title
stringlengths 1
149
⌀ | section
stringlengths 1
1.9k
⌀ | text
stringlengths 13
73.5k
|
---|---|---|
Olive oil extraction
|
First cold pressed – cold extraction
|
For olive oil bottled outside EU countries, this regulation does not apply, and thus the consumer has no assurance that these statements are true.
|
Olive oil extraction
|
First cold pressed – cold extraction
|
The temperature of malaxation and extraction is crucial due to its effect on olive oil quality. When high temperatures are applied, the more volatile aromas are lost and the rate of oil oxidation is increased, producing therefore lower quality oils. In addition, the chemical content of the polyphenols, antioxidants, and vitamins present in the oil is reduced by higher temperatures. The temperature is adjusted basically by controlling the temperature of the water added during these two steps. High temperatures are used to increase the yield of olive oil obtained from the paste.
|
Olive oil extraction
|
Alternative configurations
|
Some producers, in order to maximise product quality, choose to combine the traditional grinding method, the stone mill, with a modern decanter. This technique produces more selective grinding of the olives, reduces the malaxation time olive paste, and avoids the complicated cleaning of the olive press fibre disks. Because the use of the stone mill requires a loading and unloading phase, this extraction method is discontinuous, i.e., there are times when all the machinery is stopped, therefore it is generally not used on a large commercial scale, being applied only by small scale olive mills producing high quality olive oil.
|
Olive oil extraction
|
Consumer point of view
|
High quality olive oil can be obtained by all the methods if proper measures are taken. Olive oil quality is equally dependent on the quality of the olives themselves and on the time they have to wait from harvesting to extraction, in addition to the extraction method itself.
|
Olive oil extraction
|
Consumer point of view
|
The two main agents that cause the degradation of olive oil are oxygen and light. Once an olive is harvested, it should be pressed within 24 hours. Oxidation begins immediately upon harvesting. In the period between harvest and grinding, the fruits' enzymes are very active and increasingly degrade the endogenous oil, and therefore oil obtained after a longer wait is of lower quality, presenting higher acidity (free fatty acids percentage).
|
Olive oil extraction
|
Consumer point of view
|
In addition, if additional oxygen is allowed to interact with the olive paste during the extraction process, the acidity level will increase further. Sealed extraction methods are best to prevent the continued introduction of oxygen, as well as light to the oil.
After extraction is complete, in most cases unfiltered olive oil appears somewhat cloudy, mainly due to the presence of minute amounts of water and suspended solids of olive pulp and seed. This type of oil is therefore sometimes called cloudy or veiled olive oil.
It is common practice that unfiltered olive oils are then "racked" for a time, i.e. stored in cool stainless steel silos with a conical bottom that are pumped free of oxygen to enable the precipitation and separation of the two phases and facilitate later filtration; it will also contribute in the integrity and stability of the oil.
|
Olive oil extraction
|
Future prospects
|
The future of olive extraction points to reducing the negative aspects of the present methods, decreasing the degradation oil produced by the extraction process in itself.
|
Olive oil extraction
|
Future prospects
|
Reducing the oxidation by performing part of the process of malaxation and the extraction under a controlled nitrogen atmosphere Extracting the nut of the olive before grinding, this will reduce the release of oxidative enzymes present in this organ, and yield a pomace that is free from wood residues, making it possible to be used in animal feeding Reducing the addition of water to minimize the washing of polyphenols Improving the Sinolea method, through an increase in the efficiency of the adsorption of the oil to the plates, thus reducing the need for the use of standard methods of extraction
|
Pixilation
|
Pixilation
|
Pixilation is a stop motion technique in which live actors are used as a frame-by-frame subject in an animated film, by repeatedly posing while one or more frame is taken and changing pose slightly before the next frame or frames. The actor becomes a kind of living stop-motion puppet. This technique is often used as a way to blend live actors with animated ones in a movie, such as in The Secret Adventures of Tom Thumb by the Bolex Brothers.
|
Pixilation
|
Pixilation
|
Early examples of this technique are Hôtel électrique from 1908 and Émile Cohl's 1911 movie Jobard ne peut pas voir les femmes travailler (Jobard cannot see the women working).
The term is widely credited to Grant Munro (although some say it was Norman McLaren) and he made an experimental movie named "Pixillation", available in his DVD collection "Cut Up – The Films of Grant Munro."
|
Pixilation
|
Films
|
Norman McLaren's Oscar-winner Neighbours, A Chairy Tale (1957) and Two Bagatelles Chuck Menville and Len Janson's trilogy of pixilated short films Stop Look and Listen – 1967, Blaze Glory (1968) and Sergeant Swell of the Mounties (1972), along with their sequence in Daffy Duck and Porky Pig Meet the Groovie Goolies (1972) Mike Jittlov's short The Wizard of Speed and Time (1979). Jittlov made a feature film with many pixilation sequences, also titled The Wizard of Speed and Time (1989), based on the making of the original short.
|
Pixilation
|
Films
|
Monsieur Pointu (1975) Jan Kounen's Gisele Kerozene (1989) Tetsuo: The Iron Man (1989) Numerous Jan Švankmajer movies, but most notably Food (1992) and large sections of Conspirators of Pleasure (1996).
Bolex Brothers' The Secret Adventures of Tom Thumb (1993) Michael Langan's Doxology (2007) Paul Cummings' and Tony Fiandaca's Tony vs. Paul (2007) Luminaris a short film by Juan Pablo Zaramella (2011) Western Spaghetti and the Academy Award-nominated Fresh Guacamole (2012) by PES utilize pixilation.
Joe & Giles's Two Gentlemen of Honour (2012) Jared Goldberg's Mister G Meets the Biker Babes (2012) Michael Bartolomeo's short fantasy-horror film Washed (2019) prominently features pixilation in several of its scenes.
|
Pixilation
|
Television shows
|
Angry Kid Sesame Street (Milo Counting, Ordering a Pizza, George the Farmer) The Goodies Rex the Runt The Flash (1990 TV series)
|
Pixilation
|
Music videos
|
"All The Way To Heaven" by Doug E. Fresh and The Get Fresh Crew "And She Was" by Talking Heads "Baby C'mon" by Stephen Malkmus "Be Near Me" by ABC "Big Time" by Peter Gabriel "The Box" by Orbital "Bridge to Your Heart" by Wax "Cold" by Tears for Fears "Consolation Prizes" by Phoenix "End Love" by OK Go "The End of the World" by The Cure "Every Teardrop Is A Waterfall" by Coldplay "Fix" by Jean-Paul De Roover "The Hardest Button to Button" by The White Stripes "Heard 'Em Say" by Kanye West "Hello Again" by The Cars "Her Morning Elegance" by Oren Lavie "I Stay Away" by Alice in Chains "In Your Arms" by Kina Grannis "Is That It" by Katrina & The Waves "Lame Claim to Fame" by "Weird Al" Yankovic "Last Dance" by George Clinton "Les tartines" by Sttellla "Long Gone" by Fat City Reprise "Ma Che Discorsi" by Daniele Silvestri "Now You See Her" by Crash Test Dummies "Paralyzed" by The Used "Point of No Return" by Nu Shooz "Rhythm of Love" by Yes "Road to Nowhere" by Talking Heads "Sex Machine" by The Fat Boys "Shopping Trolley" by Beth Orton "Sledgehammer" by Peter Gabriel "Strawberry Swing" by Coldplay "There There" by Radiohead "Time Won't Let Me Go" by The Bravery "Vermilion" by SlipknotQuebec band Les Colocs and Michel Gondry used pixilation in many of their music videos.
