Computer and Information Services Newsletter

Total Page:16

File Type:pdf, Size:1020Kb

Computer and Information Services Newsletter UNIVERSITY OF MINNESOTA l ) Computer and Information Services Newsletter This newsletter is an information resource for the University of Minnesota. Volume 5, Number 4 Published monthly by Distributed Computing Services, 100 Union Street SE, 190 Shepherd Labs, Minneapolis MN 55455 October 1995 Digital Media Center v Features Mission Announcements The Digital Media Center at the University of Minnesota Digital Media Center .................................... 1 provides technical and design support for the develop­ Internet Account Type Changes ................... 5 ment of multimedia applications in teaching and learning. Services for Students Faculty engaged in multimedia projects for learning are ) Student Access to Computer Facilities ...... 12 invited to use the facilities at the Digital Media Center, Services for Departments or Faculty 15 Walter Library. Students working under the direction Customized Programming of faculty may also use the facilities. and Software Services ........................ 43 Digital Media Center Fall Quarter Multimedia Training ......... 4 7 Rent-a-Mac Classroom ............................... 17 Technical Coordinators Program ................ 15 ,. """"""' Services for the University Community Information Technology Campus-wide Internet & E-mail Access ........ 8 Disability & Computing Services ................ 19 Changes Engineering Services ................................. 20 IBM and Mac Information Servers .............. 29 Microcomputer Users, Services for ............ 23 Over the next months the University commu­ Research Computing nity will see some of the recommendations of . Central Computing Services and the Information Technology Redesign Task St. Paul Services ................................ 39 Force take place. These changes will involve Software Site Licenses .............................. 32 organizational changes. To learn more about Statistical Software Support ...................... 19 The Internet Never Sleeps ......................... 25 these and other changes occurring at the Uni­ Training Resources .................................... 46 versity, you can visit the Administrative Process Workstation Support Group ........................ 18 Redesign Advisory Group Web page at this Virtual Library URL: Getting to the Heart of the Matter ....... 44 http://megaseuss.micro.urnn.edu/aprg ) Printed on recycled paper. It •). Addressing & Mailing's • ... ~ Cheshire labels are recyclable. ~ Page 2 October 1995 Computer and ... The University of Minnesota Digital Media Center is a partner in the New Media Centers program. The program is an international non-profit organization committed to helping institutions of higher educa­ tion enhance teaching and learning through the use of new media, such as desktop and networked multi­ media. Currently there are 52 higher education institutions participating in the New Media Centers program. For more information on the New Media Grand Opening Centers, point your Web browser to the URL shown October 26 in Figure l. 64 Eddy Hall Annex (Learning Laboratory) Services D 1:00-2:00 Opening Remarks Service is provided at four levels: multimedia develop­ Don Riley, Associate Vice President for Academic ment, training, media resource repository, and clearinghouse. We encourage you to use this URL to Affairs, Office of Information Technology visit our Web site for more information. Impact of Digital Media Center on the Future Harold Miller, Dean of Continuing Education http://www-dmc.tc.umn.edu/ and Extension-University College Multimedia Development Digital Media Center Mission and Services At our Development Suite, 15 Walter Library, faculty Linda Jorn, Acting Director, Digital Media Center can reserve time at workstations to develop multime­ dia materials. Staff are available to: Closing remarks D consult on a one-to-one basis to help you plan Thomas Shaughnessy, University Librarian and manage your multimedia project D consult on interface design issues D 2:00-3:00 D demonstrate how to digitize and edit video, still Multimedia-Looking Ahead images, and audio Scott Brekken, Apple Computer