Kermit News Issn 0899-9309
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Guía Del Usuario Del Servidor HP Proliant DL380 G6
Guía del usuario del servidor HP ProLiant DL380 G6 © Copyright 2009 Hewlett-Packard Development Company, L.P. La información que contiene este documento está sujeta a cambios sin previo aviso. Las únicas garantías de los productos y servicios de HP están establecidas en las declaraciones expresas de garantía que acompañan a dichos productos y servicios. No se podrá utilizar nada de lo que se incluye en este documento como parte de una garantía adicional. HP no se hace responsable de los errores u omisiones técnicos o editoriales aquí contenidos. Referencia 495624-071 Marzo de 2009 (primera edición) Microsoft y Windows Server son marcas comerciales registradas de Microsoft Corporation en los Estados Unidos. Usuarios a los que está destinado Esta guía está dirigida a la persona encargada de la instalación, administración y solución de problemas de los servidores y sistemas de almacenamiento. HP le considera una persona cualificada para la reparación de los equipos informáticos y preparada para reconocer las dificultades de los productos con niveles de energía peligrosos. Tabla de contenido 1 Identificación de componentes Componentes del panel frontal ............................................................................................................ 2 Indicadores LED y botones del panel frontal ........................................................................................ 3 Indicadores LED de Systems Insight Display ....................................................................................... 4 Combinaciones de -
The Control of Routine Fish Maneuvers: Connecting Midline Kinematics to Turn Outcomes
Received: 16 June 2020 | Accepted: 17 June 2020 DOI: 10.1002/jez.2398 RESEARCH PAPER The control of routine fish maneuvers: Connecting midline kinematics to turn outcomes Stephen P. Howe | Henry C. Astley Department of Biology, Biomimicry Research and Innovation Center, University of Akron, Abstract Akron, Ohio Maneuverability is an important factor in determining an animal's ability to navigate Correspondence its environment and succeed in predator–prey interactions. Although fish are cap- Stephen P. Howe, Department of Biology, Biomimicry Research and Innovation Center, able of a wide range of maneuvers, most of the literature has focused on escape University of Akron, 235 Carroll St., Rm D401, maneuvers while less attention has been paid to routine maneuvers, such as those Akron, OH 44325‐3908. Email: [email protected] used for habitat navigation. The quantitative relationships between body deforma- tions and maneuver outcomes (displacement of the center of mass and change in trajectory) are fundamental to understanding how fish control their maneuvers, yet remain unknown in routine maneuvers. We recorded high‐speed video of eight giant danios (Devario aquepinnatus) performing routine and escape maneuvers and quan- tified the deformation of the midline, the heading of the anterior body, and the kinematics of the centroid (a proxy for center of mass). We found that both routine and escape behaviors used qualitatively similar independent body bending events, which we curvature pulses, that propagate from head to tail but show quantitative differences in midline kinematics and turn outcomes. In routine maneuvers, the direction change and acceleration of the fish are influenced by both the magnitude of the bending pulse and by the duration of the pulse, whereas in escape maneuvers, only pulse duration influenced direction change and turn acceleration. -
Linux on the Road
