Friday, April 10, 2009
"Robots ' story"
Featured Story
Robots
How science fiction has become science fact; robot wars, how you can join.
A robot can be defined as a programmable, self-controlled device consisting of electronic, electrical, or mechanical units. More generally, it is a machine that functions in place of a living agent. Robots are especially desirable for certain work functions because, unlike humans, they never get tired; they can endure physical conditions that are uncomfortable or even dangerous; they can operate in airless conditions; they do not get bored by repetition; and they cannot be distracted from the task at hand.
The concept of robots is a very old one yet the actual word robot was invented in the 20th century from the Czechoslovakian word robota or robotnik meaning slave, servant, or forced labor. Robots don't have to look or act like humans but they do need to be flexible so they can perform different tasks.
Early industrial robots handled radioactive material in atomic labs and were called master/slave manipulators. They were connected together with mechanical linkages and steel cables. Remote arm manipulators can now be moved by push buttons, switches or joysticks.
Current robots have advanced sensory systems that process information and appear to function as if they have brains. Their "brain" is actually a form of computerized artificial intelligence (AI). AI allows a robot to perceive conditions and decide upon a course of action based on those conditions.
A robot can include any of the following components:
effectors - "arms", "legs", "hands", "feet"
sensors - parts that act like senses and can detect objects or things like heat and light and convert the object information into symbols that computers understand
computer - the brain that contains instructions called algorithms to control the robot
equipment - this includes tools and mechanical fixtures
Characteristics that make robots different from regular machinery are that robots usually function by themselves, are sensitive to their environment, adapt to variations in the environment or to errors in prior performance, are task oriented and often have the ability to try different methods to accomplish a task.
Common industrial robots are generally heavy rigid devices limited to manufacturing. They operate in precisely structured environments and perform single highly repetitive tasks under preprogrammed control. There were an estimated 720,000 industrial robots in 1998.
Teleoperated robots are used in semi-structured environments such as undersea and nuclear facilities. They perform non-repetitive tasks and have limited real-time control.
Robot Timeline
~270BC an ancient Greek engineer named Ctesibus made organs and water clocks with movable figures.
1818 - Mary Shelley wrote "Frankenstein" which was about a frightening artificial lifeform created by Dr. Frankenstein.
1921 - The term "robot" was first used in a play called "R.U.R." or "Rossum's Universal Robots" by the Czech writer Karel Capek. The plot was simple: man makes robot then robot kills man!
1941 - Science fiction writer Isaac Asimov first used the word "robotics" to describe the technology of robots and predicted the rise of a powerful robot industry.
1942 - Asimov wrote "Runaround", a story about robots which contained the "Three Laws of Robotics":
A robot may not injure a human, or, through inaction, allow a human being to come to harm.
A robot must obey the orders it by human beings except where such orders would conflic with the First Law.
A robot must protect its own existence as long as such protection does not conflict withe the First or Second Law.
1948 - "Cybernetics", an influence on artificial intelligence research was published by Norbert Wiener
1956 - George Devol and Joseph Engelberger formed the world's first robot company.
1959 - Computer-assisted manufacturingg was demonstrated at the Servomechanisms Lab at MIT.
1961 - The first industrial robot was online in a General Motors automobile factory in New Jersey. It was called UNIMATE.
1963 - The first artificial robotic arm to be controlled by a computer was designed. The Rancho Arm was designed as a tool for the handicapped and it's six joints gave it the flexibility of a human arm.
1965 - DENDRAL was the first expert system or program designed to execute the accumulated knowledge of subject experts.
1968 - The octopus-like Tentacle Arm was developed by Marvin Minsky.
1969 - The Stanford Arm was the first electrically powered, computer-controlled robot arm.
1970 - Shakey was introduced as the first mobile robot controlled by artificial intellence. It was produced by SRI International.
1974 - A robotic arm (the Silver Arm) that performed small-parts assembly using feedback from touch and pressure sensors was designed.
1979 - The Standford Cart crossed a chair-filled room without human assistance. The cart had a tv camera mounted on a rail which took pictures from multiple angles and relayed them to a computer. The computer analyzed the distance between the cart and the obstacles.
Information provided by NASA/Rover Ranch
Bill Gates chairman. microsoft corp,
William (Bill) H. Gates is chairman of Microsoft Corporation, the worldwide leader in software, services and solutions that help people and businesses realize their full potential. Microsoft had revenues of US$51.12 billion for the fiscal year ending June 2007, and employs more than 78,000 people in 105 countries and regions.
On June 15, 2006, Microsoft announced that effective July 2008 Gates will transition out of a day-to-day role in the company to spend more time on his global health and education work at the Bill & Melinda Gates Foundation. After July 2008 Gates will continue to serve as Microsoft’s chairman and an advisor on key development projects. The two-year transition process is to ensure that there is a smooth and orderly transfer of Gates’ daily responsibilities. Effective June 2006, Ray Ozzie has assumed Gates’ previous title as chief software architect and is working side by side with Gates on all technical architecture and product oversight responsibilities at Microsoft. Craig Mundie has assumed the new title of chief research and strategy officer at Microsoft and is working closely with Gates to assume his responsibility for the company’s research and incubation efforts.
Born on Oct. 28, 1955, Gates grew up in Seattle with his two sisters. Their father, William H. Gates II, is a Seattle attorney. Their late mother, Mary Gates, was a schoolteacher, University of Washington regent, and chairwoman of United Way International.
Gates attended public elementary school and the private Lakeside School. There, he discovered his interest in software and began programming computers at age 13.
