Tag Archives: windows

Downloads – Singularity Viewer

Posted: August 25, 2016 at 4:31 pm

Please pay attention to the following vital information before using Singularity Viewer.

Singularity Viewer only supports SSE2 compliant CPUs. All computers manufactured 2004 and later should have one.

Warning: RLVa is enabled by default, which permits your attachments to take more extensive control of the avatar than default behavior of other viewers. Foreign, rezzed in-world, non-worn objects can only take control of your avatar if actively permitted by corresponding scripted attachments you wear. Please refer to documentation of your RLV-enabled attachments for details, if you have any.

Singularity Viewer 1.8.7(6861) Setup

Compatible with 64-bit version of Windows Vista, Windows 7, Windows 8 and newer. Known limitation is the lack of support for the Quicktime plugin which means that certain types of parcel media will not play. Streaming music and shared media (MoaP) are not affected and are fully functional.

Compatible with OS X 10.6 and newer, Intel CPU.

Make sure you have 32-bit versions of gstreamer-plugins-base, gstreamer-plugins-ugly and libuuid1 installed. The package has been built on DebianSqueezeand should work on a variety of distributions.

For voice to work, minimal support for running 32-bit binaries is necessary. libasound_module_pcm_pulse.so may be needed. Possible package names: lib32asound2-plugins (squeeze), alsa-plugins-pulseaudio.i686 (fedora),libasound2-plugins:i386 (debian/ubuntu).

If you receive “The following media plugin has failed: media_plugin_webkit” you may need to install the package containing libpangox-1.0.so.0for your distribution (could bepangox-compat).

To add all the skins, extract this package into the viewer install directory, that’s usually C:Programs FilesSingularity on Windows, /Applications/Singularity.app/Contents/Resources/ on Mac, and wherever you extracted the tarball to on Linux. Just merge the extracted skins directory with the existing skins directory, there should be no conflicts.

Read the original here:

Downloads – Singularity Viewer

Posted in Singularity | Comments Off on Downloads – Singularity Viewer

Cyberpunk Games – Giant Bomb

Posted: July 31, 2016 at 5:51 am

A role-playing game by CD Projekt RED based on the pen and paper RPG known as Cyberpunk.

An upcoming cyberpunk RPG from the makers of Serpent in the Staglands

Following up two years after Deus Ex: Human Revolution, Mankind Divided sees Adam Jensen working to thwart a terrorist organization bent on promoting human augmentation. It serves as a prequel to Deus Ex, the first entry in the series.

A sci-fi RPG set during the ‘War of Water’ on Mars.

An enhanced re-release of Flying Wild Hog’s cyberpunk shooter. The Redux version includes new weapons, abilities, and remixed level designs not seen in the original release alongside graphical improvements.

A stylish sci-fi team-based first-person shooter from Blizzard in which players can choose from over 20 “action figure”-esque Heroes, each with their own unique weapons and abilities.

A top-down, cyperpunk shooter from 10tons.

An episodic neo-cyberpunk thriller about former deep-space miner Clara who has to uncover a mystery with her hacking skills and make some tough decisions to find out what happened.

Aerannis is a mission-based stealth action game set in a world of conspiracy and full of action and assassinations.

A real-time, class-based strategy game, set in a cyberpunk open world.

A new Shadowrun CRPG by Harebrained Schemes partially funded through Kickstarter.

A visual novel developed and published by 5pb. Taking place during the first six episodes of the anime series, featuring an original story starring a new male and female protagonist.

Technobabylon is a cyberpunk point-and-click adventure game by Technocrat and Wadjet Eye. The game is set in 2087, in a world of surveillance, drugs and artificial intelligence.

A political thriller stealth game from David Pittman and Minor Key Games. Coming early 2015 for Windows, Mac, and Linux.

A spy and espionage themed turn-based tactics game from Klei Entertainment.

Dex is a sidescrolling cyberpunk action/stealth-RPG funded through Kickstarter. Inspired by classic cyperpunk novels, the game lets players explore the hand-drawn city of Harbor Prime.

