A Jiffy Clock for the Apple Iic, II+, and Iie with a Mouse

Total Page:16

File Type:pdf, Size:1020Kb

A Jiffy Clock for the Apple Iic, II+, and Iie with a Mouse BehaviorResearch Methods, Instruments, & Computers 1988, 20 (3). 362 NOTES A jiffy clock for the Apple lIe, pa~r of numbe~s, but a space separates each subsequent 11+, and lIe with a mouse pan. The remainder of the program can be entered in the same manner. To return to BASIC when finished, type CHARLES MERBITZ, JEFFREY GRIP <Control-C> <RETURN> . and HANS PETER MARQUI ' To savetheclockto diskwithOOS3.3, BSAVEJIFFY, Rehabilitation Institute ofChicago, Chicago, Illinois A$2BD, L223 shouldbe entered. With ProOOS, BSAVE JIFFY, A$2B5, L245 will save the clock to disk. The A "jiffy clock" is presented for the Apple IIc or other clock may be installed either before a BASIC program ~p~le II having Apple's mouse card. The clock allows runs or withina BASIC program. The commandBLOAD timing of events to tenths of a second,and is read from JIFFY retrieves the clock from the disk. BASIC. A convenient elapsed timer function is provided as well. The memorylocationsused to control the clock are the same in both versions. POKE is used to set the time base to seconds (POKE786,60) or tenths of seconds (POKE Unlike with some microcomputers(e.g., Radio Shack 786,6): Because the time is stored in 2 bytes, at 65,536 TRS-80; Balsam, Deich, O'Connor, & Scopatz, 1986) (64K) increments (either seconds or tenths of seconds), that provide a current time function, timing events with the clock reaches its maximum value and "rolls over" the earlier Apple II, 11+, lIe, and IIc usually requires the to zero before continuing to increment. The possibility addition of a hardware clock (Flowers, 1982). A clock that a session will last long enough to include a rollover has been built into the new Apple IIgs; with the Apple mustbe consideredwhenprogramming. Following a roll­ lie, a 6O-Hz interrupt is readily availableand can be used over, a negativenumberwillresult whenthe elapsedtime to run a simple "jiffy clock." Since the jiffy clock is calculated. (Expansionto 4 bytesto increase the dura­ originates in Apple's mouse firmware, an Apple 11+ or tion before a rollover is possible, but does not seem use­ lie with a mouse card has access to the jiffy clock. fulin viewofthe interruption-during-diskaccess problem.) The routines described here create a jiffy clock that Execution of a CALL 768 locates the slot of the mouse keeps time to tenths of a sec and is suitable for general card, and a CALL 771 begins the clock. The clock can use. They require Applesoft floating-point BASIC. Be­ be disabled with a CALL 777. cause the clock pauses during disk access, its accuracy From within a BASICprogram, executionof the com­ i~ c~mpromised when disk operations take place during mand& A in any line readsthe clock intothe variable A. tumng. Any legal floating-point variable can be used, but not a ProDOS was designed to handle interrupts; DOS 3.3 string, integer, or array variable. A CALL 774 clears the was not. Therefore, different versions of the jiffy clock clock to zero but does not stop it. The next & A will then program are provided. For the DOS 3.3 version, it is give the time since the most recent CALL 774. This fea­ strongly suggested that the clock be turned off with a ture is convenient when the clock is used repeatedly as CALL 777before issuing any OOScommands, sinceboth an elapsed timer. Otherwise, the programmer must store DOS and the clock use location $45 (decimal 69). This the firsttimevaluewhentimingbegins and subtractit from precaution is not needed in the ProDOS environment, or ~e secondtimevaluewhentimingendsto findthe elapsed with an enhanced lie or lie. time. To type in the program listing, one must boot the pre­ Availability. Thejiffy clock is availableon disk to per­ ferred DOS and enter the monitor with a CALL-151 sons who send $4 or a labeled, initialized 5.25-in. disk­ < RETURN> . Each line of the program may be entered ette with a self-addressed, stamped mailer to the senior as follows. The four-digit hexadecimal address (e.g., author. Please specify which DOS is preferred, or send 02BD in DOS 3.3, or 02B5 in ProDOS), a colon, and a double-sided, double-notched diskette for bothversions. the address contents are entered, and <RETURN> is pressed. No space occurs between the colon and the first REFERENCES BALSAM, P., DEICH, J., O'CONNOR, K., '" ScOPATZ, R. (1986). Micro­ computers and conditioning research. BehaviorResearch Methods, Instruments, & Computers, 17, 537-545. This work was supported by National Institute of Handicapped FLOWERS, J. H. (1982). Some simple Apple II software for the collec­ Research Grant 0008300079. The authors also wish to recognize the tion and analysis of observational data. Behavior Research Methods constructive suggestions of the reviewers. Address correspondence to & Instrumentation, 14, 241-249. Charles Merbitz, Rehabilitation Institute of Chicago. 448 E. Ontario, 6th Roor, Chicago, IL 60611. (Revision accepted for publication November 24, 1987.) Copyright 1988 Psychonomic Society, Inc. 362.
