Apple Computer, Inc. Records M1007
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
When Is a Microprocessor Not a Microprocessor? the Industrial Construction of Semiconductor Innovation I
Ross Bassett When is a Microprocessor not a Microprocessor? The Industrial Construction of Semiconductor Innovation I In the early 1990s an integrated circuit first made in 1969 and thus ante dating by two years the chip typically seen as the first microprocessor (Intel's 4004), became a microprocessor for the first time. The stimulus for this piece ofindustrial alchemy was a patent fight. A microprocessor patent had been issued to Texas Instruments, and companies faced with patent infringement lawsuits were looking for prior art with which to challenge it. 2 This old integrated circuit, but new microprocessor, was the ALl, designed by Lee Boysel and used in computers built by his start-up, Four-Phase Systems, established in 1968. In its 1990s reincarnation a demonstration system was built showing that the ALI could have oper ated according to the classic microprocessor model, with ROM (Read Only Memory), RAM (Random Access Memory), and I/O (Input/ Output) forming a basic computer. The operative words here are could have, for it was never used in that configuration during its normal life time. Instead it was used as one-third of a 24-bit CPU (Central Processing Unit) for a series ofcomputers built by Four-Phase.3 Examining the ALl through the lenses of the history of technology and business history puts Intel's microprocessor work into a different per spective. The differences between Four-Phase's and Intel's work were industrially constructed; they owed much to the different industries each saw itselfin.4 While putting a substantial part ofa central processing unit on a chip was not a discrete invention for Four-Phase or the computer industry, it was in the semiconductor industry. -
Mac OS 8 Update
K Service Source Mac OS 8 Update Known problems, Internet Access, and Installation Mac OS 8 Update Document Contents - 1 Document Contents • Introduction • About Mac OS 8 • About Internet Access What To Do First Additional Software Auto-Dial and Auto-Disconnect Settings TCP/IP Connection Options and Internet Access Length of Configuration Names Modem Scripts & Password Length Proxies and Other Internet Config Settings Web Browser Issues Troubleshooting • About Mac OS Runtime for Java Version 1.0.2 • About Mac OS Personal Web Sharing • Installing Mac OS 8 • Upgrading Workgroup Server 9650 & 7350 Software Mac OS 8 Update Introduction - 2 Introduction Mac OS 8 is the most significant update to the Macintosh operating system since 1984. The updated system gives users PowerPC-native multitasking, an efficient desktop with new pop-up windows and spring-loaded folders, and a fully integrated suite of Internet services. This document provides information about Mac OS 8 that supplements the information in the Mac OS installation manual. For a detailed description of Mac OS 8, useful tips for using the system, troubleshooting, late-breaking news, and links for online technical support, visit the Mac OS Info Center at http://ip.apple.com/infocenter. Or browse the Mac OS 8 topic in the Apple Technical Library at http:// tilsp1.info.apple.com. Mac OS 8 Update About Mac OS 8 - 3 About Mac OS 8 Read this section for information about known problems with the Mac OS 8 update and possible solutions. Known Problems and Compatibility Issues Apple Language Kits and Mac OS 8 Apple's Language Kits require an updater for full functionality with this version of the Mac OS. -
Jamming Over the Miles Man’S History Just Been a Re-Mix of a Few Basic Ideas
MINDWheels for the Xgrid goes to Monash WHEN YOUR CAREER FINDS YOU Jam2Jam Jamming over Conferences: the Miles the hidden stories REE SUMMERSSUMMER A magazine for academic staff, students and ITT professionalsprofessionals FREEF COPY20092009 PRODUCT ROUND-UP WHAT’S NEW IN THE WORLD OF TECH Screen grabs, made to order Make your photos Funtastic New look, better Filemaker If you do screenshots often, you’ll love If you’re aching to get creative with your Filemaker long ago became synonymous Layers. Instead of grabbing one single photos, Funtastic Photos will let you fl ex with ‘Mac desktop database’, but the latest bitmap image of the screen, Layers creates your right brain until it hurts. Mix and version further improves the platform with a Photoshop document fi le that isolates each match more than 40 graphical effects, make a host of new features. Most obvious is screen window, menu, desktop icon, menu greeting cards, add refl ections, add speech a heavily redesigned and simplifi ed user bar and the Dock in a separate layer. Do bubbles, email photo cards, create printable interface, but under the covers you’ll benefi t your screen grab once, then mix and match 3D photo cubes, export to iPod or mobile, from new features like user-triggered the elements until they’re arranged the way make photo collages and more. Works with scripts, saved fi nds, themes and templates, that’s most meaningful. $US19.95 ($A30, iPhoto, and non-destructive editing means embedded Web content, dynamic reports trial available) from the.layersapp.com. all changes can be rolled back. -
