source
stringlengths 32
199
| text
stringlengths 26
3k
|
---|---|
https://en.wikipedia.org/wiki/KWNL-CD
|
KWNL-CD (channel 14) is a low-power, Class A television station licensed to Bentonville, Arkansas, United States, affiliated with the Spanish-language Univision network. It is owned by Pinnacle Media alongside KFDF-CD and KQRY-LD. KWNL-CD's transmitter is located on South 56th Street in Springdale, Arkansas.
KXUN-LD (channel 48) in Fort Smith operates as a translator of KWNL-CD; this station's transmitter is located on Pernot Road in Van Buren.
History
The call letters were changed from KBBL-CA to KWNL-CA on July 6, 2006. On July 14, 2006, the KBBL-CA call letters reappeared on Channel 56 in Springfield, Missouri, curiously the namesake of the Simpsons' fictional hometown. However, that station is a translator of KWBM, Equity's MyNetworkTV station in that market, and likely not inspired by the KBBL-TV of The Simpsons.
At one point, KWNL aired local newscasts; they were produced out of Little Rock, Arkansas, with reports produced in Fort Smith. The newscasts were canceled in June 2008, after then-owner Equity Media Holdings instituted a company wide suspension of news programs.
After failing to find a buyer at a bankruptcy auction, KWNL was sold to Pinnacle Media in August 2009 (after having initially been included in Silver Point Finance's acquisition on June 2 of several Equity stations), with Pinnacle assuming control under a local marketing agreement (LMA) on August 5.
Technical information
Subchannels
The station's digital signal is multiplexed:
References
External links
WNL-CD
Equity Media Holdings
Univision network affiliates
Television channels and stations established in 1989
WNL-CD
WNL
|
https://en.wikipedia.org/wiki/M-Tel%20Masters
|
Mtel Masters was an annual super-GM chess tournament held between 2005 and 2009 in Sofia, Bulgaria, sponsored and organized by the Bulgarian mobile network operator, M-Tel. The tournament was held as a double round-robin at the five-star Grand Hotel Sofia.
Tournament winners
Editions
2005
The first edition of the tournament took place between 11 and 22 May 2005 as part of M-Tel's tenth anniversary celebrations and with the participation of top chess players such as Viswanathan Anand, Veselin Topalov, Vladimir Kramnik, Michael Adams, Judit Polgár and Ruslan Ponomariov. M-Tel Masters 2005 was classified in FIDE's Category 20 and was named the strongest tournament of 2005 according to the average Elo rating of the participants of 2744. The winner of the tournament was the Bulgarian Veselin Topalov, with the award being conferred by President Georgi Parvanov.
{| class="wikitable" style="text-align: center"
|+1st M-Tel Masters, 12–22 May 2005, Sofia, Bulgaria, Category XX (2747)
! !! Player !! Rating !! 1 !! 2 !! 3 !! 4 !! 5 !! 6 !! Points !! TPR
|-
|-style="background:#ccffcc;"
| 1 || align=left | || 2778 || || ½ 1 || ½ ½ || 0 1 || ½ 1 || ½ 1 || 6½ || 2850
|-
| 2 || align=left | || 2785 || ½ 0 || || ½ ½ || ½ ½ || ½ 1 || ½ 1 || 5½ || 2775
|-
| 3 || align=left | || 2732 || ½ ½ || ½ ½ || || ½ ½ || 0 ½ || ½ 1 || 5 || 2749
|-
| 4 || align=left | || 2695 || 1 0 || ½ ½ || ½ ½ || || 0 1 || ½ ½ || 5 || 2757
|-
| 5 || align=left | || 2753 || ½ 0 || ½ 0 || 1 ½ || 1 0 || || 0 ½ || 4 || 2673
|-
| 6 || align=left | || 2737 || ½ 0 || ½ 0 || ½ 0 || ½ ½ || 1 ½ || || 4 || 2676
|}
2006
The 2006 tournament took place between 10 May and 21 May and was attended by Veselin Topalov, Viswanathan Anand, Ruslan Ponomariov, Peter Svidler, Étienne Bacrot and Gata Kamsky. Brazilian writer Paulo Coelho played the token initial move of the 2006 tournament, which was officially opened by the President of Bulgaria, Georgi Parvanov.
Topalov won the tournament for the second time after a decisive comeback from a somewhat hesitant start. He recorded four consecutive wins in the final rounds to clinch the M-Tel Masters 2006 first place with 6½ points, also defeating his main rival Gata Kamsky in the penultimate round.
{| class="wikitable" style="text-align: center"
|+2nd M-Tel Masters, 11–21 May 2006, Sofia, Bulgaria, Category XX (2745)
! !! Player !! Rating !! 1 !! 2 !! 3 !! 4 !! 5 !! 6 !! Points !! Wins !! TPR
|-
|-style="background:#ccffcc;"
| 1 || align=left | || 2804 || || 1 1 || 0 1 || ½ 0 || ½ 1 || ½ 1 || 6½ || || 2842
|-
| 2 || align=left | || 2671 || 0 0 || || 1 ½ || 1 ½ || ½ 1 || 1 ½ || 6 || || 2831
|-
| 3 || align=left | || 2803 || 1 0 || 0 ½ || || ½ ½ || 1 ½ || 1 ½ || 5½ || || 2768
|-
| 4 || align=left | || 2743 || ½ 1 || 0 ½ || ½ ½ || || 1 0 || ½ ½ || 5 || || 2744
|-
| 5 || align=left | || 2738 || ½ 0 || ½ 0 || 0 ½ || 0 1 || || ½ ½ || 3½ || 1 || 2635
|-
| 6 || align=left | || 2708 || ½ 0 || 0 ½ || 0 ½ || ½ ½ || ½ ½ || || 3½ || 0 || 2641
|}
20
|
https://en.wikipedia.org/wiki/Genevestigator
|
Genevestigator is an application consisting of a gene expression database and tools to analyse the data. It exists in two versions, biomedical and plant, depending on the species of the underlying microarray and RNAseq as well as single-cell RNA-sequencing data. It was started in January 2004 by scientists from ETH Zurich and is currently developed and commercialized by Nebion AG.
Researchers and scientists from academia and industry use it to identify, characterize and validate novel drug targets and biomarkers, identify appropriate research models and in general to understand how gene expression changes with different treatments.
Gene expression database
The Genevestigator database comprises transciptomic data from numerous public repositories including GEO, Array Express and renowned cancer research projects as TCGA. Depending on the license agreement, it may also contain data from private gene expression studies. All data are manually curated, quality-controlled and enriched for sample and experiment descriptions derived from corresponding scientific publications.
The number of species from where the samples are derived is constantly increasing. Currently, the biomedical version contains data from human, mouse, and rat used in biomedical research. Gene expression studies are from various research areas including oncology, immunology, neurology, dermatology and cardiovascular diseases. Samples comprise tissue biopsies and cell lines.
The plant version (no longer available) contained both, widely used model species such as arabidopsis and medicago as well as major crop species such as maize, rice, wheat and soybean. After the acquisition of Nebion AG by Immunai Inc. in July 2021, plant data began to be phased out as the biotech company prioritized their focus on biopharma data. As of 2023, the plant data is being maintained on a separate server for remaining users with a license to the plant version of Genevestigator.
Gene expression tools
More than 60,000 scientists from academia and industry use Genevestigator for their work in molecular biology, toxicogenomics, biomarker discovery and target validation. The original scientific publication has been cited over 3,500 times.
The analysis tools are divided into three major sets:
CONDITION SEARCH tools: find conditions such as a tissue, disease, treatment or genetic background that regulate the gene(s) of interest
GENE SEARCH tools: find genes that are specifically expressed in the condition(s) of interest
SIMILARITY SEARCH tools: find genes or conditions that show a similar gene expression pattern
See also
Spatiotemporal gene expression
References
Prasad A, Suresh Kumar S, Dessimoz C, Bleuler S, Laule O, Hruz T, Gruissem W, and P Zimmermann (2013) Global regulatory architecture of human, mouse and rat tissue transcriptomes. BMC Genomics 2013, 14:716.
Hruz T, Wyss M, Lucas C, Laule O, von Rohr P, Zimmermann P, and S Bleuler (2013) A Multilevel Gamma-Clustering Layout Algorithm for V
|
https://en.wikipedia.org/wiki/Luca%20Cardelli
|
Luca Andrea Cardelli is an Italian computer scientist who is a research professor at the University of Oxford, UK. Cardelli is well known for his research in type theory and operational semantics. Among other contributions, in programming languages, he helped design the language Modula-3, implemented the first compiler for the (non-pure) functional language ML, defined the concept of typeful programming, and helped develop the experimental language Polyphonic C#.
Education
He was born in Montecatini Terme, Italy. He attended the University of Pisa before receiving his PhD from the University of Edinburgh in 1982 for research supervised by Gordon Plotkin.
Career and research
Before joining the University of Oxford in 2014, and Microsoft Research in Cambridge, UK in 1997, he worked for Bell Labs and Digital Equipment Corporation, and contributed to Unix software including vismon.
Awards and honours
In 2004 he was inducted as a Fellow of the Association for Computing Machinery. He was elected a Fellow of the Royal Society (FRS) in 2005. In 2007, Cardelli was awarded the Senior AITO Dahl–Nygaard Prize named for Ole-Johan Dahl and Kristen Nygaard.
References
Alumni of the University of Edinburgh
Italian computer scientists
Year of birth missing (living people)
Living people
Fellows of the Association for Computing Machinery
Programming language researchers
Fellows of the Royal Society
DNA nanotechnology people
Dahl–Nygaard Prize
|
https://en.wikipedia.org/wiki/Argentine%20Interconnection%20System
|
The Argentine Interconnection System (Spanish: Sistema Argentino de Interconexión, SADI) is a wide area synchronous grid that links the regional networks of all Argentinian provinces, with the exception of Tierra del Fuego. It is also connected to the power grids of several neighboring countries.
The network is long, of which represent 500 kV power lines. These power lines are operated by Transener.
History
The interconnection system began by including transmission lines and substations built by AyEE, HIDRONOR and others constructed by private initiative. Those lines primarily linked the generation centers distributed along the country with the major consumption center in the Greater Buenos Aires area.
In 1947, the General Direction of Water and Electric Power was created by presidential decree, with the task of planning, construction and operation of electrical power plants, transmission lines and substations.
In 1960, Act 15336 (Electric Energy Law) is approved, recognizing a "National Interconnection Network" that would integrate all the country's regional networks. This would change the jurisdiction of those networks from a provincial to a national control. This new national network would be controlled by a new organism to be created, the Federal Council of Electric Power, under the national Energy & Fuel Secretary structure.
This new organism would have representatives of the central government as well as the provinces and the City of Buenos Aires, intending to unify criteria and not only satisfy the interests of Buenos Aires.
In 1991, the State Reform law brought privatization for the energy companies, creating a new regulatory framework for the energy and utilities sector. This would be included in the 24065 Act, which created the Wholesale Energy Market and the National Electricity Regulatory Entity (ENRE). It also creates a new public entity to regulate the Interconnection, the National Cargoes Dispatch (DNDC), which would incorporate in 1002 in the form of a sociedad anónima (a private corporation) with the name Compañía Administradora del Mercado Mayorista Eléctrico Sociedad Anónima (CAMMESA).
Main figures
According to the 2019 annual report by CAMMESA, that year the network showed the following figures:
International links
The system connects to several neighboring countries:
Argentina–Chile
Interandes: TermoAndes – Chilgener (from 2001 on, AES TermoAndes)
Paraguay–Argentina
Carlos Antonio López (Paraguay) – Eldorado (Argentina). 132 kV
Guarambaré (Paraguay) – Clorinda (Argentina). 220 kV
Argentina–Uruguay
Salto Grande Dam (1.890 MW power station)
Argentina–Brasil
Paso de los Libres – Uruguaiana (50 MW line)
Rincón – Garabi – Ita I
Rincón – Garabi – Ita II
2019 Blackout
On 16 June 2019, a large-scale power outage struck most of Argentina, all of Uruguay, and parts of Paraguay. It was caused by an operational misbehavior from Transener, a transmission lines operator in Argentina.
A short circuit which lowe
|
https://en.wikipedia.org/wiki/Connect%3ADirect
|
Connect:Direct—originally named Network Data Mover (NDM)— is a computer software product that transfers files between mainframe computers and/or midrange computers. It was developed for mainframes, with other platforms being added as the product grew. NDM was renamed to Connect:Direct in 1993, following the acquisition of Systems Center, Inc. by Sterling Software. In 1996, Sterling Software executed a public spinoff of a new entity called Sterling Commerce, which consisted of the Communications Software Group (the business unit responsible for marketing the Connect:Direct product and other file transfer products sourced from the pre-1993 Sterling Software (e.g. Connect:Mailbox)) and the Sterling EDI Network business. In 2000, SBC Communications acquired Sterling Commerce and held it until 2010. AT&T merged with SBC effective November 2005. In 2010, IBM completed the purchase of Sterling Commerce from AT&T.
Technology
Traditionally, Sterling Connect:Direct used IBM's Systems Network Architecture (SNA) via dedicated private lines between the parties involved to transfer the data. In the early 1990s TCP/IP support was added. Connect:Direct's primary advantage over FTP was that it made file transfers routine and reliable.
IBM Sterling Connect:Direct is used within the financial services industry, government agencies and other large organizations that have multiple computing platforms: mainframes, midrange, Linux or Windows systems. In terms of speed, Connect:Direct typically performs slightly faster than FTP, reaching the maximum that the interconnecting link can support. If CPU cycles are available, Connect:Direct has several compression modes that can greatly enhance the throughput of the transfer, but care must be exercised in multi-processing environments as Connect:Direct can consume large amounts of processing cycles, impacting other workloads.
Connect:Direct originally did not support encrypted and secure data transfers, however an add-on, Connect:Direct Secure+, provided such support. Encryption can be accomplished with Transport Layer Security using SSL, TLS or the Station-to-Station protocol (STS). Since being acquired by IBM, the add-on has been folded into the base product, so it always supports the latest encryption and security standards.
Connect:Direct file transfers can be done in two formats: Binary mode (where no translation occurs) or in a mode where translation is used to convert an ASCII file to EBCDIC as it is moved to a mainframe or vice versa. These conversions are handled automatically based on the local systems, which is a significant concern with other file transfer software when moving between distributed and mainframe systems.
History
In the mid-1980s, several employees of UCC (University Computing Company subsequently renamed to Uccel Corporation) left to form "The System Center, Inc." in Dallas, Texas. The new company was going to develop a mainframe systems management tool. While researching the require
|
https://en.wikipedia.org/wiki/Meta-learning%20%28computer%20science%29
|
Meta learning
is a subfield of machine learning where automatic learning algorithms are applied to metadata about machine learning experiments. As of 2017, the term had not found a standard interpretation, however the main goal is to use such metadata to understand how automatic learning can become flexible in solving learning problems, hence to improve the performance of existing learning algorithms or to learn (induce) the learning algorithm itself, hence the alternative term learning to learn.
Flexibility is important because each learning algorithm is based on a set of assumptions about the data, its inductive bias. This means that it will only learn well if the bias matches the learning problem. A learning algorithm may perform very well in one domain, but not on the next. This poses strong restrictions on the use of machine learning or data mining techniques, since the relationship between the learning problem (often some kind of database) and the effectiveness of different learning algorithms is not yet understood.
By using different kinds of metadata, like properties of the learning problem, algorithm properties (like performance measures), or patterns previously derived from the data, it is possible to learn, select, alter or combine different learning algorithms to effectively solve a given learning problem. Critiques of meta learning approaches bear a strong resemblance to the critique of metaheuristic, a possibly related problem. A good analogy to meta-learning, and the inspiration for Jürgen Schmidhuber's early work (1987) and Yoshua Bengio et al.'s work (1991), considers that genetic evolution learns the learning procedure encoded in genes and executed in each individual's brain. In an open-ended hierarchical meta learning system using genetic programming, better evolutionary methods can be learned by meta evolution, which itself can be improved by meta meta evolution, etc.
Definition
A proposed definition for a meta learning system combines three requirements:
The system must include a learning subsystem.
Experience is gained by exploiting meta knowledge extracted
in a previous learning episode on a single dataset, or
from different domains.
Learning bias must be chosen dynamically.
Bias refers to the assumptions that influence the choice of explanatory hypotheses and not the notion of bias represented in the bias-variance dilemma. Meta learning is concerned with two aspects of learning bias.
Declarative bias specifies the representation of the space of hypotheses, and affects the size of the search space (e.g., represent hypotheses using linear functions only).
Procedural bias imposes constraints on the ordering of the inductive hypotheses (e.g., preferring smaller hypotheses).
Common approaches
There are three common approaches:
using (cyclic) networks with external or internal memory (model-based)
learning effective distance metrics (metrics-based)
explicitly optimizing model parameters for fast learning (optimiza
|
https://en.wikipedia.org/wiki/Area%20de%20Conservaci%C3%B3n%20Guanacaste%20World%20Heritage%20Site
|
The Area de Conservación Guanacaste is a network of protected areas and a World Heritage Site in Guanacaste Province, in northwestern Costa Rica. The World Heritage Site contains an unbroken tract of tropical dry forest and important habitat for several vulnerable species, including the Central American tapir, mangrove hummingbird, and the great green macaw. Over 7,000 plant species and 900 vertebrate species have been located in the park.
Geography
The area of the national parks combined totals as of 2004. This reflects a long-term process of growth, which started with the establishment of Santa Rosa National Park in 1971. Over several decades, surrounding lands were purchased and nearby national parks connected to the growing protected area, so that the Guanacaste Conservation Area came to encompass a high diversity of tropical dry forest, rainforest, cloud forest, and marine habitats. The park contains about two-thirds of the endangered animals of Costa Rica.
It formally became part of National System of Conservation Areas—SINAC in 1994, and a World Heritage Site in 1999. In 2004, the World Heritage Site was extended with a private property measuring 15,000 ha in the Santa Elena rain forest.
Elements
The World Heritage Site includes:
Santa Rosa National Park
Guanacaste National Park
Rincón de la Vieja Volcano National Park
Junquillal Bay Wildlife Refuge
See also
Guanacaste Conservation Area
World Heritage Sites in Costa Rica
References
External links
—UNESCO: Area de Conservación Guanacaste World Heritage Site
World Heritage Sites in Costa Rica
Conservation Areas of Costa Rica
Geography of Guanacaste Province
Tourist attractions in Guanacaste Province
|
https://en.wikipedia.org/wiki/Snapshot%20isolation
|
In databases, and transaction processing (transaction management), snapshot isolation is a guarantee that all reads made in a transaction will see a consistent snapshot of the database (in practice it reads the last committed values that existed at the time it started), and the transaction itself will successfully commit only if no updates it has made conflict with any concurrent updates made since that snapshot.
Snapshot isolation has been adopted by several major database management systems, such as InterBase, Firebird, Oracle, MySQL, PostgreSQL, SQL Anywhere, MongoDB and Microsoft SQL Server (2005 and later). The main reason for its adoption is that it allows better performance than serializability, yet still avoids most of the concurrency anomalies that serializability avoids (but not all). In practice snapshot isolation is implemented within multiversion concurrency control (MVCC), where generational values of each data item (versions) are maintained: MVCC is a common way to increase concurrency and performance by generating a new version of a database object each time the object is written, and allowing transactions' read operations of several last relevant versions (of each object). Snapshot isolation has been used to criticize the ANSI SQL-92 standard's definition of isolation levels, as it exhibits none of the "anomalies" that the SQL standard prohibited, yet is not serializable (the anomaly-free isolation level defined by ANSI).
In spite of its distinction from serializability, snapshot isolation is sometimes referred to as serializable by Oracle.
Definition
A transaction executing under snapshot isolation appears to operate on a personal snapshot of the database, taken at the start of the transaction. When the transaction concludes, it will successfully commit only if the values updated by the transaction have not been changed externally since the snapshot was taken. Such a write–write conflict will cause the transaction to abort.
In a write skew anomaly, two transactions (T1 and T2) concurrently read an overlapping data set (e.g. values V1 and V2), concurrently make disjoint updates (e.g. T1 updates V1, T2 updates V2), and finally concurrently commit, neither having seen the update performed by the other. Were the system serializable, such an anomaly would be impossible, as either T1 or T2 would have to occur "first", and be visible to the other. In contrast, snapshot isolation permits write skew anomalies.
As a concrete example, imagine V1 and V2 are two balances held by a single person, Phil. The bank will allow either V1 or V2 to run a deficit, provided the total held in both is never negative (i.e. V1 + V2 ≥ 0). Both balances are currently $100. Phil initiates two transactions concurrently, T1 withdrawing $200 from V1, and T2 withdrawing $200 from V2.
