computer

System for Prevention of Computer Vision Syndrome

When a person uses a computer, the graphic display of the computer screen causes a user's eye blink rate to be reduced by an average of sixty-six percent. This reduction in blinking can cause a variety of eye ailments, such as eye strain that results from lack of adequate blinking. This system is a light display system for compelling a computer user to blink their eyes. In one embodiment, the system includes a computer screen, a light source associated with a controller configured to execute a program to activate and deactivate the light source, wherein the light source turns the light on and off when the light source is activated, and deactivated. The systems and methods provide advantages in that a computer user will involuntarily blink as the light source is activated, which will increase the overall blink rate of the computer user's eyes, and reduce eyestrain therefrom.




computer

METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR VISUALIZING RELATIONSHIPS BETWEEN PAIRS OF COLUMNS

An apparatus, computer-readable medium, and computer-implemented method for visualizing relationships between pairs of columns, comprising identifying a relationship classification corresponding to two columns in a plurality of columns based on a data type of each column in the two columns, applying one or more statistical measures to data in the two columns to generate association data quantifying a plurality of relationships between data values in a first column of the two columns and data values in a second column of the two columns, wherein the one or more statistical measures are determined based at least in part on the relationship classification, and transforming the association data into a visualization, wherein the visualization comprises one or more indicators corresponding to one or more relationships in the plurality of relationships and wherein a layout of the visualization is determined based on the relationship classification.




computer

Computerized Identification of App Search Functionality for Search Engine Access

A search system includes a device controller that provisions a device to execute a copy of a selected mobile application. A crawler extracts content and metadata from states of the selected mobile application. A search input state classifier identifies search input states within the states based on a first set of heuristics, including recognition of user-visible search indicia and recognition of metadata that correlates with search functionality. A parameter identifier identifies, for each of the search input states, necessary input parameters. A search function data store stores a record for each identified search function. Each record includes a path to reach a corresponding search input state, an indication of required input parameters, and a mapping of the input parameters to user interface widgets. A query processing system uses the stored search functions to scrape content from the selected mobile application in response to a query.




computer

Computerized Identification Of App Search Functionality For Search Engine Access

A search system includes a device controller that provisions a device to execute a copy of a selected mobile application. A crawler extracts content and metadata from states of the selected mobile application. A search input state classifier identifies search input states within the states based on a first set of heuristics, including recognition of user-visible search indicia and recognition of metadata that correlates with search functionality. A parameter identifier identifies, for each of the search input states, necessary input parameters. A search function data store stores a record for each identified search function. Each record includes a path to reach a corresponding search input state, an indication of required input parameters, and a mapping of the input parameters to user interface widgets. A query processing system uses the stored search functions to scrape content from the selected mobile application in response to a query.




computer

DART GAME APPARATUS HAVING PLURALITY OF CAMERAS AND COMPUTER PROGRAM STORED IN COMPUTER-READABLE MEDIUM

Disclosed is a dart game apparatus according to an embodiment of the present invention in order to implement the aforementioned object. The dart game apparatus includes: a dart target having a plurality of score areas; a sensing module configured to sense an electrical signal changed as a dart pin hits the dart target; a controller configured to control an overall operation of the dart game apparatus; and a camera module configured to include a plurality of camera units, wherein the camera module includes a first camera unit configured to photograph a throw line which is a location where a player throws a dart and a whole body of the player, a second camera unit configured to photograph at least a part of a body for identifying the player, a third camera unit configured to photograph the entirety of the dart target, and a fourth camera unit configured to photograph at least a partial area in an area formed between the throw line and the dart game apparatus in order to photograph a blind zone which is not photographed by the first camera unit, the second camera unit, and the third camera unit.




computer

PULSE WIDTH MODULATOR AND NON-TRANSITORY COMPUTER READABLE MEDIUM FOR STORING PROGRAM FOR PULSE WIDTH MODULATOR

The pulse width modulator includes a subtraction unit configured to perform subtraction between an m value digital signal and a pulse width modulation signal; a feedforward filter unit configured such that a ΔΣ modulator to which an output signal of the subtraction unit is input and which includes integrators of a second order or higher is in cascade connection, and configured to operate with a sampling frequency FS; a product-sum computing unit configured to operate with a sampling frequency (FS/n) (n: an integer of two or more) to perform product-sum computing of an output signal of each integrator of the feedforward filter unit; and a pulse width modulation unit configured to operate with the sampling frequency (FS/n) to perform pulse width modulation of an output signal of the product-sum computing unit to output a pulse width modulation signal.




computer

METHOD FOR OPERATING AN ANESTHESIA APPARATUS, ANESTHESIA APPARATUS OPERATING ACCORDING TO THE METHOD AND COMPUTER PROGRAM FOR IMPLEMENTING THE METHOD

