Appendix C
附录C(设备英文版)解析

able Value
Actual Value
a1
a2
a3
a4
b1
b2
b3
b4
Note1:Couplings shall be numbered in sequence,starting from the driver side.
Note2:□Yes□No. Actual shaft alignment measurement curve is attached(see sample form).
242
C.40
Refractory Fiber Module Lining Quality Inspection Record
SH/T 3503-J336
243
SH/T3503-J301
机器安装检验记录
Mechanical EquipmentInstallation Inspection Record
SH/T3503-J313
220
C.18
Vertical Equipment Installation Inspection Record
SH/T3503-J314
221
C.19
Horizontal Equipment Installation Inspection Record
SH/T3503-J315
SH/T 3503-J333
240
C.38
Refractory Brick Lining Quality Inspection Record
SH/T 3503-J334
241
C.39
Refractory Castable Lining Quality Inspection Record
AQT4233-2013 建设项目职业病防护设施设计专篇编制导则

AQT4233-2013 建设项目职业病防护设施设计专篇编制导则AQ/T4233-2013______ 1.2013ContentsForeword1 Scope2 Normative References3 ___ and ns4 Design Objectives and Basic Principles5 Design Basis6 Design Scope and Content7 Design res and Requirements8 ___ FacilitiesAppendix A (nal Appendix) Main Data to be ___ Facilities Appendix B (nal Appendix) Contents of Engineering Analysis Appendix C (nal Appendix) ___ FacilitiesAppendix D (Normative Appendix) ___ForewordThis standard is proposed by the State ___.This standard is under the n of the Technical Committee on Dust and Poison Control of the nal Work Safety ___ (TC288/SC7).The drafting ns of this standard are China Academy of Safety Science and Technology。
Research Center of State n of Work Safety。
and Beijing Institute of ___.The main drafters of this standard are Li Jian。
Liu Baolong。
appendixC

Appendix CKeys to Translation Exercises for Independent WorkI. 英译汉II. 汉译英BACKI. 英译汉1. 论读书读书可以怡情,足以博采,足以长才。
其怡情也,最见于独处幽居之时;其博采也,最见于高谈阔论之中;其长才也,最见于处事判事之际。
练达之士虽能分别处理细事或一一判别枝节,然纵观统筹、全局策划,则舍好学深思者莫属。
读书费时过多易惰,文采藻饰太盛则矫,全凭条文断事乃学究故态。
读书补天然之不足,经验又补读书之不足,盖天生才干犹如自然花草,读书然后知如何修剪移接,而书中所示,如不以经验范之,则又大而无当。
有一技之长者鄙读书,无知者羡读书,惟明智之士用读书,然书并不以用处告人,用书之智不在书中,而在书外,全凭观察得之。
读书时不可存心洁难作者,不可尽信书上所言,亦不可只为寻章摘句,而应推敲细思。
书有浅尝者,有可吞食者,少数则须咀嚼消化。
换言之,有只须读其部分者,有只须大体涉猎者,少数则须全读,读时须全神贯注,孜孜不倦。
书亦可请人代读,取其所作摘要,但只限题材较次或价值不高者,否则书经提炼犹如水经蒸馏,淡而无味矣。
读书使人充实,讨论使人机智,笔记使人准确。
因此不常作笔记者须记忆特强,不常讨论者须天生聪颖,不常读书者须欺世有术,始能无知而显有知。
读史使人明智,读诗使人灵秀,数学使人周密,科学使人深刻,伦理使人庄重,逻辑修饰之学使人善辩:凡有所学,皆成性格。
人之才智但有滞碍,无不可读适当之书使之顺畅,一如身体百病,皆可借相宜之运动除之。
滚球利辜肾,射箭利胸肺,慢步利肠胃,骑术利头脑,诸如此类。
如智力不集中,可令读数学,盖演题须全神贯注,稍有分散即须重演;如不能辨异,可令读经院哲学,盖是辈皆吹毛求疵之人;如不善求同,不善以一物阐证另一物,可令读律师之案卷。
如此头脑中凡有缺陷,皆有特药可医。
(王佐良译)2. 美国总统林肯在葛底斯堡的演讲词87年前,我们的先辈们在这个大陆上创立了一个新国家,它孕育于自由之中,奉行一切人生来平等的原则。
Dear ________________ APPENDIX C PERMISSION LETTER TO STUDY SITE

APPENDIX C: PERMISSION LETTER TO STUDY SITEMay 15, 2004Dear ________________:I am writing to request your permission to interview some of graduate students in the School of Information Studies for my doctoral dissertation. I propose to explore information needs of bilingual or multilingual graduate students taking web-based graduate level courses and to understand whether students’ perceptions of culture and their information needs are related. Also, my research explores how these students perceive that their culture influences their information needs in web-based learning contexts and how other factors affect the way that they meet their information needs in web-based classroom settings. In order to allow for different patterns of information needs and behaviors to emerge, rather than the testing of specific hypotheses, and see if there is any relationship between students’ perceived culture and information needs of the graduate students, this study employs case study research design. The target population for this study is graduate level degree seeking bilingual and multilingual students who have partaken in a graduate level web-based learning degree program and/or course. I have selected the School of Information Studies as the site for this case study because it has a strong masters’ level graduate online degree program with a diverse student body that includes bilingual and multilingual participants. For data gathering purposes, this research will employ interview and focus group methodologies. Specifically, I will need to recruit 5 to 10 students who meet my selection criteria to be interviewed for approximately 90 minutes and up to 12 students, including those previously interviewed, if necessary, will be to participate in a focus group for about 90 minutes. In conclusion, I’d like to ask your permission to study some of our graduate students for this research. I have enclosed a copy of my Human Subject Committee application as well as my invitation and informed consent form for this research. Should you have any questions or concerns regarding this letter or my research, please contact me at my email address above. You may also want to contact Dr. Kathleen Burnett, major professor, at burnett@ . Sincerely,Arif Dagli Ph.D. CandidateEnclosure925 E. Magnolia Dr. Apt. N-8 Tallahassee, FL 32301 Tel: 850-877-3263 Email: add5394@APPENDIX D: INVITATION LETTER TO STUDENTS05.05.2004Dear Student:I am a Ph.D. candidate in the School of Information Studies under the direction of Dr. Kathleen Burnett in the School of Information Studies at Florida State University. Your name was provided by your school to receive a copy of this invitation letter for your possible participation in this research.As an attempt to explore how students fulfill their information needs while taking courses being offered through web-based delivery methods, I am studying multilingual graduate students’ information needs in web-based learning contexts and my aim is to find out how students’ cultures affect their information needs in web-based learning contexts. Projected title of my study is Culture and Information Needs in Web-Based Learning: A Case Study.I will be recruiting between five and ten multilingual graduate students for this study. The subjects will participate voluntarily and no incentive will be offered. The interview participants must be 18 years old or older, be able to speak more than one language fluently and be currently or previously enrolled in at least one web-based course taught any term of the academic year. Also, each participant must have completed at least one term of graduate study to participate in this study. Fluency is regarded as the ability to speak smoothly and rapidly to express one’s self. For this study, all participants must be able to speak and express themselves fluently in English in addition to at least one other language.Your participation in this study is totally voluntary; nevertheless, your participation in interviews and/or focus groups will contribute to the success of this research and will be greatly appreciated. Your participation will contribute valuable information to the knowledge on information behavior in web-based learning contexts. All your responses and any identifying information, including your email addresses other electronic information in electronic correspondence, will be kept confidential to the extent allowed by law, and you may simply send your interest in participation in this study to me by replying back to this email message. Before your participation in this study, you must send the attached copy of your informed consent form after you sign and date to me by faxing it to me at (850) 644-6253 or 644-9763, by scanning and sending it to my email address at add5394@, or by sending it to my postal address at 925 E. Magnolia Dr. # N-8 Tallahassee, FL 32301, USA.I’d like to assure you that your consent to participate will not affect your grade or your program in your institution and that you have the right to not participate or withdraw from participation at anytime without prejudice, penalty or loss of benefits to which otherwise entitled. Finally, the results of the research study may be published, but your name will not be used.Should you have any questions concerning this research study, please call me at (850) 877-3263 or email me at add5394@. In case you have any questions about your rights as a subject/participant in this research, or should you feel you have been placed at risk, you can