- tified the deformation of the midline, the heading of the anterior body, and the kinematics of the centroid (a proxy for center of mass). We found that both routine and escape behaviors used qualitatively similar independent body bending events, which we curvature pulses, that propagate from head to tail but show quantitative differences in midline kinematics and turn outcomes. In routine maneuvers, the direction change and acceleration of the fish are influenced by both the magnitude of the bending pulse and by the duration of the pulse, whereas in escape maneuvers, only pulse duration influenced direction change and turn acceleration.
    [Show full text]
  • George R. Lewycky 30 Regent St, Apt
    George R. Lewycky 30 Regent St, Apt. # 709, Jersey City, NJ 07302 [email protected] (646) 252 8882 http://georgenet.net/resume SUMMARY Over three decades of IT experience in various industries and lines of business with assorted technologies, databases, languages and operating systems. COMPUTER EXPERIENCE AND SKILLS Databases: Oracle, SQL Server, ADABAS (relational), dBase III, Access, Filemaker Pro 5 Oracle: Oracle Financials 11.5.7, Utilities, PL/SQL, SQL*Plus, SQL*Loader, TOAD SQL Server: T-SQL, SQL Server 2008 R2/2010/2012, Microsoft SQL Server Management Studio, SourceSafe, SSRS Languages : SQL, VB.NET, COBOL, JCL, SAS/SPSS (Statistics), CICS, ADA/SQL Operating Systems : IBM MVS & z/OS, Windows, UNIX (SCO & Sun), Mac, DOS (PC's), X-Windows, PICK and Primos Mainframe : JCL, MVS Utilities (DFSORT), COBOL, VSAM NOTE: Supplemental PDF’s available for Oracle, SQL Server, Mainframe & ADABAS at http://georgenet.net/resume DATA PROCESSING SKILLS • Data Analysis; ETL Methodology (Extract, Transform and Load); Interfaces, Data Migration and Cleansing • Packaged (Oracle eBusiness, Real World) and Custom/Internal Applications • Developing algorithms, techniques to re-engineer improve the procedure & processing flow • User interaction on all levels including documentation and training • Experience in Multi-Platform environments; Adaptable to new languages, software packages and industries EMPLOYMENT State Government Agency, NY, NY November 1997 to Present Senior Computer Programmer/Analyst Internet Technologies: February 2010 to present Involved in a major team effort replacing a customized Filemaker Pro 5 database/application, used as a customer service tool into a custom intranet and internet application under Visual Studio 2008 and ASP.NET 3.5 with SQL Server 2008 R2 backend in order to expedite customer claims in a diverse customized and complex customer claim processing system within various departments.
    [Show full text]
  • Teemtalk® 5.0 for Windows CE & Xpe User's Guide
    TeemTalk® 5.0 for Windows CE & XPe User's Guide USA Neoware, Inc. 3200 Horizon Drive King of Prussia, PA 19406 Tel: +1-610-277-8300 Fax: +1-610-771-4200 Email: [email protected] UK Neoware UK Ltd The Stables, Cosgrove Milton Keynes MK19 7JJ Tel: +44 (0) 1908 267111 Fax: +44 (0) 1908 267112 Email: [email protected] TeemTalk Software Support Telephone: +1-610-277-8300 Web: http://www.neoware.com/support/ Software Version 5.0.1 October 2004 Neoware UK Ltd, The Stables, Cosgrove, Milton Keynes, MK19 7JJ Tel: +44 (0) 1908 267111 Fax: +44 (0) 1908 267112 TeemTalk © 1988-2004 Neoware UK Ltd, All Rights Reserved. This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/) This product includes cryptographic software written by Eric Young ([email protected]) The material in this manual is for information purposes only and is subject to change without notice. Neoware UK Ltd accepts no responsibility for any errors contained herein. Trademarks TeemTalk is a registered trademark of Neoware UK Ltd. ADDS Viewpoint A2 is a trademark of Applied Digital Data Systems Inc. AIX is a registered trademark of International Business Machines Corporation. D100, D200 and D410 are trademarks of Data General. Dataspeed is a registered trademark of AT&T. DEC, VT52, VT100, VT131, VT220, VT300, VT320 and VT340 are registered trademarks of Digital Equipment Corporation. Hazeltine is a trademark of Esprit Systems, Inc. HP700/92, HP700/94, HP700/96, HP2392A and HP2622A are trademarks of Hewlett Packard Company. IBM is a registered trademark of International Business Machines Corporation.