In 1973, Gates entered Harvard University as a freshman, where he lived down the hall from Steve Ballmer, now Microsoft's chief executive officer. While at Harvard, Gates developed a version of the programming language BASIC for the first microcomputer - the MITS Altair.
In his junior year, Gates left Harvard to devote his energies to Microsoft, a company he had begun in 1975 with his childhood friend Paul Allen. Guided by a belief that the computer would be a valuable tool on every office desktop and in every home, they began developing software for personal computers. Gates' foresight and his vision for personal computing have been central to the success of Microsoft and the software industry.
Under Gates' leadership, Microsoft's mission has been to continually advance and improve software technology, and to make it easier, more cost-effective and more enjoyable for people to use computers. The company is committed to a long-term view, reflected in its investment of approximately $7.1 billion on research and development in the 2007 fiscal year.
In 1999, Gates wrote Business @ the Speed of Thought, a book that shows how computer technology can solve business problems in fundamentally new ways. The book was published in 25 languages and is available in more than 60 countries. Business @ the Speed of Thought has received wide critical acclaim, and was listed on the best-seller lists of the New York Times, USA Today, the Wall Street Journal and Amazon.com. Gates' previous book, The Road Ahead, published in 1995, held the No. 1 spot on the New York Times' bestseller list for seven weeks.
Gates has donated the proceeds of both books to non-profit organizations that support the use of technology in education and skills development.
In addition to his love of computers and software, Gates founded Corbis, which is developing one of the world's largest resources of visual information - a comprehensive digital archive of art and photography from public and private collections around the globe. He is also a member of the board of directors of Berkshire Hathaway Inc., which invests in companies engaged in diverse business activities.
Philanthropy is also important to Gates. He and his wife, Melinda, have endowed a foundation with more than $28.8 billion (as of January 2005) to support philanthropic initiatives in the areas of global health and learning, with the hope that in the 21st century, advances in these critical areas will be available for all people. The Bill and Melinda Gates Foundation has committed more than $3.6 billion to organizations working in global health; more than $2 billion to improve learning opportunities, including the Gates Library Initiative to bring computers, Internet Access and training to public libraries in low-income communities in the United States and Canada; more than $477 million to community projects in the Pacific Northwest; and more than $488 million to special projects and annual giving campaigns.
Gates was married on Jan. 1, 1994, to Melinda French Gates. They have three children. Gates is an avid reader, and enjoys playing golf and bridge.
Thursday, April 9, 2009
"network"
A network is a collection of computers and devices connected to each other. The network allows computers to communicate with each other and share resources and information. The Advanced Research Projects Agency (ARPA) designed "Advanced Research Projects Agency Network" (ARPANET) for the United States Department of Defense. It was the first computer network in the world in late 1960s and early 1970s.[1]
Network classification
The following list presents categories used for classifying networks.
Connection method
Computer networks can also be classified according to the hardware and software technology that is used to interconnect the individual devices in the network, such as Optical fiber, Ethernet, Wireless LAN, HomePNA, Power line communication or G.hn.
Ethernet uses physical wiring to connect devices. Frequently deployed devices include hubs, switches, bridges and/or routers.
Wireless LAN technology is designed to connect devices without wiring. These devices use radio waves or infrared signals as a transmission medium.
ITU-T G.hn technology uses existing home wiring (coaxial cable, phone lines and power lines) to create a high-speed (up to 1 Gigabit/s) local area network.
Scale
Networks are often classified as Local Area Network (LAN), Wide Area Network (WAN), Metropolitan Area Network (MAN), Personal Area Network (PAN), Virtual Private Network (VPN), Campus Area Network (CAN), Storage Area Network (SAN), etc. depending on their scale, scope and purpose. Usage, trust levels and access rights often differ between these types of network - for example, LANs tend to be designed for internal use by an organization's internal systems and employees in individual physical locations (such as a building), while WANs may connect physically separate parts of an organization to each other and may include connections to third parties.
Functional relationship (network architecture)
Computer networks may be classified according to the functional relationships which exist among the elements of the network, e.g., Active Networking, Client-server and Peer-to-peer (workgroup) architecture.
Network topology
Main article: Network topology
Computer networks may be classified according to the network topology upon which the network is based, such as bus network, star network, ring network, mesh network, star-bus network, tree or hierarchical topology network. Network topology signifies the way in which devices in the network see their logical relations to one another. The use of the term "logical" here is significant. That is, network topology is independent of the "physical" layout of the network. Even if networked computers are physically placed in a linear arrangement, if they are connected via a hub, the network has a Star topology, rather than a bus topology. In this regard the visual and operational characteristics of a network are distinct; the logical network topology is not necessarily the same as the physical layout. Networks may be classified based on the method of data used to convey the data, these include digital and analog networks.
Types of networks
Below is a list of the most common types of computer networks in order of scale.
Personal area network
Main article: Personal area network
A personal area network (PAN) is a computer network used for communication among computer devices close to one person. Some examples of devices that are used in a PAN are printers, fax machines, telephones, PDAs and scanners. The reach of a PAN is typically about 20-30 feet (approximately 6-9 meters), but this is expected to increase with technology improvements.
Local area network
Main article: Local area network
A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. Current wired LANs are most likely to be based on Ethernet technology, although new standards like ITU-T G.hn also provide a way to create a wired LAN using existing home wires (coaxial cables, phone lines and power lines)[2].
