Software a Lications Swimming in the Relational Lake

Total Page:16

File Type:pdf, Size:1020Kb

Software a Lications Swimming in the Relational Lake r $3.95 April-May 1987 Software A lications Swimming In The Relational Lake . .................... 14 Designing relational databases. Expert System. ................... ............ ... .... 22 Gary designs an expert system with Prolog. Nasty Software ................................. .. .. .. 82 A plague of new programs in the public domain. Hardware Applications - Controlling The Real World ............................. 6 Build an 8-channel temperature scanner. The Bleeping PC ......................... .... ... ... 30 Stra nge noises fro m clonal counters. Who's Making Great Hard Drives ...................... 44 Read before you purchase your next hard drive. Changing the Picture ............................~ ...... 86 Super graphics from a new graphics processo r. o $3.95 April-May 1987 No. 35 p~~ :~::.J ~::.:~ UJ III <..: ):1 >:~. :::1 ill t:) i:'/ r:J :::: Software A~lications I:J ..... j'TJ ::1:) :".~~ ~ t 0.1 • : L> t~:J ~.;~: t "':1 :!:~: t:'l Swimming In The Relational Lake ...................... 14 :1.'., Designing relational databases. I . Expert System ......................................... 22 :.~ I it. l.n Gary designs an expert system with Prolog. :u Nasty Software ........................................ 82 A plague of new programs in the public domain. Hardware Applications Controlling The Real World ............................. 6 Build an 8-channel temperature scanner. The Bleeping PC ...................................... 30 Strange noises from clonal counters. -.j" Who's Making Great Hard Orives ...................... 44 0 Read before you purchase your next hard drive. 1"1 00 00 /'f) Changing the Picture ............................; ...... 86 '" Super graphics from a new graphics processor. 0 I'- -.j" -.j" I'- 0 '; '.. "oa~r~; ';the' highest' ',',"" " :~'t{i\~perf,orn,ance~Uld "integ'ratio~'bf <' :,> anY,pC/XTcompatible.With its, 'tOM Hz, ,zero wait state operation it 'walks away from AT , compatibles as well. On board is one megabyte of DRAM, a real time clock, floppy disk controller, and optional one or two serial ports, SCSI port and 8087. The PC Tech SmartBIOS provides PC compatability with ease of use. We wrote it and we support it! :HER'PRODUCTS , '. ". :", ' '.!i- ~.. ", , PRICES! "·{lVIath:Copn)cessor for X16B ,,'rheX16,B087;Math Coprocessor runs at full CPU speed. That's X16B I 1 Meg I RTC .... $600.00 i;;'F::':10Ml7zofnumber smashing power! The Math Coprocessor on the 8 MHz version ...... $540.00 ,:', ""'AT;only'runsat 2/3 of the CPU clock. SCSI option ......... $25.00 ~:,~SqSIPort Option,for'X16B Serial ports (2) . ~ ..... $38.75 :.",'" '"FuJISCSI port using the 5380. Software built into ROM BIOS for the '.oMT13100 hard disk controller achieves a 1 to 1 sector interleave. 8087-1/82188 ........ $340.00 ,:" ::"";"FOlJR,,',MEGGER 8087-2/82~88 . ....... $260.00 Runri'ing out of spreadsheet room? Need something faster than a Four Megger' ......... $850.00 ,~arq disk for those long compiles? The Four Megger ,is the answer. ,T~e Four Megger meets the Lotus/lntellMicrosoft expanded 2S 1P ................. $99.00 m'emory specifications and works in all PC andXT computers. The Four Megger also works in AT computers, as expanded memory Memories ............. $95.00 only. 2S1P Systems: We found ourselves lacking for a flexible two serial ports and The Box ........... $799.00 parallel printer port. So we designed the 2S1P (which is short for 2 Mono System ..... $1,099.00 Serial, 1 Parallel) board. It's small, inexpensive and made here, of course! EGA System ...... $1,849.00 ,Memories Call for system configuration The PC .Tech Memories board allows additlonal ROM or static RAM details. PC Tech also sells hard , to be put in a PC, XT, AT, X168 or compatible. We designed it for drives and controllers, video boards diagnostics. You can use it for booting without disks, scraping and mon itors, etc. your windshield or whatever! P.O. Box 128 904 North 