If the database guaranteed serializable transactions, the simplest way of coding T1 is to deduct $200 from V1, and then verify that V1 + V2 ≥ 0 still holds, aborting if not.
|
https://en.wikipedia.org/wiki/3GL
|
3GL may refer to:
95.5 K-Rock, a Geelong, Victoria radio station, formerly known as 3GL
Third-generation programming language
Metal Storm 3GL, a semi-automatic electronic grenade launcher for infantry
|
https://en.wikipedia.org/wiki/2GL
|
2GL may refer to:
Second-generation programming language, a form of computer language
2GL (Radio), a radio station in Australia
|
https://en.wikipedia.org/wiki/Zilo
|
Zilo Networks Inc. was an entertainment and marketing television network aimed at college students and young adults. The New York City-based company was founded in 1999. Zilo Networks the created of Zilo TV, a dorm room campus cable television network, which in Spring 2009 was sold to SirkTV. SirkTV is property of New York City-based film, television and video production company Sirk Productions, a New York City-based production company founded in 1997. Sirk produces films, including the documentaries Severe Clear and Anytown, USA, and television programs, such as The Inside Reel, as well as provides multimedia services to corporate and non-profit clients.
References
External links
sirktv.com
Entertainment companies based in New York City
|
https://en.wikipedia.org/wiki/Comparison%20of%20VoIP%20software
|
This is a comparison of voice over IP (VoIP) software used to conduct telephone-like voice conversations across Internet Protocol (IP) based networks. For residential markets, voice over IP phone service is often cheaper than traditional public switched telephone network (PSTN) service and can remove geographic restrictions to telephone numbers, e.g., have a PSTN phone number in a New York area code ring in Tokyo.
For businesses, VoIP obviates separate voice and data pipelines, channelling both types of traffic through the IP network while giving the telephony user a range of advanced abilities.
Softphones are client devices for making and receiving voice and video calls over the IP network with the standard functions of most original telephones and usually allow integration with VoIP phones and USB phones instead of using a computer's microphone and speakers (or headset). Most softphone clients run on the open Session Initiation Protocol (SIP) supporting various codecs. Skype runs on a closed proprietary networking protocol but additional business telephone system (PBX) software can allow a SIP based telephone system to connect to the Skype network. Online chat programs now also incorporate voice and video communications.
Other VoIP software applications include conferencing servers, intercom systems, virtual foreign exchange services (FXOs) and adapted telephony software which concurrently support VoIP and public switched telephone network (PSTN) like Interactive Voice Response (IVR) systems, dial in dictation, on hold and call recording servers.
Some entries below are Web-based VoIP; most are standalone Desktop applications.
Desktop applications
Discontinued softphone service
Mobile phones
For mobile VoIP clients:
Frameworks and libraries
Server software
Secure VoIP software
VoIP software with client-to-client encryption
The following table is an overview of those VoIP clients which (can) provide end-to-end encryption.
VoIP software with client-to-server encryption
The following table is an overview of those VoIP clients which (normally) provide client-to-server encryption.
Notes
See also
Comparison of audio coding formats
Comparison of cross-platform instant messaging clients
Comparison of web conferencing software
List of codecs
List of SIP software
List of video telecommunication services and product brands
Matrix (protocol)
Secure communication
Comparison of user features of messaging platforms
References
VoIP software
Cryptographic software
VoIP software
VoIP software
|
https://en.wikipedia.org/wiki/The%20Computer%20Programme
|
The Computer Programme is a TV series, produced by Paul Kriwaczek, originally broadcast by the BBC (on BBC 2) in 1982. The idea behind the series was to introduce people to computers and show them what they were capable of. The BBC wanted to use their own computer, so the BBC Micro was developed as part of the BBC Computer Literacy Project, and was featured in this series. The series was successful enough for two series to follow it, namely Making the Most of the Micro in 1983 and Micro Live from 1984 until 1987.
Presenters
The two studio presenters were Ian McNaught-Davis (known as 'Mac') and Chris Serle, the former showing the latter some of the rudimentary basics of computer operation and BASIC programming. The 'on location' reporter was Gill Nevill. The studio made heavy use of the new BBC Micro, which had recently been launched.
Production
Filming of the series took place in October 1981, before Acorn had fully completed the development and productionization of the BBC Micro. The machines used on the demonstration segments were in fact early pre-production models which barely worked, and Acorn engineer Steve Furber was working behind the set to keep the machines running. One of the issues found with the early units was their ULA chips overheating under the studio lights. The linear power supply units (PSU) on the early BBC Micros were also prone to overheating and in some cases, catching fire - something that dogged the early production machines. Fellow Acorn engineer Sophie Wilson also recounted that some of the BBC Micros used in the studio were in fact dummy units connected to an Acorn System 1 hidden out of sight which was actually running the software.
Format
Each programme would normally start with either Serle or McNaught-Davis introducing a real-life situation where computers are being (or could be) applied – examples included the office, a car factory and the British Library. This would form the theme which would underpin the demonstrations shown on the programme.
Distribution
The programme was broadcast in the United States in 1983 by PBS.
In addition, stock footage from The Computer Programme was incorporated into the 2009 BBC one-off drama Micro Men, which focused on the early fortunes of British computer manufacturers Sinclair Research and Acorn Computers (manufacturers of the ZX Spectrum and BBC Micro, respectively), which both featured heavily on the show during its original run.
The show was aired as Connecta el micro, pica l'start (Connect the micro, push start) on the Catalan channel TV3. This adapted version included the original 30 minutes taken from the BBC's show plus 15 minutes with original footage. In this original footage the BBC Micro computers were substituted by Dragon 200 computers, which were made in Spain.
Programmes
The series was split into 10 programmes, each about 25 minutes long and dealing with a particular subject area. They were as follows (original airdates in brackets):
It's Happening Now
|
https://en.wikipedia.org/wiki/SuperPower
|
SuperPower is a 2002 political simulation computer game. SuperPower was designed by GolemLabs and published by DreamCatcher Interactive, debuting on March 28, 2002 for Microsoft Windows. SuperPower 2 was released in 2004. SuperPower 3 was released in 2022.
Gameplay
The start of play is set during the first week of January 1997, with the player assuming the role of the newly appointed leader of one of 140 controllable nations. Players are given complete command over their nation from the use of thermonuclear weapons, to the level of taxes, to what kind of government is in control, to sending secret service operatives to conduct covert missions. SuperPower has two different game modes; scenarios and freeplay.
Scenarios
Superpower has some premade scenarios that offer a challenge in the way you have to solve a problem. The main factor that makes the scenarios difficult is that they restrict what kind of actions you can take (Ex: not being able to use military action)
Scenarios
Argentina - Protect Bolivia from invasion
Côte d'Ivoire - Reclaim control over territory
United States - Restore democracy in Haiti
South Korea - Sign an alliance with North Korea
United Kingdom - Create anarchy in Poland
Russia - Rebuilding the communist superpower
China - Sign a strategic alliance with Taiwan
Freeplay
Freeplay is a sandbox mode, beginning with the choices of which nation to control, which objectives to complete and a time limit to complete them within. Play continues until the objectives are completed or the time limit expires. Freeplay can be played for one in-game year, five years, ten years, or for an unlimited amount of time. The mandatory objective is to stay in power, optional objectives include conquering the world, eliminating armed rebels, or balancing the nation's resources. The game can be set to play with the one mandatory objective, staying in power, and the unlimited time period for an objective free game.
Reception
The game received "unfavorable" reviews according to the review aggregation website Metacritic. It has been heavily criticized for its many bugs, including some that do not allow the player to complete the game in the amount of time listed, the game often crashing back to the desktop even when all the computer requirements have been met, and the country's budget suddenly crashing.
See also
SuperPower 2
References
External links
2002 video games
DreamCatcher Interactive games
Government simulation video games
Video games developed in Canada
Windows games
Windows-only games
Grand strategy video games
|
https://en.wikipedia.org/wiki/To%20Preserve%20Quandic
|
To Preserve Quandic is a graphical adventure game written by David Karam for the TRS-80 Color Computer and published by Prickly Pear Software in 1984. Taking two full disks, it was larger than both The Sands of Egypt and The Dallas Quest, which preceded it. The premise is to preserve the pacifistic Quandic race, who had advanced technology like time machines.
References
External links
To Preserve Quandic at Tandy Color Computer Games
Adventure games
1984 video games
TRS-80 Color Computer games
TRS-80 Color Computer-only games
Video games developed in the United States
|
https://en.wikipedia.org/wiki/Telenet
|
Telenet was an American commercial packet-switched network which went into service in 1975. It was the first FCC-licensed public data network in the United States. Various commercial and government interests paid monthly fees for dedicated lines connecting their computers and local networks to this backbone network. Free public dialup access to Telenet, for those who wished to access these systems, was provided in hundreds of cities throughout the United States.
The original founding company, Telenet Inc., was established by Bolt Beranek and Newman (BBN) and recruited Larry Roberts (former head of the ARPANet) as President of the company, and Barry Wessler. GTE acquired Telenet in 1979. It was later acquired by Sprint and called "Sprintnet". Sprint migrated customers from Telenet to the modern-day Sprintlink IP network, one of many networks composing today's Internet.
Telenet had its first offices in downtown Washington, D.C., then moved to McLean, Virginia. It was acquired by GTE while in McLean, and then moved to offices in Reston, Virginia.
History
After establishing that commercial operation of "value added carriers" was legal in the U.S., Bolt Beranek and Newman (BBN), who were the private contractors for the ARPANET, set out to create a private sector version. In January 1975, Telenet Communications Corporation announced that they had acquired the necessary venture capital after a two-year quest, and on August 16 of the same year they began operating the first public data network.
Coverage
Originally, the public network had switching nodes in seven US cities:
Washington, D.C. (network operations center as well as switching)
Boston, Massachusetts
New York, New York
Chicago, Illinois
Dallas, Texas
San Francisco, California
Los Angeles, California
The switching nodes were fed by Telenet Access Controller (TAC) terminal concentrators both colocated and remote from the switches. By 1980, there were over 1000 switches in the public network. At that time, the next largest network using Telenet switches was that of Southern Bell, which had approximately 250 switches.
In 1977, Telenet added a London node and a Network Control Centre in a London building of Britain's Post Office Telecommunications.
Internal network technology
The initial network used statically-defined hop-by-hop routing, using Prime commercial minicomputers as switches, but then migrated to a purpose-built multiprocessing switch based on 6502 microprocessors. Among the innovations of this second-generation switch was a patented arbitrated bus interface that created a switched fabric among the microprocessors. By contrast, a typical microprocessor-based system of the time used a bus; switched fabrics did not become common until about twenty years later, with the advent of PCI Express and HyperTransport.
Most interswitch lines ran at 56 kbit/s, with a few, such as New York-Washington, at T1 (i.e., 1.544 Mbit/s). The main internal protocol was a proprietary variant on
|
https://en.wikipedia.org/wiki/Strahl%20%28video%20game%29
|
Strahl is an interactive movie game originally developed by Data East featuring animation by Toei Animation. It was originally intended to be released as a LaserDisc-based arcade game under the title of Chantze's Stone in 1985, but was shelved. The game would resurface a decade later for the LaserActive's Mega-LD module under the title of Triad Stone and on the 3DO Interactive Multiplayer and Sega Saturn under its final title.
Gameplay
The gameplay primarily consists of watching an anime movie and pushing buttons as prompted on the screen. Failure to correctly follow a prompt results in a lost life. The player has three lives and two continues, but losing a life sends the player back to the beginning of the level. There are eight levels in all; the player may select which of the first three levels to play first. Completing any of these levels unlocks the next four, but all of the first seven levels must be completed to unlock the final level.
Plot
The player assumes the role of Alex Hawkfield, an ordinary young man living in a small town who finds an old man dying in the street. He takes the old man (actually God in disguise) into his home and takes care of him. As he has proven his kindness, the old man tells him he has the potential to make the world better and become king, and asks him if he would like to try his potential. Alex does not know how to answer, but the old man senses his feelings and, seeing he is ready, sends him on a trial to recover the seven fragments of a mystic stone. Each time Alex recovers a stone fragment leads to the rebirth and invention of various things in his world.
Version differences
The LaserActive and Saturn versions allow the player to choose from three different difficulties; the 3DO version omits this feature. The LaserActive version also includes a scoring system, a language option (English or Japanese), and beeping noises and occasional voice commands (e.g. "Get them off!", "Power up!") accompanying the button prompts, all of which were dropped from later versions of the game. The later versions also add some action sequences, such as a scene in which the hero must fight off a horde of tiny humanoids.
All three versions feature completely different visuals for both the introductory cutscene and stage select.
Reception
The four reviewers of Electronic Gaming Monthly scored the 3DO version a 6.125 out of 10. They praised the animation and imagination of the full motion video but concurred that the stages are much too easy and that the gameplay does nothing to differentiate itself from previous games in the Dragon's Lair genre. One of them summarized that "Strahl is intended for two specific types of people: those who enjoy FMV games and those who like watching Japanimation." GamePro gave it a negative review, criticizing the unoriginal gameplay and visuals and the fact that the different endings are acquired simply by playing the stages in different orders. They concluded that "this anime-inspired CD is t
|
https://en.wikipedia.org/wiki/Ka%C5%A1telir-Labinci
|
Kaštelir-Labinci ( ) is a municipality in Istria, Croatia. Kaštelir and Labinci have been gradually urbanized over the centuries, and have gradually merged into one place. According to historical data, Labinci used to be a bigger place than Kaštela, but today Kašteliri is a bigger place, which is also evident from the name of the place. Throughout history, these two places were under the jurisdiction of Motovun and later Vižinada.
Demographics
According to the 2021 census, its population was 1,493.
The population was 1,334 (census 2001).
List of villages in municipality:
Babići - 73
Brnobići - 123
Cerjani - 15
Deklići - 34
Dvori - 37
Kaštelir - 283
Kovači - 55
Krančići - 80
Labinci - 269
Mekiši kod Kaštelira - 20
Rogovići - 90
Rojci - 64
Roškići - 53
Tadini - 68
Valentići - 70
References
External links
Kaštelir-Labinci Official site
Municipalities of Croatia
Populated places in Istria County
Populated places in Croatia where Italian is an official language
|
https://en.wikipedia.org/wiki/Ritmo%20Deportivo
|
Ritmo Deportivo (translated as Sporty Rhythm in English) is a weekly television series airing Saturdays at 5pm/4C on Spanish-language network Telemundo, part of the NBC Deportes line of programming. It premiered in October 2002 and is one of the longest standing alternative sports shows in Spanish language TV.
About the show
The series is hosted by Leti Coo, Karim Mendiburu and Omar Amador and is geared generally towards men ages 18 to 34. Each week's episode is filmed in different exterior locations around the United States, Mexico and around the world.
The show has a variety of content: long-form stories, technology segments, automotive profiles, video game previews and modeling vignettes. It also covers sporting events, eco-tourism, modeling contests and worldwide attractions. Its segments are also featured in “NBC Universal on American”, a variety show of NBC Universal properties shown during American Airlines flights. The show ended it run on September 27, 2015
References
External links
Official Site
Official Facebook Page
Official Twitter Page
Deportes Telemundo iPhone, iPod Touch, and iPad App
American sports television series
Telemundo original programming
NBC Deportes
2002 American television series debuts
2015 American television series endings
|
https://en.wikipedia.org/wiki/DMP
|
DMP may refer to:
In science and technology
2,2-Dimethoxypropane, a chemical reagent
2,6-dimethylphenol, a monomer
Data management plan, generally submitted as part of research grant proposals
Data management platform, software for managing online advertising and customer data as part of personalized marketing
Dess–Martin periodinane, a chemical reagent used to oxidise alcohols
Dot matrix printer, a type of printers used very commonly in the late 20th century
Dialer management platform, a computer that manages least-cost routing dialers
Digital media player, a category within the Digital Living Network Alliance (DLNA) standard
Dimethyl phthalate, a plasticizer
Dimethyl pimelimidate, also known as dimethyl pimelimidate dihydrochloride, a cross-linking reagent
Disease management programmes for chronic diseases
Dynamic multipathing, a system of computer storage
Dynamics of Markovian particles, in statistical mechanics, the basis of a theory for kinetics of particles
DMP, a file suffix in Microsoft Windows used to indicate a file containing core dump data
Digital Media Professionals, a Japanese GPU design company who designed the PICA200 chip
Medical
Doctor of Medical Physics, a degree in medical physics
Dance movement therapy (in the UK) or "dance therapy" (in the US and Australia)
Differentially Methylated Positions, DMPs, part of Differentially methylated region
In entertainment
Demotivational poster
Digital Manga Publishing, a North American company that publishes manga
Digital matte painter
Digital matte painting, a form of matte painting
DMP Digital Music Products, a jazz record label founded in 1983 by Tom Jung
Donaldson, Moir and Paterson, a Scottish rock band
Drayton Manor Theme Park, a theme park in Staffordshire, England
Other uses
Debt management plan
Desert Memorial Park, a cemetery near Palm Springs, California
Dhaka Metropolitan Police
Disability management program, used by employers to assist employees who are unable to work due to injury or illness
Dublin Metropolitan Police, the police force of Dublin, Ireland, from 1836 to 1925
Dual-member proportional representation, a proposed voting system developed in Canada
|
https://en.wikipedia.org/wiki/Chez%20H%C3%A9l%C3%A8ne
|
Chez Hélène is a children's television series produced by and broadcast on CBC Television. The 15-minute weekday program was broadcast on the English television network to provide viewers with exposure to the French language.
The program was produced at CBC's Montreal studios. It began its 14-season run on 26 October 1959, with the final program airing 25 May 1973.
Hélène Baillargeon portrayed the title role. Other cast members were Madeline Kronby who portrayed the bilingual Louise, and a mouse puppet named Suzie who generally spoke English. Corinne Orr provided the voice for Suzie.
In terms of children's series, the program remained popular in its final season, with a reported 437,000 viewers recorded by BBM in November 1972. But CBC executives cancelled the series, claiming that it had run its course, and that the network's broadcasts of Sesame Street would incorporate five minutes of French-language segments per episode. By the end of the 1970s, a newer program, Passe-Partout started airing on CBC Television's French counterpart, Ici Radio-Canada Télé.
References
External links
Chez Helene – Canadian Communication Foundation
Queen's University Directory of CBC Television Series (Chez Hélène archived listing link via archive.org)
1959 Canadian television series debuts
1973 Canadian television series endings
1950s Canadian children's television series
CBC Television original programming
Television shows filmed in Montreal
French-language education television programming
1960s Canadian children's television series
1970s Canadian children's television series
Black-and-white Canadian television shows
Canadian television shows featuring puppetry
|
https://en.wikipedia.org/wiki/Rookwood%20Cemetery%20railway%20line
|
The Rookwood Cemetery Line used to be a part of the Sydney suburban network. The line serviced Rookwood Cemetery and was built in 1864, opening on 22 October 1864.<ref
name="list_of_openings">List of Opening Dates of N.S.W. Rail Lines Prior to June 1942: Compiled from listings in The Retired Rail and Tramwayman, 1942</ref>
History
With the closure of the Town Hall and Devonshire Cemeteries by the mid-19th century and an ever-increasing population, a decision was made to purchase a huge area of land (250 acres) in 1862 to establish the Necropolis at Haslem's Creek in 1867. The term "necropolis" comes from the Greek "nekropolis" or "city of the dead".
As this location was some distance from the centre of Sydney and from the main-line train station at Haslem's Creek, now Lidcombe station, it was considered necessary to establish a railway station at the centre of the cemetery. This line would run as a spur line from the existing station at Haslem's creek and allow easier movement into and out of the cemetery. The railway line construction began in November 1864 and from 1 January 1865 trains began their run into the cemetery. However, The Sydney Morning Herald advertised the first regular services from 1 April 1867. The times advertised were for services at 8.30am and 4.15pm. Later this was changed to 9.15am and 3pm. It stopped at prearranged stations on the journey from central Sydney in order to pick up mourners and coffins. Some stations, such as Newtown had special platform areas and buildings reserved for mourners and coffins.
At the time of its opening, the line went as far as Cemetery Station No. 1. On 26 May 1897, an extension of the line to Cemetery Station No. 3 was opened. The extension required the removal of a waiting room on the rear wall of the Cemetery Station No. 1, so the line could pass right through the building. A final extension, to Cemetery Station No. 4 opened on 19 June 1908. The line closed in 1948.
Closure
The last trains that ran funeral processions all but ceased in the late 1930s. Following this, they were only used for visitors on Sundays and Mother's Day. The service was briefly revived during World War II during petrol rationing. The last railway timetable was recorded in 1947 and read Sydney 2.17 p.m. to Strathfield 2.33 p.m. to Rookwood #1, 2.50 p.m.