Recommended publications
  • Washington, Wednesday, January 25, 1950
    VOLUME 15 ■ NUMBER 16 Washington, Wednesday, January 25, 1950 TITLE 3— THE PRESIDENT in paragraph (a) last above, to the in­ CONTENTS vention is insufficient equitably to justify EXECUTIVE ORDER 10096 a requirement of assignment to the Gov­ THE PRESIDENT ernment of the entire right, title and P roviding for a U niform P atent P olicy Executive Order Pase for the G overnment W ith R espect to interest to such invention, or in any case where the Government has insufficient Inventions made by Government I nventions M ade by G overnment interest in an invention to obtain entire employees; providing, for uni­ E mployees and for the Administra­ form patent policy for Govern­ tion of Such P olicy right, title and interest therein (although the Government could obtain some under ment and for administration of WHEREAS inventive advances in paragraph (a), above), the Government such policy________________ 389 scientific and technological fields fre­ agency concerned, subject to the ap­ quently result from governmental ac­ proval of the Chairman of the Govern­ EXECUTIVE AGENCIES tivities carried on by Government ment Patents Board (provided for in Agriculture Department employees; and paragraph 3 of this order and herein­ See Commodity Credit Corpora­ WHEREAS the Government of the after referred to as the Chairman), shall tion ; Forest Service; Production United States is expending large sums leave title to such invention in the and Marketing Administration. of money annually for the conduct of employee, subject, however, to the reser­ these activities;
    [Show full text]
  • Philip Gibbs EVENT-SYMMETRIC SPACE-TIME
    Event-Symmetric Space-Time “The universe is made of stories, not of atoms.” Muriel Rukeyser Philip Gibbs EVENT-SYMMETRIC SPACE-TIME WEBURBIA PUBLICATION Cyberspace First published in 1998 by Weburbia Press 27 Stanley Mead Bradley Stoke Bristol BS32 0EF [email protected] http://www.weburbia.com/press/ This address is supplied for legal reasons only. Please do not send book proposals as Weburbia does not have facilities for large scale publication. © 1998 Philip Gibbs [email protected] A catalogue record for this book is available from the British Library. Distributed by Weburbia Tel 01454 617659 Electronic copies of this book are available on the world wide web at http://www.weburbia.com/press/esst.htm Philip Gibbs’s right to be identified as the author of this work has been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. All rights reserved, except that permission is given that this booklet may be reproduced by photocopy or electronic duplication by individuals for personal use only, or by libraries and educational establishments for non-profit purposes only. Mass distribution of copies in any form is prohibited except with the written permission of the author. Printed copies are printed and bound in Great Britain by Weburbia. Dedicated to Alice Contents THE STORYTELLER ................................................................................... 11 Between a story and the world ............................................................. 11 Dreams of Rationalism .......................................................................