Linux on the Road Linux with Laptops, Notebooks, PDAs, Mobile Phones and Other Portable Devices Werner Heuser <wehe[AT]tuxmobil.org> Linux Mobile Edition Edition Version 3.22 TuxMobil Berlin Copyright © 2000-2011 Werner Heuser 2011-12-12 Revision History Revision 3.22 2011-12-12 Revised by: wh The address of the opensuse-mobile mailing list has been added, a section power management for graphics cards has been added, a short description of Intel's LinuxPowerTop project has been added, all references to Suspend2 have been changed to TuxOnIce, links to OpenSync and Funambol syncronization packages have been added, some notes about SSDs have been added, many URLs have been checked and some minor improvements have been made. Revision 3.21 2005-11-14 Revised by: wh Some more typos have been fixed. Revision 3.20 2005-11-14 Revised by: wh Some typos have been fixed. Revision 3.19 2005-11-14 Revised by: wh A link to keytouch has been added, minor changes have been made. Revision 3.18 2005-10-10 Revised by: wh Some URLs have been updated, spelling has been corrected, minor changes have been made. Revision 3.17.1 2005-09-28 Revised by: sh A technical and a language review have been performed by Sebastian Henschel. Numerous bugs have been fixed and many URLs have been updated. Revision 3.17 2005-08-28 Revised by: wh Some more tools added to external monitor/projector section, link to Zaurus Development with Damn Small Linux added to cross-compile section, some additions about acoustic management for hard disks added, references to X.org added to X11 sections, link to laptop-mode-tools added, some URLs updated, spelling cleaned, minor changes. -
Cromemco 3K Control Basic Instruction Manual 023-0023 197904
l•• CROMEMCO 3K CONTROL BASIC INSTRUCTION MANUAL J (Models MCB-216 & CB-308) \":'f,_'~", ~,-:- \ 1I q q .'.':&...•• q~"'!'-- - ~.' q..~¥_..../ CROMEMCO; INC. q 280 Berna rd'o Avenue Mountain View, CA 94043 >""1 ;~ Part No. 023-0023 April 1979 ~r Copyright © 1977, 1979 By CROMEMCO, INC. I' _ All Rights Reserved ...i· ... I'-. •I r This manual was produced in its entirety with the Cromemco Word ( Processing System and was printed on a Cromemco 3355 P r in t e r wit h pro po r t ion a 1 I spacing. I ,I I I I I I I I 1 ~~ J Table of Contents I Section 1 1 Introduct ion . ....... 1 2 Getting Started with Control Basic 3 1 2.1 Installing Control Basic in Your System ••• 3 2.2 Entering programs from the Console Device 3 2.3 Entering or Saving Programs l with Other Devices •••••• 4 3 Elements of the Control Basic Language 6 1 3.1 Numbers and Constants • •••• 6 3.2 Variables •••• •• • ••• 6 3.3 Functions •••••••• ••• 7 .4 3.4 Arithmetic and Compare Operators 8 3.5 Expressions • •• ••• 9 4 Control Basic Syntax 10 4.1 Control Basic General Syntax •••• 10 4.2 Abbreviations and Summary of Commands 12 4.3 Memory Organization of Control Basic 14 .1 5 Control Basic Commands and Statements 16 5.1 Assignment Commands •••••• 16 5.1.1 LET Command 16 5.1.2 PUT Command ••••••••• 16 1 5.2 Control Commands 18 5.2.1 IF Command ••••••• 18 5.2.2 GOTO Command •••••••••••• 18 .1 5.2.3 FOR Command. -
Technical Details of the Elliott 152 and 153
Appendix 1 Technical Details of the Elliott 152 and 153 Introduction The Elliott 152 computer was part of the Admiralty’s MRS5 (medium range system 5) naval gunnery project, described in Chap. 2. The Elliott 153 computer, also known as the D/F (direction-finding) computer, was built for GCHQ and the Admiralty as described in Chap. 3. The information in this appendix is intended to supplement the overall descriptions of the machines as given in Chaps. 2 and 3. A1.1 The Elliott 152 Work on the MRS5 contract at Borehamwood began in October 1946 and was essen- tially finished in 1950. Novel target-tracking radar was at the heart of the project, the radar being synchronized to the computer’s clock. In his enthusiasm for perfecting the radar technology, John Coales seems to have spent little time on what we would now call an overall systems design. When Harry Carpenter joined the staff of the Computing Division at Borehamwood on 1 January 1949, he recalls that nobody had yet defined the way in which the control program, running on the 152 computer, would interface with guns and radar. Furthermore, nobody yet appeared to be working on the computational algorithms necessary for three-dimensional trajectory predic- tion. As for the guns that the MRS5 system was intended to control, not even the basic ballistics parameters seemed to be known with any accuracy at Borehamwood [1, 2]. A1.1.1 Communication and Data-Rate The physical separation, between radar in the Borehamwood car park and digital computer in the laboratory, necessitated an interconnecting cable of about 150 m in length. -
Compaq Armada 1500.Pdf
Notice The information in this guide is subject to change without notice. COMPAQ COMPUTER CORPORATION SHALL NOT BE LIABLE FOR TECHNICAL OR EDITORIAL ERRORS OR OMISSIONS CONTAINED HEREIN; NOR FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES RESULTING FROM THE FURNISHING, PERFORMANCE, OR USE OF THIS MATERIAL. This guide contains information protected by copyright. No part of this guide may be photocopied or reproduced in any form without prior written consent from Compaq Computer Corporation. 1997 Compaq Computer Corporation. All rights reserved. Printed in the U.S.A. Compaq, LTE, Contura, ProLinea, QuickLock, QuickBlank are registered in the U. S. Patent and Trademark Office. Armada is a trademark of Compaq Computer Corporation. Contura is registered in the Philippines Patent Office. Microsoft, MS-DOS, and Windows are registered trademarks of Microsoft Corporation. Windows 95 is a trademark of Microsoft Corporation. The software described in this guide is furnished under a license agreement or nondisclosure agreement. The software may be used or copied only in accordance with the terms of the agreement. Product names mentioned herein may be trademarks and/or registered trademarks of their respective companies. Maintenance and Service Guide Compaq Armada 1500 Family of Personal Computers First Edition (March 1997) Spare Part Number 255011-001 Document Part Number 284820-001 Compaq Computer Corporation . Preface Preface This Maintenance and Service Guide is a troubleshooting guide that can be used for reference when servicing the Compaq Armada 1500 Family of Personal Computers. Additional information is available in the Service Quick Reference Guide and in QuickFind. Compaq Computer Corporation reserves the right to make changes to the Compaq Armada 1500 Personal Computers without notice. -
NCSA Telnet for the Macintosh User's Guide
NCSA Telnet for the Macintosh User’s Guide Version 2.6 • October 1994 National Center for Supercomputing Applications University of Illinois at Urbana-Champaign Contents Introduction Features of NCSA Telnet v Differences between Version 2.5 and Version 2.6 v New Features in Version 2.6 v Discontinued Features vi Bugs Fixed from Version 2.5 vi System Requirements vi Notational Conventions vi 1 Getting Started Installation Note 1-1 Beginning an NCSA Telnet Session 1-1 Opening and Closing a Connection 1-2 Opening a Connection 1-2 Logging on to Your Host 1-3 Setting the BACKSPACE/DELETE Key 1-3 Setting a VT Terminal Type 1-3 Emulating the VT Terminal Keyboard 1-4 Closing a Connection 1-4 Copying, Pasting, and Printing 1-5 Copy and Paste from the Edit Menu 1-5 Print from the File Menu 1-5 Ending an NCSA Telnet Session 1-6 2 Configuration Global Preferences 2-1 New Configuration System in Version 2.6 2-3 Default Configuration Records 2-3 Editing Configuration Records 2-3 Editing Terminal Configuration Records 2-4 Editing Session Configuration Records 2-5 Changing Configuration after Session Connected 2-9 Saved Sets 2-13 Saving a Set 2-14 Using a Saved Set 2-14 Loading a Saved Set 2-15 Macro Definitions 2-15 Reverting to Previous Macro Definitions 2-16 Saving Macros 2-16 3 Advanced Features Cursor Positioning with the Mouse 3-1 Multiple Connections 3-1 Opening More Than One Connection 3-1 Moving between Connections 3-1 Rules for Session Names 3-2 The Connections Menu 3-2 Naming Windows 3-2 Checking Session Status 3-2 Aborting Connection Attempts -
200 Modi Per Recuperare Un Hard Disk
Retrocomputer Magazine Anno 2 - Numero 9 - Maggio/Giugno 2007 In prova: Jurassic Olivetti Linea 1 News Esclusiva: I migliori PC di tutti i tempi Inoltre: Virtual Texas Instruments disk Laboratorio: 200 modi per recuperare un hard Jurassic News - Anno 2 - numero 9 - maggio/giugno 2007 Jurassic News Sommario - Maggio/Giugno 2007 Rivista aperiodica di Retro Computing Editoriale Apple Club Coordinatore editoriale Novità in vista, 3 Tutti i linguaggi di Apple Tullio Nicolussi [Tn] (parte 1), 62 Redazione Retrocomputing Sonicher [Sn] Esseri liberi, 4 Retro Linguaggi I migliori PC di tutti i tempi, 6 COBOL (parte 4), 74 Hanno collaborato a questo numero: Salvatore Macomer [Sm] Come eravamo Videoteca Lorenzo 2 [L2] Maggio 1982, 14 2010 l’anno del contatto, 72 Besdelsec [Bs] Giugno 1982, 15 Edicola Impaginazione e grafica Le prove di JN Anna [An] Pluto Journal, 66 Olivetti L1, 16 Nuova Elettronica Z80, 38 Diffusione Retro Software [email protected] Visicalc, 68 Il racconto La rivista viene diffusa in Una giornata di Ivan Ivanovich, formato PDF via Inter- Biblioteca 24 net. Il costo di un singolo Linux Bible, 80 numero è di Euro 2. 