On 3 April 1948, the service was officially terminated while the spur was recorded as closed on 29 December 1948. The tracks remained until the 1980s, with the line used to transport stonework.
Rookwood Cemetery line stations
Station names are based on the current name of the station, or the name of the station when it was closed.
Regent Street
Cemetery Station No. 1
Cemetery Station No. 2
Cemetery Station No. 3
Cemetery Station No. 4
References
Further reading
The Rookwood Cemetery Line Singleton, C.C. Australian Railway Historical Society Bulletin, February 1960 pp. 17–28
External links
Rookwood Cemetery line in OpenStreetMap.
Closed railway li
|
https://en.wikipedia.org/wiki/Marymount%20International%20School%20of%20Rome
|
Marymount International School Rome is a private, international, Catholic, co-educational day school that follows the American grading system and a part of the Global Network of RSHM Schools which includes 19 Marymount schools in Europe, North America, and South America founded by the Religious of the Sacred Heart of Mary (RSHM).
The school offers an English-language American and International curriculum from Early Childhood through Grade 12 (ages 2 to 18), a longstanding International Baccalaureate (IB) diploma program and an excellent American High School Diploma, as well as AP courses, and a variety of extracurricular activities, all of which contribute to a vibrant community life that enriches its beautiful 40-acre campus in northern Rome.
Facilities include several science laboratories, two spacious libraries with multi-media centers, art and music studios, an Auditorium, the Early Childhood Center Outdoor Classroom, Garden and Playground, and the Dining Hall in addition to a regulation-size soccer field and several other sports areas. The one-to-one laptop program in the Secondary School is supported by high-speed Internet connections in the classrooms. Enrichment opportunities are offered across all Grade Levels.
Marymount is accredited by the International Baccalaureate Organization (IBO), Council of International Schools (CIS) and the Middle States Association (MSA).
References
External links
Marymount International School Rome
American international schools in Italy
International schools in Italy
International schools in Rome
International Baccalaureate schools in Italy
Educational institutions established in 1946
Private schools in Italy
1946 establishments in Italy
|
https://en.wikipedia.org/wiki/Community%20Memory
|
Community Memory (CM) was the first public computerized bulletin board system. Established in 1973 in Berkeley, California, it used an SDS 940 timesharing system in San Francisco connected via a 110 baud link to a teleprinter at a record store in Berkeley to let users enter and retrieve messages. Individuals could place messages in the computer and then look through the memory for a specific notice.
While initially conceived as an information and resource sharing network linking a variety of counter-cultural economic, educational, and social organizations with each other and the public, Community Memory was soon generalized to be an information flea market, by providing unmediated, two-way access to message databases through public computer terminals. Once the system became available, the users demonstrated that it was a general communications medium that could be used for art, literature, journalism, commerce, and social chatter.
People
Community Memory was created by Lee Felsenstein, Efrem Lipkin, Ken Colstad, Jude Milhon, and Mark Szpakowski, acting as The Community Memory Project within the Resource One computer center at Project One in San Francisco. This group of computer savvy friends and partners wanted to create a simple system that could function as a source of community information. Felsenstein took care of hardware, Lipkin software, and Szpakowski user interface and information husbandry. Community Memory in its first phase (1973–1975) was an experiment to see how people would react to using a computer to exchange information. At that time few people had any direct contact with computers. CM was conceived as a tool to help strengthen the Berkeley community. Their brochure states that "strong, free, non-hierarchical channels of communication--whether by computer and modem, pen and ink, telephone, or face-to-face--are the front line of reclaiming and revitalizing our communities."
The creators and founders of Community Memory shared the values of northern California counterculture of the 1960s, which included the celebration of free speech and the anti-war movement. They were also supporters of ecological, low cost, decentralized, and user-friendly technology.
CM had a presence in Vancouver starting in July 1974, led by Andrew Clement. A second incarnation of Community Memory, aimed at creating a global information network, appeared in the later seventies. Its major players were Efrem Lipkin and Ken Colstad.
In his book Hackers: Heroes of the Computer Revolution, Steven Levy described how the founders of Community Memory began the organization. Some of the founders were involved in the Homebrew Computer Club, an organization credited with significant impact in the development of the personal computer.
History
The first terminal was a Teletype Model 33 connected to the SDS 940 computer by telephone, using a 10 character per second acoustic coupled modem. It was located at the top of the stairs leading to Leopold's Records in Ber
|
https://en.wikipedia.org/wiki/Canadian%20Electroacoustic%20Community
|
Founded in 1986, La Communauté électroacoustique canadienne / The Canadian Electroacoustic Community (CEC) is Canada's national electroacoustic / computer music / sonic arts organization and is dedicated to promoting this progressive art form in its broadest definition: from "pure" acousmatic and computer music to soundscape and sonic art to hardware hacking and beyond.
Among the objectives, as written in the Bylaws of the corporation, are the "support, development, production, distribution of information, materials, works... for the electroacoustic/computer music community in Canada... with continuing special concern for the younger generation of individuals and women in this community. The CEC recognizes and supports the principle of sexual equality, and also, the equal status of English and French."
The CEC endeavors to foster a broad, diverse, and inclusive community of electroacoustic practitioners, raise the profile of electroacoustics in the Canadian arts milieu, and to promote Canadian electroacoustic composers and activities across Canada and internationally. The various ongoing and singular CEC activities aim to maintain and strengthen communications and information flow concerning electroacoustics.
With projects such as the electronic journal !, the online jukebox SONUS, the annual Jeu de temps / Times Play (JTTP) project for Canadian-based young and emerging sound artists, and the Cache, PRESENCE and DIS Contact! CD compilation series, the CEC offers Canadian electro acousticians a venue to both promote themselves and participate within the global community, thereby fostering mutual awareness and benefit in the international scene.
Projects
e-Contact!
The CEC's online journal of electroacoustics was launched in May 1998 as the successor to the print journal, Contact! (1988–97), and is published four times a year. Each issue focusses on a particular theme or topic, and Guest Editors have been invited to coordinate one issue per year since (2004–05). Articles, reviews, interviews, commentaries and analyses are featured in the journal, often supported by audio and video files. All issues are freely available to the public.
Between 2005–08, a number of important changes were made to the journal's overall "look" and format, which greatly improved its navigability, readability and consistency. The interrelations between and other CEC projects, notably SONUS, were strengthened, and a number of recurring elements have been implemented, including the "Community Reports," "Rediscovered Treasures," "Focus on Institutions" and "Kwik Picks" columns. At the same time, the scope and size of the contributions has expanded considerably, reflecting the range of backgrounds and experiences the growing community of contributors brings to the journal.
has matured into more than just a journal: it is recognized in the international community as a significant electroacoustic primary research source and resource which makes very efficient and unpa
|
https://en.wikipedia.org/wiki/Eurosport%20News
|
Eurosport News was the first 24-hour international Europe-based sports news channel part of the European sports network Eurosport, owned by Discovery Inc. It was available in 11 million homes in 54 countries.
History
The channel launched on 1 September 2000 and quietly closed down on 1 January 2018. It featured live scores, highlights, most recent breaking news and commentaries with recorded voiceovers, similar to Euronews. Eurosport News' sportscasts were broadcast around the clock in 15-minute blocks with frequent updates. The service combined video, text and graphics with the screen being divided into 4 sections. A video section that displayed highlights and news bulletins, a breaking news ticker at the bottom and a scoring section that gave in-depth analysis of results and game stats.
References
External links
News
Sports television channels in the United Kingdom
Sports mass media in Italy
Television channels in Italy
Television stations in Portugal
Television channels and stations established in 2000
Television channels and stations disestablished in 2018
|
https://en.wikipedia.org/wiki/Honey%2C%20We%27re%20Killing%20the%20Kids
|
Honey, We're Killing the Kids is a BBC Three television series in which parents are shown the consequences of poor parenting. The program shows computer-generated images and technology of what their children may look like as adults if they continue with their present life-style, dietary and exercise habits. It was also adapted for the American network TLC in 2007.
Format
First, a family with issues relating to their parenting, dietary and exercise habits is introduced. Then, the children are examined by physicians and psychologists, and every aspect of their eating habits and physical activity is analysed by an expert team. Then, the parents are shown what their children may look like by taking present-day photos of them and age-progressing the photos with a computer year by year until age forty. The parents are frequently brought to tears when presented with the likelihood of their children's unhappy future appearance and significantly reduced life expectancy.
Some traits are exaggerated for effect. Highly variable traits such as clothes, hairstyles, jewelry, eyeglasses, facial hair, and so forth are added to the computer generated images based on guesses by the show at the social and educational impact current poor parenting may have on the children's future lives. These guesses at highly variable traits are swayed depending on the outcome predicted by the show's child experts based upon the likely life expectancy, state of health and emotional stability of the children. Bad haircuts and glasses may be used for the previous version while the finished version has the computer generated images smiling and wearing a suit. Another example, in the premier TLC episode, an eight-year-old boy was given a mullet, an earring, nerdy-looking eyeglasses, and a soul patch at age fifteen. In another episode, an eight-year-old girl was given a bad case of acne as she went through her teenage years. Rosacea, obesity, tooth decay, and hair loss also seem to be common ailments added to the age-progression. These guesses at personal traits are present in all episodes to dramatise the harmful physical, emotional effects of a poor diet and poor parenting, and the major impact the show's experts say these are likely to have on the children's future well being.
The show follows families' home lives for a period of four weeks. During this period they follow a manual of instructions written by experts including a child psychologist, a fitness expert and a dietician. At weekly interventions to this regime they are criticized by the show's host and given three new 'rules' targeted at each family specifically, to help them be better parents. Rules have been primarily aimed at the children, including both diet and exercise, but there have also been a couple of rules for adults, such as giving up smoking (and in one case going back to university). Practices such as "Home Cooking" and "Get Active" have been introduced, as well as recommendations aimed at fostering emotion
|
https://en.wikipedia.org/wiki/NAG%20Numerical%20Library
|
The NAG Numerical Library is a software product developed and sold by The Numerical Algorithms Group Ltd. It is a software library of numerical analysis routines, containing more than 1,900 mathematical and statistical algorithms. Areas covered by the library include linear algebra, optimization, quadrature, the solution of ordinary and partial differential equations, regression analysis, and time series analysis.
Users of the NAG Library call its routines from within their applications in order to incorporate its mathematical or statistical functionality and to solve numerical problems - for example, finding the minimum or maximum of a function, fitting a curve or surface to data, or solving a differential equation. The NAG Library can be accessed from a variety of languages and environments such as C/C++, Fortran, Python, AD, MATLAB, Java and .NET. The main supported systems are currently Windows, Linux and macOS running on x86-64 architectures; 32-bit Windows support is being phased out. Some NAG mathematical optimization solvers are accessible via the optimization modelling suite.
History
The original version of the NAG Library was written in Algol 60 and Fortran. It contained 98 user-callable routines, and was released for the ICL 1906A and 1906S machines on October 1, 1971. Three further Marks of the library appeared in the following five years; during this time the Algol version was ported to Algol 68, with the following platforms being supported: CDC 7600/CYBER (CDC ALGOL 68), IBM 360/370/AMDAHL (FLACC ALGOL 68), ICL 1900 (ALGOL 68R), ICL 1906A/S (ALGOL 68R), ICL 2900 (ALGOL 68RS) and Telefunken TR440 (ALGOL 68C).
The first partially vectorized implementation of the NAG Fortran Library for the Cray-1 was released in 1983, while the first release of the NAG Parallel Library (which was specially designed for distributed memory parallel computer architectures) was in the early 1990s. Mark 1 of the NAG C Library was released in 1990. In 1992, the Library incorporated LAPACK routines for the first time; NAG had been a collaborator in the LAPACK project since 1987. The first release of the NAG Library for SMP & Multicore, which takes advantage of the shared memory parallelism of Symmetric Multi-Processors (SMP) and multicore processors, appeared in 1997 for multiprocessor machines built using the Dec Alpha and SPARC architectures. The NAG Library for .NET, which is a CLI DLL assembly containing methods and objects that give Common Language Infrastructure (CLI) users access to NAG algorithms, was first released in 2010.
Current version
Mark 29 of the NAG Library includes mathematical and statistical algorithms organised into chapters.
See also
List of numerical-analysis software
List of numerical libraries
References
External links
The NAG Library
History of computing in the United Kingdom
Numerical libraries
Science and technology in Oxfordshire
|
https://en.wikipedia.org/wiki/Ian%20McNaught-Davis
|
Ian McNaught-Davis (30 August 1929 – 10 February 2014) was a British television presenter best known for presenting the BBC television series The Computer Programme, Making the Most of the Micro and Micro Live in the 1980s. He was also a mountaineer and alpinist. He was managing director of the British subsidiary of Comshare Inc.
Early life and career
The son of Stanley McNaught-Davis, an ex RAF pilot, he was educated at Rothwell Grammar School in Lofthouse, West Yorkshire (originally built in Rothwell, West Yorkshire), followed by national service in the RAF where his poor eyesight thwarted his ambitions to become a pilot. He achieved a first in Mathematics at the University of Manchester, where he also became an active mountaineer.
After university he had a variety of jobs including digging ice tunnels for glaciologists on Monte Rosa in Switzerland; fixing roofs and teaching. Eventually he settled as a geophysicist for British Petroleum (BP), specialising in Africa.
Mountaineering
McNaught-Davis was a keen climber, hill walker and hiker. In 1956 he was one of the first to climb the "unclimbable" Muztagh Tower in the Karakoram range in Baltistan. He became honorary librarian of the Climbers' Club in 1961.
In the 1960s, he was a climbing partner of Joe Brown both in the UK and in the greater ranges. He took part with Brown in the televised climb of the Old Man of Hoy. He also took part in a climb of the Eiffel Tower, which was televised on the ABC network's Wide World of Sports.
McNaught-Davis made his television debut in 1965 as one of the presenters of a BBC TV mountaineering programme Men Against the Matterhorn, with David Dimbleby and Christopher Brasher.
Computing and TV presentation
In the 1970s, he changed career becoming active in information technology, and joined Comshare Inc, where he remained until retirement in 1995. Comshare specialised in software development and resale of redundant operational time on mainframe computer systems. He rose to become chief executive of the European division and managing director of the British subsidiary.
Between 1975 and 1978, he presented the BBC series It's Patently Obvious, a game show in which two panels of celebrities tried to guess the purpose of unfamiliar inventions.
He presented another BBC series The Computer Programme, Making the Most of the Micro and Micro Live in the 1980s.
In 2008 he was a speaker (along with Dave Allen and George Auckland) at an event entitled The BBC Micro and its legacy hosted by the Computer Conservation Society.
Honours
McNaught-Davis was the first non-Swiss holder of the post president of the UIAA (International Mountaineering and Climbing Federation) between the years of 1995 and 2004.
In 2012 he was a patron of the British Mountaineering Council.
Private life
He married twice, having two sons, John and Simon, from his first marriage, and a daughter, Elvira Hurrell, from his second marriage to Loreto Herman.
References
The Alpine Journal, Vol. 66, N
|
https://en.wikipedia.org/wiki/Virtual%20console
|
A virtual console (VC) – also known as a virtual terminal (VT) – is a conceptual combination of the keyboard and display for a computer user interface. It is a feature of some Unix-like operating systems such as Linux, BSD, illumos, UnixWare, and macOS in which the system console of the computer can be used to switch between multiple virtual consoles to access unrelated user interfaces. Virtual consoles date back at least to Xenix and Concurrent CP/M in the 1980s.
In the Linux console and other platforms, usually the first six virtual consoles provide a text terminal with a login prompt to a Unix shell. The graphical X Window System traditionally starts in the seventh virtual console (tty7), although this is configuration dependent.
In Linux, the user switches between them by pressing the Alt key combined with a function key – for example + to access the virtual console number 1. + changes to the previous virtual console and + to the next virtual console. To switch from the X Window System or a Wayland compositor, + + works. (Note that users can redefine these default key combinations.)
If several sessions of the X Window System are required to run in parallel, such as in the case of fast user switching or when debugging X programs on a separate X server, each X session usually runs in a separate virtual console.
Implementation details
Unix systems
Unix workstations, such as those manufactured by Sun or Silicon Graphics, did not include virtual consoles. The only purpose of a console would be to fix the system so that the graphical environment could start.
Sun Niagara-based servers running virtualization with Logical Domains get virtual console services from the Control domain.
See also
Virtual desktop, works similar to a virtual console, but operates on graphical desktops instead of a command prompt
System console for the non-virtual console
Text terminal for the textual interface in general
Pseudo terminal for even more virtual consoles
Terminal emulator for an application program that has the same function as a textual virtual console
Notes
References
FreeBSD Handbook, chapter 3.2 Virtual Consoles and Terminals
External links
The Linux keyboard and console HOWTO
Linux command chvt to switch vt from cmdline
XENIX -- Microsoft's Short-lived Love Affair with Unix
Computer terminals
Terminal multiplexers
User interfaces
|
https://en.wikipedia.org/wiki/Robert%20Iannucci
|
Robert Alan Iannucci is a computer scientist. His areas of expertise include multiprocessing and embedded systems. He earned his PhD at MIT in 1988 with a thesis titled "A dataflow/von Neumann hybrid architecture.".
He was first at IBM at the time of the mainframes, then at Exa Corporation, where he was a founder and Vice President of Product Marketing. In November 1995 he joined Digital Equipment Corporation as Cambridge Research Lab Director, and then went on to Compaq as Vice President of Corporate Research when DEC was acquired by Compaq. From May 2007, Iannucci was head of Nokia's Research Center heading laboratories in Beijing, Tokyo, Palo Alto, Cambridge MA, Cambridge UK, Germany, and Finland. On the first of January 2008 he became the new chief technology officer of Nokia. He was also the first member of the board who is not based in Finland, remaining in Palo Alto. In September 2008 he stepped down.
He now owns and runs the RAI Laboratory LLC.
In 2012 Robert Iannucci became the Director of the Cylab Mobility Research Center at Carnegie Mellon University Silicon Valley.
Bibliography
References
A list of Iannucci's published works
Homepage
Nokia biopic
Amateur radio license W6EI
RAI Laboratory LLC
Symbian-freak interview
Symbian-freak Iannucci to step down 30 Sep 2008
Techworld interview 26 Feb 2008
Computerworld 26 Feb 2008
Book "Multithreaded computer architecture: a summary of the state of the art"
PR Newswire 29 Nov 1995
Iannucci Bio Page, Cylab Mobility Research Center, Carnegie Mellon University
Massachusetts Institute of Technology alumni
American computer scientists
American chief technology officers
Businesspeople in software
American computer businesspeople
American computer programmers
Nokia people
Digital Equipment Corporation people
IBM employees
Amateur radio people
Living people
Year of birth missing (living people)
|
https://en.wikipedia.org/wiki/SETAR%20%28model%29
|
In statistics, Self-Exciting Threshold AutoRegressive (SETAR) models are typically applied to time series data as an extension of autoregressive models, in order to allow for higher degree of flexibility in model parameters through a regime switching behaviour.
Given a time series of data xt, the SETAR model is a tool for understanding and, perhaps, predicting future values in this series, assuming that the behaviour of the series changes once the series enters a different regime. The switch from one regime to another depends on the past values of the x series (hence the Self-Exciting portion of the name).
The model consists of k autoregressive (AR) parts, each for a different regime. The model is usually referred to as the SETAR(k, p) model where k is the number of threshold, there are k+1 number of regime in the model, and p is the order of the autoregressive part (since those can differ between regimes, the p portion is sometimes dropped and models are denoted simply as SETAR(k).
Definition
Autoregressive Models
Consider a simple AR(p) model for a time series yt
where:
for i=1,2,...,p are autoregressive coefficients, assumed to be constant over time;
stands for white-noise error term with constant variance.
written in a following vector form:
where:
is a row vector of variables;
is the vector of parameters :;
stands for white-noise error term with constant variance.
SETAR as an Extension of the Autoregressive Model
SETAR models were introduced by Howell Tong in 1977 and more fully developed in the seminal paper (Tong and Lim, 1980). They can be thought of in terms of extension of autoregressive models, allowing for changes in the model parameters according to the value of weakly exogenous threshold variable zt, assumed to be past values of y, e.g. yt-d, where d is the delay parameter, triggering the changes.
Defined in this way, SETAR model can be presented as follows:
if
where:
is a column vector of variables;
are k+1 non-trivial thresholds dividing the domain of zt into k different regimes.
