United States Patent (19) 11 Patent Number: 5,742,845 Wagner 45) Date of Patent: Apr

Total Page:16

File Type:pdf, Size:1020Kb

United States Patent (19) 11 Patent Number: 5,742,845 Wagner 45) Date of Patent: Apr USOO5742845A United States Patent (19) 11 Patent Number: 5,742,845 Wagner 45) Date of Patent: Apr. 21, 1998 54 SYSTEM FOR EXTENDING PRESENT OPEN OTHER PUBLICATIONS NETWORK COMMUNICATION PROTOCOLS TO COMMUNICATE WITH HTML file entitled: “The Common Gateway Interface", NON-STANDARD I/O DEVICES DIRECTLY available at httpd Gncsa.uiuc.edu, circa Jun. 1995. COUPLED TO AN OPEN NETWORK (List continued on next page.) (75) Inventor: Richard Hiers Wagner. Dunwoody, Ga. Primary Examiner-Dinh C. Dung Assistant Examiner-Rehana Perveen 73 Assignee: Datascape, Inc., Atlanta, Ga. Attorney, Agent, or Firm-Morris, Manning & Martin, L.L.P. (21) Appl. No.: 493,772 57 ABSTRACT 22 Filled: Jun. 22, 1995 An open network system for supporting input/output (I/O) 6 operations for non-standard I/O devices are disclosed. The 51) Int. Cl. ........................... G06F 13/14: GO6F 13/42 system includes a server coupled to a plurality of I/O devices 52) U.S. Cl. ........................... 395/831; 395/500; 395/226 through an open network and an extended open system 58) Field of Search ..................................... 395/831, 500, protocol that supports communication with devices that are 395/26, 217, 218, 221, 226, 242, 187.01 not personal computers (PCs). These devices include mag netic stripe readers. check readers, smart card readers, credit card terminals, screen phone terminals. PIN pads, printers, 56 References Cited and the like. The extended open network protocol includes tags which identify device and input operations and U.S. PATENT DOCUMENTS attributes which identify the location, data exchange method, and data variable names for the retrieval, 3. 10/1983 Daniels et al. .......................... 364,900 acquisition, and submission of data between the server and 438511 3/1984 Baran ......... ... 370/19 4,774,655 9/1988 Kolin et al. ... ... 364/200 I/O devices. Preferably, the open network protocol is imple 4.942,552 7/1990 Merrill et al. ... 364/900 mented in a Hyper Text Transport Protocol (HTTP). 5,036,484 7/1991 McCoy et al. ... 364/900 Preferably, the system includes a common gateway interface 5,083,262 1/1992 Haff, Jr. ......... 395 soo (CGI) at the server which converts protocol statements 5,113,517 5/1992 Beard et al. ... 364/200 communicated between the server and I/O devices to appli 5,119,465 6/1992 Jacket al. ... ... 395/500 cation language statements for providing data to an appli 5,149,945 9/1992 Johnson et al. ... 235,380 cation program coupled to the server. Most preferably, the 5,161.222 11/1992 Montejo et al. ... 395,500 application statements and protocol statements are con 5,179,690 1/1993 Ishikawa ............ ... 395/500 structed in integrated statements with an editor. The editor 5,212,369 5/1993 Kardisch et al. ........................ 235,380 ensures that data identifiers in the application and protocol 5,239,662 8/1993 Danielson et al....................... 395/800 statements are compatible. The integrated statements are 5,278,955 1/1994 Forte et al. ............................. 