Language Reference Language Reference - Volume 2

Total Page:16

File Type:pdf, Size:1020Kb

Language Reference Language Reference - Volume 2 Language Reference Language Reference - Volume 2 Version 13.2 The tool of thought for expert programming Dyalog is a trademark of Dyalog Limited Copyright © 1982-2013 by Dyalog Limited All rights reserved. Version: 13.2 Revision: 22186 No part of this publication may be reproduced in any form by any means without the prior written per- mission of Dyalog Limited. Dyalog Limited makes no representations or warranties with respect to the contents hereof and spe- cifically disclaims any implied warranties of merchantability or fitness for any particular purpose. Dya- log Limited reserves the right to revise this publication without notification. TRADEMARKS: SQAPL is copyright of Insight Systems ApS. UNIX is a registered trademark of The Open Group. Windows, Windows Vista, Visual Basic and Excel are trademarks of Microsoft Corporation. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Array Editor is copyright of davidliebtag.com All other trademarks and copyrights are acknowledged. Contents Chapter 1: Primitive Functions 1 Scalar Functions 1 Mixed Functions 4 Conformability 7 Fill Elements 7 Axis Operator 8 Functions (A-Z) 8 Abort: 9 Add: 10 And, Lowest Common Multiple: 11 Assignment: 12 Assignment (Indexed): 15 Assignment (Selective): 20 Binomial: 22 Branch: 23 Catenate/Laminate: 25 Catenate First: 27 Ceiling: 27 Circular: 28 Conjugate: 29 Deal: 29 Decode: 30 Depth: 32 Direction (Signum): 33 Disclose: 34 Divide: 35 Drop: 36 Drop with Axes: 37 Enclose: 38 Enclose with Axes: 39 Encode: 40 Enlist: 42 Equal: 43 Excluding: 44 Execute (Monadic): 45 Execute (Dyadic): 45 Expand: 46 Expand First: 47 iv Exponential: 47 Factorial: 47 Find: 48 First: 49 Floor: 49 Format (Monadic): 50 Format (Dyadic): 54 Grade Down (Monadic): 56 Grade Down (Dyadic): 57 Grade Up (Monadic): 59 Grade Up (Dyadic): 61 Greater: 62 Greater Or Equal: 63 Identity: 63 Index: 64 Index with Axes: 67 Index Generator: 68 Index Of: 69 Indexing: 70 Intersection: 74 Left: 75 Less: 76 Less Or Equal: 76 Logarithm: 77 Magnitude: 77 Match: 78 Matrix Divide: 79 Matrix Inverse: 81 Maximum: 82 Membership: 82 Minimum: 82 Minus: 82 Mix: 83 Multiply: 84 Nand: 84 Natural Logarithm: 84 Negative: 85 Nor: 85 Not: 85 Not Equal: 86 Not Match: 86 Or, Greatest Common Divisor: 87 Partition: 88 Partitioned Enclose: 90 Pi Times: 91 v Pick: 91 Plus: 92 Power: 92 Ravel: 93 Ravel with Axes: 93 Reciprocal: 96 Replicate: 96 Reshape: 98 Residue: 98 Reverse: 99 Reverse First: 99 Right: 99 Roll: 100 Rotate: 100 Rotate First: 101 Same: 102 Shape: 102 Split: 103 Subtract: 103 Table: 104 Take: 105 Take with Axes: 106 Times: 107 Transpose (Monadic): 107 Transpose (Dyadic): 107 Type: 108 Union: 109 Unique: 109 Without: 109 Zilde: 109 Chapter 2: Primitive Operators 111 Operator Syntax 111 Axis Specification 112 Operators (A-Z) 113 Assignment (Modified): 113 Assignment (Indexed Modified): 114 Assignment (Selective Modified): 115 Axis (with Monadic Operand): 115 Axis (with Dyadic Operand): 116 Commute: 119 Composition (Form I): 120 Composition (Form II): 121 Composition (Form III): 122 vi Composition (Form IV): 122 Each (with Monadic Operand): 123 Each (with Dyadic Operand): 124 Inner Product: 125 Outer Product: 126 Power Operator: 127 Reduce: 129 Reduce First: 132 Reduce N-Wise: 132 Scan: 133 Scan First: 134 Spawn: 135 Variant: 136 I-Beam: 139 Syntax Colouring: 140 Core to APLCore: (UNIX only) 141 Number of Threads: 142 Parallel Execution Threshold: 142 Memory Manager Statistics: 143 Update DataTable: 146 Read DataTable: 149 Export To Memory: 152 