Konzept Und Lösungen Für Automatisches Produktdatenmanagement

Total Page:16

File Type:pdf, Size:1020Kb

Konzept Und Lösungen Für Automatisches Produktdatenmanagement Konzept und Lösungen für automatische Produktdatenverwaltung vorgelegt von: Dipl.- Ing. Carina Fresemann an der Fakultät V – Verkehrs- und Maschinensysteme der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktorin der Ingenieurwissenschaften - Dr.-Ing. – genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr.-Ing. Michael Rethmeier Gutachter: Prof. Dr.-Ing. Rainer Stark Gutachter: Prof. Dr.-Ing. Detlef Gerhard Tag der wissenschaftlichen Aussprache: 05.02.2021 Berlin 2021 Vorwort der Autorin Vorwort der Autorin “Beginning a discussion on how to structure the bill of material is a good way to start a fight in a bar” (Garwood 2000). Ebensolche Diskussionen darüber, wie Produktdatenmanagement in einem Unternehmen zu implementieren und auszuführen ist, habe ich mehrere Jahre im professionellen Bereich durchlebt. Dabei wurden viele Gespräche jener Zeit mit Grundsatz- fragen beendet, mitunter wurden daraus Innovations- oder Lösungsideen erkoren. Auf Basis dieses Vorwissens entstand die Ahnung, dass sich einfachere Lösungen für Kern PDM Aufgaben entwickeln lassen. Die Suche nach solchen Lösungen legte den Grundstein für diese Promotion. Ich hoffe, die Arbeit inspiriert Leser, den eingeschlagenen Weg weiter- zugehen. Ohne die Unterstützung vieler Menschen auf diesem Weg, wäre das fertige Werk jedoch nicht entstanden. Unter der Supervision von Prof. Stark entstand diese Arbeit im Rahmen der Tätigkeit als Wissenschaftliche Mitarbeiterin am Fachgebiet Industrielle Informationstechnik der TU Berlin. Für die Bereitstellung von Möglichkeiten und konstruktive Kritik bedanke ich mich. Dankbar bin ich für den umfänglichen kritischen Diskurs mit Hartmut Sörgel und Martin Witte. Sie haben mein Verständnis für einige Sachverhalte immens verbessert. Weitere freundliche Unterstützung und fachliche Diskussionen mit Wolfgang Tauber und Udo Freise brachten Licht ins Dunkel: einerseits bezüglich der bestehenden Technologien aber auch der hinsichtlich der industriellen Erwartungshaltung. Ebenso bedanke ich mich bei Dietmar Jenke, Axel Sylvester, Corinna Beier und Uwe Kloss für die Bereitstellung von Daten und praktischen Beispielen. Diese bilden die Basis für die Versuche und geben der Arbeit somit die erforderliche praktische Relevanz. Weiterhin wäre diese Arbeit nicht ohne das Zutun von Vignesh Subban, Felix Lösch, Jan Mohrlock, Timos Ioannou und insbesondere Lars Bittcher möglich gewesen. Ich bedanke mich ausdrücklich für die gute und gewissenhafte Unterstützung aber auch für den inhaltlichen Diskurs, der einige Ansätze hinsichtlich der Praktikabilität und Relevanz verbesserte. Schlussendlich hat zudem der familiäre und geistliche Rückhalt, die Geduld und Ermutigung in schwierigen Phasen die Bewerkstelligung dieser Arbeit ermöglicht. Ich freue mich gegenwärtig auf viele frohe, gemeinsame Stunden mit meinem Mann und meinen Kindern. Aus Gründen der Lesbarkeit wird in dieser Arbeit die maskuline Form Anwender oder Nutzer verwendet. Dennoch sind selbstverständlich alle Personen gemeint. Ebenso werden einzig im Englischen bestehende Begriffe, wie tokenization nicht übersetzt. i Inhaltsverzeichnis Inhaltsverzeichnis Vorwort der Autorin ................................................................................................................. i Inhaltsverzeichnis ................................................................................................................... ii Abbildungsverzeichnis ............................................................................................................ v Tabellenverzeichnis .............................................................................................................. vii Abkürzungsverzeichnis .......................................................................................................... ix Zusammenfassung .................................................................................................................. i Abstract .................................................................................................................................. ii 1 Einführung ...................................................................................................................... 1 1.1 Problemstellung und Motivation............................................................................... 1 1.2 Zielstellung und Abgrenzung der Arbeitsinhalte ....................................................... 2 1.3 Charakter der Arbeit und Vorgehensweise .............................................................. 6 2 Produktdatenverwaltung ................................................................................................. 