(12) United States Patent (10) Patent No.: US 9,208,788 B2 Lerner (45) Date of Patent: Dec

Total Page:16

File Type:pdf, Size:1020Kb

(12) United States Patent (10) Patent No.: US 9,208,788 B2 Lerner (45) Date of Patent: Dec US009208788B2 (12) United States Patent (10) Patent No.: US 9,208,788 B2 Lerner (45) Date of Patent: Dec. 8, 2015 (54) METHOD AND APPARATUS FOR 2006. A R. 358, EchegyenOaCS . .3.56 RESENDING TO A QUERY AT A DIALOG 2003/0046083 A1* 3/2003 Devinney et al. TO4,273 2003/0055638 A1* 3, 2003 Burns et al. .... ... 704/231 2003/O120517 A1* 6/2003 Eida et al. ......................... 705/3 (75) Inventor: Solomon Z. Lerner, Sharon, MA (US) 2005, 01321.96 A1* 6, 2005 Dietl .............. T13, 176 2005/01932.06 A1* 9, 2005 Kunisa et al. ...... T13, 176 (73) Assignee: Nuance Communications, Inc., 38885 A. 3. SEsalev etet al. al ....... .70% Burlington, MA (US) 2008/0273744 A1* 1 1/2008 Kogure et al. ... ... 38.2/100 (*) Notice: Subject to any disclaimer, the term of this 2008/0276265 A1* 11/2008 TopchvOpcny et aal. .................. 725/22 patent is extended or adjusted under 35 (Continued) U.S.C. 154(b) by 290 days. OTHER PUBLICATIONS (21) Appl. No.: 13/560,217 U.S. Appl. No. 13/477,594, filed May 22, 2012 by William F. Ganong, III, et al. (22) Filed: Jul. 27, 2012 “Easter egg (media).”from Wikipedia, http://en.wikipedia.org/wiki/ Easter egg (media), 6 pages, retrieved on May 17, 2012. (65) Prior Publication Data “Fictitious entry.” from Wikipedia, http://en.wikipedia.org/wiki/Fic titious entries, 6 pages, retrieved on May 17, 2012. US 2014/OO32220 A1 Jan. 30, 2014 (Continued) (51) Int. Cl. GIOL 2L/00 (2013.01) Primary Examiner — Shaun Roberts GOL 25/00 (2013.01) (74) Attorney, Agent, or Firm — Hamilton, Brook, Smith & GIOL 7/24 (2013.01) Reynolds, P.C. GIOL 1.5/22 (2006.01) (52) U.S. Cl. (57) ABSTRACT CPC G10L 17/24 (2013.01); G 10L 15/22 (2013.01) A dialog system is accessed by a remote user and is typically (58) Field of Classification Search configured to receive a natural language query from the user CPC ............................ G10L 17/005; G06F 10/121 and return a natural language answer to the user. Dialog USPC ................. 704/231, 273, 275; 705/51, 54, 57 systems can be copied without authorization or can become See application file for complete search history. an out-of-date version. A dialog system with a signature, referred to herein as a “signed dialog system, can indicate (56) References Cited the signature without affecting usage by users who are unaware that the dialog system contains the signature. The U.S. PATENT DOCUMENTS signed dialog system can respond to input such that only the 5,933,498 A * 8/1999 Schnecket al. ................. 705/54 designer of the dialog system knows the signature is embed 6,233,347 B1 * 5/2001 Chen et al. ....... ... 38.2/100 ded in the dialog system. The response is a way to check the 6,442,283 B1* 8/2002 Tewfik et al. ... ... 38.2/100 Source or other characteristics of the dialog system. A 6,640,145 B2 * 10/2003 Hoffberg et al. ... 700.83 designer of signed dialog systems can prove whetheran unau 6,892, 175 B1* 5/2005 Cheng et al. ......... 704/205 7,403,616 B2 * 7/2008 Kageyama et al. ........... 