395.200 then parsed by the editor to segregate the protocol state 5,278.972 1/1994 Baker et al. ............................ 3900 ments from the application statements. The protocol state 5,294,782 3/1994 Kumar ............................ 235,462 ments are downloaded in a file to a client program at an I/O 5297249 3/1994 Bernstein et al. device for processing. The application statements are stored 5,367,572 11/1994 Weiss ............. ... 330/23 in a file for use by the application. In this manner, generation 3. E. i. E. of the files for client and application processing are auto 5548,721 &1996 Denslow. w is 395f1870 matically done without the user ensuring the correlation of 5,550,984r s wif87996 k a w GelbL. W. Awkw ....................... v. sesse ... 3952OO.17 the data fields in the two files. 5,577,233 11 fl. 996 Goettelmann et al. ................. 395/500 5,581,708 12/1996 Iijima ................................. 395/200.4 33 Claims, 25 Drawing Sheets Pc Pin-Po -ucR9 ess 32 3. 3. 3. 5 M r Poa SS 38 20 s 5,742,845 Page 2 OTHER PUBLICATIONS Press release entitled: “VeriFone to acquire Enterprise Inte gration Technologies (EIT). Internet Commerce Software HTML file entitled: "Critique of Secure-HTTP", available and Services Leader", VeriFone, Inc. and Enterprise Inter at shttp://www.spyglass.com/secure, Apr 19, 1995. gration Technologies; Redwood, California; Aug. 21, 1995. Directory of abstracts of HTML files available from IEFT Spyglass white paper entitled: "Electronic Commerce Stan Secretariat-Corporation for National Research Initiatives; dards for the WWW". Spyglass, Inc.http://www.spyglass. circa Jun. 1995. com; Apr. 1995. HTML file entitled: "A Beginner's Guide to HTML" avail Memo entitled: "The Secure Hypertext Transfer Protocol"; able from National Center for Supercomputing Applica E. Rescorla and A. Schiffman; Jul 1995. tions/pubs Gncsa.uiuc.edu: circa Jun. 1995. Article entitled "Cash on the Wirehead" by Andrew Single Memo entitled: Uniform Resource Locators (URL), by URI ton, in the Jun. 1995 issue of BYTE Magazine. working group of the Internal Engineering Task Force; Dec. "Beyond the Web: Excavating the Real World Via Mosaic", 1994. Goldberg et al., 2nd international WWW, Oct. 1994. U.S. Patent Apr. 21, 1998 Sheet 1 of 25 5,742,845 1*O1-I 08Z8 U.S. Patent Apr. 21, 1998 Sheet 2 of 25 5,742,845 HTML+D Attributes Description (FORMACTIONs 'ur" To/From WebServer URL FROM "fillerane" From Terminal Local File TO PRINTER To Local Printer TO filerane' To Terminal Local File FROMSCR From SmartCard Reader TOSCR To SmartCard Reader METHOD"GET" Retrieve Data "POST" Store Data "PAYMENT" Directive to deliver INPUT datato a private PaymentNetworkfor authorization and settlement. SOL <database name> SO statement database table Attribute Walue Description <INPUT TYPE "text" "password" checkbox" tradio" "Submit" A. reSet" NAMEs <field name> VALUE= <initial value2 CHECKED SZEs D MAXLENGTH Attribute HTML+DValue Terminal Device TYPE. "MSRT17 Magistripe Reader-rack 1 TMST2" MagStripe Readerrack2 TSE, Terminal Command Keypad TN PNPad EM Bar Code Wand TMCE CheckMCRReader TN.AMI integerDollaramount keyinputmask keyinput mask LOCAL input from Local Wariable 'AUTOSUBMIT" SbmitFORM to ACTION URL NAME- f:address Local Variable-Terminals PAddress ost phone Local Variable-Local internet AccessPhoneNumber