8 2.1 Produktdaten ........................................................................................................... 8 2.2 Dimensionen ..........................................................................................................13 2.3 Methoden ...............................................................................................................20 2.3.1 Gliederungen...................................................................................................21 2.3.2 Varianten .........................................................................................................25 2.4 Werkzeuge .............................................................................................................27 2.4.1 Funktionen ......................................................................................................28 2.4.2 Integration von Autoren Werkzeugen ..............................................................31 2.4.3 Stand der Forschung zu PDM Funktionen .......................................................33 2.5 Zusammenhang von Methoden und Funktionen .....................................................35 2.6 Automatisierungspotentiale ....................................................................................39 3 Studie zur effizienten Produktdatenverwaltung ..............................................................41 3.1 Zielstellung und Durchführung ................................................................................41 3.2 Ergebnisse und Zwischenfazit ................................................................................42 4 Konzept für effiziente Produktdatenverwaltung ..............................................................46 4.1 Stufenmodell der Automatisierung ..........................................................................46 4.2 Ableitung der Bedarfe und Potentiale in ein Konzept ..............................................51 ii Inhaltsverzeichnis 4.2.1 Architektur des InADM ....................................................................................55 4.2.2 Funktionen des InADM ....................................................................................56 4.2.3 Auswirkungen auf die Methoden der Produktdatenverwaltung ........................75 5 Exemplarische Umsetzung relevanter Bedarfe ..............................................................77 5.1 Design Artefakte automatisch zuweisen .................................................................77 5.1.1 Funktionsweise von Semantischen Technologien ...........................................79 5.1.2 Anwendung auf den Kontext der Gliederungen ...............................................82 5.1.3 Anwendung auf den Kontext der steuernden Metainformation ........................85 5.1.4 Versuchsaufbau und Daten für Gliederungen ..................................................89 5.1.5 Versuchsergebnisse für Gliederungen ............................................................90 5.1.6 Versuchsaufbau und Daten für Metadaten ......................................................92 5.1.7 Versuchsergebnisse für Metadaten .................................................................94 5.1.8 Beurteilung der Ergebnisse zur Verwendung im InADM ..................................96 5.2 Nutzerinteraktion durch einen Chat Bot ..................................................................99 5.2.1 Funktionsweise der natürlichen Sprachverarbeitung ..................................... 100 5.2.2 Anwendung auf das Variantenmanagement .................................................. 106 5.2.3 Versuchsaufbau und Daten ........................................................................... 108 5.2.4 Versuchsergebnisse ...................................................................................... 111 5.2.5 Beurteilung der Ergebnisse zur Verwendung im InADM ................................ 116 5.3 Plausibilisierung auf Basis geometrischer Daten .................................................. 118 5.3.1 Algorithmus auf Basis der geometrischen Merkmalserkennung .................... 118 5.3.2 Versuchsaufbau und Daten ........................................................................... 125 5.3.3 Versuchsergebnisse ...................................................................................... 130 5.3.4 Beurteilung der Ergebnisse zur Verwendung im InADM ................................ 139 5.4 Plausibilisierung auf Basis von Identifikationsdaten .............................................. 140 5.4.1 Funktionsweise des Nearest Neighbour Verfahrens ...................................... 141 5.4.2 Anwendung auf die Ermittlung von Varianten ................................................ 142 5.4.3 Versuchsaufbau und Daten ..........................................................................