Inc., D answer questions about hardware and software Briefing Center The Development Suite currently contains four Power Macintosh 8100/100 AV machines (48MB 15 Walter Library (Development Suite) RAM, 1000MB Hard Disk, CD-ROM) each with: 0 3:00-5:00 D two monitors Come and • enjoy refreshments • view faculty (SuperMatch STD 17" Monitor multimedia projects • view vendors multimedia and Apple Color Plus 14" Monitor) applications • see demonstrations of the Digital D an optical drive Media Center's software/hardware (FWB HammerDisk 230MB Optical Drive) C a SyQuest drive The first l 00 visitors will receive (FWB HammerDisk 84MB SyQuest Drive) a free Digital Media Center T -shirt. Figure 1: New Media Centers Information http://www.csulb.edu/-newmedia/Academic.html ... Information Services October 1995 Page 3 Later in the year we will expand the programs to We expect that the hardware and software available in include IBM and compatible platforms. the Development Suite will change frequently. For a I current list of our hardware and software, visit our The Development Suite also houses a full suite of Web site. digitizing equipment and other peripherals, such as: D a video digitizer/frame grabber (Radius Video Vision Studio Pro Pack, Courses and Training Facility including a 4GB external hard disk array) The Digital Media Center provides seminars and D a VCR (Sony SLV-RlOOO S-VHS VCR) hands-on short courses related to the development of D a laserdisc player multimedia projects. Courses and seminars will be (Pioneer LDV-4400 LaserDisc Player) conducted in the Learning Laboratory, 64 Eddy Hall D a slide scanner Annex. Details on training available during Fall (Mirror Nikon CoolScan) quarter can be found in a separate Multimedia D a flat-bed scanner schedule elsewhere in this newsletter. (Apple Color OneScanner) D a video camera Departments offering courses or providing seminars (Sony CCD-TR700 Video HiS Camcorder) that require multimedia hardware and software can D a digital camera (Apple QuickTake 100) rent 64 Eddy Hall Annex for a fee. Rental is available D a MIDI keyboard (Kawai X50D) for courses that last an entire quarter or for seminars that are shorter in length. The facilities are suitable A variety of multimedia software programs are avail­ for hands-on use of all the computers or for presenta­ able in the Development Suite for digitizing and tion-only use. All the machines are directly connected editing video, still images, and audio; painting, to the campus network. Call us at 625-5055 for more drawing, graphing, and animating images; and information about renting the training facility. I authoring multimedia projects. Below is a sampling of the software currently available: The presentation station in the Learning Laboratory is a Power Macintosh 8100/100 AV machine (48MB Multimedia Authoring RAM, 1000MB Hard Disk, CD-ROM) with a Power Point SuperMatch STD 17" Monitor. The presentation Authorware Professional station also includes: Director D an LCD Projector HyperCard (Eiki LC-5200 Multimedia Projector) Mac Presents D speakers (AppleDesign Powered Speakers) Acrobat Exchange D an optical drive (FWB HammerDisk 230MB Optical Drive) Audio, Video, and Image Editing D a SyQuest drive Photoshop (FWB HammerDisk 84MB SyQuest Drive) Premiere D the same suite of digitizing equipment and SoundEdit 16 other peripherals available in the Development Finale Suite Graphics Illustrator The ten training stations in the Learning Laboratory SuperPaint "'rp PrmrPr M,.rintn<:h ~ 1 00 /100 AV m,.rhinP<: Page 4 October 1995 Computer and ... Media Resource Repository To subscribe, send an E-mail message to: The Digital Media Center houses a collection of multimedia resources, which include courseware [email protected] examples, magazines (on-line and print), books, CDs, and public-domain images, video, and sounds. Leave the subject of the message blank. In the first character position in the body of the message, type the following text: Clearinghouse Our Web site provides an abundance of information subscribe dmc-umn <your name> on multimedia. For example, we have information about: For example, if your name were Jane Jones, you D multimedia projects underway at the University would type: of Minnesota D other University of