6th Street Watch for more innovative products Lake City, MN 55041 designed and built by PC Tech!!! (612) 345·4555 COD, VISA, MASTER CARD, CERTIFIED FUNDS APPRENTICE WIZARDS' PACKAGE PACKAGE $99 $199 • Separate Compilation wfinter-module typechecking Call for information about our VAX/VMS version, Site License, University • Native Code Generation _ APPRENTICE PACKAGE $99 Discounts, Dealer & Distributor pricing. • Large Memory Model Support Everything you need to begin producing reliable maintainable Modula-2 code. Includes the Compiler To place an order call • Most Powerful Runtime Debugger with 8087 support, integrated Editor, Linker, and toll-free: • Comprehensive Module Library BCD Module. We're also including FREE our Turbo Pascal to Modula-2 Translator! 800-231-7717 • Maintainability In California: • Translator from Turbo and ANSI Pascal _ WIZARDS'PACKAGE $199 800-552-8885 This package contains our Plus Compiler-for •••••••••••••••••••••••••• professional programmers or for those who just want ' I want the spellbinding power WIN AFREE·TRIPTO the best. The Plus Compiler with Integrated Editor YES• of LOGITECH Modula-2! requires 512K and takes advantage of the larger o Apprentice Package $99 memory to increase compilation speed by 50%. Our o Wizards' Package $199 Switz¢rland Turbo Pascal to Modula-2 Translator is also includ­ o Magic Toolkit $99 ed at no extra charge. o Window Package $49 o ROM PkglCross RTD $299 _ MAGIC TOOLKIT $99 Add $6.50 for shipping and handling. Calif. residents add applicable sales tax. Prices valid in U.S. only. We've put our most powerful development tools into one amazing Toolkit for use with either the Total Enclosed $ ____ Apprentice or Wizards' packages. Highlighted by our o VISA 0 MasterCard 0 Check Enclosed Runtime Debugger, the finest debugging tool avail­ able anywhere, the Toolkit also includes our Post Card Number Expiration Date Mortem Debugger, Disassembler, Cross Reference utility and Version which keeps track of different Signature versions of one program. Our MAKE Utility figures out module dependencies and automatically selects Name Return your Modula-2 Registration Card or those affected by code changes to minimize recom­ Address a reasonable facsimile~ posttriarkedbetween pilation and relinking. We also provide source code March 1, 1987 and May 31;1987tobeinc1uded of our major library modules for you to customize'­ City State in a once-only drawing! . or just play with. Grand PriZe: One week excursion for 2 in Zip Phone .Zurich, Switzerlandincluding a guided tour of WINDOW PACKAGE $49 ETH, the University where M6dula-2 was Now you can build true windowing into your created by Niklaus Wirth. European custom­ Modula-2 code. Features virtual screens, color sup­ ~LOGITECH ers may substitute a trip to Silicon Valley, . port, overlapping windows and a variety of borders. WGITECH, Inc. California. ROM PACKAGE AND CROSS 805 Veterans Blvd. Redwood City, CA 94063 Second and Third Prizes: LOGITECH C7 Tel: 415-365-9852 RUN TIME DEBUGGER $299 Mouse or WGITECH Bus MoUse with Paint In Europe: fur those who want to produce rommable code. & Draw software - a $219 value, absolutely WGITECH SA, Switzerland You can even debug code running in ROM from free! . Tel: 41-21-879656 • Telex 458 217 Tech Ch your Pc. *Write to Logitech, Inc. for a registration card In Italy: facsimile. .' " Tel: 39-2-215-5622 Turbo Pascal is a registered trademark of Borland International. ••••••••••••••••••••••••• AROUND THE BEND By David Thompson Sympathy Wanted I'm bummed, burned-out, through with the humor and high jinks. Hilarity stinks. If. you want fun, make your own. Margret and I have been working day and night trying to desktop Micro C. We've created style sheets, added commands to articles, formatted listings, and generally en­ joyed our new-found power. Everything we wanted to do (reverse video, lines, captions, illustrations ... ) we did. With Ventura Publisher. Once we had our style sheets done, articles finished, boxes drawn, all we had to do was run Ventura's PostScript output through a