Recommended publications
  • Easy Slackware
    1 Создание легкой системы на базе Slackware I - Введение Slackware пользуется заслуженной популярностью как классический linux дистрибутив, и поговорка "кто знает Red Hat тот знает только Red Hat, кто знает Slackware тот знает linux" несмотря на явный снобизм поклонников "бога Патре­ га" все же имеет под собой основания. Одним из преимуществ Slackware является возможность простого создания на ее основе практически любой системы, в том числе быстрой и легкой десктопной, о чем далее и пойдет речь. Есть дис­ трибутивы, клоны Slackware, созданные именно с этой целью, типа Аbsolute, но все же лучше создавать систему под себя, с максимальным учетом именно своих потребностей, и Slackware пожалуй как никакой другой дистрибутив подходит именно для этой цели. Легкость и быстрота системы определяется выбором WM (DM) , набором программ и оптимизацией программ и системы в целом. Первое исключает KDE, Gnome, даже новые версии XFCЕ, остается разве что LXDE, но набор программ в нем совершенно не устраивает. Оптимизация наиболее часто используемых про­ грамм и нескольких базовых системных пакетов осуществляется их сборкой из сорцов компилятором, оптимизированным именно под Ваш комп, причем каж­ дая программа конфигурируется исходя из Ваших потребностей к ее возможно­ стям. Оптимизация системы в целом осуществляется ее настройкой согласно спе­ цифическим требованиям к десктопу. Такой подход был выбран по банальной причине, возиться с gentoo нет ни­ какого желания, комп все таки создан для того чтобы им пользоваться, а не для компиляции программ, в тоже время у каждого есть минимальный набор из не­ большого количества наиболее часто используемых программ, на которые стоит потратить некоторое, не такое уж большое, время, чтобы довести их до ума. Кро­ ме того, такой подход позволяет иметь самые свежие версии наиболее часто ис­ пользуемых программ.
    [Show full text]
  • Behavior Based Software Theft Detection, CCS 2009
    Behavior Based Software Theft Detection 1Xinran Wang, 1Yoon-Chan Jhi, 1,2Sencun Zhu, and 2Peng Liu 1Department of Computer Science and Engineering 2College of Information Sciences and Technology Pennsylvania State University, University Park, PA 16802 {xinrwang, szhu, jhi}@cse.psu.edu, [email protected] ABSTRACT (e.g., in SourceForge.net there were over 230,000 registered Along with the burst of open source projects, software open source projects as of Feb.2009), software theft has be- theft (or plagiarism) has become a very serious threat to the come a very serious concern to honest software companies healthiness of software industry. Software birthmark, which and open source communities. As one example, in 2005 it represents the unique characteristics of a program, can be was determined in a federal court trial that IBM should pay used for software theft detection. We propose a system call an independent software vendor Compuware $140 million dependence graph based software birthmark called SCDG to license its software and $260 million to purchase its ser- birthmark, and examine how well it reflects unique behav- vices [1] because it was discovered that certain IBM products ioral characteristics of a program. To our knowledge, our contained code from Compuware. detection system based on SCDG birthmark is the first one To protect software from theft, Collberg and Thoborson that is capable of detecting software component theft where [10] proposed software watermark techniques. Software wa- only partial code is stolen. We demonstrate the strength of termark is a unique identifier embedded in the protected our birthmark against various evasion techniques, including software, which is hard to remove but easy to verify.
    [Show full text]
  • Finite State Recognizer and String Similarity Based Spelling
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by BRAC University Institutional Repository FINITE STATE RECOGNIZER AND STRING SIMILARITY BASED SPELLING CHECKER FOR BANGLA Submitted to A Thesis The Department of Computer Science and Engineering of BRAC University by Munshi Asadullah In Partial Fulfillment of the Requirements for the Degree of Bachelor of Science in Computer Science and Engineering Fall 2007 BRAC University, Dhaka, Bangladesh 1 DECLARATION I hereby declare that this thesis is based on the results found by me. Materials of work found by other researcher are mentioned by reference. This thesis, neither in whole nor in part, has been previously submitted for any degree. Signature of Supervisor Signature of Author 2 ACKNOWLEDGEMENTS Special thanks to my supervisor Mumit Khan without whom this work would have been very difficult. Thanks to Zahurul Islam for providing all the support that was required for this work. Also special thanks to the members of CRBLP at BRAC University, who has managed to take out some time from their busy schedule to support, help and give feedback on the implementation of this work. 3 Abstract A crucial figure of merit for a spelling checker is not just whether it can detect misspelled words, but also in how it ranks the suggestions for the word. Spelling checker algorithms using edit distance methods tend to produce a large number of possibilities for misspelled words. We propose an alternative approach to checking the spelling of Bangla text that uses a finite state automaton (FSA) to probabilistically create the suggestion list for a misspelled word.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Linux Box — Rev