Minnesota resources available subscribe dmc-urnn Jane Jones to assist in multimedia development D the multimedia project planning process Do not attach a signature to the message. D on-line multimedia resources, e.g. links to URLs for an on-line multimedia annotated bibliogra­ phy, copyright information, multimedia listservs, Staff and multimedia vendors Our staff reflects the collaborative nature of this venture. Staff from Distributed Computing Services and University Libraries, along with graduate and Mailing List undergraduate students, work together to provide The Digital Media Center also has this E-mail distri­ faculty with multimedia training and development bution list support. If you have any questions, please feel free to visit us at 15 Walter Library, call us at 625-5055, or [email protected] send E-mail to The primary focus of this list is to discuss the devel­ [email protected] opment of multimedia applications for learning. We anticipate that people will use this list to discuss: D how to enhance learning activities through the use of multimedia D how to evaluate the effectiveness of multimedia in the classroom Digital
Recommended publications
  • Using Netpresenz
    NetPresenz 4.1 from netpresenz.com NB: Please click the "I Paid" checkbox in NetPresenz Setup - FTP Setup dialog. Contents What NetPresenz Does Features Using NetPresenz Setup FTP Setup WWW and Gopher Setup FTP Setup Details Scripting NetPresenz Setup Using NetPresenz Referring to your Server Using NetPresenz from a Un*x FTP Client Remote Volume Mounting Miscellaneous FTP Commands WWW Server Side Includes CGIs Java Missing files Gopher Security Considerations Avoid the Wrath of your Network Admin Limitations Remote Site Access Restrictions Acknowledgements How It Works What NetPresenz Does NetPresenz is a Macintosh implementation of the WWW, Gopher and FTP server protocols. It should be compatible with most FTP clients, and all WWW and Gopher clients. Basically it allows your Mac to act as an FTP server so you (and others) can access your files from anywhere around the world. Obviously there are some serious security considerations you should look into before using this software (see the Security Considerations section). NetPresenz requires System 7, MacTCP 1.1, and File Sharing enabled. It honours the Users & Groups privileges and passwords, and supports multiple logins, anonymous FTP (user name “anonymous” or “ftp”), as well as MacBinary and BinHex transfers, and the “MACB” FTP command. You can run NetPresenz as a foreground application (displaying the log), or as a background only application (use NetPresenz Setup to toggle between the two). Features Support WWW, Gopher and FTP connections. Full CGI support. Multiple simultaneous users. Honours System 7 Users & Groups (in fact depends on them!). Server Side Includes (SSI), counters and include files, file modification date and so forth.
    [Show full text]
  • 2045 Innosoft Obsoletes: 1521, 1522, 1590 N
    Network Working Group N. Freed Request for Comments: 2045 Innosoft Obsoletes: 1521, 1522, 1590 N. Borenstein Category: Standards Track First Virtual November 1996 Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract STD 11, RFC 822, defines a message representation protocol specifying considerable detail about US-ASCII message headers, and leaves the message content, or message body, as flat US-ASCII text. This set of documents, collectively called the Multipurpose Internet Mail Extensions, or MIME, redefines the format of messages to allow for (1) textual message bodies in character sets other than US-ASCII, (2) an extensible set of different formats for non-textual message bodies, (3) multi-part message bodies, and (4) textual header information in character sets other than US-ASCII. These documents are based on earlier work documented in RFC 934, STD 11, and RFC 1049, but extends and revises them. Because RFC 822 said so little about message bodies, these documents are largely orthogonal to (rather than a revision of) RFC 822. This initial document specifies the various headers used to describe the structure of MIME messages. The second document, RFC 2046, defines the general structure of the MIME media typing system and defines an initial set of media types.