Linotronic RIP and we'd have a magazine. So three weeks ago I packed up Sandy, the kids, and a system and headed for the nearest Linotronic. That was 108 long distance calls (covering eight states), seven express packages (two lost), and six attempts at modem communications ago. We still haven't found anyone (including Adobe, Ven­ tura, Xerox, or Linotype) who can help us dump a small PostScript file through a Linotype RIP (Raster Image Processor or Rest In Peace, you take your pick). We've badgered, berated, beleaguered, and bullied all 6 typesetting houses in the northwest that have PostScript RIPs. They were all certain they could do it. ("Hey Mur­ phy, over here. Easy pickins.") Everyone was surprised. All but Xerox (Xerox was un­ reachable) had suggestions: "Remove the special headers we add to PostScript files when they're destined for the Apple Laserwriter," was the suggestion from both Linotype and Ventura. After deleting 194 lines of illegible hex the file still wouldn't run. "You must be using more than 3 fonts. Of course, the internal fonts don't count." We were only using three fonts, internal or otherwise. Some of the houses only had MACs. I should have skipped them altogether. "Our MAC is automatically stripping carriage returns as your file comes in off the modem, and I'm getting little boxes prepended to each line. That must be the problem." The small boxes turned out to be linefeeds. Not a problem. But the RIP still couldn't output the file. "Let's see, we take this file and output it to the RIP through the MAC's PostScript interpreter. That's always worked with Apple files." Come On! It's already a PostScript file; if you PostScript it again it's not going to work. Continued On Page 97 2 MICRO CORNUCOPIA, #35, April-May 1987 April-May 1987 Issue No. 35 CONTENTS Features Russ Eberhart 60 Learn Assembly language Bruce Eckel 8088 assembly language isn't easy. Russ looks at books 6 +5V RESISTOR that'll help you register all those segments. Controlling NETWORK The Real RN2 Bruce Eckel 72 Concise Computer Electronics World Bruce covers beginning hardware procedure for beginning Bruce builds an 8- hardware builders.
Recommended publications
  • ISIS Propaganda and United States Countermeasures
    BearWorks MSU Graduate Theses Fall 2015 ISIS Propaganda and United States Countermeasures Daniel Lincoln Stevens As with any intellectual project, the content and views expressed in this thesis may be considered objectionable by some readers. However, this student-scholar’s work has been judged to have academic value by the student’s thesis committee members trained in the discipline. The content and views expressed in this thesis are those of the student-scholar and are not endorsed by Missouri State University, its Graduate College, or its employees. Follow this and additional works at: https://bearworks.missouristate.edu/theses Part of the Defense and Security Studies Commons Recommended Citation Stevens, Daniel Lincoln, "ISIS Propaganda and United States Countermeasures" (2015). MSU Graduate Theses. 1503. https://bearworks.missouristate.edu/theses/1503 This article or document was made available through BearWorks, the institutional repository of Missouri State University. The work contained in it may be protected by copyright and require permission of the copyright holder for reuse or redistribution. For more information, please contact [email protected]. ISIS PROPAGANDA AND UNITED STATES COUNTERMEASURES A Masters Thesis Presented to The Graduate College of Missouri State University In Partial Fulfillment Of the Requirements for the Degree Master of Science, Defense and Strategic Studies By Daniel Stevens December 2015 Copyright 2015 by Daniel Lincoln Stevens ii ISIS PROPAGANDA AND UNITED STATES COUNTERMEASURES Defense and Strategic studies Missouri State University, December 2015 Master of Science Daniel Stevens ABSTRACT The purpose of this study is threefold: 1. Examine the use of propaganda by the Islamic State in Iraq and al Sham (ISIS) and how its propaganda enables ISIS to achieve its objectives; 2.
