Computers
Read books online » Computers

Genre Computers. Page - 1

Read books online at the best ebook library worldlibraryebooks.com. Read all the best and interesting books of the Computers genre on your phone or РС.

aiting for printers, and the other half waiting for disk drives.Time is a commodity.

I can envision that little girl walking into the public library with thefollowing request:"I'm doing a school report on the Challenger disaster. I need a videoclip of the explosion, a sound bite of Richard Feynman explainingthe O-ring problem, some neat graphics from NASA, oh, andmaybe some virtual reality mock-ups of the shuttle interior. Canyou put it all on this floppy disk for me, I know it's only 15 minutesbefore you close but, gee, I had band practice." This is whypublic libraries need NREN.

We would do well to remember the words of Ranganathan, whosebasic tenets of good librarianship need just a little updating from1931:

"[Information] is for use.""Every [bit of information], its user.""Every user, [his/her bit of information].""Save the time of the [user].""A [network] is a growing organism."

And so is the public library. A promising future awaits the publiclibrary that can be proactiv

ettledness in the comments of various speakers. For example, Jean BARONAS reviewed the status of several formal standards moving through committees of experts; and Clifford LYNCH encouraged the use of a new guideline for transmitting document images on Internet. Testimony from participants in the National Agricultural Library's (NAL) Text Digitization Program and LC's American Memory project highlighted some of the challenges to the actual creation or interchange of images, including difficulties in converting preservation microfilm to digital form. Donald WATERS reported on the progress of a master plan for a project at Yale University to convert books on microfilm to digital image sets, Project Open Book (POB).

The Workshop offered rather less of an imaging practicum than planned, but "how-to" hints emerge at various points, for example, throughout KENNEY's presentation and in the discussion of arcana such as thresholding and dithering offered by George THOMA and FLEISCHHAUER.

NOTES: (3) Altho

des the title of the instruction, the normal execution time of the instruction, i.e., the time with no indexing and no deferring, the mnemonic code of the instruction, and the operation code number. The notation used requires the following definitions. The contents of a register Q are indicated as C(Q). The address portion of the instruction is indicated by Y. The index register address of an instruction is indicated by x. The effective address of an operand is indicated by Z. Z may be equal to Y or it may be Y as modified by deferring or by indexing.

Indexable Memory Instructions

Arithmetic Instructions

Add (10 usec.) add x Y Operation Code 40

The new C(AC) are the sum of C(Z) and the original C(AC). The C(Z) are unchanged. The addition is performed with 1's complement arithmetic.

If the sum exceeds the capacity of the Accumulator Register, the overflow flip-flop will be set (see Skip Group instructions).

Subtract (10 usec.) sub x Y Operation Code 4

| +---------------------------------------------------------------------------+

The above command should return the following for serial port 1:

+---------------------------------------------------------------------------+ |/dev/ttyS1, UART: 16550A, Port: 0x2f8, IRQ: 3 | +---------------------------------------------------------------------------+

The port and IRQ numbers should match the information placed in the syslog by the ACP module when it was loaded: kernel: Mwave Modem, UART settings IRQ 0x3 IO 0x2f8

If the information returned by setserial indicates that the UART is 'unknown' or if the IRQ and I/O resources do not match what you have in the syslog, you will need to reconfigure. Check the setserial man pages to learn how to setup the resources on your ttySx to match what appears in the syslog output.

If you have problems running setserial, you may have a resource conflict. Before using insmod mwave, check /proc/ioports and /proc/interrupts to make sure the resources

ADSM is a network-based backup system, sold by IBM, in use at many organizations. There are clients for a large variety of systems (different UNIX brands, Windows, Novell, Mac, Windows NT). Unfortunately, at the time of this writing, there is no native Linux version.

You will have to use the SCO binary, and install the iBCS2-emulator for running ADSM. This description is for ADSM v2r1.

At the time if this writing, I am only aware of a version which works with the i386 version of Linux.

2. Installing the iBCS module

The iBCS2 module is available from ftp://tsx-11.mit.edu/pub/linux/BETA/ibcs2. If you are running kernel version 1.2.13, get ibcs-1.2-950721.tar.gz, unpac it and apply the patches ibcs-1.2-950808.patch1 and ibcs-1.2-950828.patch2. You can then type "make" and install the iBCS modlue with "insmod".