Component Checksum Validation: 152 Fork New Task: (UNIX only) 153 Change User: (UNIX only) 154 Reap Forked Tasks: (UNIX only) 155 Signal Counts: (UNIX only) 157 Thread Synchronisation Mechanism: 157 Random Number Generator: 158 Chapter 3: System Functions & Variables 159 System Variables 161 System Namespaces 162 System Constants 163 System Functions 164 Character Input/Output: 172 Evaluated Input/Output: 174 Underscored Alphabetic Characters: 176 Alphabetic Characters: 176 Account Information: 177 Account Name: 177 Arbitrary Output: 178 Attributes: 179 Atomic Vector: 183 vii Atomic Vector - Unicode: 183 Base Class: 186 Class: 187 Clear Workspace: 189 Execute Windows Command: 190 Start Windows Auxiliary Processor: 193 Canonical Representation: 194 Change Space: 196 Comparison Tolerance: 198 Copy Workspace: 199 Digits: 201 Decimal Comparison Tolerance: 201 Display Form: 202 Division Method: 205 Delay: 205 Diagnostic Message: 206 Extended Diagnostic Message: 207 Dequeue Events: 212 Data Representation (Monadic): 215 Data Representation (Dyadic): 216 Edit Object: 217 Event Message: 217 Exception: 218 Expunge Object: 219 Export Object: 221 File Append Component: 222 File System Available: 222 File Check and Repair: 223 File Copy: 224 File Create: 226 File Drop Component: 228 File Erase: 229 File History: 229 File Hold: 231 Fix Script: 232 Component File Library: 233 Format (Monadic): 234 Format (Dyadic): 235 File Names: 242 File Numbers: 243 File Properties: 244 Floating-Point Representation: 247 File Read Access: 249 File Read Component Information: 250 File Read Component: 251 viii File Rename: 252 File Replace Component: 253 File Resize: 254 File Size: 255 File Set Access: 255 File Share Tie: 256 Exclusive File Tie: 257 File Untie: 258 Fix Definition: 258 Instances: 259 Index Origin: 260 Key Label: 261 Line Count: 261 Load Workspace: 262 Lock Definition: 263 Latent Expression: 264 Map File: 264 Migration Level: 266 Set Monitor: 268 Query Monitor: 269 Name Association: 270 Native File Append: 298 Name Classification: 299 Native File Create: 310 Native File Erase: 310 New Instance: 311 Name List: 312 Native File Lock: 316 Native File Names: 318 Native File Numbers: 318 Enqueue Event: 319 Nested Representation: 321 Native File Read: 322 Native File Rename: 324 Native File Replace: 324 Native File Resize: 326 Create Namespace: 326 Namespace Indicator: 328 Native File Size: 328 Native File Tie: 329 Null Item: 330 Native File Untie: 331 Native File Translate: 331 Sign Off APL: 332 Variant: 332 ix Object Representation: 333 Search Path: 337 Program Function Key: 339 Print Precision: 340 Profile Application: 341 Print Width: 348 Cross References: 349 Replace: 350 Random Link: 369 Space Indicator: 371 Response Time Limit: 372 Search: 372 Save Workspace: 372 Screen Dimensions: 373 Session Namespace: 373 Execute (UNIX) Command: 374 Start UNIX Auxiliary Processor: 375 State Indicator: 376 Shadow Name: 377 Signal Event: 378 Size of Object: 381 Screen Map: 382 Screen Read: 385 Source: 389 State Indicator Stack: 390 State of Object: 391 Set Stop: 393 Query Stop: 394 Set Access Control: 395 Query Access Control: 396 Shared Variable Offer: 397 Query Degree of Coupling: 399 Shared Variable Query: 399 Shared Variable Retract Offer: 400 Shared Variable State: 401 Terminal Control: 402 Thread Child Numbers: 403 Get Tokens: 403 This Space: 405 Current Thread Identity: 406 Kill Thread: 406 Current Thread Name: 407 Thread Numbers: 407 Token Pool: 407 Put Tokens: 408 x Set Trace: 409 Query Trace: 410 Trap Event: 411 Token Requests: 415 Time Stamp: 416 Wait for Threads to Terminate: 417 Unicode Convert: 418 Using (Microsoft .Net Search Path): 