Java Mobile Agents to Delegate Work That They Could Have Done, to the Agent Software

Total Page:16

File Type:pdf, Size:1020Kb

Java Mobile Agents to Delegate Work That They Could Have Done, to the Agent Software What’s an Agent? The AI-based Definition An agent is software that assists people and acts on their behalf. Agents work by allowing people Java Mobile Agents to delegate work that they could have done, to the agent software. Danny B. Lange ü Autonomous ü Social Director, Agent Technology ü Goal-driven üAdaptive ü Reactive ü Mobile General Magic, Inc. myTalk.com ©1998 General Magic, Inc. myTalk.com ©1998 General Magic, Inc. What’s an Agent? Objective and Agenda The “Object” Definition What are mobile agents? An agent is an object with its private thread of What are they good for? execution, a.k.a. an active object. How do I get started? –Definitions ü Thread-based programming (autonomous) –Seven Good Reasons ü Conditional statements (goal-driven) –Applications ü Objects with methods (reactive) –Java ü Object interaction (social) –Getting Started with Aglets ü Exception handling (adaptive) –Future ü Serializable and Persistent (mobile) myTalk.com ©1998 General Magic, Inc. myTalk.com ©1998 General Magic, Inc. What’s a Mobile Agent? – Not bound to the host where it begins DEFINITIONS execution. – Unique ability to transport itself from one host in a network to another. A mobile agent moves to a host that contains an object with which the agent wants to interact, then takes advantage of being in the same host as the object. myTalk.com ©1998 General Magic, Inc. myTalk.com ©1998 General Magic, Inc. 1 Agent is Travelling from Mobile Agent Computer to Computer Computer Agent Agent Computer Principals Interface Network Implementation Agent State Identifier Computer myTalk.com ©1998 General Magic, Inc. myTalk.com ©1998 General Magic, Inc. Place • Engine: Workhorse and virtual machine for MOBILE AGENT MODEL one or more places • Resources: Databases, processors, and other services provided by the host • Location: The network address of a given place • Principals: Those legally responsible for the operation of a place myTalk.com ©1998 General Magic, Inc. myTalk.com ©1998 General Magic, Inc. Mobile Agent Place • State: needed for the agent to resume computation after travelling Host • Implementation: needed for location- independent agent execution Agents • Interface: needed for agent communication • Identifier: needed to recognize and locate Place Resources traveling agents • Principals: needed to determine legal and Engine moral responsibility myTalk.com ©1998 General Magic, Inc. myTalk.com ©1998 General Magic, Inc. 2 Seven Good Reasons for Using Mobile Agents - #3 • They encapsulate protocols SEVEN GOOD REASONS > As protocols evolve to accommodate new efficiency or security requirements, it is a cumbersome if not impossible task to upgrade protocol code properly. > Mobile agents are able to move to remote hosts in order to establish "channels" based on proprietary protocols. myTalk.com ©1998 General Magic, Inc. myTalk.com ©1998 General Magic, Inc. Seven Good Reasons for Using Seven Good Reasons for Using Mobile Agents - #1 Mobile Agents - #4 • They reduce the network load • They execute asynchronously and autonomously App Service App Service Send agent RPC-based Host A Host B App Service Disconnect App Service Mobile Agent-based App Service approach Reconnect and return myTalk.com ©1998 General Magic, Inc. myTalk.com ©1998 General Magic, Inc. Seven Good Reasons for Using Seven Good Reasons for Using Mobile Agents - #2 Mobile Agents - #5 • They overcome network latency • They adapt dynamically > Critical real-time systems such as robots in > Mobile agents have the ability to sense their manufacturing processes need to respond to execution environment and react autonomously changes in their environments in real time. to changes. > Mobile agents offer a solution, since they can > Multiple mobile agents possess the unique be dispatched from a central controller to act ability to distribute themselves among the hosts locally and directly execute the controller's in the network in such a way as to maintain the directions. optimal configuration for solving a particular problem. myTalk.com ©1998 General Magic, Inc. myTalk.com ©1998 General Magic, Inc. 3 Seven Good Reasons for Using So What About Mobile Agents - #6 Mobile Agent Applications? • They are naturally heterogeneous > Network computing is fundamentally • There are no “Mobile Agent Applications” heterogeneous, often from both hardware and software perspectives. > As mobile agents are generally computer- and • But there are plenty of applications that highly transport-layer-independent, and dependent