|
Pixilation
|
Music videos
|
Of note, "Leave Me Alone" by Michael Jackson utilises a variation on this technique by slowing down the frame rate of video and overlaying objects to achieve the distinctive pixilation look to great effect.
|
Pixilation
|
Others
|
The pixilation technique was also used for the opening of Claymation, Will Vinton's 1978, 17-minute documentary about his animation studio's production techniques, the first time the famous trademarked Claymation term was used, now a term synonymous with all clay animation.The Czech animator Jan Švankmajer uses pixilation in most of his work; most notably Food.
Jan Kounen's Gisele Kerozene (1989), a short film that shows witches riding around a city on broomsticks, is another influential example of this technique.
Pixilation is also used in Andrew Huang's short video Fluxis.
An effect similar to pixilation can be achieved by dropping occasional frames from a conventionally recorded movie. While obviously easier than the stop-frame technique, this does not achieve the same quality.
|
Oblivious data structure
|
Oblivious data structure
|
In computer science, an oblivious data structure is a data structure that gives no information about the sequence or pattern of the operations that have been applied except for the final result of the operations.In most conditions, even if the data is encrypted, the access pattern can be achieved, and this pattern can leak some important information such as encryption keys. And in the outsourcing of cloud data, this leakage of access pattern is still very serious. An access pattern is a specification of an access mode for every attribute of a relation schema. For example, the sequences of user read or write the data in the cloud are access patterns.
|
Oblivious data structure
|
Oblivious data structure
|
We say a machine is oblivious if the sequence in which it accesses is equivalent for any two inputs with the same running time. So the data access pattern is independent from the input.
Applications: Cloud data outsourcing: When writing or reading data from a cloud server, oblivious data structures are useful. And modern databases rely on data structures heavily, so oblivious data structures come in handy.
|
Oblivious data structure
|
Oblivious data structure
|
Secure processor: Tamper-resilient secure processors are used for defense against physical attacks or the malicious intruders access the users’ computer platforms. The existing secure processors designed in academia and industry include AEGIS and Intel SGX. But the memory addresses are still transferred in the clear on the memory bus. So the research finds that this memory buses can give out the information about encryption keys. With the Oblivious data structure comes in practical, the secure processor can obfuscate memory access pattern in a provably secure manner.
|
Oblivious data structure
|
Oblivious data structure
|
Secure computation: Traditionally people used circuit-model to do the secure computation, but the model is not enough for the security when the amount of data is getting big. RAM-model secure computation was proposed as an alternative to the traditional circuit model, and oblivious data structure is used to prevent information access behavioral being stolen.
|
Oblivious data structure
|
Oblivious data structures
|
Oblivious RAM Goldreich and Ostrovsky proposed this term on software protection.
|
Oblivious data structure
|
Oblivious data structures
|
The memory access of oblivious RAM is probabilistic and the probabilistic distribution is independent of the input. In the paper composed by Goldreich and Ostrovsky have theorem to oblivious RAM: Let RAM(m) denote a RAM with m memory locations and access to a random oracle machine. Then t steps of an arbitrary RAM(m) program can be simulated by less than log O(t(\log _{2}t)^{3}) steps of an oblivious log \mathrm {RAM} (m(\log _{2}m)^{2}) . Every oblivious simulation of RAM(m) must make at least max log \max\{m,(t-1)\log _{2}m\} accesses in order to simulate t steps.
|
Oblivious data structure
|
Oblivious data structures
|
Now we have the square-root algorithm to simulate the oblivious ram working.
For each {\sqrt {m}} accesses, randomly permute first m+{\sqrt {m}} memory.
Check the shelter words first if we want to access a word.
If the word is there, access one of the dummy words. And if the word is not there, find the permuted location.To access original RAM in t steps we need to simulate it with t+{\sqrt {m}} steps for the oblivious RAM. For each access, the cost would be O( log {\sqrt {m}}\cdot \log m ).
Another way to simulate is hierarchical algorithm. The basic idea is to consider the shelter memory as a buffer, and extend it to the multiple levels of buffers. For level I, there are 4^{i} buckets and for each bucket has log t items. For each level there is a random selected hash function.
|
Oblivious data structure
|
Oblivious data structures
|
The operation is like the following: At first load program to the last level, which can be say has 4^{t} buckets. For reading, check the bucket h_{i}(V) from each level, If (V,X) is already found, pick a bucket randomly to access, and if it is not found, check the bucket h_{i}(V) , there is only one real match and remaining are dummy entries . For writing, put (V,X) to the first level, and if the first I levels are full, move all I levels to I+1 levels and empty the first I levels.
|
Oblivious data structure
|
Oblivious data structures
|
The time cost for each level cost O(log t); cost for every access is log O((\log t)^{2}) ; The cost of Hashing is log O(t(\log t)^{3}) Oblivious tree An Oblivious Tree is a rooted tree with the following property: All the leaves are in the same level.
All the internal nodes have degree at most 3.
|
Oblivious data structure
|
Oblivious data structures
|
Only the nodes along the rightmost path in the tree may have degree of one.The oblivious tree is a data structure similar to 2–3 tree, but with the additional property of being oblivious. The rightmost path may have degree one and this can help to describe the update algorithms. Oblivious tree requires randomization to achieve a log O(\log(n)) running time for the update operations. And for two sequences of operations M and N acting to the tree, the output of the tree has the same output probability distributions. For the tree, there are three operations: CREATE (L) build a new tree storing the sequence of values L at its leaves.
|
Oblivious data structure
|
Oblivious data structures
|
INSERT (b, i,T) insert a new leaf node storing the value b as the ith leaf of the tree T.
DELETE (i, T) remove the ith leaf from T.Step of Create: The list of nodes at the ithlevel is obtained traversing the list of nodes at level i+1 from left to right and repeatedly doing the following: Choose d {2, 3} uniformly at random.