421 Vector Representation: 422 Verify & Fix Input: 423 Workspace Available: 424 Windows Create Object: 425 Windows Get Property: 428 Windows Child Names: 429 Windows Set Property: 430 Workspace Identification: 431 Window Expose: 432 XML Convert: 433 Extended State Indicator: 447 Set External Variable: 448 Query External Variable: 450 Chapter 4: System Commands 451 Introduction 451 List Classes: 453 Clear Workspace: 453 Windows Command Processor: 454 Save Continuation: 455 Copy Workspace: 456 Change Space: 458 Drop Workspace: 458 Edit Object: 459 List Events: 460 List Global Defined Functions: 460 Display Held Tokens: 461 List Workspace Library: 462 Load Workspace: 463 List Methods: 464 Create Namespace: 464 List Global Namespaces: 465 List Global Namespaces: 465 Sign Off APL: 465 List Global Defined Operators: 465 Protected Copy: 466 xi List Properties: 467 Reset State Indicator: 467 Save Workspace: 467 Execute (UNIX) Command: 469 State Indicator: 470 Clear State Indicator: 471 State Indicator & Name List: 471 Thread Identity: 472 List Global Defined Variables: 473 Workspace Identification: 473 Load without Latent Expression: 474 Chapter 5: Error Messages 475 Introduction 475 Standard Error Action 476 APL Errors 477 Operating System Error Messages 481 Windows Operating System Error Messages 483 APL Error Messages 484 bad ws 484 cannot create name 484 clear ws 484 copy incomplete 484 DEADLOCK 484 defn error 485 DOMAIN ERROR 486 EOF INTERRUPT 486 EXCEPTION 486 FIELD CONTENTS RANK ERROR 487 FIELD CONTENTS TOO MANY COLUMNS 487 FIELD POSITION ERROR 487 FIELD CONTENTS TYPE MISMATCH 487 FIELD TYPE BEHAVIOUR UNRECOGNISED 487 FIELD ATTRIBUTES RANK ERROR 487 FIELD ATTRIBUTES LENGTH ERROR 487 FULL SCREEN ERROR 487 KEY CODE UNRECOGNISED 488 KEY CODE RANK ERROR 488 KEY CODE TYPE ERROR 488 FORMAT FILE ACCESS ERROR 488 FORMAT FILE ERROR 488 FILE ACCESS ERROR 489 FILE ACCESS ERROR CONVERTING 489 FILE COMPONENT DAMAGED 489 xii FILE DAMAGED 490 FILE FULL 490 FILE INDEX ERROR 490 FILE NAME ERROR 490 FILE NAME QUOTA USED UP 491 FILE SYSTEM ERROR 491 FILE SYSTEM NO SPACE 491 FILE SYSTEM NOT AVAILABLE 491 FILE SYSTEM TIES USED UP 491 FILE TIE ERROR 492 FILE TIED 492 FILE TIED REMOTELY 492 FILE TIE QUOTA USED UP 493 FORMAT ERROR 493 HOLD ERROR 493 incorrect command 494 INDEX ERROR 494 INTERNAL ERROR 495 INTERRUPT 495 is name 495 LENGTH ERROR 496
Recommended publications
  • The Origins of the Underline As Visual Representation of the Hyperlink on the Web: a Case Study in Skeuomorphism
    The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Romano, John J. 2016. The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism. Master's thesis, Harvard Extension School. Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:33797379 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism John J Romano A Thesis in the Field of Visual Arts for the Degree of Master of Liberal Arts in Extension Studies Harvard University November 2016 Abstract This thesis investigates the process by which the underline came to be used as the default signifier of hyperlinks on the World Wide Web. Created in 1990 by Tim Berners- Lee, the web quickly became the most used hypertext system in the world, and most browsers default to indicating hyperlinks with an underline. To answer the question of why the underline was chosen over competing demarcation techniques, the thesis applies the methods of history of technology and sociology of technology. Before the invention of the web, the underline–also known as the vinculum–was used in many contexts in writing systems; collecting entities together to form a whole and ascribing additional meaning to the content.
