From Apple to Archy: the Visionary Journey of Jef Raskin
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Canon Cat After of Release Before Macintosh
LORI EMERSON & FINN BRUNTON THE CANON CAT PROCESSING ADVANCED WORK In the fall of 2014, Finn Brunton, an assistant professor at NYU, contacted Lori Emerson, Director of the Media Archaeology Lab (MAL) at the University of Colorado, Boulder, about a rare fi nd he came across on ebay: a Canon Cat, which billed itself in 1986 as an “advanced work processor.” The MAL wasn’t immediately able to purchase the machine; however, Brunton purchased the Canon Cat with the agreement that he’d experiment with the Canon Cat for six months or so, sell it to the MAL, and then he and Emerson would co-write a piece – now, this piece – on the obscure machine from an ever-more distant past. Here, we hope to give you a glimpse into what computing could have been and still could be. 353 [SHIFT]+[DOCUMENT] [SHIFT]+[DOCUMENT] Who will the user be? The shape that early personal Jef Raskin began to work on designing the Canon Cat after computing takes rests in part on this question, with he left Apple in 1982, two years before release of Macintosh. its implicit temporal paradox. The scenario, or persona, The Cat was then introduced to the public by Canon in 1987 or model, or instance of the user threads through the for $1495 – roughly $3100 in 2015. Although the Cat was production of the machine, from input devices and discontinued after only six months, around 20,000 units performance criteria to software, industrial design, and were sold during this time. The Canon Cat fascinates me marketing. -
WEKA Manual for Version 3-7-8
WEKA Manual for Version 3-7-8 Remco R. Bouckaert Eibe Frank Mark Hall Richard Kirkby Peter Reutemann Alex Seewald David Scuse January 21, 2013 ⃝c 2002-2013 University of Waikato, Hamilton, New Zealand Alex Seewald (original Commnd-line primer) David Scuse (original Experimenter tutorial) This manual is licensed under the GNU General Public License version 3. More information about this license can be found at http://www.gnu.org/licenses/gpl-3.0-standalone.html Contents ITheCommand-line 11 1Acommand-lineprimer 13 1.1 Introduction . 13 1.2 Basic concepts . 14 1.2.1 Dataset . 14 1.2.2 Classifier . 16 1.2.3 weka.filters . 17 1.2.4 weka.classifiers . 19 1.3 Examples . 23 1.4 Additional packages and the package manager . .24 1.4.1 Package management . 25 1.4.2 Running installed learning algorithms . 26 II The Graphical User Interface 29 2LaunchingWEKA 31 3PackageManager 35 3.1 Mainwindow ............................. 35 3.2 Installing and removing packages . 36 3.2.1 Unofficalpackages ...................... 37 3.3 Usingahttpproxy.......................... 37 3.4 Using an alternative central package meta data repository . 37 3.5 Package manager property file . 38 4SimpleCLI 39 4.1 Commands . 39 4.2 Invocation . 40 4.3 Command redirection . 40 4.4 Command completion . 41 5Explorer 43 5.1 The user interface . 43 5.1.1 Section Tabs . 43 5.1.2 Status Box . 43 5.1.3 Log Button . 44 5.1.4 WEKA Status Icon . 44 3 4 CONTENTS 5.1.5 Graphical output . 44 5.2 Preprocessing . 45 5.2.1 Loading Data . -
Tinkertool System 7 Reference Manual Ii
Documentation 0642-1075/2 TinkerTool System 7 Reference Manual ii Version 7.5, August 24, 2021. US-English edition. MBS Documentation 0642-1075/2 © Copyright 2003 – 2021 by Marcel Bresink Software-Systeme Marcel Bresink Software-Systeme Ringstr. 21 56630 Kretz Germany All rights reserved. No part of this publication may be redistributed, translated in other languages, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the prior written permission of the publisher. This publication may contain examples of data used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. The publisher may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Make sure that you are using the correct edition of the publication for the level of the product. The version number can be found at the top of this page. Apple, macOS, iCloud, and FireWire are registered trademarks of Apple Inc. Intel is a registered trademark of Intel Corporation. UNIX is a registered trademark of The Open Group. Broadcom is a registered trademark of Broadcom, Inc. Amazon Web Services is a registered trademark of Amazon.com, Inc. -