benefit from using mobile agents only on their execution environment, they provide optimal conditions for seamless system integration. myTalk.com ©1998 General Magic, Inc. myTalk.com ©1998 General Magic, Inc. Seven Good Reasons for Using Applications... Mobile Agents - #7 • They are robust and fault-tolerant • Telecommunication networks services > The ability of mobile agents to react > Support and management of advanced dynamically to unfavorable situations and telecommunication services are characterized events makes it easier to build robust and fault- by dynamic network reconfiguration. tolerant distributed systems. > The physical size of these networks and the > If a host is being shut down, all agents strict requirements under which they operate executing on that machine will be warned and call for mobile agent technology to form the given time to dispatch and continue their "glue" that keeps such systems flexible yet operation on another host in the network. effective. myTalk.com ©1998 General Magic, Inc. myTalk.com ©1998 General Magic, Inc. Applications... • Personal assistance. APPLICATIONS > The mobile agent's ability to execute on remote hosts makes it suitable as a "assistant" capable of performing tasks in the network on behalf of its creator. > The remote assistant will operate independently of its limited network connectivity, and the creator can feel free to turn his or her computer off. myTalk.com ©1998 General Magic, Inc. myTalk.com ©1998 General Magic, Inc. 4 Applications... The Impact of Java • Workflow applications and groupware • Secure execution • Electronic Commerce > Java has a pointer model that eliminates the • Secure Brokering possibility of overwriting memory and • Distributed information retrieval corrupting data. • Monitoring and notification > The security architecture of Java makes it reasonably safe to host an untrusted agent, • Information dissemination because it cannot tamper with the host or access • Parallel processing private information. myTalk.com ©1998 General Magic, Inc. myTalk.com ©1998 General Magic, Inc. The Impact of Java • Dynamic class loading JAVA > Allows the virtual machine to load and define classes at runtime. • Multithread programming > Agents are by definition autonomous. > Java not only allows multithread programming, but also supports a set of synchronization primitives that are built into the language. myTalk.com ©1998 General Magic, Inc. myTalk.com ©1998 General Magic, Inc. The Impact of Java The Impact of Java • Platform-independence • Object serialization > Java is designed to operate in heterogeneous > A key feature of mobile agents is that they can networks. be serialized and deserialized. > Primitive data types are rigorously specified > Java conveniently provides a built-in and not dependent on the underlying processor serialization mechanism that can represent the or operating system. state of an object in a serialized form > It allows us to create a mobile agent without sufficiently detailed for the object to be knowing the types of computers it is going to reconstructed later. run on. myTalk.com ©1998 General Magic, Inc. myTalk.com ©1998 General Magic, Inc. 5 Significant Shortcomings The Aglet Package • Inadequate support for resource control • The aglet API is simple and flexible. > Unfortunately, Java provides no ways for the • Created in the spirit of Java and representing a host to limit the processor and memory lightweight pragmatic approach to mobile agents, the resources allocated by a given object or thread. aglet API is a Java package consisting of classes and Enables denial of service attacks. interfaces, most notably: > A related issue is the ability of the agent to • Aglet allocate resources external to the program, for • AgletProxy example by opening files and sockets, and • AgletContext creating windows. • Message • FutureReply • AgletID myTalk.com ©1998 General Magic, Inc. myTalk.com ©1998 General Magic, Inc. Significant Shortcomings Aglet Class • No support for preservation and • The abstract class that you use as base class when you resumption of the execution state create your customized aglets. • Defines methods for controlling its own life cycle, > It is currently impossible in Java to retrieve the namely, methods for cloning, dispatching, full execution state of an object. deactivating, and disposing of itself. > Information such as the status of the program • It also defines methods that are supposed to be counter and frame stack is permanently overridden in its subclasses by the aglet programmer, forbidden territory for Java programs. and provides you with the necessary "hooks" to customize the behavior of the aglet. myTalk.com ©1998 General Magic, Inc. myTalk.com ©1998 General Magic, Inc. My First Aglet IBM’S AGLETS SOFTWARE DEVELOPMENT KIT (ASDK) import aglet.*; public class MyFirstAglet extends Aglet { // Put aglet's methods here } myTalk.com ©1998 General Magic, Inc. myTalk.com ©1998 General Magic, Inc. 6 Collaboration Diagram My First Aglet for Dispatch • Initialization run() public void