datetimeSirWork keyKey ENINGEtonworkinakLocalOCal NEEEWariable OWO ing ey deposit acct Local Variable-Merchant DepositAccount FG.2 U.S. Patent Apr. 21, 1998 Sheet 3 of 25 5,742,845 SOLStatements The followingSO commands representasubset of the entire command set that varies by database wendor. HTMLD Attributes Description SELECT, field name. Requestfield name (one or many) from a database table FROM=<table name>. Database table name WHERECCondition> Conditional selection of data nannes "constant" nanne LIKE 'constant nanne N'constant' AND OR ORDERASC Requestinascending order DESC descending 2 ...by2's GROUPranane lNSERTABLEstable name>. insert new data in database table WALUESs'Constants' UPDATEFROM <table name> Update field name in database table SETsefield name="constant” 8 WHERECCondition> Update if WHERE clause is satisfied DELETEFFOMCtable nanne Delete all columns that satisfy MMHERECconditionel WHERE clause CREATE TABLECtable name>. Create database table PRIMARY KEYCrane FG.25 U.S. Patent Apr. 21, 1998 Sheet 4 of 25 5,742,845 DLE 1OO OPEN OPEN REMOTE URL LOCALURL 102 104 READ HTML FLE CNNSIO DENTIFIED BY URL FROM LOCAL MEMORY 106 12 RECEIVE HTML FILE 108 PROCESS HTML FILE 11 O NO s 114 YES STORE UNDER HOT KEY STORE HTML FILE IN LOCAL MEMORY 120 FG.4 U.S. Patent Apr. 21, 1998 Sheet 5 of 25 5,742,845 SCAN HTML FILE FOR AG 140 BLOCK114 FG4 PROCESS FORM 148 PROCESS INPUT TAG NO 150 PROCESS STANDARD AG 152 SCAN FOR ATRIBUTE 160 BLOCK140 NO ATRIBUTE FG5 FOUND 162 YES ATRIBUTE YES PROCESS ACTION ACTION ATTRIBUTE As 164 NO 16 8 NO-1, TRIBUS YES PROCESS METHOD METop ATTRIBUTE 166 17O FG.6 U.S. Patent Apr. 21, 1998 Sheet 6 of 25 5,742,845 SCAN FOR ACTION BLOCK 160 FIG. 6 2O6 ACTION READ DATA FROM LOCAL CFILE2 196 SEND DATA TO PRINTER 198 WRITE DATA TO LOCAL CFILE> 2OO WRITE DATA TO SMART CARD 2O2 READ OATA FROM ACTION = FROM SMART CARD SgR READER PROCESS ACTION = URL STANDARD URL sFE CFILE> ASSIGNMENT 194 FG.7 U.S. Patent Apr. 21, 1998 Sheet 7 of 25 5,742,845 OUERY URL CFILE WITH DATA POST DATA TO URL. CFILE PASS SQL FILE DENTIFIER PROCESS PAYMENT COMMAND SCAN FOR METHOD BLOCK 160 FIG6 FG.8 U.S. Patent Apr. 21, 1998 Sheet 8 of 25 5,742,845 SCAN FOR ATTRIBUTE BLOCK140 NO FIG. 5 PROCESS TYPE ATTRIBUTE PROCESS NAME ATTRIBUTE PROCESS STANDARD HTML INPUTATTRIBUTES FIG.9 U.S. Patent Apr. 21, 1998 Sheet 9 of 25 5,742,845 MSRT1 READ MSRT1 290 YES . READMSRT2 <Ex READ KEY PAD 274 294 <). READ PIN 296 READ BARCODE <S) READER 298 READ CHECK READER 300 READ DOLAR AMOUNT WA MASK 302 PROCESS STANDARD HTML READ NUMBER INPUT TYPE VIA MASK 304 READ OCAL VARIABLE U.S. Patent Apr. 21, 1998 Sheet 10 of 25 5,742,845 NAME = YES STORE INPUT IN PADapprits LOCAL<NAMEX VARIABLE NAME = OST PHONE SCAN FORNAME 338 <&340 NO BLOCK 250 FG.9 PROCESS STANDARD TAG 336 FG. U.S. Patent Apr. 21, 1998 Sheet 11 of 25 5,742,845 1. CFORMACTION=URL METHOD= GET2 2. CFORMACTION=URL METHODE POST> 3. gFORMACTIONSURL METHOD= SQL <database name> FG.2 HHWHERE!"wir | untili | St. WORLD WIDE WEB N Sale is 1. N | PAYMENT PROCESSOR | CFORMACTION=Cfilename> METHOD=PAYMENTC CINPUT TYPE=AUTOSUBMTZ C/FORMD FG.7B <FORMACTION=Csinet METHOD=PAYMENTC <INPUT TYPE=LOCALNAME=DEPOSIT ACCTVALUE=123456890234567890-> CINPUT TYPE=AUTOSUBMIT> </FORMD FIG. 25C U.S. Patent Apr. 21, 1998 Sheet 12 of 25 5,742,845 1.a.
