Search results
1 – 10 of over 2000As [Alexander Graham] Bell raced to perfect his telephone, he was also writing up specifications to be filed with the United States Patent Office in Washington. On March 7, 1876…
Abstract
As [Alexander Graham] Bell raced to perfect his telephone, he was also writing up specifications to be filed with the United States Patent Office in Washington. On March 7, 1876, he was issued patent number 174,465. Meanwhile, Bell had discovered that a wire vibrated by the voice while partially immersed in a conducting liquid, like mercury, could be made to vary its resistance and produce an undulating current. In other words, human speech could be transmitted over a wire. On March 10, 1876, as he and Mr. Watson set out to test this finding, Bell knocked over what they were using as a transmitting liquid – battery acid. Reacting to the spilled acid, Mr. Bell is alleged to have shouted, “Mr. Watson, come here. I want you!” (PBS, 2003)
Nilanjan Basu, Imants Paeglis and Mohammad Rahnamaei
We examine the influence of ownership structure on a blockholder’s power in a firm. We first describe the presence and ownership stakes of blockholders in a comprehensive sample…
Abstract
We examine the influence of ownership structure on a blockholder’s power in a firm. We first describe the presence and ownership stakes of blockholders in a comprehensive sample of US firms. We develop a measure of the influence of the ownership structure on a blockholder’s power and show that an average blockholder loses 12% of her potential power due to the presence and size of the ownership stakes of other blockholders. Further, the influence of ownership structure varies systematically with a blockholder’s rank and identity, with the second and nonfamily manager blockholders experiencing the largest loss of power.
Details
Keywords
The chapter offers complete details of the latest SGL version particularly suitable for dealing with large security systems and emerging crisis situations. It describes main types…
Abstract
The chapter offers complete details of the latest SGL version particularly suitable for dealing with large security systems and emerging crisis situations. It describes main types of constants representing information, physical matter or both and five very different and specific types of variables operating in fully distributed spaces and even being mobile themselves when serving spreading algorithms. Also given full repertoire of the language operations, called rules, which can be arbitrarily nested and carry different navigation, creation, processing, assignment, control, verification, context, exchange, transference, echoing, timing and other loads. The rules equally operate with local and remote values, process both, matter and distributed networked knowledge, and can express active graph-based patterns navigating, matching, conquering and changing distributed environments. Elementary programming examples in SGL are also provided.