April 2002 ;Login: 3 the Tclsh Spot
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Patrolling Fall 2008 75 Th Ranger Regiment Association, Inc
PATROLLING FALL 2008 75 TH RANGER REGIMENT ASSOCIATION, INC. VOLUME 23 ISSUE II Vietnamese Rangers (37 th Biet Dong Quan), and their US advisors inspect a captured NVA recoilless rifle during the battle at Khe Sanh, Tet, 1968. Trench lines were necessary due to sniper fire and constant incoming enemy rounds. Senior Advisor CPT Walter Gunn is in the forefront, Officers’ Messages ................................1-10 kneeling; SFC Willard Langdon, 4 th from right, with BDQ General ..................................11-24 & 72-80 patch. Unit Reports ........................................25-71 CHINA - BURMA - INDIA VIETNAM IRAN GRENADA PANAMA IRAQ SOMALIA AFGHANISTAN PATROLLING – FALL 2008 PATROLLING – FALL 2008 WHO WE ARE: The 75th Ranger Regiment Association, Inc., is a We have funded trips for families to visit their wounded sons and registered 501 (c) corporation, registered in the State of Georgia. We were husbands while they were in the hospital. We have purchased a learning founded in 1986 by a group of veterans of F/58, (LRP) and L/75 (Ranger). program soft ware for the son of one young Ranger who had a brain The first meeting was held on June 7, 1986, at Ft. Campbell, KY. tumor removed. The Army took care of the surgery, but no means existed OUR MISSION: to purchase the learning program. We fund the purchase of several awards 1. To identify and offer membership to all eligible 75th Infantry Rangers, for graduates of RIP and Ranger School. We have contributed to each of and members of the Long Range Reconnaissance Patrol the three Battalion’s Memorial Funds and Ranger Balls, Companies, Long Range Patrol Companies, Ranger and to the Airborne Memorial at Ft. -
Using New Technologies for Library Instruction in Science and Engineering: Web 2.0 Applications
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Faculty Publications, UNL Libraries Libraries at University of Nebraska-Lincoln October 2006 Using New Technologies for Library Instruction in Science and Engineering: Web 2.0 Applications Virginia A. Baldwin University of Nebraska-Lincoln, [email protected] Follow this and additional works at: https://digitalcommons.unl.edu/libraryscience Part of the Library and Information Science Commons Baldwin, Virginia A., "Using New Technologies for Library Instruction in Science and Engineering: Web 2.0 Applications" (2006). Faculty Publications, UNL Libraries. 56. https://digitalcommons.unl.edu/libraryscience/56 This Article is brought to you for free and open access by the Libraries at University of Nebraska-Lincoln at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in Faculty Publications, UNL Libraries by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. Using New Technologies for Library Instruction in Science and Engineering: Web 2.0 Applications “Quantum computation is... a distinctively new way of harnessing nature... It will be the first technology that allows useful tasks to be performed in collaboration between parallel universes.” … David Deutsch, The Fabric of Reality: the Science of Parallel Universes-- and its Implications http://en.wikiquote.org/wiki/David_Deutsch INTRODUCTION The transformational concept of Web 2.0 for libraries was a hot topic at three major conferences in June of 2006. The American Library Association (ALA), Special Libraries Association (SLA), and the American Society for Engineering Education (ASEE) conferences all had sessions on the subject. Not all of the focus was on sci-tech libraries. An exploration of the use of these technologies for library instruction in science and engineering fields is the emphasis for this column. -
Resurrect Your Old PC
Resurrect your old PCs Resurrect your old PC Nostalgic for your old beige boxes? Don’t let them gather dust! Proprietary OSes force users to upgrade hardware much sooner than necessary: Neil Bothwick highlights some great ways to make your pensioned-off PCs earn their keep. ardware performance is constantly improving, and it is only natural to want the best, so we upgrade our H system from time to time and leave the old ones behind, considering them obsolete. But you don’t usually need the latest and greatest, it was only a few years ago that people were running perfectly usable systems on 500MHz CPUs and drooling over the prospect that a 1GHz CPU might actually be available quite soon. I can imagine someone writing a similar article, ten years from now, about what to do with that slow, old 4GHz eight-core system that is now gathering dust. That’s what we aim to do here, show you how you can put that old hardware to good use instead of consigning it to the scrapheap. So what are we talking about when we say older computers? The sort of spec that was popular around the turn of the century. OK, while that may be true, it does make it seem like we are talking about really old hardware. A typical entry-level machine from six or seven years ago would have had something like an 800MHz processor, Pentium 3 or similar, 128MB of RAM and a 20- 30GB hard disk. The test rig used for testing most of the software we will discuss is actually slightly lower spec, it has a 700MHz Celeron processor, because that’s what I found in the pile of computer gear I never throw away in my loft, right next to my faithful old – but non-functioning – Amiga 4000. -