For example, a library may have a wired or wireless LAN for users to interconnect local devices (e.g., printers and servers) and to connect to the internet. On a wired LAN, PCs in the library are typically connected by category 5 (Cat5) cable, running the IEEE 802.3 protocol through a system of interconnected devices and eventually connect to the Internet. The cables to the servers are typically on Cat 5e enhanced cable, which will support IEEE 802.3 at 1 Gbit/s. A wireless LAN may exist using a different IEEE protocol, 802.11b, 802.11g or possibly 802.11n. The staff computers (bright green in the figure) can get to the color printer, checkout records, and the academic network and the Internet. All user computers can get to the Internet and the card catalog. Each workgroup can get to its local printer. Note that the printers are not accessible from outside their workgroup.
Typical library network, in a branching tree topology and controlled access to resourcesAll interconnected devices must understand the network layer (layer 3), because they are handling multiple subnets (the different colors). Those inside the library, which have only 10/100 Mbit/s Ethernet connections to the user device and a Gigabit Ethernet connection to the central router, could be called "layer 3 switches" because they only have Ethernet interfaces and must understand IP. It would be more correct to call them access routers, where the router at the top is a distribution router that connects to the Internet and academic networks' customer access routers.
The defining characteristics of LANs, in contrast to WANs (wide area networks), include their higher data transfer rates, smaller geographic range, and lack of a need for leased telecommunication lines. Current Ethernet or other IEEE 802.3 LAN technologies operate at speeds up to 10 Gbit/s. This is the data transfer rate. IEEE has projects investigating the standardization of 100 Gbit/s, and possibly 400 Gbit/s.
Campus area network
Main article: Campus area network
A campus area network (CAN) is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area. It can be considered one form of a metropolitan area network, specific to an academic setting.
In the case of a university campus-based campus area network, the network is likely to link a variety of campus buildings including; academic departments, the university library and student residence halls. A campus area network is larger than a local area network but smaller than a wide area network (WAN) (in some cases).
The main aim of a campus area network is to facilitate students accessing internet and university resources. This is a network that connects two or more LANs but that is limited to a specific and contiguous geographical area such as a college campus, industrial complex, office building, or a military base. A CAN may be considered a type of MAN (metropolitan area network), but is generally limited to a smaller area than a typical MAN. This term is most often used to discuss the implementation of networks for a contiguous area. This should not be confused with a Controller Area Network. A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings. In TCP/IP networking, a LAN is often but not always implemented as a single IP subnet.
Metropolitan area network
Main article: Metropolitan area network
A metropolitan area network (MAN) is a network that connects two or more local area networks or campus area networks together but does not extend beyond the boundaries of the immediate town/city. Routers, switches and hubs are connected to create a metropolitan area network.
Wide area network
Main article: Wide Area Network
A wide area network (WAN) is a computer network that covers a broad area (i.e. any network whose communications links cross metropolitan, regional, or national boundaries [1]). Less formally, a WAN is a network that uses routers and public communications links [1]. Contrast with personal area networks (PANs), local area networks (LANs), campus area networks (CANs), or metropolitan area networks (MANs), which are usually limited to a room, building, campus or specific metropolitan area (e.g., a city) respectively. The largest and most well-known example of a WAN is the Internet. A WAN is a data communications network that covers a relatively broad geographic area (i.e. one city to another and one country to another country) and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer.
Global area network
Main article: IEEE 802.20
A global area networks (GAN) specification is in development by several groups, and there is no common definition. In general, however, a GAN is a model for supporting mobile communications across an arbitrary number of wireless LANs, satellite coverage areas, etc. The key challenge in mobile communications is "handing off" the user communications from one local coverage area to the next. In IEEE Project 802, this involves a succession of terrestrial WIRELESS local area networks (WLAN).[3]
Virtual private network
Main article: Virtual Private Network
A virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. The link-layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features.
A VPN may have best-effort performance, or may have a defined service level agreement (SLA) between the VPN customer and the VPN service provider. Generally, a VPN has a topology more complex than point-to-point.
A VPN allows computer users to appear to be editing from an IP address location other than the one which connects the actual computer to the Internet.
Internetwork
Main article: Internetwork
Internetworking involves connecting two or more distinct computer networks or network segments via a common routing technology. The result is called an internetwork (often shortened to internet). Two or more networks or network segments connected using devices that operate at layer 3 (the 'network' layer) of the OSI Basic Reference Model, such as a router. Any interconnection among or between public, private, commercial, industrial, or governmental networks may also be defined as an internetwork.
In modern practice, the interconnected networks use the Internet Protocol. There are at least three variants of internetwork, depending on who administers and who participates in them:
Intranet
Extranet
Internet
Intranets and extranets may or may not have connections to the Internet. If connected to the Internet, the intranet or extranet is normally protected from being accessed from the Internet without proper authorization. The Internet is not considered to be a part of the intranet or extranet, although it may serve as a portal for access to portions of an extranet.
Intranet
Main article: Intranet
An intranet is a set of networks, using the Internet Protocol and IP-based tools such as web browsers and file transfer applications, that is under the control of a single administrative entity. That administrative entity closes the intranet to all but specific, authorized users. Most commonly, an intranet is the internal network of an organization. A large intranet will typically have at least one web server to provide users with organizational information.
Extranet
Main article: Extranet
An extranet is a network or internetwork that is limited in scope to a single organization or entity but which also has limited connections to the networks of one or more other usually, but not necessarily, trusted organizations or entities (e.g., a company's customers may be given access to some part of its intranet creating in this way an extranet, while at the same time the customers may not be considered 'trusted' from a security standpoint). Technically, an extranet may also be categorized as a CAN, MAN, WAN, or other type of network, although, by definition, an extranet cannot consist of a single LAN; it must have at least one connection with an external network.