Recommended publications
  • Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C
    Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 In the Matter of ) ) CC Docket No. 99-273 Telegate’s Proposal for Presubscription to ) CC Docket No. 98-67 “411” Directory Assistance Services ) COMMENTS OF LOW TECH DESIGNS ON TELEGATE’S PROPOSAL FOR PRESUBSCRIPTION TO “411” DIRECTORY ASSISTANCE SERVICES SUMMARY Low Tech Designs, Inc. (“LTD”) has filed extensive comments and reply comments in various Commission proceedings concerning similar implementations of Telegate’s currently proposed combined use of abbreviated dialing arrangements, or “ADA’s” and the Advanced Intelligent Network, or “AIN”. 1 As such, LTD supports Telegate’s proposal and is grateful to the Commission for it’s formal consideration. As shown herein, the Commission should adopt the proposal made by Telegate, with certain key modifications, in order to bring competition in the provisioning of AIN, directory assistance and ADA based services to telecommunications consumers. In these previous filings, LTD has urged the Commission to order the competitive use of abbreviated dialing arrangements, currently in the form of N11, *XX, *2XX and *3XX, as dialable telephone numbers without the requirement of presubscription. Because existing incumbent local exchange carriers (“ILEC’s”) offer *XX based services without requiring presubscription, in the form of pay-per-use *66 and *69 offerings, LTD has urged 1 See LTD’s Comments and Reply Comments filed in the Abbreviated Dialing Docket (92-105) and UNE Remand the Commission to allow similar competitive provisioning of *XX type services on a non-presubscribed basis using AIN-based officewide triggers. The current proposal could alleviate the need to provide access to other ADA’s while still providing service providers, such as LTD, with a meaningful opportunity to compete in the provisioning of ADA and AIN based services.
    [Show full text]
  • Redalyc.Brainlets: Dynamic Inferential Capabilities for Agent
    Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: 1137-3601 [email protected] Asociación Española para la Inteligencia Artificial España Belloni, Edgardo; Campo, Marcelo BrainLets: Dynamic Inferential Capabilities for Agent-based Web Systems Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial, vol. 5, núm. 13, 2001, pp. 108- 114 Asociación Española para la Inteligencia Artificial Valencia, España Available in: http://www.redalyc.org/articulo.oa?id=92521311 How to cite Complete issue Scientific Information System More information about this article Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Journal's homepage in redalyc.org Non-profit academic project, developed under the open access initiative BrainLets: Dynamic Inferential Capabilities for Agent-based Web Systems Edgardo Belloni Marcelo Campo ISISTAN Research Institute - UNICEN University Campus Universitario - Paraje Arroyo Seco Tandil (B7001BBO), Buenos Aires, Argentina {ebelloni, mcampo}@exa.unicen.edu.ar Abstract This article presents Brainlets, a new mechanism designed to enhance the functionality of web servers with inferential capabilities. Brainlets are mobile Prolog modules supported by an extension to JavaLog virtual machine that enables a strong mobility model. This support is enabled in web servers trough specialized servlets, called MARlets, which provide the JavaLog inference machine. BrainLets can migrate among different hosts in order to meet other agents, to access to resources
    [Show full text]
  • The Architecture of the Ara Platform for Mobile Agents
    To appear in: Kurt Rothermel, Radu Popescu-Zeletin (Eds.): Proceedings of the First International Workshop on Mobile Agents, MA’97, April 7-8th 1997, Berlin, Germany. Lecture Notes in Computer Science Nr. 1219, Springer Verlag 1997. ISBN: 3-540-62803-7 The Architecture of the Ara Platform for Mobile Agents Holger Peine and Torsten Stolpmann Dept. of Computer Science University of Kaiserslautern, Germany {peine, stolp}@informatik.uni-kl.de Abstract: We describe a platform for the portable and secure execution of mobile agents written in various interpreted languages on top of a common run-time core. Agents may migrate at any point in their execution, fully preserving their state, and may exchange messages with other agents. One system may contain many virtual places, each establishing a domain of logically related services under a common security policy governing all agents at this place. Agents are equipped with allowances limiting their resource accesses, both globally per agent lifetime and locally per place. We discuss aspects of this architecture and report about ongoing work. Keywords: migration, multi-language, interpreter, Tcl, C, byte code, Java, persistence, authenti- cation, security domain. 