For a 2.0 kernel version, get

x system to meet the needs of local community organizations. Of course, the installation process must include training the user community to use the system and adequate documentation for ongoing maintenance.

· Discus the Linux Advocacy mini-HOWTO at a meeting. Brainstorm and submit new ideas.

8. Vendor Relations

· When contemplating a hardware purchase, ask the vendor about Linux support and other user's experiences with the product in a Linux environment.

· Consider supporting vendors that sell Linux based products and services. Encourage them to have their product listed in the Linux Commercial HOWTO (http://www.linuxdoc.org/HOWTO/Commercial- HOWTO.html).

· Support vendors that donate a portion of their income to organizations such as the Free Software Foundation (http://www.gnu.org/help/help.html), the Linux Development Grant Fund (http://li.org/li/fund/grants.shtml), the XFree86 Project (http://www.xfree86.org/donations.html) or Soft

to literary works is vital for enabling the sharing of knowledge, art, music and culture.

Regulatory Environment

Project Gutenberg must adhere to U.S. laws involving operation as a not-for-profit corporation. However, these regulations are not sector specific. Project Gutenberg must be exceedingly careful to respect U.S. copyright laws regarding the works that they digitise and make available over the Internet. However, once a publication has been verified as being in the public domain, there are no other legal restrictions affecting Project Gutenberg.

Preservation Activity

Policies and Strategies

Project Gutenberg scans literary works and employs OCR technology to create eBooks. In some cases, eBooks are typed in by hand. The eBooks are then edited by a team of volunteer proof-readers. There are procedures and guidelines available online for volunteers to consult when scanning and editing texts for Project Gutenberg to ensure that all eBooks follow a standard format. O

ere Tom Wolfe to have written it as a non-fiction title. That it was inspired by actual characters and events, and turned by Wolfe's expert hands into a compelling modern-day tale of murder and mortality, were enough to convince me that I could pull off the same sort of magic with my own "what if" scenario, swapping Silicon Valley for New York, and the personal computer business for bond trading.

That this was my first attempt at writing a novel goes a long way toward explaining the earliest rejections of the work, then titled "Silicon Dreams," by editors unlucky enough to have had it land with a thud on their desks. Somehow I'd lost sight of Mr. Wolfe's excellent illustration and found myself mimicking, all at once, the likes of Sidney Sheldon, Arthur Hailey, Jackie Collins, and, believe it or not, Stephen King (who happens to be my favorite mainstream read). With so many influences at play in the already befuddled head of an aspiring young writer with dreams of hitting the number one spot on all of t

inlecco.it/tiflosoft/] http:// www.tinlecco.it/tiflosoft/.

-----

3.1.5.2. Braille Translation Software

The following Braille translation applications are available for download:

* Brass is a new program that combines speech and Braille output. The current version is still in testing and can be downloaded at: [http:// www.butenuth.onlinehome.de/blinux/] http://www.butenuth.onlinehome.de/ blinux/.

  * BrLTTY supports parallel port and USB Braille displays and provides access to the Linux console. It drives the terminal and provides complete screen review capabilities. It is available at: [http://dave.mielke.cc/ brltty/] http://dave.mielke.cc/brltty/.

  * NFBTrans is a freeware Braille translator written by the National Federation for the Blind (NFB). Software packages are available for download at: [http://www.nfb.org/nfbtrans.htm] http://www.nfb.org/ nfbtrans.htm.

-----

3.1.6. Cursors for X Windows

Chang

Malaysia or a number of countries in Latin America, have a very dynamic telecommunication policy. In the documents prepared for the second Conference on the Development of Telecommunications in the World, organized by the International Telecommunication Union (ITU) from March 23 to April 1, 1998 in Valletta, Malta, it was stated that several developing countries, such as Botswana, China, Chile, Thailand, Hungary, Ghana and Mauritius, succeeded in extending the density and the quality of their phone services during the last three years. On the other hand, the situation was getting worse for the poorest countries.

During the ILO Symposium on Multimedia Convergence held in January 1997, Wilfred Kiboro, Managing Director and Chief Executive of Nation Printers and Publishers Ltd., Kenya, stated:

"Information technology needs to be brought to affordable levels. I have a dream that perhaps in our lifetime in Africa, we will see villagers being able to access [the] Internet from their rural villages wh