Redalyc.Public Entrepreneurs and the Adoption of Broad-Based Merit Aid
Education Policy Analysis Archives/Archivos Analíticos de Políticas Educativas ISSN: 1068-2341 [email protected] Arizona State University Estados Unidos Kyle Ingle, William; Ann Petroff, Ruth Public Entrepreneurs and the Adoption of Broad-based Merit Aid Beyond the Southeastern United States Education Policy Analysis Archives/Archivos Analíticos de Políticas Educativas, vol. 21, enero, 2013, pp. 1-26 Arizona State University Arizona, Estados Unidos Available in: http://www.redalyc.org/articulo.oa?id=275029728058 How to cite Complete issue Scientific Information System More information about this article Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Journal's homepage in redalyc.org Non-profit academic project, developed under the open access initiative education policy analysis archives A peer-reviewed, independent, open access, multilingual journal Arizona State University Volume 21 Number 58 July 8, 2013 ISSN 1068-2341 Public Entrepreneurs and the Adoption of Broad-based Merit Aid Beyond the Southeastern United States William Kyle Ingle Ruth Ann Petroff Bowling Green State University USA Citation: Ingle, W. K. & Petroff, R. A. (2013). Public entrepreneurs and the adoption of broad- based merit aid beyond the Southeastern United States. Education Policy Analysis Archives, 21 (58) Retrieved [date], from http://epaa.asu.edu/ojs/article/view/1252 Abstract: The concentration of broad-based merit aid adoption in the southeastern United States has been well noted in the literature. However, there are states that have adopted broad-based merit aid programs outside of the Southeast. Guided by multiple theoretical frameworks, including innovation diffusion theory (e.g., Gray, 1973, 1994; Rogers, 2003), Roberts and King’s (1991) typology of public entrepreneurs, and Anderson’s (2003) stages of the policymaking process, this qualitative study sought to answer the following questions. -
Designing PCI Cards and Drivers for Power Macintosh Computers
Designing PCI Cards and Drivers for Power Macintosh Computers Revised Edition Revised 3/26/99 Technical Publications © Apple Computer, Inc. 1999 Apple Computer, Inc. Adobe, Acrobat, and PostScript are Even though Apple has reviewed this © 1995, 1996 , 1999 Apple Computer, trademarks of Adobe Systems manual, APPLE MAKES NO Inc. All rights reserved. Incorporated or its subsidiaries and WARRANTY OR REPRESENTATION, EITHER EXPRESS OR IMPLIED, WITH No part of this publication may be may be registered in certain RESPECT TO THIS MANUAL, ITS reproduced, stored in a retrieval jurisdictions. QUALITY, ACCURACY, system, or transmitted, in any form America Online is a service mark of MERCHANTABILITY, OR FITNESS or by any means, mechanical, Quantum Computer Services, Inc. FOR A PARTICULAR PURPOSE. AS A electronic, photocopying, recording, Code Warrior is a trademark of RESULT, THIS MANUAL IS SOLD “AS or otherwise, without prior written Metrowerks. IS,” AND YOU, THE PURCHASER, ARE permission of Apple Computer, Inc., CompuServe is a registered ASSUMING THE ENTIRE RISK AS TO except to make a backup copy of any trademark of CompuServe, Inc. ITS QUALITY AND ACCURACY. documentation provided on Ethernet is a registered trademark of CD-ROM. IN NO EVENT WILL APPLE BE LIABLE Xerox Corporation. The Apple logo is a trademark of FOR DIRECT, INDIRECT, SPECIAL, FrameMaker is a registered Apple Computer, Inc. INCIDENTAL, OR CONSEQUENTIAL trademark of Frame Technology Use of the “keyboard” Apple logo DAMAGES RESULTING FROM ANY Corporation. (Option-Shift-K) for commercial DEFECT OR INACCURACY IN THIS purposes without the prior written Helvetica and Palatino are registered MANUAL, even if advised of the consent of Apple may constitute trademarks of Linotype-Hell AG possibility of such damages. -
Chapter 1. Origins of Mac OS X
1 Chapter 1. Origins of Mac OS X "Most ideas come from previous ideas." Alan Curtis Kay The Mac OS X operating system represents a rather successful coming together of paradigms, ideologies, and technologies that have often resisted each other in the past. A good example is the cordial relationship that exists between the command-line and graphical interfaces in Mac OS X. The system is a result of the trials and tribulations of Apple and NeXT, as well as their user and developer communities. Mac OS X exemplifies how a capable system can result from the direct or indirect efforts of corporations, academic and research communities, the Open Source and Free Software movements, and, of course, individuals. Apple has been around since 1976, and many accounts of its history have been told. If the story of Apple as a company is fascinating, so is the technical history of Apple's operating systems. In this chapter,[1] we will trace the history of Mac OS X, discussing several technologies whose confluence eventually led to the modern-day Apple operating system. [1] This book's accompanying web site (www.osxbook.com) provides a more detailed technical history of all of Apple's operating systems. 1 2 2 1 1.1. Apple's Quest for the[2] Operating System [2] Whereas the word "the" is used here to designate prominence and desirability, it is an interesting coincidence that "THE" was the name of a multiprogramming system described by Edsger W. Dijkstra in a 1968 paper. It was March 1988. The Macintosh had been around for four years. -