If there are less than d nodes left at level i+1, set d equal to the number of nodes left.
|
Oblivious data structure
|
Oblivious data structures
|
Create a new node n at level I with the next d nodes at level i+1 as children and compute the size of n as the sum of the sizes of its children.For example, if the coin tosses of d {2, 3} has an outcome of: 2, 3, 2, 2, 2, 2, 3 stores the string “OBLIVION” as follow oblivious tree.
|
Oblivious data structure
|
Oblivious data structures
|
Both the INSERT (b, I, T) and DELETE(I, T) have the O(log n) expected running time. And for INSERT and DELETE we have: INSERT (b, I, CREATE (L)) = CREATE (L [1] + …….., L[ i], b, L[i+1]………..) DELETE (I, CREATE (L)) = CREATE (L[1]+ ………L[I - 1], L[i+1], ………..) For example, if the CREATE (ABCDEFG) or INSERT (C, 2, CREATE (ABDEFG)) is run, it yields the same probabilities of out come between these two operations.
|
Dual-mode mobile
|
Dual-mode mobile
|
Dual-mode mobiles refer to mobile phones that are compatible with more than one form of data transmission or network.
|
Dual-mode mobile
|
Dual-Mode Phone
|
A dual-mode phone is a telephone which uses more than one technique for sending and receiving voice and data. This could be for wireless mobile phones or for wired phones.
There are three types of dual-mode phones.
Network Compatibility Mobile phones containing two types of cellular radios for voice and data. These phones include combination of GSM and CDMA technology. They can be used as a GSM or CDMA phone according to the user's preference. These handsets are also called global phones. An example of this is the Samsung SCH-A790.
These dual-mode handsets are compatible with both GSM and CDMA networks and are essentially two phones in one device.
Such phones make sense in those countries that have both GSM & CDMA networks or international CDMA roamers who want to keep a single handset with two numbers on it.
Most dual-mode handsets require two identifying cards (one SIM and one RUIM), though some dual-mode phones (for example, the iPhone 4S) only require one SIM and one ESN. Not all dual SIM handsets are dual mode (for example dual SIM GSM phones).
|
Dual-mode mobile
|
Dual-Mode Phone
|
Cellular and Non-cellular Radios Mobile phones contain both cellular and non-cellular radios used for voice and data communication. There are also two types of dual-mode phones which use cellular radio which will contain GSM/CDMA/W-CDMA as well as other technology like IEEE 802.11 (Wi-Fi) radio or DECT (Digital Enhanced Cordless Telecommunications) radio. These phones can be used as cellular phones when connected to a wide area cellular network. When within range of a suitable WiFi or DECT network, the phone can be used as a WiFi/DECT phone for all communications purposes. This method of operation can reduce cost (for both the network operator and the subscriber), improve indoor coverage and increase data access speeds.
|
Dual-mode mobile
|
Dual-Mode Phone
|
Wired Phones Wired phones with VoIP and POTS technology. These phones can be used for making VoIP calls and also used for phones on the circuit switch network. These phones require compatible routers and modem to make VoIP calls.
|
Dual-mode mobile
|
List
|
Google Pixel & Pixel XL Google Pixel 2 & Pixel 2 XL iPhone 6s Motorola Moto X4 and Android One Moto X4 Nexus 5 Nexus 5X Nexus 6P
|
Market overhang
|
Market overhang
|
Market overhang is a term derived from the physical world meaning things that stick out or hang over another thing. Often from the viewpoint of standing beneath an 'overhang' there is shade provided by a protrusion from the adjacent vertical domain, such as a tree or building.
|
Market overhang
|
Market overhang
|
In marketing, overhanging the market relates to the business practice of announcing a new product or a new business strategy by a company in an adjacent space to the target. To be an overhang in this context, the following conditions must exist: the announcer is a market leader in the adjacent space; the new product is not ready for release at the time of the announcement; the market is new and standards are not yet clearly defined; and, the goal is to forestall competitor growth by encouraging customers to wait for the new product.
|
Market overhang
|
Recent examples of overhang
|
In June 1999 - Nortel declared a voice over IP strategy, while Cisco and its newly acquired Selcius Systems IP PBX were starting to gain traction. Nortel was a leader in enterprise PBXs and made this announcement to retain the loyalty of their enormous installed base and to slow down the adoption of the IP PBX product category. Nortel overhung the IP PBX market, announcing products 12 months or more before their availability.
|
Market overhang
|
Recent examples of overhang
|
In June 2006 - Microsoft entered the IP Telephony market with PowerPoint. Here the collection of products and related applications in adjacent markets combined with announcements of as-yet-not-available products, attempt to overhang the IP PBX market, slowing down the growth of the market, forcing the players to consider the implications and adjust, encouraging customers to think about what Microsoft can bring to the market, giving Microsoft engineering the time to catch up with product.
|
Market overhang
|
Effectiveness of Market Overhang
|
The empirical evidence suggests this technique is effective since it continues to be used as a marketing tactic by major players that are slower to respond to the high growth of adjacent markets that are rapidly emerging. As the high technology industry continues to consolidate, market overhang is likely to continue as a mechanism for marketers to 'shape' emerging segments.
|
Myelin basic protein
|
Myelin basic protein
|
Myelin basic protein (MBP) is a protein believed to be important in the process of myelination of nerves in the nervous system. The myelin sheath is a multi-layered membrane, unique to the nervous system, that functions as an insulator to greatly increase the velocity of axonal impulse conduction. MBP maintains the correct structure of myelin, interacting with the lipids in the myelin membrane.MBP was initially sequenced in 1971 after isolation from bovine myelin membranes. MBP knockout mice called shiverer mice were subsequently developed and characterized in the early 1980s. Shiverer mice exhibit decreased amounts of CNS myelination and a progressive disorder characterized by tremors, seizures, and early death. The human gene for MBP is on chromosome 18; the protein localizes to the CNS and to various cells of the hematopoietic lineage.
|
Myelin basic protein
|
Myelin basic protein
|
The pool of MBP in the central nervous system is very diverse, with several splice variants being expressed and a large number of post-translational modifications on the protein, which include phosphorylation, methylation, deamidation, and citrullination. These forms differ by the presence or the absence of short (10 to 20 residues) peptides in various internal locations in the sequence. In general, the major form of MBP is a protein of about 18.5 Kd (170 residues).
|
Myelin basic protein
|
Myelin basic protein
|
In melanocytic cell types, MBP gene expression may be regulated by MITF.
|
Myelin basic protein
|
Gene expression
|
The protein encoded by the classic MBP gene is a major constituent of the myelin sheath of oligodendrocytes and Schwann cells in the nervous system. However, MBP-related transcripts are also present in the bone marrow and the immune system. These mRNAs arise from the long MBP gene (otherwise called "Golli-MBP") that contains 3 additional exons located upstream of the classic MBP exons. Alternative splicing from the Golli and the MBP transcription start sites gives rise to 2 sets of MBP-related transcripts and gene products. The Golli mRNAs contain 3 exons unique to Golli-MBP, spliced in-frame to 1 or more MBP exons. They encode hybrid proteins that have N-terminal Golli aa sequence linked to MBP aa sequence. The second family of transcripts contain only MBP exons and produce the well-characterized myelin basic proteins. This complex gene structure is conserved among species, suggesting that the MBP transcription unit is an integral part of the Golli transcription unit and that this arrangement is important for the function and/or regulation of these genes. At protein level, the concentration of MBP in the CNS is tenfold higher in sections of white matter compared with cerebral cortex.