The SETAR model is a special case of Tong's general threshold autoregressive models (Tong and Lim, 1980, p. 248). The latter allows the threshold variable to be very flexible, such as an exogenous time series in the open-loop threshold autoregressive system (Tong and Lim, 1980, p. 249), a Markov chain in the Markov-chain driven threshold autoregressive model (Tong and Lim, 1980, p. 285), which is now also known as the Markov switching model.
For a comprehensive review of developments over the 30 years
since the birth of the model, see Tong (2011).
Basic Structure
In each of the k regimes, the AR(p) process is governed by a different set of p variables :. In such setting, a change of the regime (because the past values of the series yt-d surpassed the threshold) causes a different set of coefficients : to govern the process y.
See also
Logistic Smooth-Transmission Model
References
Hansen, B.E. (1997). Inference in TAR Models, St
|
https://en.wikipedia.org/wiki/Backhaul%20%28telecommunications%29
|
In a hierarchical telecommunications network, the backhaul portion of the network comprises the intermediate links between the core network, or backbone network, and the small subnetworks at the edge of the network.
The most common network type in which backhaul is implemented is a mobile network. A backhaul of a mobile network, also referred to as mobile-backhaul connects a cell site towards the core network. The two main methods of mobile backhaul implementations are fiber-based backhaul and wireless point-to-point backhaul. Other methods, such as copper-based wireline, satellite communications and point-to-multipoint wireless technologies are being phased out as capacity and latency requirements become higher in 4G and 5G networks.
In both the technical and commercial definitions, backhaul generally refers to the side of the network that communicates with the global Internet, paid for at wholesale commercial access rates to or at an Internet exchange point or other core network access location. Sometimes middle mile networks exist between the customer's own LAN and those exchanges. This can be a local WAN connection.
Cell phones communicating with a single cell tower constitute a local subnetwork; the connection between the cell tower and the rest of the world begins with a backhaul link to the core of the internet service provider's network (via a point of presence). A backhaul may include wired, fiber optic and wireless components. Wireless sections may include using microwave bands and mesh and edge network topologies that may use a high-capacity wireless channel to get packets to the microwave or fiber links.
Definition
Visualizing the entire hierarchical network as a human skeleton, the core network would represent the spine, the backhaul links would be the limbs, the edge networks would be the hands and feet, and the individual links within those edge networks would be the fingers and toes.
Other examples include:
Connecting wireless base stations to the corresponding base station controllers.
Connecting DSLAMs to the nearest ATM or Ethernet aggregation node.
Connecting a large company's site to a metro Ethernet network.
Connecting a submarine communications cable system landing point (which is usually in a remote location) with the main terrestrial telecommunications network of the country that the cable serves.
National broadband plans
A telephone company is very often the internet service provider providing backhaul, although for academic research and education networks, large commercial networks or municipal networks, it is increasingly common to connect to public broadband backhaul. See national broadband plans from around the world, many of which were motivated by the perceived need to break the monopoly of incumbent commercial providers. The US plan for instance, specifies that all community anchor institutions should be connected by gigabit fiber optics before the end of 2020.
Available backhaul technologies
The
|
https://en.wikipedia.org/wiki/Glue%20code
|
In computer programming, glue code is executable code (often source code) that serves solely to "adapt" different parts of code that would otherwise be incompatible. Glue code does not contribute any functionality towards meeting program requirements. Instead, it often appears in code that lets existing libraries or programs interoperate, as in language bindings or foreign function interfaces such as the Java Native Interface, when mapping objects to a database using object-relational mapping, or when integrating two or more commercial off-the-shelf programs. Glue code may be written in the same language as the code it is gluing together, or in a separate glue language. Glue code is very efficient in rapid prototyping environments, where several components are quickly put together into a single language or framework.
Consequences
Because each component is independent (i.e. it is unaware of its relations and is only connected to another component through glue code), the behavior of a component and its interactions can change during the execution of the script. In addition, a different version of one of the components may behave differently, breaking the glue code.
High-level programming languages can suffer from performance penalties because glue code must run through the language interpreter, even when connecting high-performance subsystems. If performance is crucial, using configuration scripting is often preferred to directly connecting binary interfaces of components. In object-oriented scripting languages, glue code often eliminates the need for class hierarchies and large numbers of classes.
See also
Adapter pattern
Scripting language
Shell script
SWIG
Lua (programming language)
Glue logic
WinGlue
Wrapper function
Wrapper library
Method stub
References
Computer programming
|
https://en.wikipedia.org/wiki/Message%20Transmission%20Optimization%20Mechanism
|
MTOM is the W3C Message Transmission Optimization Mechanism, a method of efficiently sending binary data to and from Web services.
MTOM is usually used with the XOP (XML-binary Optimized Packaging).
Application
MTOM only optimizes element content that is in the canonical lexical representation of the xs:base64Binary data type. Since there is no standard way to indicate whether data is in the canonical lexical representation, the mechanism for applying MTOM is implementation-dependent.
The use of MTOM is a hop-by-hop contract between one SOAP node and the next. There is no guarantee that the optimization will be preserved if there are multiple SOAP nodes involved.
Details
Although most users treat MTOM as a single mechanism, the MTOM specification defines it as three related features:
Firstly, an "Abstract SOAP Transmission Optimization Feature" for sending and receiving SOAP messages that contain binary data. The binary data is a part of the single XML Infoset model, but this feature introduces the concept of sending the binary data separately (i.e. not in the serialized XML infoset). This abstract feature does not define how the serialized XML infoset looks without the binary data, nor how the binary data is actually represented.
Secondly, an "Optimized MIME Multipart/Related Serialization of SOAP Messages" is defined. This defines that the serialized XML infoset will include XML-binary Optimized Packaging (XOP) in place of the binary data, and the binary data (along with the serialized XML infoset with XOP placeholders) will be represented together in a MIME container. Although this defines a SOAP message, it does not define the transport protocol over which that MIME and XOP SOAP message is sent.
Thirdly, a "HTTP SOAP Transmission Optimization Feature" defines how the above MIME and XOP SOAP message is sent over HTTP.
Sometimes the term "MTOM" is used as a shorthand to mean "MTOM with XOP". XOP is used as the referencing mechanism in the serialised XML infoset. In theory, the abstract MTOM model could be used with a different referencing mechanism or different container format; also, MTOM could be used over a different transport protocol instead of HTTP. In practice, MTOM is usually used with XOP, MIME and HTTP.
See also
SOAP
XML
Web service
External links
W3C's SOAP Message Transmission Optimization Mechanism
W3C's XML-binary Optimized Packaging
World Wide Web Consortium standards
|
https://en.wikipedia.org/wiki/Adventist%20Health%20Glendale
|
Adventist Health Glendale is a hospital located in Glendale, California, it is part of the healthcare network Adventist Health. Adventist Health Glendale is one of the city's oldest businesses, founded in 1905, a year before Glendale was incorporated as a city. It was then known as Glendale Sanitarium, and it occupied the former Glendale Hotel, a 75-room Victorian structure on what is now Broadway Avenue.
In 2009, Adventist Health Glendale started HEALTHline, a weekly television show helping people to understand their health and health options. HEALTHline can also be viewed online.
History
At the end of July 2017 Glendale Adventist Medical Center changed its name to Adventist Health Glendale.
Murders
Dr. Peter Martin Keller husband of Nettie Florence Keller was shot to death by a patient at Glendale Sanitarium on October 1, 1931.
Efren Saldivar, a respiratory therapist at Adventist Health Glendale until 1998, came to be dubbed the "Angel of Death" when he confessed to 50 murders of patients through the injection of muscle-paralyzing drugs, though he later retracted the confession. In 2002, he was charged with six murders and pleaded guilty, and was sentenced to prison for life. Many more patients are believed to have been murdered.
Glendale Adventist Academy
In 1907, the Glendale Sanitarium, as it was called, had a one-room school in its basement. In the 1930s, that school relocated to a building in Chevy Chase and called itself Glendale Union Academy. Eventually, GUA relocated to its current location on Kimlin Drive and Academy Place and renamed itself Glendale Adventist Academy.
Events
Adventist Health Glendale is involved in many annual events such as Glendale Downtown Dash held on daylight savings day every March, the American Cancer Societys Relay for Life and American Heart Associations Saving Strokes.
Medical mission work
Starting in 2015 Adventist Health Glendale has had a partnership with Armenia Fund to provide medical services to Noyemberyan hospital, in Noyemberyan, Armenia. For each medical mission trip Adventist Health Glendale buys large amounts of medical equipment, surgical supplies, pharmaceuticals, and other required medical/surgical items. And Armenia Fund ships the medical supplies to Noyemberyan hospital. 5,750 patients have been given care in internal medicine, cardiology, pulmonology, gynecology, neurology, orthopedics, and pediatrics. 235 surgeries were done, from gallbladder, hernia, orthopedic, and maxillofacial procedures to remove lumps and tumors.
Services
The services of Adventist Health Glendale are: Behavioral medicine, cardiology, diabetes, diagnostic imaging, drug rehabilitation, emergency department, Home health, hospice, laboratory, neonatal care, neuroscience, occupational therapy, oncology, pain management, pediatrics, physical therapy, radiology, sleep medicine, surgery, urgent care, wound care, and Women's health
Awards and recognitions
Awards
America's 250 Best Hospitals Award - Adventist Healt
|
https://en.wikipedia.org/wiki/Switch%20access
|
Switch access is the use of one or more switches to operate computers and other devices, and is primarily used by people with severe physical or cognitive impairment. A switch is an assistive technology device that replaces the need to use a computer keyboard or a mouse. It may allow users to control a computer, power wheelchair, video game console, tablet, smartphone, toy, and a variety of other electronic devices.
Types of switch
Switches come in a variety of shapes and sizes depending on the action used to activate them (such as sip-puff, pushing, pulling, pressing, blinking or squeezing). Switches also vary in their colour and aesthetics. For push or press switches, the amount of force required to operate them varies or in some cases can be adjusted. Some switches may only require a touch (not even a press), some may be designed to be kicked.
A switch can be operated by almost any body part that is able to produce consistent and voluntary movement.
Connecting a switch
A switch cannot be plugged directly into a computer. Instead a Switch Interface is required to bridge the gap between the switch and the computer's USB, serial, or PS/2 port.
What can be accomplished with a switch
Switches can be suitable for people with cognitive difficulties, developmental delays and physical limitations. In the simplest use they are a clear and simple way to demonstrate action/reaction often referred to as cause and effect. In the more complex use they could be the means to control mobility or interact with the environment.
There are a variety of motivating switch activities that can be used to assess and develop a person's understanding of choice and timing.
Switches can be linked to a variety of devices, for example: Augmentative and Alternative Communication devices, switch adapted toys, switch interfaces for computer access, SMART Technology, sensory room equipment and environmental control devices.
Switch types
The smallest amount of interaction that can be provided with a switch is binary switch input, as holding down the switch for a certain amount of time may be impossible for a sip and puff device or painful for someone with arthritis.
Some users will prefer to use one switch, others will prefer to use two and sometimes more. For users who are using their switches to access simple activities an additional switch brings about an option of choice. It also allows two users to work collaboratively or to play against each other.
Considering multiple switch access is important for users accessing more advanced activities through switch access scanning. This is usually determined by their physical capabilities. A single switch requires less physical control and is usually less tiring to access but it reduces scanning options and usually leads to a slower rate of input. Single-switch scanning also requires much greater concentration. Two-switch scanning enables a range of scanning options, including row-and-column and overscan. These can greatly inc
|
https://en.wikipedia.org/wiki/CER-203
|
CER ( – Digital Electronic Computer) model 203 is an early digital computer developed by Mihajlo Pupin Institute (Serbia) in 1971. It was designed to process data of medium-sized businesses:
In banks, for managing and processing of accounts, bookkeeping, foreign-currency and interest calculations, amortization plans and statistics
In manufacturing, for production planning and management, market data processing and forecasting, inventory management, financial document management and process modelling
In utilities, to calculate water and electricity consumption, to produce various reports and lists and for technical calculations and design
In construction industry for network planning method design, financial management and bookkeeping
In trading companies for payment processing, market analysis, inventory management and customer and partner relationship management
Specifications
Central Processing:
Type: BMS-203
Number of instructions: 32
Performance:
one 16-cycle instruction: 20 μs
one single cycle instruction: 5 μs
addition and/or subtraction of two 15-digit numbers: 20 μs
Primary memory:
Capacity: 8 kilowords
Speed (cycle time): 1 μs
Complete, autonomous memory error checking
Parity control
Punched tape reader:
Dielectric-based reading
Speed: 500 to 1,000 characters per second
Accepts 5, 7 and 8-channel tapes
Tape puncher:
Speed: 75 characters per second
Parallel Line Printer 667:
"On the fly" printing
128 characters per line
Removable/replaceable printing cylinder
Speed:
500 lines per minute for a character set of 63 characters
550 lines per minute for a character set of 50 characters
Automatic paper feeder
Two line spacing settings
Programamtic tape for discontinuous paper movement
Maximum number of carbon copies: 6
Independent Printer M 30:
132 characters per line
Speed:
Prints 25 alphanumeric characters per second
Prints 33 numeric characters per second
Tabulation speed: 144 characters per second
Blank printing speed: 100 characters per second
Maximum number of carbon copies: 6
Magnetic cassettes 4096:
Capacity: 600,000 characters
Variable record length
Transfer rate: 857 characters per second
Tape speed: 10 inches per second
Magnetic Tape Drives:
Data format: 9-track ASCII with inter-record space of
Data density: 556/800 bits per inch
Capacity per tape: 10,000,000 characters
Tape speed: 24 inches/s, 150 inches/s fast-forward and rewind
Transfer rate: 19.2 kHz
Tape width:
Tape length:
Working ambient temperature range: 5 °C to 40 °C
Relative humidity: up to 80%
Integrated circuit control logic
Separate control panel for each drive
Read/Write Capabilities:
Read and Write forward
Read forward
Read reverse
See also
CER Computers
Mihajlo Pupin Institute
History of computer hardware in the SFRY
References
M.Momcilovic, D.Hristovic, P.Vrbavac et al.:"Domaci cifarski el.racunari CER", Zbornik Savetovanja AOP u preduzecima, pp. 38–58, Nova Varos YU, May 22, 1969. (in Serbian);
|
https://en.wikipedia.org/wiki/The%20Woodwright%27s%20Shop
|
The Woodwright's Shop is an American traditional woodworking show hosted by master carpenter Roy Underhill and airing on television network PBS. It is one of the longest running how-to shows on PBS, with thirty-five 13-episode seasons produced. Since its debut in 1979, the show has aired over 400 episodes. The first two seasons were broadcast only on public TV in North Carolina; the season numbering was restarted when the show went national in 1981. It is filmed at the UNC-TV (University of North Carolina Center for Public Television) studios in Research Triangle Park, North Carolina.
Overview
The Woodwright's Shop teaches the art of traditional woodworking, using hand tools and human-powered machines. Viewers learn how to make furniture, toys, and other useful objects out of wood. Viewers also learn how to lay out wood projects and which tools to use for specific purposes. The show also teaches viewers how to use tools properly.
The host, Roy Underhill, instructs viewers on creating wooden joints using hand tools and machine tools.
Wood joints
Underhill often shows the viewers how to create several useful and strong wooden joints, which are commonly used in carpentry.
Mortise and tenon: This joint is often used for two pieces of wood that attach at right angles to each other in a "T" shape.
Tongue and groove: Tongue and groove joints are typically used for large surfaces such as a series of wooden panels on a wall or a table top.
Dovetail joint: This joint is typically used for the corners of boxes.
Rabbet: A rabbet joint is one of the simplest joints used on the show.
Timber framing techniques are often used in conjunction with the wood joints described on the show.
Hand tools
Hand tools are a major focus of the show. All of the hand tools used on the show are manually operated (i.e. non-electric).
Chisel: The chisel is one of the most commonly used tools on the show and is typically used to shave down material and to square up holes.
Wooden mallet: The mallet is often used to drive the chisel into the workpiece.
Bow saw: The bow saw is often used by Underhill to cut large pieces of wood and to make curved cuts.
Brace and bit: Most of the drilling on the show is done with a brace and bit which is a hand powered drill.
Plane: Underhill uses the plane to level out surfaces and to square up joints.
Hatchet: Large pieces of wood are cut down to manageable size with a hatchet.
Drawknife: This tool is often used to quickly remove excess material.
Adze: The adze is used to hollow out surfaces like a chair seat.
Proper handling and maintenance of tools is also part of the show. This includes the sharpening and sometimes making of tools, such as a scraper made from an old saw blade.
Machine tools
The most commonly used machine tool on the show is the lathe. Underhill typically uses a treadle lathe, but has also shown the viewers how to build and operate a spring pole lathe. He also often uses a gouge, in conjunction with his lathe, to
|
https://en.wikipedia.org/wiki/Making%20the%20Most%20of%20the%20Micro
|
Making the Most of the Micro is a TV series broadcast in 1983 as part of the BBC's Computer Literacy Project. It followed the earlier series The Computer Programme. Unlike its predecessor, Making the Most of the Micro delved somewhat deeper into the technicalities and uses that microcomputers could be put to, once again mainly using the BBC Micro in the studio for demonstration purposes. The series was followed by Micro Live.
Presenters
Ian McNaught-Davis (known as 'Mac') was once again the anchorman but Chris Serle and Gill Nevill were absent, instead various experts were brought in as required to demonstrate some of the more technical aspects of the microcomputers and their uses. John Coll was the main technical 'bod' (he had also written the User Guide for the BBC Micro along with other manuals) and Ian Trackman also featured - he wrote most of the software that was used for demonstrating certain features of the microcomputer, not only for this series but also The Computer Programme and Computers in Control. The programme also featured location reports to demonstrate various practical and business uses of microcomputers.
The title and incidental music was by Roger Limb of the BBC Radiophonic Workshop.
Programmes
The series was split into 10 programmes, each about 25 minutes long and dealing with a particular subject area. They were as follows (original airdates in brackets):
The Versatile Machine (10 January 1983)
Getting Down to BASIC (17 January 1983)
Strings and Things (24 January 1983)
Introducing Graphics (31 January 1983)
Keeping a Record (7 February 1983)
Getting Down to Business (14 February 1983)
Sounds Interesting (21 February 1983)
Everything Under Control (28 February 1983)
Moving Pictures (7 March 1983)
At the End of the Line (14 March 1983)
See also
Micro Men
The Computer Programme
Computers in Control
Micro Live
External links
Ian Trackman's web site
BBC Television shows
Computer science education in the United Kingdom
Computer television series
1983 British television series debuts
1983 British television series endings
English-language television shows
|
https://en.wikipedia.org/wiki/RCO
|
RCO may refer to:
Air Force Rapid Capabilities Office
Recovery Consistency Objective, in computing
Refugee-led Community Organisation
Regional Currency Office
Remote Communications Outlet
Rifle combat optic
Royal College of Organists
Royal Concertgebouw Orchestra, a Dutch orchestra
Rugby Clube de Oeiras
|
https://en.wikipedia.org/wiki/IBM%20Chiphopper
|
Chiphopper is a component of the IBM eServer products specifically tailored to the Linux operating system. IBM developed the server products in a collaborative effort with Red Hat and Novell of SUSE Linux ownership at the time. The official name of the product suite is IBM Systems Application Advantage for Linux. Chiphopper is a set of system support and testing tools designed to assist development and porting of Linux x86 applications onto other IBM systems and middleware platforms. The Chiphopper offering helps developers whose applications run on x86 Linux systems by providing tools to scrub their C/C++ code for portability prior to porting to Power ISA and System z systems. Source hardware platforms for 32- and 64-bit applications are x86, EM64T, and AMD systems running Linux Standard Base (LSB) 3.x certified Linux distributions.
References
Linux software
IBM software
|
https://en.wikipedia.org/wiki/Srm%20%28Unix%29
|
srm (or Secure Remove) is a command line utility for Unix-like computer systems for secure file deletion. srm removes each specified file by overwriting, renaming, and truncating it before unlinking. This prevents other people from undeleting or recovering any information about the file from the command line.
Platform-specific behaviours and bugs
Filesystems with hard links
Attempting to secure delete a file with multiple hard links results in a warning from srm stating that the current access path has been unlinked, but the data itself was not overwritten or truncated. This is an undocumented feature of srm 1.2.8 on Mac OS X 10.9, and is erroneously documented in 1.2.11 as a behaviour activated by the OpenBSD rm-compatible option -P. However, in both the OS X and SourceForge srm implementations, the behaviour of unlinking but not overwriting multi-linked files is always active, as long as the platform reports hard links.
srm 1.2.8 on Mac OS X 10.9 has a -n option, which means "overwrite file, but do not rename or unlink it." However, if the file has multiple links, the multiple-link file data protection feature activates first, removing the file, even though the -n option specifies "do not rename or unlink the file". The -n option has been removed from the code and manual of srm version 1.2.11, the latest SourceForge.net version. As a consequence, this option/feature conflict does not occur.