A method and a control program for operating an anesthesia apparatus, as well as an anesthesia apparatus (12), which operates according to the method are provided. The anesthesia apparatus includes a breathing gas feed unit (22) intended for displacing a breathing gas volume in a breathing circuit (10). A piston (23) brings about the displacement of the breathing gas. Switching over between a first mode of operation and a second mode of operation during the return of the piston (23) allows for a presetting of a corresponding piston return velocity. The piston return velocity depends on a volume flow in an exhalation branch (34) of the breathing circuit (10) in the first mode of operation. The piston return velocity depends on a minimally necessary piston return velocity in the second mode of operation.




computer

Computer game controller thumb cover and protector

For computer game controller thumb protection, a sheath of resilient, breathable fabric is tailored to conform closely to the distal and proximal thumb phalanx profiles. Stitched to the sheath is a single, continuous strip of thin, elastomer permeated fabric as a taction pad. Taction pad stitching follows the pad edge perimeter. The taction pad covers the pad area of the distal phalanx with a dog-leg extension over the first interproximal joint and proximal phalanx. A hook and loop swatch at a loose distal end of the dog-leg secures the end of the extension to a corresponding swatch of hook and loop material secured to the sheath.




computer

Oda Tilset Sees Computer-Generated Music As A Tool, Not A Threat

At this year's (now postponed) Game Developers Conference, composer and sound designer Oda Tilset planned to present a session about how incorporating music created by a computer's Artificial Intelligence can be a useful tool. Oda tells me that AI-generated music is really helpful to generate ideas that a composer might not have thought of. For musicians and composers who are just getting their feet wet with computer-generated music software, Oda reccommends Noknok Audio , which is very flexible and easy to use. One of the murkier aspects of using AI to create music is who owns the end product. Oda has studied numerous user agreements for sharing audio and music, including SoundCloud and there's no clear answer. She says the best part of using AI is that it's like having a collaborator without those painful discssions about whose ideas are better! Episode tracklist All tracks composed by Oda's computer AI, modified in her digital audio workstation. Thanks to Dick Roberts for production




computer

Download 640 patches for Cescato Musiktechnologie’s Trans Computer Maschine

Wally Cescato is offering a collection of 640 patches for the Trans Computer Maschine VST instrument as a free download to help you in these difficult times of lockdown. They are intended for normal keyboard playing, without using the sequencer section and most of them use just two oscillators. That’s because they date back to […]

The post Download 640 patches for Cescato Musiktechnologie’s Trans Computer Maschine appeared first on rekkerd.org.




computer

Keyboard and computer screen-Flickr@sage_solar




computer

Commodore 64 home computer's revolution unites gamers in nostalgia for C64 month

In the 1980s, a revolutionary new computer, run by cassette, was changing lives forever.



  • ABC South East SA
  • southeastsa
  • Science and Technology:All:All
  • Science and Technology:Computers and Technology:All
  • Science and Technology:Computers and Technology:Personal Computers
  • Australia:SA:All
  • Australia:SA:Mount Gambier 5290
  • United States:All:All

computer

Our changing media environment and a call to “decomputerise”

In this episode, we look ahead to the news and broader media environment in 2020 and pressing issues for local content in a globalised world. We also hear about the need to “decomputerise” in order to decarbonise. 





computer

Computers are learning to write, but could they ever produce a literary masterpiece?

Computers have traditionally excelled at mathematical tasks, and are now better than humans at games such as chess, but some AI experts believe they could one day produce literature to rival Shakespeare himself.




computer

Headline: Four IBM accessibility clients recognized at ComputerWorld Honors Program Awards

Featured accessibility news




computer

City of Bolzano honored by Computerworld. Socially-enabled 'aging in place' solution wins high marks for innovation.

The City of Bolzano's Living Safe Project was one of the top five Laureates, or nominees, in the "Innovation" category at the ComputerWorld Honors program, and was recognized publicly at the Laureate Medal Ceremony and Gala Evening.




computer

Quanta Computer Inc. v. Japan Communications Inc.

(California Court of Appeal) - Affirming that the trial court did not abuse its discretion in dismissing a suit between Taiwanese and Japanese companies whose contract had nothing at all to do with California, but still named it as the forum for the resolution of disputes, because it was not an abuse of discretion when the court determined that suitable alternative forums exist and California had no interest in the suit.




computer

Job Offer Scam - Job Bank: Employment, Job Search, Careers, Computer Jobs

Cliff is offering you the job of shipping manager assistant. The problem is, there is no job, so there is no salary, only a scammer waiting to take your money. This is the worst type of scammer, taking money from unemployed people.




