Microserfs, published by HarperCollins in 1995, is an epistolary novel by Douglas Coupland. It first appeared in short story form as the cover article for the January 1994 issue of Wired magazine and was subsequently expanded to full novel length. Set in the early 1990s, it captures the state of the technology industry before Windows 95, anticipates the dot-com bubble of the late 1990s; the novel is presented in the form of diary entries maintained on a PowerBook by the narrator, Daniel. Because of this, as well as its formatting and usage of emoticons, this novel is similar to what emerged a decade as the blog format. Coupland revisited many of the ideas in Microserfs in his 2006 novel JPod, labeled "Microserfs for the Google generation"; the plot of the novel has two distinct movements: the events at Microsoft in Redmond and the move to Silicon Valley and the "Oop!" project. The novel begins in Redmond as the characters are working on different projects at Microsoft's main campus. Life at the campus feels like a feudalistic society, with Bill Gates as the lord, the employees the serfs.
The majority of the main characters—Daniel, Todd, Bug and Abe—are living together in a "geek house", their lives are dedicated to their projects and the company. Daniel's foundations are shaken when a longtime employee of IBM, is laid off; the lifespan of a Microsoft coder weighs on Daniel's mind. The second movement of the novel begins when the characters are offered jobs in Silicon Valley working on a project for Michael, who has by left Redmond. All of the housemates—some some after thought—decide to move to the Valley; the characters' lives change drastically once they leave the limited sphere of the Microsoft campus and enter the world of "One-Point-Oh". They begin to work on a project called "Oop!". Oop! is a Lego-like design program, allowing dynamic creation of many objects, bearing a resemblance to 2009's Minecraft. One of the undercurrents of the plot is Daniel and his family's relationship to Jed, Daniel's younger brother who died in a boating accident while they were children. Daniel The book's narrator and main character.
A software tester for Microsoft. His thoughts are funneled into the book through the epistolary format of the novel, as he records stream of consciousness lists of terms that he believes exist in a computer's subconscious. Susan A programmer working for Microsoft. Throughout the novel, Susan attempts to maintain a meaning to life outside of work, she gains semi-celebrity status after founding Chyx, a feminist support group for Valley women who code. Todd A tester and coworker of Daniel's, obsessed with bodybuilding and is continually searching for something to believe in, his family is Christian, while Todd has rejected his parents' faith. Bug Barbecue A coworker of Daniel's, he is older than most of the other characters, likes to remind them of his greater experience in the software industry. He comes out of the closet, his primary reason for leaving Microsoft for Oop! was to "leave the old me behind" and start over. Michael A gifted programmer with high-functioning autism working for Microsoft.
Michael's decision to leave Microsoft and found a startup company is the impetus for the change in lives of the other characters. Michael lives on a "Flatlander" diet, his screen name is "Kraft Singles". Michael is addicted to Robitussin cough syrup, which contains the dissociative drug dextromethorphan. Karla A coder and girlfriend of Daniel. Karla's relationship with her family is tense, she avoids contact with them, she begins the story as a closed-off person, but as the novel unfolds her character begins to be more open and understanding. She has a history of an eating disorder. Abe MIT graduate coder and multimillionaire who stays with Microsoft when the rest of the characters leave for California, his email conversations with Daniel appear throughout the novel. Abe, who dearly missed his friends joins Oop! and saves the company from financial ruin. Ethan President and co-founder of Oop!. Business-minded, he has been a millionaire three times over with various projects, he devotes his time to seeking venture capital for the startup company.