OS X
A number of file systems support file forks (called resource forks and named forks on OS X (particularly HFS+), and alternate data streams on NTFS), or extended attributes. However, OS X is the only platform on which srm securely deletes any of this additional data in files.
On OS X, only the most common non-data fork, the resource fork, is handled in this way. This support was included in Apple’s 1.2.8 and SourceForge's 1.2.9.
srm was removed from OS X/macOS in v10.11 El Capitan, as part of the removal of the "Secure Empty Trash" feature for security reasons.
OpenBSD
In srm 1.2.11, released on 25 November 2010, the OpenBSD rm-compatible option, -P, is documented have an overwriting pattern matching OpenBSD's rm. Additional functionality which protects multi-linked files is documented under the OpenBSD-compatible option, but is actually always active.
Windows
When securely deleting files recursively, srm 1.2.11 is unable to determine device boundaries on Windows. Therefore, the -x option, which restricts srm to one file system, is not supported.
See also
rm (Unix): remove file in Unix.
Data remanence
shred (Unix)
List of free and open-source software packages
References
External links
Sourceforge Page
Unix file system-related software
Unix security-related software
Data erasure software
|
https://en.wikipedia.org/wiki/Orange%20Micro
|
Orange Micro Inc. was an American computer hardware company that made products for use with Apple computers. The company made a variety of products for many machines, ranging from the Apple II series to the Macintosh line. The company went out of business in 2004.
Products
Products for the Apple II series
Orange Micro entered the market for third-party Apple hardware developing peripherals for the Apple II series. Notably, the company developed the famed Grappler+ card, providing easy way to print Graphics on old dot matrix printers, and later a parallel port adapter for the Apple IIc. It also developed memory extensions cards for the Apple IIGS.
PC compatibility
In the early 1990s, Orange Micro introduced what were described as "DOS compatibility cards". This was a concept first introduced in the Mac286 by AST Research, for which Orange Micro had purchased the rights. These cards essentially consisted of an entire PC on NuBus or PCI cards. They contained enough hardware in order to run PC software such as DOS and Windows at native hardware speeds: notably, an Intel-compatible CPU, RAM, sound cards, and video chipsets supporting CGA or VGA. Some hardware, such as disks, printers, modems and network interface cards, were emulated in software.
While Orange Micro sold their compatibility card under the Mac286 name for a time, later offerings were based on the 80386, 80486, and Pentium lines. Additional cards offered support for AMD, Cyrix, and IDT processors, offering a lower cost.
An example of such a PC compatibility card was the OrangePC Model 220. This card, for NuBus-based Macintoshes, included a 66 MHz 486DX2 and 8MB of preinstalled memory. In December 1995, its retail price was US$1127.
A later model, the OrangePC 620 series, offered a 200 or 233 MHz processor. In 1998, it started at US$399, significantly less than previous incarnations. Various 620 models utilized processors from Intel, AMD, and IDT. High-end models included a Sound Blaster chipset, while more affordable options provided software emulation, with the caveat that sound could not be played in MS-DOS software.
One of its last PC compatibility offerings was the OrangePC 660, introduced in late 1998, supporting a Socket 7 CPU from 100 MHz Pentium up to a 400 MHz K6-III processor, NVIDIA RIVA 128 chipset, and two DIMM slots for up to 256MB of SDRAM. The PCfx!, introduced in late 1998, was a simplified OrangePC 660. The PCfx! includes a soldered-on 200 MHz Pentium processor, NVIDIA RIVA 128 chipset, and only 1 DIMM slot for up to 128MB of SDRAM, the PCfx! was marketed as a way for Macintosh users to play PC games.
The need for such specialized compatibility hardware was eliminated after the Mac transition to Intel processors, particularly after the release of Boot Camp and virtualization software such as Parallels Desktop for Mac and VMware Fusion.
Competition
Competitors to the Orange Micro compatibility solutions at the time of its heyday included SoftPC or SoftWindows
|
https://en.wikipedia.org/wiki/Mad%20TV%20%28season%201%29
|
Mad TV was an American sketch comedy series, Season 1 originally aired in the United States on the Fox Network between October 1995, and June 1996.
Mad TVs first season premiered in the 1995 television season, on October 14 at 11:00 pm, thirty minutes before the time-slot of its rival, Saturday Night Live.
The original Mad TV repertory cast members were Bryan Callen, David Herman, Orlando Jones, Phil LaMarr, Artie Lange, Mary Scheer, Nicole Sullivan, and Debra Wilson, with Craig Anton as a featured player. The first season's cast was a mixture of seasoned television and film veterans like LaMarr, Herman, and Scheer, and relatively unknown newcomers like Callen, Jones, Lange, Sullivan, and Wilson. The cast was one of the most ethnically diverse sketch comedy casts of the 1990s, with one Native American (and half Irish) man, one Jewish-American man, two African-American men, one black woman, two white men and two white women.
Season one of Mad TV relied heavily on the fan base of MAD Magazine. Each episode featured the use of the MAD logo (which is still used today), Alfred E. Neuman images and puns, the Spy vs. Spy cartoons, and the catchphrase "What...me worry?" The first season also established some of the series' landmark characters like Jaq the UBS Guy (LaMarr), The Vancome Lady (Sullivan), Clorox (Anton), Mrs. Jewel Barone (Scheer) and Momma (Lange) from That's My White Momma. This season also produced several enduring celebrity parodies like Oprah Winfrey (Wilson), Tom Hanks (Herman) in Gump Fiction and Dennis Rodman (Jones) making a public service announcement.
Unlike Saturday Night Live, Mad TV had no celebrity hosts during its first season. However, the show did have special guests including Kato Kaelin, Joe Walsh and Dean Stockwell, Peter Marshall, Michael Buffer, Adam West, Gary Coleman, Jamie Farr, Ken Norton, Jr, David Faustino, Claudia Schiffer, Kim Coles, Bruce McCulloch, Tony Orlando, and Harland Williams. Musical groups such as Poison, Pharcyde, and Ice-T also made appearances on the show.
Opening montage
The title sequence begins with several fingers pointing at a bomb. The bomb explodes and several different pictures of Alfred E. Neuman appear on the screen, followed by the Mad TV logo. The theme song, performed by the hip-hop group Heavy D & the Boyz, begins. Cast members are introduced alphabetically with their names appearing in caption over live-action clips of each performer. More pictures of Alfred E. Neuman appear between the introduction of each cast member. When the last cast member is introduced, the music stops and the title sequence ends with the phrase "You are now watching Mad TV."
Cast
Repertory cast members
Bryan Callen (19/19 episodes)
David Herman (19/19 episodes)
Orlando Jones (19/19 episodes)
Phil LaMarr (19/19 episodes)
Artie Lange (15/19 episodes)
Mary Scheer (19/19 episodes)
Nicole Sullivan (19/19 episodes)
Debra Wilson (19/19 episodes)
Featured cast members
Craig Anton
|
https://en.wikipedia.org/wiki/Bibliographic%20database
|
A bibliographic database is a database of bibliographic records. This is an organised online collection of references to published written works like journal and newspaper articles, conference proceedings, reports, government and legal publications, patents and books. In contrast to library catalogue entries, a majority of the records in bibliographic databases describe articles and conference papers rather than complete monographs, and they generally contain very rich subject descriptions in the form of keywords, subject classification terms, or abstracts.
A bibliographic database may cover a wide range of topics or one academic field like computer science. A significant number of bibliographic databases are marketed under a trade name by licensing agreement from vendors, or directly from their makers: the indexing and abstracting services.
Many bibliographic databases have evolved into digital libraries, providing the full text of the organised contents:for instance CORE also organises and mirrors scholarly articles and Our Research develops a search engine for open access content in Unpaywall. Others merge with non-bibliographic and scholarly databases to create more complete disciplinary search engine systems, such as Chemical Abstracts or Entrez.
History
Prior to the mid-20th century, individuals searching for published literature had to rely on printed bibliographic indexes, generated manually from index cards. "During the early 1960s computers were used to digitize text for the first time; the purpose was to reduce the cost and time required to publish two American abstracting journals, the Index Medicus of the National Library of Medicine and the Scientific and Technical Aerospace Reports of the National Aeronautics and Space Administration (NASA). By the late 1960s such bodies of digitized alphanumeric information, known as bibliographic and numeric databases, constituted a new type of information resource. Online interactive retrieval became commercially viable in the early 1970s over private telecommunications networks. The first services offered a few databases of indexes and abstracts of scholarly literature. These databases contained bibliographic descriptions of journal articles that were searchable by keywords in author and title, and sometimes by journal name or subject heading. The user interfaces were crude, the access was expensive, and searching was done by librarians on behalf of 'end users'.
See also
Citation index
Document-oriented database
Full-text database
List of academic databases and search engines
Institutional repository
Online public access catalog (OPAC; library catalog)
ISBNdb.com
References
Information science
Library 2.0
|
https://en.wikipedia.org/wiki/Mad%20TV%20%28season%202%29
|
The second season of Mad TV, an American sketch comedy series, originally aired in the United States on the Fox Network between September 21, 1996, and May 17, 1997. The season had 22 episodes, and featured many of the same cast members as Season 1 had.
Season summary
The second season of Mad TV was not a radical departure from season one (largely the same cast, the same humor, and the same format), though there were some minor cast changes. Tim Conlon and Pablo Francisco joined as featured players while Artie Lange was fired midway through the season for his erratic behind-the-scenes behavior due to cocaine abuse.
The addition of a weekly guest host was the most notable difference of season two, the only season of Mad TV to feature one. Although every season has had several guest stars, season two's guest stars were referred to as "hosts" and appeared in nearly every sketch. Every episode had a new host, where as in other seasons, not every episode had a guest star and the guest star usually only appeared in a few sketches. The guest host format was similar to their main rival Saturday Night Live'''s, but Mad TV ended this format after season two (though later seasons would have special guest stars who appeared in sketches or did monologues).
This is the second and last season to air new Spy vs Spy and Don Martin animation before they added reruns to make up for not creating any new episodes.
Opening montage
The title sequence for season two is exactly the same as the previous season, except the theme song features more bass. The sequence starts with several fingers pointing at a bomb. The bomb explodes and several different pictures of Alfred E. Neuman appear, followed by the Mad TV logo. The theme song, which is performed by the hip-hop group Heavy D & the Boyz, begins. Cast members are introduced alphabetically with their names appearing in caption over live-action clips of them. More pictures of Alfred E. Neuman appear between the introduction of each cast member. When the last cast member is introduced, the music stops and the title sequence ends with the phrase "You are now watching Mad TV."
Cast
Repertory cast members
Bryan Callen (22/22 episodes)
David Herman (22/22 episodes)
Orlando Jones (22/22 episodes)
Phil LaMarr (22/22 episodes)
Artie Lange (10/22 episodes; last episode: January 4, 1997)
Mary Scheer (22/22 episodes)
Nicole Sullivan (22/22 episodes)
Debra Wilson (21/22 episodes)
Featured cast members
Craig Anton (1/19 episodes)
Tim Conlon (3/19 episodes)
Pablo Francisco (4/19 episodes)
Writers
Fax Bahr (eps. 1-22)
Stuart Blumberg (eps. 1-14)
Garry Campbell (eps. 1-22)
Blaine Capatch (eps. 1-22)
Leonard Dick (eps. 3, 6)
Lauren Dombrowski (eps. 1-22)
Chris Finn (eps. 1-22)
Spencer Green (eps. 1-22)
Brian Hartt (writing supervisor) (eps. 1-22)
Steve Hibbert (ep. 15)
Tim Hightower (eps. 1-22)
Brad Kaaya (eps. 1-22)
Patton Oswalt (eps. 1-22)
Mary Scheer (ep. 5)
Michael Short (creative consultant)
|
https://en.wikipedia.org/wiki/Mad%20TV%20%28season%203%29
|
The third season of Mad TV, an American sketch comedy series, originally aired in the United States on the Fox Network between September 20, 1997, and May 16, 1998.
Season summary
At the start of season three, one fourth of the original cast (Bryan Callen, Orlando Jones and Artie Lange [who left midway through season 2 due to his cocaine addiction] and featured player Pablo Francisco) was replaced by newcomers Alex Borstein (who would later do voicework and writing work on FOX's Family Guy and have a supporting role on The Marvelous Mrs. Maisel), Chris Hogan, Pat Kilbane, Lisa Kushell, Will Sasso, and Aries Spears.
This was the last season to feature original cast members David Herman (who went on to do voice acting work and appear in such Mike Judge projects as King of the Hill and Idiocracy) and Mary Scheer (who quit show business temporarily to be a full-time mother).
This was the last season Fax Bahr and Adam Small would produce Mad TV with Quincy Jones and David Salzman, although Barr and Small are still credited as "executive consultants". They went on to create Blue Collar TV, a similar sketch show that ran from 2004 to 2006 on the WB.
This was the last season Alfred E. Neuman and the bomb sequence was seen in the opening credits. However, Neuman's image still appeared on the Mad TV stage in the fourth season. There were reruns of Spy vs. Spy and Don Martin cartoon shorts in this season as well as the fourth and fifth seasons since the last episodes starring them were in the second season.
Spy vs Spy pictures were appeared on cameo idle on this season.
This was the first season in which Mad TV showed "classics", i.e. reruns of sketches from previous seasons.
Opening montage
The title sequence begins with several fingers pointing at a bomb. Then the bomb explodes and a picture of Alfred E. Neuman and a brain appears on a purple screen followed by the Mad TV logo. The theme song, which is performed by the hip-hop group Heavy D & the Boyz, begins. Cast members are introduced alphabetically with their names appearing in caption over black-and-white still photos of them. When the last cast member is introduced, the music stops and the title sequence ends with the phrase "You are now watching Mad TV."
Cast
Repertory cast members
Alex Borstein* (20/25 episodes)
David Herman (4/25 episodes; last episode: November 1, 1997)
Chris Hogan * (23/25 episodes)
Pat Kilbane * (25/25 episodes)
Lisa Kushell* (25/25 episodes)
Phil LaMarr (25/25 episodes)
Will Sasso (25/25 episodes)
Mary Scheer (17/25 episodes)
Aries Spears (24/25 episodes)
Nicole Sullivan (25/25 episodes)
Debra Wilson (24/25 episodes)
Featured cast members
Craig Anton
Tim Conlon
* Performer was a featured cast member at the start of the season, but was promoted to repertory status mid-season.
Writers
Fax Bahr (eps. 1-25)
Garry Campbell (eps. 1-25)
Blaine Capatch (eps. 1-25)
Lauren Dombrowski (eps. 1-25)
Chris Finn (eps. 20, 25)
Spencer Green (eps. 1-2
|
https://en.wikipedia.org/wiki/Mad%20TV%20%28season%205%29
|
The fifth season of Mad TV, an American sketch comedy series, originally aired in the United States on the Fox Network between September 25, 1999, and May 20, 2000.
Summary
Season 5 of Mad TV began with only a few changes to the cast: Nelson Ascencio (the show's first Cuban-American cast member and first cast member to have an identical twin brother who sometimes appeared in sketches with him) and Brooke Totman joined the show as featured players. This was the last season for Pat Kilbane and original cast member Phil LaMarr, and would be the only season for Brooke Totman. This would be the final season for the Spy vs. Spy shorts.
The previous year's newcomers, Michael McDonald and Mo Collins, reprised their wacky mother/son duo Stuart and Doreen Larkin; separately, Collins played Lorraine Swanson and McDonald played Marvin Tikvah and Rusty Miller. Alex Borstein's Ms. Swan starred in the multi-part sketch "Swan: The Homecoming," which featured special celebrity appearances in each episode by Garry Marshall, Mark Hamill, Dennis Hopper, Susan Sarandon, and Tony Shalhoub. After a noticeable weight loss, Will Sasso began to impersonate more celebrities such as James Gandolfini. Nicole Sullivan would be the first cast member to portray pop star Britney Spears. Aries Spears and Debra Wilson introduced a sketch called Reality Check, a fictitious talk show on BET. This May 13, 2000 episode is referenced in Indigo White's Kimber's Home YouTube video when he describes a transgender journey that was parodied in the fictitious "Kimber's Home Alone" sketch.
Former Mad TV alumnus Artie Lange made a special appearance, as well as celebrities Carmen Electra, Catherine O'Hara, George Carlin, Regis Philbin, Tim Robbins, and Alex Borstein's Family Guy co-star Seth Green (as recurring character Mr. Brightling).
Opening montage
The Mad TV logo appears and the theme song, which is performed by the hip-hop group Heavy D & the Boyz, begins. Cast members are introduced alphabetically. When the last cast member is introduced, the music stops and the title sequence ends with the phrase "You are now watching Mad TV."
Cast
Repertory cast members
Alex Borstein (25/25 episodes)
Mo Collins (25/25 episodes)
Pat Kilbane (25/25 episodes)
Phil LaMarr (17/25 episodes)
Michael McDonald (25/25 episodes)
Will Sasso (25/25 episodes)
Aries Spears (25/25 episodes)
Nicole Sullivan (20/25 episodes)
Debra Wilson (25/25 episodes)
Featured cast members
Nelson Ascencio (4/25 episodes, first episode: November 27, 1999)
Brooke Totman (4/25 episodes, first episode: January 15, 2000)
Writers
Bryan Adams (eps. 1-25)
Russell Arch (ep. 4)
Dick Blasucci (eps. 1-25)
Alex Borstein (eps. 11, 21, 25)
Garry Campbell (writing supervisor) (eps. 1-25)
Blaine Capatch (eps. 3, 8, 12) (eps. 3, 8: Encore)
Greg Cohen (eps. 1-11)
Xavier Cook (eps. 15-25)
Lauren Dombrowski (eps. 1-25)
Dave Hanson (ep. 14) (Season 01 Encore)
Brian Hartt (eps. 1-25)
Michael Hitchcock (eps. 1-2
|
https://en.wikipedia.org/wiki/Mad%20TV%20%28season%204%29
|
The fourth season of Mad TV, an American sketch comedy series, originally aired in the United States on the Fox Network between September 12, 1998, and May 22, 1999.
Season summary
The new season had several cast changes. Mary Scheer, Chris Hogan, and Lisa Kushell left the show. Andrew Bowen (in what would be his only season) and Mo Collins joined as repertory players, with Michael McDonald as a featured player (and later upgraded to the repertory status). Nicole Sullivan did not appear in the first five episodes of the fourth season. However, she did return in the sixth episode, the show's Halloween special, performing her popular characters Antonia and The Vancome Lady.
Season four had a notable change of pace and format compared to the first three seasons. The show had a faster pace and began to use recurring characters more, as seen with the wacky mother/son duo Doreen (Collins) and Stuart (McDonald) Larkin. Separately, Collins played the eccentric Midwestern character Lorraine Swanson and McDonald played sleazy Jewish director Marvin Tikvah and overexcited dweeb Rusty Miller in sketches that appeared in heavy rotation.
Original cast players Nicole Sullivan and Debra Wilson introduced new characters, playing Latina bimbos Lida and Melina together, while Wilson performed Bunifa, a fast-talking ghetto fabulous girl. Alex Borstein frequently appeared as Ms. Swan and Rosie O'Donnell; Pat Kilbane appeared as the Coffee Guy and the spokesman for Spishak, and performed his Howard Stern impersonation; Will Sasso frequently impersonated famous people such as Bill Clinton, Kenny Rogers, and Steven Seagal; Aries Spears did several impersonations such as Eddie Murphy, Bill Cosby and Magic Johnson, as well as his reoccurring character James Brown Jr.
Season four was marked by one notable controversy. During the February 6, 1999 episode, Bret Hart appeared in a sketch with Will Sasso. Hart, a WCW wrestler, attacked Sasso during filming. It was unclear whether the attack was scripted or an ad-libbed part that was kept in, until a Mad TV head writer revealed that the fight was not scripted, was real, and Sasso was actually injured from it. Hart returned three weeks later to accept Sasso's challenge of an arm-wrestling match.
Opening montage
The Mad TV logo appears against the backdrop of a busy street in Los Angeles. The theme song, which is performed by the hip-hop group Heavy D & the Boyz, begins. Cast members are introduced alphabetically, with their names appearing in caption over a slow-motion montage of color still photos of them. When the last featured cast member is introduced, the music stops and the title sequence ends with the phrase "You are now watching Mad TV."