Recommended publications
  • Federal Depository Library Handbook
    US Government Printing Office Federal Depository Library Program Federal Depository Library Handbook Federal Depository Library Handbook US Government Printing Office Library Services & Content Management, Library Planning & Development 732 N. Capitol St. NW, Washington, DC 20401 202-512-1800 • 866-512-1800 • Fax 202-512-2104 [email protected] Text highlighted in yellow refers to legal and/or program requirements for depository libraries. Preface The Federal Depository Library Handbook (Handbook), describes requirements of Federal depository libraries, both legal and those prescribed by the Government Printing Office (GPO). Additionally the Handbook provides guidance to libraries on how they can meet the requirements of the Federal Depository Library Program (FDLP). This information was previously found in two publications. Instructions to Depository Libraries contained the FDLP requirements while practical guidance for carrying out FDLP operations was in the Federal Depository Library Manual and its supplements. The Instructions and Manual are superseded by the Handbook. In accepting the privilege of Federal depository status for their libraries, directors agreed to abide by all the laws and requirements governing officially designated depository libraries. Recognizing this, chapter 2 of the Handbook outlines the legal requirements and each chapter of the Handbook includes a section for library administrators. These sections are also consolidated in Appendix C. Depository coordinators MUST ensure that all personnel involved in any aspect of depository operations are aware of the obligations of depository libraries and of the importance of the Handbook. Depository staff should review the Handbook on a regular basis and any questions can be directed to askGPO (http://www.gpoaccess.gov/help/index.html).
    [Show full text]
  • Numbers Are Footnotes for Positions Referenced Below
    Gary L. Wade 320 Crescent Village Circle Unit 1396 San Jose, CA 95134 [email protected] 949-505-3223 KEY EXPERIENCES • Passion for developing solutions for Apple Inc.’s platforms (macOS, iOS, tvOS, watchOS) • Innovative in usability design and testing, and refactoring for performance • Design and development of multi-platform client/server/cloud software solutions • Facilitate instruction for technical and non-technical staff including one-on-one mentoring CURRENT TALENT SUMMARY (numbers are footnotes for positions referenced below) • Adobe Photoshop (24,17,10,9,8,1) • Macintosh (Mac OS X) SDK (28,27,26,21,20, • AppKit/macOS (28,27,26,21,20,19,18,17,1) 19,18,17,16,15,14,13,12,11,8,7,6,5,4,2,1) • C (28,27,26,24,23,22,21,20,19,18,17,16,15,14, • Objective-C (28,27,26,24,23,22,21,20,19,18, 13,12,11,8,7,6,5,4,1) 17,1) • C++ (21,20,18,17,16,15,14,13,12,11,8,7,6,5,1) • Perforce (21,20,15) • Client/Server/Cloud (28,27,26,25,24,22,21,20, • Quality Assurance (25,24,17,3,1) 19,18,17,16,13,7,6,4) • QuickTime/AVKit (25,24,22,17,13,10,9,6,5) • Cocoa (28,27,26,25,24,23,22,21,20,19,18,17,1) • REST (28,27,26,25,24,22,21) • CoreFoundation (28,27,26,22,21,20,18,17,16, • Sales support (21,10,9,6,1) 15,14,13,12,1) • sqlite (23) • Cross-platform (28,27,21,20,17,15,14,13,12,8, • Subversion (27,22,19,18,1) 7,6,5,4,2) • Swift (28,27,26,25,24) • git (28,27,26,25,24,23,22) • UIKit/iOS (28,27,26,24,23,22,1) • HTML (28,27,26,25,17,14,12,10,9,1) • UIKit/tvOS (25) • Int.