    [Show full text]
  • United States District Court Southern District Of
    Case 3:11-cv-01812-JM-JMA Document 31 Filed 02/20/13 Page 1 of 10 1 2 3 4 5 6 7 8 9 UNITED STATES DISTRICT COURT 10 SOUTHERN DISTRICT OF CALIFORNIA 11 12 In re JIFFY LUBE ) Case No.: 3:11-MD-2261-JM (JMA) INTERNATIONAL, INC. TEXT ) 13 SPAM LITIGATION ) FINAL APPROVAL OF CLASS ) ACTION AND ORDER OF 14 ) DISMISSAL WITH PREJUDICE ) 15 16 Pending before the Court are Plaintiffs’ Motion for Final Approval of Class 17 Action Settlement (Dkt. 90) and Plaintiffs’ Motion for Approval of Attorneys’ Fees and 18 Expenses and Class Representative Incentive Awards (Dkt. 86) (collectively, the 19 “Motions”). The Court, having reviewed the papers filed in support of the Motions, 20 having heard argument of counsel, and finding good cause appearing therein, hereby 21 GRANTS Plaintiffs’ Motions and it is hereby ORDERED, ADJUDGED, and DECREED 22 THAT: 23 1. Terms and phrases in this Order shall have the same meaning as ascribed to 24 them in the Parties’ August 1, 2012 Class Action Settlement Agreement, as amended by 25 the First Amendment to Class Action Settlement Agreement as of September 28, 2012 26 (the “Settlement Agreement”). 27 2. This Court has jurisdiction over the subject matter of this action and over all 28 Parties to the Action, including all Settlement Class Members. 1 3:11-md-2261-JM (JMA) Case 3:11-cv-01812-JM-JMA Document 31 Filed 02/20/13 Page 2 of 10 1 3. On October 10, 2012, this Court granted Preliminary Approval of the 2 Settlement Agreement and preliminarily certified a settlement class consisting of: 3 4 All persons or entities in the United States and its Territories who in April 2011 were sent a text message from short codes 5 72345 or 41411 promoting Jiffy Lube containing language similar to the following: 6 7 JIFFY LUBE CUSTOMERS 1 TIME OFFER: REPLY Y TO JOIN OUR ECLUB FOR 45% OFF 8 A SIGNATURE SERVICE OIL CHANGE! STOP TO 9 UNSUB MSG&DATA RATES MAY APPLY T&C: JIFFYTOS.COM.
    [Show full text]
  • What Happened Before the Big Bang?
    Quarks and the Cosmos ICHEP Public Lecture II Seoul, Korea 10 July 2018 Michael S. Turner Kavli Institute for Cosmological Physics University of Chicago 100 years of General Relativity 90 years of Big Bang 50 years of Hot Big Bang 40 years of Quarks & Cosmos deep connections between the very big & the very small 100 years of QM & atoms 50 years of the “Standard Model” The Universe is very big (billions and billions of everything) and often beyond the reach of our minds and instruments Big ideas and powerful instruments have enabled revolutionary progress a very big idea connections between quarks & the cosmos big telescopes on the ground Hawaii Chile and in space: Hubble, Spitzer, Chandra, and Fermi at the South Pole basics of our Universe • 100 billion galaxies • each lit with the light of 100 billion stars • carried away from each other by expanding space from a • big bang beginning 14 billion yrs ago Hubble (1925): nebulae are “island Universes” Universe comprised of billions of galaxies Hubble Deep Field: one ten millionth of the sky, 10,000 galaxies 100 billion galaxies in the observable Universe Universe is expanding and had a beginning … Hubble, 1929 Signature of big bang beginning Einstein: Big Bang = explosion of space with galaxies carried along The big questions circa 1978 just two numbers: H0 and q0 Allan Sandage, Hubble’s “student” H0: expansion rate (slope age) q0: deceleration (“droopiness” destiny) … tens of astronomers working (alone) to figure it all out Microwave echo of the big bang Hot MichaelBig S Turner Bang
    [Show full text]
  • 15 Pecision System Clock Architecture
    Pecision System Clock Architecture 15 Pecision System Clock Architecture “Time iz like money, the less we hav ov it teu spare the further we make it go.” Josh Billing Encyclopedia and Proverbial Philosophy of Wit and Humor, 1874 225 Pecision System Clock Architecture Limitations of the Art Over the almost three decades that NTP has evolved, accuracy expectations have improved from 100 ms to less than 1 ms on fast LANs with multiple segments interconnected by switches and less than a few milliseconds on most campus and corporate networks with multiple subnets interconnected by routers. Today the practical expectations with a GPS receiver, PPS signal and precision kernel support are a few microseconds. In principle the ultimate expectations are limited only by the 232-ps resolution of the NTP timestamp format or about the time light travels three inches. Improving accuracy expectations below the PPS regime is proving intricate and tricky. In this chapter we turn to the most ambitious means available to minimize errors in the face of hardware and software not designed for extraordinary timekeeping. First we examine the hardware and software components for a precision system clock and evolve an optimal design. Next we survey timestamping techniques using both hardware, driver and software methods to minimize errors due to media, device and operating system latencies. Finally, we explore the IEEE 1588 Precision Time Protocol (PTP), how it is used in a high speed LAN, and how it and NTP can sail in the same boat. The parting shots section proposes a hardware assisted design which provides performance equivalent to PTP with only minimal modifications to the Unix operating system kernel.
