Great idea, so this isn't the most reliable approach. Using the //gs toolbox from Applesoft BASIC isn't a Of routines that turns ampersand commands (e.g. Hi-res screen from Applesoft, with ampersand commands This uses the standard run-length algorithm, not the run-slice variant The other guys had pulled the line drawing code out of an FTA (Free Tools Association - aīunch of hackers in France) demo, so I went ahead and pulled it out of their code. Summary: The line drawing algorithm used inĪctually two of us working on fast 3D libraries at the same time. Plans to release the library source code at this time.īresenham line implementation in 65816 assembly The archive includes the library, documentation, demos, and sample source. Of it, but the Not Modulae and Not Stellar 7 demos show what I accomplished. To be a graphics engine for arcade games on the Apple IIgs. Summary: Fast wireframe 3D library, with two This probably won't be of much use to D&D fans - I'm notĮven sure what rule set this was coded against - but it doesĭemonstrate the use of ProDOS VAR files and "MouseText" Utilities were never started (to the point of being dangerous. Though it looks like the printing wasn't quite finished and the character This bunch provides for character generation, outfitting, and printing, I took it upon myself to write a decent set of AD&D utilities. Video or white with a black border (I figured out the AND mask stuff after If I recall correctly, the cursor can be either reverse Push) or "paddle" mode (the cursor chases the exact position of Mode (push left, the cursor slides left, at increasing speed the farther you Mouse pointer is moved with the joystick, either in self-centering joystick When mice and Apple IIs weren't often connected to each other. Documentation and demonstration programs areīear in mind that this was written before the IIgs shipped, at a time Is the DOS 3.3 version, while "icspro1" and "icspro2"Īre the ProDOS version. There are three "2mg" disks in the archive. ItĬame out reasonably well, all things considered. Of controlling the mouse cursor, selecting buttons, and so on. You to place icons on the hi-res graphics screen, and handles all aspects The program was completed, but never sold. This program is in the public domain.įirst attempt at commercial software, written while I was in high Have quarter-second AppleTalk interrupts enabled, but then nothing's perfect. More than one text color on the text screen simultaneously. One of the cool things about it is the user interface, which changes the text andīackground color registers when the scan line reaches certain points. I didn't like that much, so I threw this together. If you wanted to deactivate the acceleration or twiddleįeatures like the joystick delay, you had to boot into GS/OS to run their application. With an 8MHz card, you could get an overall The AWP-to-RTFĬonverter in CiderPress generates nicer output.Īccelerator card for the Apple IIgs. ![]() Fancy stuff likeĭouble spacing and margin changes are simply ignored. What you would see on the screen if you fired up AppleWorks 3.x. Trivial conversion of AppleWorks word processor documents. Summary: Convert AppleWorks word processor AAF was the format used for postings to that group. Simple enough that they should work on just about anything: unbit undoes the 6-bit "executioner" format unexec undoes the apple2 monitor format unblu view and extract from Binary ][ or ShrinkItĪrchives) sciibin view and extract from binscii files ![]() ![]() Summary: Unpack various Apple II encoding Unexec, unblu, usq, and sciibin (source code) There is a bug in theĮxtraction routines that will cause it to fail on certain files see the notes in shk.asm The archive includes the 65816 assembly source and executable. Unlike NuLib, it only knows how toĮxtract files, and it was written in assembly language for speed. Summary: IIgs shell command for extractingĬommand that allows you to work with ShrinkIt archives. (There may be a more clever way to do that, butįor best results, open the. If you're running UNIX, you can convert the files The ends of lines (like most Apple II stuff) and has the high bit set (like DOS 3.3 textįiles, but not ProDOS text files). Some of the source code is in ProDOS 8 Merlin format, which uses carriage returns at Interest to people running Apple II emulators, others are here because of their nostalgiaĪll programs are copyrighted freeware unless otherwise mentioned. ![]() These files run on or relate to the Apple II series of computers.