    [Show full text]
  • Sistemi Operativi Real-Time Marco Cesati Lezione R13 Sistemi Operativi Real-Time – II Schema Della Lezione
    Sistemi operativi real-time Marco Cesati Lezione R13 Sistemi operativi real-time – II Schema della lezione Caratteristiche comuni VxWorks LynxOS Sistemi embedded e real-time QNX eCos Windows Linux come RTOS 15 gennaio 2013 Marco Cesati Dipartimento di Ingegneria Civile e Ingegneria Informatica Università degli Studi di Roma Tor Vergata SERT’13 R13.1 Sistemi operativi Di cosa parliamo in questa lezione? real-time Marco Cesati In questa lezione descriviamo brevemente alcuni dei più diffusi sistemi operativi real-time Schema della lezione Caratteristiche comuni VxWorks LynxOS 1 Caratteristiche comuni degli RTOS QNX 2 VxWorks eCos 3 LynxOS Windows Linux come RTOS 4 QNX Neutrino 5 eCos 6 Windows Embedded CE 7 Linux come RTOS SERT’13 R13.2 Sistemi operativi Caratteristiche comuni dei principali RTOS real-time Marco Cesati Corrispondenza agli standard: generalmente le API sono proprietarie, ma gli RTOS offrono anche compatibilità (compliancy) o conformità (conformancy) allo standard Real-Time POSIX Modularità e Scalabilità: il kernel ha una dimensione Schema della lezione Caratteristiche comuni (footprint) ridotta e le sue funzionalità sono configurabili VxWorks Dimensione del codice: spesso basati su microkernel LynxOS QNX Velocità e Efficienza: basso overhead per cambi di eCos contesto, latenza delle interruzioni e primitive di Windows sincronizzazione Linux come RTOS Porzioni di codice non interrompibile: generalmente molto corte e di durata predicibile Gestione delle interruzioni “separata”: interrupt handler corto e predicibile, ISR lunga
    [Show full text]
  • Surviving the TEX Font Encoding Mess Understanding The
    Surviving the TEX font encoding mess Understanding the world of TEX fonts and mastering the basics of fontinst Ulrik Vieth Taco Hoekwater · EuroT X ’99 Heidelberg E · FAMOUS QUOTE: English is useful because it is a mess. Since English is a mess, it maps well onto the problem space, which is also a mess, which we call reality. Similary, Perl was designed to be a mess, though in the nicests of all possible ways. | LARRY WALL COROLLARY: TEX fonts are mess, as they are a product of reality. Similary, fontinst is a mess, not necessarily by design, but because it has to cope with the mess we call reality. Contents I Overview of TEX font technology II Installation TEX fonts with fontinst III Overview of math fonts EuroT X ’99 Heidelberg 24. September 1999 3 E · · I Overview of TEX font technology What is a font? What is a virtual font? • Font file formats and conversion utilities • Font attributes and classifications • Font selection schemes • Font naming schemes • Font encodings • What’s in a standard font? What’s in an expert font? • Font installation considerations • Why the need for reencoding? • Which raw font encoding to use? • What’s needed to set up fonts for use with T X? • E EuroT X ’99 Heidelberg 24. September 1999 4 E · · What is a font? in technical terms: • – fonts have many different representations depending on the point of view – TEX typesetter: fonts metrics (TFM) and nothing else – DVI driver: virtual fonts (VF), bitmaps fonts(PK), outline fonts (PFA/PFB or TTF) – PostScript: Type 1 (outlines), Type 3 (anything), Type 42 fonts (embedded TTF) in general terms: • – fonts are collections of glyphs (characters, symbols) of a particular design – fonts are organized into families, series and individual shapes – glyphs may be accessed either by character code or by symbolic names – encoding of glyphs may be fixed or controllable by encoding vectors font information consists of: • – metric information (glyph metrics and global parameters) – some representation of glyph shapes (bitmaps or outlines) EuroT X ’99 Heidelberg 24.
    [Show full text]
  • MC88(I)Terminal Users Guide
    MC 88(i)T User Guide MC88(i)Terminal Users Guide Title: MC88(i)T User Guide Version: 0.0.0.2 Status: Preliminary Date: November 14, 2012 Doc: MC88(i)T_UG_EN_Rel. 0.2 Author: Wacker Copyright: MC Technologies GmbH, Hannover / Germany MC88(i)Term_UG_en_141112.doc Page 1 of 22 MC 88(i)T User Guide 1.1 Contents 1.1 Contents ......................................................................................................................................... 2 1.2 Figures ........................................................................................................................................... 3 1.3 Tables ............................................................................................................................................ 3 1.4 Revision history .............................................................................................................................. 3 1.5 Legal information ........................................................................................................................... 3 1.5.1 Definitions ................................................................................................................................ 3 1.5.2 Disclaimers .............................................................................................................................. 4 1.6 Terms and abbreviations ............................................................................................................... 4 1.7 Related documents .......................................................................................................................