Shadowrun Chronicles: Boston Lockdown is a tactical role playing game that was funded using Kickstarter, formerly known as Shadowrun Online.

StarCrawlers is an RPG similar to classic dungeon crawlers but in a futuristic, sci-fi setting.

The episodic sequel to Dreamfall: The Longest Journey.

A standalone version of Shadowrun Returns’s expansion, Shadowrun: Dragonfall, with new quests and areas, and improved combat and UI. Also includes a game editor that allows players to create their own SR adventures and share with others

Read Only Memories is a cyberpunk adventure game focused on the dark side of technology in the year 2064.

A third-person open-world game from Ubisoft, set in a dark alternate version of the US where corporations track and catalog all online behavior over a vast data network. A vigilante group called the Watch_Dogs hacks into this data, using it to hunt criminals.

Strider Hiryu must assassinate Grandmaster Meio in this action-adventure game from Double Helix and Capcom.

An indie cyberpunk themed taxi driving game.

The Director’s Cut of Deus Ex: Human Revolution features redone boss battles, improved graphics, A.I. and combat, and all DLC released for the original game. The Wii U version makes use of the controller’s screen to allow new features like map notes.

Shadowrun Returns is a turn-based RPG created by Harebrained Schemes.

An RPG Maker game about Kanye West.

Developed by Dontnod Entertainment, Remember Me is a futuristic game set in Neo-Paris. The protagonist Nilin is up against a tyrant company Memorize with the technology to manipulate peoples memory to their will. It is up to Nilin and her friends to fight against Memorize to break the bind it has on society.

Inspired by the sci-fi action movies of the 1980s, Far Cry 3: Blood Dragon is a standalone expansion to 2012’s Far Cry 3, switching a modern tropical setting with the neon-covered retro-future of 2007.

A visual novel, intended as a spin-off to Steins Gate. It was written by Naotaka Hayashi once again, as a collaboration with Zero Escape writer Kotaro Uchikoshi.

Continued here:

Cyberpunk Games – Giant Bomb

Posted in Cyberpunk | Comments Off on Cyberpunk Games – Giant Bomb

Warlike Flyboys – Ww3 – Download Plane Simulator …

Posted: June 16, 2016 at 5:50 pm

Try your skills and join epic battles in the great game Warlike Flyboys – WW3! Aerial wars take place right here and right now! Have you got any ideas about what the third world war may look like? Huge and contemporary weapons and great aviation forces are waiting for their hour of triumph! Take your pilot’s seat without hesitation and raise your iron machine constructed for destruction high into the skies. All the airplanes are extremely powerful and furious, so dont let them stay still not even for a second and get ready for massive attacks! Look through your tasks in the ravishing game Flyboys – WW3 and dont stop while destroying enemies bases. Warlike Flyboys – WW3 like any other serious simulator of its genre includes all well-known standards like non-stop action and explding the enemies bases. That’s why you should be careful and choose your vehicle – some big plane to control, fly and fight. Firstly, you may realize what air forces should be chosen: is your airplane belonging to Sabres or the USA? Have you chosen your destiny? Lets start and have fun!

3D game with easy controls

High-quality graphics, music and effects

Some chances for training

25 planes and 3 levels of difficulty

Download Plane Simulator – Absolutely FREE

Windows 98/ME/2000/2003/XP

DirectX 9

Pentium III processor and higher

256 Mb RAM

50 Mb hard drive space

32 Mb 3D video card

Go here to read the rest:

Warlike Flyboys – Ww3 – Download Plane Simulator …

Posted in Ww3 | Comments Off on Warlike Flyboys – Ww3 – Download Plane Simulator …

Minerva Reef Directions | Island Cruising Association

Posted: June 12, 2016 at 8:24 pm

Minerva sailing directions South Pacific voyagers, particularly those bound from Tonga or Fiji for largely cyclone-free New Zealand, should keep North and South Minerva Reef in mind for a possible storm refuge, rest stop, adventure destination, or at the very least as a potential hazard to navigation. These two atolls also represent an opportunity to see tropical Indo-Pacific sea life in a nearly undisturbed condition. Weather windows The best times to visit the Minervas are either northbound during the late Southern Hemisphere fall near the end of May/ early June or southbound during the late spring in October. Arriving too early (northbound) or too late (southbound) invites exposure to severe weather conditions. Depart New Zealand for the voyage north right behind an outgoing low, not in the middle of a high, and embark from the Minervas southward just as the leading edge of a preferably mild high reaches the area.