computer

US v. Apple Macpro Computer

(United States Third Circuit) - In an appeal concerning the Government's ability to compel the decryption of digital devices when the Government seizes those devices pursuant to a valid search warrant, the district court's order, finding John Doe in civil contempt for refusing to comply with an order issued pursuant to the All Writs Act, 28 U.S.C. section 1651, which required him to produce several seized devices in a fully unencrypted state, is affirmed over Doe's claims that the court did not have subject matter jurisdiction to issue the order and that the order itself violates his Fifth Amendment privilege against self-incrimination.




computer

Guidebook for Advanced Computerized Maintenance Management System Integration at Airports

TRB's Airport Cooperative Research Program (ACRP) Research Report 155: Guidebook for Advanced Computerized Maintenance Management System Integration at Airports explores the use of a Computerized Maintenance Management System (CMMS) to manage a variety of assets across a number of different airport systems. This report develops guidance on the steps necessary to implement a CMMS, factors for consideration in prioritizing which systems should be included in the CMMS using a phased approach, and the steps ...



  • http://www.trb.org/Resource.ashx?sn=acrp_rpt_155cover

computer

Computer Miscellany and Internet – Troubles

Removed From Troubles (OPEN for application) Fonts: Pixel / Bitmap (Graphics / Layouts / Effects); Domains (.com) (Web Miscellany)



  • Computer Miscellany and Internet

computer

The iMac at 22: How the computer 'too odd to succeed' changed everything ... for Apple, at least

Very '90s kit was everywhere – and it saved Apple's ass too

On this day in 1998, Steve Jobs took to the stage of the Moscone Center in San Francisco for a product launch that would indelibly change the face of computing and arguably save the firm he founded almost 22 years earlier.…




computer

IBM Turns on the Water for Energy-Efficient Supercomputer

IBM today introduced a new supercomputer powered by one of the world’s fastest microprocessors and cooled by an innovative water system.




computer

IBM Increases University of Canterbury’s Research Capability with Supercomputer Upgrade

IBM (NYSE: IBM) announced today it will upgrade the University of Canterbury’s BlueFern High Performance Computing (HPC) facility, enhancing its ability to deliver quality science and technology outcomes and significantly increasing New Zealand’s research capacity.




computer

IBM Helps NeSI Make Supercomputers More Widely Available for Research

IBM has provided extra high performance computing (HPC) capacity to the Universities of Auckland and Otago within a new collaboration called the New Zealand eScience Infrastructure (NeSI) that makes large-scale scientific computing more widely available to New Zealand researchers.




computer

IBM Achieves Record 10th Straight Number One Showing on TOP500 Supercomputer List

Declares Intent to Break the Exaflop Barrier; Develops Exascale Research Collaboratory in Dublin



  • Linux and Open Source

computer

Supercharging Raijin, Australia’s fastest supercomputer

National Computational Infrastructure (NCI) has seamlessly integrated IBM’s latest Power Systems with Raijin’s existing x86 architecture, offering more choice to Australian researchers.



  • Healthcare and Life Sciences

computer

Southern Cross Computer Systems Wins IBM Beacon Award for Innovation in Green IT Data Center Solution

Southern Cross Computer Systems Pty Ltd has been named winner of the award for “Innovation in Green IT Data Center Solution” in the annual IBM Beacon Awards competition, honoring IBM Business Partners for their ingenuity, innovation, customer satisfaction and outstanding achievements in providing business solutions.





computer

ThinkComputers Podcast #221

This week on the Podcast we talk about our reviews of the NZXT H1 Mini-ITX case and the Lexar NM610 M.2 NVMe SSD. We also discuss the Comet Lake-S launch, AMD B550 leaks, a unique way researchers can use your power supply to hack your computer and more!

The post ThinkComputers Podcast #221 appeared first on ThinkComputers.org.




computer

Malicious USB Drives Infect 35,000 Computers With Crypto-Mining Botnet

Cybersecurity researchers from ESET on Thursday said they took down a portion of a malware botnet comprising at least 35,000 compromised Windows systems that attackers were secretly using to mine Monero cryptocurrency. The botnet, named "VictoryGate," has been active since May 2019, with infections mainly reported in Latin America, particularly Peru accounting for 90% of the compromised




computer

Trading computer can't handle negative numbers




computer

Cameron rebooted: five more years of a shiny computerised toe in a prime-ministerial suit

We’ve had the bloodletting of the Ed Wedding. Now we’ve got the full-fat Tory government that virtually no one predicted

It was supposed to be more complicated. After the vote, they said we’d have to get out the constitutional slide rule to try to work out who’d won. The Wikipedia entry on “minority government” experienced a huge spike in traffic. There were more bitter arguments about legitimacy than five seasons of Jeremy Kyle. Everyone agreed the election would herald the gravest constitutional crisis since the abdication, or that time Jade Goody slagged off Shilpa Shetty on Big Brother. Many said Ed Miliband was certain to become prime minister.

Yep. That’s what they said.