contact the Chair of the Human Subjects Committee, Institutional Review Board, through the Vice President for the Office of Research at (850) 644-8633.Best wishes in your study and thank you for your time and help in advance.Sincerely Yours,Arif DagliAPPENDIX E: DATA COLLECTION DECISION TREEAPPENDIX F: DEMOGRAPHIC DATA SURVEYSTUDENT NAME: ____________________(Please use your initials here) Instructions: Please answer the following questions that are related to your demographic data. These questions will help me know you more and ask some follow-up questions, if it becomes necessary. Please note that each question here is optional and feel free to skip any or all of these questions if you choose not to answer.o What language skills do you have in which languages?o How fluent are you in speaking each language?o What ethnicity do you consider yourself to be?o What is your national origin or what country are you a citizen of?o Where are you living/residing while enrolled in this program?o Have you relocated since you started your degree program? If so, what other places have you lived?o What was your highest level of education before you entered this program?o What is your degree program?o What is your academic concentration area, if any?o Why did you choose this academic institution for your graduate degree?o When did you start this program?o What is your academic status (i.e., full time degree seeking, part time degree seeking)?o How many credits have you completed successfully?o Do you have any fellowships, scholarships, or assistantships currently?o What do you do for living while pursuing your graduate degree?o How many web-based-learning courses are you taking this semester?o When did you take you first distance learning course?o How many web-based-learning courses had you taken as a graduate student in your current degree program, including this semester?o Have you taken any web-based-learning courses as a graduate student at another institution or degree program prior to or during your current degree program?o Are you taking any face-to-face course towards your degree at this institution this semester?o Have you taken any other courses towards your degree at this institution before this semester?o When do you plan on graduating (in semesters)?o What information resources are you familiar with that you use in your academic work?o What computer skills do you have?o Do you own a working computer to use for your degree program requirements? o In addition to your own computer, what other computer resources are available to you that you use for your degree program requirements?o How do you log on to the Internet?o Is there any other piece of information that I need to know related to your web-based course successes and experiences?APPENDIX G: INTERVIEW METHODOLOGY QUESTIONS STUDENT NAME: ____________________(Please use your initials here)o How do you define information needs of graduate students in web-based courses?o What types of information needs do you have in web-based education courses?o How do you think/perceive your information needs differ from one web-based course to another?o How do you think your information needs differ from one person to another in web-based courses?o What differences do/did you see in the ways individuals meet their information needs in web-based courses?o How significant are these differences among your classmates in your web-based courses in fulfilling your information needs? Any examples?o What factors do you think/perceive that affect you as a graduate student when fulfilling your information needs in web-based courses?o What were your experiences in finding, getting, and having information delivered to you in web-based education courses?o What problems did you experience or what were your experiences like in receiving the information you need in web-based education courses?o How do you define culture?o How does culture affect the way you fulfill your information needs in web-based courses?o How do your language skills affect the way you fulfill your information needs in web-based courses?o How do your geographic location affect the way you fulfill your information needs in web-based courses?o How do your ethnicity or race affect the way you fulfill your information needs in web-based courses?o How do your gender affect the way you fulfill your information needs in web-based courses?o How do your age affect the way you fulfill your information needs in web-based courses?o How do your nation of origin affect the way you fulfill your information needs in web-based courses?o How do your social class affect the way you fulfill your information needs in web-based courses?o How do your level of education affect the way you fulfill your information needs in web-based courses?o How do your communication and interaction skills affect the way you fulfill your information needs in web-based courses?o How do your length of stay in host country affect the way you fulfill your information needs in web-based courses?o How do your cultural proximity to culture of host country affect the way you fulfill your information needs in web-based courses?o What are the main characteristics of information utilized by you in web-based courses to satisfy your needs when you have the information you need?o Where do usually you get the required information you need for work required in your web-based courses?o Specifically, what sources do you use to fulfill your information needs in your web-based courses?o If you were to choose three most often used sources in your web-based courses, what would they be?o What types of tasks that required you to use any or all of these sources you listed in your answers to previous questions in your web-based courses did you have? o Could you give me an example where you were to fulfill your needs for an INDIVIDUAL task required in a web-based course you have taken, by using any or all of these sources (if any)?o Could you give me an example where you were to fulfill your needs for a GROUP task required in a web-based course you have taken, by using any or all of these sources (if any)?o How different were your information needs in your individual and group projects? o How different were your information needs in synchronous and asynchronous web-based course activities?APPENDIX H: DATA ANALYSIS CODE LIST –DEMOGRAPHIC DATA SURVEYQ.S.R. NUD*IST Power version, revision 5.0Licensee: Arif Dagli____________________(1) /Language skills/Defined languagelanguage skills, number of language____________________(1 1) /Language skills/FluencyFluency in speaking each language____________________(2) /Ethnicityethnicity or race____________________(3) /National originnational origin or citizenship____________________(4) /ResidencyCurrent residency____________________(4 1) /Residency/RelocationRelocation after starting degree program____________________(5) /Prior Level of Educationhighest level of education____________________(6) /Degree ProgramGraduate program, degree____________________(6 1) /Degree Program/ConcentrationAcademic concentration area____________________(6 2) /Degree Program/ReasonsReasons for choosing this academic institution____________________(6 3) /Degree Program/First semesterDate for starting this program____________________(6 4) /Degree Program/Academic student statusFull time degree seeking, part time degree seeking____________________(6 5) /Degree Program/Earned creditsTotal number of credits completed successfully____________________(6 6) /Degree Program/Financial aidFellowships, scholarships, or assistantships____________________(6 6 1) /Degree Program/Financial aid/jobsJobs, works____________________(6 7 1) /Degree Program/Courses/Current coursesNumber of web-based courses this semester____________________(6 7 2) /Degree Program/Courses/First web-based courseDate or time for the first distance learning course____________________(6 7 3) /Degree Program/Courses/Total web-based coursesAll web-based-learning courses____________________(6 7 4) /Degree