Information sources British Admiralty Chart 985, Mi nerva Reefs.: accurately depicts both atolls and includes a close-up of the pass into South Minerva useful for orientation. Approximate CPSentrance coordinates, for use in good light in conjunction with the chart and a lookout only, are 230 37.36 S, 178056.11 W (North Minerva) and 23 56.55 S, 179007.60 W (South Minerva). Sailing Directions Planning Guide for the South Pacific Ocean (Publication 122) also contains useful data for a visit to the Minervas. General layout North Minerva Reef is nearly circular, with an approximate diameter of 3.5 nm. Using a proper lookout, one can move around inside the atoll in order to anchor in the greatest protection for the prevailing wind. South Minerva Reef consists of two roughly circular rings of reef joined in the middle, like a number 8 tilted slightly in a northeast-southwest orientation. Only the two-milediameter eastern lagoon is accessible to larger vessels, and anchoring in Herald Bight, outside the pass, is tenable for wind directions lacking a northerly component. Like North Minerva, movement throughout this eastern lagoon for optimal anchoring is possible with a vigilant lookout. We noted a narrow pass on the northern rim of the western lagoon not shown on the chart, potentially navigable for centerboarders and dinghies. Good holding ground is prevalent inside both Minervas, and both feature slightly

bumpy conditions at higher tides in normal weather conditions. Gear A fully stocked medical kit, manuals, and training; good longdistance communication capability, such as single-sideband or ham radio or an Inmarsat transceiver; and survival fishing and watermaking equipment are all critical for a trip to the Minervas. Fishing and diving gear will greatly enhance your pleasure and dinner menu. Specifically, bring medium to heavy trolling gear for offshore fishing, 10- and 20-poundclass spinning rods for lagoon fishing, wetsuits for diving and snorkeling in the cool water, thick dive boots or other protective footwear for reef walking, and a Hawaiian sling and lobster snare. Jurisdiction The Minerva Reefs were ceded to Tonga in 1972 and ratified by the South Pacific Forum the same year. In 2010 Fiji disputed the Tongan ownership and placed gunboats at North Minerva to try and force their claim. The claim is currently under dispute.

Obviously,you will have either cleared customs out of Tonga or not yet checked in when you visit. The Minervas, however, have been long considered a stopover between countries, certainly in severe weather or for vessel repairs. Nevertheless, go easy on the seafood harvest, never taking more than you can consume in a short time, and do not disturb giant clams, sea turtles, or other threatened creatures. A visit from a Tongan patrol boat should not, under these conditions, be cause for concern.

This entry was posted on Monday, April 25th, 2011 at 2:19 pm and is filed under Cruising Guide, Resources. You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.

See the article here:

Minerva Reef Directions | Island Cruising Association

Posted in Minerva Reefs | Comments Off on Minerva Reef Directions | Island Cruising Association

Chocolatey Gallery | Jitsi 2.8.5426

Posted: May 28, 2016 at 4:44 am

Private CDN cached downloads available for licensed customers. Never experience 404 breakages again! Learn more…

This package was approved by moderator ferventcoder on 4/24/2015.

Jitsi (formerly SIP Communicator) is a free and open source multiplatform voice (VoIP), videoconferencing and instant messaging application for Windows, Linux and Mac OS X. It supports several popular instant messaging and telephony protocols, including open recognised encryption protocols for chat (OTR) and voice/video/streaming and voice/video conferencing (SIP/RTP/SRTP/ZRTP), as well as built-in IPv6, NAT traversal and DNSSEC. Jitsi and its source code are released under the terms of the LGPL.