    [Show full text]
  • By Michael L. Black Dissertation
    TRANSPARENT CULTURES: IMAGINED USERS AND THE POLITICS OF SOFTWARE DESIGN (1975-2012) BY MICHAEL L. BLACK DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in English in the Graduate College of the University of Illinois at Urbana-Champaign, 2014 Urbana, Illinois Doctoral Committee: Professor Robert Markley, Chair Associate Professor Ted Underwood Associate Professor Melissa Littlefield Associate Professor Spencer Schaffner Associate Professor John T. Newcomb ii Abstract The rapid pace of software’s development poses serious challenges for any cultural history of computing. While digital media studies often sidestep historicism, this project asserts that computing’s messy, and often hidden, history can be studied using digital tools built to adapt text-mining strategies to the textuality of source code. My project examines the emergence of personal computing, a platform underlying much of digital media studies but that itself has received little attention outside of corporate histories. Using an archive of technical papers, professional journals, popular magazines, and science fiction, I trace the origin of design strategies that led to a largely instrumentalist view of personal computing and elevated “transparent design” to a privileged status. I then apply text-mining tools that I built with this historical context in mind to study source code critically, including those features of applications hidden by transparent design strategies. This project’s first three chapters examine how and why strategies of information hiding shaped consumer software design from the 1980s on. In Chapter 1, I analyze technical literature from the 1970s and 80s to show how cognitive psychologists and computer engineers developed an ideal of transparency that discouraged users from accessing information structures underlying personal computers.
    [Show full text]
  • 3/1996 Info1mat1on• Technology
    OCCASION This publication has been made available to the public on the occasion of the 50th anniversary of the United Nations Industrial Development Organisation. DISCLAIMER This document has been produced without formal United Nations editing. The designations employed and the presentation of the material in this document do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations Industrial Development Organization (UNIDO) concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries, or its economic system or degree of development. Designations such as “developed”, “industrialized” and “developing” are intended for statistical convenience and do not necessarily express a judgment about the stage reached by a particular country or area in the development process. Mention of firm names or commercial products does not constitute an endorsement by UNIDO. FAIR USE POLICY Any part of this publication may be quoted and referenced for educational and research purposes without additional permission from UNIDO. However, those who make use of quoting and referencing this publication are requested to follow the Fair Use Policy of giving due credit to UNIDO. CONTACT Please contact [email protected] for further information concerning UNIDO publications. For more information about UNIDO, please visit us at www.unido.org UNITED NATIONS INDUSTRIAL DEVELOPMENT ORGANIZATION Vienna International Centre, P.O. Box 300, 1400 Vienna, Austria Tel: (+43-1) 26026-0 · www.unido.org · [email protected] (v), 6 9 p · 21850 EMERGING TECHNOLOGY SERIES 3/1996 Info1mat1on• Technology UNITED NATIONS INDUSTRIAL DEVEWPMENT ORGANIZATION Vienna, 1997 TO OUR READERS EMERGING TECHNOLOGY This issue of lnfonnation Technology brings a cover paper on intranets.
    [Show full text]
  • School Board of National School Boards Association
    DOCUMENT RESUME ED 410 678 EA 028 578 TITLE Bringing Tomorrow's Technology to You Today: School Board of Tomorrow Resource Guide. INSTITUTION National School Boards Association, Alexandria, VA. PUB DATE 1997-04-00 NOTE 34p.; Guide to an exhibit at the Annual Meeting of the National School Boards Association (Anaheim, CA, April 26-29, 1997). PUB TYPE Guides Non-Classroom (055) EDRS PRICE MF01/PCO2 Plus Postage. DESCRIPTORS *Boards of Education; *Computer Mediated Communication; Computer Networks; *Computer System Design; Corporate Support; *Educational Technology; Electronic Mail; Elementary Secondary Education; Information Management; Information Networks; Information Services; Information Systems; *Information Technology; *Telecommunications ABSTRACT The National School Boards Association (NSBA), the National School Boards Foundation, NSBA's Institute for the Transfer of Technology to Education, and Apple Computer, Inc., launched "The School Board of Tomorrow Exhibit" at NSBA's 1996 annual conference and exposition in Orlando, Florida. This handbook summarizes the communication technologies featured in the exhibit. The first part provides an overview of the five different environments simulated in the exhibit: a school board member's home office, the family education network (FEN), a superintendent's office, a school board meeting room, and a community forum. The second part of this guide contains five selected NSBA articles from "The Electronic School." The articles offer advice and information on hiring technical constOtants for a school district, conducting successful bond campaigns, using e-mail to conduct school board business, and acquiring funding for technology. A list of technology providers is included. (LMI) ******************************************************************************** Reproductions supplied by EDRS are the best that can be made from the original document.