    [Show full text]
  • Detecting Temperature Through Clock Skew
    Detecting temperature through clock skew Steven J. Murdoch (aka 253802) www.cl.cam.ac.uk/users/sjm217 OpenNet Initiative Computer Laboratory www.opennet.net 23rd Chaos Communication Congress, Berlin, Germany, 27–30 December 2006 This presentation introduces clock skew and how it can introduce security vulnerabilities 0.0 De−noised ●● 26.4 ● ● ● ● 26.3 −0.5 Non−linear offset ● ● ●●Temperature C) ° ● ● ●●● 26.2 −1.0 ●● ●●● ● ●●●●●●●● 26.1 ●●●●●●● ●●●● ● ●● ●●●● −1.5 ●● ● ●● ● ●● ●● 26.0 Temperature ( ● Clock skew, its link to temperature, and measurement ●●● ●●●●●●●●● ● ●●●●● 25.9 Non−linear offset component (ms) ●●●●●●●●●●●●●●●● −−2.0 Variable skew ● 25.8 Fri 11:00 Fri 21:00 Sat 07:00 Sat 17:00 Time Service Publication Connection Setup Data Transfer Hidden Service 1 6 * RP 7 Introduction Point (IP) IP Rendevous 2 Point (RP) Tor and hidden services 5 RP 8 Directory data Server 4 IP Client 3 Measurer Attacking Tor with clock skew Attacker Tor Network Hidden Server Other applications of clock skew Computers have multiple clocks which are constructed from hardware and software components A clock consists of an: • Oscillator, controlled by a crystal, ticks at an nominal frequency • Counter, counts the number of ticks produce by the oscillator On Linux there are several clocks available (other OS are similar): • Jiffy counter: An uncorrected clock used internally to the OS • System clock: A clock corrected by NTP (used by applications) • BIOS clock (also known as CMOS clock): runs even when PC is off and initialises the system clock Computers
    [Show full text]
  • Jiffy Steamer Owner's Manual
    Worldwide Leader in Steaming Equipment Since 1940 Esteam® and J-Series OWNER’S MANUAL Congratulations and Thank You! Thank you for purchasing your Jiffy® Steamer from the world’s leading manufacturer of steaming equipment since 1940. We strive to engineer and manufacture the very best steamer available backed by superior customer service. With proper maintenance and cleaning, your Jiffy® Steamer will last through years of demanding use. Thank you again and we sincerely appreciate your business. Warmest regards, Jiffy® Steamer Company, LLC Made in the USA Since 1940 Table of Contents Safety Instructions .....................................................................3 How to Steam..............................................................................4 Esteam® Hand Held Steamer .................................................5-8 Rod Set Assembly.......................................................................9 Model J-1, J-2 & J-200 Jiffy® Steamers............................10-15 Model J-2000 Jiffy® Steamer..............................................16-21 Model J-4000 Jiffy® Steamer..............................................22-27 Model J-1, J-2, J-200 & J-2000 Jiffy® Steamers Cleaning Instructions...............................................................28 Model J-4000 Jiffy® Steamer Cleaning Instructions.............29 Jiffy® Steamer Maintenance....................................................30 Jiffy® Steamer Accessories.......................................................31 Jiffy® Steamer Steam Head
    [Show full text]
  • Lawyers Discuss Apple Co-Founder's Impact on IP Law