    [Show full text]
  • The Emoji Factor: Humanizing the Emerging Law of Digital Speech
    The Emoji Factor: Humanizing the Emerging Law of Digital Speech 1 Elizabeth A. Kirley and Marilyn M. McMahon Emoji are widely perceived as a whimsical, humorous or affectionate adjunct to online communications. We are discovering, however, that they are much more: they hold a complex socio-cultural history and perform a role in social media analogous to non-verbal behaviour in offline speech. This paper suggests emoji are the seminal workings of a nuanced, rebus-type language, one serving to inject emotion, creativity, ambiguity – in other words ‘humanity’ - into computer mediated communications. That perspective challenges doctrinal and procedural requirements of our legal systems, particularly as they relate to such requisites for establishing guilt or fault as intent, foreseeability, consensus, and liability when things go awry. This paper asks: are we prepared as a society to expand constitutional protections to the casual, unmediated ‘low value’ speech of emoji? It identifies four interpretative challenges posed by emoji for the judiciary or other conflict resolution specialists, characterizing them as technical, contextual, graphic, and personal. Through a qualitative review of a sampling of cases from American and European jurisdictions, we examine emoji in criminal, tort and contract law contexts and find they are progressively recognized, not as joke or ornament, but as the first step in non-verbal digital literacy with potential evidentiary legitimacy to humanize and give contour to interpersonal communications. The paper proposes a separate space in which to shape law reform using low speech theory to identify how we envision their legal status and constitutional protection. 1 Dr. Kirley is Barrister & Solicitor in Canada and Seniour Lecturer and Chair of Technology Law at Deakin University, MelBourne Australia; Dr.
    [Show full text]
  • Super Duper Semaphore Or, As We Like to Call It
    Super Duper Semaphore Or, as we like to call it ... Flag Texting! Hello Lieutenants ... You can have a whole lot of fun with just a couple of hand flags. Even if you don’t have actual flags, you can make your own using items found around your home, like tea towels, or even two smelly old socks tied to some sticks! As long as you’re having fun ... be inventive. What’s it all about? Well, believe it or not, a great way for ships near (in range of) each other or ships wanting to communicate to the land is to use ‘Flag Semaphore’. It’s a bit like sending a text message ... but with your arms. It has been used for hundreds of years on both land and sea (from the sea, red and yellow flags are used). The word semaphore is Greek for ‘Sign-bearer’ Here’s how it works… Each letter of the alphabet has its own arm position (plus a few extras that we will cover in later ranks). Once you can remember these, you can send loads of hidden messages to your friends and family. Check these out ... ABCDEFG HIJKLM NOPQR STUVWX YZ How cool is that? To send a message the ‘sender’ gets the attention of the ‘receiver’ by waving their arms (and flags) by their side in an up and down motion (imagine flapping your arms like a bird). Don’t worry if you make mistakes or the receiver translates your signals into silly words - we’ve had lots of fun practicing this, and it will take time to become a Super Signaller! Are you ready to send your message? One letter at a time? Remember to pause between each letter and a bit longer between words to accurately get your message through.