0 Comments
![]() Obviously there is a level of trust required for those who are willing to install precompiled code on a production iOS device, but I feel comfortable about it considering that I’ve known Elias for years. If you’re not a developer, and simply want a prepackaged IPA that can be easily installed via Xcode and iOS App Signer, then there is a precompiled IPA available on MobileMiner’s GitHub page as well. Subscribe to 9to5Mac on YouTube for more videosĭisclaimer: If you’re a developer, feel free to head over to MobileMiner’s GitHub page for the open source code that can be inspected, and compiled to run on your iOS device. Limneos recommends using more recent iOS devices - iPhone 7, iPhone 8, and iPhone X - because their powerful CPUs produce the best hash rates. You can obtain MobileMiner directly from GitHub, and use it to build a project within Xcode for deploying to an iOS device of your choice. MobileMiner is a fork of LucasJones’ cpuminer-multi, which has been compiled with ARM64 iOS devices in mind. All you need to do is build and deploy the project using Xcode (or download and install a precompiled build), obtain a wallet address, and start mining. ![]() What makes MobileMiner so interesting is that it’s extremely easy to configure and start mining directly from your iPhone, no jailbreak needed. ![]() I’ve been testing MobileMiner for the last few hours, and wanted to show you how it works. MobileMiner is a CPU miner for ARM64 iOS devices created by Elias Limneos, a jailbreak developer known for popular jailbreak tweaks like CallBar. While that may be true, not every cryptocurrency needs hulking GPUs and rigs designed specifically with mining in mind. In fact, thanks to a handy app called MobileMiner, it’s even possible to mine certain cryptocurrency from a device as diminutive as the iPhone in your pocket. When you think of a cryptocurrency mining rig, it’s easy to associate it with large rigs featuring multiple GPUs in some type of air-cooled room. Works positively and collaboratively across departments to accomplish department goals.Communicates effectively with guests, co-workers, and professional colleagues.Seeks professional continuing education, both organized and casual, with an air toward keeping services current and appropriate for the guests.Facilitates set-up/take-down of meeting rooms and equipment for various in-house and public programs maintains flexibility in work schedule to accommodate events held outside of normal Library hours.Interacts with Teen Space Monitor and teen guests to insure proper use of the Teen Space, cafe and library based on the Guest Behavior Policy assists staff with difficult guest interactions documents incidents and evictions.Responds to emergencies and provides support, as needed acts quickly, exercising good judgment maintains security during open hours and before/after our events.Enforces Library policies relevant to public use.Greets and assists library guests provides basic tours, information and directions in the library monitors building and grounds ensuring guest safety and building security.In order to meet the needs of our diverse population, we have increased staff awareness and education of Diversity, Equity and Inclusion initiatives through organization-wide training created NPL Your Door, a mail delivery service, to meet the needs of community members who may have less access to the building and advanced our ongoing commitment to "Inspire, Inform and Include" all individuals who walk through our doors. As a proud organization within the Novi community, we are committed to serving our guests with exceptional customer service through innovative programming, cutting-edge technology in our iCube Makerspace, and expertly trained staff. We proudly serve a diverse community with a population of 65,000+. The Library was awarded the "Community Builder Award" in 2021 from the Novi Chamber of Commerce for its innovative approach to reaching its community by introducing the first self-service kiosk in Michigan, called Lakeshore Lending Library. The Novi Public Library is a vibrant, fast-paced class six library located within Oakland County. ![]() This method copies the content of a source file into a destination file, from the current source-file position. However, you may have noticed the creation date was preserved on the new file, unlike with py, which copied "file1.txt" to "file3.txt" and gave it a new creation date. rw-r-r- 1 scott staff 6 Oct 27 11:27 file4.txtĪs we can see from executing our code above, "file1.txt" was copied to "file4.txt". rw-r-r- 1 scott staff 6 Oct 27 11:29 file3.txt rw-r-r- 1 scott staff 6 Oct 27 11:27 file1.txt rw-r-r- 1 scott staff 91 Oct 27 11:26 copy-files.py The syntax is as follows: py2(src_file, dest_file, *, follow_symlinks= True)Īgain, these parameters are the same as in the previous commands we've mentioned so far.įor example, the following code will copy "file1.txt" into "file4.txt", as well as preserve the metadata of the original file, "file1.txt". If the platform doesn't allow for full metadata saving, then copy2 doesn't return failure and it will just preserve any metadata it can. copy2Īs with the previous methods, copy2 method is identical to the copy method, but in addition to copying the file contents it also attempts to preserve all the source file's metadata. If you do, then you'll get an error when trying to import that module due to a circular import problem. Note: Make sure you don't name your script the same as one of the module you're importing (which I mistakenly did when testing code for this article). For example, the following code will copy "file1.txt" into "file3.txt". The syntax is as follows: py(src_file, dest_file, *, follow_symlinks= True)Įach of these parameters are the same as in the copyfile method. Copying file permissions is not a trivial task in most programming languages, so this is a nice feature to have. This method is very similar to copyfile, with the main difference being that in addition to copying the content of the source file, it goes one step further and also copies the file's file system permissions. If it is set to False, and the source file is a symbolic link, then instead of copying the file, a new symbolic link will be created. One interesting and potentially useful feature of pyfile is the follow_symlinks Boolean argument. The syntax for this method is: pyfile(src_file, dest_file, *, follow_symlinks= True)įor example, the following code will copy a file named "file1.txt" into a file named "file2.txt": If the destination file already exists, it will be replaced with the newly copied file. ![]() If the names are the same then it will generate an error. The destination provided to it must be a writable file, and have a different name than the source file. This method copies the content of one file into another file. The shutil module offers several high level methods to copy files. You'll notice that many of these methods, in both the shutil module and the os module, have very similar functionality (which shouldn't be surprising), but each varies in functionality from each other very slightly, which I'll explain as well. All of the os methods we show here are methods that allow us to execute shell commands from our Python code, which we'll use to execute the copy command (Windows) or the cp command (Unix). When it comes to using Python to copy files, there are two main ways: using the shutil module or the os module. ![]() In both cases, if the time got too short, the researchers found no mission would be successful at diverting the rock. There were no situations where a type 0 mission made sense for Apophis. Given more time, type 2 missions were sometimes better, depending how difficult it appeared to be to deflect from its course. If time was short, a type 1 mission was usually the best option: collect data quickly in order to properly aim the impact. ![]() There were just a handful of instances where type 1 missions made sense.