Ethan's personality is diametrically opposed to the other characters, in part because of his relative lack of technical knowledge. He suffers from bad dandruff and his skin is pocked by scars from procedures to remove cancerous growths. Dusty Female bodybuilder and coder, introduced in the novel, she is romantically involved with Todd, they have a baby together. She becomes an employee at Oop!. She and Todd are obsessed with transforming their bodies into perfect "machines" by going to the gym every day and taking protein pills and drinks. Amy A Canadian computer engineering student, introduced in the novel, she and Michael meet on the internet and fall in love despite never meeting in person or knowing each other's genders. Due to Michael's fear of rejection, Daniel is sent to the University of Waterloo to meet her. Amy becomes engaged to Michael and joins the Oop! team after graduating from university. Emmett Introduced in the novel, Emmett is a
Position in poker refers to the order in which players are seated around the table and the related poker strategy implications. Players who act first are in "early position". A player "has position" on opponents acting before him and is "out of position" to opponents acting after him; because players act in clockwise order, a player "has position" on opponents seated to his right, except when the opponent has the button and certain cases in the first betting round of games with blinds. The primary advantage held by a player in late position is that he will have more information with which to make better decisions than players in early position, who will have to act first, without the benefit of this extra information; this advantage has led to many players in heads-up play raising on the button with an wide range of hands because of this positional advantage. As earlier opponents fold, the probability of a hand being the best goes up as the number of opponents goes down; the blinds are the least desirable position because a player is forced to contribute to the pot and they must act first on all betting rounds after the flop.
Although the big blind has a big advantage on the first round of betting, it is on average the biggest money losing position. There are 10 players playing $4/$8 fixed limit. Alice pays the $2 small blind. Bob pays the $4 big blind. Carol is under the gun. If Carol has a hand like K♥ J♠, she may choose to fold. With 9 opponents remaining to act, there is a 40% chance that at least one of them will have a better hand than Carol's like A-A, K-K, Q-Q, J-J, A-K, A-Q, A-J or K-Q, and if no one does, seven of them will have position on Carol in the next three betting rounds. Now instead, suppose David in the cut-off position has the same K♥ J♠ and all players fold to him. In this situation, there are only three opponents left to act, so the odds that one of them has a better hand are less. Secondly, two of those three will be out of position to David on betting rounds. A common play would be for David to hope that the button folds. David's raise might steal the blinds if they don't have playable hands, but if they do play, David will be in good shape to take advantage of his position in betting rounds.
Poker jargon Advice on Positional Play in Texas Holdem
In computing, a plug-in is a software component that adds a specific feature to an existing computer program. When a program supports plug-ins, it enables customization. Web browsers have allowed executables as plug-ins, though they are now deprecated. Two plug-in examples are the Adobe Flash Player for playing videos and a Java virtual machine for running applets. A theme or skin is a preset package containing additional or changed graphical appearance details, achieved by the use of a graphical user interface that can be applied to specific software and websites to suit the purpose, topic, or tastes of different users to customize the look and feel of a piece of computer software or an operating system front-end GUI. Applications support plug-ins for many reasons; some of the main reasons include: to enable third-party developers to create abilities which extend an application to support adding new features to reduce the size of an application to separate source code from an application because of incompatible software licenses.
Types of applications and why they use plug-ins: Audio editors use plug-ins to generate, process or analyze sound. Ardour and Audacity are examples of such editors. Digital audio workstations use plug-ins to process it. Examples include ProTools. Email clients use plug-ins to encrypt email. Pretty Good Privacy is an example of such plug-ins. Video game console emulators use plug-ins to modularize the separate subsystems of the devices they seek to emulate. For example, the PCSX2 emulator makes use of video, optical, etc. plug-ins for those respective components of the PlayStation 2. Graphics software use plug-ins to support file formats and process images. Media players use plug-ins to apply filters. Foobar2000, GStreamer, Quintessential, VST, Winamp, XMMS are examples of such media players. Packet sniffers use plug-ins to decode packet formats. OmniPeek is an example of such packet sniffers. Remote sensing applications use plug-ins to process data from different sensor types. Text editors and Integrated development environments use plug-ins to support programming languages or enhance development process e.g. Visual Studio, RAD Studio, IntelliJ IDEA, jEdit and MonoDevelop support plug-ins.