    [Show full text]
  • AIS Data Profile 30 December 2016
    AIS Data Profile 30 December 2016 STIX Tab STIX Sub-Tab IN/OUT Examples Field Guidance Type Text Type STIX Core STIX Type BOTH [Company Name]:[Column A]- @id This is a required field - NCCIC will replace on xs:QName Schema restricted text [Company Unique ID] dissemination with NCCIC values. (partial) BOTH 1.1.1 @version This is a required field - DHS will not accepted stix:STIXPackageVersionEnum Vocabulary defined text anything other than 1.1.1 If anything other than the accepted value is submitted the field will be removed during the sanitization process. BOTH 2002-05-30T09:00:00 @timestamp This is a required field - Schema restricted text - xs:dateTime Schema restricted text This field should be date and time only. BOTH NA STIX_Header This is a required Container Object. stix:STIXHeaderType Container BOTH NA Indicators Container Object stix:IndicatorsType Container BOTH NA TTPs Container Object stix:TTPsType Container BOTH NA Courses_of_Action Container Object stix:CoursesOfActionType Container BOTH NA Exploit_Targets Container Object stix_common:ExploitTargetsType Container STIX Header Type BOTH Provides an unstructured, text Title Review Field - On automated dissemination this xs:string Free form text title field will be replaced by an auto-generated Title. The submitted contents will be reviewed/modified/sanitized and disseminated via human manual process. Future capabilities may eliminate the human review process. BOTH See Vocab Tab Package_Intent This is a required field - Reference the Vocab stixCommon:ControlledVocabularyStringType Vocabulary defined text Tab - stixVocabs:PackageIntentEnum-1.0 stixVocabs:PackageIntentEnum-1.0 If anything other than the accepted value is submitted the field will be removed during the sanitization process.
    [Show full text]
  • Cal Anderson, OTARMA IT Risk Control Specialist
    2019 CYBER PRESENTATION Cal Anderson, OTARMA IT Risk Control Specialist Cal Anderson Bio • 20 plus years of industry experience in Information Systems, Cyber Security & Risk Management • Specialize in performing Cyber Security, SOX IT, enterprise IT audits and enterprise IT risk assessments of Fortune 500, mid‐range and small scale IT environments. • Specialize in Data Governance, Data validation and flowcharting business processes from beginning to end. • Certified: CISA, CRISC, CWM, CSQL • Certified Notary Public for the state of Ohio Goal • Provide overview of IT Risk Control Specialist function • Provide overview of the IT Risk assessment process • Provide overview of IT Risk Control Specialist function conducting training and providing IT information to the OTARMA member bases. • Provide comprehensive Cyber Security educational content for managing cyber threats. 1 IT RISK CONTROL SPECIALIST FUNCTION High‐Level Tasks perform by the IT Risk Control Specialists: • Conduct IT Risk Assessment o Identification/PII Risks o Analyze risks and how it will affect the member • Risk Evaluation o Costs o Legal Requirements o Environmental Factors o Members handling of risks • Provide recommendations to address IT issues and deficiencies. • Consult with members to answer their questions and to educate/promote awareness. • Conduct IT training IT Risk Assessment Process Members Base Management o Visit Scheduling o Visit Confirmation Onsite IT Risk Assessment o Assessment o Activities Member Base Management Visit Scheduling o Call or email member
    [Show full text]
  • Testing Software Tools of Potential Interest for Digital Preservation Activities at the National Library of Australia