    Linux Box | Rev Howard Gibson 2021/03/28 Contents 1 Introduction 1 1.1 Objective . 1 1.2 Copyright . 1 1.3 Why Linux? . 1 1.4 Summary . 2 1.4.1 Installation . 2 1.4.2 DVDs . 2 1.4.3 Gnome 3 . 3 1.4.4 SElinux . 4 1.4.5 MBR and GPT Formatted Disks . 4 2 Hardware 4 2.1 Motherboard . 5 2.2 CPU . 6 2.3 Memory . 6 2.4 Networking . 6 2.5 Video Card . 6 2.6 Hard Drives . 6 2.7 External Drives . 6 2.8 Interfaces . 7 2.9 Case . 7 2.10 Power Supply . 7 2.11 CD DVD and Blu-ray . 7 2.12 SATA Controller . 7 i 2.13 Sound Card . 8 2.14 Modem . 8 2.15 Keyboard and Mouse . 8 2.16 Monitor . 8 2.17 Scanner . 8 3 Installation 8 3.1 Planning . 8 3.1.1 Partitioning . 9 3.1.2 Security . 9 3.1.3 Backups . 11 3.2 /usr/local . 11 3.3 Text Editing . 11 3.4 Upgrading Fedora . 12 3.5 Root Access . 13 3.6 Installation . 13 3.7 Booting . 13 3.8 Installation . 14 3.9 Booting for the first time . 17 3.10 Logging in for the first time . 17 3.11 Updates . 18 3.12 Firewall . 18 3.13 sshd . 18 3.14 Extra Software . 19 3.15 Not Free Software . 21 3.16 /opt . 22 3.17 Interesting stuff I have selected in the past . 22 3.18 Window Managers . 23 3.18.1 Gnome 3 .
    [Show full text]
  • LATEX – a Complete Setup for Windows Joachim Schlosser
    LATEX – a complete setup for Windows Joachim Schlosser May 9, 2012 http://www.latexbuch.de/install-latex-windows-7/ To use LATEX is one thing, and very good introductions exist for learning. But what do you need for installing a LATEX system on Windows? What do I do with MiKTEX, why do I need Ghostscript, what’s TeXmaker, and why many people favor Emacs, and above all, how does everything fit together? This tutorial shall save the search an show step by step what you need and how to setup the individual components. I am always happy about suggestions and notes on possible errors. When reporting by mail, please always include the version number: Revision: 1643 Date: 2012-05-09 08:20:17 +0100 (We, 09 May 2012) Many thanks to a number of readers for suggestions and corrections. The correct addresses for this document are: • http://www.latexbuch.de/files/latexsystem-en.pdf for the PDF version and • http://www.latexbuch.de/install-latex-windows-7/ for the HTML-page. The German version is available via http://www.latexbuch.de/latex-windows-7-installieren/ 1 Contents 1 Everyone can set up LATEX 2 3.5 File Types Setup 7 2 What do you need at all? 3 3.6 Remedy if you have Admin Rights 8 3 Installation and Configuration 5 3.7 Install TeX4ht and Im- 3.1 Download and install ageMagick 8 MiKTEX 5 4 And now? Usage 9 3.2 Graphics Preparation and Conversion 5 5 If something fails 10 3.3 Configure Texmaker 6 6 Prospect 10 3.4 Configure Emacs 6 1 Everyone can set up LATEX LATEX is not just a program but a language and a methodology of describing documents and gets used via a LATEX system.
    [Show full text]
  • Memory-Based Context-Sensitive Spelling Correction at Web Scale
    Memory-Based Context-Sensitive Spelling Correction at Web Scale Andrew Carlson Ian Fette Machine Learning Department Institute for Software Research School of Computer Science School of Computer Science Carnegie Mellon University Carnegie Mellon University Pittsburgh, PA 15213 Pittsburgh, PA 15213 [email protected] [email protected] Abstract show that our algorithm can accurately recommend correc- tions for non-word errors by reranking a list of spelling sug- We study the problem of correcting spelling mistakes in gestions from a widely used spell checking package. The text using memory-based learning techniques and a very correct word is usually selected by our algorithm. large database of token n-gram occurrences in web text as We view this application and our results as useful in their training data. Our approach uses the context in which an own right, but we also as a case study of applying relatively error appears to select the most likely candidate from words simple machine learning techniques that leverage statistics which might have been intended in its place. Using a novel drawn from a very large corpus. The data set we use as correction algorithm and a massive database of training training data is the Google n-gram data [3], which was re- data, we demonstrate higher accuracy on correcting real- leased by Google Research in 2006. It contains statistics word errors than previous work, and very high accuracy at drawn fromover a trillion wordsof web text. It was released a new task of ranking corrections to non-word errors given with the aim of enabling researchers to explore web-scale by a standard spelling correction package.