1. Introduction Mobile agents have raised considerable interest as a new concept for networked com- puting, and numerous software platforms for various forms of mobile code have recently appeared and are still appearing [CGH95, CMR+96, GRA96, HMD+96, LAN96, LDD95, JRS95, RAS+97, SBH96]. While there seems to have emerged a wide agreement about the general requirements for such systems, most notably porta- bility and security of agent execution, many issues are still debated, as witnessed by the numerous approaches exploring diverging solutions.
    [Show full text]
  • Why Did Apple Kill Newton?
    From Pen Computing Magazine #22, June 1998 Why Did Apple Kill Newton? ©Copyright 1998 David MacNeill Early Friday morning, February 27, 1998, Apple Computer made official what the Newton cognoscenti had strongly suspected for six months: the Newton handheld computing platform was dead. The rather terse press release gave the basic facts: Apple will cease all Newton OS hardware and software development, no more products will be made after the existing stock is depleted, and Apple will continue to provide support to users. Brief mention was made of development of a new low-cost Mac OS-based mobile device in the future, but no details were offered. But the most galling omission was the lack of an answer to the question on the minds of hundreds of thousands of shocked, angry Newton owners: Why? Before I attempt to answer this question, let’s take a quick tour of the mercurial five-year career of Newton. This will serve to prepare you for the several explanations we will be considering. A brief history of Newton During its turbulent five-year life, Newton technology was close to death several times, yet always managed to survive. Department heads came and went, but the essential concept of the personal digital assistant (PDA) was too compelling to die easily: A small, inexpensive, pen-based computing device that would accompany you everywhere, and that would learn enough about you to make informed assumptions about how to help you keep track of the myriad little bits of information we all must carry. It would be simple enough for anyone to use, a true computer for the rest of us.
    [Show full text]
  • Poor Printquality
    DOCUMENT RESUME ED 412 932 IR 018 598 AUTHOR Ando, Takatoshi TITLE PTC Mid Year Seminar. Collection of Presentations (Yokohama, Japan, June 3-4, 1997). INSTITUTION Pacific Telecommunications Council, Honolulu, HI. PUB DATE 1997-00-00 NOTE 177p.; Proceedings of the Pacific Telecommunications Council Mid-Year Seminar (Yokohama, Japan, June 3-4, 1997). Some figures may not reproduce clearly. PUB TYPE Collected Works Proceedings (021) LANGUAGE Japanese, English EDRS PRICE MF01/PC08 Plus Postage. DESCRIPTORS Business; *Computer Networks; Electronic Equipment; Foreign Countries; Futures (of Society); *Information Technology; International Relations; *Internet; Multimedia Materials; Strategic Planning; *Technological Advancement; *Telecommunications; User Needs (Information) IDENTIFIERS Asia Pacific Region; Digital Technology; Electronic Commerce; Japan; Korea; United States ABSTRACT This proceedings volume from the Pacific Telecommunications Council Mid-Year Seminar includes the following presentations: "Platform and Equipment for Access Network" (Yukou Mochida); "Integrated Services Television: Digital Age TV with a Built-in Home Server" (Tatsuhito Nagaya); "Future of the Internet: Future of Telecommunications" (Anthony M. Rutkowski) ;"NTT's Overseas Busi r; Ct:f'stcgy" "KDD'S Future Strategy, Clicking on the Asia-Pacific Region" (Tohru Ohta); "Wireless Communications in Korea: The New Strategy under Competition and Open-Door Policy" (SK Telecom); "U.S. User Requirements and Industry Implications" (Lee A. Daniels); "Requests to Telecom Carriers" (Toyota Motor Corporation); "Network System in Banking Industry;" "Platform and Equipment for Multimedia Network and Its Applications" (Eiichi Yoshikawa); "Network Services in Multimedia Era" (Toru Adachi); "Viewer's Service Integration;" "The Global Network Society: Business Opportunities and Challenges: New Applications in an Era of Convergence" (Karl K. Rossiter); "What Does Internet Bring to Schools?" (Hiroshi Nakagawa); "The Business and Law of Web Commerce" (George E.