    [Show full text]
  • Microej Documentation
    MicroEJ Documentation MicroEJ Corp. Revision ff3ccfde Nov 27, 2020 Copyright 2008-2020, MicroEJ Corp. Content in this space is free for read and redistribute. Except if otherwise stated, modification is subject to MicroEJ Corp prior approval. MicroEJ is a trademark of MicroEJ Corp. All other trademarks and copyrights are the property of their respective owners. CONTENTS 1 MicroEJ Glossary 2 2 Overview 4 2.1 MicroEJ Editions.............................................4 2.1.1 Introduction..........................................4 2.1.2 Determine the MicroEJ Studio/SDK Version..........................5 2.2 Licenses.................................................7 2.2.1 Overview............................................7 2.2.2 License Manager........................................7 2.2.3 Evaluation Licenses......................................7 2.2.4 Production Licenses......................................9 2.3 MicroEJ Runtime............................................. 13 2.3.1 Language............................................ 13 2.3.2 Scheduler............................................ 13 2.3.3 Garbage Collector....................................... 14 2.3.4 Foundation Libraries...................................... 14 2.4 MicroEJ Libraries............................................ 14 2.5 MicroEJ Central Repository....................................... 15 2.6 Embedded Specification Requests................................... 15 2.7 MicroEJ Firmware............................................ 15 2.7.1 Bootable Binary with
    [Show full text]
  • Windows Rootkit Analysis Report
    Windows Rootkit Analysis Report HBGary Contract No: NBCHC08004 SBIR Data Rights November 2008 Page 1 Table of Contents Introduction ................................................................................................................................... 4 Clean Monitoring Tool Logs......................................................................................................... 5 Clean System PSList ................................................................................................................. 5 Clean System Process Explorer ................................................................................................ 6 Vanquish......................................................................................................................................... 7 PSList Vanquish ........................................................................................................................ 7 Vanquish Process Monitor (Process Start – Exit) .................................................................. 8 Process Explorer Thread Stack Vanquish .............................................................................. 8 Process Monitor Events Vanquish ........................................................................................... 9 Vanquish Log File (Created by rootkit, placed in root directory “C:”) ............................. 21 Process Explorer Memory Strings Vanquish ........................................................................ 23 NTIllusion....................................................................................................................................
    [Show full text]
  • Microej Documentation
    MicroEJ Documentation MicroEJ Corp. Revision d6b4dfe4 Feb 24, 2021 Copyright 2008-2020, MicroEJ Corp. Content in this space is free for read and redistribute. Except if otherwise stated, modification is subject to MicroEJ Corp prior approval. MicroEJ is a trademark of MicroEJ Corp. All other trademarks and copyrights are the property of their respective owners. CONTENTS 1 MicroEJ Glossary 2 2 Overview 4 2.1 MicroEJ Editions.............................................4 2.1.1 Introduction..........................................4 2.1.2 Determine the MicroEJ Studio/SDK Version..........................5 2.2 Licenses.................................................7 2.2.1 License Manager Overview...................................7 2.2.2 Evaluation Licenses......................................7 2.2.3 Production Licenses...................................... 10 2.3 MicroEJ Runtime............................................. 14 2.3.1 Language............................................ 14 2.3.2 Scheduler............................................ 14 2.3.3 Garbage Collector....................................... 14 2.3.4 Foundation Libraries...................................... 14 2.4 MicroEJ Libraries............................................ 15 2.5 MicroEJ Central Repository....................................... 16 2.6 Embedded Specification Requests................................... 16 2.7 MicroEJ Firmware............................................ 16 2.7.1 Bootable Binary with Core Services.............................. 16 2.7.2
    [Show full text]
  • An Historical and Analytical Study of the Tally, The
    Copyright by JttUa Slisabobh Adkina 1956 AN HISTORICAL AND ANALYTICAL STUDY OF THE TALLY, THE KNOTTED CORD, THE FINGERS, AND THE ABACUS DISSERTATION Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of The Ohio State U n iv e rsity Sy JULIA ELIZABETH ADKINS, A. B ., M. A. The Ohio State University 1936 Approved by: A dviser Department of Educati ACiCNOWLEDGMENT The author is deeply indebted to Professor Nathan lasar for his inspiration, guidance, and patience during the writing of this dissertation. IX lâBIfi OF CONTENTS GHAFTSl Fàm 1. INTRWCTION................................................................................... 1 Pl^iflËÜaaxy Statcum t ......................................................... 1 âtatamant of the Problem ............ 2 Sqportanee of the Problem ............................................. 3 Scope and Idmitationa of the S tu d y ............................................. 5 The Method o f the S tu d y ..................................................................... 5 BerLeir o f th e L i t e r a t u r e ............................................................ 6 Outline of the Remainder of the Study. ....................... 11 II. THE TâLLI .............................................. .................................................. 14 Definition and Etymology of "Tally? *. ...... .... 14 Types of T a llies .................................................................................. 16 The Notch T a lly ...............................