380,201 thorized copy of the signed dialog system is used by a third 7,499,566 B2 * 3/2009 Rhoads ................ ... 38.2/100 party by using publically-available user interfaces. 7,606,768 B2 * 10/2009 Graubart et al. ..... ... TOS/51 7,694,138 B2 * 4/2010 O’Gorman et al. ........... T13,168 20 Claims, 15 Drawing Sheets 162 FIRSTNETWORKDEVICE e.g., ANINTERACTIVE WOCERESPONSE (VR) SERVER) SET OFSIGNED MODES SECONDAETWORK DEMCE SETOFUNSIGNED MODELS 164 f THIRD NETWORK DEWICE SEIFSISNED MODELS (DIFFERENT WERSIONS) w 82 165 FOURTHNETWORK DECE SET OFSIGNED MODELS (UNAUTHORIZED) 183 US 9,208,788 B2 Page 2 (56) References Cited OTHER PUBLICATIONS U.S. PATENT DOCUMENTS Rabiner, Lawrence R., "A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition.” Proceedings of the 2011/O144985 A1 6, 2011 Krishnakumar et al. ..... TO4/230 30,300 loss, Ai i2013 ROWAS. 704,556 IEEE, Vol. 77, No. 2, pp. 257-286 (Feb. 1989). 2012/O123786 A1* 5, 2012 Valin et al. .................... 704/273 2013/0317817 A1 1 1/2013 Ganong, III, et al. * cited by examiner U.S. Patent Dec. 8, 2015 Sheet 1 of 15 US 9.208,788 B2 162 100 y FIRST NETWORKDEVICE (e.g., AN INTERACTIVE VOICE RESPONSE (IVR) SERVER) NETWORK SET OF SIGNE D MODELS 180 SECOND NETWORK DEVICE SET OF UNSIGNED MODELS 181 THIRD NETWORK DEVICE SET OF SIGNED MODELS (DIFFERENT VERSIONS) FOURTH NETWORK DEVICE SET OF SIGNED MODELS CLIENT (UNAUTHORIZED) DEVICE 155 FIG. I.A. U.S. Patent Dec. 8, 2015 Sheet 2 of 15 US 9.208,788 B2 r-------------------------------------- U.S. Patent Dec. 8, 2015 Sheet 3 of 15 US 9.208,788 B2 202 SEND TESTING 200 INTERACTION 204 RECEIVE RESPONSE TO TESTING INTERACTION 206 IS TESTING 216 INTERACTION UNSIGNED CONFIGURED TO CAUSE RESPONSE DO NOT A SIGNATURE OR AN FLAG MODEL UNSIGNED RESPONSE SIGNATURE 208 DOES RECEIVED RESPONSE FSML INCLUDE EXPECTED SIGNATURE AUTHORIZED IS FLAG MODEL RESPONSE FROM AS BEING AED UNAUTHORIZED 210 FLAG MODELAS 218 BEING UNAUTHORIZED RETURN MODEL 214 STATUS TO USER FIG. 2 U.S. Patent Dec. 8, 2015 Sheet 5 Of 15 US 9.208,788 B2 400 402 RECEIVE INPUT 404 IS INPUT WATERMARKED ? DD INPUT ORIGINATE FROM SET RESPONSE A PARTICULAR TO REJECTED CLIENT2 406 408 410 ACCEPT INPUT ATRECOGNIZER RETURN RESPONSE TO 412 INTERACTION UNIT FIG. 4 U.S. Patent Dec. 8, 2015 Sheet 6 of 15 US 9.208,788 B2 INTERACTION TO CAUSE 502 500 \ FIRST SIGNATURE 2 504 PASS FIRST SIGNATURE 506 INTERACTION TO CAUSE 506 SECOND SIGNATURE / INTERACTION PS SECOND SIGNATURE 5*/ SERVER WITH DEVICE INTERACTION TO CAUSE RECOGNIZER 160 FIG. 5A 140 THIRD SIGNATURE AND MODEL e - UNDER Test PASS THIRD SIGNATURE 510 506 INTERACTION TO CAUSE FOURTHSIGNATURE 512 PASS FOURTHSIGNATURE 514 506 V 516 INTERACTION TO CAUSE 502 520 \ FIRST SIGNATURE / 504 PASS FIRST SIGNATURE 506 INTERACTION TO CAUSE 506 SECOND SIGNATURE / RESPONSE WITHOUT INDICATION 522 INTERACTION 5. OF SECOND SIGNATURE SERVER WITH DEVICE 6 INTERACTION TO CAUSE 510 RECOGNIZER 1609 FIG 5B 140 THIRD SIGNATURE / AND MODEL UNDER TEST RESPONSE WITHOUT INDICATION FAIL OF THIRD SIGNATURE 526 INTERACTIONICAUSEFOURTHSIGNATURE 51 U.S. Patent Dec. 8, 2015 Sheet 7 Of 15 US 9.208,788 B2 SERVER WITH RECOGNIZER INTERACTION DEVICE (140) (160) AND MODELUNDER TEST 600 620 602 622 604 DATA FROMA USER 624 60 5 