    [Show full text]
  • Aquene Freechild Submission
    Different Comments: Please strengthen Voluntary Voting System Guidelines First Name Last Name Email Date submitted Comment for interference through cyberattacks, it is imperative the VVSG prohibit connectivity to the public Internet through wireless modems or other means. We want to ban modems in vote counting machines both to protect data and to prevent manipulation. Therefore, we urge the Commission to add the following to the guideline under Principle 13: DATA PROTECTION: 'The voting system does not use wireless technology or connect to any public jenbigelow@ 2019-05-02 telecommunications infrastructure.' Indeed, eliminating Jennifer Bigelow hotmail.com 23:32:32 GMT wireless modems and internet connectivity will not the draft Voluntary Voting System Guidelines (VVSG) and commend the robust principles and guidelines for software independence, auditability and ballot secrecy. Given the fact that our election systems are being targeted for interference through cyberattacks, it is imperative the VVSG also prohibit connectivity to the public Internet through wireless modems or other means. We want to ban modems in vote counting machines both to protect data and to prevent manipulation. Therefore, we urge the Commission to add the following to the guideline under bobjanz01@ 2019-05-03 Principle 13: DATA PROTECTION: 'The voting system does Bob JANZ gmail.com 00:43:14 GMT not use wireless technology or connect to any public computer science. As such I speak with some authority when I say I strongly support the draft Voluntary Voting System Guidelines (VVSG). I commend the robust principles and guidelines for software independence, auditability and ballot secrecy. Given the fact that our election systems are being targeted for interference through cyberattacks, it is imperative the VVSG also prohibit connectivity to the public Internet through wireless modems or other means.
    [Show full text]
  • Clustering and Ranking
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Electronic Thesis and Dissertation Archive - Università di Pisa Universita` degli Studi di Pisa Dipartimento di Informatica Dottorato di Ricerca in Informatica Ph.D. Thesis On Two Web IR Boosting Tools: Clustering and Ranking Antonino Gull`ı Supervisor Referee Prof. Paolo Ferragina Prof. Dino Pedreschi Referee Prof. Francesco Romani May 6, 2006 Abstract This thesis investigates several research problems which arise in modern Web Information Retrieval (WebIR). The Holy Grail of modern WebIR is to find a way to organize and to rank results so that the most “relevant” come first. The first break-through technique was the exploitation of the link structure of the Web graph in order to rank the result pages, using the well-known Pagerank and Hits algorithms. This link-analysis approaches have been improved and extended, but yet they seem to be insufficient inadequate to provide satisfying search experience. In many situations a flat list of ten search results is not enough, and the users might desire to have a larger number of search results grouped on-the-fly in folders of similar topics. In addition, the folders should be annotated with meaningful labels for rapid identification of the desired group of results. In other situations, users may have different search goals even when they express them with the same query. In this case the search results should be personalized according to the users’ on-line activities. In order to address this need, we will discuss the algorithmic ideas behind SnakeT, a hierarchical clustering meta-search engine which personalizes searches according to the clusters selected on-the-fly by users.