    [Show full text]
  • Bruksanvisning
    BRUKSANVISNING DCP-770CW Om du måste ringa vår kundtjänst Fyll i följande uppgifter för framtida referens: Modellnummer: DCP-770CW Serienummer: 1 Inköpsdatum: Inköpsort: 1 Serienumret finns på enhetens baksida. Behåll denna bruksanvisning med ditt inköpskvitto som ett permanent bevis på ditt inköp vid fall av stöld, brand eller garantiservice. Registrera din produkt online på http://www.brother.com/registration/ Genom att registrera din produkt hos Brother kommer du att registreras som ursprunglig ägare till produkten. Din registrering hos Brother: kan fungera som bevis på produktens inköpsdatum om du skulle tappa ditt kvitto; och kan stötta ett försäkringskrav vid förlust av en produkt som täcks av en försäkring. © 2007 Brother Industries, Ltd. Sammanställningar och publikation Den här bruksanvisningen har under överinseende av Brother Industries Ltd. sammanställts och publicerats och innehåller de senaste produktbeskrivningarna och specifikationerna. Innehållet i den här bruksanvisningen och specifikationerna för den här produkten kan ändras utan föregående meddelande. Brother förbehåller sig rätten att utan förvarning göra förändringar i specifikationer och detta material. Brother ansvarar inte heller för eventuella skador (inklusive följdskador) som orsakas av tilltron till de presenterade materialen, inklusive, men inte begränsat till, skrivfel eller andra misstag. i EU-deklaration om överensstämmelse enligt R & TTE-direktivet ii EU-deklaration om överensstämmelse enligt R & TTE-direktivet Tillverkare Brother Industries Ltd. 15-1,
    [Show full text]
  • Exploring Users' Perceptions and Expectations of Security
    Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites Dominik Wermke, Nicolas Huaman, Christian Stransky, Niklas Busch, Yasemin Acar, and Sascha Fahl, Leibniz University Hannover https://www.usenix.org/conference/soups2020/presentation/wermke This paper is included in the Proceedings of the Sixteenth Symposium on Usable Privacy and Security. August 10–11, 2020 978-1-939133-16-8 Open access to the Proceedings of the Sixteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites Dominik Wermke Nicolas Huaman Christian Stransky Leibniz University Hannover Leibniz University Hannover Leibniz University Hannover Niklas Busch Yasemin Acar Sascha Fahl Leibniz University Hannover Leibniz University Hannover Leibniz University Hannover Abstract respective systems. These dedicated office tools helped the Cloud Office suites such as Google Docs or Microsoft Office adoption of personal computers over more dedicated or me- 365 are widely used and introduce security and privacy risks chanical systems for word processing. In recent years, another to documents and sensitive user information. Users may not major shift is happening in the world of office applications. know how, where and by whom their documents are accessible With Microsoft Office 365, Google Drive, and projects like and stored, and it is currently unclear how they understand and LibreOffice Online, most major office suites have moved to mitigate risks. We conduct surveys with 200 cloud office users provide some sort of cloud platform that allows for collabo- from the U.S.
    [Show full text]
  • KAYPRO II THEORY of OPERATION by Dana Cotant Micro Cornucopia P.O
    KAYPRO 4 & KAYPRO II THEORY OF OPERATION By Dana Cotant Micro Cornucopia P.O. Box 223 — Bend, OR 97709 CPU VIDEO VIDEO RAM ADDRESS DISPLAY CHARACTER DRIVER MULTIPLEXING BLANKING FLOPPY GENERATION DISK C 0 CLOCKS N VIDEO T ADDRESSING R MAIN VIDEO 0 OP L MEMORY RAM PARALLEL PORTS VIDEO CLOCKS DATA SYSTEM SERIAL CONTROL PARALLEL PORTS PORT DATA ADDRESS PORT SE LECTION CONTROL KAYPRO II BLOCK DIAGRAM cessing unit), video, and 1/0 (input/output). Each section begins with its own block diagram. INTRODUCTION The block diagrams show major subdivisions in the section as separate blocks. The perimeter of each block surrounds the approx- imate area that the circuit occupies on the schematic. The blocks are arranged so their grid coordinates correspond to the coordinates of the related circuitry. The text that follows the block diagram describes the parts and signals responsible for the each circuit's function. This theory of operation is designed to help you use Micro Cor- Where the circuits have been modified since the KayPro was in- nucopia's KayPro schematic and to help you better understand the troduced, both circuit forms are described. system. We assume you have a basic understanding of digital circuits, Following the section description is a list of all integrated circuits but we also do our best to define all of the abbreviated symbols used in that section. (alphabet soup) for those of you whose command of computerese is a A star following a signal label indicates that the signal is active low. bit weak. For example, MREQ* is active low, hut DRQ is active high.