|
Myelin basic protein
|
Structure
|
Myelin basic protein has been classified as an intrinsically disordered protein that has no stable secondary structure in solution. Like most IDPs, it has a high net charge and a low mean hydrophobicity, minimizing the hydrophobic effect that drives traditional protein folding. It does contain some exceptions to normal IDP amino acid content. For example, MBP has more arginine and less glutamic acid than most IDPs. However, this is likely because those changes are necessary for MBP to be sufficiently basic and positively charged to correctly interact with the membrane. Notably, MBP has been shown to adopt a more stable secondary structure on interaction with lipids. NMR and Cys-specific spin labeling experiments have predicted this structure to contain beta sheet and regions of amphipathic helix.As implied by its name, myelin basic protein is significantly basic, with an isoelectric point of 10. It is thought to associate with the cell membrane through electrostatic interactions between its positive charges and negatively charged phospholipid heads of the plasma membrane. It can undergo a large variety of post-translational modifications, creating various charge isomers known as C1-C6 or C8. These modifications include phosphorylation, methylation, deamidation, citrullination, ADP-ribosylation, and N-terminal acylation . C1 is the least modified, while C8 is the most distinct, containing 6-11 additional citrullinations. Since each of these decreases its positive charge, C8 has the smallest net positive charge of the isomers. Alternations in these post-translational modifications have been associated with demyelinating diseases. Notably, MBP isolated from individuals with multiple sclerosis have had a higher degree of citrullination and a smaller positive charge. In a rare, severe form of MS known as Marburg's syndrome, the citrullination was even more extensive.
|
Myelin basic protein
|
Role in disease
|
Interest in MBP has centered on its role in demyelinating diseases, in particular, multiple sclerosis (MS). The target antigen of the autoimmune response in MS has not yet been identified. However, several studies have shown a role for antibodies against MBP in the pathogenesis of MS. Some studies have linked a genetic predisposition to MS to the MBP gene, though a majority have not.
|
Myelin basic protein
|
Role in disease
|
A "molecular mimicry" hypothesis of multiple sclerosis has been suggested, in which T cells are, in essence, confusing MBP with human herpesvirus-6. Researchers in the United States created a synthetic peptide with a sequence identical to that of an HHV-6 peptide. Elevated levels of MBP have been found in the cerebrospinal fluid of patients with HIV infections and signs of encephalopathy, and although MBP does not seem to be a sensitive diagnostic marker of HIV encephalopathy, it has been suggested that it may serve a role as a prognostic indicator of disease progression. It is able to show that T cells were activated by this peptide. These activated T cells also recognized and initiated an immune response against a synthetically created peptide sequence that is identical to part of human MBP. During their research, they found that the levels of these cross-reactive T cells are significantly elevated in multiple sclerosis patients.
|
Myelin basic protein
|
Role in disease
|
Some research has shown that inoculating an animal with MBP to generate an MBP-specific immune response against it increases blood–brain barrier permeability. Permeability is enhanced when the animal is inoculated against non-specific proteins.A targeted immune response to MBP has been implicated in lethal rabies infection. The inoculation of MBP generates increases the permeability of the blood–brain barrier (BBB), allowing immune cells to enter the brain, the primary site of rabies virus replication. In a study of mice infected with Silver-haired bat rabies virus (SHBRV), the mortality rate of mice treated with MBP improved 20%-30% over the untreated control group. It is significant to note that healthy uninfected mice treated with MBP showed an increase in mortality rate between 0% and 40%.
|
Myelin basic protein
|
Interactions
|
Myelin basic protein has been shown to interact in vivo with proteolipid protein 1, and in vitro with calmodulin, actin, tropomyosin, tubulin, clathrin, 2',3'-cyclic-nucleotide 3'-phosphodiesterase and multiple molecules of the immune system.
|
Web Application Description Language
|
Web Application Description Language
|
The Web Application Description Language (WADL) is a machine-readable XML description of HTTP-based web services. WADL models the resources provided by a service and the relationships between them. WADL is intended to simplify the reuse of web services that are based on the existing HTTP architecture of the Web. It is platform and language independent and aims to promote reuse of applications beyond the basic use in a web browser.
|
Web Application Description Language
|
Web Application Description Language
|
WADL was submitted to the World Wide Web Consortium by Sun Microsystems on 31 August 2009, but the consortium has no current plans to standardize it. WADL is the REST equivalent of SOAP's Web Services Description Language (WSDL), which can also be used to describe REST web services.
|
Web Application Description Language
|
Format
|
The service is described using a set of resource elements. Each resource contains param elements to describe the inputs, and method elements which describe the request and response of a resource. The request element specifies how to represent the input, what types are required and any specific HTTP headers that are required. The response describes the representation of the service's response, as well as any fault information, to deal with errors.
|
Web Application Description Language
|
Example
|
The following listing shows an example of a WADL description for the Yahoo News Search application.
|
Web Application Description Language
|
Generate WADL or generate code from WADL
|
Java There are multiple tools to generate java code from an existing WADL: Apache CXF Java API for RESTful Web Services, and its reference implementation, Jersey Example WADL Generated by CXF
|
Wall stud
|
Wall stud
|
A wall stud is a vertical repetitive framing member in a building's wall of smaller cross section than a post. It is a fundamental element in frame building.
|
Wall stud
|
Etymology
|
Stud is an ancient word related to similar words in Old English, Old Norse, Middle High German, and Old Teutonic generally meaning prop or support. Other historical words with similar meaning are quarter and scantling (one sense meaning a smaller timber, not necessarily the same use). Stick is a colloquial term for both framing lumber (timber) and a "timber tree" (a tree trunk good for using as lumber (timber)); thus, the names "stick and platform", "stick and frame", "stick and box", or simply stick framing. The stud height usually determines the ceiling height, thus sayings like: "...These rooms were usually high in stud..."
|
Wall stud
|
Purpose
|
Studs form walls and may carry vertical structural loads or be non load-bearing, such as in partition walls, which only separate spaces. They hold in place the windows, doors, interior finish, exterior sheathing or siding, insulation and utilities and help give shape to a building. Studs run from sill plate to wall plate. In modern construction, studs are anchored to the plates in a way, such as using fasteners, to prevent the building from being lifted off the foundation by severe wind or earthquake.
|
Wall stud
|
Properties
|
Studs are usually slender, so more studs are needed than in post and beam framing. Sometimes studs are long, as in balloon framing, where the studs extend two stories and carry a ledger which carries joists. Balloon framing has been made illegal in new construction in many jurisdictions for fire safety reasons because the open wall cavities allow fire to quickly spread such as from a basement to an attic; the plates and platforms in platform framing provide a passive fire stop inside the walls, and so are deemed much safer by fire safety officials. Being thinner and lighter, stick construction techniques are easier to cut and carry and is speedier than the timber framing.
|
Wall stud
|
Properties
|
In the United States and Canada, studs are traditionally made of wood, usually 2×4 or 2×6 by name; however, these historical dimensions have been reduced but still carry the name of "two by four" and "two by six". Typical dimensions of today's "two by four" is 1.5 by 3.5 inches (38 mm × 89 mm) dimensional lumber prior to sanding and are typically placed 16 inches (406 mm) from each other's center, but sometimes also at 12 inches (305 mm) or 24 inches (610 mm). The wood needs to be dry when used, or problems may occur as the studs shrink and twist as they dry out. Steel studs are gaining popularity as a non-combustible alternative, especially for non load-bearing walls, and are required in some firewalls.
|
Wall stud
|
Properties
|
In New Zealand, the required lumber size and spacing of wall studs are determined using NZS 3604 Timber-framed buildings table 8.2 for loadbearing walls and table 8.4 for non-loadbearing walls.
|
Wall stud
|
Other terms
|
Studs are the vertical members of a timber- or metal-framed wall. The studs are spaced equally to suit the dimensions of the covering sheet materials, usually 600 mm (24 inches) between the centers.