Cast
Repertory cast members
Alex Borstein (25/25 episodes)
Andrew Bowen (25/25 episodes)
Mo Collins (19/25 episodes)
Pat Kilbane (25/25 episodes)
Phil LaMarr (25/25 episodes)
Michael McDonald* (20/25 episodes)
Will Sasso (25/25 episodes)
Aries Spears (25/25 ep
|
https://en.wikipedia.org/wiki/Form%20%28computer%20virus%29
|
Form was a boot sector virus isolated in Switzerland in the summer of 1990 which became very common worldwide. The origin of Form is widely listed as Switzerland, but this may be an assumption based on its isolation locale. The only notable characteristics of Form are that it infects the boot sector instead of the Master Boot Record (MBR) and the clicking noises associated with some infections. Infections under Form can result in severe data damage if operating system characteristics are not identical to those Form assumes.
It is notable for arguably being the most common virus in the world for a period during the early 1990s.
Infection
Form infects the boot sector. When a computer is booted from an infected sector, Form goes resident, hooks the interrupt vector table, and runs the original boot sector which it has hidden in an area it flags as defective. It will subsequently infect any media inserted into the machine.
Symptoms
Form has a range of symptoms, most of which will not be evident in all infections:
Form's most famous side effect is a clicking noise produced by typing on the keyboard on the 18th of every month. However, this payload very rarely appears on modern computers, as it will not execute if a keyboard driver is installed.
Form consumes 2KB of memory, and the DOS MEM command will report that this memory is unavailable. This appears on all infections.
On floppy disks, 1 KB (2 bad sectors) will be reported. This appears in all infections.
The Form data sector contains the text "The FORM-Virus sends greetings to everyone who's reading this text. FORM doesn't destroy data! Don't panic! Fuckings go to Corinne." Additionally, some versions of Form have had this text removed.
Form makes the assumption that the active partition is a DOS FAT partition. If this is not true, such as under Windows NT, Form will overwrite in a way that may result in irreversible data loss.
Prevalence
Form was listed as spreading by the WildList from the first ever version of the WildList in July 1993 until January 2006.
As with most boot viruses, a Form infection is a rare find in modern times. Since the advent of Windows, boot viruses have become increasingly uncommon, including Form. Generally, Form infections are due to the use of floppy disks infected during the original pandemic that have since been taken out of storage.
Variants
Form has a number of variants. The widely documented versions are as follows.
Form.A is a common variant of the original, where the clicking payload occurs every day, as opposed to just the 18th.
Form.B is a minor variant of the original, with the clicking payload set for the 24th of each month instead of the 18th. It was a rare find in the field during the mid-1990s, but has since become extinct in the wild.
Form.C is a virtually undocumented, trivial variant of the original. It is suggested that Form.C is another minor variant of Form, which only activates in May. Like Form.B, it was documented as being discovered
|
https://en.wikipedia.org/wiki/The%20One%20with%20All%20the%20Thanksgivings
|
"The One with All the Thanksgivings" (also known as "The One with the Thanksgiving Flashbacks") is the eighth episode of the fifth season of Friends. It first aired on the NBC network in the United States on November 19, 1998. In the episode, the main characters spend Thanksgiving at Monica's (Courteney Cox) apartment and begin telling stories about their worst Thanksgivings: Chandler (Matthew Perry) learning of his parents' divorce, Phoebe (Lisa Kudrow) losing arms in past lives and Joey (Matt LeBlanc) having his head stuck in a turkey. Rachel (Jennifer Aniston) reveals Monica's worst Thanksgiving—accidentally cutting off Chandler's toe after he called her "fat" in their first encounter. When Monica begs Chandler to forgive her, he accidentally reveals that he loves her.
The episode was directed by Kevin S. Bright and written by Gregory S. Malins. It guest-stars Elliott Gould and Christina Pickles as Jack and Judy Geller, with a cameo appearance by Morgan Fairchild as Nora Tyler Bing. The idea was conceived by the writers, who suggested short stories about the "worst Thanksgivings ever". A flashback approach was incorporated as the producers realized the audience responded well to it, despite concern the episode might be confused for a clip show.
In its original broadcast the episode reached a 16.0 Nielsen rating and finished the week ranked second. The episode earned Debra McGuire a Primetime Emmy Award nomination for Outstanding Costume Design for a Series. Since airing, it frequently ranks high in polls about the series' best episode.
Synopsis
Ross's (David Schwimmer) complaint that his divorce and eviction means he is having the worst Thanksgiving ever prompts the others to tell their stories. Chandler (Matthew Perry) reminds everyone of when his parents told him they were divorcing. Phoebe (Lisa Kudrow) then tells a story from a past life when she was an American Civil War nurse in 1862 and lost an arm, though Ross objects, with the demand of only tales of present lives.
Rachel (Jennifer Aniston) says she knows Monica's (Courteney Cox) worst Thanksgiving, but Phoebe interrupts with a story about the time Joey (Matt LeBlanc) had a turkey stuck on his head in 1992. Unsuccessful at pulling the turkey off Joey's head, which he had put on to scare Chandler, Phoebe enlists help from Monica, who needs to bring the turkey to feed a dinner party at her parents' house. Phoebe and Monica continue to pull at the turkey off of Joey's head until Chandler arrives and is scared by Joey.
Monica tells of what she thinks is her worst Thanksgiving. In 1987, Monica and Rachel are 18 years old and seniors in high school, and an overweight Monica spends time comforting Rachel, after Chip ends their relationship. Ross and Chandler arrive from college to spend Thanksgiving with Ross and Monica's parents, who are unamused upon learning that Chandler hates Thanksgiving and does not eat Thanksgiving food. Monica, who develops a crush on Chandler, cooks macaroni a
|
https://en.wikipedia.org/wiki/ATN%20B4U%20Music
|
ATN B4U Music is a Canadian Category B Hindi language specialty channel owned by Asian Television Network (ATN). ATN B4U Music broadcasts music-related programming primarily in the form of a variety of music video-based programs and interview series. Programs are primarily sourced from B4U Music, an Indian-based television channel, in addition to locally produced Canadian content.
History
In April 2005, ATN was granted approval from the Canadian Radio-television and Telecommunications Commission (CRTC) to launch a television channel called ATN - Music Network One (Hindi Music) - AMN1, described as "a national ethnic Category 2 pay television programming undertaking devoted to music programming, interviews with the artists, scenes from the production of their music videos and songs, all in the Hindi language."
The channel launched on April 4, 2006 as ATN B4U Music initially on Rogers Cable.
On September 25, 2012, B4U Music's broadcasting license to operate as a pay service was revoked at ATN's request. The channel subsequently re-launched as a regular specialty service on June 17, 2012, under the following license: ATN- Music Network One (Hindi Music) - AMN1.
References
External links
B4U Music
Digital cable television networks in Canada
Music video networks in Canada
Television channels and stations established in 2006
Hindi-language television in Canada
|
https://en.wikipedia.org/wiki/Mad%20TV%20%28season%2011%29
|
The eleventh season of Mad TV, an American sketch comedy series, originally aired in the United States on the Fox Network between September 17, 2005, and May 20, 2006.
Summary
With Spencer Kayden, Ron Pederson, Aries Spears, and Paul Vogt gone from the cast, season eleven saw more changes to the show's cast (Stephanie Weir had also left the show, but was still credited as a cast member. The reason behind this was that Weir agreed to appear in four new episodes' worth of material, which are scattered throughout the season, technically making this her final season). Because of FOX's cast budget cuts, the only new cast members hired were Arden Myrin (who was immediately hired as a repertory member) and featured players Frank Caeti (who resembled Frank Caliendo—a fact that was mentioned and mocked in the season premiere—and did impressions just like him) and Nicole Randall Johnson (marking this the first time in MADtv history to have more than one African-American female cast member, as Gaither was kept).
With the exception of Michael McDonald and Stephnie Weir, the majority of cast members in this season were born in the 1970s (some of which have birth years after Saturday Night Live'''s premiere in 1975) and were hired in the 2000s, making this the youngest cast in the show's history. This cast was also the most ethnically diverse since the original 1995 cast, with one East Asian male (Lee), one Jewish male (Barinholtz), four white males (McDonald, Caliendo, Caeti, and Barinholtz), two African-American males (Key and Peele), two African-American females (Gaither and Randall Johnson), and four white females (Parker, Myrin, Flanagan, and Weir).
Notable celebrity appearances this season include: Pamela Anderson (who hosted the show's 250th episode, is one of many celebrities who not only hosted Saturday Night Live, but also cameoed on MADtv, and was lampooned by both shows fairly frequently), Jeff Garlin, Alyson Hannigan, Neil Patrick Harris, Jaime Pressly, Michael Rapaport, John Cena, Jeff Probst, Pauly Shore, and Fred Willard
Opening montage
The title sequence opens with the Mad TV logo appearing against the skyline of Los Angeles. The theme song, performed by the hip-hop group Heavy D & the Boyz, begins and an announcer introduces each repertory cast member alphabetically, followed by the featured cast. The screen dissolves into three live-action clips of an individual cast member, then the three screens multiply until they fill the entire screen. Then all of the multiple clips flip over and displays another clip of the same cast member. As the multiple clips are reduced to one clip, a still color photo of the cast member is superimposed on the screen with his/her name appearing in caption over the photo. When the last cast member/guest is introduced, the music stops and the title sequence ends with the phrase "You are now watching Mad TV''."
Cast
Repertory cast members
Ike Barinholtz (22/22 episodes)
Frank Caliendo (19/22 episodes)
|
https://en.wikipedia.org/wiki/SEMCI
|
Single Entry Multiple Company Interface (SEMCI) is a computer system based on service-oriented architecture (SOA) that is used to submit the same information to multiple companies. SEMCI is use by insurance agents to insurance quotes from several insurance companies at once.
SEMCI is an interface which connects the software of the agent to the software of multiple companies so that an inquiry can go to all the companies at once. Previously, the agent would need to send the inquiry to each company individually.
References
External links
SEMCI home page
Enterprise application integration
Service-oriented (business computing)
|
https://en.wikipedia.org/wiki/Wireless%20Toronto
|
Wireless Toronto is a volunteer not-for-profit community wireless network in Toronto. Wireless Toronto began in 2005 with the goal of setting up no-cost public wireless Internet access around the Greater Toronto Area and exploring ways to use Wi-Fi technology to strengthen local community and culture. At its peak, Wireless Toronto hotspots served over 1000 connections per day at 38 individual locations.
Wireless Toronto hotspots are created using Linksys WRT54G or Motorola WR850G wireless routers running OpenWrt and WifiDog.
Other free wireless services in the GTA
The Toronto Public Library (TPL) offers free public wireless access in all of its 99 branches.
The Markham Public Libraries (MPL) offers free public wireless access in the Angus Glen Library, the Markham Village Library, the Thornhill Community Library, and the Unionville Library
Viva offers free wireless access on its Rapid Transit Vehicles
TOwifi offers a free Wi-Fi hotspot map
The TTC offers free, ad supported wireless service at many of its stations
See also
Municipal wireless network
List of wireless community networks by region
References
External links
Wireless Toronto Site
Wireless Toronto Blog
Wireless Toronto Locations Map
Toronto Public Library Free Wireless Internet Access Service
Toronto
Organizations based in Toronto
|
https://en.wikipedia.org/wiki/Catch%20the%20Sperm
|
Catch the Sperm is a Swiss computer game recognized as an entertaining way for health professionals to promote prevention of HIV.
The original Catch the Sperm (now known as CTS Style I) is a 3.4-megabyte action game created in 2001 and updated in 2002 and 2003 by Phenomedia AG CH for UNICEF and the Swiss Federal Office of Public Health's Stop AIDS Campaign. The game can be played on personal computer, mobile telephone, or cellular telephone.
The game was designed for free international distribution. The art / IP is owned by Ingo Mesche who created all the game graphics for the versions 2001-2013
Various versions
Catch the Sperm is available in seven versions:
CTS Style 1 (2001)
CTS Style 2 (2002)
Duel (2003)
Carnival (2003)
Summer (2003)
Swiss Soccer (2003)
Christmas (2003).
Each version has its own theme, sperm characters, virus villains, and screen graphics, some of which seem to have been designed to parody the original images .
CTS Style 1
The original Catch the Sperm (CTS Style 1) was created in 2001. It is set within the interior of a vagina or a rectum and the game commences amid orgasmic moans and groans. The characters are a Neutral Sperm, a Dual Techno Sperm, and a Precious Sperm. Various viruses are included as the villains.
CTS Style 2
CTS Style 2 is a 2002 update of the original Catch the Sperm game. Set in a blue environment that is ambiguous enough that it could represent either the ocean depths or outer space, it features a Frozen Sperm, a Supersperm, a Fool Sperm, a Jungle Sperm, an I-Sperm, and a Jurassic Precious Sperm.
Carnival
The Carnival edition of Catch the Sperm is set against a background of what appears to be surreal paintings and includes drifting balloons and floating strands of confetti, some of which are spiral shaped like uncoiling DNA double helixes. The characters are a Waggis, a Joker, a Sambina, a Lipstick, a Clown, and Gold, Silver, and Bronze Sperm. There are six viruses.
Summer
The Summer edition of Catch the Sperm is set in a sunny Caribbean ocean of light blue water, flowering underwater plants, and bright sunshine. The characters are a Submarine, an Orca, a Swimmer, a Water, and a Diver Sperm. As with the Carnival edition, the Summer version also includes six viruses.
Christmas
The Christmas edition of Catch the Sperm is a winter landscape over which the sperm characters fly rather than swim. As they travel through the frosty night, they pass illuminated and decorated Christmas trees, lit candles, bows, and icicles. The characters are a Chocolate Sperm that resembles milk chocolate; a bearded Santa Claus Sperm wearing a red stocking hat with a white pompom and a red flannel body suit; a Cold Sperm wearing a blue-and-green stocking cap and matching earmuffs; a white Snowy Sperm wearing a black top hat; and a Wrapped Sperm that is decorated with a bright red bow.
International versions
Catch the Sperm is available in many foreign language editions, including English, German, and Japa
|
https://en.wikipedia.org/wiki/KCPN-LD
|
KCPN-LD (channel 33) is a low-power television station in Amarillo, Texas, United States, affiliated with MyNetworkTV. It is owned by Nexstar Media Group alongside NBC affiliate KAMR-TV (channel 4); Nexstar also provides certain services to Fox affiliate KCIT (channel 14) under joint sales and shared services agreements (JSA/SSA) with Mission Broadcasting. The three stations share studios on Southeast 11th Avenue and South Fillmore Street in downtown Amarillo; KCPN-LD's transmitter is located on Dumas Drive (US 87-287) and Reclamation Plant Road in rural unincorporated Potter County.
Due to the station's low-power status, its signal contour is limited to the immediate Amarillo area, the nearby suburb of Bishop Hills and certain adjoining areas of Potter and Randall counties. Therefore, in order to reach the entire market, KCPN-LD is simulcast on KAMR-TV's second digital subchannel (4.2) from the same transmitter site. Ever since its inception, the KAMR-DT2 simulcast of this station had been presented in 480i standard definition, with most programs (including the MyNetworkTV prime time schedule) airing in letterboxed 4:3; however, around September 2017, it had been upgraded into 1080i full high definition.
History
Early history
The station first signed on the air on October 26, 1994, as K65GD, which originally transmitted on UHF channel 65. The station was founded by the Epic Broadcasting Corporation, then owner of KCIT. Operating as an independent station, it carried a mix of first-run and off-network syndicated programming, feature films and animated series.
On January 16, 1995, the station became a charter affiliate of the United Paramount Network (UPN), which was created as a partnership between Paramount Television and Chris-Craft/United Television. Outside of UPN prime time programming, the station otherwise continued to maintain a general entertainment programming format. Alongside UPN prime time programming, channel 65 initially carried some recent off-network sitcoms and drama series, movies on weekend afternoons and evenings, children's programming, and some first-run syndicated shows. That same year, Epic sold K65GD, KCIT and sister stations KJTL and KJBO-LP in Wichita Falls to the Wicks Broadcast Group. On November 21, 1997, the station adopted a conventional callsign as KCPN-LP (a combination of the calls of sister station KCIT and its affiliation with UPN), at which time, the station had also moved to UHF channel 33.
On January 6, 1999, Wicks announced that it would sell KCPN-LP and KCIT to Mission Broadcasting for $13 million. The day before the Mission Broadcasting purchase announcement, on January 5, Boston-based Quorum Broadcasting announced that it would purchase KAMR-TV from Cannan Communications as part of a $64-million, three-station deal). The acquisition of KCIT and KCPN was among the first station acquisitions for Mission, which originated as an arm of its creditor Bastet Broadcasting; the Bexley, Ohio-based group had
|
https://en.wikipedia.org/wiki/MetaMatrix
|
MetaMatrix was a U.S.-based technology company that created an enterprise information integration (EII) software product to deliver data services for service-oriented architectures. Founded in 1998 as Quadrian, MetaMatrix has development offices in St. Louis and Boston, and business offices in NY, Baltimore, Washington, DC, Boston, and London.
In June 2007, MetaMatrix was acquired by Red Hat for integration within service-oriented architecture environments served by Red Hat's JBoss middleware products.
Products
MetaMatrix offered products providing data services for service-oriented architectures (SOAs).
MetaMatrix Enterprise
MetaMatrix Dimension
MetaMatrix Query
External links
Official site (now redirects to the Red Hat MetaMatrix section.
MetaMatrix Dev Central developer community
Red Hat to acquire MetaMatrix
Red Hat acquisition completed (broken link)
Open Source project for the Integration Server
Open Source project for the Designer Tool
Open Source project that subsumes the MetaMatrix Metadata Repository
Companies based in Missouri
Companies established in 1998
Economy of St. Louis
Red Hat
Software companies based in Missouri
Defunct software companies of the United States
1998 establishments in the United States
1998 establishments in Missouri
Software companies established in 1998
|
https://en.wikipedia.org/wiki/KABE-CD
|
KABE-CD (channel 39) is a low-power, Class A television station in Bakersfield, California, United States, broadcasting the Spanish-language network Univision. It is owned and operated by TelevisaUnivision alongside Class A UniMás outlet KBTF-CD (channel 31) and Twist affiliate KUVI-DT (channel 45). The three stations share studios on Truxtun Avenue in the western section of Bakersfield; KABE-CD's transmitter is located atop Mount Adelaide.
In addition to its own digital signal, KABE-CD is simulcast in high definition on KUVI's second digital subchannel (45.2) from a separate transmitter atop Mount Adelaide.
History
K52DJ launched on July 31, 1989, as a translator of Fresno's Univision station KFTV. It was renamed KSUV-LP and moved to channel 39 in 1998 after Univision purchased UPN affiliate KUZZ-TV (now KUVI-DT) from Buck Owens. It was renamed to KBTF-LP in 2002 during the launch of TeleFutura (now UniMás). It was renamed to KABE-LP in 2004 after a callsign swap with the original KABE-CA (channel 31, now KBTF-CD). In 2013, the station obtained Class A status. In 2019, KABE started airing Court TV on its second digital subchannel as part of an agreement between Scripps and Univision for areas where KERO-TV's signal is not easily received.
Technical information
The True Crime Network affiliation was dropped on September 25, 2017, two weeks after KUVI obtained the affiliation; the 39.2 subchannel went dark until 2019, when it returned to the air with Court TV programming. The Court TV affiliation was dropped in 2021.
References
External links
Univision network affiliates
Court TV affiliates
ABE-CD
Television channels and stations established in 1989
1989 establishments in California
ABE-CD
ABE
|
https://en.wikipedia.org/wiki/Guard%20byte
|
A guard byte is a part of a computer program's memory that helps software developers find buffer overflows while developing the program.
Principle
When a program is compiled for debugging, all memory allocations are prefixed and postfixed by guard bytes. Special memory allocation routines may then perform additional tasks to determine unwanted read and write attempts outside the allocated memory. These extra bytes help to detect that the program is writing into (or even reading from) inappropriate memory areas, potentially causing buffer overflows. In case of accessing these bytes by the program's algorithm, the programmer is warned with information assisting him/her to locate the problem.
Checking for the inappropriate access to the guard bytes may be done in two ways:
by setting a memory breakpoint on a condition of write and/or read to those bytes, or
by pre-initializing the guard bytes with specific values and checking the values upon deallocation.
The first way is possible only with a debugger that handles such breakpoints, but significantly increases the chance of locating the problem. The second way does not require any debuggers or special environments and can be done even on other computers, but the programmer is alerted about the overflow only upon the deallocation, which is sometimes quite late.
Because guard bytes require additional code to be executed and additional memory to be allocated, they are used only when the program is compiled for debugging. When compiled as a release, guard bytes are not used at all, neither the routines working with them.
Example
A programmer wants to allocate a buffer of 100 bytes of memory while debugging. The system memory allocating routine will allocate 108 bytes instead, adding 4 leading and 4 trailing guard bytes, and return a pointer shifted by the 4 leading guard bytes to the right, hiding them from the programmer. The programmer should then work with the received pointer without the knowledge of the presence of the guard bytes.