Visual Studio itself can be plugged into other applications via Visual Studio Tools for Office and Visual Studio Tools for Applications. Web browsers have used executables as plug-ins, though they are now deprecated. Examples include Java SE, QuickTime, Microsoft Silverlight and Unity; the host application provides services which the plug-in can use, including a way for plug-ins to register themselves with the host application and a protocol for the exchange of data with plug-ins. Plug-ins depend on the services provided by the host application and do not work by themselves. Conversely, the host application operates independently of the plug-ins, making it possible for end-users to add and update plug-ins dynamically without needing to make changes to the host application. Programmers implement plug-in functionality using shared libraries, which get dynamically loaded at run time, installed in a place prescribed by the host application. HyperCard supported a similar facility, but more included the plug-in code in the HyperCard documents themselves.
Thus the HyperCard stack became a self-contained application in its own right, distributable as a single entity that end-users could run without the need for additional installation-steps. Programs may implement plugins by loading a directory of simple script files written in a scripting language like Python or Lua. In Mozilla Foundation definitions, the words "add-on", "extension" and "plug-in" are not synonyms. "Add-on" can refer to anything. Extensions comprise a subtype, albeit the most powerful one. Mozilla applications come with integrated add-on managers that, similar to package managers, install and manage extensions; the term, "Plug-in", however refers to NPAPI-based web content renderers. Plug-ins are being deprecated. Plug-ins appeared as early as the mid 1970s, when the EDT text editor running on the Unisys VS/9 operating system using the UNIVAC Series 90 mainframe computers provided the ability to run a program from the editor and to allow such a program to access the editor buffer, thus allowing an external program to access an edit session in memory.
The plug-in program could make calls to the editor to have it perform text-editing services upon the buffer that the editor shared with the plug-in. The Waterloo Fortran compiler used this feature to allow interactive compilation of Fortran programs edited by EDT. Early PC software applications to incorporate plug-in functionality included HyperCard and QuarkXPress on the Macintosh, both released in 1987. In 1988, Silicon Beach Software included plug-in functionality in Digital Darkroom and SuperPaint, Ed Bomke coined the term plug-in. Applet Browser extension
Tennis is a racket sport that can be played individually against a single opponent or between two teams of two players each. Each player uses a tennis racket, strung with cord to strike a hollow rubber ball covered with felt over or around a net and into the opponent's court; the object of the game is to maneuver the ball in such a way that the opponent is not able to play a valid return. The player, unable to return the ball will not gain a point, while the opposite player will. Tennis is played at all levels of society and at all ages; the sport can be played by anyone. The modern game of tennis originated in Birmingham, England, in the late 19th century as lawn tennis, it had close connections both to various field games such as croquet and bowls as well as to the older racket sport today called real tennis. During most of the 19th century, in fact, the term tennis referred to real tennis, not lawn tennis; the rules of modern tennis have changed little since the 1890s. Two exceptions are that from 1908 to 1961 the server had to keep one foot on the ground at all times, the adoption of the tiebreak in the 1970s.
A recent addition to professional tennis has been the adoption of electronic review technology coupled with a point-challenge system, which allows a player to contest the line call of a point, a system known as Hawk-Eye. Tennis is played by millions of recreational players and is a popular worldwide spectator sport; the four Grand Slam tournaments are popular: the Australian Open played on hard courts, the French Open played on red clay courts, Wimbledon played on grass courts, the US Open played on hard courts. Historians believe that the game's ancient origin lay in 12th century northern France, where a ball was struck with the palm of the hand. Louis X of France was a keen player of jeu de paume, which evolved into real tennis, became notable as the first person to construct indoor tennis courts in the modern style. Louis was unhappy with playing tennis outdoors and accordingly had indoor, enclosed courts made in Paris "around the end of the 13th century". In due course this design spread across royal palaces all over Europe.