Mobile Phones and Cloud Computing
Mobile phones and cloud computing A quantitative research paper on mobile phone application offloading by cloud computing utilization Oskar Hamrén Department of informatics Human Computer Interaction Master’s programme Master thesis 2-year level, 30 credits SPM 2012.07 Abstract The development of the mobile phone has been rapid. From being a device mainly used for phone calls and writing text messages the mobile phone of today, or commonly referred to as the smartphone, has become a multi-purpose device. Because of its size and thermal constraints there are certain limitations in areas of battery life and computational capabilities. Some say that cloud computing is just another buzzword, a way to sell already existing technology. Others claim that it has the potential to transform the whole IT-industry. This thesis is covering the intersection of these two fields by investigating if it is possible to increase the speed of mobile phones by offloading computational heavy mobile phone application functions by using cloud computing. A mobile phone application was developed that conducts three computational heavy tests. The tests were run twice, by not using cloud computing offloading and by using it. The time taken to carry out the tests were saved and later compared to see if it is faster to use cloud computing in comparison to not use it. The results showed that it is not beneficial to use cloud computing to carry out these types of tasks; it is faster to use the mobile phone. 1 Table of Contents Abstract ..................................................................................................................................... 1 Table of Contents ..................................................................................................................... 2 1. Introduction .......................................................................................................................... 5 1.1 Previous research ........................................................................................................................ -
Projekt 2004 Videoüberwachung Unter Linux
Projekt 2004 Videoüberwachung unter Linux Dieses Projekt wurde von Gerrit Doden und Thorsten Lohß der Klasse TSE2 durchgeführt 9090 Projekt 2004 Videoüberwachung Gerrit Doden und Thorsten Lohß Eigenständigkeitserklärung Projektthema: Videoüberwachung unter Linux Projektzeitraum: 9. Februar 2004 bis 10. Mai 2004 Projektort: Berufsbildenden Schulen Friedenstraße Friedenstraße 60 26386 Wilhelmshaven Projektbetreuer: Herr Appenzeller Abgabetermin: 10. Mai 2004 2 9090 Projekt 2004 Videoüberwachung Gerrit Doden und Thorsten Lohß Hiermit erklären wir, Gerrit Doden und Thorsten Lohß, dass wir die Projektarbeit „Videoüberwachung unter Linux“ selbstständig erarbeitet haben. Wilhelmshaven, den 9. Mai 2004 Gerrit Doden Thorsten Lohß Projektgliederung 1. Allgemeines Seitenzahl 1.1 Einleitung 5 1.2 Projektfindung 5 1.3 Projektbeschreibung 6 1.4 Funktion der Videoüberwachung 6 1.5 Einsatzmöglichkeiten der Videoüberwachung 7 2. Hardware der Videoüberwachung 2.1 Bestandsaufnahme 8 2.2 Mindestvoraussetzung der Hardware 8 2.3 Materialbeschaffung 8 2.4 Prüfen der Hardware 8 2.5 Probleme mit der vorhandenen Hardware 8 3. Software 3 9090 Projekt 2004 Videoüberwachung Gerrit Doden und Thorsten Lohß 3.1 Prüfen der Standartsoftware 9 3.2 Softwarebeschaffung 9 3.3 Bttv – Treiber 10 3.3.1 Download 10 3.3.2 Installation 10 3.3.3 Konfiguration 10 3.3.3.1 lspci 11 3.3.3.2 /dev 11 3.3.3.3 lsmod 12 3.3.3.4 dmesg 12 3.3.3.5 modprobe 13 3.3.3.6 modules.conf 13 - 14 3.3.4 Probleme 15 3.4 Camstream 3.4.1 Download 16 3.4.2 Installation 16 3.4.3 Konfiguration 17 - 21 3.4.4 Probleme 22 Seitenzahl 3.5 Quanta plus 23 3.5.1 Download 24 3.5.2 Installation 24 3.5.3 Konfiguration 24 3.5.4 Probleme 24 3.6 Webmin 3.6.1 Download 25 3.6.2 Installation 25 3.6.3 Konfiguration 26 - 27 3.6.4 Probleme 27 3.7 Apache – Webserver 28 3.7.1 Download 28 3.7.2 Konfiguration 28 - 32 4 9090 Projekt 2004 Videoüberwachung Gerrit Doden und Thorsten Lohß 4. -