To install Jitsi, run the following command from the command line or from PowerShell:

To upgrade Jitsi, run the following command from the command line or from PowerShell:

In cases where actual malware is found, the packages are subject to removal. Software sometimes has false positives. Moderators do not necessarily validate the safety of the underlying software, only that a package retrieves software from the official distribution point and/or validate embedded software against official distribution point (where distribution rights allow redistribution).

Chocolatey Pro provides runtime protection from possible malware.

This package has no dependencies.

20042012 Emil Ivov


Excerpt from:
Chocolatey Gallery | Jitsi 2.8.5426

Posted in Jitsi | Comments Off on Chocolatey Gallery | Jitsi 2.8.5426

Jitsi – OSTN – Guardian Project Open Dev

Posted: May 21, 2016 at 3:44 pm

Jitsi Setup

Go to http://jitsi.org/ in your browser. Download the program onto your computer. Jitsi is an audio/video and chat application that supports protocols such as SIP, XMPP/Jabber, AIM/ICQ, Windows Live, Yahoo! and many other useful features.

When Jitsi is installed, go to the applications folder and open it.

Select the SIP account type in the Network pull down in the new account window. It should look like this

In the Sip id box, add the username & server detail we sent to you in the email (for example foo@ostel.co).

In the Password box, Add the password we sent to you in the email.

Click the Advanced box

Click the Connection tab. Fill out the form fields to match this screenshot

Click the Next button. Confirm the settings are correct on the next screen. Click Sign In

You should see it read “Registering” for a few seconds until the bar to the right of your account name turns Green and reads SIP ON Online.

Congratulations! You’ve successfully signed in.

You can fetch a package or subscribe to the repository.

For details on the current status with the official Debian packaging, please refer to Debian Bug report logs.

Known issues making a ZRTP initiation between clients.

Current successes for ZRTP: Jitsi OSX -> Groundwire / Ostel -> Jitsi OSX

Current failings for ZRTP: Groundwire -> Jitsi OSX / Jitsi OSX -> Ostel

Secure video calls, conferencing, chat, desktop sharing, file transfer, support for your favorite OS, and IM network. All this, and more, in Jitsi – the most complete and advanced open source communicator.

The ever growing use of Voice over IP (VoIP) and other media applications triggered a more widespread use of the Real-time Transfer Protocol (RTP). Thise protocols is the workhorse for VoIP applications. Many VoIP applications send RTP data over the public Internet in clear, thus the data is not protected from eavesdropping or modification. Therefore most VoIP applications are regarded insecure today. During the last years several activities started to enhance the security of RTP.

The Secure Real-time Transfer Protocol (SRTP) enhances security for RTP and provides integrity and confidentiality for RTP media connections. To use SRTP in an efficient way VoIP applications should be able to negotiate keys and other parameters in an automatic fashion.

ZRTP is a protocol that negotiates the keys and other information required to setup a SRTP audio and video session

While it is important to look at the technology, the protocols and alike, it is also important to look at the implications a specific technology may have on its implementation, deployment, and usability. Usability is of major importance for VoIP peer-to-peer applications: these applications are mainly used by non-IT persons. Therefore the handling must be simple, easy to use, and shall not require special infrastructure or registration.


Original post:
Jitsi – OSTN – Guardian Project Open Dev

Posted in Jitsi | Comments Off on Jitsi – OSTN – Guardian Project Open Dev

The NSA – The Super Secret National Security Agency

Posted: May 7, 2016 at 3:47 am

– A Tale of Two Countries – New Zealand Apologizes for Illegal Domestic Spying, While U.S. Still Refuses to Acknowledge NSAs…

– Attacking Tor – How the NSA Targets Users’ Online Anonymity

– Citizens Against Unidentified Flying Objects Secrecy v. National Security Agency

– Clapper Reveals Bush-Era Docs Showing NSA Spying Dragnet Started 2001

– Covert Operations of the U.S. National Security Agency

– Creation of The NSA – from ‘The Secret Government – Origin, Identity and Purpose of MJ-12’

– DARPA – Defense Advanced Research Projects Agency – Main File

– Did the NSA Kill Hugo Chavez?