Program/Courses/Other web-based coursesAny web-based courses at another institution or degree program ____________________(6 7 5) /Degree Program/Courses/Face-to-face coursesFace-to-face courses____________________(6 7 6) /Degree Program/Courses/Other coursesAny other courses at this institution____________________(6 7 7) /Degree Program/Graduation dateDate for graduating____________________(7) /Information ResourcesTypes of information resources____________________(8 1) /Computer Resources/SkillsDescription of computer skills____________________(8 2) /Computers Resources/OwnershipOwnership of a working computer____________________(8 3) /Computer Resources/Additional resourcesOther computer resources are available____________________(8 4) /Computer resources/Internet connectionLogging on to the Internet, connection type ____________________(9) /Participant/Other informationOther web-based learning related information ____________________APPENDIX I: DATA ANALYSIS CODE LIST –INTERVIEW METHODOLOGYQ.S.R. NUD*IST Power version, revision 5.0Licensee: Arif Dagli___________________________________(1) /Information needs/Definition of information needs___________________________________(1 1) /Information Needs/ TypesTypes of information needs___________________________________(1 2) /Information Needs/CoursesCourse Information need differences___________________________________(1 3) /Information Needs/IndividualsIndividual information needs differences___________________________________(1 3 1) /Information Needs/Individuals/DifferencesTypes of individual differences___________________________________(1 3 2) /Information Needs/Individuals/SignificanceSignificance of individual differences___________________________________(1 4) /Information Needs/FactorsFactors affecting graduate students when fulfilling your information needsin web-based courses___________________________________(1 5) /Information Needs/ExperiencesExperience in finding, getting, and having information delivered___________________________________(1 6) /Information Needs/ProblemsProblems in finding, getting, and having information delivered___________________________________(2) /CultureDefinition of culture, individual perceptions of culture___________________________________(2 1) /Culture/Information NeedsThe ways culture affect in fulfilling information needs in web-basedcourses___________________________________(2 1 1) /Culture/Information Needs/LanguageThe ways language affect in fulfilling information needs in web-basedcourses___________________________________(2 1 2) /Culture/Information Needs/Geographic locationThe ways geographic location affect in fulfilling information needs inweb-based courses___________________________________(2 1 3) /Culture/Information Needs/Ethnicity or raceThe ways ethnicity or race affect in fulfilling information needs in web-based courses___________________________________(2 1 4) /Culture/Information Needs/GenderThe ways gender affect in fulfilling information needs in web-basedcourses___________________________________(2 1 5) /Culture/Information Needs/AgeThe ways age affect in fulfilling information needs in web-based courses ___________________________________(2 1 6) /Culture/Information Needs/Nation of OriginThe ways nation of origin affect in fulfilling information needs in web-based courses___________________________________(2 1 7) /Culture/Information Needs/Social ClassThe ways social class affect in fulfilling information needs in web-basedcourses___________________________________(2 1 8) /Culture/Information Needs/Level of EducationThe ways level of education affect in fulfilling information needs in web-based courses___________________________________(2 1 9) /Culture/Information Needs/Communication and interaction skillsThe ways communication and interaction skills affect in fulfillinginformation needs in web-based courses___________________________________(2 1 10) /Culture/Information Needs/Length of stay in host countryThe ways length of stay in host country affect in fulfilling informationneeds in web-based courses___________________________________(2 1 11) /Culture/Information Needs/Cultural proximity to culture of host countryThe ways cultural proximity to culture of host country affect in fulfillinginformation needs in web-based courses___________________________________(2 1 12) /Culture/Information Needs/OtherThe ways other cultural variables affect in fulfilling information needs inweb-based courses___________________________________(3 1) /Information use/Characteristicsmain characteristics of information utilized___________________________________(3 2) /Information use/Information CarriersInformation channels and sources used___________________________________(3 2 1) /Information use/Information Carriers/typesTypes of information channels, sources, and resources___________________________________(3 2 2) /Information use/Information Carriers/Most often usedMost often used channels, sources, and resources___________________________________(3 3 ) /Information use/TasksTasks and activities for information use___________________________________(3 3 1) /Information use/Tasks/Individual tasksIndividual task examples___________________________________(3 3 2) /Information use/Tasks/Group tasksGroup task examples___________________________________(3 3 3) /Information use/Tasks/DifferencesDifferences___________________________________(3 3 4) /Information use/Tasks/TimeSynchronous tasks, Asynchronous tasksREFERENCESAbate, A. K. (1998). The role of the Einstein Library of Nova Southeastern University in meeting the needs of distance learning students. Unpublished doctoraldissertation, Nova Southeastern University.Abdullah, A. S. (2000). Factors affecting international students use of the online catalog and other information sources. Unpublished Doctoral Dissertation, Florida State University.Ahern, T. C. & Repman, J.(1994). The effects of technology on online education.Journal of Research on Computing in Education, 26, 537-546.Allen, B. (1997). Information needs: a person-in-situation approach. In P. Vakkari, R.Savolainen, & B. Dervin (Eds.), Information seeking in context (pp. 111-122).London: Taylor Graham.Allen, B. L. (1996). Information tasks: Toward a user-centered approach to information systems. San Diego, California: Academic Press.Allen, M. B. (1993). International students in academic libraries: a user survey. College & Research Libraries, 54(3), 323-333.Babbie, E. (2004). The practice of social research. 10th edition. Belmont, CA: Wadsworth Thomson Learning.Ball, M. A. & Mahony, M. (1987). Foreign students libraries and culture. College & Research Libraries, 48(2), 160-166.Barker, B. O. (2000) Anytime, anyplace learning. Forum for Applied Research and Public Policy, 15(1), 88.Barron, D. D. (1996). Distance education in North American library and information science education: applications of technology and commitment. Journal of theAmerican Society for Information Science, 47(11), 805-810.Bates, M. J. (1989) The design of browsing and berrypicking techniques for the online search interface. Online 13(5), 407-424.Bates, M. J. (1996). The Getty end-user online searching project in the humanities – report no 6 – overview and conclusions. College & Research Libraries 57(6),514-523.Bayless, L. A. (2001). What are the non-academic needs of distance learners.Unpublished doctoral dissertation, Virginia Polytechnic Institute and StateUniversity.Belkin, N. & Vickery, A. (1985). Interaction in information systems. London: The British Library.Belkin, N. (1980). Anomalous states of knowledge as a basis for information retrieval.Canadian Journal of Information Science-Revue Canadienne Des Sciences De L Information, 5, 133-143.Belkin, N. J., Oddy, R. N., & Brooks, H. M. (1982). ASK for Information Retrieval. The Journal of Documentation, 38(2), 61-71.Belkin, N., Cool, C., Stein, A. & Thiel, U. (1995). Cases, scripts, and information seeking strategies: on the design of interactive information retrieval systems.Expert Systems with Application, 9(3), 379-395.Berg, B. L. (1998). Qualitative research methods for social sciences. Boston: Allyn and Bacon.Bigdeli, Z. (1995). Library services to overseas students in Australian Universities.Unpublished doctoral dissertation. University of New South Wales.Bilal, D. M. (1988). Library knowledge of international students from developing countries: A comparison of their perceptions with those of reference librarians.Unpublished doctoral dissertation. Florida State University.Bilal, D. M. (1989). International students' acquisition skills of library research skills: relationship with their English language proficiency. Reference Librarian, 24,129-45.Borgman, C. L. (1996). Why are online catalog still hard to use? Journal of American Society for Information Science, 47(7), 493-503.Brockmeier, K. C. (1992). Academic information need and information seeking behavior of blind or low vision and sighted college students. Unpublished DoctoralDissertation, Florida State University, Florida.Brown, M. E. (1991). A general model of information seeking behavior. Proceedings of the American Society for Information Science Annual Meeting. 