Internet
Main article: Internet
The Internet is a specific internetwork. It consists of a worldwide interconnection of governmental, academic, public, and private networks based upon the networking technologies of the Internet Protocol Suite. It is the successor of the Advanced Research Projects Agency Network (ARPANET) developed by DARPA of the U.S. Department of Defense. The Internet is also the communications backbone underlying the World Wide Web (WWW). The 'Internet' is most commonly spelled with a capital 'I' as a proper noun, for historical reasons and to distinguish it from other generic internetworks.
Participants in the Internet use a diverse array of methods of several hundred documented, and often standardized, protocols compatible with the Internet Protocol Suite and an addressing system (IP Addresses) administered by the Internet Assigned Numbers Authority and address registries. Service providers and large enterprises exchange information about the reachability of their address spaces through the Border Gateway Protocol (BGP), forming a redundant worldwide mesh of transmission paths.
Basic hardware components
All networks are made up of basic hardware building blocks to interconnect network nodes, such as Network Interface Cards (NICs), Bridges, Hubs, Switches, and Routers. In addition, some method of connecting these building blocks is required, usually in the form of galvanic cable (most commonly Category 5 cable). Less common are microwave links (as in IEEE 802.12) or optical cable ("optical fiber"). An ethernet card may also be required.
Network interface cards
Main article: Network card
A network card, network adapter or NIC (network interface card) is a piece of computer hardware designed to allow computers to communicate over a computer network. It provides physical access to a networking medium and often provides a low-level addressing system through the use of MAC addresses.
Repeaters
Main article: Repeater
A repeater is an electronic device that receives a signal and retransmits it at a higher power level, or to the other side of an obstruction, so that the signal can cover longer distances without degradation. In most twisted pair Ethernet configurations, repeaters are required for cable which runs longer than 100 meters.
Hubs
Main article: Network hub
A hub contains multiple ports. When a packet arrives at one port, it is copied unmodified to all ports of the hub for transmission. The destination address in the frame is not changed to a broadcast address.[4]
Bridges
Main article: Network bridge
A network bridge connects multiple network segments at the data link layer (layer 2) of the OSI model. Bridges do not promiscuously copy traffic to all ports, as hubs do, but learn which MAC addresses are reachable through specific ports. Once the bridge associates a port and an address, it will send traffic for that address only to that port. Bridges do send broadcasts to all ports except the one on which the broadcast was received.
Bridges learn the association of ports and addresses by examining the source address of frames that it sees on various ports. Once a frame arrives through a port, its source address is stored and the bridge assumes that MAC address is associated with that port. The first time that a previously unknown destination address is seen, the bridge will forward the frame to all ports other than the one on which the frame arrived.
Bridges come in three basic types:
Local bridges: Directly connect local area networks (LANs)
Remote bridges: Can be used to create a wide area network (WAN) link between LANs. Remote bridges, where the connecting link is slower than the end networks, largely have been replaced by routers.
Wireless bridges: Can be used to join LANs or connect remote stations to LANs.
Switches
Main article: Network switch
A switch is a device that forwards and filters OSI layer 2 datagrams (chunk of data communication) between ports (connected cables) based on the MAC addresses in the packets.[5] This is distinct from a hub in that it only forwards the packets to the ports involved in the communications rather than all ports connected. Strictly speaking, a switch is not capable of routing traffic based on IP address (OSI Layer 3) which is necessary for communicating between network segments or within a large or complex LAN. Some switches are capable of routing based on IP addresses but are still called switches as a marketing term. A switch normally has numerous ports, with the intention being that most or all of the network is connected directly to the switch, or another switch that is in turn connected to a switch.[6]
Switch is a marketing term that encompasses routers and bridges, as well as devices that may distribute traffic on load or by application content (e.g., a Web URL identifier). Switches may operate at one or more OSI model layers, including physical, data link, network, or transport (i.e., end-to-end). A device that operates simultaneously at more than one of these layers is called a multilayer switch.
Overemphasizing the ill-defined term "switch" often leads to confusion when first trying to understand networking. Many experienced network designers and operators recommend starting with the logic of devices dealing with only one protocol level, not all of which are covered by OSI. Multilayer device selection is an advanced topic that may lead to selecting particular implementations, but multilayer switching is simply not a real-world design concept.
Routers
Main article: Router
Different type of "computer viruses"
Computer Virus is a kind of malicious software written intentionally to enter a computer without the user’s permission or knowledge, with an ability to replicate itself, thus continuing to spread. Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system. A virus should never be assumed harmless and left on a system. Most common types of viruses are mentioned below:
Resident Viruses
This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc.
Examples include: Randex, CMJ, Meve, and MrKlunky.
Direct Action Viruses
The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXEC.BAT file PATH. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted.
Overwrite Viruses
Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected.
The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.
Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.
Boot Virus
This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk.
The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive.
Examples of boot viruses include: Polyboot.B, AntiEXE.
Macro Virus
Macro viruses infect files that are created using certain applications or programs that contain macros. These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one.
Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.
Directory Virus
Directory viruses change the paths that indicate the location of a file. By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus.
Once infected it becomes impossible to locate the original files.
Polymorphic Virus
Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system.
This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves.
Examples include: Elkern, Marburg, Satan Bug, and Tuareg.
File Infectors
This type of virus infects programs or executable files (files with an .EXE or .COM extension). When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out. The majority of existing viruses belong to this category, and can be classified depending on the actions that they carry out.
Companion Viruses
Companion viruses can be considered file infector viruses like resident or direct action types. They are known as companion viruses because once they get into the system they "accompany" the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses).
Some examples include: Stator, Asimov.1539, and Terrax.1069
FAT Virus
The file allocation table or FAT is the part of a disk used to connect information and is a vital part of the normal functioning of the computer.
This type of virus attack can be especially dangerous, by preventing access to certain sections of the disk where important files are stored. Damage caused can result in information losses from individual files or even entire directories.