    [Show full text]
  • {PDF EPUB} Lotusscript for Visual Basic Programmers by IBM
    Read Ebook {PDF EPUB} Lotusscript for Visual Basic Programmers by IBM Redbooks Sep 01, 1996 · Lotusscript for Visual Basic Programmers Paperback – September 1, 1996 by IBM Redbooks (Author) See all formats and editions Hide other formats and editions This chapter describes the differences and similarities between Visual Basic Release 4 and LotusScript, which comes as part of Lotus Notes Release 4 and other Lotus products, such as Word Pro, Freelance, and Approach. We will compare the syntactical language portions of LotusScript and Visual Basic. Jun 03, 2003 · LotusScript is an object oriented programming language used by Lotus Notes (since version 4.0) and other IBM Lotus Software products. LotusScript is similar to Visual Basic. Developers familiar with one can easily understand the syntax and structure of code in the other. The major differences between the two are in their respective Integrated Development Environments and in the … SG24-4856-00, LotusScript for Visual Basic Programmers: SG24-4862-00, VisualAge DataAtlas Multiplatform Version 2 and Version 2.5: SG24-4864-00, AS/400 and Novell NetWare Interoperation: SG24-4867-00, TME 10 Cookbook for AIX Systems Management and Networking: SG24-4868-00, RS/6000 SP PSSP 2.2 Technical Presentation Oct 24, 2014 · Visual Basic. Dim PSObject as Object Set PSObject = CreateObject("PCOMM.autECLPS") PSObject.SetConnectionByName("B") LotusScript Extension. dim myPSObj as new lsxECLPS("B") An HACL connection name is a single character from A-Z or a-z. Oct 27, 2008 · this are free from IBM. You can download the Redbook(s) you need to get the job done. The books you need are: SG24-5670- 00 COM Together - with Domino SG24-4856 Lotusscript for Visual Basic Programmers These books are a bit of a tutorial on what you can and cannot do, and in what context(s).
    [Show full text]
  • 2006-Mmrc-99
    21COE, University of Tokyo MMRC Discussion Paper No. 99 MMRC-F-99 Competitive Strategy of Global Firms and Industrial Clusters - Case Study on the Hard Disk Drive (HDD) Industry - Associate Professor, Faculty of Business Administration, Hosei University Researcher, Manufacturing Management Research Center (MMRC), University of Tokyo AMANO Tomofumi September 2006 21COE, University of Tokyo MMRC Discussion Paper No. 99 Competitive Strategy of Global Firms and Industrial Clusters1 – Case Study on the Hard Disk Drive (HDD) Industry – Associate Professor, Faculty of Business Administration, Hosei University Researcher, Manufacturing Management Research Center (MMRC), University of Tokyo 2 AMANO Tomofumi September 2006 1 This report has expanded and revised the content of Chapter 5 of the following book for the purpose of presentation at the GRIPS/MMRC Joint Symposium: Amano Tomofumi, Higashi Ajia No Kokusai Bungyō To Nihon Kigyō: Aratana Kigyō Seichō He No Tenbō (East Asian Linkage and Japanese Firmss: A New Perspective of Corporate Growth), Yuhikaku. 2 Contact:AMANO Tomofumi,Faculty of Business Administration, Hosei University, Address: 2-17-1 Fujimi, Chiyoda-ku, Tokyo 102-8160, Japan, Tel: +81-3-3264-4486, E-mail: [email protected] 1 Tomofumi Amano Introduction This report discusses the location strategies of multinational firms based and the industrial policies of the investment recipient countries. For firms engaged in international business, the timing of foreign investment, selection of the locations, and maintenance and expansion of their local operations are all important strategic matters. Then what can be the strategic nature of foreign investment by firms that have succeeded in strengthening their competitive advantage? What are the unique aspects of the policies taken by recipient countries? This report will focus upon the strategic nature of investment for global firms and the strategic nature of investment-attracting policy for the recipient countries.
    [Show full text]
  • CDS/ISIS Handbook by the Same Authors Which Was Published by the UK Library Association in 1994
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Middlesex University Research Repository The CDS/ISIS for WindowsHandbook Andrew Buxton Alan Hopkinson THE CDS/ISIS FOR WINDOWS Handbook Andrew Buxton Information Systems Manager Institute of Development Studies at the University of Sussex and Alan Hopkinson Head of Library Systems Middlesex University Paris, UNESCO/CI, September 2001 CONTENTS Foreword Preface Aims of this handbook Conventions used in this book 1 Introduction 1 1.1 Versions of CDS/ISIS for DOS and Windows 1.1.1 CDS/ISIS for DOS 1.1.2 CDS/ISIS for Windows 1.1.3 WWWISIS 1.1.4 JavaISIS 1.1.5 Other versions 1.2 General overview of CDS/ISIS for Windows 1.3 Record structure and record linking 1.4 The Windows version: the main menu 1.5 Availability of CDS/ISIS 1.6 Software contributed by users 1.7 User groups 1.8 Exchange formats 2 Overview of Windows 13 2.1 Introduction 2.2 Disk drives 2.3 The mouse 2.4 Files and file names 2.5 Folders 2.6 Features of Windows 2.6.1 The Window Bar 2.6.2 The Task Bar 2.6.3 Tabs 2.6.4 Other features of the bar 2.6.5 Menu Bar 2.6.6 Toolbar 2.7 Dialog boxes 2.7.1 Text entry box 2.7.2 List box 2.7.3 Combo box 2.7.4 Command buttons 2.7.5 Radio buttons 2.7.6 Spin box 2.7.7 Check box 2.8 You need to know!..
    [Show full text]
  • @ LATTICE,INC. It Is
    @ LATTICE,INC. P. O. BOX 3072 ·GLENÉLLYN·LLNOIS 60138· 3l2/858ñ9!5OU1NX9lO29l-2l9O TECHNICAL BULLETIN TB841101.001 DATE: November 1, 1984 PRODUCT: 8086/8088 C Compiler SUBjECT: Known Bugs in Version 2.14 Recently three bugs concerning the Version 2.14 libraries and startup modules have come to light. Two of these pertain to the sensing and use of the 8087 co-processor, and the other concerns the use of the "malloc'° and "getmem" functions under MS-DOS 1 in the s and P models of the compiler. In addition some code was oMtted from the file " main.c". 1. Floating Point Bugs (a) Sensing cjf the 8087 The technique employed in the run-time library to sense the presence of the 8087 co-processor does not work in V2.14 because the 8087 is not initialized prior to the test. Correcting this problem is rather easy. You need only add a line of code to the file °'c.asm" provided with the compiler and reassemble this to replace the current "c.obj". file In the file "c.asm" you will find a line: CALL JLAIN just prior to this line, insert the fcülowing line DB ODBh,OE3h ; FNINIT instruction Then reassemble "c.asm" for each of the memory models as follows: -- Copy "c.asm" to the appropriate model subdirectory (i.e., \lc\s, \lc\d, \lc\p, or \lc\l) so that is in the same directory as "dos.mac" for it the appropriate memory mcdel. -- Use the command 1 @ LATTICE,1NC. W P. O. BOX 3Q72 ·GL£N ELLYN ·ILLNO1S 60138 · 312/858-7950·TWX9lO291-2 masm c; to assemble "c.asm" into "c.obj".