INTERACTION ACCESS SIGNED DATA MODELS WITH 606 120 RECEIVED INTERACTION GENERATE OR LOAD ANY OF EXPECTED RESPONSE RESPONSES 626 135-137 RECEIVE SET OF RESPONSES FROM SET DOES OF SIGNED MODELS RESPONSE INCLUDESIGNATURE NO CORRESPONDING TO THE EXPECTED RESPONSE PROCESS SET OF 608 RESPONSES AND APPLY SELECT MOST LIKELY "SIGNATURES RESPONSE APPLY "SIGNATURE NOT PRESENT IS PRESENT. FLAG FLAG 628 610 614 REPORT FLAG WAIT FOR NEXT INPUT THEN REPEAT (622) 612 630 U.S. Patent US 9.208,788 B2 U.S. Patent Dec. 8, 2015 Sheet 9 Of 15 US 9.208,788 B2 800 802 ? 804 RECEIVE INSTRUCTIONS FROM USER 806 808 INSTRUCTIONS TO GENERATE GENERATESIGNED UNSIGNED MODEL MODEL2 INSTRUCTIONS GENERATESIGNED TO INCLUDE MULTIPLE MODEL WITH ONE SIGNATURES IN SIGNED MODEL SIGNATURE 810 GENERATESIGNED MODEL 814 WITH MULTIPLESIGNATURES U.S. Patent Dec. 8, 2015 Sheet 10 of 15 US 9.208,788 B2 UNSIGNED PHYSICS MODEL FIG. 9A 910 RESPONSE OF UNSIGNED MODEL 906 908 (OPTIONAL) TARGET TRIGGERING PATH SIGNED PHYSICS MODEL FIG. 9B 922 RESPONSE OF SIGNED MODEL 924 908 (OPTIONAL) TARGET TRIGGERING PATH U.S. Patent Dec. 8, 2015 Sheet 11 of 15 US 9.208,788 B2 UNSIGNED PHYSICS MODEL FIG. 9C 910 RESPONSE 942 INPUT VECTOR 944 FORCE OF GRAVITY 946 SIGNED PHYSICS MODEL FIG. 9D 922 POST-SINGULARITY RESPONSE 968 SINGULARITY RESPONSE 964 962 INPUT VECTOR 944 966 PRE-SINGULARITY RESPONSE ------------o OF GRAVITY 946 U.S. Patent US 9.208,788 B2 || || || TVNOlld0~);TROITWIST;|| || || U.S. Patent Dec. 8, 2015 Sheet 15 Of 15 US 9.208,788 B2 1300 1302 RECEIVE QUERY FROM CLIENT DEVICE 1304 DOES QUERY MATCHA STEREOGRAPHIC PATTERN? RETRIEVE ARESPONSE CORRESPONDING WITH THE RETRIEVE 1306 PATTERN, THE RESPONSE A NORMAL 1312 REPRESENTING ASIGNATURE RESPONSE IF TRIGGERED BY THE QUERY ENCRYPT THE RESPONSE 1308 (OPTIONALLY) 1310 TRANSMIT THE RESPONSE FIG. I.3 US 9,208,788 B2 1. 2 METHOD AND APPARATUS FOR acoustic models, language models, and Vocabulary list mod RESPONDING TO A QUERY AT A DIALOG els can be signed. As language changes or speech-to-text SYSTEM recognition improves, the acoustic models, language models, vocabulary list models, and all other models associated with BACKGROUND OF THE INVENTION speech-to-text recognition are updated. Because models can be distributed about a network, it is useful to control versions Remote servers that include recognizers and models have and authorized distribution of the models. Verifying version become increasingly popular since the advent of cloud com control and authorized distribution may be handled in the puting. These recognizers perform calculations using the form of embedding certain words in a signed model Such that models for connected client devices, which increases utility 10 later updates and Verifications can be performed through stan of client devices with little computing cost because client dard Voice interaction to a server with a recognizer employing devices can access computing power of remote servers the model. The embedding of words or other signatures can be through computationally simple communications via com thought as a form of Steganography. munications networks. Steganography can be used to detect misappropriation of 15 proprietary information, Such as intellectual property.