If the programmer's algorithm writes right outside the assigned space, it will overwrite the guard bytes. Later, upon deallocation, the deallocating routine will check, whether the guard bytes are modified and reports an error if appropriate.
Problems
Memory allocation routines fill guard bytes with values that are not supposed to be used by the programmer's algorithms. This is, however, not predictable. When the algorithm uses those values and overwrites the guard bytes with them (only the last write before deallocation is relevant), the overflow can not be detected, because the bytes have not actually changed. Instead, the memory breakpoint option can be used, set on a condition of access to those bytes in a debugger.
See also
Buffer overflow protection
Computer memory
Programming idioms
Debugging
|
https://en.wikipedia.org/wiki/KKEY-LD
|
KKEY-LD (channel 13) is a low-power television station in Bakersfield, California, United States, affiliated with the Spanish-language network Telemundo. It is owned by Nexstar Media Group alongside NBC affiliate KGET-TV (channel 17). Both stations share studios on L Street in downtown Bakersfield, while KKEY-LP's transmitter is located atop Mount Adelaide.
In addition to its own digital signal, KKEY-LD is simulcast in standard definition on KGET-TV's third digital subchannel (17.3) from the same transmitter site.
History
The station was formerly known as K14IK and carried a low-power signal on UHF channel 14. In 2003, it moved to VHF channel 11 and was renamed KKEY-LP and became a Telemundo affiliate that same year. Previously, Telemundo programming was piped through Los Angeles' KVEA on cable providers. On April 20, 2007, Clear Channel Communications (now iHeartMedia) entered into an agreement to sell its entire television stations group to Newport Television, a broadcasting holding company established by the private equity firm Providence Equity Partners. This deal closed on March 14, 2008. However, due to Providence Equity Partners' partial ownership stake in rival Spanish-language network Univision, the owner of MyNetworkTV affiliate KUVI-TV (channel 45), KKEY-LP was sold along with KGET-TV and five other stations (CBS affiliate KGPE in Fresno, KTVX and KUCW in Salt Lake City, WOAI-TV in San Antonio, and WTEV-TV in Jacksonville) to High Plains Broadcasting. However, due to KKEY-LP's low-power status, it was excluded along with KTVX from the deal, which was finalized on September 15, 2008. Newport Television continued to operate KGET through a shared services agreement.
Newport agreed to sell KKEY-LP and KGET-TV, as well as KGPE in Fresno, to Nexstar Broadcasting Group on November 5, 2012. The sale was completed on February 19, 2013.
Technical information
Subchannel
Analog-to-digital conversion
The analog signal went off the air on July 31, 2009, and for a year KKEY only existed as a subchannel of KGET and was even rebranded "Telemundo 17.3". On July 23, 2010, the analog signal on channel 11 came back on the air—just nine days before the station's analog license was to be cancelled by the Federal Communications Commission (FCC). In April 2014, the analog signal on channel 11 went off the air and a high-definition digital signal went on the air on channel 13.
References
External links
Telemundo 17.3
KEY-LD
Telemundo network affiliates
Television channels and stations established in 1997
1997 establishments in California
KEY-LD
KEY
Nexstar Media Group
|
https://en.wikipedia.org/wiki/Expressway%20Monitoring%20and%20Advisory%20System
|
The Expressway Monitoring and Advisory System (Chinese: 电子监控与信息系统), also known by its acronym of EMAS, is a computerised system that is used to monitor traffic on Singapore's expressways. EMAS enables Land Transport Authority (LTA) personnel to detect accidents and respond to them more quickly. In addition, it notifies motorists of adverse traffic conditions.
History
The contract for the construction of EMAS was awarded by the LTA to Singapore Technologies Electronics in December 1996. The first phase, implemented only on the Central Expressway, was launched officially on 21 March 1998 by then Minister of State for Communications, John Chen. In addition, tunnels were originally used by General Electric between 1991 and 1999. The system was extended to every expressways after the trial, in 2000:
10 November 1999: Ayer Rajah Expressway (Keppel Road - Clementi)
End of 2000: Pan Island Expressway, East Coast Parkway, Clementi-Tuas stretch of the AYE
Mid-2001: Bukit Timah Expressway, Kranji Expressway, Seletar Expressway, Tampines Expressway
Separately, the checkpoints utilized EMAS signboards through General Electric and which is located at -
Turf Club Avenue (towards BKE) [Removed on 1 January 2004]
Mandai Road (towards BKE) [Removed on 1 January 2004]
Woodlands Road (near to Kranji MRT) [Removed on 1 January 2004]
SLE (Woodlands Avenue 2 - BKE) [Handed over to LTA and removed in 2014]
BKE (Bukit Panjang Road - KJE) [Handed over to LTA and removed in 2014]
BKE (KJE - Mandai Road) [Handed over to LTA and removed in 2014]
BKE (Mandai Road - Turf Club Avenue) [Handed over to LTA and removed in 2014]
BKE (Turf Club Avenue - Woodlands Road) [Handed over to LTA and removed in 2014]
AYE (Pioneer Road - Benoi Road) [Removed in 2006]
AYE (Exit 22 - Exit 24) [Removed in 2013]
PIE (near to KJE) [Removed during the PIE Upgrading]
PIE (Exit 41) [Removed during the PIE Upgrading]
The upgrading of EMAS signages was announced in September 2013. It will be rolled out to Central Expressway (both blue screens and tunnels), East Coast Parkway, and Bukit Timah Expressway/Seletar Expressway that is near to the Woodlands Checkpoint, which was completed in October 2014. The second phase will be rolled out to Ayer Rajah Expressway and Kranji Expressway, which was completed in August 2015. The third phase will be rolled out to the remaining expressways, which was completed in February 2016.
Mechanism
EMAS consists of a network of electronic cameras and LED signboards located at strategic points along the expressways. The cameras transmit data to the ITS Centre, located at Clemenceau Avenue. In the Centre, staff monitor the data 24 hours a day, looking out for signs of accidents. When an accident occurs, the appropriate agencies, such as the Traffic Police and SCDF, are notified. Warning messages are then displayed on the signboards to inform motorists of the accident and allow them to make alternative travel plans. When the expressways are free of accidents, the si
|
https://en.wikipedia.org/wiki/Exec%20%28system%20call%29
|
In computing, exec is a functionality of an operating system that runs an executable file in the context of an already existing process, replacing the previous executable. This act is also referred to as an overlay. It is especially important in Unix-like systems, although it exists elsewhere. As no new process is created, the process identifier (PID) does not change, but the machine code, data, heap, and stack of the process are replaced by those of the new program.
The exec call is available for many programming languages including compilable languages and some scripting languages. In OS command interpreters, the built-in command replaces the shell process with the specified program.
Nomenclature
Interfaces to exec and its implementations vary. Depending on programming language it may be accessible via one or more functions, and depending on operating system it may be represented with one or more actual system calls. For this reason exec is sometimes described as a collection of functions.
Standard names of such functions in C are , , , , , and (see below), but not "exec" itself. The Linux kernel has one corresponding system call named "execve", whereas all aforementioned functions are user-space wrappers around it.
Higher-level languages usually provide one call named .
Unix, POSIX, and other multitasking systems
C language prototypes
The POSIX standard declares exec functions in the header file, in the C language. The same functions are declared in for DOS (see below), OS/2, and Microsoft Windows.
int execl(char const *path, char const *arg0, ...);
int execle(char const *path, char const *arg0, ..., char const *envp[]);
int execlp(char const *file, char const *arg0, ...);
int execv(char const *path, char const *argv[]);
int execve(char const *path, char const *argv[], char const *envp[]);
int execvp(char const *file, char const *argv[]);
int fexecve(int fd, char *const argv[], char *const envp[]);
Some implementations provide these functions named with a leading underscore (e.g. _execl).
The base of each is exec (execute), followed by one or more letters:
e – An array of pointers to environment variables is explicitly passed to the new process image.
l – Command-line arguments are passed individually (a list) to the function.
p – Uses the PATH environment variable to find the file named in the file argument to be executed.
v – Command-line arguments are passed to the function as an array (vector) of pointers.
path
The argument specifies the path name of the file to execute as the new process image. Arguments beginning at arg0 are pointers to arguments to be passed to the new process image. The argv value is an array of pointers to arguments.
arg0
The first argument arg0 should be the name of the executable file. Usually it is the same value as the path argument. Some programs may incorrectly rely on this argument providing the location of the executable, but there is no guarantee of this nor is it standardized across
|
https://en.wikipedia.org/wiki/Medical%20integration%20environment
|
Medical integration environment (MIE) are specialised tools designed to simplify the sharing of medical and related data between medical equipment and electronic health records. Technically, they are similar to an Enterprise Service Bus but with several extra features allowing for legacy systems that do not use web services messaging. Typically, they use Java Message Service; most Enterprise Application Integration systems can be modified to be used as an MIE but may lack the crucial HL7 and Arden syntax for storing medical knowledge.
Health informatics
|
https://en.wikipedia.org/wiki/Castle%20of%20Riddles
|
Castle of Riddles is a text adventure released by Acornsoft for the BBC Micro (in 1982) and Acorn Electron (1984) home computers. The game was written by Peter Killworth and was one of a series of text adventures written for, or ported to the BBC Micro by the same author (others including Countdown to Doom and Philosopher's Quest). As with all such games, only text is used. The player must use a simple 'verb-noun' format (e.g. 'Go North', 'Get lamp') to control the game. Unlike Killworth's other Acornsoft adventures, Castle of Riddles was not updated and reissued by Topologika so became unavailable after 1985 when Acorn Computers (parent company of Acornsoft) pulled out of the games publishing market. Some of the puzzles however were included in the Topologika version of Philosopher's Quest.
Plot
The player takes the role of a 'professional adventurer' who is 'down to his last silver piece'. His services are hired by a wizard whose castle has been taken over by a warlock. The warlock has also found the wizard's Magic Ring of Power which must be returned. The player must navigate the castle, solve problems and avoid booby traps set by the warlock in order to recover the magic ring for the wizard. At various moments in the game the adventurer is posed a riddle to answer. The adventurer must also search for treasure and deposit it in a safe. The treasure may be kept as payment.
Gameplay
Points are awarded for picking up treasure and again for depositing it in the safe as well as completing certain tasks. The maximum possible score is 250.
References
External links
1980s interactive fiction
1983 video games
Acornsoft games
BBC Micro and Acorn Electron games
BBC Micro and Acorn Electron-only games
Europe-exclusive video games
Video games developed in the United Kingdom
Single-player video games
|
https://en.wikipedia.org/wiki/Rugged%20computer
|
A rugged computer or ruggedized computer is a computer specifically designed to operate reliably in harsh usage environments and conditions, such as strong vibrations, extreme temperatures and wet or dusty conditions. They are designed from inception for the type of rough use typified by these conditions, not just in the external housing but in the internal components and cooling arrangements as well.
Typical environments for rugged laptops, tablet PCs and PDAs are public safety, field sales, field service, manufacturing, retail, healthcare, construction, transportation/distribution and the military. They are used in the agricultural industries, and by individuals for outdoor recreation activities.
Construction
Virtually all rugged computers share an underlying design philosophy of providing a controlled environment for the installed electronics. Rugged computers are engineered to operate in the face of multiple challenges including:
Shock and vibration
Temperature and humidity
Corrosion and abrasion
Minimal size, weight, and power (SWaP)
Acoustic noise reduction
Low pressure/altitude
Ingress protection
Electromagnetic interference
Optimizations on performance
Electronic components themselves may be selected for their ability to withstand higher and lower operating temperatures than typical commercial components. Design engineering decisions such as reduction of cabling, addition of liquid cooling and heat sinks, and rugged materials, are made to ensure performance in harsh environments.
Features include fully sealed keyboards to protect against intrusion by dust or liquids, and scratch-resistant screens that are readable in direct sunlight.
Rugged units have higher prices. However, one research study found that in environments where rugged computers are commonly used, total cost of ownership was 36% lower for rugged notebooks and 33% less for handhelds and PDAs, compared to conventional non-rugged versions. The lower overall cost is due to lower failure rates, the related impact on productivity, and other factors.
Laptops
A ruggedized laptop is built to operate reliably in dusty or wet environments and conditions. These computers have a thicker and stronger housing than a regular laptop, and are mainly used for industrial, construction and military purposes. Engineered to be mobile, they are vibration, shock, drop, and dust resistant, and waterproof, yet are able to comply with other important requirements such as high performance and governmental grade security. They are equipped with both current and legacy I/O ports including serial, ExpressCard, PCMCIA, VGA, and others that are commonly used in outdoor environments. The levels of ruggedization are not standardized, but they are measured by various certifications such as MIL-STD-810, IP, or ATEX.
Tablets
A rugged tablet may be semi-rugged or fully rugged. The semi-rugged might have a protective case, rain-resistant body. Fully rugged tablets are engineered from the insid
|
https://en.wikipedia.org/wiki/Saboteur%20%281985%20video%20game%29
|
Saboteur! is a stealth action-adventure game created by Clive Townsend and published by Durell Software in 1985 for several 8-bit home computer formats.
In 2017, Clive Townsend, in association with realtech VR, released an enhanced version of Saboteur! for PC, iOS and Android devices. The game was released in November 2018 for Nintendo Switch.
Gameplay
The player is set in the role of an anonymous ninja, tasked with getting into a warehouse to steal a floppy disk which has the names of rebel leaders on it. The player must navigate through the complex of rooms (consisting of the warehouse, dark tunnels and the secret command centre) to find the disk and escape. The player has an energy bar which is depleted by falling too far, crouching under water or being attacked. If the energy bar is completely depleted or if time runs out, the game ends. The bar can be replenished by standing still and resting in a safe area.
The saboteur can crouch, climb ladders, run and attack enemies by punching and drop-kicking them. He begins with a single shuriken as a weapon and can also utilise improvised weapons (such as bricks and pieces of pipe) found in rubbish piles and boxes around the warehouse. The warehouse contains many security systems the player will need to defeat or avoid. These include guards (who can use hand to hand combat and guns) who stand still and will chase and attack the saboteur if they see him or if he makes too much sound. The guards are assisted by guard dogs and automatic gun emplacements.
Saboteur! also has a difficulty level selection that can be chosen before a game begins. The chosen difficulty level determines how many guards are on watch, how much time the saboteur has to complete his mission, and how easy the route to the disk and helicopter will be (i.e. how many security doors on the way are locked and will need to be opened in some way).
Development
Saboteur! was based on routines and ideas from Clive Townsend's Death Pit, a game that was cancelled before development on Saboteur started. The prototype for Death Pit has been recovered and made available at World of Spectrum.
Reception
CRASH noted the sound, and the range of movements available, and concluded it is "one of the better releases on the Spectrum this year". C+VG said it was "a winner". The game was also voted number 55 in the Your Sinclair Official Top 100 Games of All Time.
Legacy
The game was followed by Saboteur II: Avenging Angel in 1987.
Several developers worked on a third game (names such as Saboteur 3, Sabot3ur and Saboteur 3D), none of which were ever released.
Unofficial Saboteur games were also created by fans.
The official Saboteur! remake was launched by Clive Townsend in December 2015, and contains an extended map, plot, and gameplay. The game can be played online, and contains the original Spectrum and C64 gameplay and graphics.
References
External links
1985 video games
Action-adventure games
Amstrad CPC games
Commodore 64 games
Commodo
|
https://en.wikipedia.org/wiki/BitVault
|
BitVault is a content-addressable distributed storage system, developed by Microsoft Research in China. BitVault uses peer-to-peer technology to distribute the tasks of storing and managing data. As such, there is no central authority responsible for management of the system. Rather, it is self-managing, provides high availability, reliability and scales up in a self-organizing manner, with low administrative overhead, which is almost constant irrespective of the size of the distributed overlay network.
BitVault system is best suited for reference data, which is large amount of data which changes very infrequently. Such data include archives of out-of-date data, as well as multimedia data like music and video, which, even though might be frequently used, changes very rarely.
Technology
Every participating peer node in BitVault architecture is a Smart Brick, which is a trimmed down PC with large disks. All Smart Bricks in a BitVault system are connected by a high-bandwidth, low latency network. A BitVault system can be easily scaled up – any computer can be configured to act as a Smart Brick by simply installing the BitVault software, and connecting it to the network, without any need for interrupting the already working nodes.
BitVault stores immutable data objects, i.e., objects which cannot be changed. The physical location of the objects is not fixed and can be on any of the bricks. Its location changes depending on its frequency of access; it can even be replicated at more than one brick. To get around this problem of changing locations, BitVault makes it accessible by means of a 160-bit key, which is unique for each object. The system dynamically references the location from which the object can be retrieved most efficiently, by using the key, and makes the object available. The unique key is generated from a hash of the data of the object, thus making the system content-addressable, as opposed to location-addressable. The hashes of the objects (key) are mapped to the physical addresses using hash tables, which are internally managed by the system and do not need any user intervention. Different sets of nodes maintain different sets of hash tables, which concern with only the data in that set of nodes, thereby giving rise to an overlay network in which the location of the data is tracked by a distributed hash table (DHT) architecture.
Architecture
The BitVault architecture is composed of multiple bricks which constitute a logical 160 bit address space, each associated with hash of some data. The association is maintained in a Distributed Hash Table (DHT). The DHT partitions the entire hash table into smaller hash tables. For example, if there are n peers, the hash table would be divided into n hash tables, each starting from the row next to where its immediate predecessor ended. Each DHT has its associated brick, and the extent of the logical address space a brick is responsible for is called its Zone. The bricks communicate using peer-
|
https://en.wikipedia.org/wiki/Advantage%20%28cryptography%29
|
In cryptography, an adversary's advantage is a measure of how successfully it can attack a cryptographic algorithm, by distinguishing it from an idealized version of that type of algorithm. Note that in this context, the "adversary" is itself an algorithm and not a person. A cryptographic algorithm is considered secure if no adversary has a non-negligible advantage, subject to specified bounds on the adversary's computational resources (see concrete security). "Negligible" usually means "within O(2−p)" where p is a security parameter associated with the algorithm. For example, p might be the number of bits in a block cipher's key.
Description of concept
Let F be an oracle for the function being studied, and let G be an oracle for an idealized function of that type. The adversary A is a probabilistic algorithm, given F or G as input, and which outputs 1 or 0. A's job is to distinguish F from G, based on making queries to the oracle that it's given. We say:
Examples
Let F be a random instance of the DES block cipher. This cipher has 64-bit blocks and a 56-bit key. The key therefore selects one of a family of 256 permutations on the 264 possible 64-bit blocks. A "random DES instance" means our oracle F computes DES using some key K (which is unknown to the adversary) where K is selected from the 256 possible keys with equal probability.
We want to compare the DES instance with an idealized 64-bit block cipher, meaning a permutation selected at random from the (264)! possible permutations on 64-bit blocks. Call this randomly selected permutation G. Note from Stirling's approximation that (264)! is around , so even specifying which permutation is selected requires writing down a number too large to represent exactly in any real computer. Viewed another way, G is an instance of a "cipher" whose "key length" is about 1021 bits, which again is too large to fit in a computer. (We can, however, implement G with storage space proportional to the number of queries, using a random oracle).
Note that because the oracles were given encrypt plaintext of our choosing, we're modelling a chosen-plaintext attack or CPA, and the advantage we're calculating can be called the CPA-advantage of a given adversary. If we also had decryption oracles available, we'd be doing a chosen-ciphertext attack or CCA and finding the CCA-advantage of the adversary.
Example 1: Guess at random
Call this adversary A0. It simply flips a coin and returns 1 or 0 with equal probability and without making any oracle calls. Thus, Pr[A0(F)=1] and Pr[A0(G)=1] are both 0.5. The difference between these probabilities is zero, so Adv(A0) is zero. The same thing applies if we always return 0, or always return 1: the probability is the same for both F and G, so the advantage is zero. This adversary can't tell F and G apart. If we're cipher designers, our desire (maybe not achievable) is to make it so that it's computationally infeasible for any adversary to do significan
|
https://en.wikipedia.org/wiki/Mel%20Croucher
|
Mel Croucher (born 1948) is a British entrepreneur and video games pioneer. Originally an architect, he moved into computers and in 1977 launched one of the very earliest games companies, Automata UK, as an extension of his publishing business. He is now credited for setting up "the first games company in the U.K.", celebrated as "the father of the British videogames industry" and presented as "a pioneer in affective computing". His first broadcasts of computer game software were made over AM and FM radio. After the release of the Sinclair ZX81, his label published several games for the early home computer market, including three Computer Trade Association award-winners: Pimania (1982), Groucho (1983, a.k.a. My Name Is Uncle Groucho, You Win A Fat Cigar), and the groundbreaking "multi-media" title Deus Ex Machina (1984). Croucher has championed immersive entertainment throughout his career as director and producer, mixing audio, video, spoken word, real-world locations and computer-generated effects. He is currently Executive Chairman of the Jeeni streamed entertainment channel.www.jeeni.com
Career
Croucher has written text books, computer manuals and comedy, and worked as a journalist, writing regular columns like Without Prejudice, The Rubber Room, and the comedy sci-fi serial Tamara Knight for the ZX Spectrum magazine CRASH in the 1980s, as well as columns for various computer magazines since.