28, 9-14Bruce, H. (1998). User satisfaction with information seeking on the Internet. Journal of the American Society for Information Science, 49(6), 541-556.Bruffee, K.A. (1982). Collaborative learning television. Educational Communications and Technology Journal, 30, 26-40.Burnett, G., Burnett K. & Latham, D. (2003). Distributed learning in the Florida State University School of Information Studies. In D. D. Barron (Ed.) Benchmarks indistance education: the LIS experience. (pp. 29-52). Westport, Connecticut:Libraries UnlimitedBurnett, K. & McKinley, E. G. (1998). Modeling information seeking. Interacting with Computers, 10, 285-302.Case, D. O. (2002). Looking for information. Orlando, FL: Academic Press Cavanagh, T., & Lingham, B. (1994). Library services for external postgraduate and overseas students. Distance Education, 15(1), 112-127.Choo, C. W. & Auster, E. (1993). Scanning the business environment acquisition and use of information by managers. Annual Review of Information Science andTechnology (ARIST), 29.Clark, T. (2003). Virtual and distance education in American Schools. In M. G. Moore and W. Anderson (Eds.). Handbook of Distance Education. (pp. 673-699).Mahwah, NJ: Lawrence Erlbaum Associates, Inc.CNN (2003, Jul 22). Distance learning’s popularity takes a big jump. Available online at /2003/EDUCATION/07/18/distance.learning.ap/. Retrievedon March 1, 2004.Creswell, J. W. (1998). Qualitative inquiry and research design: choosing among five traditions. Thousand Oaks, CA: Sage.Daniel, J. S. (1996). Mega universities and knowledge media: technology strategies for higher education. London: Kogan Page.Dervin, B. & Nilan, M. (1986). Information needs and uses. Annual review of Information Science and Technology, (ARIST), 21, 3-33.Dervin, B. (1983a). An overview of Sense-Making: concepts, methods, and results to date. In: Proceedings of International Communication Association AnnualMeeting, May 1983, Dallas, Texas, USA.Dervin, B. (1983b). Information as a user construct: the relevance of perceived information needs to synthesis and interpretation. In: W. A. Ward & L. J. Reed(Eds.). Knowledge structure and use: Implications for synthesis andinterpretation (pp. 153-184). Philadelphia, PA: Temple University Press, Dervin, B. (1992). From the mind’s eye of the ‘user’: The sense making qualitative-quantitative methodology. In: J. D. Glazier & R. R. Powell (Eds.). Qualitativeresearch in information management (pp. 61-84). Englewood, CO: LibrariesUnlimited.Dimartino, D., Ferns, W. J. & Swacker, S. (1995). CD-ROM search techniques of novice end-users: is the English-as-a-second language student at a disadvantage? College and research Libraries, 56(1), 49-59.DiVesta, F.J. & L.P. Rieber (1987). Characteristics of cognitive engineering: The next generation of instructional systems. Educational Communication and Technology Journal, 35(4), 213-230.Duncan, R. B. (1972). Characteristics of organizational environments and perceived environmental uncertainty. Administrative Science Quarterly, 17(3), 313-327. Egan, M. W., Sebastian, J., & Welch, M. (1991). Effective television teaching: perceptions of those who count most...distance learners. Proceedings of the Rural Education Symposium. Nashville, TN.Ellis, D. & Haugan, M. (1997). Modeling the information seeking patterns of engineers and research scientists in an industrial environment. Journal of Documentation,53, 384-403.Ellis, D. (1989). A behavioral approach to information retrieval system design. Journal of Documentation. 45(3), 171-212.Ellis, D., Cox, D. & Hall (1993). A comparison of the information seeking patterns of researchers in the physical and social sciences. Journal of Documentation, 49,356-369.Eustis, J., & McMillan, G. (2001). Libraries address the challenges of asynchronous learning. Journal of Asynchronous Learning Networks (JALN), 2(1). Fernandez, S. E. W. (1999). Toward understanding the study experience of culturally sensitive graduate students in American distance education programs.Unpublished Doctoral Dissertation, Florida International University. Flowers, D. J. (2000). Utilization-focused needs assessment: A case study of adult learners' web-based distance education needs. Unpublished doctoral dissertation, University of South Alabama.。
英国药典Appendix XVI C翻译

第一部分Appendix XVI C. Efficacy of Antimicrobial Preservation (Ph. Eur. general text 5.1.3)如果药物制剂本身没有足够的抗菌活性,那么就应该加抗菌防腐剂。
在药品正常的储存和使用过程中,液体制剂特别是多剂量液体制剂,尤其需要添加防腐剂。
这样不仅可以阻止细菌繁殖、限制微生物污染;还可以防止细菌污染给患者身体带来的危害和对药品本身的污染。
抗菌防腐剂在GMP中不能被替代。
抗菌防腐剂的效果根据药物制剂的组成成分的不同、防腐剂加入的形式的不同、或使用容器或封口的不同而增强或减弱。
在最终的包装容器内的制剂,我们需要验证它在整个有效期内的抗菌活性。
这样才能保证在贮存过程中抗菌活性不会减弱。
样品从最终容器中取出时就需要立即进行验证了。
在药物制剂发展期间(注:研发Research & Development,D就是发展期间,将活性分子变成处方制剂的过程),应该需要证明药物制剂本身的抗菌活性。
如果没有就需要添加合适的防腐剂、或防腐剂能够保护制剂免于遭受微生物污染的不良效果和在贮存和使用过程中细菌的繁殖。
抗菌活性应该通过以下一系列测试来证实。
这些测试并不用于常规的对照目的。
测试抗菌防腐剂的有效性测试包括三方面内容:一、不论最后的包装容器是什么,都需要用规定的接种物,也就是合适的微生物对制剂进行攻击。
二、在规定的温度下贮存已接种制剂。
三、在一段时间间隔内抑制容器内的样本生长,然后计数这样被除去的样本中的菌数。
在测试条件下,如果在规定时间和温度下,接种后制剂中的菌落数有重大的下降或没有增加,那么药物制剂中防腐剂的作用就是可以接受的。
接受标准(即在规定时间内减少微生物的数量)随着制剂类型的不同而不同。
因为制剂类型的不同所达到的保护的程度也不同。
(见表5.1.3-1/2/3)。
微生物检测(见附录二)绿脓假单胞杆菌A TCC 9027; NCIMB 8626; CIP 82.118.金黄色酿脓葡萄球菌ATCC 6538; NCTC 10788; NCIMB 9518; CIP 4.83.白色念珠菌A TCC 10231; NCPF 3179; IP 48.72.黑曲霉A TCC 16404; IMI 149007; IP 1431.83.使用单菌株攻击而且设计微生物可以在合适的地方补充其他菌株或品种,这样就能代表可能的制剂污染。
Appendix

附录A.1 存储器构造 (1)A.2 特殊继电器 (3)A.3 指令清单 (12)附录A.1.1 位存储器设备位存储器设备是提供位读写的存储设备。
P , M, L, K, F 区域都是位存储器设备。
然而,位存储器设备也可以被用做字设备区域。
< 位存储器设备的符号 >< 位存储器设备的内存结构 >位地址赋值( 0 ~ F : 十六进制 ) 字地址赋值(十进制 ) 设备赋值( P, M, L, K, F )FEDCBA987654321000 001 002 003nnn = P002BA.1.2 位 / 字存储器设备( 定时器& 计数器)定时器和计数器存储区域包括三部分-输出位 、当前值字和设定值字。
当T 或 C 区域被当成位指令的运算对象时,指令对定时器和计数器的输出位有影响。
如果T 或C 区域被使用做字指令的运算对象,指令影响当前值。
用户不能改变设定值。
A.1.3 字存储器设备D 区域由字来使用。
因此,D 区域不能被用做位指令例如:LOAD, OUT 等的运算对象。
如要通过位来控制D 区域,请使用特殊指令如:BLD 、BAND 、BOR 等。
FEDCBA987654321D0000 D0001D0002 D0003Dnnnn = D0002A.2.1 K10S1 / K10S / K30S / K60S1) F 设备2) 其它特殊继电器A.2.2 K80S / K200S / K300S / K1000S1) F 继电器高速连接标志清单x : K1000S = 9, K300S / K200S = 4, n = 0 ~ 7 (槽号码)槽号& 标志清单高速连接信息标志清单的详细信息(m=0时)高速连接信息标志清单的详细信息(m= 1 到3)从属系统标志清单⏹●: 仅适用于K1000S, K300S, K200S 系列 : 仅适用于K10S,K10S1, K30S, K60S 系列 : 在K80S 不能使用。
Appendix C Slides

Simulation with Arena, 3rd ed.
Appendix C – A Refresher on Probability and Statistics
Slide 5 of 33
Probability Basics (cont'd.)
Conditional probability
Knowing that an event F occurred might affect the probability that another event E also occurred Reduce the effective sample space from S to F, then measure "size" of E relative to its overlap (if any) in F, rather than relative to S Definition (assuming P(F) ≠ 0):
E and F are independent if P(E ∩ F) = P(E) P(F)
Implies P(E|F) = P(E) and P(F|E) = P(F), i.e., knowing that one event occurs tells you nothing about the other If E and F are mutually exclusive, are they independent?
Slide 1 of 33
What We'll Do ...
Ground-up review of probability and statistics necessary to do and understand simulation Assume familiarity with
HND-商务沟通技巧报告

1.0 IntroductionThis report is for assessment the customer services and whole environment in the Xuezhi building. The report is to introduce the customer service. At this point,the main research is Xuezhi building. The aim of this report is to investigate internal and external environment of the Xuezhi building. Including the infrastructure, foundation services, administration mode and neighboring environment. Through questionnaires and interview to reflect problems and.2.0 Proceduresa)A number of books on customer serviceb)Search for information from internet websites.c)Through these ways above to draft and distributing questionnaire. Collect recommendations from interviews.3.0 Definition of customer service3.1 What is customer serviceCustomer service is the provision of service to customers before, during and after a purchase. Customer service is an organization's ability to supply their customers' wants and needs. Customer service is the practice of providing customers with a positive, helpful experience when they enter a business, throughout the time they stay at the business, and even after the customer leaves, should they have additional questions or products to return. Many stores and other businesses spend a great deal of time training their employees to provide great customer service, because it makes a customer more likely to become a returning, loyal client. (See Bibliography)3.2 The importance of customer serviceGood customer service is more than handling customers who have problems. It begins with the first contact a customer has with company. Good customer service looks likethis: Make sure it represent a product or service. Then, warm, sincere greeting on first contact. Establish whether the business has what the customer needs (offer to help find it) provide it or suggest better alternative, to their benefit. Develop an easy, positive rapport with the customer which lets them know they are respected and appreciated. Provide an easy way to complete the transaction. Sincerely and warmly thank the customer for their business and invite them to come back if ever they need the help again . Good customer service is of vital importance for all businesses, large or small. It can have a direct impact on customer loyalty and where potential customers choose to spend their money. Simply put, the higher quality customer service the company provide, the higher level of customer satisfaction they will enjoy, and that will translate into repeat business. (See Bibliography)3.3 Who are the customers?A customer (also known as a client, buyer, or purchaser) is usually used to refer to a current or potential buyer or user of the products of an individual or organization, called the supplier, seller, or vendor. This is typically through purchasing or renting goods or services. However, in certain contexts, the term customer also includes by extension any entity that uses or experiences the services of another. A customer may also be a viewer of the product or service that is being sold despite deciding not to buy them. The general distinction between a customer and a client is that a customer purchases products, whereas a client purchases services. (See Bibliography)3.4 What do they need?As customers, they want the following services. Service or product must be the right. The price will reasonable. Also at the right time and in the right place. They need positive and helpful service at anytime. Customer service representative ought to be listened to customer and understood. The customers want to be treated intelligently and treated as an individual.3.5 Customer services in Xuezhi buildingXuezhi building is a multifunction construction including dormitories, classrooms, teacher offices and some other infrastructure. The students is the major customers, so, this report mainly survey the students. Also the questionnaire is primary aim at students. Due to the properties of the building, customer services in the building is mainly comprised of the follow part: First and foremost, the environment and facility of dormitory including dormitory layout, electrical equipment, bathroom, potable water supply, washhouse and so on. Next, the teaching facilities in the classrooms including student desks and chairs, computer, multi-media. The last is around environment and traffic.4.0 Research4.1 MethodologyThere are a number of research methods. Through consult books of customers services and collect information from internet to draft and distributing questionnaire. Collect recommendations from interviews. Through these methods collect data and statistical analysis, etc. From this, it can reflect various existing problems and gather advises in Xuezhi building.4.2 Introduction questionnaireThe questionnaire mainly research the Xuezhi building overall environment. There are twelve questions in the questionnaire. There were 100 respondents did the questionnaire who live in Xuezhi building. The other people who not live in Xuezhi building just participate the interviews. The questionnaire has three part probably. Top five questions were about dormitory environment. Next three questions were about classrooms' facilities. Surplus questions is about other facilities and around environment and traffic. Also it has spare parts for respondents to give their advises.4.3 Data and analysisSending 100 pieces of questionnaire to collect information about the environment and customer services from the students who live in Xuezhi building. (Specific data see the form, Appendix A&B)On the whole dormitory environment issue interviews, 63% of students were satisfied with it, 26% of students were thought generally and 11% of students were dissatisfied. According to the survey data make a chart about dormitory environment. (See Appendix C)On the whole teaching facilities issue interviews, 42% of students were satisfied, 23% were thought generally, 35% of students were dissatisfied. Especially, 100% of students were dissatisfied with the computer and multi-media. According to the survey data make a chart about the teaching facilities. (See Appendix D)On the other customer services, around environment and traffic interviews, 71% of students were satisfied, 15% of students were thought generally, 14% of students were dissatisfied. Especially. According to the survey data make a chart about these. (See Appendix E)4.4 Information in process of researchThrough the research got a great deal of information from students. It is including problems and suggestions in terms of the environment and customer services in Xuezhi building. Hereon list some major advantage and disadvantage.In the dormitories, overall environment is acceptable. The public sanitation is very will. Dormitory corridor, public halls and elevator someone fixed cleaning. Sound insulation is general. The outside noise can not enter into. But if someone make noises in corridor can heard clearly. Network is mainly steady. But sometimes it willinterruption and most of students consider the price is higher. Then, central heating24 hours working during whole winter. It is very warming. Last but not least, most of people complain the public bathroom, the water temperature is fluctuant and the price is higher.In the classrooms, student desks and chairs are generally acceptable but a small number of them are damaged. Several classrooms are located in high-rise. If students take the elevator, they must across the dormitory or take the stairs. It is inconvenience. The most important problem is the computer and multi-media. Almost all the computers have virus. A large number of USB flash drive can not read data.In other way, there is a washhouse in the third floor. It is not a self-service washhouse. So, it will be a big timesaver for students. Opposite, the price is higher then the self-service. The shop located in the first floor. It is very small, so it just offer some snacks, several beverage, ice cream and some other pinhead. The super-market is little far from Xuezhi building, so students usually buy foods and drinks in there. Therefore, the price of goods in this shop is higher then other shop outside. The traffic in Xuezhi building is convenient. There is a subway station and two bus station near it.5.0 ConclusionAccording to the research, a lot of problems was reflex. through investigation and research, collect lots of data and suggestion. In the first place, many students were satisfied with dormitory environment, although has some shortages. They thought the dormitory clean and comfortable, infrastructure well and living convenient. But about bathroom should be improve. In the second place, about classrooms, most of students satisfied with the environment but dissatisfied the teaching facilities in especial the computers. In the third place, around environment and traffic, almost of people are satisfied. Finally, the whole environment of Xuezhi building, its advantages outweighs its disadvantages.6.0 RecommendationThrough the research discovered some shortage about Xuezhi building environment and customer services. According this situation, to give some advises below:A)Control the external person to enter.B)Renewal the teaching facilitiesC)Decrease the price of public bathroom7.0 BibliographyTurban, Efraim (2002). Electronic Commerce: A Managerial Perspective. Prentice Hall. ISBN .Paul H. Selden (December 1998). "Sales Process Engineering: An Emerging Quality Application". Quality Progress: 59–63.8.0 Appendix8.1 Appendix AQUESTIONAIREThe environment and customer services of Xuezhi building1. Do you satisfied the dormitory sound insulation effect?A.SatisfiedB.GeneralC.Dissatisfied2. Do you satisfied with heating service of dormitory?A.SatisfiedB.GeneralC.Dissatisfied3. Do you satisfied with the public sanitation ?A.SatisfiedB.GeneralC.Dissatisfied4. What about the public bathroom environment?A.ExcellentB.GeneralC.Bad5. What about the network?A.ExcellentB.GeneralC.BadPlease give some advices about dormitory environment_____________________________________________________________________ _____________________________________________________________________6. Do you satisfied the classroom environment?A.SatisfiedB.GeneralC.Dissatisfied7. Do you satisfied the student desks and chairs?A.SatisfiedB.GeneralC.Dissatisfied8. What about the computer and multi-media?A.ExcellentB.GeneralC.BadPlease give some advices about classroom environment_____________________________________________________________________ _____________________________________________________________________9. Do you satisfied the washhouse?A.SatisfiedB.GeneralC.Dissatisfied10. Do you satisfied the shop in the Xuezhi building?A.SatisfiedB.GeneralC.Dissatisfied11. Does the Xuezhi building surrounding environment noisy?A.YesB.GeneralC.No12. Does the transportation convenient?A.YesB.GeneralC.NoPlease give some advices_____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________8.2 Appendix B8.2 Appendix C8.2 Appendix D8.2 Appendix E。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Appendix C. Important Licenses and NoticesThe use and distribution of open source and free software is subject to a few well-known and widely advertised licenses, as we discussed in Chapter 1. There are, nevertheless, some issues surrounding Linux's licensing that keep resurfacing and seem to cause confusion. These uncertainties revolve around the fact that the Linux kernel is itself distributed under the terms of the GNU GPL.Over time, Linus Torvalds and other kernel developers have helped shed some light on the limits and reaches of the kernel's licensing. This appendix presents some of the messages published by Linus and other kernel developers regarding three aspects of the kernel's licensing: the use of non-GPL applications, the use of binary-only modules, and the general licensing issues surrounding the kernel's source code.C.1 Exclusion of User-Space Applications from Kernel's GPLTo avoid any confusion regarding the status of applications running on top of the Linux kernel, Linus Torvalds added the following preamble to the kernel's license:NOTE! This copyright does *not* cover user programs that use kernelservices by normal system calls - this is merely considered normal useof the kernel, and does *not* fall under the heading of "derived work".Also note that the GPL below is copyrighted by the Free SoftwareFoundation, but the instance of code that it refers to (the Linuxkernel) is copyrighted by me and others who actually wrote it.Also note that the only valid version of the GPL as far as the kernelis concerned is _this_ license (ie v2), unless explicitly otherwisestated.Linus TorvaldsC.2 Notices on Binary Kernel ModulesRecurring controversy has erupted over loadable kernel modules not distributed under the terms of the GPL. Many companies already ship such binary modules and many industry players contend that such modules are permitted. Yet many Linux kernel developers have come out rather strongly against this practice. Here are some messages sent to the Linux kernel mailing list by Linus Torvalds and Alan Cox that provide some insight as to the use of binary modules.C.2.1 First Posting by Linus in Kernel Interface ThreadFrom: torvalds@ (Linus Torvalds)Subject: Re: Kernel interface changes (was Re: cdrecord problems on Date: 1999-02-05 7:13:23In article <36bab0c7.394438@>,John Alvord <jalvo@> wrote:>On Thu, 4 Feb 1999 22:37:06 -0500 (EST), "Theodore Y. Ts'o"><tytso@> wrote:>>>>And as a result, I've seen more than a few MIT users decide to give up >>on Linux and move over to NetBSD. I think this is bad, and I'm hoping >>we can take just a little bit more care in the 2.2 series than we did in >>the 2.0 series. Is that really too much to ask?Yes. I think it is. I will strive for binary compatibility for modules, but I _expect_ that it will be broken. It's just too easy to have to make changes that break binary-only modules, and I have toolittle incentive to try to avoid it.If people feel this is a problem, I see a few alternatives:- don't use stuff with binary-only modules. Just say no.- work hard at making a source-version of the thing available (itdoesn't have to be under the GPL if it's a module, but it has to beavailable as source so that it can be recompiled).- don't upgrade- drop Linux>I suggest we treat binary compatibility problems as bugs which need to>be resolved during the 2.2 lifetime. Even with all care, some changes>will occur because of mistakes... if we cure them, there will be>limited impact to users.It's often not mistakes. Things sometimes have to change, and I personally do not care for binary-only modules enough to even care. If people want to use Linux, they have to live with this. In 2.2.x, the basics may be stable enough that maybe the binary module interface won't actually change. I don't know. That would be good, but if it is not to be, then it is not to be.I _allow_ binary-only modules. I allow them because I think that sometimes I cannot morally require people to make sources available to projects like AFS where those sources existed before Linux. HOWEVER,that does not mean that I have to _like_ AFS as a binary-only module.Quite frankly, I hope AFS dies a slow and painful death with people migrating to better alternatives (coda, whatever). Or that somebody makes an AFS client available in source form, either as a clone or through the original people.As it is, what has AFS done for me lately? Nothing. So why should I care?LinusC.2.2 Second Posting by Linus in Kernel Interface ThreadFrom: torvalds@ (Linus Torvalds)Subject: Re: Kernel interface changes (was Re: cdrecord problems on Date: 1999-02-07 8:15:24In article <79g5bu$spd$1@>,H. Peter Anvin <hpa@> wrote:>>* Linus Torvalds has no interest whatsoever in developing such a> plug-in ABI. Someone else is welcome to do it.No, it's even more than that.I _refuse_ to even consider tying my hands over some binary-only module.Hannu Savolainen tried to add some layering to make the sound modules more "portable" among Linux kernel versions, and I disliked it for two reasons:- extra layers decrease readability, and sometimes make for performance problems. The readability thing is actually the larger beef I hadwith this: I just don't want to see drivers start using some strange wrapper format that has absolutely nothing to do with how they work.- I _want_ people to expect that interfaces change. I _want_ people to know that binary-only modules cannot be used from release to release.I want people to be really really REALLY aware of the fact that when they use a binary-only module, they tie their hands.Note that the second point is mainly psychological, but it's by far the most important one.Basically, I want people to know that when they use binary-only modules,it's THEIR problem. I want people to know that in their bones, and Iwant it shouted out from the rooftops. I want people to wake up in acold sweat every once in a while if they use binary-only modules.Why? Because I'm a prick, and I want people to suffer? No.Because I _know_ that I will eventually make changes that break modules. And I want people to expect them, and I never EVER want to see an emailin my mailbox that says "Damn you, Linus, I used this binary module forover two years, and it worked perfectly across 150 kernel releases, and Linux-5.6.71 broke it, and you had better fix your kernel".See?I refuse to be at the mercy of any binary-only module. And that's why I refuse to care about them - not because of any really technical reasons,not because I'm a callous bastard, but because I refuse to tie my hands behind my back and hear somebody say "Bend Over, Boy, Because You HaveIt Coming To You".I allow binary-only modules, but I want people to know that they are_only_ ever expected to work on the one version of the kernel that theywere compiled for. Anything else is just a very nice unexpected bonus ifit happens to work.And THAT, my friend, is why when somebody complains about AFS, I tellthem to go screw themselves, and not come complaining to me but complainto the AFS boys and girls. And why I'm not very interested in changing that.LinusC.2.3 Post by Alan Cox in Kernel Hooks ThreadThis is a response to a posting by Theodore Ts'O.From: Alan Cox <alan@>Subject: Re: [ANNOUNCE] Generalised Kernel Hooks Interface (GKHI)Date: 2000-11-09 14:26:33> Actually, he's been quite specific. It's ok to have binary modules as> long as they conform to the interface defined in /proc/ksyms.What is completely unclear is if he has the authority to say that given thatthere is code from other people including the FSF merged into the tree.I've taken to telling folks who ask about binary modules to talk to their legal department. The whole question is simply to complicated for anyone else towork on.AlanC.2.4 First Post by Linus in Security Hooks License ThreadFrom: Linus Torvalds <torvalds@>Subject: Re: [PATCH] make LSM register functions GPLonly exportsDate: 2002-10-17 17:08:19Note that if this fight ends up being a major issue, I'm just going toremove LSM and let the security vendors do their own thing. So far- I have not seen a lot of actual usage of the hooks- seen a number of people who still worry that the hooks degradeperformance in critical areas- the worry that people use it for non-GPL'd modules is apparently real,considering Crispin's reply.I will re-iterate my stance on the GPL and kernel modules:There is NOTHING in the kernel license that allows modules to benon-GPL'd.The _only_ thing that allows for non-GPL modules is copyright law, andin particular the "derived work" issue. A vendor who distributes non-GPLmodules is _not_ protected by the module interface per se, and shouldfeel very confident that they can show in a court of law that the codeis not derived.The module interface has NEVER been documented or meant to be a GPLbarrier. The COPYING clearly states that the system call layer is such abarrier, so if you do your work in user land you're not in any waybeholden to the GPL. The module interfaces are not system calls: thereare system calls used to _install_ them, but the actual interfaces arenot.The original binary-only modules were for things that were pre-existingworks of code, ie drivers and filesystems ported from other operatingsystems, which thus could clearly be argued to not be derived works, andthe original limited export table also acted somewhat as a barrier toshow a level of distance.In short, Crispin: I'm going to apply the patch, and if you as a copyright holder of that file disagree, I will simply remove all of he LSM code from the kernel. I think it's very clear that a LSM module is a derived work, and thus copyright law and the GPL are not in any way unclear about it.If people think they can avoid the GPL by using function pointers, they are WRONG. And they have always been wrong.LinusC.2.5 Second Post by Linus in Security Hooks License ThreadFrom: Linus Torvalds <torvalds@>Subject: Re: [PATCH] make LSM register functions GPLonly exportsDate: 2002-10-17 17:25:12On Thu, 17 Oct 2002, Linus Torvalds wrote:>> If people think they can avoid the GPL by using function pointers, they > are WRONG. And they have always been wrong.Side note: it should be noted that legally the GPLONLY note is nothing but a strong hint and has nothing to do with the license (and only mattersfor the _enforcement_ of said license). The fact is:- the kernel copyright requires the GPL for derived works anyway.- if a company feels confident that they can prove in court that theirmodule is not a derived work, the GPL doesn't matter _anyway_,since a copyright license at that point is meaningless and wouldn'tcover the work regardless of whether we say it is GPLONLY or not.(In other words: for provably non-derived works, whatever kernellicense we choose is totally irrelevant)So the GPLONLY is really a big red warning flag: "Danger, Will Robinson".It doesn't have any real legal effect on the meaning of the licenseitself, except in the sense that it's another way to inform users aboutthe copyright license (think of it as a "click through" issue - GPLONLY forces you to "click through" the fact that the kernel is under the GPLand thus derived works have to be too).Clearly "click through" _has_ been considered a legally meaningful thing,in that it voids the argument that somebody wasn't aware of the license.It doesn't change what you can or cannot do, but it has some meaning forwhether it could be wilful infringement or just honest mistake.LinusC.3 Legal Clarifications About the Kernel by Linus TorvaldsThis is a fairly long explanation by Linus Torvalds regarding the kernel's licensing and how this licensing applies to foreign code:Feel free to post/add this. I wrote it some time ago for a corporatelawyer who wondered what the "GPL exception" was. Names and companiesremoved not because I think they are ashamed, but because I don't wantpeople to read too much into them.Linus-----Date: Fri, 19 Oct 2001 13:16:45 -0700 (PDT)From: Linus Torvalds <torvalds@>To: Xxxx Xxxxxx <xxxxx@>Subject: Re: GPL, Richard Stallman, and the Linux kernel[ This is not, of course, a legal document, but if you want to forward itto anybody else, feel free to do so. And if you want to argue legalpoints with me or point somehting out, I'm always interested. To apoint ;-]On Fri, 19 Oct 2001, Xxxx Xxxxxx wrote:>> I've been exchanging e-mail with Richard Stallman for a couple of> weeks about the finer points of the GPL.I feel your pain.> I've have spent time pouring through mailing list archives, usenet,> and web search engines to find out what's already been covered about> your statement of allowing dynamically loaded kernel modules with> proprietary code to co-exist with the Linux kernel. So far I've> been unable to find anything beyond vague statements attributed to> you. If these issues are addressed somewhere already, please refer> me.Well, it really boils down to the equivalent of "_all_ derived modules have to be GPL'd". An external module doesn't really change the GPL inthat respect.There are (mainly historical) examples of UNIX device drivers and some UNIX filesystems that were pre-existing pieces of work, and which hadfairly well-defined and clear interfaces and that I personally could not really consider any kind of "derived work" at all, and that were thus acceptable. The clearest example of this is probably the AFS (the Andrew Filesystem), but there have been various device drivers ported from SCO too.> Issue #1> = = = = = = = => Currently the GPL version 2 license is the only license covering the> Linux kernel. I cannot find any alternative license explaining the> loadable kernel module exception which makes your position difficult> to legally analyze.>> There is a note at the top of /pub/linux/kernel/COPYING, > but that states "user programs" which would clearly not apply to> kernel modules.>> Could you clarify in writing what the exception precisely states?Well, there really is no exception. However, copyright law obviously hinges on the definition of "derived work", and as such anything can always be argued on that point.I personally consider anything a "derived work" that needs special hooksin the kernel to function with Linux (ie it is _not_ acceptable to make a small piece of GPL-code as a hook for the larger piece), as that obviously implies that the bigger module needs "help" from the main kernel.Similarly, I consider anything that has intimate knowledge about kernel internals to be a derived work.What is left in the gray area tends to be clearly separate modules: code that had a life outside Linux from the beginning, and that do something self-containted that doesn't really have any impact on the rest of the kernel. A device driver that was originally written for something else, and that doesn't need any but the standard UNIX read/write kind ofinterfaces, for example.> Issue #2> = = = = = = = => I've found statements attributed to you that you think only 10% of> the code in the current kernel was written by you. By not being the> sole copyright holder of the Linux kernel, a stated exception to> the GPL seems invalid unless all kernel copyright holders agreed on> this exception. How does the exception cover GPL'd kernel code not> written by you? Has everyone contributing to the kernel forfeited> their copyright to you or agreed with the exception?Well, see above about the lack of exception, and about the fundamental gray area in _any_ copyright issue. The "derived work" issue is obviously a gray area, and I know lawyers don't like them. Crazy people (even judges) have, as we know, claimed that even obvious spoofs of a work that contain nothing of the original work itself, can be ruled to be "derived".I don't hold views that extreme, but at the same time I do consider a module written for Linux and using kernel infrastructures to get its work done, even if not actually copying any existing Linux code, to be a derived work by default. You'd have to have a strong case to _not_ consider your code a derived work..> Issue #3> = = = = = = = => This issue is related to issue #1. Exactly what is covered by the> exception? For example, all code shipped with the Linux kernel> archive and typically installed under /usr/src/linux, all code under> /usr/src/linux except /usr/src/linux/drivers, or just the code in> the /usr/src/linux/kernel directory?See above, and I think you'll see my point.The "user program" exception is not an exception at all, for example, it's just a more clearly stated limitation on the "derived work" issue. If you use standard UNIX system calls (with accepted Linux extensions), your program obviously doesn't "derive" from the kernel itself.Whenever you link into the kernel, either directly or through a module, the case is just a _lot_ more muddy. But as stated, by default it's obviously derived - the very fact that you _need_ to do something as fundamental as linking against the kernel very much argues that your module is not a stand-alone thing, regardless of where the module sourcecode itself has come from.> Issue #4> = = = = = = = => This last issue is not so much a issue for the Linux kernel> exception, but a request for comment.>> Richard and I both agree that a "plug-in" and a "dynamically> loaded kernel module" are effectively the same under the GPL.Agreed.The Linux kernel modules had (a long time ago), a more limited interface, and not very many functions were actually exported. So five or six years ago, we could believably claim that "if you only use these N interfaces that are exported from the standard kernel, you've kind of implicitly proven that you do not need the kernel infrastructure".That was never really documented either (more of a guideline for me and others when we looked at the "derived work" issue), and as modules were more-and-more used not for external stuff, but just for dynamic loading of standard linux modules that were distributed as part of the kernel anyway, the "limited interfaces" argument is no longer a very good guideline for "derived work".So these days, we export many internal interfaces, not because we don't think that they would "taint" the linker, but simply because it's useful to do dynamic run-time loading of modules even with standard kernel modules that _are_ supposed to know a lot about kernel internals, and are obviously "derived works"..