    [Show full text]
  • DECEMBER 1984 Editorial
    SECRET UJUJUVC!JUJUJlb f5l5CBl!JWVU~ !D~~WCB~ Cf l!l U1 v ffil! f] Ill~(! ffi g 00 (!{il C!J l! '7 00 {iJ U1 ~ [1{iJ w~ NOV-DEC 1984 EO 1. 4. (c) P .L. 86- 36 . TRENDS IN HF COMMUNICATIONS (U) •••••••••••• • ••• J.._ ___---..._.1. \\:>............ 1 • SWITCHBOARD: • PAST, PRESENT AND FUTURE (U) •• ~ ............. I • • \ I .......... 5 \ OUT OF MY DEPTH (U) .......................•............•...; .. i .. \ ... ·........ 7 . • • • • • • • • • • • • • • • • • • • • • • ! I ...\ .......... s 1 EXPLORING A DOS DISKETTE (U)................... I ...... :; , ........ 12 HUMAN FACTORS (U) •••••••••••••••••••••••••••••• I l ........ 22 CAN YOU TOP THIS? (U) ........................... E. Leigh Sawyer ... , \~ ••••••• 24 PERSONAL COMPUTING IN A GROUP (U).............. • •••••• 25 FACTION LINE (U) ••• , •••••••••••••••••••••••• • ••• Cal Q. Lator •••••••••••••• • 35 NSA-CROSTIC NO. 59 (U) •••.•••••••••••••••••••••• D.H.W.;.,, ••••••••••••••••• 36 'flllS BOC\'.JMBNT <JONTl.INS <JOBl'JWORB MATl'JRIAh Ghi'tSSIFIEB BY tfSA/SSSM lH 2 SECRET BEGI:a\-SSIFY 0N. 0r igiriet iug Agency's Betezminatior:t Reqaized Declassified and Approved for Release by NSA on 'I 0- '16-2012 pursuant to E 0 . 13526, MOR Case # 54 77B OCID: 4009933 Published by Pl, Techniques and Standards EO 1. 4. ( c) P~L. 86-36 VOL. XI, No. 11-12 NOVEMBER-DECEMBER 1984 Editorial PUBLISHER BOARD OF EDITORS Edi.tor ...•••......_I _______ ... 1(963-3045s .) Product ion .•....•. I .(963-3369s) . : : : :· Collection .••••••..•••• i------.jc963-396ls) Computer Security •: ' •••••• 1 ,(859-6044) Cryptolinguist ics. l 963-1 f03s) Data Systems .•...•.•• ·l ., 963-4,953s) Information Science " • ..... I lc963-.5111s> Puzzles .......... David H. Williams'f(9637'Il03s) Special Research • ..•. Vera R. Filby;! C968'-7119s) Traffic Analysis •. Robert J. Hanyo!<f! (968-3888s) For subscript ions .. , send name and organizat~on to: I w14I i P.L.
    [Show full text]
  • Qt1vn6g6zq.Pdf
    UC San Diego Storage Industry Dynamics and Strategy Title On the Genesis of Organizational Forms: Evidence from the Market for Disk Arrays Permalink https://escholarship.org/uc/item/1vn6g6zq Authors David G. McKendrick Glenn R. Carroll Publication Date 2000-04-01 eScholarship.org Powered by the California Digital Library University of California ON THE GENESIS OF ORGANIZATIONAL FORMS: EVIDENCE FROM THE MARKET FOR DISK ARRAYS David G. McKendrick Information Storage Industry Center University of California at San Diego La Jolla, CA 92093-0519 [email protected] Glenn R. Carroll Haas School of Business University of California at Berkeley Berkeley, CA 94720 [email protected] Report 2000-01 January, 2000 (Revised April 2000) The Information Storage Industry Center Graduate School of International Relations and Pacific Studies University of California 9500 Gilman Drive La Jolla, CA 92093-0519 http://www-irps.ucsd.edu/~sloan/ Copyright © 2000 University of California University of California, San Diego Funding for the Information Storage Industry Center is provided by the Alfred P. Sloan Foundation On the Genesis of Organizational Forms: Evidence from the Market for Disk Arrays David G. McKendrick Information Storage Industry Center University of California at San Diego La Jolla, CA 92093-0519 858-534-9824 [email protected] Glenn R. Carroll Haas School of Business University of California at Berkeley Berkeley, CA 94720 510-642-0829 [email protected] April 2000 2 On the Genesis of Organizational Forms: Evidence from the Market for Disk Drive Arrays* David G. McKendrick and Glenn R. Carroll [email protected] and [email protected] Abstract This paper asks a basic question of organizational evolution: When and where will a new organizational form emerge? Contemporary organization theory proposes two answers.