Worms
A worm is a program very similar to a virus; it has the ability to self-replicate, and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses.
Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.
Trojans or Trojan Horses
Another unsavory breed of malicious code are Trojans or Trojan horses, which unlike viruses do not reproduce by infecting other files, nor do they self-replicate like worms.
Logic Bombs
They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs.
Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive
Augusta Ada Lovelace
(née Byron), 1815-1852
Augusta Ada Byron was born on 10 December 1815. She was named after Augusta, Byron's half sister, who had been his mistress. After Byron had left for the Continent with a parting shot - 'When shall we three meet again?' - Ada was brought up by her mother.
The lines from Childe Harold were very well known:-
`Is thy face like thy mother's, my fair child!
Ada! sole daughter of my house and of my heart?
When last I saw thy young blue eyes they smiled'
And then we parted,-not as now we part,
but with a hope.'
and as Byron's daughter Ada acquired the romance that attached to everyone associated with that magnificent poete maudit.
In 1833 Ada met Babbage and was fascinated with both him and his Engines. Later Ada became a competent student of mathematics, which was most unusual for a woman at the time. She translated a paper on Babbage's Engines by General Menabrea, later to be prime minister of the newly united Italy. Under Babbage's careful supervision Ada added extensive notes (c.f. Science and Reform, Selected Works of Charles Babbage, by Anthony Hyman) which constitute the best contemporary description of the Engines, and the best account we have of Babbage's views on the general powers of the Engines. Beautiful, charming, temperamental, an aristocratic hostess, mathematicians of the time thought her a magnificent addition to their number.
It is often suggested that Ada was the world's first programmer. This is nonsense: Babbage was, if programmer is the right term. After Babbage came a mathematical assistant of his, Babbage's eldest son, Herschel, and possibly Babbage's two younger sons. Ada was probably the fourth, fifth or six person to write the programmes. Moreover all she did was rework some calculations Babbage had carried out years earlier. Ada's calculations were student exercises. Ada Lovelace figures in the history of the Calculating Engines as Babbage's interpretress, his `fairy lady'. As such her achievement was remarkable.
References
Doris Langley Moore, Ada, Countess of Lovelace, Byron's legitimate daughter, John Murray, London, 1977.
By the chronicler of the Byron family. Concentrates on Ada's mother, Lady Noel Byron.
Dorothy Stein, Ada, A Life and a Legacy, MIT, Mass. 1984.
A feminist view.
Betty Alexandra Toole, Ada, the Enchantress of Numbers, Strawberry Press, 227, Strawberry Drive, Mill Valley, Marin County, CA 94941, 1992.
A felicitous selection of Ada's letters.
operating system
The most important program that runs on a computer. Every general-purpose computer must have an operating system to run other programs. Operating systems perform basic tasks, such as recognizing input from the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral devices such as disk drives and printers.
For large systems, the operating system has even greater responsibilities and powers. It is like a traffic cop -- it makes sure that different programs and users running at the same time do not interfere with each other. The operating system is also responsible for security, ensuring that unauthorized users do not access the system.
Operating systems can be classified as follows:
multi-user : Allows two or more users to run programs at the same time. Some operating systems permit hundreds or even thousands of concurrent users.
multiprocessing : Supports running a program on more than one CPU.
multitasking : Allows more than one program to run concurrently.
multithreading : Allows different parts of a single program to run concurrently.
real time: Responds to input instantly. General-purpose operating systems, such as DOS and UNIX, are not real-time.
Operating systems provide a software platform on top of which other programs, called application programs, can run. The application programs must be written to run on top of a particular operating system. Your choice of operating system, therefore, determines to a great extent the applications you can run. For PCs, the most popular operating systems are DOS, OS/2, and Windows, but others are available, such as Linux.
As a user, you normally interact with the operating system through a set of commands. For example, the DOS operating system contains commands such as COPY and RENAME for copying files and changing the names of files, respectively. The commands are accepted and executed by a part of the operating system called the command processor or command line interpreter. Graphical user interfaces allow you to enter commands by pointing and clicking at objects that appear on the screen.
Gottfried Leibniz was the son of Friedrich Leibniz, a professor of moral philosophy at Leipzig. Friedrich Leibniz [3]:-
...was evidently a competent though not original scholar, who devoted his time to his offices and to his family as a pious, Christian father.
Leibniz's mother was Catharina Schmuck, the daughter of a lawyer and Friedrich Leibniz's third wife. However, Friedrich Leibniz died when Leibniz was only six years old and he was brought up by his mother. Certainly Leibniz learnt his moral and religious values from her which would play an important role in his life and philosophy.
At the age of seven, Leibniz entered the Nicolai School in Leipzig. Although he was taught Latin at school, Leibniz had taught himself far more advanced Latin and some Greek by the age of 12. He seems to have been motivated by wanting to read his father's books. As he progressed through school he was taught Aristotle's logic and theory of categorising knowledge. Leibniz was clearly not satisfied with Aristotle's system and began to develop his own ideas on how to improve on it. In later life Leibniz recalled that at this time he was trying to find orderings on logical truths which, although he did not know it at the time, were the ideas behind rigorous mathematical proofs. As well as his school work, Leibniz studied his father's books. In particular he read metaphysics books and theology books from both Catholic and Protestant writers.