    Chicago Daily Law Bulletin - The City's No. 1 Source for the Law Profession Lawyers discuss Apple co-founder's impact on IP law October 6, 2011 By Jerry Crimmins — [email protected] Law Bulletin staff writer © 2011 by Law Bulletin Publishing Company. Reprinted with permission. Steve Jobs, co-founder of Apple Inc., showed the world the upside and the downside of closely protecting intellectual property. Jobs died Wednesday. He also made technology "cool" in the view of Chicago area intellectual property experts. "He embodies the true joy of being in the innovation business," said Arthur Yuan, executive director of the Chinese Intellectual Property Resource Center at The John Marshall Law School. "He makes using technology a very cool and very good and pleasant experience so that technology is no longer just a piece of hardware." "Steve Jobs was not only a visionary when it came to technological developments, but also when it came to intellectual property protection," said professor Doris Estelle Long at John Marshall. "Apple under Jobs aggressively used IP to protect its innovations. It often relied on newly emerging doctrines in its quest to translate its technological developments into legally protected market exclusivity. Thus, Apple Inc., was an early user of copyright to protect its software." Therein hangs a tale. AP:Steve Remembering Jobs told us Steve Jobs Steven G. Parmelee, partner at Fitch, Even, Tabin & Flannery, said in the early years of personal computers, "Apple what we needed maintained a clamp on their intellectual property so hardly before we knew anybody could make anything similar to a Mac." SAN FRANCISCO (AP) — Steve Jobs saw Parmelee said Apple launched the personal computer the future and led the world to it.
    [Show full text]
  • Burkina Faso
    [NAME] [FIRM] [ADDRESS] [PHONE NUMBER] [FAX NUMBER] UNITED STATES DEPARTMENT OF JUSTICE EXECUTIVE OFFICE FOR IMMIGRATION REVIEW IMMIGRATION COURT [CITY, STATE] __________________________________________ ) In the Matter of: ) ) File No.: A __________ __________ ) ) In removal proceedings ) __________________________________________) INDEX TO DOCUMENTATION OF COUNTRY CONDITIONS REGARDING PERSECUTION OF LGBTQ PERSONS IN BURKINA FASO TAB SUMMARY GOVERNMENTAL SOURCES 1. Overseas Security Advisory Council, Bureau of Diplomatic Security, U.S. Dep’t of State, Burkina Faso 2020 Crime & Safety Report (May 12, 2020), available at https://www.osac.gov/Content/Report/81726191-31e9-4ceb-9adb-18aa5a5de155 • “Members of the LGBTI+ community find life in Burkina Faso extremely difficult and, at worst, dangerous. Societal discrimination based on sexual orientation and gender identity remains an issue; religious/traditional beliefs do not tolerate homosexuality.” (p. 4) • “There are regular reports of verbal and physical abuse against members of the LGBTI+ community. LGBTI+ employees have passed partners off as relatives, even within the Embassy community, to avoid the possibility of intolerant reactions.” (p. 4) 2. Bureau of Democracy, Human Rights and Labor, U.S. Dep’t of State, 2019 Country Reports on Human Rights Practices: Burkina Faso (Mar. 2020), available at https://www.state.gov/reports/2019-country-reports-on-human-rights-practices/burkina-faso/ • “The country has no hate crime laws or other criminal justice mechanisms to aid in the investigation, prosecution, or sentencing of bias-motivated crimes against the lesbian, gay, bisexual, transgender, and intersex (LGBTI) community. NGOs reported police TAB SUMMARY occasionally arrested gay men and transgender individuals and humiliated them in detention before releasing them.” (p.