Recommended publications
  • Easter Eggs: Hidden Tracks and Messages in Musical Mediums
    Proceedings ICMC|SMC|2014 14-20 September 2014, Athens, Greece Easter Eggs: Hidden Tracks and Messages in Musical Mediums Jonathan Weinel, Darryl Griffiths and Stuart Cunningham Creative & Applied Research for the Digital Society (CARDS) Glyndŵr University Plas Coch Campus, Mold Road, Wrexham, LL11 2AW, Wales +44 1978 293070 {j.weinel | Griffiths.d | s.cunningham}@glyndwr.ac.uk ABSTRACT the programmers’ office, in the style of the video game Doom [2]. The hidden game features credits and digital ‘Easter eggs’ are hidden components that can be found in images of the programmers. It is accessed by carrying computer software and various other media including out a particular series of actions on the 95th row of a music. In this paper the concept is explained, and various blank spreadsheet upon opening Excel. examples are discussed from a variety of mediums in- cluding analogue and digital audio formats. Through this discussion, the purpose of including easter eggs in musi- cal mediums is considered. We propose that easter eggs can serve to provide comic amusement within a work, but can also serve to support the artistic message of the art- work. Concealing easter eggs in music is partly depend- ent on the properties of the chosen medium; vinyl records Figure 1. Screenshots from the ‘hall of tortured souls’, in Mi- may use techniques such as double grooves, while digital crosoft Excel 95. formats such as CD may feature hidden tracks that follow long periods of empty space. Approaches such as these This paper will consider the purpose and realisation of and others are discussed.
    [Show full text]
  • Android Versions in Order
    Android Versions In Order Disciplinal and filarial Kelley zigzagging some ducking so flowingly! Sublimed Salomone still revitalise: orthopaedic and violable Antonio tint quite irruptively but ringings her monetization munificently. How priced is Erasmus when conscriptional and wobegone Anurag fall-in some rockiness? We have changed the default configuration to access keychain data. For android version of the order to query results would be installed app drawer which version of classes in the globe. While you would find many others on websites such as XDA Developers Forum, starred messages, which will shift all elements. Display a realm to be blocked from the background of. Also see Supporting Different Platform Versions in the Android. One is usually described as an existing huawei phones, specifically for android versions, but their android initiating bonding and calendar. You can test this by manually triggering a test install referrer. Smsc or in order for native application. Admins or users can set up shared voicemail inboxes in the Zoom web portal. This lets you keep track number which collapse was successfully tracked. THIS COMPENSATION MAY IMPACT cut AND WHERE PRODUCTS APPEAR but THIS SITE INCLUDING, headphone virtualization, this niche of automation helps to maintain consistency. The survey will take about seven minutes. Request for maximum ATT MTU. Android because you have no control over where your library will be installed by the system. Straightforward imperative programming, Froyo, you will receive a notification. So a recipe for android devices start advertising scan, then check with optional scan would be accessed by location in android app. Shopify apps that character have installed in your Shopify admin stay connected in Shopify Ping, thus enhancing privacy awareness for deal of our customers.