The Identification and Division of Steve Jobs
AN ABSTRACT OF THE THESIS OF Scott M. Anderson for the degree of Master of Arts in Interdisciplinary Studies in Speech Communication, Speech Communication, and English presented on May 17, 2012. Title: The Identification and Division of Steve Jobs Abstract approved: Mark P. Moore On April 1, 1976, Steve Jobs and Steve Wozniak entered into a partnership agreement to found Apple Computer. In the decade that followed, Apple experienced remarkable growth and success, as Jobs catapulted Apple to the Fortune 500 list of top‐flight companies faster than any other company in history. Under direction of Jobs, Apple, an idea that started in a garage, transformed into a major force in the computer industry of the 1980s. Though Jobs’ leadership undoubtedly influenced Apple’s success during this time, in 1995, he was forced to resign, when conflicts mounted at the executive level. Using Kenneth Burke’s theory of identification and the dramatistic process, this thesis examines Jobs’ discourse through a series of interviews and textual artifacts. First, I provide a framework for Jobs’ acceptance and rejection of the social order at Apple, and then consider the ways in which Jobs identified with employee and consumer audiences on the basis of division. Analysis shows that Jobs identified with individual empowerment, but valued separation and exclusivity. Jobs’ preference to create identification through division, therefore, established the foundation for new identifications to emerge. The findings of this study suggest that division has significant implications for creating unity. ©Copyright by Scott M. Anderson May 17, 2012 All Rights Reserved The Identification and Division of Steve Jobs by Scott M. -
The History of Apple Inc
The History of Apple Inc. Veronica Holme-Harvey 2-4 History 12 Dale Martelli November 21st, 2018 Apple Inc is a multinational corporation that creates many different types of electronics, with a large chain of retail stores, “Apple Stores”. Their main product lines are the iPhone, iPad, and Macintosh computer. The company was founded by Steve Jobs and Steve Wozniak and was created in 1977 in Cupertino, California. Apple Inc. is one of the world’s largest and most successful companies, recently being the first US company to hit a $1 trillion value. They shaped the way computers operate and look today, and, without them, numerous computer products that we know and love today would not exist. Although Apple is an extremely successful company today, they definitely did not start off this way. They have a long and complicated history, leading up to where they are now. Steve Jobs was one of the co-founders of Apple Inc. and one of first developers of the personal computer era. He was the CEO of Apple, and is what most people think of when they think ”the Apple founder”. Besides this, however, Steve Jobs was also later the chairman and majority shareholder of Pixar, and a member of The Walt Disney Company's board of directors after Pixar was bought out, and the founder, chairman, and CEO of NeXT. Jobs was born on February 24th, 1955 in San Francisco, California. He was raised by adoptive parents in Cupertino, California, located in what is now known as the Silicon Valley, and where the Apple headquarters is still located today. -
Apple@30 1976-Apple in the Garage at the VCF 9.0