    [Show full text]
  • Captain's Code – Semaphore Flags
    Captain’s Code – Semaphore Flags The semaphore flags held by the sailors in the Captain’s Code exhibit should spell C-O-O-K. The name ‘semaphore’ comes from the Latin sema (sign) and phoros (bearing). Semaphore is a method of visual signalling, usually by means of flags or lights. They are used in railways and between foreign navy ships to communicate messages over long distances. The semaphore alphabet system is based on waving of a pair of hand-held flags in a particular pattern. The flags are held, arms extended, and each letter is made by a different position of the arms (see Semaphore flag positions at the end of these notes). Semaphore flag Semaphore signalling is usually carried out using flags because the signals are more distinct and can be read further away. However it can be done with the arms alone. Also, shore stations and big ships can be equipped with mechanical semaphores, which consist of a post with oscillating arms. Before the invention of the telegraph, semaphore signalling from high towers was used to transmit messages between distant points. This was established in France in the 1700’s with England following immediately after. The system consisted of large mechanical semaphores located in towers especially constructed for the purpose of semaphore signalling. They were located on a high spot on the terrain, usually about 25 km apart. An operator would send a message by manipulating the controls of the semaphore. The operator on the next hill over would copy the message and relay it by semaphore to the next operator on the next hill.
    [Show full text]
  • Dpapanikolaou Ng07.Pdf
    NG07.indb 44 7/30/15 9:23 PM Choreographies of Information The Architectural Internet of the Eighteenth Century’s Optical Telegraphy Dimitris Papanikolaou Today, with the dominance of digital information and to communicate the news of Troy’s fall to Mycenae. In communications technologies (ICTs), information is 150 BCE, Greek historian Polybius described a system of mostly perceived as digital bits of electric pulses, while sending pre-encoded messages with torches combina- the Internet is seen as a gigantic network of cables, rout- tions.01 And in 1453, Nicolo Barbaro mentioned in his ers, and data centers that interconnects cities and con- diary how Constantinople’s bell-tower network alerted tinents. But few know that for a brief period in history, citizens in real time to the tragic progress of the siege before electricity was utilized and information theory for- by the Ottomans.02 It wasn’t until the mid-eighteenth malized, a mechanical version of what we call “Internet” century, however, that telecommunications developed connected cities across rural areas and landscapes in into vast territorial networks that used visual languages Europe, the United States, and Australia, communicating and control protocols to disassemble any message into 045 information by transforming a rather peculiar medium: discrete signs, route them wirelessly through relay sta- geometric architectural form. tions, reassemble them at the destination, and refor- mulate the message by mapping them into words and The Origins of Territorial Intelligence phrases through lookup tables. And all of this was done Telecommunication was not a novelty in the eighteenth in unprecedented speeds. Two inventions made it pos- century.
    [Show full text]
  • Communicating Empire: Gauging Telegraphy’S Impact on Ceylon’S Nineteenth- Century Colonial Government Administration
    COMMUNICATING EMPIRE: GAUGING TELEGRAPHY’S IMPACT ON CEYLON’S NINETEENTH- CENTURY COLONIAL GOVERNMENT ADMINISTRATION Inauguraldissertation zur Erlangung der Doktorwürde der Philosophischen Fakultät der Ruprecht-Karls-Universität Heidelberg vorgelegt von Paul Fletcher Erstgutachter: Dr. PD Roland Wenzlhuemer Zweitgutachter: Prof. Dr. Madeleine Herren-Oesch eingereicht am: 19.09.2012 ABSTRACT For long, historians have considered the telegraph as a tool of power, one that replaced the colonial government’s a posteriori structures of control with a preventive system of authority. They have suggested that this revolution empowered colonial governments, making them more effective in their strategies of communication and rule. In this dissertation, I test these assumptions and analyze the use of telegraphic communication by Ceylon’s colonial government during the second half of the nineteenth-century; to determine not only the impact of the telegraph on political decision-making but also how the telegraph and politics became embedded together, impacting on colonial government and its decision-making and on everyday administrative processes. I examine telegraphic messages alongside other forms of correspondence, such as letters and memos, to gauge the extent to which the telegraph was used to communicate information between London and Ceylon, and the role that the telegraph played locally, within Ceylon, between the Governor General and the island’s regional officials. I argue that, contrary to conventional ideas, the telegraph did not transform colonial government practices. Rather, the medium became entrenched in a multi-layered system of communication, forming one part of a web of colonial correspondence tactics. While its role was purposeful, its importance and capacities were nevertheless circumscribed and limited.
    [Show full text]
  • Semaphore Worksheet
    SEMAPHORE WORKSHEET Semaphore History: Flag semaphore is a system for conveying information at a distance by means of visual signals with handheld flags, rods, disks, paddles, or occasionally bare or Dùng Morse trong sinh hoạt Phong Trào gloved hands invented by a Frenchman, Claude Chappe in 1793. - Trong sinh hoạt mật mã Semaphore được dùng liên Information is encoded by the position of the flags; it is read when the flag is in a lạc khi ở xa tầm tiếng nói; đặc biệt trong các Hành fixed position. Different letters are represented by holding flags or lights Trình Đức Tin trại. outstretched in different positions around a circle. Prior to 1793, Chappe had - Ðặc điểm của Semaphore là để luyện tinh thần đồng experimented with a number of telegraph designs along with his brother, but đội; cùng học, cùng chơi, cùng truyền tin. these proved less than successful. The semaphore telegraph that Chappe designed consisted of a large pivoted horizontal beam, with two smaller bars attached at the ends, looking rather like a person with outstretched hands holding signal flags. The position of the horizontal beam could be altered, as well as the angle of the indicator bars at the ends. Chappe had developed the semaphore system to be used in the French revolution, to transmit messages between Paris and Lille, which was near the war front. In August 1794, Chappe's semaphore system delivered a message to Paris of the capture of Conde-sur-l'Escaut from the Austrians, in less than an hour. This success led to more semaphore telegraph lines being built, radiating in a star pattern from Paris.
    [Show full text]
  • James Grimmelmann Associate Professor of Law New York Law School
    INTERNET LAW: CASES AND PROBLEMS James Grimmelmann Associate Professor of Law New York Law School Ver. 1.0 © James Grimmelmann ! www. semaphorepress.com For my parents. Internet Law: Cases and Problems James Grimmelmann Copyright and Your Rights: The author retains the copyright in this book. By downloading a copy of this book from the Semaphore Press website, you have made an authorized copy of the book from the website for your personal use. If you lose it, or your computer crashes or is stolen, don't worry. Come back to the Semaphore Press website and download a replacement copy, and don't worry about having to pay again. Just to be clear, Semaphore Press and the author of this casebook are not granting you permission to reproduce the material and books available on our website except to the extent needed for your personal use. We are not granting you permission to distribute copies either. We ask that you not resell or give away your copy. Please direct people who are inter- ested in obtaining a copy to the Semaphore Press website, www.semaphorepress.com, where they can download their own copies. The resale market in the traditional casebook publishing world is part of what drives casebook prices up to $150 or more. When a pub- lisher prices a book at $150, it is factoring in the competition and lost opportunities that the resold books embodyfor it. Things are different at Semaphore Press: Because anyone can get his or her own copy of a Semaphore Press book at a reasonable price, we ask that you help us keep legal casebook materials available at reasonable prices by directing anyone interested in this book to our website.
    [Show full text]