– Exposed The Covert, Real-Time Spying on Youtube, Facebook and Blogs

– Foiling Computer Hackers Top Priority With FBI, CIA, Pentagon, NSA

– ‘Follow the Money’ – NSA Spies on International Payments

– Foreign Officials in the Dark About their Own Spy Agencies’ Cooperation with NSA

– Google and The NSA Connection

– Google and The NSA – Whos Holding The ‘Shit-Bag’ Now?

– Google Asks NSA to Help Secure Its Network

– Google, CIA and the NSA – Inside the Secret Network behind Mass Surveillance, Endless War and Skynet

– Google to Enlist NSA to Help It Ward Off Cyber-Attacks

– Hidden Government Scanners Will Instantly Know Everything About You from 164 Feet Away

– High-Level U.S. Government Officials Have Warned for 40 Years that Mass Surveillance Would Lead to Tyranny…

– How Google, Facebook, Skype, Yahoo and AOL are All Blatantly Lying to Their Own Users in Denying NSA Spy Grid…

– How International Treaties Gave NSA Back-Door Access for Surveillance

– How NSA Access Was Built into Windows

– How the NSA Plans to Infect ‘Millions’ of Computers with Malware

– How the NSA Spies on Your Google and Yahoo Accounts

– Inside TAO – Documents Reveal Top NSA Hacking Unit

– Inside The NSAs Largest and Most Expansive Secret Domestic Spy Center in Bluffdale, Utah – Exposed

– It’s Not Just Spying – How the NSA Has Turned Into a Giant Profit Center for Corrupt Insiders

– Key to The Extraterrestrial Messages – NSA Technical Journal Vol XIV No 1

– La NSA Particip en El Desarrollo de Windows 7

– La Red Echelon – Main File

– Lawless NSA Global Spying

-Mat la NSA a Hugo Chvez?

– NSA Able to Target Offline Computers Using Radio-Waves for Surveillance, Cyber-Attacks

– NSA Boss Wants More Control Over The Internet

– NSA Built Back Door in All Windows Software by 1999

– NSA Claims Massive New Surveillance Powers

– NSA Director Defends Plan to Maintain ‘Backdoors’ Into Technology Companies

– NSA Gathers Data on Social Connections of U.S. Citizens

– NSA, GCHQ Using Data from ‘Leaky’ Smartphone Apps to Spy

– NSA has Built its Own, Secret, Warrantless, Shadow Social Network, and You’ve Already Joined It

– NSA Helped With Windows 7 Development – Privacy Expert Voices ‘Backdoor’ Concerns – Security Researchers Dismiss Idea

– NSA ‘Helping’ Microsoft With Windows 7 ‘Security’

– NSA Infiltrates Links to Yahoo and Google Data Centers Worldwide – Snowden Documents Say

– NSA – National Security Agency – Extrapolate Postmodum Prosum – Updated

– NSA Offering ‘Billions’ for Skype Eavesdrop Solution – Business Model for P2P Firm at Last?

– NSA Recent UFO Document Release More Interesting for What It “Could” Not Find

– NSA Refuses to Declassify Obamas Cybersecurity Directive – Exceptionally Grave Damage

– NSAs Computer and Mobile Spying – An Interview with Professor Tung Yin

– NSA’s Domestic Surveillance is Motivated by Fears that Environmental Disasters Could Fuel Anti-Government Activism

– NSA Secretly Exploited Devastating Heartbleed Bug for Years – Report

– NSA Security Running Amok to Plug Leaks About 9/11

– NSA Spying Did Not Result in a SINGLE Foiled Terrorist Plot

– NSA’s Top Hacking Unit

– NSA Top-Secret Document from 2012 – FOXACID – SECONDDATE – WILLOWVIXEN

– NSA Surveillance Goes Beyond Orwell’s Imagination – Says Alan Rusbridger

– NSA Took Part in The Development of Windows 7

– NSA Wants EZ Pass Control for Internet

-“Obese Intelligence” – The NSA Search Engine

– Quantum Insert

– Radio Mensajes Provenientes del Espacio Exterior – Documento Desclasificado de La NSA