Studs are used to frame around window and door openings are given different names, including: king stud − stud to left or right of a window or door that is continuous from the bottom plate to the top plate queen stud - stud used as a repetitive member that is angled so as to be neither vertical nor horizontal.
|
Wall stud
|
Other terms
|
trimmer or jack − stud to the left or right of a window or door that runs from the bottom plate to the underside of a lintel or header cripple stud – a stud located either above or below a framed opening, that does not run the full height of the wall post or column − a doubled or other integral multiple of a group of studs nailed side by side. Posts in walls are used at point loads such as long spans near a wide window or sliding door, etc.
|
Wall stud
|
Other terms
|
sleeper or nailer - a stud laid flat to other framing members to provide a point of attachment.
sill - a stud sized member forming the base of a window assembly or the base of wall.
mudsill - a stud sized member that forms the base of a wall and has been treated against insects and decay.
|
Wall stud
|
Other terms
|
top plate or double top plate - a stud sized member that forms the top of the wall. In cases where other members must bear or brace on the top of the wall a double top plate is used with the member using offset laps so the top plate provides a continuous bearing surface.A building technique mostly associated with Lincolnshire, England, and parts of Scotland gets part of its name from the studs: mud and stud (stud and mud). This building method uses studs in a framework which is then totally covered with mud which resembles the building material cob. Another traditional building method is called stud and plaster where the plaster walls are held by lath on the studs. Studs are also the namesake of a type of timber framing called close studding.
|
Wall stud
|
Grades
|
Based on the American West Coast Lumber Inspection Bureau (WCLIB) grading rules, there is only one grade of stud: STUD. A stud is graded for vertical application and its stress requirements and allowable visual defects reflect that application. A stud is most similar to a #2 grade, which is held to a higher standard during grading. The biggest difference between the two is the frequency, placement and size of knots and overall allowable wane.
|
Olympus SP-500 Ultra Zoom
|
Olympus SP-500 Ultra Zoom
|
The Olympus SP 500 Ultra Zoom is a 6.0-megapixel compact ultra-zoom digital camera introduced by Olympus Corporation in 2005.
It features a 2.5" LCD display, a 10x zoom lens, and 5x digital zoom in a compact lightweight body. It is designed to satisfy the needs of both hobbyist photographers who desire full control over exposure settings and those that need only point and shoot simplicity.
|
Olympus SP-500 Ultra Zoom
|
Lens
|
The lens is an Olympus aspherical glass zoom lens 6.3 – 63mm. The 10x zoom is equivalent to 38-380mm in 35mm photography.
|
Olympus SP-500 Ultra Zoom
|
Flash
|
The camera has a built-in manual pop-up flash.
|
Olympus SP-500 Ultra Zoom
|
Movies
|
Movies with sound can be recorded, the recording time is dependent on the xD card capacity. They are in QuickTime ( .mov) format.
|
Olympus SP-500 Ultra Zoom
|
Power Source
|
The camera uses 4 AA batteries, which can be rechargeable.
The camera also supports an AC adapter (Olympus adapter only).
|
Gene Pool (software)
|
Gene Pool (software)
|
Gene Pool is an artificial life simulation created by Jeffrey Ventrella in 1997. It features physics-based 2D proto-swimming creatures (swimbots) that compete for mates and food.
|
Gene Pool (software)
|
Functionality
|
"Swimming" is not explicitly defined: the ability of locomotion to pursue mates and food emerges through natural selection. Starting from an initial population with randomized genes, a lucky subset of swimbots are able to reach their goals as a function of their morphology and motor control, which are determined by their genes. Those that cannot reach food bits die of hunger and those that cannot reach a mate have no offspring. Within a few generations, localized clusters of swimbots with similar genes emerge and begin spreading throughout the pool. There is no predefined fitness function. The fitness of a swimbot is equated with the number of offspring it has produced in its lifetime.
|
Gene Pool (software)
|
History
|
The origins of Gene Pool are based in Ventrella's research using genetic algorithms in real-time computer animation while at the MIT Media Lab in 1994. At Rocket Science Games, Ventrella created the simulation/game Darwin Pond. He acquired the rights to Darwin Pond and published it for free on his website in 1998. GenePool inherited the basic components of Darwin Pond, and introduced some new features, including a sexual selection component (mate preferences for certain colors, shapes and kinds of motion). It was found that mate preference had an effect on evolution of body plans and movement, which was not necessarily beneficial to swimming ability. Research behind these new features was published in artificial life and virtual world conference proceedings.The software was originally written as a Windows application in C language. Later versions were written in C++, including a version for Mac. A version was later developed for the iPad, but is no longer available for download. In 2020, Gene Pool was published as a web page at swimbots.com. The source code, written in pure vanilla JavaScript/HTML/CSS using the HTML5 canvas, was made available in 2021 for developers to extend its functionality, under the MIT License with the Commons Clause.
|
Gene Pool (software)
|
History
|
GenePool is described in the book, "Artificial Life Models in Software". It is featured in the book "The Story of Life in 10 1/2 Species" by Marianne Taylor, in the final chapter on artificial life. It is also mentioned in "Metacreation - Art and Artificial Life" by Mitchell Whitelaw.
|
Downdraft table
|
Downdraft table
|
Downdraft tables or downdraught benches are workbenches with built-in ventilation to capture dust, smoke, and fumes and draw them away from the operator and the material being worked on. They typically consist of a perforated surface whose underside is connected to a ventilation or dust collection system, to draw material through the holes and away from the work.
|
HP 9000
|
HP 9000
|
HP 9000 is a line of workstation and server computer systems produced by the Hewlett-Packard (HP) Company. The native operating system for almost all HP 9000 systems is HP-UX, which is based on UNIX System V.
|
HP 9000
|
HP 9000
|
The HP 9000 brand was introduced in 1984 to encompass several extant technical workstation models launched formerly in the early 1980s. Most of these were based on the Motorola 68000 series, but there were also entries based on HP's own FOCUS designs. From the mid-1980s, the line was transitioned to HP's new PA-RISC architecture. Finally, in the 2000s, systems using the IA-64 were added.