    [Show full text]
  • Database Globalization Support Guide
    Oracle® Database Database Globalization Support Guide 19c E96349-05 May 2021 Oracle Database Database Globalization Support Guide, 19c E96349-05 Copyright © 2007, 2021, Oracle and/or its affiliates. Primary Author: Rajesh Bhatiya Contributors: Dan Chiba, Winson Chu, Claire Ho, Gary Hua, Simon Law, Geoff Lee, Peter Linsley, Qianrong Ma, Keni Matsuda, Meghna Mehta, Valarie Moore, Cathy Shea, Shige Takeda, Linus Tanaka, Makoto Tozawa, Barry Trute, Ying Wu, Peter Wallack, Chao Wang, Huaqing Wang, Sergiusz Wolicki, Simon Wong, Michael Yau, Jianping Yang, Qin Yu, Tim Yu, Weiran Zhang, Yan Zhu This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S.
    [Show full text]
  • Operating-System Examples
    OPERATING SYSTEM CONCEPTS Sixth Edition ABRAHAM SILBERSCHATZ Bell Laboratories PETER BAER GALVIN Corporate Technologies, Inc. GREG GAGNE Westminster College JOHN WILEY & SONS, INC, New York / Chichester / Weinheim / Brisbane / Singapore / Toronto ACQUISITIONS EDITOR Paul Crockett SENIOR MARKETING MANAGER Katherine Hepburn SENIOR PRODUCTION EDITOR Ken Santor COVER DESIGNER Madelyn Lesure COVER ART Susan E. Cyr SENIOR ILLUSTRATION COORDINATOR Anna Melhorn This book was set in Palatino by Abraham Silberschatz and printed and bound by Courier-Westford. The cover was printed by Phoenix Color Corporation. This book is printed on acid-free paper. The paper in this book was manufactured by a mill whose forest manage- ment programs include sustained yield harvesting of its timberlands. Sustained yield harvesting principles ensure that the numbers of trees cut each year does not exceed the amount of new growth. Copyright O 2002 John Wiley & Sons, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permis- sion of the Publisher, or authorization through payment of the appropriate per- copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (508) 750-8400, fax (508) 750-4470. Requests to the Publisher for permis- sion should be addressed to the Permissions Department, John Wiley & Sons, Inc., 605 Third Avenue, New York, NY 10158-0012, (212) 850-6011, fax (212) 850- ISBN 0-471-41743-2 Printed in the United States of America PREFACE Operating systems are an essential part of any computer system.
    [Show full text]
  • Programmer's Manual SP2000 Series
    Dot Matrix Printer SP2000 Series Programmer’s Manual TABLE OF CONTENTS 1. Control Codes (Star Mode) ......................................................................... 1 1-1. Control Codes List .............................................................................. 1 1-1-1. Character Selection .................................................................. 1 1-1-2. Print Position Control ............................................................... 3 1-1-3. Dot Graphics Control ............................................................... 4 1-1-4. Download Graphics Printing .................................................... 4 1-1-5. Peripheral Device Control ........................................................ 4 1-1-6. Auto Cutter Control (SP2500 type printers only) .................... 5 1-1-7. Commands to Set the Page Format .......................................... 5 1-1-8. Other Commands...................................................................... 6 1-2. Control Code Details ........................................................................... 7 1-2-1. Character Selection .................................................................. 7 1-2-2. Print Position Control ............................................................. 17 1-2-3. Dot Graphics Control ............................................................. 25 1-2-4. Download Graphics Printing .................................................. 28 1-2-5. Peripheral Device Control .....................................................