– Russian Researchers Expose Breakthrough U.S. Spying Program

– Secret Archives – National Security & Privacy

View post:
The NSA – The Super Secret National Security Agency

Posted in NSA | Comments Off on The NSA – The Super Secret National Security Agency

Jitsi – WOW.com

Posted: April 11, 2016 at 5:45 am

Jitsi Original author(s) Emil Ivov Developer(s) Jitsi Team and Contributors Initial release 2003(2003) Stable release 2.8 (build.5426) (March19, 2015; 11 months ago(2015-03-19)) [] Preview release 2.9 (nightly) [] Development status Active Written in Java Operating system Linux, Mac OS X, Windows (all Java supported) Size 52.4 MB Windows (bundles its own private JRE)[1] 78.8MB Mac OS X (includes private JRE)[2] 22MB Linux 65MB source code[3] Available in Asturian, English, French, German, Bulgarian, Japanese, Spanish, Italian, Romanian, Greek and 25 more Type Voice over Internet Protocol / instant messaging / videoconferencing License Apache Website jitsi.org

Jitsi (formerly SIP Communicator) is a free and open source multiplatform[4]voice (VoIP), videoconferencing and instant messaging application for Windows, Linux, Mac OS X and Android. It supports several popular instant-messaging and telephony protocols, including open recognised encryption protocols for chat (OTR) and voice/video/streaming and voice/video conferencing (SIP/RTP/SRTP/ZRTP), as well as built-in IPv6, NAT traversal and DNSSEC. Jitsi and its source code are released under the terms of the Apache Software Licence.[5]

Work on Jitsi (then SIP Communicator) started in 2003 in the context of a student project by Emil Ivov at the University of Strasbourg.[6] It was originally released as an example video phone in the JAIN-SIP stack and later spun off as a standalone project.[7]

Originally the project was mostly used as an experimentation tool because of its support for IPv6.[8][9] Through the years, as the project gathered members, it also added support for protocols other than SIP.

Jitsi has received support from various institutions such as the NLnet Foundation,[10][11] the University of Strasbourg and the Region of Alsace[12] and it has also had multiple participations in the Google Summer of Code program.[13][14]

In 2009, Emil Ivov founded the BlueJimp company which has employed some of Jitsi’s main contributors[15][16] in order to offer professional support and development services[17] related to the project.

In 2011, after successfully adding support for audio/video communication over XMPPs Jingle extensions, the project was renamed to Jitsi since it was no longer “a SIP only Communicator”.[18][19] This name originates from the Bulgarian “” (wires).[20]

On November 4, 2014, “Jitsi + Ostel” scored 6 out of 7 points on the Electronic Frontier Foundation’s secure messaging scorecard. They lost a point because there has not been a recent independent code audit.[21]

On February 1, 2015, Hristo Terezov, Ingo Bauersachs and the rest of the team released [22] version 2.6 from their stand at the Free and Open Source Software Developers’ European Meeting 2015 event in Brussels. This release includes security fixes, removes support of the deprecated MSN protocol, along with SSLv3 in XMPP. Among other notable improvements, the OS X version bundles a Java 8 runtime, enables echo cancelling by default, and uses the CoreAudio subsystem. The Linux build addresses font issues with the GTK+ native LookAndFeel, and fixes some long standing issues about microphone level on call setup when using the PulseAudio sound system. This release also adds the embedded Java database Hyper SQL Database to improve performance for users with huge configuration files, a feature which is disabled by default. A full list of changes is [23] available on the project web site.

Jitsi supports multiple operating systems, including Windows as well as Unix-like systems such as Linux, Mac OS X and BSD. “Beta” packages built for Android are available[24] but the project’s roadmap describes the porting to Android as “on hold”.[25] It also includes:[26]

The following protocols are currently supported by Jitsi:[4]

Jitsi is mostly written in Java[31] which helps reuse most of the same code over the various operating systems it works on. Its GUI is based upon Swing. The project also uses native code for the implementation of platform specific tasks such as audio/video capture and rendering, IP address selection, and access to native popup notification systems such as Growl.