    [Show full text]
  • Pronunciation Modeling in Spelling Correction for Writers of English As a Foreign Language
    PRONUNCIATION MODELING IN SPELLING CORRECTION FOR WRITERS OF ENGLISH AS A FOREIGN LANGUAGE A Thesis Presented in Partial Fulfillment of the Requirements for the Degree Master of Science in the Graduate School of The Ohio State University By Adriane Boyd, B.A., M.A. ***** The Ohio State University 2008 Master’s Examination Committee: Approved by Professor Eric Fosler-Lussier, Advisor Professor Christopher Brew Advisor Computer Science and Engineering Graduate Program c Copyright by Adriane Boyd 2008 ABSTRACT In this thesis I propose a method for modeling pronunciation variation in the context of spell checking for non-native writers of English. Spell checkers, which are nearly ubiquitous in text-processing software, have been developed with native speakers as the target audience and fail to address many of the types of spelling errors peculiar to non-native speakers, especially those errors influenced by their native language’s writing system and by differences in the phonology of the native and non-native languages. The model of pronunciation variation is used to extend a pronouncing dictionary for use in the spelling correction algorithm developed by Toutanova and Moore (2002), which includes statistical models of spelling errors re- lated to both orthography and pronunciation. The pronunciation variation modeling is shown to improve performance for misspellings produced by Japanese writers of English as a foreign language. ii to my parents iii ACKNOWLEDGMENTS I would like to thank my advisor, Eric Fosler-Lussier, and the computational lin- guistics faculty in the Linguistics and Computer Science and Engineering departments at Ohio State for their support. I would also like to thank the computational linguis- tics discussion group Clippers for their feedback in the early stages of this work.
    [Show full text]
  • Guida Pratica All'uso Di GNU Emacs E Auctex
    Mosè Giordano, Orlando Iovino, Matteo Leccardi Guida pratica all’uso di GNU Emacs e AUCTEX o Utiliz p za p t u o r r i G b b g It b b It u al X iani di TE guidaemacsauctex.tex v.3.2 del 4235/25/34 Licenza d’uso Quest’opera è soggetta alla Creative Commons Public License versione 5.2 o posteriore: Attribuzione, Non Commerciale, Condividi allo stesso modo. Un riassunto della licenza in linguaggio accessibile a tutti è reperibi- le sul sito ufficiale http://creativecommons.org/licenses/by-nc-sa/ 3.0/deed.it. tu sei libero: • Di riprodurre, distribuire, comunicare al pubblico, esporre in pubblico, rappresentare, eseguire e recitare quest’opera. • Di modificare quest’opera. alle seguenti condizioni: b Devi attribuire la paternità dell’opera nei modi indicati dall’autore o da chi ti ha dato l’opera in licenza e in modo tale da non suggerire che essi avallino te o il modo in cui tu usi l’opera. n Non puoi usare quest’opera per fini commerciali. a Se alteri o trasformi quest’opera, o se la usi per crearne un’altra, puoi distribuire l’opera risultante solo con una licenza identica o equivalente a questa. Presentazione Emacs è uno dei più vecchi e potenti editor di testi in circolazione e può vantare fra i suoi utenti Donald Knuth, l’inventore di TEX, e Leslie Lamport, l’autore di LATEX. AUCTEX, invece, è un pacchetto per Emacs scritto interamente in linguaggio Emacs Lisp, che estende notevolmente le funzionalità di Emacs per produrre documenti in LATEX e in altri formati legati al programma di tipocomposizione TEX.