    [Show full text]
  • Penrose in the New Economy
    Penrose in the New Economy Benjamin Gomes‐Casseres Forthcoming in Strategic Management Review Edith Penrose’s theory eminently fit the mid‐20th century firms and industries that she studied. What would she say about the very different firms in today’s New Economy? I update Penrose’s model with new theories of the firm that emerged after she wrote, including economics of contracting and of the new digital economy. These newer theories fit well with her concepts, and even help complete Penrose’s model. I also explore how firms in the New Economy leverage their internal resources by using alliances, ecosystems, and platforms to access the services of external resources. These strategies expand the pool of resources available to the firm, and enable firms to grow faster than Penrose imagined. Further, these bundles of resources are governed by administrative mechanisms that she did not originally contemplate, including the use of code to automate decisions. While Penrose taught us to see the firm as a bundle of resources, we now see that not all bundles of resources are firms. This new perspective helps bring Penrose up to date with firms and industries in the New Economy. Version: V5.0, April 20, 2020 Benjamin Gomes‐Casseres Peter A. Petri Professor of Business and Society Brandeis University International Business School Waltham, Mass., USA Email: [email protected] 2 When Edith Penrose wrote The Theory of the Growth of the Firm (TGF)1, firms like Du Pont, General Motors, Standard Oil represented the pinnacle of the American economy. Her analysis was based on thoughtful observation of their practices, specifically those of the Hercules Powder Company.
    [Show full text]
  • Andy Hertzfeld
    After a bad first quarter in 1993, operating. It was first booted up Apple’s board forced Sculley out, in Autumn 1978 at Essex April 6th and he was replaced by German- University on a DEC PDP-10 born Michael Spindler. [Nov 00]. It was originally coded in MACRO-10 assembly by Roy John Sculley III Trubshaw. Born: April 6, 1939; Andy Hertzfeld The MUD name is a tribute to the Dungeon variant of Zork NYC Born: April 6, 1953; [May 27] which Trubshaw loved Sculley was president of Pepsi- Philadelphia, Pennsylvania playing at the time. Of course, Cola for six years until Steve Zork was itself inspired by Hertzfeld was a member of the Jobs [Feb 24] lured him away to Colossal Cave Adventure [March Apple Mac [Jan 24] development become Apple CEO on April 8, 11]. team who wrote large portions 1983 with the legendary pitch: of the system software, On this day, Trubshaw finished “Do you want to sell sugared including much of the ROM code, re-coding MUD version 3 in water for the rest of your life? Or the multitasking Switcher BCPL [July 21] (the predecessor do you want to come with me program, the User Interface of C), primarily to make the and change the world?” Toolbox, and several GUI tools program easier to maintain. One The move was also backed by such as the Control Panel and of his innovations was to write a Apple’s then president, Mike Scrapbook. BCPL interpreter for a game Markkula [Feb 11], who believed language he invented, called that Jobs lacked the discipline to MUDDL (Multi User Dungeon run Apple himself.