In June 1316 at Vincennes, Val-de-Marne and following a exhausting game, Louis drank a large quantity of cooled wine and subsequently died of either pneumonia or pleurisy, although there was suspicion of poisoning. Because of the contemporary accounts of his death, Louis X is history's first tennis player known by name. Another of the early enthusiasts of the game was King Charles V of France, who had a court set up at the Louvre Palace, it wasn't until the 16th century that rackets came into use, the game began to be called "tennis", from the French term tenez, which can be translated as "hold!", "receive!" or "take!", an interjection used as a call from the server to his opponent. It was popular in England and France, although the game was only played indoors where the ball could be hit off the wall. Henry VIII of England was a big fan of this game, now known as real tennis. During the 18th and early 19th centuries, as real tennis declined, new racket sports emerged in England. Further, the patenting of the first lawn mower in 1830, in Britain, is believed to have been the catalyst, for the preparation of modern-style grass courts, sporting ovals, playing fields, greens, etc.
This in turn led to the codification of modern rules for many sports, including lawn tennis, most football codes, lawn bowls and others. Between 1859 and 1865 Harry Gem, a solicitor and his friend Augurio Perera developed a game that combined elements of racquets and the Basque ball game pelota, which they played on Perera's croquet lawn in Birmingham, United Kingdom. In 1872, along with two local doctors, they founded the world's first tennis club on Avenue Road, Leamington Spa; this is. After Leamington, the second club to take up the game of lawn tennis appears to have been the Edgbaston Archery and Croquet Society in Birmingham. In Tennis: A Cultural History, Heiner Gillmeister reveals that on December 8, 1874, British army officer Walter Clopton Wingfield wrote to Harry Gem, commenting that he had been experimenting with his version of lawn tennis “for a year and a half”. In December 1873, Wingfield designed and patented a game which he called sphairistikè, was soon known as "sticky" – for the amusement of guests at a garden party on his friend's estate of Nantclwyd Hall, in Llanelidan, Wales.
According to R. D. C. Evans, turfgrass agronomist, "Sports historians all agree that deserves much of the credit for the development of modern tennis." According to Honor Godfrey, museum curator at Wimbledon, Wingfield "popularized this game enormously. He produced a boxed set which included a net, rackets, balls for playing the game – and most you had his rules, he was terrific at marketing and he sent his game all over the world. He had good connections with the clergy, the law profession, the aristocracy and he sent thousands of sets out in the first year or so, in 1874." The world's oldest annual tennis tournament took place at Leamington Lawn Tennis Club in Birmingham in 1874. This was three years before the All England Lawn Tennis and Croquet Club would hold its first championships at Wimbledon, in 1877; the first Championships culminated a significant debate on. In the U. S. in 1874 Mary Ewing Outerbridge, a young socialite, returned from Bermuda with a sphairistikè set. She became fascin
A restraining order or protective order is an order used by a court to protect a person, company, establishment, or entity, the general public, in a situation involving alleged domestic violence, harassment, stalking, or sexual assault. In the United States, every state has some form of domestic violence restraining order law, many states have specific restraining order laws for stalking and sexual assault. Restraining and personal protection order laws vary from one jurisdiction to another but all establish who can file for an order, what protection or relief a person can get from such an order, how the order will be enforced; the court will order the adverse party to refrain from certain actions or require compliance with certain provisions. Failure to comply is a violation of the order which can result in the arrest and prosecution of the offender. Violations in some jurisdictions may constitute criminal or civil contempt of court. All protective order statutes permit the court to instruct an alleged abuser to stay a certain distance away from someone, their home, their workplace or their school and to not contact them.