    [Show full text]
  • 1195 the Joy of the Easter Egg.Indd
    The Joy of the Easter Egg and the Pain of Numb Hands: The Augmentation and Limitation of Reality Through Video Games Enrique Uribe-Jongbloed1 Tobias M. Scholz2 Hernán David Espinosa-Medina3 Recibido: 2015-02-17 Aprobado por pares: 2015-03-21 Enviado a pares: 2015-02-24 Aceptado: 2015-04-06 DOI: 10.5294/pacla.2015.18.4.9 Para citar este artículo / To reference this article / Para citar este artigo Uribe-Jongbloed, E., Scholz, TM. & Espinosa-Medina, H.D. (Diciembre de 2015) The joy of the Easter egg and the pain of numb hands: The augmentation and limitation of reality through video games. Palabra Clave, 18(4), 1167-1195. DOI: 10.5294/pacla.2015.18.4.9 Abstract Becoming immersed in a world where our perception of reality is highly mediated allows for the creation of an audiovisual lexicon that expands over many platforms and times. In this context we might observe the case of vi- deo games which, as a medium, does not limit themselves to the creation of puzzles to be solved, to pretend participation in the Rock and Roll world, or lead us to unexpected damages to our “flesh”. Games allow us different levels of enjoyment and also lead us to discover the physical limits of our bodies within the expansion of our senses. Furthermore, hidden in many of these games we discover many hints, influences, remnants, appropria- tions and quotes, expanding the web of signs and significations far beyond the limits of the games themselves. However, the extent and consequences of video games as entertainment and communicational devices surpasses 1 Universidad del Norte, Colombia.
    [Show full text]
  • Game Masters Sample Pages
    GAME MASTERS Edited by Emma McRae Masanobu Endō joined Namco in 1981 and his first game,Xevious (1982), became a Masanobu massive hit in Japan. Xevious featured vertically scrolling gameplay and detailed, coloured - graphics depicting a Peruvian landscape as seen from the low­flying spacecraft piloted End0 by the player. Aiming for a more realistic depiction of combat than the row formations Japan of Space Invaders, Endō programmed the enemies to attack from both ground and air. In addition, the game reacts to the skills of the player, moving seamlessly through 16 levels of difficulty. Endō also broke with tradition by including an ‘Easter egg’ – a signature message that reads ‘Namco: Original program by EVEZOO’. Endō also designed Tower of Druaga (1984), a complex 60­level maze game comprising the first episode of Babylonian Castle Saga. In 1985 Endō left Namco to establish his own company, Game Studio, where he continued to collaborate with Namco, producing the Family Circuit racing series. - Tōru Iwatani created Pac-Man (1980), one of the most popular and innovative games of T0 ru all time, after setting out to design a game that would appeal to a wide demographic. He settled on the concept of eating, bypassing the usual sporting or apocalyptic themes. Iwatani As Pac­Man navigates his way through a maze, munching on yellow dots and pieces of Japan fruit, he is pursued by four candy­coloured ghosts: the cuteness of the characters is matched by the ingenuity of the design, which provides addictive gameplay without the sense of imminent annihilation. Pac-Man is credited with being the first game to feature power­ups, cutscenes and even the concept of stealth play.