    PROJECT REPORT Testing Software Tools of Potential Interest for Digital Preservation Activities at the National Library of Australia Matthew Hutchins Digital Preservation Tools Researcher 30 July 2012 Project Report Testing Software Tools of Potential Interest for Digital Preservation Activities at the National Library of Australia Published by Information Technology Division National Library of Australia Parkes Place, Canberra ACT 2600 Australia This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 2.1 Australia License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/2.1/au/ or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco California 94105 USA. 2│57 www.nla.gov.au 30 July 2012 Creative Commons Attribution-NonCommercial-ShareAlike 2.1 Australia Project Report Testing Software Tools of Potential Interest for Digital Preservation Activities at the National Library of Australia Summary 5 List of Recommendations 5 1 Introduction 8 2 Methods 9 2.1 Test Data Sets 9 2.1.1 Govdocs1 9 2.1.2 Selections from Prometheus Ingest 9 2.1.3 Special Selections 10 2.1.4 Selections from Pandora Web Archive 11 2.2 Focus of the Testing 11 2.3 Software Framework for Testing 12 2.4 Test Platform 13 3 File Format Identification Tools 13 3.1 File Format Identification 13 3.2 Overview of Tools Included in the Test 14 3.2.1 Selection Criteria 14 3.2.2 File Investigator Engine 14 3.2.3 Outside-In File ID 15 3.2.4 FIDO 16 3.2.5 Unix file Command/libmagic 17 3.2.6 Other
    [Show full text]
  • AP-DATA Supported File Formats and Size Limits V8.2
    TRITON AP-DATA Supported File Formats and Size Limits Supported File Formats and Size Limits | TRITON AP-DATA| Version 8.2.x This article provides a list of all the Supported File Formats that can be analyzed by Forcepoint™ TRITON® AP-DATA, as well as the File Size Limits for network, endpoint, and discovery functions. Use the arrows to proceed. Supported File Formats Supported File Formats and Size Limits | TRITON AP-DATA | Version 8.2.x This article provides a list of all the file formats that TRITON AP-DATA supports. The file formats supported are constantly being updated and added to. File Type Description 7-Zip 7-Zip format Ability Comm Communication Ability Ability DB Database Ability Ability Image Raster Image Ability Ability SS Spreadsheet Ability Ability WP Word Processor Ability AC3 Audio File Format AC3 Audio File Format ACE ACE Archive ACT ACT AD1 AD1 evidence file Adobe FrameMaker Adobe FrameMaker Adobe FrameMaker Book Adobe FrameMaker Book Adobe Maker Interchange Adobe Maker Interchange format Adobe PDF Portable Document Format Advanced Streaming Microsoft Advanced Streaming file TRITON AP-DATA - Supported Files Types and Size Limits 1 TRITON AP-DATA Supported File Formats and Size Limits File Type Description Advanced Systems Format Advanced Systems Format (ASF) Advanced Systems Format Advanced Systems Format (WMA) Advanced Systems Format Advanced Systems Format (WMV) AES Multiplus Comm Multiplus (AES) Aldus Freehand Mac Aldus Freehand Mac Aldus PageMaker (DOS) Aldus PageMaker for Windows Aldus PageMaker (Mac) Aldus PageMaker
    [Show full text]
  • Emacs MIME Manual
    Emacs MIME Manual by Lars Magne Ingebrigtsen This file documents the Emacs MIME interface functionality. Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with no Invariant Sections, with the Front-Cover texts being “A GNU Manual”, and with the Back-Cover Texts as in (a) below. A copy of the license is included in the section entitled “GNU Free Documentation License” in the Emacs manual. (a) The FSF’s Back-Cover Text is: “You have freedom to copy and modify this GNU Manual, like GNU software. Copies published by the Free Software Foundation raise funds for GNU development.” This document is part of a collection distributed under the GNU Free Documentation License. If you want to distribute this document separately from the collection, you can do so by adding a copy of the license to the document, as described in section 6 of the license. 1 Emacs MIME This manual documents the libraries used to compose and display MIME messages. This manual is directed at users who want to modify the behaviour of the MIME encod- ing/decoding process or want a more detailed picture of how the Emacs MIME library works, and people who want to write functions and commands that manipulate MIME elements. MIME is short for Multipurpose Internet Mail Extensions. This standard is documented in a number of RFCs; mainly RFC2045 (Format of Internet Message Bodies), RFC2046 (Me- dia Types), RFC2047 (Message Header Extensions for Non-ASCII Text), RFC2048 (Regis- tration Procedures), RFC2049 (Conformance Criteria and Examples).