Power Macintosh 9500 Series
K Service Source Power Macintosh 9500 Series Power Macintosh 9500/120, 9500/132, 9500/150, 9500/180MP, and 9500/200 K Service Source Basics Power Macintosh 9500 Series Basics Overview - 1 Overview The Power Macintosh 9500 Series computers are based on the PowerPC 604 microprocessor and support the industry-standard PCI (Peripheral Component Interconnect) bus specification. These computers are the most flexible, expandable, and highest-performance systems from Apple to date. The microprocessor for the Power Macintosh 9500 Series computers is on separate plug-in card, which allows for easy upgrades. The Power Macintosh 9500 family includes five versions: the 9500/120, the 9500/132, the 9500/150, the 9500/180MP (multi-processor), and the 9500/200. Basics Overview - 2 Features of the Power Macintosh 9500 Series include • 120, 132, 150, 180 (multi-processor) or 200 MHz PowerPC 604 microprocessor card with built-in FPU • Six PCI expansion slots • 10 MB per second internal SCSI channel, 5 MB per second external SCSI channel • 512K Level 2 cache • DRAM expansion up to 1536 MB using 168-pin, 70 ns, 64-bit DIMMs • A PCI Apple Accelerated Graphics card included with some configurations (the Power Macintosh 9500 Series does not include on-board video support) • Built-in AAUI and 10BASE-T Ethernet • AppleCD™ 600i 4x or1200i 8x CD-ROM drive • CD-quality stereo sound in/out • Mac™ OS system software 7.5.2, 7.5.3, or 7.5.3 Revision 2 Basics Configurations - 3 Configurations The Power Macintosh 9500/120 comes standard with • 120 MHz PowerPC 604 processor -
Hannes Mehnert [email protected] December
Introduction Dylan Going Further Dylan Hannes Mehnert [email protected] December 16, 2004 Hannes Mehnert [email protected] Dylan Introduction Dylan Going Further Introduction Overview Hello World History Dylan Libraries and Modules Classes Generic Functions Types Sealing Going Further Hannes Mehnert [email protected] Dylan Introduction Overview Dylan Hello World Going Further History Overview I DYnamic LANguage Hannes Mehnert [email protected] Dylan Introduction Overview Dylan Hello World Going Further History Overview I DYnamic LANguage I Object Oriented: everything is an object Hannes Mehnert [email protected] Dylan Introduction Overview Dylan Hello World Going Further History Overview I DYnamic LANguage I Object Oriented: everything is an object I Safe: type-checking of arguments and values, no buffer overruns, no implicit casting, no raw pointers Hannes Mehnert [email protected] Dylan Introduction Overview Dylan Hello World Going Further History Overview I DYnamic LANguage I Object Oriented: everything is an object I Safe: type-checking of arguments and values, no buffer overruns, no implicit casting, no raw pointers I Efficient: can compile to code nearly as efficient as C Hannes Mehnert [email protected] Dylan Introduction Overview Dylan Hello World Going Further History Hello world define method hello-world () format-out(``Hello world\n''); end method; Hannes Mehnert [email protected] Dylan Introduction Overview Dylan Hello World Going Further History factorial define method factorial ( i ) if (i = 0) 1 else i -
Autodesk and Autocad
Chapter 8 Autodesk and AutoCAD Autodesk as a company, has gone through several distinct phases of life. There were the “Early Years” which covers the time from when Autodesk was founded as a loose programmer-centric collaborative in early 1982 to the company’s initial public offering in 1985, the “Adolescent Years” during which the company grew rapidly but seemed to do so without any clear direction and the “Mature Years.” The beginning of the latter phase began when Carol Bartz became president and CEO in 1992 and continues to the current time. Even under Bartz, there were several well defined periods of growth as well as some fairly stagnant years.1 Mike Riddle gets hooked on computers Mike Riddle was born in California with computers in his veins. In junior high school, he built his first computer out of relays. It didn’t work very well, but it convinced him that computers were going to be an important part of his life. After attending Arizona State University, Riddle went to work for a steel fabricator where he had his first exposure to CAD. The company had a $250,000 Computervision system that, although capable of 3D work, was used strictly for 2D drafting. The company was engaged in doing steel detailing for the Palo Verde nuclear power plant in Arizona. Riddle felt that anything they were doing on this project with the Computervision system could be done on a microcomputer-based system. About the same time Riddle began working at a local Computerland store where they provided him with free computer time to do with as he wanted. -