    [Show full text]
  • Hintz 1 DRAFT V1 – Please Do Not Cite Without Author's Permission. Susan
    Hintz 1 Susan Kare: Design Icon by Eric S. Hintz, PhD Historian, Lemelson Center for the Study of Invention and Innovation National Museum of American History, Smithsonian Institution [email protected] SHOT SIGCIS – Works in Progress Session Albuquerque, NM October 11, 2015 DEAR COLLEAGUES: Thanks for reading this work-in-progress! I’m a SIGCIS rookie and relatively new to the history of computing. Thus, in terms of feedback, I’d appreciate a) some sense of whether this proposed article would have any traction within the scholarly/SIGCIS community and b) some help situating the story within the relevant secondary literature and historiography. Finally, given the largely non-archival sources I had to work with, I wrote this up more like a magazine feature (vs. scholarly article) so I’d also appreciate c) any suggestions for appropriate journals and publication venues. P.S. This article is ripe for lots of colorful images. Thanks! ESH Graphic designer Susan Kare has been called the “the Betsy Ross of the personal computer,” the “Queen of Look and Feel,” the “Matisse of computer icons,” and the “mother of the Mac trash can.”1 Indeed, Kare is best known for designing most of the distinctive icons, typefaces, and other graphic elements that gave the Apple Macintosh its characteristic—and widely emulated—look and feel. Since her work on the Mac during the early 1980s, Kare has spent the last three decades designing user interface elements for many of the leading software and Internet firms, from Microsoft and Oracle to Facebook and Paypal. Kare’s work is omnipresent in the digital realm; if you have clicked on an icon to save a file, switched the fonts in a document from Geneva to Monaco, or tapped your smart phone screen to launch a mobile app, then you have benefited from her designs.
    [Show full text]
  • Explore Magic Cap, a Smartphone OS from a Decade Before the Iphone Created by Matthew Goodrich
    Explore Magic Cap, a smartphone OS from a decade before the iPhone Created by Matthew Goodrich Last updated on 2019-08-30 05:49:53 PM UTC Overview Next in our series of "people who left Apple and founded a revolutionary company that was ahead of its time and created amazing products but ultimately failed," let's check out General Magic and their operating system called Magic Cap. General Magic was formed by Marc Porat, Andy Hertzfeld, and Bill Atkinson in 1990. They had been working on an internal Apple project called Paradigm, but convinced Apple CEO John Sculley to spin it off as a separate company. Their idea was called a personal digital assistant in the 90s, but looking at it now it looks a lot like a modern smartphone. Porat described it as "a tiny computer, a phone, a very personal object... It must be beautiful. It must offer the kind of personal satisfaction that a fine piece of jewelry brings. It will have a perceived value even when it's not being used... Once you use it you won't be able to live without it." Check out Josh Carter's page, Before General Magic There Was Paradigm (https://adafru.it/FHG). That looks a lot like an iPhone (except for the stylus, Jobs would get rid of that), and this was in 1990! Take a look at a video of Andy Hertzfeld demoing a General Magic phone prototype in 1995: And check out this trailer for a documentary about General Magic: Let's install a Magic Cap emulator and see what it was like! Unfortunately, the emulator is from the 90s and it runs on 90s Mac OS, so we need to install another emulator first.