    [Show full text]
  • Second Quarter 2017 Site Investigation Data Report Former Ivy’S Jiffy Market Site Madras, Oregon ECSI No
    Second Quarter 2017 Site Investigation Data Report Former Ivy’s Jiffy Market Site Madras, Oregon ECSI No. 5845 Prepared for: Oregon Department of Environmental Quality Task Order No. 20-13-21 June 27, 2017 2103-00/Task 4 Table of Contents 1.0 INTRODUCTION ..................................................................................................................................... 1 1.1 Purpose ............................................................................................................................................... 1 1.2 Scope of Work ..................................................................................................................................... 1 2.0 BACKGROUND ....................................................................................................................................... 2 2.1 Site Location and Description .............................................................................................................. 2 2.2 Previous Investigations ........................................................................................................................ 2 2.3 Other Impacted Sites ........................................................................................................................... 4 2.4 Geology and Hydrogeology ................................................................................................................. 5 3.0 PRE-INVESTIGATION ACTIVITIES .......................................................................................................
    [Show full text]
  • A Convolutional Approach to Learning Time Series
    Under review as a conference paper at ICLR 2018 ACONVOLUTIONAL APPROACH TO LEARNING TIME SERIES SIMILARITY Anonymous authors Paper under double-blind review ABSTRACT Computing distances between examples is at the core of many learning algorithms for time series. Consequently, a great deal of work has gone into designing effective time series dis- tance measures. We present Jiffy, a simple and scalable distance metric for multivariate time series. Our approach is to reframe the task as a representation learning problem—rather than design an elaborate distance function, we use a CNN to learn an embedding such that the Eu- clidean distance is effective. By aggressively max-pooling and downsampling, we are able to construct this embedding using a highly compact neural network. Experiments on a diverse set of multivariate time series datasets show that our approach consistently outperforms existing methods. 1 INTRODUCTION Measuring distances between examples is a fundamental component of many classification, clus- tering, segmentation and anomaly detection algorithms for time series (Rakthanmanon et al., 2012; Schafer,¨ 2014; Begum et al., 2015; Dau et al., 2016). Because the distance measure used can have a significant effect on the quality of the results, there has been a great deal of work developing ef- fective time series distance measures (Ganeshapillai & Guttag, 2011; Keogh et al., 2005; Bagnall et al., 2016; Begum et al., 2015; Ding et al., 2008). Historically, most of these measures have been hand-crafted. However, recent work has shown that a learning approach can often perform better than traditional techniques (Do et al., 2017; Mei et al., 2016; Che et al., 2017).
    [Show full text]
  • HISTORY of APPLE[Tm] MACINTOSH[Tm] OPERATING SYSTEM
    HISTORY OF APPLE[tm] MACINTOSH[tm] OPERATING SYSTEM LisaDesk : released, on January 1983, for Apple Lisa computer. On January 1985, Lisa 2-10, outfitted with MacWorks, was renamed Macintoh XL. System 1 (1.0 and 1.1) : released respectively on January 1984 and May 1984, both versions were directly derived from LisaDesk offered less functionality, in favor of being more stable. Certain functions of LisaDesk were included in later versions of Mac[tm] OS, including Mac[tm] OS X. System 2 (1.2 to 2.1) : while integrating new functions, the principal objective of this system was to allow a better management to compensate for the absence of a hard disk on first models of Macintosh. System 3 (2.2 to 3.3) : this system accompanied, on 1986, the new Macintosh models. This system had more facility and was more powerful, it allowed the integration of new file format HFS, of new communications functionality, and laser printer support. System 4 & 5 (4.0 to 5.1) : these systems accompanied the first Macintosh models with colour monitors, and allowed transition between mono-task system and cooperative multi-task system with first generation of Multifinder which made possible to manage several applications simultaneously. System 6 (6.0 to 6.0.8) : improvements to the cooperative multi-task system with second generation of Multifinder. It was released in many specialized versions according to the model which was equipped to meet specific needs, particularly for graphic applications. System 7 (7.0 to 7.6.1) : complete integration of cooperative multi-task processing inside the system, this system gradually integrated increasingly significant functionality concerning multimedia applications and Internet.
    [Show full text]