    [Show full text]
  • A Communications Handbook for Libraries
    AMERICAN LIBRARY ASSOCIATION A COMMUNICATIONS HANDBOOK FOR LIBRARIES TABLE OF CONTENTS I. INTRODUCTORY LETTER TO LIBRARIES II. WHAT CAN MEDIA ATTENTION/PUBLICITY DO FOR YOUR LIBRARY? III. DEVELOPING AND IMPLEMENTING A SIMPLE MEDIA/COMMUNICATIONS PLAN What Do You Want to Achieve? Your Goals Who Are You Trying to Reach? Your Target Audience What Should You Say? Your Key Messages What Outreach Tools Will Work @ Your Library? Your Tactics When Is It Best to Plan Your Release, Event or Program? Your Timing and Time line What’s Up on the Web? Your Online Campaign What Will You Need to Draft? Your Materials Who Should Do the Talking? Your Spokespeople How Can You Make the Most with a Limited Budget? Your Resources What Lessons Have You Learned? Your Evaluation IV. TOOLS, TIPS and TRICKS OF THE TRADE Pitching and Placing What Kind of Placements Are You Looking For? How to Research, Build and Organize Your List Building Supplementary Lists Media Events, News Conferences and Press Briefings Phone Pitching Granting an Exclusive Preparing for All Kinds of Interviews How You Can Help Train Spokespeople Ten Tricks to Help You Succeed on Radio How to Succeed on TV Dealing with Bad News V. SAMPLE PRESS MATERIALS Media Advisory News Releases Pitch Letter Op-Ed Sample Letter to the Editor Sample Public Service Announcement VI. Glossary VII. Key Library Editors VIII. Bibliography 2 I. Introductory Letter to Libraries Summer 2007 Dear American Library Association member, Library visits have increased to nearly than two billion a year. Public, school and university libraries are flourishing, yet school library media centers were hard hit by funding cuts in the past year.
    [Show full text]
  • Volume: 25 No.: #9157 PUBLISHERS - K D & S B GUTIERREZ © August 11, 2010 Page 2
    Volume: 25 No.: #9157 PUBLISHERS - K D & S B GUTIERREZ © August 11, 2010 Page 2 Gecko Software – The Ultimate Trading Machine Utah, USA August 9th, 2010 – Gecko Software, Inc. is a company that has set itself aside as one of the alternatives to financial issues. The company that provides some of the latest services in terms of financial software is bent on making it easy for its clients to carry out financial services. With software flooding market, it is important to have the right and most relevant to help anyone who is interested in having their financial issues sorted out, monitored and properly recorded. Gecko Software, Inc has announced a new release of a number of software packages that are bound to turn heads in the financial world. Some of the new releases include Forex Autopilot, Auto Trading System and Futures Autopilot among others. With the provision of software that will help in dealing with futures, Forex and Stocks, Gecko Software, Inc has put its foot down as one of the most reliable companies in the field of financial software. It would appear that with all these software releases there is a huge price to pay but there is actually a provision for one to save money with different combinations of software after one has purchased several products together. The announcement comes after the news that Company was the winner of the Stocks and Commodities Readers’ Choice Award with plenty of nods coming in its way from all directions. Experts and analysts have looked at it as a provider of one of the top 5 most popular systems.
    [Show full text]
  • SED 511.01W Adolescent Growth and Development Sum I 2020 Chats on Mondays at 4:00 P.M
    SED 511.01W Adolescent Growth and Development Sum I 2020 Chats on Mondays at 4:00 p.m. Instructor: Sherri R. Colby PhD Office Location: Online Office Hours: By appointment. For an individual conference, please send me an email to set up an appointment date and time. Office Fax: 903-886-5581 University Email Address: [email protected] COURSE INFORMATION Materials – Textbooks, Readings, Supplementary Readings: Textbook(s) Required: Steinburg, L. (2015). Age of opportunity: Lessons from the new science of adolescence. New York: First Mariner Books. Recommended Resources: American Psychological Manual of Style – 6th Edition Course Description Three (3) Hour Graduate Course This course will focus on the physical, cognitive, socio-emotional, and moral stages of human development of adolescents between the ages of 11 and 19. Emphasis will be placed on individual differences and how educators can employ principles of curriculum and instruction to address the needs of adolescents. The impact of social and environmental factors on adolescents will be a key component of this course. Student Learning Outcomes Students will describe the unique characteristics and stages of adolescent growth and development. Students will analyze physiological, cognitive, social and emotional problems and issues associated with adolescent growth and development. Students will create curricular and instructional solutions to address physiological, cognitive, social and emotional issues and problems associated with adolescent growth and development. Course Description This course will focus on the physical, cognitive, socio-emotional, and moral stages of human development of adolescents between the ages of 11 and 19. Emphasis will be placed on individual differences and how educators can employ principles of curriculum and instruction to address the needs of adolescents.