|
HP 9000
|
HP 9000
|
The HP 9000 line was discontinued in 2008, being superseded by Itanium-based HPE Integrity Servers running HP-UX.
|
HP 9000
|
History
|
The first HP 9000 models comprised the HP 9000 Series 200 and Series 500 ranges. These were rebadged existing models, the Series 200 including various Motorola 68000 (68k) based workstations such as the HP 9826 and HP 9836, and the Series 500 using HP's FOCUS microprocessor architecture introduced in the HP 9020 workstation. These were followed by the HP 9000 Series 300 and Series 400 workstations which also used 68k-series microprocessors. From the mid-1980s onward, HP began changing to its own microprocessors based on its proprietary PA-RISC instruction set architecture (ISA), for the Series 600, 700, 800, and later lines. More recent models use either the PA-RISC or its successor, the HP–Intel IA-64 ISA.
|
HP 9000
|
History
|
All of the HP 9000 line run various versions of the HP-UX operating system, except earlier Series 200 models, which ran standalone applications or the Basic Workstation / Pascal 3.1 Workstation operating systems. HP released the Series 400, also known as the Apollo 400, after acquiring Apollo Computer in 1989. These models had the ability to run either HP-UX or Apollo's Domain/OS.
|
HP 9000
|
History
|
From the early 1990s onward, HP replaced the HP 9000 Series numbers with an alphabetical Class nomenclature. In 2001, HP again changed the naming scheme for their HP 9000 servers. The A-class systems were renamed as the rp2400s, the L-class became the rp5400s, and the N-class the rp7400s. The rp prefix signified a PA-RISC architecture, while rx was used for IA-64-based systems, later rebranded HPE Integrity Servers.
|
HP 9000
|
History
|
On 30 April 2008, HP announced end of sales for the HP 9000. The last order date for HP 9000 systems was 31 December 2008 and the last ship date was 1 April 2009. The last order date for new HP 9000 options was December 31, 2009, with a last ship date of 1 April 2010. HP intends to support these systems through to 2013, with possible extensions.The end of life for HP 9000 also marks the end of an era, as it essentially marks HP's withdrawal from the Unix workstation market (the HP 9000 workstations are end of life, and there are no HP Integrity workstations, so there is no longer a solution which targets HP/UX at the desktop). When the move from PA-RISC (9000) to Itanium (Integrity) was announced, Integrity workstations running either HP/UX or Windows were initially announced and offered, but were moved to end of sales life relatively quickly, with no replacement (arguably because x86-64 made IA-64 uncompetitive on the desktop, and HP/UX does not support x86-64, with HP offering desktop Linux as an alternative, not fully compatible, solution).
|
HP 9000
|
Workstation models
|
Prior to January 1985 (see also HP 9800 series): Series 200 – 16 (HP 9816), 20 (HP 9920), 26 (HP 9826), 36 (HP 9836) Series 500 – 20 (HP 9020), 30 (HP 9030), 40 (HP 9040)After 1985: Series 200 – 216 (HP 9816), 217 (HP 9817), 220 (HP 9920), 226 (HP 9826), 236 (HP 9836), 237 (HP 9837) Series 300 – 310, 318, 319, 320, 322, 330, 332, 340, 345, 350, 360, 362, 370, 375, 380, 382, 385 Series 400 (HP Apollo 9000 Series 400) – 400dl, 400s, 400t, 425dl, 425e, 425s, 425t, 433dl, 433s, 433t Series 500 – 520 (HP 9020), 530 (HP 9030), 540 (HP 9040), 550, 560 Series 600 – 635SV, 645SV Series 700 – 705, 710, 712, 715, 720, 725, 730, 735, 742, 743, 744, 745, 747, 748, 750, 755 B-class – B132L, B160L, B132L+, B180L, B1000, B2000, B2600 C-class – C100, C110, C132L, C160, C160L, C180, C180L, C180XP, C200, C240, C360, C3000, C3600, C3650, C3700, C3750, C8000 J-class – J200, J210, J210XC, J280, J282, J2240, J5000, J5600, J6000, J6700, J6750, J7000 Series 200 The Series 200 workstations originated before there were any "Series" at HP. The first model was the HP 9826A, followed by the HP 9836A. Later, a color version of the 9836 (9836C) was introduced. There was also a rack-mount version, the HP 9920A. These were all based on the Motorola 68000 chip. There were 'S' versions of the models that included memory bundled in. When HP-UX was included as an OS, there was a 'U' version of the 9836s and 9920 that used the 68012 processor. The model numbers included the letter 'U' (9836U, 9836CU, and 9920U). Later versions of the Series 200's included the 9816, 9817, and 9837. These systems were soon renamed as the HP Series 200 line, before being renamed again as part HP 9000 family, the HP 9000 Series 200.
|
HP 9000
|
Workstation models
|
There was also a "portable" version of the Series 200 called the Integral. The official model was the HP9807. This machine was about the size of a portable sewing machine, contained a MC68000 processor, ROM based HP-UX, 3½ inch floppy disk drive, inkjet printer, a keyboard, mouse, and an electroluminescent display similar to the early GRiD Compass computers. It was not battery powered, and unlike the other Series 200's that were manufactured in Fort Collins, Colorado, it was made in Corvallis, Oregon.
|
HP 9000
|
Workstation models
|
Series 300/400 The Series 300 workstations were based around Motorola 68000-series processors, ranging from the 68010 (Model 310, introduced 1985) to the Motorola 68040 (Model 38x, introduced 1991). The Series 400 (introduced 1990) were intended to supersede the Apollo/Domain workstations and were also based on the 68030/040. They were branded "HP Apollo" and added Apollo Domain/OS compatibility. The suffix 's' and 't' used on the Series 400 represented "Side" (as in Desk side) and "Top" (as in Desk top) model. The last two digits of the Series 400 originally was the clock frequency of the processor in MHz (e.g. 433 was 33 MHz). At introduction, the Series 400 had a socket for the MC68040, but since they were not available at the time, an emulator card with an MC68030 and additional circuitry was installed. Customers who purchased systems were given a guaranteed upgrade price of $5,000USD to the MC68040, when they became available. The Series 300 and 400 shared the same I/O interface as the Series 200. The 32-bit DIO-II bus is rated at 6 MB/s.
|
HP 9000
|
Workstation models
|
Series 500 The Series 500s were based on the HP FOCUS microprocessor. They began as the HP 9020, HP 9030, and HP 9040, were renamed the HP Series 500 Model 20, 30, and 40 shortly after introduction, and later renamed again as the HP 9000 Model 520, 530 and 540. The 520 was a complete workstation with built-in keyboard, display, 5.25-inch floppy disk, and optional thermal printer and 5 MB hard disk. The 520 could run BASIC or HP-UX and there were three different models based on the displays attached (two color and one monochrome). The 530 was a rackmount version of the Series 500, could only run HP-UX, and used a serial interface console. The 540 was a 530 mounted inside a cabinet, similar to the disk drives offered then and included a serial multiplexer (MUX). Later models of the Series 500s were the 550 and 560, which had a completely different chassis and could be connected to graphics processors. The processors in the original Series 500s ran at 20 MHz, and could reach a benchmark speed of 1 million instructions per second (MIPS), equivalent to a VAX-11/780, then a common benchmark standard. They could be networked together and with 200 and 300 series using the Shared Resource Manager (SRM).