Alleged victims may request the court to order that all contact, whether it be by telephone, mail, email, text, or delivery of flowers or gifts, be prohibited. Courts can instruct an alleged abuser to not hurt or threaten someone known as no violent contact orders; the no-violent contact order statutes from the court may allow the alleged abuser to maintain their current living situation with the alleged victim or have contact with them. Some states allow the court to order the alleged abuser to pay temporary support or continue to make mortgage payments on a home owned by both people, to award sole use of a home or car owned by both people, or to pay for medical costs or property damage caused by the alleged abuser; some courts might be able to instruct the alleged abuser to turn over any firearms and ammunition he or she has, attend a batterers' treatment program, appear for regular drug tests, or start alcohol or drug abuse counselling. Its issuance is sometimes called a "de facto divorce".
The standard of proof required to obtain a restraining order can vary from jurisdiction to jurisdiction, but it is lower than the standard of beyond a reasonable doubt required in criminal trials. Many US states—such as Oregon and Pennsylvania along with many others—use a standard of preponderance of the evidence. Other states use different standards, such as Wisconsin which requires that restraining orders be based on "reasonable grounds". Judges have some incentives to err on the side of granting restraining orders. If a judge should grant a restraining order against someone who might not warrant it the only repercussion is that the defendant might appeal the order. If, on the other hand, the judge denies a restraining order and the plaintiff is killed or injured, sour publicity and an enraged community reaction may harm the jurist's career. Colorado's statute inverts the standard court procedures and due process, providing that after the court issues an ex parte order, the defendant must "appear before the court at a specific time and date and... show cause, if any, why said temporary civil protection order should not be made permanent."
That is, Colorado courts place the burden of proof on the accused to establish his or her innocence, rather than requiring the accuser to prove his or her case. Hawaii requires the defendant to prove his or her own innocence; the low burden of proof for restraining orders has led to some high-profile cases involving stalkers of celebrities obtaining restraining orders against their targets. For example, in 2005 a New Mexico judge issued a restraining order against New York City-based TV host David Letterman after a woman made claims of abuse and harassment, including allegations that Letterman had spoken to her via coded messages on his TV show; the judge admitted that he granted the restraining order not on the merits of the case, but because the petitioner had filled out the required paperwork. Some attorneys have criticized the use of restraining orders on the theory that parties to a divorce may file such orders to gain tactical advantages, rather than out of a legitimate fear of harm. Liz Mandarano, an attorney who specializes in family and matrimonial law, speculates that divorce attorneys are incentivized to push for restraining orders because such orders force all communications to go through the parties' lawyers and may prolong the legal battle.
Some attorneys offer to have restraining orders dropped in exchange for financial concessions in such proceedings. There have been cases of abusers obtaining restraining orders against their victims, forcing them to divest themselves of firearms that could otherwise have been used for self-defense. Experts disagree on. A 2010 analysis published in the Journal of the American Academy of Psychiatry and the Law reviewed 15 U. S. studies of restraining order effectiveness, concluded that restraining orders "can serve a useful role in threat management". However, a 2002 analysis of 32 U. S. studies found that restraining orders are violated an average of 40 percent of the time and are perceived as being "followed by worse events" 21 percent of the time, concluded that "evidence of relative efficacy is lacking", that they may pose some degree of risk. Other studies have found that restraining orders offer little or no deterrent against future interpersonal violence
Feature-oriented scanning is a method of precision measurement of surface topography with a scanning probe microscope in which surface features are used as reference points for microscope probe attachment. With FOS method, by passing from one surface feature to another located nearby, the relative distance between the features and the feature neighborhood topographies are measured; this approach allows to scan an intended area of a surface by parts and reconstruct the whole image from the obtained fragments. Beside the mentioned, it is acceptable to use another name for the method – object-oriented scanning. Any topography element that looks like a hill or a pit in wide sense may be taken as a surface feature. Examples of surface features are: atoms, molecules, nanoparticles, crystallites, quantum dots, pillars, short nanowires, short nanorods, short nanotubes, bacteria, cells, etc. FOS is designed for high-precision measurement of surface topography as well as other surface properties and characteristics.