    [Show full text]
  • QUANTA 2006 X-Ray Structure and Analysis MAY 2006
    QUANTA 2006 X-Ray Structure and Analysis MAY 2006 Copyright (1) Copyright Copyright ©2006, Accelrys Software Inc. All rights reserved. The Accelrys® name and logo are registered trademarks of Accelrys Software Inc. This product (software and/or documentation) is furnished under a License/Purchase Agreement and may be used only in accordance with the terms of such agreement. (2) Trademark The registered trademarks or trademarks of Accelrys Software Inc. include but are not limited to: ACCELRYS® & ACCELRYS Logo, ACCORD, BIOSYM®, CATALYST®, CERIUS®, CERIUS2®, CHARMM®, CHEMEXPLORER®, DIAMOND DISCOVERY®, DISCOVER®, DISCOVERY STUDIO®, DIVA®, FLEXSERVICES®, GCG®, GENEATLAS®, INSIGHT®, INSIGHT II®, MACVECTOR®, MATERIALS STUDIO®, OMIGA®, QUANTA®, SEQARRAY, SEQFOLD®, SEQLAB®, SEQMERGE®, SEQSTORE®, SEQWEB®, TOPKAT®, TSAR®, UNICHEM®, WEBKIT, WEBLAB®, WISCONSIN PACKAGE®. All other trademarks are the property of their respective holders. (3) Restrictions on Government Use This is a “commercial” product. Use, release, duplication, or disclosure by the United States Government agencies is subject to restrictions set forth in DFARS 252.227-7013 or FAR 52.227-19, as applicable, and any successor rules and regulations. (4) Acknowledgments, and References To print photographs or files of computational results (figures and/or data) obtained using Accelrys software, acknowledge the source in an appropriate format. For example: “Computational results obtained using software programs from Accelrys Software Inc. Dynamics calcula- tions performed with the Discover program using the CFF forcefield, ab initio calculations performed with the DMol3 program, and graphical displays generated with the Cerius2 molecular modeling system.” To reference an Accelrys publication in another publication, Accelrys Software, Inc., is the author and the pub- lisher. For example: Accelrys Software Inc., Cerius2 Modeling Environment, Release 4.8, San Diego: Accelrys Software Inc., 2006.
    [Show full text]
  • November 21, 2008 TO: Council President Peters An
    601 OFFICE OF INDEPENDENT BUDGET ANALYST CITY OF SAN DIEGO MEMORANDUM DATE: November 21, 2008 TO: Council President Peters and Members of the City Council FROM: Andrea Tevlin, Independent Budget Analyst I/^AKJA^^ 0 - - I SUBJECT: Summary of Recommended Changes to the Fiscal Year 2009 Budget On November 24, 2008, the City Council will consider approving changes to the Fiscal Year 2009 Budget. The City Council Committee of the Whole and Budget and Finance Committee met jointly for public hearings on November 12, 2008 and November 19, 2008 on the Mayor's proposed budget amendments. The IBA issued Report 08-118, dated November 17, 2008, entitled "Recommended Actions on the FY 2009 Budget Adjustment Proposal" which describes additional information related to the Mayor's proposed budget amendments, and offers alternatives and options to the City Council for consideration. This memorandum provides a summary of the recommendations contained in that report to assist with the City Council's discussion on Monday, November 24, 2008. The IBA recommends approval of budget and service reductions in the Mayor's Budget Amendment Report, with exceptions to the reductions made to the Park and Recreation and Library Departments. In addition, further clarification and additional information is requested in other areas. In summary, the recommendations are as follows: Approve Items A through G, listed below and as discussed in IBA Report 08-118, as changes to the Mayor's original proposal. A. Library and Recreation Center Closures - Option 1 Defer a decision on Library branch and Recreation Center closures until a multi-year, comprehensive facility plan is brought forward to the City Council in early 2009.
    [Show full text]