In 1661, at the age of fourteen, Leibniz entered the University of Leipzig. It may sound today as if this were a truly exceptionally early age for anyone to enter university, but it is fair to say that by the standards of the time he was quite young but there would be others of a similar age. He studied philosophy, which was well taught at the University of Leipzig, and mathematics which was very poorly taught. Among the other topics which were included in this two year general degree course were rhetoric, Latin, Greek and Hebrew. He graduated with a bachelors degree in 1663 with a thesis De Principio Individui (On the Principle of the Individual) which:-
... emphasised the existential value of the individual, who is not to be explained either by matter alone or by form alone but rather by his whole being.
In this there is the beginning of his notion of "monad". Leibniz then went to Jena to spend the summer term of 1663.
At Jena the professor of mathematics was Erhard Weigel but Weigel was also a philosopher and through him Leibniz began to understand the importance of the method of mathematical proof for subjects such as logic and philosophy. Weigel believed that number was the fundamental concept of the universe and his ideas were to have considerable influence of Leibniz. By October 1663 Leibniz was back in Leipzig starting his studies towards a doctorate in law. He was awarded his Master's Degree in philosophy for a dissertation which combined aspects of philosophy and law studying relations in these subjects with mathematical ideas that he had learnt from Weigel. A few days after Leibniz presented his dissertation, his mother died.
After being awarded a bachelor's degree in law, Leibniz worked on his habilitation in philosophy. His work was to be published in 1666 as Dissertatio de arte combinatoria (Dissertation on the combinatorial art). In this work Leibniz aimed to reduce all reasoning and discovery to a combination of basic elements such as numbers, letters, sounds and colours.
Despite his growing reputation and acknowledged scholarship, Leibniz was refused the doctorate in law at Leipzig. It is a little unclear why this happened. It is likely that, as one of the younger candidates and there only being twelve law tutorships available, he would be expected to wait another year. However, there is also a story that the Dean's wife persuaded the Dean to argue against Leibniz, for some unexplained reason. Leibniz was not prepared to accept any delay and he went immediately to the University of Altdorf where he received a doctorate in law in February 1667 for his dissertation De Casibus Perplexis (On Perplexing Cases).
Leibniz declined the promise of a chair at Altdorf because he had very different things in view. He served as secretary to the Nuremberg alchemical society for a while (see [187]) then he met Baron Johann Christian von Boineburg. By November 1667 Leibniz was living in Frankfurt, employed by Boineburg. During the next few years Leibniz undertook a variety of different projects, scientific, literary and political. He also continued his law career taking up residence at the courts of Mainz before 1670. One of his tasks there, undertaken for the Elector of Mainz, was to improve the Roman civil law code for Mainz but [3]:-
Leibniz was also occupied by turns as Boineburg's secretary, assistant, librarian, lawyer and advisor, while at the same time a personal friend of the Baron and his family.
Boineburg was a Catholic while Leibniz was a Lutheran but Leibniz had as one of his lifelong aims the reunification of the Christian Churches and [30]:-
... with Boineburg's encouragement, he drafted a number of monographs on religious topics, mostly to do with points at issue between the churches...
Another of Leibniz's lifelong aims was to collate all human knowledge. Certainly he saw his work on Roman civil law as part of this scheme and as another part of this scheme, Leibniz tried to bring the work of the learned societies together to coordinate research. Leibniz began to study motion, and although he had in mind the problem of explaining the results of Wren and Huygens on elastic collisions, he began with abstract ideas of motion. In 1671 he published Hypothesis Physica Nova (New Physical Hypothesis). In this work he claimed, as had Kepler, that movement depends on the action of a spirit. He communicated with Oldenburg, the secretary of the Royal Society of London, and dedicated some of his scientific works to the Royal Society and the Paris Academy. Leibniz was also in contact with Carcavi, the Royal Librarian in Paris. As Ross explains in [30]:-
Although Leibniz's interests were clearly developing in a scientific direction, he still hankered after a literary career. All his life he prided himself on his poetry (mostly Latin), and boasted that he could recite the bulk of Virgil's "Aeneid" by heart. During this time with Boineburg he would have passed for a typical late Renaissance humanist.
Leibniz wished to visit Paris to make more scientific contacts. He had begun construction of a calculating machine which he hoped would be of interest. He formed a political plan to try to persuade the French to attack Egypt and this proved the means of his visiting Paris. In 1672 Leibniz went to Paris on behalf of Boineburg to try to use his plan to divert Louis XIV from attacking German areas. His first object in Paris was to make contact with the French government but, while waiting for such an opportunity, Leibniz made contact with mathematicians and philosophers there, in particular Arnauld and Malebranche, discussing with Arnauld a variety of topics but particularly church reunification.
In Paris Leibniz studied mathematics and physics under Christiaan Huygens beginning in the autumn of 1672. On Huygens' advice, Leibniz read Saint-Vincent's work on summing series and made some discoveries of his own in this area. Also in the autumn of 1672, Boineburg's son was sent to Paris to study under Leibniz which meant that his financial support was secure. Accompanying Boineburg's son was Boineburg's nephew on a diplomatic mission to try to persuade Louis XIV to set up a peace congress. Boineburg died on 15 December but Leibniz continued to be supported by the Boineburg family.
In January 1673 Leibniz and Boineburg's nephew went to England to try the same peace mission, the French one having failed. Leibniz visited the Royal Society, and demonstrated his incomplete calculating machine. He also talked with Hooke, Boyle and Pell. While explaining his results on series to Pell, he was told that these were to be found in a book by Mouton. The next day he consulted Mouton's book and found that Pell was correct. At the meeting of the Royal Society on 15 February, which Leibniz did not attend, Hooke made some unfavourable comments on Leibniz's calculating machine. Leibniz returned to Paris on hearing that the Elector of Mainz had died. Leibniz realised that his knowledge of mathematics was less than he would have liked so he redoubled his efforts on the subject.
The Royal Society of London elected Leibniz a fellow on 19 April 1673. Leibniz met Ozanam and solved one of his problems. He also met again with Huygens who gave him a reading list including works by Pascal, Fabri, Gregory, Saint-Vincent, Descartes and Sluze. He began to study the geometry of infinitesimals and wrote to Oldenburg at the Royal Society in 1674. Oldenburg replied that Newton and Gregory had found general methods. Leibniz was, however, not in the best of favours with the Royal Society since he had not kept his promise of finishing his mechanical calculating machine. Nor was Oldenburg to know that Leibniz had changed from the rather ordinary mathematician who visited London, into a creative mathematical genius. In August 1675 Tschirnhaus arrived in Paris and he formed a close friendship with Leibniz which proved very mathematically profitable to both.
It was during this period in Paris that Leibniz developed the basic features of his version of the calculus. In 1673 he was still struggling to develop a good notation for his calculus and his first calculations were clumsy. On 21 November 1675 he wrote a manuscript using the ∫ f (x) dx notation for the first time. In the same manuscript the product rule for differentiation is given. By autumn 1676 Leibniz discovered the familiar d(xn) = nxn-1dx for both integral and fractional n.
Newton wrote a letter to Leibniz, through Oldenburg, which took some time to reach him. The letter listed many of Newton's results but it did not describe his methods. Leibniz replied immediately but Newton, not realising that his letter had taken a long time to reach Leibniz, thought he had had six weeks to work on his reply. Certainly one of the consequences of Newton's letter was that Leibniz realised he must quickly publish a fuller account of his own methods.
Newton wrote a second letter to Leibniz on 24 October 1676 which did not reach Leibniz until June 1677 by which time Leibniz was in Hanover. This second letter, although polite in tone, was clearly written by Newton believing that Leibniz had stolen his methods. In his reply Leibniz gave some details of the principles of his differential calculus including the rule for differentiating a function of a function.
Newton was to claim, with justification, that
..not a single previously unsolved problem was solved ...
by Leibniz's approach but the formalism was to prove vital in the latter development of the calculus. Leibniz never thought of the derivative as a limit. This does not appear until the work of d'Alembert.
Leibniz would have liked to have remained in Paris in the Academy of Sciences, but it was considered that there were already enough foreigners there and so no invitation came. Reluctantly Leibniz accepted a position from the Duke of Hanover, Johann Friedrich, of librarian and of Court Councillor at Hanover. He left Paris in October 1676 making the journey to Hanover via London and Holland. The rest of Leibniz's life, from December 1676 until his death, was spent at Hanover except for the many travels that he made.
His duties at Hanover [30]:-
... as librarian were onerous, but fairly mundane: general administration, purchase of new books and second-hand libraries, and conventional cataloguing.
He undertook a whole collection of other projects however. For example one major project begun in 1678-79 involved draining water from the mines in the Harz mountains. His idea was to use wind power and water power to operate pumps. He designed many different types of windmills, pumps, gears but [3]:-
... every one of these projects ended in failure. Leibniz himself believed that this was because of deliberate obstruction by administrators and technicians, and the worker's fear that technological progress would cost them their jobs.
In 1680 Duke Johann Friedrich died and his brother Ernst August became the new Duke. The Harz project had always been difficult and it failed by 1684. However Leibniz had achieved important scientific results becoming one of the first people to study geology through the observations he compiled for the Harz project. During this work he formed the hypothesis that the Earth was at first molten.
Another of Leibniz's great achievements in mathematics was his development of the binary system of arithmetic. He perfected his system by 1679 but he did not publish anything until 1701 when he sent the paper Essay d'une nouvelle science des nombres to the Paris Academy to mark his election to the Academy. Another major mathematical work by Leibniz was his work on determinants which arose from his developing methods to solve systems of linear equations. Although he never published this work in his lifetime, he developed many different approaches to the topic with many different notations being tried out to find the one which was most useful. An unpublished paper dated 22 January 1684 contains very satisfactory notation and results.
Leibniz continued to perfect his metaphysical system in the 1680s attempting to reduce reasoning to an algebra of thought. Leibniz published Meditationes de Cognitione, Veritate et Ideis (Reflections on Knowledge, Truth, and Ideas) which clarified his theory of knowledge. In February 1686, Leibniz wrote his Discours de métaphysique (Discourse on Metaphysics).
Another major project which Leibniz undertook, this time for Duke Ernst August, was writing the history of the Guelf family, of which the House of Brunswick was a part. He made a lengthy trip to search archives for material on which to base this history, visiting Bavaria, Austria and Italy between November 1687 and June 1690. As always Leibniz took the opportunity to meet with scholars of many different subjects on these journeys. In Florence, for example, he discussed mathematics with Viviani who had been Galileo's last pupil. Although Leibniz published nine large volumes of archival material on the history of the Guelf family, he never wrote the work that was commissioned.
In 1684 Leibniz published details of his differential calculus in Nova Methodus pro Maximis et Minimis, itemque Tangentibus... in Acta Eruditorum, a journal established in Leipzig two years earlier. The paper contained the familiar d notation, the rules for computing the derivatives of powers, products and quotients. However it contained no proofs and Jacob Bernoulli called it an enigma rather than an explanation.
In 1686 Leibniz published, in Acta Eruditorum, a paper dealing with the integral calculus with the first appearance in print of the ∫ notation.
Newton's Principia appeared the following year. Newton's 'method of fluxions' was written in 1671 but Newton failed to get it published and it did not appear in print until John Colson produced an English translation in 1736. This time delay in the publication of Newton's work resulted in a dispute with Leibniz.
Another important piece of mathematical work undertaken by Leibniz was his work on dynamics. He criticised Descartes' ideas of mechanics and examined what are effectively kinetic energy, potential energy and momentum. This work was begun in 1676 but he returned to it at various times, in particular while he was in Rome in 1689. It is clear that while he was in Rome, in addition to working in the Vatican library, Leibniz worked with members of the Accademia. He was elected a member of the Accademia at this time. Also while in Rome he read Newton's Principia. His two part treatise Dynamica studied abstract dynamics and concrete dynamics and is written in a somewhat similar style to Newton's Principia. Ross writes in [30]:-
... although Leibniz was ahead of his time in aiming at a genuine dynamics, it was this very ambition that prevented him from matching the achievement of his rival Newton. ... It was only by simplifying the issues... that Newton succeeded in reducing them to manageable proportions.
Leibniz put much energy into promoting scientific societies. He was involved in moves to set up academies in Berlin, Dresden, Vienna, and St Petersburg. He began a campaign for an academy in Berlin in 1695, he visited Berlin in 1698 as part of his efforts and on another visit in 1700 he finally persuaded Friedrich to found the Brandenburg Society of Sciences on 11 July. Leibniz was appointed its first president, this being an appointment for life. However, the Academy was not particularly successful and only one volume of the proceedings were ever published. It did lead to the creation of the Berlin Academy some years later.
Other attempts by Leibniz to found academies were less successful. He was appointed as Director of a proposed Vienna Academy in 1712 but Leibniz died before the Academy was created. Similarly he did much of the work to prompt the setting up of the St Petersburg Academy, but again it did not come into existence until after his death.
It is no exaggeration to say that Leibniz corresponded with most of the scholars in Europe. He had over 600 correspondents. Among the mathematicians with whom he corresponded was Grandi. The correspondence started in 1703, and later concerned the results obtained by putting x = 1 into 1/(1+x) = 1 - x + x2 - x3 + .... Leibniz also corresponded with Varignon on this paradox. Leibniz discussed logarithms of negative numbers with Johann Bernoulli, see [155].
In 1710 Leibniz published Théodicée a philosophical work intended to tackle the problem of evil in a world created by a good God. Leibniz claims that the universe had to be imperfect, otherwise it would not be distinct from God. He then claims that the universe is the best possible without being perfect. Leibniz is aware that this argument looks unlikely - surely a universe in which nobody is killed by floods is better than the present one, but still not perfect. His argument here is that the elimination of natural disasters, for example, would involve such changes to the laws of science that the world would be worse. In 1714 Leibniz wrote Monadologia which synthesised the philosophy of his earlier work, the Théodicée.
Much of the mathematical activity of Leibniz's last years involved the priority dispute over the invention of the calculus. In 1711 he read the paper by Keill in the Transactions of the Royal Society of London which accused Leibniz of plagiarism. Leibniz demanded a retraction saying that he had never heard of the calculus of fluxions until he had read the works of Wallis. Keill replied to Leibniz saying that the two letters from Newton, sent through Oldenburg, had given:-
... pretty plain indications... whence Leibniz derived the principles of that calculus or at least could have derived them.
Leibniz wrote again to the Royal Society asking them to correct the wrong done to him by Keill's claims. In response to this letter the Royal Society set up a committee to pronounce on the priority dispute. It was totally biased, not asking Leibniz to give his version of the events. The report of the committee, finding in favour of Newton, was written by Newton himself and published as Commercium epistolicum near the beginning of 1713 but not seen by Leibniz until the autumn of 1714. He learnt of its contents in 1713 in a letter from Johann Bernoulli, reporting on the copy of the work brought from Paris by his nephew Nicolaus(I) Bernoulli. Leibniz published an anonymous pamphlet Charta volans setting out his side in which a mistake by Newton in his understanding of second and higher derivatives, spotted by Johann Bernoulli, is used as evidence of Leibniz's case.
The argument continued with Keill who published a reply to Charta volans. Leibniz refused to carry on the argument with Keill, saying that he could not reply to an idiot. However, when Newton wrote to him directly, Leibniz did reply and gave a detailed description of his discovery of the differential calculus. From 1715 up until his death Leibniz corresponded with Samuel Clarke, a supporter of Newton, on time, space, freewill, gravitational attraction across a void and other topics, see [4], [62], [108] and [201].
In [2] Leibniz is described as follows:-
Leibniz was a man of medium height with a stoop, broad-shouldered but bandy-legged, as capable of thinking for several days sitting in the same chair as of travelling the roads of Europe summer and winter. He was an indefatigable worker, a universal letter writer (he had more than 600 correspondents), a patriot and cosmopolitan, a great scientist, and one of the most powerful spirits of Western civilisation.
Ross, in [30], points out that Leibniz's legacy may have not been quite what he had hoped for:-
It is ironical that one so devoted to the cause of mutual understanding should have succeeded only in adding to intellectual chauvinism and dogmatism. There is a similar irony in the fact that he was one of the last great polymaths - not in the frivolous sense of having a wide general knowledge, but in the deeper sense of one who is a citizen of the whole world of intellectual inquiry. He deliberately ignored boundaries between disciplines, and lack of qualifications never deterred him from contributing fresh insights to established specialisms. Indeed, one of the reasons why he was so hostile to universities as institutions was because their faculty structure prevented the cross-fertilisation of ideas which he saw as essential to the advance of knowledge and of wisdom. The irony is that he was himself instrumental in bringing about an era of far greater intellectual and scientific specialism, as technical advances pushed more and more disciplines out of the reach of the intelligent layman and amateur.
Article by: J J O'Connor and E F Robertson
Subscribe to:
Posts (Atom)