Continue reading...




computer

‘Like Uber Computer': How a Brooklyn middle school delivered hundreds of laptops amid the coronavirus school shutdown

A Brooklyn middle school took a novel approach to remote learning: A computer drop-off service to students.




computer

To predict the next infectious disease outbreak, ask a computer

Mathematical modeling and AI can pick out patterns preceding epidemics that human brains can’t readily discern.




computer

Review: Lezyne Super Pro GPS Computer



Lezyne's Super Pro GPS computer is packed full of functions, but do they matter on the trail?
( Photos: 7, Comments: 57 )




computer

Column One: Can't decipher Trump-speak? Meet Margaret, the computer bot

Americans may struggle to decipher Trump's tortured verbs and twisted tenses, but after a monumental crash, an artificial intelligence bot named Margaret proved up to the task.




computer

One in 5 California students lack computers and Wi-Fi. Can the digital divide be closed?

California Gov. Gavin Newsom on Monday announced donations and other efforts to provide computers and broadband to students during the coronavirus pandemic, while saying "we continue to need to do much, much more."




computer

Students are in 'desperate need' of computers amid coronavirus distance learning

Coronavirus: Gov. Newsom announced donations and other efforts to provide computers to students during closures, but it falls far short




computer

SPFL table PREDICTED: Super computer predicts who will win title - Celtic or Rangers?



THE SPFL title race is hotting up and a super computer has given us an idea of how the season may pan out.




computer

Oil Crash Busted Broker's Computers and Inflicted Big Losses

An anonymous reader quotes a report from Bloomberg: Syed Shah usually buys and sells stocks and currencies through his Interactive Brokers account, but he couldn't resist trying his hand at some oil trading on April 20, the day prices plunged below zero for the first time ever. The day trader, working from his house in a Toronto suburb, figured he couldn't lose as he spent $2,400 snapping up crude at $3.30 a barrel, and then 50 cents. Then came what looked like the deal of a lifetime: buying 212 futures contracts on West Texas Intermediate for an astonishing penny each. What he didn't know was oil's first trip into negative pricing had broken Interactive Brokers Group Inc. Its software couldn't cope with that pesky minus sign, even though it was always technically possible -- though this was an outlandish idea before the pandemic -- for the crude market to go upside down. Crude was actually around negative $3.70 a barrel when Shah's screen had it at 1 cent. Interactive Brokers never displayed a subzero price to him as oil kept diving to end the day at minus $37.63 a barrel. At midnight, Shah got the devastating news: he owed Interactive Brokers $9 million. He'd started the day with $77,000 in his account. To be clear, investors who were long those oil contracts had a brutal day, regardless of what brokerage they had their account in. What set Interactive Brokers apart, though, is that its customers were flying blind, unable to see that prices had turned negative, or in other cases locked into their investments and blocked from trading. Compounding the problem, and a big reason why Shah lost an unbelievable amount in a few hours, is that the negative numbers also blew up the model Interactive Brokers used to calculate the amount of margin -- aka collateral -- that customers needed to secure their accounts. "It's a $113 million mistake on our part," said Thomas Peterffy, the chairman and founder of Interactive Brokers, in an interview Wednesday. Customers will be made whole, Peterffy said. "We will rebate from our own funds to our customers who were locked in with a long position during the time the price was negative any losses they suffered below zero."

Read more of this story at Slashdot.




computer

Janelle Monae brings her Dirty Computer Tour to the Murat Theatre

       




computer

How China plans to lead in computer chips

China wants to end its dependence on imported computer chips, but experts says it will struggle.




computer

Will driverless cars mean computer crashes?

Some believe that self-driving cars will be far safer than human-driven cars but who trusts them enough to drive in them?




computer

oscon: Beginner's Guide to Computer Vision - 2D/3D image fundamentals, OpenCV, OpenNI Library + more http://t.co/ph2dKrC9W4 #oscon #tutorial

oscon: Beginner's Guide to Computer Vision - 2D/3D image fundamentals, OpenCV, OpenNI Library + more http://t.co/ph2dKrC9W4 #oscon #tutorial




computer

Computer Hacking: How Big is the Security Threat?




computer

Demographic expansion of several Amazonian archaeological cultures by computer simulation

(Universitat Pompeu Fabra - Barcelona) Expansions by groups of humans were common during prehistoric times, after the adoption of agriculture. Among other factors, this is due to population growth of farmers which was greater than of that hunter-gatherers. We can find one example of this during the Neolithic period, when farming was introduced to Europe by migrations from the Middle East.




computer

Making a Difference With Interactive Technology: Considerations in Using and Evaluating Computerized Aids for Diabetes Self-Management Education

Russell E. Glasgow
Apr 1, 2001; 14:
Feature Articles




computer

Human Services' computers keep disabled out of work

Disabled workers are caught in bureaucratic limbo by problematic computer systems.