101 Reasons: To Switch to the Abbonamento annuale (6 Retro Riviste MAC, 82 numeri) Euro 6. Olivetti Research & Tecnology Arretrati Euro 2 a numero. Review , 36 L’intervista Contatti Conversazione con Gianfranco, [email protected] Laboratorio 84 200 modi per resuscitare un HD Copyright L’opinione I marchi citati sono di (parte 1), 50 Della Pirateria, 88 copyrights dei rispettivi proprietari. Emulazione La riproduzione con qual- Virtual TI 2.5, 48 BBS siasi mezzo di illustrazioni Scumm e ScummVM, 56 Posta e comunicazioni, 94 e di articoli pubblicati sulla rivista, nonché la loro tra- duzione, è riservata e non può avvenire senza espres- sa autorizzazione. -
A Guide to HP Handheld Calculators and Computers
Book Review – A Guide to HP Handheld Calculators and Computers © 2019 Valentín Albillo 1. Introduction This is my review of the book “A Guide to HP Handheld Calculators and Computers”, Fifth Edition, by W. A. C. Mier-Jedrzejowicz (kindly dedicated to me by the author himself), a book mainly addressed to all those people interested in Hewlett-Packard„s vintage handheld calculators and (mainly small) computers, either for collecting purposes, to know their history and characteristics or both. First of all, the essential data for the book: Element Value Title A GUIDE TO HP HANDHELD CALCULATORS AND COMPUTERS Fifth Edition – September 2007 Author Mier-Jedrzejowicz, Wlodzimierz Anthony Christopher Publisher Wilson/Barnett Publishing Copyright Copyright © 1995-2007 by W.A.C. Mier-Jedrzejowicz Subjects Hewlett-Packard – Calculators Computers Applies to HP vintage Calculators and Computers Pages 224 (12 full color pages, spiral-bound) ISBN 978-1-888840-40-7 Covers The book conveniently opens flat, making it very comfortable to read and use as a reference, and begins directly with a listing of its contents, which consist of three big chapters, subdivided into more than 30 sections (which have lots of subsections each) with many greyscale pictures of as many models, two sizable Appendices, 12 HP Color Photo Pages featuring color pictures of nearly 50 models and assorted accessories, plus additional individual sections such as Introduction, Acknowledmentes, Glossary, About the Author, etc. Plenty of data is given about every model (grouped by family), including (pre)announcement, release and discontinuation dates with their respective prices, distinguishing characteristics, relation to other models, a bit of history, relevant trivia, assorted comments, discussion of add-ons and peripherals where appropriate and, most important to collectors, an assessment of their rarity and fair price (circa 2007) as collectibles. -
ABC800-Manual-BASIC-II.Pdf
Preface This manual describes the BASIC II programming language of ABC 800. The reader should have programming experience, since the manual is not meant to be a BASIC textbook. Chapter 1 introduces the BASIC programming language. Chapter 2 deals with the structure of BASIC II computer programs. Chapters 3, 4, and 5 describe the data that can be processed by a program. Chapter 6 describes how to operate BASIC II. This chapter contains plenty of advice and tips on how to type and edit a program Chapter 7 deals with the direct usage of instructions and commands, without any program. This method is particularely useful when a program is being debugged. Chapters 8, 9, and 1a contain detailed descriptions of all commands, functions, and instructions that are part of BASIC II. Most of the descriptions are completed by examples which show the structure of each program part. Chapters 11 and 12 deal with the ABC 800 graphics. Both the TELETEXTgraphics and the high resolution graphics with animation mode are described. Chapter 13 describes the use of the function keys. Chapter 14 describes the differences between ABC 800 and ABC 80. Chapter 15 contains a list of error messages with comments. Chapter 16, marked with grey edges, contains short descriptions of all instructions, functions, and commands arranged in alphabetical order.The list in chapter 16 is meant for use as an index register, where the syntax can be found together with references to the detailed descriptions earlier in the manual (chapters 8, 9, and 10). Chapter 17 is a list of literature references and chapter 18 contains a number of appendices. -