    [Show full text]
  • Contextualizing Player Two
    INTRODUCTION Contextualizing Player Two NOW WE’RE KNITTING WITH POWER? In the late 1980s the video game industry, and console gaming in particular, was primarily caught up with their mainstay audience— -young boys and men. While there were certainly girls and women who played video games at the time, this was not the primary target audience of the industry. The tacit assumption was that those who paid for and played console game systems were primarily male. Yet, around this time, Nintendo came up with the design and marketing, and considered the release, of what they called the Nintendo Knitting Machine: a peripheral device assisting knitting via the Nintendo Entertainment System. The “game” was never released to wide audiences.1 On August 29, 2012, Howard Phillips, a former Nintendo employee, posted a photo of the planned full--page advertisement for the peripheral to his Facebook Timeline photo album (Figure 1).2 The advertisement had been meant to promote the device to toy companies and wholesale distributors at that time. The single--page image, featuring a photo of the peripheral, leads with the headline “now you’re knitting with power” and explains: You’re looking at the Nintendo Knitting Machine. It’s not a game; not a toy; not something a young girl can outgrow in three or six months or even a year. It’s a machine that interacts with the powerful Nintendo Entertainment System to actually knit sweaters: and not just one or two patterns but a multitude of different and unique designs. The Nintendo Knitting Machine is just one more example of the innovative thinking that keeps Nintendo on the cutting edge of video technology.
    [Show full text]
  • Hiding in Plain Sight: Steganography and the Art of Covert Communication
    Hiding in Plain Sight: Steganography and the Art of Covert Communication Eric Cole Ronald D. Krutz, Consulting Editor Publisher: Bob Ipsen Editor: Carol Long Developmental Editor: Nancy Stevenson Editorial Manager: Kathryn Malm Managing Editor: Angela Smith Media Development Specialist: Greg Stafford Text Composition: John Wiley Composition Services This book is printed on acid-free paper. ∞ Copyright © 2003 by Eric Cole. All rights reserved. Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rose- wood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8700. Requests to the Pub- lisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4447, E-mail: [email protected]. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation.
    [Show full text]
  • Hacky Easter Summary 2017
    Hacky Easter 2017 2 Summary PS, www.hacking-lab.com Table of Contents Intro .............................................................................................................................. 6 Outro .................................................................................................................................................................... 6 Credits .................................................................................................................................................................. 6 Volunteers ........................................................................................................................................................... 6 Awards .......................................................................................................................... 7 Perfect Solvers ................................................................................................................................................... 7 Hacking-Lab Awards ......................................................................................................................................... 8 Statistics ...................................................................................................................... 9 General ................................................................................................................................................................ 9 Event Activity .....................................................................................................................................................
    [Show full text]
  • Android Architecture and Versions
    3rd International Conference on Computing: Communication, Networks and Security (IC3NS-2018) ISSN: 2454-4248 Volume: 4 Issue: 3 57 – 60 _______________________________________________________________________________________________ Android Architecture and Versions Dimpal Nehra College of Engineering and Technology, Mody University, Rajasthan Email: [email protected] Abstract: Android operating system is the most commonly used operating system for mobile devices. It is widely used in mobile phones, tablets. It is an open source and codes are written in java. In android system we can apply 2D and 3D graphics at the same time in an application. This paper is all about the introduction of android, discussion about its birth and later on its architecture and architecture layers that include Linux Kernel layer, Libraries and Android runtime, Application Framework layer, Application layer, Android virtual device, versions of android and discussion about their specific codename. __________________________________________________*****_________________________________________________ I. Introduction virtual machine, java libraries, application framework The users of devices like mobile phones, tablets etc. are and applications that are build-in and also custom increasing rapidly, so this android operating system applications become very common and a very important part of life. This is an open source and the codes are written in java, II. Architecture one can also change its android features by just turn on Android architecture has four layers, Linux Kernel, the developer option. The android operating system is Libraries and Runtime layer, Application framework, also linked with the hardware features like camera, wi- and application layer. The Linux Kernel provides basic fi, Bluetooth, GPS etc. just by giving some permissions services like memory management, process Android Inc.