    [Show full text]
  • Forcepoint Email Security Cloud Help
    Forcepoint Cloud Security Gateway Portal Help Forcepoint Email Security Cloud 2021 ©2021 Forcepoint Forcepoint. Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. All other trademarks used in this document are the property of their respective owner. Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice. Last modified: June 25, 2021 Contents Chapter 1 Getting Started . .1 About this guide . .2 Initial steps . .3 Logging on and portal security. .3 Locking down your firewalls . .4 Privacy statement . .4 Idle timeout . .4 Customizable landing page . .4 Cloud portal navigation . .5 Dashboard . .6 Alerts . .7 Chapter 2 Account Settings . .9 My Account . .10 Configuring SIEM storage . .10 Contacts . .12 Adding a contact . .12 Password settings . .16 Password policy . .17 Password expiration limit . .18 User lockout . .18 Changing passwords . .19 Forgotten passwords . .20 Two-factor authentication . .21 Terms of use. .22 Custom file types . .23 Identity Management . .23 End Users . .24 Groups . .25 Downloading and uploading groups . .25 Licenses . .26 Licenses page . .27 License information. .27 Accepting licenses. .27 Data Protection Settings . .28 Important rules for configuring accounts . .29 Chapter 3 Working with External Directories. .31 Forcepoint Cloud Security Gateway Portal Help 1 Contents What is LDAP?.
    [Show full text]
  • Kermit User Guide
    KERMIT USER GUIDE Seventh Edition Christine Gianone, Editor Columbia University Center for Computing Activities New York, New York 10027 May 26, 1988 Copyright (C) 1981,1988 Trustees of Columbia University in the City of New York Permission is granted to any individual or institution to use, copy, or redistribute this document so long as it is not sold for profit, and provided this copyright notice is retained. PREFACE Page 1 PREFACE Kermit is the name of a protocol for transferring files from one computer to another over ordinary asynchronous terminal connections. Kermit programs have been written for many different computers, and in general any two computers that have Kermit programs can exchange sequential files correctly and completely. This manual gives a brief and general overview of what Kermit is and how to use it, but consists mostly of detailed instructions for use and installation of specific Kermit programs. For a more detailed introduction to Kermit, complete with illustrations, diagrams, and tutorials, consult the book Kermit, A File Transfer Protocol, by Frank da Cruz, Digital Press, Bedford MA (1987), ISBN 0-932376-88-6, DEC order number EY-6705E-DP (phone 1-800-343-8321). The Kermit book describes Kermit in detail, from the points of view of the beginner, the user, the computer professional who must install Kermit programs or support their use, and the programmer who wishes to write new Kermit implementations. Also included are general introductions to computers, data communications, and file organization, plus a detailed troubleshooting guide, bootstrapping hints, and various appendices and tables. The latter half of the book is taken up by a complete description of the Kermit file transfer protocol, with programming examples in the C language, plus some analysis and comparisons of Kermit with other popular protocols such as Xmodem.
    [Show full text]
  • Internet Publishing: an Introduction and Discussion of Basics
    DOCUMENT RESUME ED 384 536 SE 056 741 AUTHOR Bush, J. Eric TITLE Internet Publishing: An Introduction and Discussion of Basics. PUB DATE Jun 95 NOTE 15p.; Paper presented at the Annual Meeting of the Air & Waste Management Association (88th, San Antonio, TX, June 18-23, 1995). PUB TYPE Reports Descriptive (141) Speeches/Conference Papers (150) EDRS PRICE MF01/PC01 Plus Postage. DESCRIPTORS *Computer Software; *Educational Technology; *Electronic Mail; Elementary Secondary Education; Higher Education; *Information Networks; Technology Education; *Telecommunications IDENTIFIERS *Internet ABSTRACT The internet has been considered the world's largest experiment in chaos. This paper presents a look at Internet applications and some considerations for preparing materials for utilizing these applications. The goal of the paper is to help bring order to the chaos and allow preparation ! materials for Internet distribution by informing about the tools and resources used by the Internet community. Discussions include historical perspective, methods of accessing information on the Internet, publishing and distributing files on the Internet, and grades of Internet service. Software applications for retrieving Internet information include: Telnet, FTP, Electronic Mail (e-mail), Network News, Gopher, and World Wide Web. Also discussed are sending e-mail through a reflector; listserves; setting ap a server; and finding resources using the search tools Archie, Jughead, and Veronica. A table of suffixes used for converter ano compression programs is included. (MKR) *********************************************************************** Reproductions supplied by EDRS are the best that can be made * * from the original document. *********************************************************************** Internet Publishing an Introduction and Discussion of Basics J. Eric Bush ERIC Clearinghouse for Science, Mathematics, and Environmental Education 1929 Kenny Road Columbus, OH 43210-1080 [email protected] U IS.