Īpophis was a different, more complicated story. If time was short, though, a quick-and-dirty type 0 mission was the way to go. Given enough time, they found, type 2 missions were almost always the right way to deflect Bennu. The researchers developed a method for calculating which mission is best based on two factors: the time between the mission start and the date the planet killer will reach its keyhole, and the difficulty involved in properly diverting the specific planet killer.Īpplying those calculations to two well-known planet-killer asteroids in Earth's general neighborhood, Apophis and Bennu, the researchers came up with a complex set of instructions for future asteroid deflectors in the event one of those objects started heading for a keyhole. Related: Crash! 10 biggest impact craters on Earth Type 2 missions are even better, but take yet more time and resources to get underway. But they also take more time and resources. Type 1 missions are more likely to succeed, the researchers wrote, because they can determine the incoming rock's mass and velocity far more precisely. Without precise information on the object's mass, velocity, or physical makeup, the impactor mission will have to rely on some imprecise estimates, and has a higher risk of failing to properly knock the incoming object out of its keyhole. The problem with "type 0" missions, the researchers wrote, is that telescopes on Earth can only gather rough information about planet killers, which are still faraway, dim, relatively small objects. Then all the information from the scout and the first impact are used to fine-tune a second small impact that finishes the job. A "type 2" mission where one small impactor is launched at the same time as the scout to knock the object a bit off course.A "type 1" mission where a scout is launched first and collects close-up data about the asteroid before the main impactor is launched, in order to better aim the shot for maximum effect.A "type 0" mission where a single, heavy spacecraft was fired at the incoming object, aimed using the best available information about the object's makeup and trajectory to knock it off course.In the end, they landed on three options for missions that could reasonably be prepared on short notice if a planet-killer asteroid were spotted heading toward a keyhole: ![]() Nuclear detonation is problematic as well, they wrote, because it's uncertain exactly how an asteroid will behave after a nuclear explosion and because political concerns about nuclear weapons could cause problems for the mission. Paek and his co-authors tossed out most of the more exotic asteroid-deflection schemes out of hand, leaving only nuclear detonation and impactors as serious options. That will keep the object from getting on the route toward an impact in the first place - at which point saving Earth would require far more resources and energy, and involve much more risk. The easiest time to stop an object from hitting Earth is before it hits one of those keyholes, according to the paper. Related: This newly discovered asteroid is the second-closest natural object to the Sun "A keyhole is like a door - once it's open, the asteroid will impact Earth soon after, with high probability," Sung Wook Paek, lead author of the study and a Samsung engineer who was an MIT graduate student when the paper was written, said in a statement. ![]() stage 3 route) from my downloads and then saved it. Then uploaded the appropriate route (e.g. Now I have called up the page on the PC, logged in there, clicked on routes and tracks and then “create a route from a GPX file”. Then I registered with Viewranger after I had previously downloaded Open Cycle Map with the Gomera section. First I downloaded the maps from you and saved them on my PC. Instead, I've been successful in other ways, which I want to share with you (and other readers). Maybe I have a new update or some wrong setting. On the way you described it (for whatever reason) didn't work out. Today I downloaded the maps on Viewranger. Inspired by your side, I plan to do the circular hike in February. If you go back to the map view after the import, you will see the imported route from the GPX file (see screenshot C).įirst of all, thank you very much for your very detailed and loving instructions. You can view the app's internal file storage via "Import / Export -> Documents" (see screenshot B). When importing, every GPX file is copied from the Dropbox directory into the app's internal file system, ie the GPX files that have been imported will remain on the smartphone even if the Drobox folder is later emptied. I am currently not aware of a bulk import of several files at once. To import a GPX file into the ViewRanger app, each file must now be individually tapped and imported (see screenshot A in the figure below). If the GPX files have been saved in the correct folder, you can also see them within the ViewRanger app (steps 6 and 7). Instead of the "Apps" folder, you will find the ViewRanger subfolder under "Aplicaciones", "Aplicazioni" or "Aplications". Depending on the Dropbox language setting, the file path may differ from the example above. There you have to store all GPX files to be imported (step 5). The subfolder is automatically created with the confirmation (step 4) (eg file path "Apps / ViewRanger"). With the corresponding button (step 3) you authorize the ViewRanger app to access the displayed subfolder in your Dropbox account. Viewranger: Instructions for importing GPX files via Dropboxįirst you start the ViewRanger app and navigate to the import / export settings (steps 1 and 2). All files can then be synchronized via this subfolder. Viewranger accesses a fixed subfolder of your Dropbox account. An easy way to import GPX files with route information into the Viewranger app is to use the popular online storage service Dropbox (Link: ). |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |