منابع مشابه
Introducing L2Ork: Linux Laptop Orchestra
Virginia Tech Department of Music’s Digital Interactive Sound & Intermedia Studio in collaboration with the College of Engineering and School of Visual Arts presents the latest addition to the *Ork family, the Linux Laptop Orchestra. Apart from maintaining compatibility with its precursors and sources of inspiration, Princeton’s PLOrk, and Stanford’s SLOrk, L2Ork’s particular focus is on delive...
متن کاملWhy a laptop orchestra?
That the notion of a ‘laptop orchestra’ is seemingly paradoxical is one of my prime motivations for creating one; the pairing of these two inventions is perhaps obvious only because of its apparent impossibility. One is an almost archaic institution whose continued existence is something of a miracle, the other a technological newcomer that has become commonplace and seems likely to be with us,...
متن کاملThe Carnegie Mellon Laptop Orchestra
The Carnegie Mellon Laptop Orchestra (CMLO) is a collection of computers that communicate through a wireless network and collaborate to generate music. The CMLO is the culmination of a course on Computer Music Systems and Information Processing, where students learn and apply techniques for audio and MIDI programming, real-time synchronization and scheduling, music representation, and music inf...
متن کاملPLOrk: The Princeton Laptop Orchestra, Year 1
In this paper we report on the current state of the newly established Princeton Laptop Orchestra (PLOrk), a collection of 15 meta-instruments each consisting of a laptop computer, interfacing equipment, and a hemispherical speaker. Founded in the fall of 2005, PLOrk represents the first laptop ensemble of its size and kind, and brings together many of our research and aesthetic interests as mus...
متن کاملEncrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoLoop. We demonstrate clear weaknesses in the current CBC-based implementation of CryptoLoop, perhaps the most surprising being a very simple attack which allows specially watermarked files to be identified on an encrypt...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Philologia
سال: 2011
ISSN: 2372-1952,2372-1928
DOI: 10.21061/ph.v3i1.72