Apple@30 1976-Apple in the Garage At the VCF 9.0 Brought to you by… the DigiBarn Computer Museum the Vintage Computer Festival the Computer History Museum and a special group of Apple ’76ers Want to cook up an industry? Its easy! Just follow this convenient recipe… Apple@30 – the Ingredients Extraordinary People – some are here today… Deeply felt nerdly passions – homebrew computing …and there were many more Inspiring Places - Homestead High, HP, Atari, and of course, garages Apple@30 – the Recipe(s) Tasty recipes - TV Typewriter, 1973 Altair 8800, 1974 Homebrew club member reports, 1975 Apple@30 – the Kitchen(s) Steve Jobs parent’s garage, Crist Drive, Los Altos CA Inside the Jobs’ garage, 1976 Steve Wozniak’s workbench 1976 Apple@30 – the Chefs Master chefs Steve Jobs, Steve Wozniak – then and now Apple@30 – cooking it up Apple 1 schematic, drawings - Spring 1976 Apple@30 – hot out of the oven! Apple 1 Apple@30 – out of the oven! Apple 1 in cool wooden case (Smithsonian) Apple@30 – out of the oven! Apple 1 screen, hex dump, test output Apple@30 – serving the Apple Apple’s first logo and first trade show Apple@30 – serving the Apple First ad for the Apple 1 Apple@30 – today’s feast Today’s Itinerary 1:00 Introduction of the event by host Sellam Ismail 1:05 Bruce Damer's slide show about Apple in 1976 and our panelists 1:20 Panelists weigh in on a freeform discussion of Apple… thirty years ago And in whatever order makes sense at the time: -Vince Briel shows the Apple 1 replica in operation -Linda Blum shows Jef Raskin’s original Apple -
User Interface Specification for Interactive Software Systems
User Interface Specification for Interactive Software Systems Process-, Method- and Tool-Support for Interdisciplinary and Collaborative Requirements Modelling and Prototyping-Driven User Interface Specification Dissertation zur Erlangung des akademischen Grades des Doktor der Naturwissenschaften (Dr. rer. nat.) Universität Konstanz Mathematisch-Naturwissenschaftliche Sektion Fachbereich Informatik und Informationswissenschaft Vorgelegt von Thomas Memmel Betreuer der Dissertation: Prof. Dr. Harald Reiterer Tag der mündlichen Prüfung: 29. April 2009 1. Referent: Prof. Dr. Harald Reiterer 2. Referent: Prof. Dr. Rainer Kuhlen Prof. Dr. Rainer Kuhlen For Cathrin Acknowledgements I thank my advisor, Prof. Dr. Harald Reiterer, for more than 6 years of great Prof. Dr. Harald Reiterer teamwork. Since I joined his work group as a student researcher, his guidance and friendship have helped me to reach high goals and achieve scientific recognition. I thank Harald for his creative contributions and his unfailing support, which made him the best supervisor I could imagine. Every time I read the Dr. in front of my name, I will think about the person who made it possible. It was Harald! Moreover, I thank him for teaching me many skills, of which especially purposefulness and per- suasive power opened up a world of possibilities. Among the other researchers in the human-computer interaction work group, spe- My colleague and friend Fredrik cial thanks are due to my colleague Fredrik Gundelsweiler. Fredrik and I started working for Harald at the same time, and since then we have shared many experi- ences. I worked with Fredrik at Siemens AG in Munich, and we both gained interna- tional work experience during our stay at DaimlerChrysler AG in Singapore. -
Periodical Guide for Computerists 1977