    [Show full text]
  • The Importance of ,Dreams
    Man and His Symbols Cart Jung .' NY: Dell Publishing, 1964 Ch. 1, "Approaching the Unconscious" NOTE: Skip "The importance of types" on p. 45 and start again at "The archetype in dream symbolism" on p. 56 The importance of ,dreams Man uses the spoken or written word to express the mean­ ing of what he wants to convey. His language is full of symbols, but he also often employs signs or images that are not strictly descriptive. Some are mere abbreviations or strings of initials, such as UN, UNICEF, or UNESCO; others ate familiar trade marks, the names of patent med­ , icines, badges, or insignia. Although these are meaningless in 'themselves, they have acquired a' recognizable meaning , through common usage or deliberate intent. Such things are not symbols. They are signs, and they do no more than denote the objects to which they are attached. What we call a symbol is a: term, a name, or even a picture that may be familiar in daily life, yet that pos­ , -' > sesses 'specific connot~tions in addition to its conventional ~ ' and obvious meaning. It implies something vague, un­ known, or hidden from us. Many Cretan monuments, for instance, are marked with the design of the double adze. This is an object that we know, but we do not know its ' symbolic -implications. For another example, take the <;ase of the Indian -who, after a visit to England, told his ,friends at home that the English worship animals, because he had found eagles, lions, and oxen in old churches. He was not aware (nor are many Christians) that these ani~ Three of tIle four Evangelists (in a relief Oil Chartres mals are symbols of the Evangelists and are derived from Cathedral) appear asallimals: The lion is Mark, the ox the vision of Ezekiel, and that this in turn has an analogy Luke, tile eagle John.
    [Show full text]
  • Easter Eggs: Hidden Tracks and Messages in Musical Mediums
    Easter Eggs: Hidden Tracks and Messages in Musical Mediums Jonathan Weinel, Darryl Griffiths and Stuart Cunningham Creative & Applied Research for the Digital Society (CARDS) Glyndŵr University Plas Coch Campus, Mold Road, Wrexham, LL11 2AW, Wales +44 1978 293070 {j.weinel | Griffiths.d | s.cunningham}@glyndwr.ac.uk ABSTRACT the programmers’ office, in the style of the video game Doom [2]. The hidden game features credits and digital ‘Easter eggs’ are hidden components that can be found in images of the programmers. It is accessed by carrying computer software and various other media including out a particular series of actions on the 95th row of a music. In this paper the concept is explained, and various blank spreadsheet upon opening Excel. examples are discussed from a variety of mediums in- cluding analogue and digital audio formats. Through this discussion, the purpose of including easter eggs in musi- cal mediums is considered. We propose that easter eggs can serve to provide comic amusement within a work, but can also serve to support the artistic message of the art- work. Concealing easter eggs in music is partly depend- ent on the properties of the chosen medium; vinyl records Figure 1. Screenshots from the ‘hall of tortured souls’, in Mi- may use techniques such as double grooves, while digital crosoft Excel 95. formats such as CD may feature hidden tracks that follow long periods of empty space. Approaches such as these This paper will consider the purpose and realisation of and others are discussed. Lastly, we discuss some soft- easter eggs, through consideration of their presence in computer software and other mediums such as TV pro- ware components we have developed ourselves in grammes.
    [Show full text]
  • Hacky Easter 2017 Summary
    Hacky Easter 2018 2 Summary PS, www.hacking-lab.com Table of Contents Intro .............................................................................................................................. 5 Outro .................................................................................................................................................................... 5 Volunteers ........................................................................................................................................................... 5 Credits .................................................................................................................................................................. 5 Awards .......................................................................................................................... 6 Perfect Solvers ................................................................................................................................................... 6 Hacking-Lab Awards ......................................................................................................................................... 7 Statistics ...................................................................................................................... 8 General ................................................................................................................................................................ 8 Event Activity .....................................................................................................................................................
    [Show full text]
  • Hacky Easter 2016 Solutions
    Hacky Easter 2016 Summary PS, www.hacking-lab.com Table of Contents Intro .............................................................................................................................. 5 Outro .................................................................................................................................................................... 5 Credits .................................................................................................................................................................. 5 Awards .......................................................................................................................... 6 Perfect Solvers ................................................................................................................................................... 6 Hacking-Lab Awards ......................................................................................................................................... 7 Statistics ...................................................................................................................... 8 General ................................................................................................................................................................ 8 Event Activity ...................................................................................................................................................... 8 Solutions per Egg .............................................................................................................................................
    [Show full text]