Keystroke Recorder Attack on a Client/Server Infrastructure
Keystroke Recorder Attack on a Client/Server Infrastructure Randy Marchany, Tom Wilson VA Tech Computing Center Blacksburg, VA 24060 8/2/96 Abstract This paper describes and analyzes a simple attack on a client/server infrastructure. We had no knowledge of the software being used by the client/server systems but did have moderate knowledge of the Macintosh computer. We built a trojan program that installs keystroke recorder software on target client systems without the owner’s knowledge. The recorder software captured all characters entered by the client software users. The recorder log was then transferred back to a Mac system for analysis. This attack can be Internet or Intranet based. This is a demonstration of the ability of a novice attacker to use sophisticated tools with success on a typcial client/server infrastructure. “No true hacker would ever admit to his peers that he could break into a Mac. What skill is there in that?” -Internet Truism 1.0 Introduction In general, standard PC and Mac operating systems do not employ adequate access controls to prevent anyone from installing unwanted software on the system. This poses one of the greatest threats to a company’s client/server structure. PC’s and Mac’s are vulnerable to a wide range of virus, trojan horse, and socially engineered software attacks. There has been considerable discussion on the security features of the client/server projects. IS staffs have anticipated that network sniffer software would be employed to intercept traffic between the client and server systems. A number of interlocking defenses such as data encryption and subnet isolation are being employed or considered by the IS staffs. -
(February 2 , 2015) If You Know Someone Who You Think Would
(February 2nd, 2015) If you know someone who you think would benefit from being an Insider, feel free to forward this PDF to them so they can sign up here. Quick Tips for our Insider friends! Hey Insiders, It’s the 100th newsletter!! I’ve been producing these newsletters since March 2011 – wow! To celebrate this milestone, I’ve put together some cool stuff for you: A Pluralsight giveaway. The first 100 people to respond to the newsletter email asking for a Pluralsight code will get 30-days of access to all 120+ hours of SQLskills online training for free. No catches, no credit cards. Go! My top-ten books of all time as well as my regular book review 100 SQL Server (and career) hints, tips, and tricks from the SQLskills team in my Paul’s Ponderings section. And the usual demo video, by me for a change. This newsletter is *looooong* this time! Grab a cup of coffee and settle in for a great ride. We’ve done eleven remote and in-person user group presentations this year already, to a combined audience of more than 1,100 people in the SQL community, and Glenn’s presenting remotely in Israel as this newsletter is hitting your inbox. Go community! I recently won the “Person You’d Most Like to be Mentored By” community award in the annual Redgate Tribal Awards. Thanks! To celebrate, I’m offering to mentor 3 men and 3 women through March and April. See this post for how to enter to be considered. I made it to the fantastic Living Computer Museum in Seattle over the weekend, which has a ton of cool old computers, many from DEC where I worked before Microsoft. -
The Apple Effect
The Apple Effect 5 Apple Revolutions: Personal Computing Publishing Imaging Video Audio The world changed when it became possible for Once upon a time, electronics enthusiasts to assemble components to computers were make their own personal computer. Altair was the first to market components together in kit form, complex, rare and but two guys named Steve Jobs and Steve Wozniak, operating from a garage in California, were not far expensive machines behind with a kit that is now known as the Apple I. that companies – even About 200 were produced, but that convinced the two Steves to found Apple Computer Inc countries – struggled to and work on a computer that did not require electronics knowledge to assemble and use. It afford to build, buy or was the release of this model in 1977, the Apple ][, use. which heralded the widespread leap of electronics from the mainframe to personal computing. Suddenly business, home and schools had access Two guys in a garage precipitated a shift in our to computing power previously available only with universe to one where computers are simple to use, mainframes. yet more powerful than many dreamed possible. The evolution of software The company they started, Apple Computer Inc, Early mainframe computers had to be programmed has consistently led the way in personal computing by methods which amounted to rewiring the innovations and in developing many of the tools circuits. Personal computers made the jump and technologies we take for granted. to programming languages—even the Apple I The Apple Effect is a story of five revolutions in included Apple Basic—which evolved into ‘software’ computing history.