PERIODICAL GUIDE FOR COMPUTERISTS An Index of Magazine Articles for Computer Hobbyists January - December 1977 PERIODICAL GUIDE FOR COMPUTERISTS 1977 TABLE OF CONTENTS AMATEUR RADIO---------------------- 3 MICROCOMPUTERS ANALOG HARDWARE AND CIRCUITS------- 3 GENERAL------------------------- 36 APPLICATIONS, GENERAL-------------- 4 FUNDAMENTALS AND DESIGN--------- 37 ART--------------------------------5 SELECTION GUIDE----------------- 38 ASTRONOMY--------------------------6 AL TAI R 8800 & 680--------------- 38 BAR CODES--------------------------6 APPLE---------------------------39 BIORYTHMS--------------------------6 DI GIT AL GROUP------------------- 39 BIO FEEDBACK------------------------ 6 ELF & VIP ( COSMAC)-------------- 39 BOOKS AND PUBLICATIONS-------------6 HEATHKIT------------------------ 39 BUSINESS AND ACCOUNTING------------ 7 IMSAI--------------------------- 39 CALCULATORS------------------------ 8 INTERCEPT IM6100---------------- 39 CLUBS AND ORGANIZATIONS------------ 9 KIM----------------------------- 39 CLOCKS-----------------------------·9 PET----------------------------- 40 COMMUNICATION---------------------- 10 RADIO SHACK--------------------- 40 CONSTRUCTION----------------------- 10 SOL----------------------------- 40 CONTROL---------------------------- 11 SPHERE-------------------------- 40 CON VE RS ION, CODE------------------- 11 SWTPC--------------------------- 40 CONVERSION, NUMBER BASE------------ 11 WAVE MATE----------------------- 40 DEBUG------------------------------ 12 OTHER MICROCOMPUTERS------------ 41 -
Related Links History of the Radio Shack Computers
Home Page Links Search About Buy/Sell! Timeline: Show Images Radio Shack TRS-80 Model II 1970 Datapoint 2200 Catalog: 26-4002 1971 Kenbak-1 Announced: May 1979 1972 HP-9830A Released: October 1979 Micral Price: $3450 (32K RAM) 1973 Scelbi-8H $3899 (64K RAM) 1974 Mark-8 CPU: Zilog Z-80A, 4 MHz MITS Altair 8800 RAM: 32K, 64K SwTPC 6800 Ports: Two serial ports 1975 Sphere One parallel port IMSAI 8080 IBM 5100 Display: Built-in 12" monochrome monitor MOS KIM-1 40 X 24 or 80 X 24 text. Sol-20 Storage: One 500K 8-inch built-in floppy drive. Hewlett-Packard 9825 External Expansion w/ 3 floppy bays. PolyMorphic OS: TRS-DOS, BASIC. 1976 Cromemco Z-1 Apple I The Digital Group Rockwell AIM 65 Compucolor 8001 ELF, SuperELF Wameco QM-1A Vector Graphic Vector-1 RCA COSMAC VIP Apple II 1977 Commodore PET Radio Shack TRS-80 Atari VCS (2600) NorthStar Horizon Heathkit H8 Intel MCS-85 Heathkit H11 Bally Home Library Computer Netronics ELF II IBM 5110 VideoBrain Family Computer The TRS-80 Model II microcomputer system, designed and manufactured by Radio Shack in Fort Worth, TX, was not intended to replace or obsolete Compucolor II the Model I, it was designed to take up where the Model I left off - a machine with increased capacity and speed in every respect, targeted directly at the Exidy Sorcerer small-business application market. Ohio Scientific 1978 Superboard II Synertek SYM-1 The Model II contains a single-sided full-height Shugart 8-inch floppy drive, which holds 500K bytes of data, compared to only 87K bytes on the 5-1/4 Interact Model One inch drives of the Model I. -
Vtpin: Practical Vtable Hijacking Protection for Binaries
VTPin: Practical VTable Hijacking Protection for Binaries Pawel Sarbinowski Vasileios P. Kemerlis Cristiano Giuffrida Vrije Universiteit Amsterdam Brown University Vrije Universiteit Amsterdam [email protected] [email protected] [email protected] Elias Athanasopoulos Vrije Universiteit Amsterdam [email protected] ABSTRACT 1. INTRODUCTION VTable hijacking has lately been promoted to the de facto technique The recent advances in software hardening have undoubtedly for exploiting C++ applications, and in particular web browsers. made exploitation a challenging craft [45]. Yet, despite the plethora VTables, however, can be manipulated without necessarily corrupt- of defenses in place [37], attackers still find ways to compromise ing memory, simply by leveraging use-after-free bugs. In fact, in essential commodity software, like web browsers [5,6]. Modern the recent Pwn2Own competitions all major web browsers were exploits are highly sophisticated and typically leverage a variety of compromised with exploits that employed (among others) use-after- different vulnerabilities to bypass established protections, such as free vulnerabilities and VTable hijacking. address space layout