    [Show full text]
  • A History of the Personal Computer Index/11
    A History of the Personal Computer 6100 CPU. See Intersil Index 6501 and 6502 microprocessor. See MOS Legend: Chap.#/Page# of Chap. 6502 BASIC. See Microsoft/Prog. Languages -- Numerals -- 7000 copier. See Xerox/Misc. 3 E-Z Pieces software, 13/20 8000 microprocessors. See 3-Plus-1 software. See Intel/Microprocessors Commodore 8010 “Star” Information 3Com Corporation, 12/15, System. See Xerox/Comp. 12/27, 16/17, 17/18, 17/20 8080 and 8086 BASIC. See 3M company, 17/5, 17/22 Microsoft/Prog. Languages 3P+S board. See Processor 8514/A standard, 20/6 Technology 9700 laser printing system. 4K BASIC. See Microsoft/Prog. See Xerox/Misc. Languages 16032 and 32032 micro/p. See 4th Dimension. See ACI National Semiconductor 8/16 magazine, 18/5 65802 and 65816 micro/p. See 8/16-Central, 18/5 Western Design Center 8K BASIC. See Microsoft/Prog. 68000 series of micro/p. See Languages Motorola 20SC hard drive. See Apple 80000 series of micro/p. See Computer/Accessories Intel/Microprocessors 64 computer. See Commodore 88000 micro/p. See Motorola 80 Microcomputing magazine, 18/4 --A-- 80-103A modem. See Hayes A Programming lang. See APL 86-DOS. See Seattle Computer A+ magazine, 18/5 128EX/2 computer. See Video A.P.P.L.E. (Apple Pugetsound Technology Program Library Exchange) 386i personal computer. See user group, 18/4, 19/17 Sun Microsystems Call-A.P.P.L.E. magazine, 432 microprocessor. See 18/4 Intel/Microprocessors A2-Central newsletter, 18/5 603/4 Electronic Multiplier. Abacus magazine, 18/8 See IBM/Computer (mainframe) ABC (Atanasoff-Berry 660 computer.
    [Show full text]
  • Telescript Language Reference
    Telescript Language Reference October 1995 General Magic, Inc. 420 North Mary Avenue Sunnyvale, CA 94086 The Telescript Language Reference © 1991 - 1995 General Magic, Inc. All rights reserved ™ Copyright and Trademark The general idea of a remote programming language is in the public domain. Anyone is free to formulate his or her own expression of this idea by devising a unique language structure, syntax and vocabulary. However, General Magic exercised a great deal of original expression when choosing the structure, syntax and vocabulary of the Telescript language. Therefore, General Magic believes that it owns the copyright in the structure, syntax and vocabulary of the Telescript programming language. General Magic believes that no one else can create a Telescript language interpreter without violating its copyright. General Magic is also seeking patent protection on some of the novel inventions in the Telescript architecture and software agent functionality. Finally, General Magic owns the trademark “Telescript,” which has been registered in the U.S. and many other jurisdictions. General Magic uses the “Telescript” trademark to identify General Magic’s Telescript software. General Magic wants to promote the use of the Telescript language as an enabling technology for creating “smart” networks. Therefore, we have an open, non-discriminatory policy on licensing our Telescript software for research and development, and commercial purposes. We also encourage you to write programs in the Telescript language. Feel free to incorporate any of the sample programs contained in this document into your programs. General Magic, the General Magic logo, the Magic Cap logo, the Telescript logo, Magic Cap, Telescript, and the rabbit-from-a-hat logo are trademarks of General Magic, and may be registered in certain jurisdictions.
    [Show full text]
  • An Experience with Cloud Computing in the Classroom
    AC 2010-1447: AN EXPERIENCE WITH CLOUD COMPUTING IN THE CLASSROOM Susan Miertschin, University of Houston Susan L. Miertschin is an Associate Professor in Computer Information Systems at the University of Houston. She began her career in higher education teaching applied mathematics for engineering technology students. She demonstrated consistent interest in the application of information and communication technologies to instruction. This interest plus demonstrated depth of knowledge of computer applications and systems caused her to change her teaching focus to computer information systems in 2000. Recently, she has completed graduate course work in the area of Medical Informatics in order to deepen and broaden her knowledge of a key application domain for information systems. She has taught both online and hybrid courses and is interested in enhancing the quality of online learning experiences. Cheryl Willis, University of Houston Cheryl Willis is an Associate Professor of Information Systems Technology at the University of Houston. She received her Ph.D. in Curriculum and Instruction from the University of Florida. Her teaching focus is primarily on applications development and database management. Her research interests include curriculum revision processes for career and technology programs; service learning in information technology undergraduate programs and the use of emerging technologies in undergraduate teaching. She has developed curriculum for business education and information technology at the secondary, post-secondary, undergraduate, and graduate levels. Page 15.150.1 Page © American Society for Engineering Education, 2010 An Experience with Cloud Computing in the Classroom Introduction Cloud computing is a general term for shared applications and infrastructure provided by an external service provider and paid for on a pay-per-use basis.
    [Show full text]