> However we disagree that a plug-in for a GPL'd program falls> under the GPL as asserted in the GPL FAQ found in the answer:> /licenses/gpl-faq.html#GPLAndPlugins.I think you really just disagree on what is derived, and what is not. Richard is very extreme: _anything_ that links is derived, regardless of what the arguments against it are. I'm less extreme, and I bet you're even less so (at least you might like to argue so).> My assertion is that plug-ins are written to an interface, not a> program. Since interfaces are not GPL'd, a plug-in cannot be GPL'd> until the plug-in and program are placed together and run. That is> done by the end user, not the plug-in creator.I agree, but also disrespectfully disagree ;)It's an issue of what a "plug-in" is - is it a way for the program to internally load more modules as it needs them, or is it _meant_ to be a public, published interface.For example, the "system call" interface could be considered a "plug-in interface", and running a user mode program under Linux could easily be construed as running a "plung-in" for the Linux kernel. No?And there, I obviously absolutely agree with you 100%: the interface is published, and it's _meant_ for external and independent users. It's an interface that we go to great lengths to preserve as well as we can, andit's an interface that is designed to be independent of kernel versions.But maybe somebody wrote his program with the intention to dynamically load "actors" as they were needed, as a way to maintain a good modularity, and to try to keep the problem spaces well-defined. In that case, the "plug-in" may technically follow all the same rules as the system call interface, even though the author doesn't intend it that way.So I think it's to a large degree a matter of intent, but it could arguably also be considered a matter of stability and documentation (ie "require recompilation of the plug-in between version changes" would tend to imply that it's an internal interface, while "documented binary compatibility across many releases" implies a more stable external interface, and less of a derived work)Does that make sense to you?> I asked Richard to comment on several scenarios involving plug-ins> explain whether or not they were in violation of the GPL. So far he> as only addressed one and has effectively admitted a hole. This is> the one I asked that he's responded to:> [A] non-GPL'd plug-in writer writes a plug-in for a non-GPL'd> program. Another author writes a GPL'd program making the> first author's plug-ins compatible with his program. Are now> the plug-in author's plug-ins now retroactively required to be> GPL'd?>> His response:> No, because the plug-in was not written to extend this program.>> I find it suspicious that whether or not the GPL would apply to the> plug-in depends on the mindset of the author.The above makes no sense if you think of it as a "plug in" issue, but it makes sense if you think of it as a "derived work" issue, along with taking "intent" into account.I know lawyers tend to not like the notion of "intent", because it brings in another whole range of gray areas, but it's obviously a legal reality.Ok, enough blathering from me. I'd just like to finish off with a few comments, just to clarify my personal stand:- I'm obviously not the only copyright holder of Linux, and I did so on purpose for several reasons. One reason is just because I hate thepaperwork and other cr*p that goes along with copyright assignments.Another is that I don't much like copyright assignments at all: theauthor is the author, and he may be bound by my requirement for GPL,but that doesn't mean that he should give his copyright to me.A third reason, and the most relevant reason here, is that I wantpeople to _know_ that I cannot control the sources. I can write you a note to say that "for use XXX, I do not consider module YYY to be aderived work of my kernel", but that would not really matter that much. Any other Linux copyright holder might still sue you.This third reason is what makes people who otherwise might not trust me realize that I cannot screw people over. I am bound by the sameagreement that I require of everybody else, and the only special status I really have is a totally non-legal issue: people trust me.(Yes, I realize that I probably would end up having more legal status than most, even apart from the fact that I still am the largest single copyright holder, if only because of appearances)- I don't really care about copyright law itself. What I care about is my own morals. Whether I'd ever sue somebody or not (and quite frankly,it's the last thing I ever want to do - if I never end up talking tolawyers in a professional context, I'll be perfectly happy. Nodisrespect intended) will be entirely up to whether I consider whatpeople do to me "moral" or not. Which is why intent matters to me alot - both the intent of the person/corporation doign the infringement, _and_ the intent of me and others in issues like the module exportinterface.Another way of putting this: I don't care about "legal loopholes" and word-wrangling.- Finally: I don't trust the FSF. I like the GPL a lot - although notnecessarily as a legal piece of paper, but more as an intent. Whichexplains why, if you've looked at the Linux COPYING file, you may have noticed the explicit comment about "only _this_ particular version of the GPL covers the kernel by default".That's because I agree with the GPL as-is, but I do not agree with the FSF on many other matters. I don't like software patents much, forexample, but I do not want the code I write to be used as a weaponagainst companies that have them. The FSF has long been discussing and is drafting the "next generation" GPL, and they generally suggest that people using the GPL should say "v2 or at your choice any laterversion".Linux doesn't do that. The Linux kernel is v2 ONLY, apart from a fewfiles where the author put in the FSF extension (and see above aboutcopyright assignments why I would never remove such an extension).The "v2 only" issue might change some day, but only after all documented copyright holders agree on it, and only after we've seen what the FSF suggests. From what I've seen so far from the FSF drafts, we're not likely to change our v2-only stance, but there might of course be legal reasons why we'd have to do something like it (ie somebody challenging the GPLv2in court, and part of it to be found unenforceable or similar would obviously mean that we'd have to reconsider the license).LinusPS. Historically, binary-only modules have not worked well under Linux, quite regardless of any copyright issues. The kernel just develops too quickly for binary modules to work well, and nobody really supports them. Companies like RedHat etc tend to refuse to have anything to do with binary modules, because if something goes wrong there is nothing they can do about it. So I just wanted to let you know that the _legal_ issue is just the beginning. Even though you probably don't personally care ;)Colophon (书籍的末页, 版本记录)Our look is the result of reader comments, our own experimentation, and feedback from distribution channels. Distinctive covers complement our distinctive approach to technical topics, breathing personality and life into potentially dry subjects.Linley Dolby was the production editor and copyeditor for Building Embedded Linux Systems. Claire Cloutier, Phil Dangler, Matt Hutchinson, and Darren Kelly provided quality control. Derek Di Matteo and Jamie Peppard provided production assistance. Lucie Haskins wrote the index.The image on the cover of Building Embedded Linux Systems is a windmill. Emma Colby designed the cover of this book, based on a series design by Hanna Dyer and Edie Freedman. The cover image is a 19th-century engraving from the Dover Pictorial Archive. Emma Colby produced the cover layout with QuarkXPress 4.1 using Adobe's ITC Garamond font.Bret Kerr designed the interior layout, based on a series design by David Futato. The chapter opening images are from the Dover Pictorial Archive, Marvels of the New West: A Vivid Portrayal of the Stupendous Marvels in the Vast Wonderland West of the Missouri River, by William Thayer (The Henry Bill Publishing Co., 1888), and The Pioneer History of America: A Popular Account of the Heroes and Adventures, by Augustus Lynch Mason, A.M. (The Jones Brothers Publishing Company, 1884). This book was converted by Joe Wizda to FrameMaker 5.5.6 with a format conversion tool created by Erik Ray, Jason McIntosh, Neil Walls, and Mike Sierra that uses Perl and XML technologies. The text font is Linotype Birka; the heading font is Adobe Myriad Condensed; and the code font is LucasFont's TheSans Mono Condensed. The illustrations that appear in the book were produced by Robert Romano and Jessamyn Read using Macromedia FreeHand 9 and Adobe Photoshop 6. The tip and warning icons were drawn by Christopher Bing.The online edition of this book was created by the Safari production group (John Chodacki, Becki Maisch, and Madeleine Newell) using a set of Frame-to-XML conversion and cleanup tools written and maintained by Erik Ray, Benn Salter, John Chodacki, and Jeff Liggett.。