A Technology Assessment of Personal Computers. Vol. III: Personal Computer Impacts and Policy Issues
DOCUMENT RESUME ED 202 454 IR 009 300 AUTHOR Nilles, Jack M.; And Others TITLE A Technology Assessment of Personal Computers. Vol. III: Personal Computer Impacts and Policy Issues. INSTITUTION University of Southern California, Los Angeles. Office of Interdisciplinary Program Development. SPONS AGENCY National Science Foundation, Washington, D.C. DEPORT NO OIP/PCTA-80-3/3 PUB DATE Sep BO GRANT PRA-78-05647 NOTE 342p.; For related documents, see IR 909 298-300. Some small print marginally legible. EDRS PRICE MF01/PC14 Plus Postage. DESCRIPTORS Education; Employment; *Microcomputers; Prediction; *Public Policy; Questionnaires IDENTIFIERS *Delphi Technique; International Trade; *Technology Assessment ABSTRACT A technology assessment of personal computers was conducted to study both the socially desirable and undesirable impacts of this new technology in three main areas: education, employment, and international trade. Information gleaned from this study was then used to generate suggestions for public policy options which could influence these impacts. Four primary methods were used to develop the information for the policy analysis stages of the assessment:(1) search and analysis of the relevant literature, (2) development of a series of scenarios of alternative futures, (3) performance of two Delphi surveys and a cross-impact analysis based on these scenarios, and (4) interviews and/or surveys of the potentially affected stakeholders and decision makers. Tables of data are included as well as a list of references. Appendices include Delphi questionnaires with summaries of findings and an employment questionnaire used in the study. (LLS) *********************************************************************** Reproductions supplied by EDRS are the best that can be made * from the original document. *********************************************************************** U S DEPARTMENT OF HEALTH. -
Hungary: Computers Behind the Iron Curtain Written by Gábor Képes
Hungary: Computers behind the Iron Curtain Written by Gábor Képes After the 1956 Revolution,in People’s Republic of Hungary Stalinist dictatorship was followed by a political system that was ready for consolidation and opened towards the West. For this reason Hungary was sometimes called the ’happiest barracks of the Soviet camp’. Hungarian computer technology was both connected to the initiatives of the Eastern bloc countries, and also hurriedly following the West at the same time. By 1989 there were approximately 100,000 computers working in the country, and its computer technology was typically colourful and full of unique solutions. Gábor Képes is 1. Heyday of Cybernetics in Hungary Head of the De- partment of Every modern digital computer in the world is set up on the Technological principles (principle of the stored program) described by the Museology. Since Hungarian-born American mathematician, John von Neumann 2004 he has been (1903-1957). Neumann made his own concept available for the a curator of the whole world.The history of modern computer science started in computer science the 1940s and 50s - while the Second World War was ending the collection of the Hungarian Mu- World War II and the Cold War was starting. Computer research seum for Science and Technol- began in the Soviet bloc as well, although in the era of Stalinism ogy, and then from 2009 in the cybernetics was considered a “dangerous civil pseudoscience”. successor institute: Hungarian This point of view slowly changed starting in the second half of Museum for Science, Technology the 50’s. and Transport.