|
HP 9000
|
Workstation models
|
Because of their performance, the US government placed the 500 series on its export restricted list. The computers were only permitted to be sold in Western Europe, Canada, Australia, and New Zealand, with any other country needing written approval.
|
HP 9000
|
Workstation models
|
Series 700 The first workstations in the series, the Model 720, Model 730 and Model 750 systems were introduced on 26 March 1991 and were code-named "Snakes". The models used the PA-7000 microprocessor, with the Model 720 using a 50 MHz version and the Model 730 and Model 750 using a 66 MHz version. The PA-7000 is provided with 128 KB of instruction cache on the Model 720 and 730 and 256 KB on the Model 750. All models are provided with 256 KB of data cache. The Model 720 and Model 730 supported 16 to 64 MB of memory, while the Model 750 supported up to 192 MB. Onboard SCSI was provided by an NCR 53C700 SCSI controller. These systems could use both 2D and 3D graphics options, with 2D options being the greyscale GRX and the color CRX. 3D options were the Personal VRX and the Turbo GRX.In early January 1992, HP introduced the Model 705, code-named "Bushmaster Snake", and the Model 710, code-named "Bushmaster Junior". Both systems are low-end diskless workstations, with the Model 705 using a 32 MHz PA-7000 and the Model 710 using a 50 MHz version. At introduction, the Model 705 was priced at under US$5,000, and the Model 710 under US$10,000.The first Series 700 workstations were superseded by the Model 715/33, 715/50, 725/50 low-end workstations and the Model 735/99, 735/125, 755/99 and 755/125 high-end workstations on 10 November 1992. The existing Model 715 and Model 725 were later updated with the introduction of the Model 715/75 and 725/75 in September 1993. The new models used a 75 MHz PA-7100.Increasing integration led to the introduction of the Model 712/60 and Model 712/80i workstations on 18 January 1994. Code-named "Gecko", these models were intended to compete with entry-level workstations from Sun Microsystems and high-end personal computers. They used the PA-7100LC microprocessor operating at 60 and 80 MHz, respectively. The Model 712/80i was an integer only model, with the floating point-unit disabled. Both supported 16 to 128 MB of memory.The Model 715/64, 715/80, 715/100 and 725/100 were introduced in May 1994, targeted at the 2D and 3D graphics market. These workstations use the PA-7100LC microprocessor and supported 32 to 128 MB of memory, except for the Model 725/100, which supported up to 512 MB.The Model 712/100 (King Gecko), an entry-level workstation, and Model 715/100 XC, a mid-range workstation, were introduced in June 1995. The Model 712/100 is a Model 712 with a 100 MHz PA-7100LC and 256 KB of cache while the Model 715/100 XC is a Model 715/100 with 1 MB of cache.The Model 712 and 715 workstations feature the Lasi ASIC, connected by the GSC bus. The Lasi ASIC provided an integrated NCR 53C710 SCSI controller, an Intel Apricot 10 Mbit Ethernet interface, CD-quality sound, PS/2 keyboard and mouse, a serial and a parallel port. All models, except for the 712 series machines also use the Wax ASIC to provide an EISA adapter, a second serial port and support for the HIL bus.
|
HP 9000
|
Workstation models
|
The SGC bus (System Graphics Connect), which is used in the earlier series 700 workstations, has similar specifications as PCI with 32-bit/33 MHz [1] and a typical bandwidth of about 100 MB/s [2].
VME Industrial Workstations Models 742i, 743i, 744, 745/745i, 747i, 748i.
B, C, J class The C100, C110, J200, J210 and J210XC use the PA-7200 processor, connected to the UTurn IOMMU via the Runway bus. The C100 and C110 are single processor systems, and the J200 and J210 are dual processor systems. The Uturn IOMMU has two GSC buses. These machines continue to use the Lasi and Wax ASICs.
|
HP 9000
|
Workstation models
|
The B132L (introduced 1996), B160L, B132L+, B180L, C132L, C160L and C180L workstations are based on the PA-7300LC processor, a development of the PA-7100LC with integrated cache and GSC bus controller. Standard graphics is the Visualize EG. These machines use the Dino GSC to PCI adapter which also provides the second serial port in place of Wax; they optionally have the Wax EISA adapter.
|
HP 9000
|
Workstation models
|
The C160, C180, C180-XP, J280 and J282 use the PA-8000 processor and are the first 64-bit HP workstations. They are based on the same Runway/GSC architecture as the earlier C and J class workstations.
The C200, C240 and J2240 offer increased speed with the PA-8200 processor and the C360 uses the PA-8500 processor.
The B1000, B2000, C3000, J5000 and J7000 were also based on the PA-8500 processor, but had a very different architecture. The U2/Uturn IOMMU and the GSC bus is gone, replaced with the Astro IOMMU, connected via Ropes to several Elroy PCI host adapters.
The B2600, C3600 and J5600 upgrade these machines with the PA-8600 processor. The J6000 is a rack-mountable workstation which can also be stood on its side in a tower configuration.
The C3650, C3700, C3750, J6700 and J6750 are PA-8700-based.
The C8000 uses the dual-core PA-8800 or PA-8900 processors, which uses the same bus as the McKinley and Madison Itanium processors and shares the same zx1 chipset. The Elroy PCI adapters have been replaced with Mercury PCI-X adapters and one Quicksilver AGP 8x adapter.