The project uses the Apache Felix OSGi implementation[32] for modularity.

Among others Jitsi uses the JAIN-SIP protocol stack for SIP support and the Jive Software Smack library [33] for XMPP.[34]

As Jitsi can handle IPv6 it is especially interesting for direct PC-to-PC (peer-to-peer) communication, for instance, if both sides were ‘trapped’ behind NAT routers, but could obtain a reachable IPv6 address via a tunnel-broker.[citation needed]

The Jitsi community has also completed an ICE implementation called ice4j.org, which it uses to provide NAT traversal capabilities, and assist IPv4 to IPv6 transition.[35]

Audio systems supported are PortAudio, PulseAudio and WASAPI (Windows Audio Session API).

Go here to see the original:
Jitsi – WOW.com

Posted in Jitsi | Comments Off on Jitsi – WOW.com

Technology | Define Technology at Dictionary.com

Posted: March 26, 2016 at 8:44 am

Contemporary Examples

And it finishes second, behind New York, for technology Innovation.

But Shawn and Craig, 47, are accused of being interested in technology as well.

Her reveals the sometimes blind, unsettling way love and technology merge.

Yet equal access to education and technology still remains a challenge.

The second feature is how to translate the technology efficiently: how to harness the power of this device for practical use.

British Dictionary definitions for technology Expand

the application of practical sciences to industry or commerce

the methods, theory, and practices governing such application: a highly developed technology

the total knowledge and skills available to any human society for industry, art, science, etc

Derived Forms

technological (tknldkl) adjectivetechnologically, adverbtechnologist, noun

Word Origin

C17: from Greek tekhnologia systematic treatment, from tekhn art, skill

Word Origin and History for technology Expand

1610s, “discourse or treatise on an art or the arts,” from Greek tekhnologia “systematic treatment of an art, craft, or technique,” originally referring to grammar, from tekhno- (see techno-) + -logy. The meaning “science of the mechanical and industrial arts” is first recorded 1859. High technology attested from 1964; short form high-tech is from 1972.

technology in Science Expand

The use of scientific knowledge to solve practical problems, especially in industry and commerce.

The specific methods, materials, and devices used to solve practical problems.

technology in Technology Expand

jargon Marketroid jargon for “software”, “hardware”, “protocol” or something else too technical to name. The most flagrant abuse of this word has to be “Windows NT” (New Technology) – Microsoft’s attempt to make the incorporation of some ancient concepts into their OS sound like real progress. The irony, and even the meaning, of this seems to be utterly lost on Microsoft whose Windows 2000 start-up screen proclaims “Based on NT Technology”, (meaning yet another version of NT, including some Windows 95 features at last). See also: solution. (2001-06-28)

See the original post here:

Technology | Define Technology at Dictionary.com

Posted in Technology | Comments Off on Technology | Define Technology at Dictionary.com

Automation | The Car Company Tycoon Game

Posted: March 25, 2016 at 12:45 pm

Automation is still in development, but you can get in on Early Access now! Youll get instant access to some extra content for the current version of the game, and a copy of the full version when its completed, as well as every update along the way.

IMPORTANT NOTE: Automation is still heavily in development. There is already many hours of interesting gameplay to be had out of Automation, but some major features are not complete. Large updates are usually released every few months

Automation Early Access: Steam

Automation is sold as a Digital Download version only, and is for Windows PCs only

Click here to check the minimum specifications. Noting that if your Graphics Card doesnt support Shader Model 3.0 or above it wont run Automation (almost all modern graphic cards, but please check your graphics card manufacturers website if unsure)

Note: Intel Integrated Graphics cards (as seen on many budget laptops) are not officially supported but some of them may run Automation OK on low settings. Try the demo if unsure.

Excerpt from:

Automation | The Car Company Tycoon Game

Posted in Automation | Comments Off on Automation | The Car Company Tycoon Game