Moreover, in comparison with the conventional scanning, FOS allows obtaining a higher spatial resolution. Thanks to a number of techniques embedded in FOS, the distortions caused by thermal drifts and creeps are eliminated. FOS has the following fields of application: surface metrology, precise probe positioning, automatic surface characterization, automatic surface modification/stimulation, automatic manipulation of nanoobjects, nanotechnological processes of “bottom-up” assembly, coordinated control of analytical and technological probes in multiprobe instruments, control of atomic/molecular assemblers, control of probe nanolithographs, etc. Counter-scanning Feature-oriented positioning 1. R. V. Lapshin. "Feature-oriented scanning methodology for probe microscopy and nanotechnology". Nanotechnology. UK: IOP. 15: 1135–1151. Doi:10.1088/0957-4484/15/9/006. ISSN 0957-4484.. 2. R. V. Lapshin. "Automatic drift elimination in probe microscope images based on techniques of counter-scanning and topography feature recognition".
Measurement Science and Technology. UK: IOP. 18: 907–927. Doi:10.1088/0957-0233/18/3/046. ISSN 0957-0233.. 3. R. V. Lapshin. "Feature-oriented scanning probe microscopy". In H. S. Nalwa. Encyclopedia of Nanoscience and Nanotechnology. 14. USA: American Scientific Publishers. Pp. 105–115. ISBN 1-58883-163-9.4. R. Lapshin. "Feature-oriented scanning probe microscopy: precision measurements, bottom-up nanotechnologies". Electronics: Science, Business. Russian Federation: Technosphera Publishers: 94–106. ISSN 1992-4178.. 5. R. V. Lapshin. "Drift-insensitive distributed calibration of probe microscope scanner in nanometer range: Approach description". Applied Surface Science. Netherlands: Elsevier B. V. 359: 629–636. Doi:10.1016/j.apsusc.2015.10.108. ISSN 0169-4332.6. R. V. Lapshin. "Drift-insensitive distributed calibration of probe microscope scanner in nanometer range: Virtual mode". Applied Surface Science. Netherlands: Elsevier B. V. 378: 530–539. Doi:10.1016/j.apsusc.2016.03.201. ISSN 0169-4332.7. R. V. Lapshin. "Drift-insensitive distributed calibration of probe microscope scanner in nanometer range: Real mode".
Applied Surface Science. Netherlands: Elsevier B. V. 470: 1122–1129. Doi:10.1016/j.apsusc.2018.10.149. ISSN 0169-4332.8. R. V. Lapshin. "Availability of feature-oriented scanning probe microscopy for remote-controlled measurements on board a space laboratory or planet exploration rover". Astrobiology. USA: Mary Ann Liebert. 9: 437–442. Doi:10.1089/ast.2007.0173. ISSN 1531-1074.9. R. V. Lapshin. "Observation of a hexagonal superstructure on pyrolytic graphite by method of feature-oriented scanning tunneling microscopy". Proceedings of the 25th Russian Conference on Electron Microscopy. 1. June 2-6, Russia: Russian Academy of Sciences. Pp. 316–317. ISBN 978-5-89589-068-4.10. D. W. Pohl, R. Möller. ""Tracking" tunneling microscopy". Review of Scientific Instruments. USA: AIP Publishing. 59: 840–842. Doi:10.1063/1.1139790. ISSN 0034-6748.11. B. S. Swartzentruber. "Direct measurement of surface diffusion using atom-tracking scanning tunneling microscopy". Physical Review Letters. USA: American Physical Society. 76: 459–462.
Doi:10.1103/PhysRevLett.76.459. ISSN 0031-9007.12. S. B. Andersson, D. Y. Abramovitch. "A survey of non-raster scan methods with application to atomic force microscopy". Proceedings of the American Control Conference. July 9-13, New York, USA: IEEE. pp. 3516–3521. Doi:10.1109/ACC.2007.4282301. ISBN 1-4244-0988-8. Feature-oriented scanning, Research section, Lapshin's Personal Page on SPM & Nanotechnology