    [Show full text]
  • Neuspell: a Neural Spelling Correction Toolkit
    NeuSpell: A Neural Spelling Correction Toolkit Sai Muralidhar Jayanthi, Danish Pruthi, Graham Neubig Language Technologies Institute Carnegie Mellon University fsjayanth, ddanish, [email protected] Abstract We introduce NeuSpell, an open-source toolkit for spelling correction in English. Our toolkit comprises ten different models, and benchmarks them on naturally occurring mis- spellings from multiple sources. We find that many systems do not adequately leverage the context around the misspelt token. To remedy this, (i) we train neural models using spelling errors in context, synthetically constructed by reverse engineering isolated misspellings; and (ii) use contextual representations. By training on our synthetic examples, correction rates im- prove by 9% (absolute) compared to the case when models are trained on randomly sampled character perturbations. Using richer contex- tual representations boosts the correction rate by another 3%. Our toolkit enables practition- ers to use our proposed and existing spelling correction systems, both via a unified com- mand line, as well as a web interface. Among many potential applications, we demonstrate the utility of our spell-checkers in combating Figure 1: Our toolkit’s web and command line inter- adversarial misspellings. The toolkit can be ac- face for spelling correction. cessed at neuspell.github.io.1 1 Introduction For instance, they fail to disambiguate thaught:::::: to Spelling mistakes constitute the largest share of taught or thought based on the context: “Who errors in written text (Wilbur et al., 2006; Flor :::::::thaught you calculus?” versus “I never thaught:::::: I and Futagi, 2012). Therefore, spell checkers are would be awarded the fellowship.” arXiv:2010.11085v1 [cs.CL] 21 Oct 2020 ubiquitous, forming an integral part of many ap- In this paper, we describe our spelling correction plications including search engines, productivity toolkit, which comprises of several neural mod- and collaboration tools, messaging platforms, etc.
    [Show full text]
  • Spelling Correction and the Noisy Channel
    Speech and Language Processing. Daniel Jurafsky & James H. Martin. Copyright © 2021. All rights reserved. Draft of September 21, 2021. CHAPTER Spelling Correction and the B Noisy Channel ALGERNON: But my own sweet Cecily, I have never written you any letters. CECILY: You need hardly remind me of that, Ernest. I remember only too well that I was forced to write your letters for you. I wrote always three times a week, and sometimes oftener. ALGERNON: Oh, do let me read them, Cecily? CECILY: Oh, I couldn’t possibly. They would make you far too conceited. The three you wrote me after I had broken off the engagement are so beautiful, and so badly spelled, that even now I can hardly read them without crying a little. Oscar Wilde, The Importance of Being Earnest Like Oscar Wilde’s fabulous Cecily, a lot of people were thinking about spelling during the last turn of the century. Gilbert and Sullivan provide many examples. The Gondoliers’ Giuseppe, for example, worries that his private secretary is “shaky in his spelling”, while Iolanthe’s Phyllis can “spell every word that she uses”. Thorstein Veblen’s explanation (in his 1899 classic The Theory of the Leisure Class) was that a main purpose of the “archaic, cumbrous, and ineffective” English spelling system was to be difficult enough to provide a test of membership in the leisure class. Whatever the social role of spelling, we can certainly agree that many more of us are like Cecily than like Phyllis. Estimates for the frequency of spelling errors in human-typed text vary from 1-2% for carefully retyping already printed text to 10-15% for web queries.
    [Show full text]
  • V2616 Linux User's Manual Introduction
    V2616 Linux User’s Manual First Edition, October 2011 www.moxa.com/product © 2011 Moxa Inc. All rights reserved. V2616 Linux User’s Manual The software described in this manual is furnished under a license agreement and may be used only in accordance with the terms of that agreement. Copyright Notice © 2011 Moxa Inc. All rights reserved. Trademarks The MOXA logo is a registered trademark of Moxa Inc. All other trademarks or registered marks in this manual belong to their respective manufacturers. Disclaimer Information in this document is subject to change without notice and does not represent a commitment on the part of Moxa. Moxa provides this document as is, without warranty of any kind, either expressed or implied, including, but not limited to, its particular purpose. Moxa reserves the right to make improvements and/or changes to this manual, or to the products and/or the programs described in this manual, at any time. Information provided in this manual is intended to be accurate and reliable. However, Moxa assumes no responsibility for its use, or for any infringements on the rights of third parties that may result from its use. This product might include unintentional technical or typographical errors. Changes are periodically made to the information herein to correct such errors, and these changes are incorporated into new editions of the publication. Technical Support Contact Information www.moxa.com/support Moxa Americas Moxa China (Shanghai office) Toll-free: 1-888-669-2872 Toll-free: 800-820-5036 Tel: +1-714-528-6777 Tel: +86-21-5258-9955 Fax: +1-714-528-6778 Fax: +86-21-5258-5505 Moxa Europe Moxa Asia-Pacific Tel: +49-89-3 70 03 99-0 Tel: +886-2-8919-1230 Fax: +49-89-3 70 03 99-99 Fax: +886-2-8919-1231 Table of Contents 1.
    [Show full text]