History of personal computers in Japan

Author(s):  
Ryozo Yamashita
Design Issues ◽  
2019 ◽  
Vol 35 (4) ◽  
pp. 23-32
Author(s):  
Elizabeth Petrick

This article concerns the history of the curb cut metaphor as applied to personal computer technology in the 1980s. Disability advocates used the metaphor to argue the necessity for accessibility features on computers to enable greater access. To accomplish this goal, these advocates utilized a complex comparison between personal computers and sidewalk ramps to combat assumptions about who the intended computer user was and to argue for how people with different abilities could operate the same technology.


2019 ◽  
Vol 11 (9) ◽  
pp. 194 ◽  
Author(s):  
Sherali Zeadally ◽  
Farhan Siddiqui ◽  
Zubair Baig

Bluetooth technology started off as a wireless, short-range cable replacement technology but it has undergone significant developments over the last two decades. Bluetooth radios are currently embedded in almost all computing devices including personal computers, smart phones, smart watches, and even micro-controllers. For many of us, Bluetooth is an essential technology that we use every day. We provide an insight into the history of Bluetooth and its significant design developments over the last 25 years. We also discuss related issues (including security) and Bluetooth as a driving technology for the Internet of Things (IoT). Finally, we also present recent research results obtained with Bluetooth technology in various application areas.


Author(s):  
Geogen G. ◽  
Poovammal E.

Why should everyone know about mobile malware? With the introduction of Internet of Things (IoT) and Cloud, you can't survive in a disconnected world. Thus from your home appliances to your window curtains, everything is connected to Internet which can be accessed through your hand held mobile device. Unlike Personal Computers, these devices give Hackers a greater attack landscape. Back in 2004, when the first mobile malware was introduced, we never thought that it would get such a big threat space, as we see today. So, we discuss the History of Mobile malwares and its categories with its motives. We also discuss few signs that indicate the presence of a mobile malware. To conclude we categorize the battle against malware into two namely prevention and response, which is forensically analysed using Static/Dynamic Methods/Tools.


Author(s):  
Geogen G. ◽  
Poovammal E.

Why should everyone know about mobile malware? With the introduction of Internet of Things (IoT) and Cloud, you can't survive in a disconnected world. Thus from your home appliances to your window curtains, everything is connected to Internet which can be accessed through your hand held mobile device. Unlike Personal Computers, these devices give Hackers a greater attack landscape. Back in 2004, when the first mobile malware was introduced, we never thought that it would get such a big threat space, as we see today. So, we discuss the History of Mobile malwares and its categories with its motives. We also discuss few signs that indicate the presence of a mobile malware. To conclude we categorize the battle against malware into two namely prevention and response, which is forensically analysed using Static/Dynamic Methods/Tools.


2006 ◽  
Vol 1 (1) ◽  
Author(s):  
William Y Svrcek ◽  
Marco A Satyro

This paper reviews the evolution of process simulation in conjunction with the evolution of computer hardware and software technologies from a chemical engineering perspective. A brief history of this hardware evolution is presented and points to exponential growth of computing power. The current personal computers or full function workstations have at least 1GB of memory, 100GB hard drive and run at 4 GHz. We as chemical engineers can only benefit from this continued hardware evolution, as the personal computer has become our full function slide rule.Concurrent with this hardware evolution there has been a proliferation of operating systems and applications software. Some of the applications software has migrated from mainframes and minicomputers and some has been specifically written to take advantage of the user-friendly features available on today's personal computers. A review of this software is presented with particular emphasis on process simulation software. The currently available fifth generation, non-sequential interactive process simulator does make process modeling and design a truly rewarding experience. This software has been designed to allow the personal computer and the engineer to do what each does best, namely the personal computer performing the systematic number crunching and the engineer the intuitive aspect of process simulation and design. The paper will conclude with a look into the future development of process simulation and its interaction with chemical engineering practice.


2021 ◽  
Vol 6 (1) ◽  
Author(s):  
Fahmins ◽  
Muftiarifin ◽  
Endahyuniarti

Pemeliharaan pada pesawat terbang harus tercatat rapi dan lengkap menurut CASR Part 145, dimana salah satu pencatatan pemeliharaan yaitu catatan pada setiap komponen yang mengalami kerusakan dan perbaikan. Semua dicatat berdasarkan lokasi komponen, tanggal ditemukan dan dokumen yang berkaitan dengan kerusakan dan perbaikan tersebut. Contoh catatan pemeliharaan adalah dent and buckle chart (DBC). Dent and buckle chart yaitu catatan kerusakan dan perbaikan yang telah dilakukan pada struktur pesawat terbang. Fungsi dari DBC ini yaitu untuk memudahkan dalam pencarian riwayat kerusakan dan perbaikan pada pesawat terbang. Penelitian ini berupa rancang bangun perangkat lunak database DBC, tujuannya memudahkan pencatatan DBC, dan penggunaannya dapat diakses di semua device seperti PC (Personal Computer) dan smartphone. Perangkat lunak ini berupa website yang diberi nama “Sysdnb” dan telah dibuat untuk mencatat kerusakan dan perbaikan yang ada pada pesawat tipe B737-800. Metode yang digunakan dalam penelitian ini adalah pertama mengumpulkan data catatan perbaikan dan kerusakan B737-800, kemudian membuat Sysdnb dan input data catatan ke database. Setelah selesai membuat Sysdnb dan data sudah ter-input adalah trial Sysdnb. Hasil trial menunjukkan pencatatan kerusakan dan perbaikan pada pesawat B737-800. Sysdnb ini berhasil dibuat untuk memudahkan personil lapangan dalam melakukan pencarian riwayat kerusakan dan perbaikan pada pesawat B737-800 dan keterbatasan dari sysdnb ini yaitu tetap harus membuka dokumen SRM secara manual. Abstract - Maintenance on an aircraft must be neatly and completely recorded according to CASR Part 145, where one of the maintenance records is a record of each component that is damaged and repaired. All are recorded based on the location of the component, date found and documents relating to the damage and repair. Examples of maintenance records are the dent and buckle chart (DBC). Dent and buckle chart is a record of damage and repairs that have been made to aircraft structures. The function of this DBC is to facilitate the search for a history of damage and repairs to aircraft. This research is in the form of DBC database software design, its purpose is to make it easier to record DBC, and its use can be accessed on all devices such as PCs (Personal Computers) and smartphones. This software is in the form of a website called "Sysdnb" and has been made to record the damage and repairs that exist on the type B737-800 aircraft. The method used in this study is to first collect the B737-800 repair and damage log data, then create a Sysdnb and input the log data to the database. After completing Sysdnb and the data has been input is a trial Sysdnb. The trial results show the recording of damage and repairs on the B737-800 aircraft. This system was successfully created to facilitate field personnel in searching for a history of damage and repairs on the B737-800 aircraft and the limitation of this system is that it still has to open SRM documents manually.


Sign in / Sign up

Export Citation Format

Share Document