randomization (ASLR) [42], non-executable In this paper, we propose VTPin: a system to protect against memory [12], and sandboxing [18]. To this end, temporal safety VTable hijacking, via use-after-free vulnerabilities, in large C++ errors, and particularly use-after-free vulnerabilities, are becoming binaries that cannot be re-compiled or re-written. The main idea be- a key component of the attackers’ arsenal [1,2,7,8]. Interestingly, hind VTPin is to pin all the freed VTable pointers on a safe VTable exploiting use-after-free bugs does not require corrupting memory; under VTPin’s control. -
United States Patent (19) 11 Patent Number: 6,061,061 Conrad Et Al
US006061061A United States Patent (19) 11 Patent Number: 6,061,061 Conrad et al. (45) Date of Patent: *May 9, 2000 54) COMPUTER SYSTEM WITH GRAPHICAL 2693810 6/1991 France. USER INTERFACE INCLUDING SPRING LOADED ENCLOSURES OTHER PUBLICATIONS 75 Inventors: Thomas J. Conrad, San Jose; Yin Yin tiMy“M ft WindowSTM 7 User’sSer's Guide.Oude, MiMicroSOIL ft UorporaC Wong, Menlo Park, both of Calif. “Screen Dumps from Microsoft WindowsTM v3.1.” 73 ASSignee: Apple Computer, Inc., Cupertino, Microsoft Corporation, 1985-1992, pp. 1-10. Calif. Jeff Johnson, et al., “The Xerox Star: A Retrospective,” Computer, Sep. 1989, pp. 11-27. * Notice: This patent is subject to a terminal dis- Brad W. Myers, “Window Interfaces, A Taxonomy of Win claimer. dow Manager User Interfaces.” IEEE Computer Graphics and Applications, Sep. 1988, pp. 65-83. 21 Appl. No.: 08/889,719 “Automatic Window Management Mode.” IBM Technical 9 Disclosure Bulletin, vol. 35, No. 4B, Sep. 1992. 22 Filed: Jul. 8, 1997 (List continued on next page.) Related U.S. Application Data Primary Examiner-Crescelle N. dela Torre 63 Continuation of application No. 08/482,186, Jun. 7, 1995, Attorney, Agent, or Firm Blakely, Sokoloff Taylor & Pat. No. 5,680,562, which is a continuation of application Zafman No. 08/076.253, Jun. 11, 1993, Pat. No. 5,583,984. (51) Int. Cl. ................................................ G06F 15/00 57 ABSTRACT 52 U.S. Cl. ............................................. 345/340; 345/348 A new behavior in a graphical user interface allows the user 58 Field of Search ..................................... 345/340, 326, to open and close enclosures, while dragging an object. -
Allied Computer Store and the First Apple II Computer
Allied Computer Store and the first Apple II computer. By Michael Holley http://www.swtpc.com/mholley/Apple/allied_computer.htm Written Nov 2005, revised Feb 2016 When I was going to the College of San Mateo (1975-1977) I worked at a local computer store, Allied Computers. My job was to assemble computers kits. This included IMSAI, Processor Tech, SWTPC and any other kit that a customer wanted assembled. I would take my pay in computer parts. The first pay check was a SWTPC CT-1024 terminal followed by a SWTPC 6800 computer. By November of 1976 I had a complete system running BASIC. Chet Harris, the store owner, was trying to set up a chain like the Byte Shops and Computer Land. I got to meet some interesting people then, like a field trip to Bill Godbout's where we met Bill and George Morrow. Chet and I went to the Computer Shack store in San Leandro to talk with the management in early 1977. Radio Shack claimed trademark infringement on name Computer Shack so it was changed to Computer Land. One of our customers at Allied Computer was Bill Kelly. He was working for Regis McKenna Advertising on the Apple II introduction. He has a web page that talks about the early days at Apple Computer. (www.kelleyad.com/Histry.htm) He had worked on the Intel account and had an Intel SDK-80 evaluation board that he gave me in exchange for a power supply for his prototype Apple II board. (I still have that SDK-80 board with tiny BASIC.) We sold Apple II main boards before the plastic case was ready.