|
HP 9000
|
Server models
|
800 Series – 807, 817, 822, 825, 827, 832, 835, 837, 840, 842, 845, 847, 850,855, 857, 867, 877, 887, 897 1200 FT Series – 1210, 1245, 1245 PLUS A-class – A180, A180C (Staccato), A400, A500 D-class – D200, D210, D220, D230, D250, D260, D270, D280, D300, D310, D320, D330, D350, D360, D370, D380, D390 E-class – E25, E35, E45, E55 F-class – F10, F20, F30 (Nova) G-class – G30, G40, G50, G60, G70 (Nova / Nova64) H-class – H20, H30, H40, H50, H60, H70 I-class – I30, I40, I50, I60, I70 K-class – K100, K200, K210, K220, K250, K260, K360, K370, K380, K400, K410, K420, K450, K460, K570, K580 L-class – L1000, L1500, L2000, L3000 N-class – N4000 N-class – N4004 N-class – N4005 N-class – N4006 R-class – R380, R390 S-class – rebadged Convex Exemplar SPP2000 (single-node) T-class – T500, T520, T600 V-class – V2200, V2250, V2500, V2600 X-class – rebadged Convex Exemplar SPP2000 (multi-node) rp2400 – rp2400 (A400), rp2405 (A400), rp2430 (A400), rp2450 (A500), rp2470 (A500) (former A-class) rp3400 – rp3410-2, rp3440-4 (1-2 PA-8800/8900 processors) rp4400 – rp4410-4, rp4440-8 rp5400 – rp5400, rp5405, rp5430, rp5450, rp5470 (former L-class) rp7400 – rp7400 (former N-class) rp7405 – rp7405, rp7410, rp7420-16, rp7440-16 rp8400 – rp8400, rp8410, rp8420-32, rp8440-32 HP 9000 Superdome – SD-32, SD-64, SD-128 (PA-8900 processors) D-class (Codename: Ultralight) The D-class are entry-level and mid-range servers that succeeded the entry-level E-class servers and the mid-range G-, H-, I-class servers. The first models were introduced in late January 1996, consisting of the Model D200, D210, D250, D310 and D350. The Model D200 is a uniprocessor with a 75 MHz PA-7100LC microprocessor, support for up to 512 MB of memory and five EISA/HP-HSC slots. The Model D210 is similar, but it used a 100 MHz PA-7100LC. The Model D250 is dual-processor model and it used the 100 MHz PA-7100LC. It supported up to 768 MB of memory and had five EISA/HP-HSC slots. The Model D310 is a uniprocessor with a 100 MHz PA-7100LC, up to 512 MB of memory and eight EISA/HP-HSC slots. The Model D350 is a high-end D-class system, a dual-processor, it had two 100 MHz PA-7100LCs, up to 768 MB of memory and eight EISA/HP-HSC slots.
|
HP 9000
|
Server models
|
In mid-September 1996, two new D-class servers were introduced to utilize the new 64-bit PA-8000 microprocessor, the Model D270 uniprocessor and the Model D370 dual-processor. Both were positioned as entry-level servers. They used the 160 MHz PA-8000 and supported 128 MB to 1.5 GB of memory.In January 1997, the low-end Model D220, D230, D320 and D330 were introduced, using 132 and 160 MHz versions of the PA-7300LC microprocessor.The D-class are tower servers with up to two microprocessors and are architecturally similar to the K-class. They sometimes masquerade as larger machines as HP shipped them mounted vertically inside a large cabinet containing a power supply and multiple disks with plenty of room for air to circulate.
|
HP 9000
|
Server models
|
R-class The R-class is simply a D-class machine packaged in a rack-mount chassis. Unlike the D-class systems, it does not support hot-pluggable disks.
|
HP 9000
|
Server models
|
N-class The N-class is a 10U rackmount server with up to eight CPUs and 12 PCI slots. It uses two Merced buses, one for every four processor slots. It is not a NUMA machine, having equal access to all memory slots. The I/O is unequal though; having one Ike IOMMU per bus means that one set of CPUs are closer to one set of I/O slots than the other.
|
HP 9000
|
Server models
|
The N-class servers were marketed as "Itanium-ready", although when the Itanium shipped, no Itanium upgrade was made available for the N class. The N class did benefit from using the Merced bus, bridging the PA-8x00 microprocessors to it via a special adapter called DEW.
The N4000 was upgraded with newer processors throughout its life, with models called N4000-36, N4000-44 and N4000-55 indicating microprocessor clock frequencies of 360, 440, and 550 MHz, respectively. It was renamed to the rp7400 series in 2001.
L-class The L-class servers are 7U rackmount machines with up to 4 CPUs (depending on model). They have 12 PCI slots, but only 7 slots are enabled in the entry-level L1000 system. Two of the PCI slots are occupied by factory integrated cards and cannot be utilized for I/O expansion by the end-user.
The L1000 and L2000 are similar to the A400 and A500, being based on an Astro/Elroy combination. They initially shipped with 360 MHz and 440 MHz PA-8500 and were upgraded with 540 MHz PA-8600.
The L3000 is similar to the N4000, being based on a DEW/Ike/Elroy combination. It shipped only with 550 MHz PA-8600 CPUs.
The L-class family was renamed to the rp5400 series in 2001.
A-class The A180 and A180C were 32-bit, single-processor, 2U servers based on the PA-7300LC processor with the Lasi and Dino ASICs.
|
HP 9000
|
Server models
|
The A400 and A500 servers were 64-bit, single and dual-processor 2U servers based on the PA-8500 and later processors, using the Astro IOMMU and Elroy PCI adapters. The A400-36 and A500-36 machines used the PA-8500 processor running at 360 MHz; the A400-44 and A500-44 are clocked at 440 MHz. The A500-55 uses a PA-8600 processor running at 550 MHz and the A500-75 uses a PA-8700 processor running at 750 MHz.
|
HP 9000
|
Server models
|
The A-class was renamed to the rp2400 series in 2001.
S/X-class The S- and X-class were Convex Exemplar SPP2000 supercomputers rebadged after HP's acquisition of Convex Computer in 1995. The S-class was a single-node SPP2000 with up to 16 processors, while the X-class name was used for multi-node configurations with up to 512 processors. These machines ran Convex's SPP-UX operating system.
|
HP 9000
|
Server models
|
V-class The V-class servers were based on the multiprocessor technology from the S-class and X-class. The V2200 and V2250 support a maximum of 16 processors, and the V2500 and V2600 support a maximum of 32 processors. The V-class systems are physically large systems that need extensive cooling and three-phase electric power to operate. They provided a transitional platform between the T-class and the introduction of the Superdome.
|
HP 9000
|
Operating systems
|
Apart from HP-UX and Domain/OS (on the 400), many HP 9000s can also run the Linux operating system. Some PA-RISC-based models are able to run NeXTSTEP.
Berkeley Software Distribution (BSD) Unix was ported to the HP 9000 as HPBSD; the resulting support code was later added to 4.4BSD. Its modern variants NetBSD and OpenBSD also support various HP 9000 models, both Motorola 68k and PA-RISC based.
In the early 1990s, several Unix R&D systems were ported to the PA-RISC platform, including several attempts of OSF/1, various Mach ports and systems that combined parts of Mach with other systems (MkLinux, Mach 4/Lites). The origin of these ports were mostly either internal HP Labs projects or HP products, or academic research, mostly at the University of Utah.
|
HP 9000
|
Operating systems
|
One project conducted at HP Laboratories involved replacing core HP-UX functionality, specifically the virtual memory and process management subsystems, with Mach functionality from Mach 2.0 and 2.5. This effectively provided a vehicle to port Mach to the PA-RISC architecture, as opposed to starting with the Berkeley Software Distribution configured to use the Mach kernel infrastructure and porting this to PA-RISC, and thereby delivered a version of HP-UX 2.0 based on Mach, albeit with certain features missing from both Mach and HP-UX. The motivation for the project was to investigate performance issues with Mach related to the cache architecture of PA-RISC along with potential remedies for these issues.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.