    [Show full text]
  • Megaplus Conversion Lenses for Digital Cameras
    Section2 PHOTO - VIDEO - PRO AUDIO Accessories LCD Accessories .......................244-245 Batteries.....................................246-249 Camera Brackets ......................250-253 Flashes........................................253-259 Accessory Lenses .....................260-265 VR Tools.....................................266-271 Digital Media & Peripherals ..272-279 Portable Media Storage ..........280-285 Digital Picture Frames....................286 Imaging Systems ..............................287 Tripods and Heads ..................288-301 Camera Cases............................302-321 Underwater Equipment ..........322-327 PHOTOGRAPHIC SOLUTIONS DIGITAL CAMERA CLEANING PRODUCTS Sensor Swab — Digital Imaging Chip Cleaner HAKUBA Sensor Swabs are designed for cleaning the CLEANING PRODUCTS imaging sensor (CMOS or CCD) on SLR digital cameras and other delicate or hard to reach optical and imaging sur- faces. Clean room manufactured KMC-05 and sealed, these swabs are the ultimate Lens Cleaning Kit in purity. Recommended by Kodak and Fuji (when Includes: Lens tissue (30 used with Eclipse Lens Cleaner) for cleaning the DSC Pro 14n pcs.), Cleaning Solution 30 cc and FinePix S1/S2 Pro. #HALCK .........................3.95 Sensor Swabs for Digital SLR Cameras: 12-Pack (PHSS12) ........45.95 KA-11 Lens Cleaning Set Includes a Blower Brush,Cleaning Solution 30cc, Lens ECLIPSE Tissue Cleaning Cloth. CAMERA ACCESSORIES #HALCS ...................................................................................4.95 ECLIPSE lens cleaner is the highest purity lens cleaner available. It dries as quickly as it can LCDCK-BL Digital Cleaning Kit be applied leaving absolutely no residue. For cleaing LCD screens and other optical surfaces. ECLIPSE is the recommended optical glass Includes dual function cleaning tool that has a lens brush on one side and a cleaning chamois on the other, cleaner for THK USA, the US distributor for cleaning solution and five replacement chamois with one 244 Hoya filters and Tokina lenses.
    [Show full text]
  • The Origins of Word Processing and Office Automation
    Remembering the Office of the Future: The Origins of Word Processing and Office Automation Thomas Haigh University of Wisconsin Word processing entered the American office in 1970 as an idea about reorganizing typists, but its meaning soon shifted to describe computerized text editing. The designers of word processing systems combined existing technologies to exploit the falling costs of interactive computing, creating a new business quite separate from the emerging world of the personal computer. Most people first experienced word processing using a word processor, we think of a software as an application of the personal computer. package, such as Microsoft Word. However, in During the 1980s, word processing rivaled and the early 1970s, when the idea of word process- eventually overtook spreadsheet creation as the ing first gained prominence, it referred to a new most widespread business application for per- way of organizing work: an ideal of centralizing sonal computers.1 By the end of that decade, the typing and transcription in the hands of spe- typewriter had been banished to the corner of cialists equipped with technologies such as auto- most offices, used only to fill out forms and matic typewriters. The word processing concept address envelopes. By the early 1990s, high-qual- was promoted by IBM to present its typewriter ity printers and powerful personal computers and dictating machine division as a comple- were a fixture in middle-class American house- ment to its “data processing” business. Within holds. Email, which emerged as another key the word processing center, automatic typewriters application for personal computers with the and dictating machines were rechristened word spread of the Internet in the mid-1990s, essen- processing machines, to be operated by word tially extended word processing technology to processing operators rather than secretaries or electronic message transmission.
    [Show full text]