    [Show full text]
  • Standard Master
    ECMA-335 3rd Edition / June 2005 Common Language Infrastructure (CLI) Partitions I to VI Standard ECMA-335 Common Language Infrastructure (CLI) Partitions I to VI Ecma International Rue du Rhône 114 CH-1204 Geneva T/F: +41 22 849 6000/01 www.ecma-international.org . Common Language Infrastructure (CLI) Partition I: Concepts and Architecture i Table of Contents Foreword vii 1 Scope 1 2 Conformance 2 3 Normative references 3 4 Conventions 5 4.1 Organization 5 4.2 Informative text 5 5 Terms and definitions 6 6 Overview of the Common Language Infrastructure 9 6.1 Relationship to type safety 9 6.2 Relationship to managed metadata-driven execution 10 6.2.1 Managed code 10 6.2.2 Managed data 11 6.2.3 Summary 11 7 Common Language Specification 12 7.1 Introduction 12 7.2 Views of CLS compliance 12 7.2.1 CLS framework 12 7.2.2 CLS consumer 13 7.2.3 CLS extender 13 7.3 CLS compliance 14 7.3.1 Marking items as CLS-compliant 14 8 Common Type System 16 8.1 Relationship to object-oriented programming 18 8.2 Values and types 18 8.2.1 Value types and reference types 18 8.2.2 Built-in value and reference types 19 8.2.3 Classes, interfaces, and objects 19 8.2.4 Boxing and unboxing of values 20 iii 8.2.5 Identity and equality of values 21 8.3 Locations 22 8.3.1 Assignment-compatible locations 22 8.3.2 Coercion 22 8.3.3 Casting 22 8.4 Type members 22 8.4.1 Fields, array elements, and values 22 8.4.2 Methods 23 8.4.3 Static fields and static methods 23 8.4.4 Virtual methods 23 8.5 Naming 24 8.5.1 Valid names 24 8.5.2 Assemblies and scoping 24 8.5.3 Visibility,
    [Show full text]
  • The University of Minnesota's Internet Gopher System: a Tool for Accessing Network-Based Electronic Information." the Public-Access Computer Systems Review 4, No
    + Page 4 + ----------------------------------------------------------------- Wiggins, Rich. "The University of Minnesota's Internet Gopher System: A Tool for Accessing Network-Based Electronic Information." The Public-Access Computer Systems Review 4, no. 2 (1993): 4-60. To retrieve this file, send the following e-mail messages to LISTSERV@UHUPVM1 or [email protected]: GET WIGGINS1 PRV4N2 F=MAIL and GET WIGGINS2 PRV4N2 F=MAIL. ----------------------------------------------------------------- 1.0 Introduction Late in 1991, a new creature began burrowing its way around the Internet. This new critter helps people browse many of the resources available on local campus networks or on the worldwide Internet. Called the Internet Gopher, this tool was developed at the University of Minnesota. Pioneering sites began deploying Gopher servers in December 1991. In the short time since, the Gopher system (henceforth called "Gopher") has been deployed at many institutions around the world. A worldwide community of "Gophernauts" has come into being, with various sites contributing ideas, utility tools, bits of code, and schemes for cooperative registry efforts. Gopher now accounts for a substantial fraction of the traffic on the Internet. Gopher servers are delivering text, index searches, still images, audio, public domain software, and more to users all over the world. With Gopher, a user can: o Find out what movies are playing in Aachen, Germany. o Learn what earthquakes took place yesterday. o Read today's student newspaper from a school 2,000 miles away. o Pick up a quote from Paradise Lost for a term paper. o Read the city council meeting minutes from Wellington, New Zealand. o Listen to the final U.S.
    [Show full text]