    [Show full text]
  • Telecommunications Handbook: Connecting to NEWTON
    DOCUMENT RESUME ED 375 804 IR 016 847 AUTHOR Baker, Christopher; And Others TITLE Telecommunications Handbook: Connecting to NEWTON. Version 1.4. INSTITUTION Argonne National Lab., IL. Div of Educational. Programs. SPONS AGENCY Department of Energy, Washington, D.C. PUB DATE Mar 94 CONTRACT W-31-109-Eng-38 NOTE 26p.; For an earlier version of this handbook, see ED 366 323. PUB TYPE Guides Non-Classroom Use (055) Reports Descriptive (141) EDRS PRICE MF01/PCO2 Plus Postage. DESCRIPTORS Computer Uses in Education; *Electronic Mail; Elementary Secondary Education; Information Dissemination; *Information Networks; *Online Systems; *Science Education; Scientists; Teachers; *Telecommunications IDENTIFIERS *Argonne National Laboratory IL; *Newton Bulletin Board System ABSTRACT This handbook was written for use with the Argonne National Laboratory's electronic bulletin board system (BBS) called NEWTON, which is designed to create an electronic network that will link scientists, teachers, and students with the many diversified resources of the Argonne National Laboratory. The link to Argonne will include such resources as scientists, research programs, and educational programs (workshops, conferences, and instructional materials), and serve as a forum for sharing knowledge, new ideas, and teaching materials. Through the BBS, students will be able to interact with fellow students throughout the nation, and/the BBS will help to build a teacher support group that will work with established teacher-alliance networks and worldwide research networks, including Internet. This manual begins with the mission statement which identifies objectives, primary users, materials, and services of NEWTON. The introduction then examines telecommunications and education and the NEWTON BBS. Additional sections contain information on accessing NEWTON; equipment needed to login to NEWTON; the setup of the equipment; the login procedure; and a list of NEWTON's features including system, personal, and group features.
    [Show full text]
  • Oecd Development Centre
    OECD DEVELOPMENT CENTRE Working Paper No. 137 (Formerly Technical Paper No. 137) A SIMULATION MODEL OF GLOBAL PENSION INVESTMENT by Landis MacKellar and Helmut Reisen Research programme on: Macroeconomic Interdependence and Capital Flows August 1998 CD/DOC(98)7 TABLE OF CONTENTS ACKNOWLEDGEMENTS ................................................................................. 6 RÉSUMÉ .......................................................................................................... 7 SUMMARY ....................................................................................................... 7 PREFACE ........................................................................................................ 9 INTRODUCTION ............................................................................................ 11 I. DEMOGRAPHIC TRENDS AND THEIR IMPLICATIONS ......................... 13 II. A SIMULATION MODEL ........................................................................... 17 III. SIMULATION RESULTS ........................................................................... 21 IV. CONCLUSION .......................................................................................... 35 NOTES ........................................................................................................... 37 BIBLIOGRAPHY ............................................................................................. 39 ANNEX 1: THE IIASA MULTIREGIONAL ECONOMIC-DEMOGRAPHIC MODEL ......................................... 41 ANNEX
    [Show full text]
  • Transaction Systems Architects, Inc. 2006 Annual Report
    Transaction Systems Architects, Inc. 2006 Annual Report Transaction Systems Architects, Inc. 120 Broadway Suite 3350 New York, New York 10271 www.tsainc.com tsa_Cover.indd 1 4/13/07 11:48:16 PM Transaction Systems Architects, Inc. is a global provider of software and services for electronic payments. The company supports more Board of Directors Principal Offi ces than 800 customers in the fi nance, retail and transaction processing industries. Harlan F. Seymour Corporate Headquarters Chairman of the Board – Transaction Systems Architects, Inc. Transaction Systems Architects, United States – New York, New York Customers use TSA solutions to: Principal – HFS LLC Offi ces Process transactions generated at ATMs, merchant point-of-sale devices, mobile devices, Philip G. Heasley Argentina Australia Bahrain Internet commerce sites and bank branches President and Chief Executive Offi cer – Transaction Systems Architects, Inc. Brazil Canada France Germany Greece India Process high-value payments and enable Web banking on behalf of corporate clients Roger K. Alexander Ireland Italy Japan Detect and prevent debit and credit card fraud, merchant fraud and money laundering Chief Executive Offi cer – euroConex Technologies Ltd Korea Malaysia Mexico The Netherlands Romania Russia Authorize checks written in retail locations John D. Curtis Singapore South Africa Spain Establish frequent shopper programs Attorney United Arab Emirates United Kingdom United States Automate transaction settlement, card management and claims processing Jim D. Kever Issue and manage applications on smart cards Partner – Voyent Partners LLC Facilitate communication, data movement, transaction processing and systems monitoring John M. Shay, Jr. Investor Information across heterogeneous computing systems President – Fairway Consulting LLC A copy of the Company’s Annual Report on Form 10-K for the year ended John E.
    [Show full text]