Mel Croucher is the author of Zygote in Computer Shopper every month since Issue 1 in 1988 and the Mel's World column and the Great Moments In Computing cartoon strip in the same magazine.
In 2010, Feeding Tube Records, a small label in the United States, released "Pimania: The Music of Mel Croucher", a deluxe vinyl LP album of the music to the Pimania games, as well as tracks from other Automata releases. The album came with extensive liner notes by Croucher and Caroline Bren, as well as a large poster featuring selections from the original Automata print campaigns. A 6-album retrospective of his music complete works was released in 2017 by The Games Collector.
In 2012, Mel Croucher reformed Automata as Automata Source Ltd., with leading figures from the video games, online marketing and music industries. He produced a reimagination of Deus Ex Machina, starring Sir Christopher Lee, released in 2015 as Deus Ex Machina 2, alongside a 30th Anniversary Collector's Edition of the original game including new graphics and a director's commentary. He collaborated with Christopher Lee on several other games titles, and their game for children was released as Eggbird in the same year.
Mel Croucher is Executive Chairman of Jeeni, the global streamed music service and artist development platform, which he co-founded with Dr Shena Mitchell in 2017.
Video games
The Pathfinder Quests (1977-1980)
Whitbread Quiz Time and the Computer Treasure Hunt (1979)
The Adventures of Willi Nilli (1981)
The Portsmouth Tapes (1981)
In The Best Possible Taste (1981)
Can Of Worms
|
https://en.wikipedia.org/wiki/Access%20Linux%20Platform
|
The Access Linux Platform (ALP) is a discontinued open-source software based operating system, once referred to as a "next-generation version of the Palm OS," for mobile devices developed and marketed by Access Co., of Tokyo, Japan. The platform included execution environments for Java, classic Palm OS, and GTK+-based native Linux applications. ALP was demonstrated in devices at a variety of conferences, including 3GSM, LinuxWorld, GUADEC, and Open Source in Mobile.
The ALP was first announced in February 2006. The initial versions of the platform and software development kits were officially released in February 2007. There was a coordinated effort by Access, Esteemo, NEC, NTT DoCoMo, and Panasonic to use the platform as a basis for a shared platform implementing a revised version of the i.mode Mobile Oriented Applications Platform (MOAP) (L) application programming interfaces (APIs), conforming to the specifications of the LiMo Foundation. The first smartphone to use the ALP was to be the Edelweiss by Emblaze Mobile that was scheduled for mid-2009. However, it was shelved before release. The First Else (renamed from Monolith) smartphone, that was being developed by Sharp Corporation in cooperation with Emblaze Mobile and seven other partners, was scheduled for 2009, but was never released and officially cancelled in June 2010. The platform is no longer referenced on Access's website, but Panasonic and NEC released a number of ALP phones for the Japanese market between 2010 and 2013.
Look and feel
The user interface was designed with similar general goals to earlier Palm OS releases, with an aim of preserving the Zen of Palm, a design philosophy centered on making the applications as simple as possible. Other aspects of the interface included a task-based orientation rather than a file/document orientation as is commonly found on desktop systems.
The appearance of the platform was intended to be highly customizable to provide differentiation for specific devices and contexts.
In the last releases, they went for a much more modern look with gesture support, and were no longer close to the Palm OS.
Base frameworks
Similarly to Maemo, Nokia's internet tablet framework, ALP was based on components drawn from the GNOME project, including the GTK+ and GStreamer frameworks. A variety of other core components were drawn from mainstream open source projects, including BlueZ, matchbox, cramfs, and others. These components were licensed under the GNU General Public License (GPL), GNU Lesser General Public License (LGPL), and other open source licenses, meaning that ALP was a free or open environment on the software level.
Several components from ALP were released under the Mozilla Public License as The Hiker Project. These components addressed issues of application life-cycle, intertask communication, exchange and use of structured data, security, time and event-based notifications, and other areas common to the development of applications for mobi
|
https://en.wikipedia.org/wiki/CARO
|
CARO (Computer Antivirus Research Organization) is an organization that was established in 1990 to research and study malware.
The organization is perhaps best known for the Virus Naming Convention of 1991 (with subsequent revisions). Though widely adopted, it still faced usage obstacles. This has led to proposal of new naming systems from product vendors and industry groups.
The annual workshop is the biggest CARO event. The workshop is usually organized and hosted by one anti-virus firm in their home country. Workshops started in 2007 and the attendance is limited to 120-130 top anti-malware experts with a strict policy of no photography or recordings of any kind:
2007: Reykjavik, Iceland (organized by F-Prot)
2008: Hoofddorp, The Netherlands (Norman)
2009: Budapest, Hungary (Virus Buster)
2010: Helsinki, Finland (F-Secure)
2011: Prague, Czech Republic (AVAST Software)
2012: Munich, Germany (Trend Micro and McAfee)
2013: Bratislava, Slovakia (ESET)
2014: Melbourne, FL, USA (Florida Institute of Technology)
2015: Hamburg, Germany (Trend Micro)
2016: Bucharest, Romania (Avira)
2017: Krakow, Poland (ESET)
2018: Portland, OR, USA (AMTSO)
2019: Copenhagen, Denmark (CSIS Security Group)
2022: Brno, Czech Republic (Avast)
2023: Bochum, Germany (G Data)
2024: Arlington, USA (Cyber Threat Alliance)
EICAR test file
CARO, in collaboration with EICAR (European Institute for Computer Antivirus Research), developed the EICAR test file, an executable string designed to test the integrity of antivirus software.
Members
CARO membership is a private issue with members choosing to publicize their membership or not.
Members of CARO, founders and not, current or not, who have publicly stated their membership at some point include: Friðrik Skúlason (founder of FRISK Software International), Dr. Alan Solomon (founder of Dr Solomon's Antivirus Toolkit), Vesselin Bontchev, Mikko Hyppönen (CRO of F-Secure), Eugene Kaspersky (founder of Kaspersky Lab), Nick FitzGerald, Peter Ferrie, Dmitry Gryaznov, Igor Muttik, Atley Padgett Peterson, Costin Raiu, Peter Kruse, Morton Swimmer, Righard Zwienenberg and Philipp Wolf.
References
External links
The CARO Website
Information technology organizations
Malware
|
https://en.wikipedia.org/wiki/Boot%20Camp%20%28software%29
|
Boot Camp Assistant is a multi boot utility included with Apple Inc.'s macOS (previously ) that assists users in installing Microsoft Windows operating systems on Intel-based Macintosh computers. The utility guides users through non-destructive disk partitioning (including resizing of an existing HFS+ or APFS partition, if necessary) of their hard disk drive or solid-state drive and installation of Windows device drivers for the Apple hardware. The utility also installs a Windows Control Panel applet for selecting the default boot operating system.
Initially introduced as an unsupported beta for Mac OS X 10.4 Tiger, the utility was first introduced with Mac OS X 10.5 Leopard and has been included in subsequent versions of the operating system ever since. Previous versions of Boot Camp supported Windows XP and Windows Vista. Boot Camp 4.0 for Mac OS X 10.6 Snow Leopard version 10.6.6 up to Mac OS X 10.8 Mountain Lion version 10.8.2 only supported Windows 7. However, with the release of Boot Camp 5.0 for Mac OS X 10.8 Mountain Lion in version 10.8.3, only 64-bit versions of Windows 7 and Windows 8 are officially supported.
Boot Camp 6.0 added support for 64-bit versions of Windows 10. Boot Camp 6.1, available on macOS 10.12 Sierra and later, will only accept new installations of Windows 7 and later; this requirement was upgraded to requiring Windows 10 for macOS 10.14 Mojave.
Boot Camp is currently not available on Apple silicon Macs. Via virtualization, it is possible to run ARM-based Windows 10 and 11 (only Windows Insider builds, as they are the only publicly available ARM builds of Windows) through the QEMU emulator and Parallels Desktop virtualization software, which also allows Linux.
Overview
Installation
Setting up Windows 10 on a Mac requires an ISO image of Windows 10 provided by Microsoft. Boot Camp combines Windows 10 with install scripts to load hardware drivers for the targeted Mac computer.
Boot Camp currently supports Windows 10 on a range of Macs dated mid-2012 or newer. Apple Silicon is not supported due to being ARM-based. Although Windows 11 supports ARM64, the ARM64 version is only licensed to OEMs, and there are no M1/M2 drivers, so it cannot run on Apple Silicon Macs.
Startup Disk
By default, Mac will always boot from the last-used startup disk. Holding down the option key (⌥) at startup brings up the boot manager, which allows the user to choose which operating system to start the device in. When using a non-Apple keyboard, the alt key usually performs the same action. The boot manager can also be launched by holding down the "menu" button on the Apple Remote at startup.
On older Macs, its functionality relies on BIOS emulation through EFI and a partition table information synchronization mechanism between GPT and MBR combined.
On newer Macs, Boot Camp keeps the hard disk as a GPT so that Windows is installed and booted in UEFI mode.
Requirements
Mac OS X 10.7 Lion and OS X 10.8 Mountain Lion
Apple's Boot Camp s
|
https://en.wikipedia.org/wiki/WXBU
|
WXBU (channel 15) is a television station licensed to Lancaster, Pennsylvania, United States, serving the Susquehanna Valley region as an affiliate of the digital multicast network TBD. The station is owned by Howard Stirk Holdings, a partner company of the Sinclair Broadcast Group. WXBU's advertising sales office is located on Butler Road in West Cornwall Township (with a Lebanon postal address); the station shares transmitter facilities with Sinclair-owned, Harrisburg-licensed CBS affiliate WHP-TV (channel 21) on a ridge north of Linglestown Road in Middle Paxton Township.
History
Early history
The station first signed on the air on October 25, 1953, as WLBR-TV, operating as an independent station. Originally licensed to Lebanon, it transmitted its signal at one kilowatt on a tower located just north of Mount Gretna. The station was originally owned by the Lebanon Television Corporation, a joint venture of the Lebanon Broadcasting Company (owner of WLBR radio [1270 AM] and WQFM [100.1 FM, now WFVY]) and the Lebanon News Publishing Company (owner of the Lebanon Daily News). On October 16, 1954, the station went off the air after Hurricane Hazel knocked out the power to its transmitter, although they had already filed to go dark on that date with the Federal Communications Commission (FCC).
In 1955, Triangle Publications bought the channel 15 license from Lebanon Television, but the sale was held up by challenges from nearby Harrisburg television stations WHP-TV, WCMB-TV (now defunct), WTPA-TV (now WHTM-TV), and Reading television station WHUM-TV (also now defunct). The station finally returned to the air with increased power on May 2, 1957. Under Triangle ownership, the station became a part-time ABC affiliate and received other programs from then sister station WFIL-TV (now ABC owned-and-operated station WPVI-TV) in Philadelphia. Triangle changed the station's call letters on New Year's Day 1959 to WLYH-TV (representing its service area of Lebanon, York and Harrisburg). In 1963, it became a CBS affiliate as part of the Keystone Network, a three-station network serving South Central Pennsylvania that also included WHP-TV (channel 21) in Harrisburg, and WSBA-TV (channel 43, now WPMT-TV) in York. This arrangement was necessary in the days before cable television gained much penetration. South Central Pennsylvania had just been collapsed into one large and mountainous market earlier in the year. UHF stations have never covered large areas or rugged terrain very well. It created a strong combined signal with 55 percent overlap.
Originally, the three stations aired the same programming, though they were separately owned. Later in the 1960s, WHP-TV began airing separate programming outside of network hours, while WLYH and WSBA-TV continued simulcasting for most of the day. All three outlets ran prime time programming, most of the daytime shows, and most of the weekend offerings from CBS. All three stations preempted moderate amounts of CBS progr
|
https://en.wikipedia.org/wiki/Harrisburg%20Broadcast%20Network
|
The Harrisburg Broadcast Network, branded as WHBG TV 20, is a Public, educational, and government access (PEG) cable TV channel in the city of Harrisburg, Pennsylvania. Despite its call sign, it is not an FCC-sanctioned terrestrial television station. It is seen in Harrisburg on Comcast cable channel 20.
External links
Harrisburg Broadcast Network Official website
About page from City website
Television stations in Pennsylvania
Mass media in Harrisburg, Pennsylvania
Television stations in the Susquehanna Valley
American public access television
Television channels and stations established in 1993
|
https://en.wikipedia.org/wiki/Schaefer%27s%20dichotomy%20theorem
|
In computational complexity theory, a branch of computer science, Schaefer's dichotomy theorem, proved by Thomas Jerome Schaefer, states necessary and sufficient conditions under which a finite set S of relations over the Boolean domain yields polynomial-time or NP-complete problems when the relations of S are used to constrain some of the propositional variables.
It is called a dichotomy theorem because the complexity of the problem defined by S is either in P or is NP-complete, as opposed to one of the classes of intermediate complexity that is known to exist (assuming P ≠ NP) by Ladner's theorem.
Special cases of Schaefer's dichotomy theorem include the NP-completeness of SAT (the Boolean satisfiability problem) and its two popular variants 1-in-3 SAT and not-all-equal 3SAT (often denoted by NAE-3SAT). In fact, for these two variants of SAT, Schaefer's dichotomy theorem shows that their monotone versions (where negations of variables are not allowed) are also NP-complete.
Original presentation
Schaefer defines a decision problem that he calls the Generalized Satisfiability problem for S (denoted by SAT(S)), where is a finite set of relations over the binary domain . An instance of the problem is an S-formula, i.e. a conjunction of constraints of the form where and the are propositional variables. The problem is to determine whether the given formula is satisfiable, in other words if the variables can be assigned values such that they satisfy all the constraints as given by the relations from S.
Schaefer identifies six classes of sets of Boolean relations for which SAT(S) is in P and proves that all other sets of relations generate an NP-complete problem. A finite set of relations S over the Boolean domain defines a polynomial time computable satisfiability problem if any one of the following conditions holds:
all relations that are not constantly false are true when all its arguments are true;
all relations that are not constantly false are true when all its arguments are false;
all relations are equivalent to a conjunction of binary clauses;
all relations are equivalent to a conjunction of Horn clauses;
all relations are equivalent to a conjunction of dual-Horn clauses;
all relations are equivalent to a conjunction of affine formulae.
Otherwise, the problem SAT(S) is NP-complete.
Modern presentation
A modern, streamlined presentation of Schaefer's theorem is given in an expository paper by Hubie Chen. In modern terms, the problem SAT(S) is viewed as a constraint satisfaction problem over the Boolean domain. In this area, it is standard to denote the set of relations by Γ and the decision problem defined by Γ as CSP(Γ).
This modern understanding uses algebra, in particular, universal algebra. For Schaefer's dichotomy theorem, the most important concept in universal algebra is that of a polymorphism. An operation is a polymorphism of a relation if, for any choice of m tuples from R, it holds that the tuple obtained from t
|
https://en.wikipedia.org/wiki/BMS-203
|
CER-203 is a central unit of early digital computer developed by Mihajlo Pupin Institute (Serbia) in 1971. It contained both central processing unit and primary memory.
Specifications
Central Processing Unit:
Number of instructions: 32
Performance:
one 16-cycle instruction: 20 μs
one single cycle instruction: 5 μs
addition and/or subtraction of two 15-digit numbers: 20 μs
Primary memory:
Capacity: 8 kilowords
Speed (cycle time): 1 μs
Complete, autonomous memory error checking
Parity control
See also
CER-203 computer
CER Computers
Mihajlo Pupin Institute
History of computer hardware in the SFRY
Early computers
|
https://en.wikipedia.org/wiki/Morpheus%20%28morphing%20software%29
|
Morpheus Photo Animation Suite is a suite of morphing and digital compositing computer software for Windows and Mac. The software suite contains Morpheus Photo Morpher, Morpheus Photo Warper and Morpheus Photo Mixer, although these three are also available individually.
The latest version is 3.17 and comes in three different editions: Standard, Professional and Industrial. The new version is integrated with YouTube, PhotoBucket, and Morpheus Galleries. Galleries is a social network for posting and commenting on users' morphs, and it lets you upload further to Facebook, MySpace, Blogger, and other sites.
External links
Windows graphics-related software
|
https://en.wikipedia.org/wiki/GoToMyPC
|
GoToMyPC is remote desktop software that allows users to access computers remotely using a web browser. It was developed by ExpertCity and launched in 1998. Citrix Systems acquired ExpertCity in 2004 and maintained the GoToMyPC brand and services. Citrix spun off the GoTo products, which were acquired by LogMeIn (which would later adopt the GoTo name as a company in 2022) in early 2017. There are three versions: "Personal", "Pro", and "Corporate".
History
Klaus Schauser co-founded ExpertCity, then a privately held company based in Santa Barbara, California, led GoToMyPC's design and development, focusing on "ease-of-use form over function". ExpertCity launched GoToMyPC in 1998, starting with a "Personal" version and followed by a "Corporate" edition months later. As part of a "reverse demand" strategy, ExpertCity marketed the products to individual employees, instead of corporations, because of its limited resources as a startup.
In mid-2001, GoToMyPC required Microsoft Windows on both ends, but ExpertCity planned to release versions compatible with Linux, Macintosh, Palm, Solaris, and Windows CE. The company also planned to create an "infrequent flier" plan for users who only need access during occasional travel times.
In 2003, "GoToMyPC Pro" was launched and targeted at small businesses. In December, Citrix Systems agreed to purchase ExpertCity for $225 million in cash and stock in a deal that closed in 2004. The acquisition was Citrix's largest to date. Citrix planned to keep the GoToMyPC brand, pricing, and services, and let ExpertCity operate from its headquarters in Santa Barbara under Andreas von Blottnitz, who had served as ExpertCity's chief executive officer.
In 2006, the Canadian firm 01 Communique filed a patent infringement lawsuit against Citrix, claiming they filed for a patent in 2000 and obtained one from the United States Patent and Trademark Office (USPTO) in August 2005 for their remote access software I'm InTouch. Following an inter partes reexamination, the USPTO issued a Right of Appeal Notice confirming that all of 01 Communique's claims were patentable. 01 Communique's lawsuit requested "unspecified financial damages" covering August 2005 to the settlement date. In July 2010, the patent infringement claims were upheld. In May 2014, Citrix filed a complaint alleging patent infringement by 01 Communique's "I'm InTouch Meeting" and requesting a "declaratory judgment" against 01 Communique alleging that GoToMyPC did not infringe the original patent. In October, the two companies reached an agreement and withdrew their complaints against each other.
Reception
Following GoToMyPC's launch, beta user Greg Alwang wrote a positive review of the software for PC Magazine. He said the file transfer features were "basic" compared to those offered by competitor pcAnywhere, but complimented the product's usability and concluded, "GoToMyPC is revolutionary, and pcAnywhere is evolutionary."
In the 2000s, GoToMyPC received several rec
|
https://en.wikipedia.org/wiki/Passive%20monitoring
|
Passive monitoring is a technique used to capture traffic from a network by copying traffic, often from a span port or mirror port or via a network tap. It can be used in application performance management for performance trending and predictive analysis. Passive monitoring is also used in web performance optimization in the form of real user monitoring. E-commerce and media industries use real user monitoring to correlate site performance to conversions and engagement.
It can be analyzed in a sniffer such as Wireshark.
It can be examined for flows of traffic, providing information on "top talkers" in a network as well as TCP round-trip time.
It can be reassembled according to an application's state machine into end-user activity (for example, into database queries, e-mail messages, and so on.) This kind of technology is common in real user monitoring.
In some cases, HTTP reassembly is further analyzed for web analytics.
Passive monitoring can be very helpful in troubleshooting performance problems once they have occurred. Passive monitoring differs from synthetic monitoring in that it relies on actual inbound web traffic to take measurements, so problems can only be discovered after they have occurred. Synthetic monitoring is also referred to as active monitoring, which helps report on system availability and predefined business transactions using synthetic probes and web robots.
While initially viewed as competitive with synthetic monitoring approaches, most networking professionals now recognize that passive and synthetic monitoring are complementary.
See also
Computer and network surveillance
Packet analyzer
Wiretapping
References
Network management
|
https://en.wikipedia.org/wiki/AIDS%20Clinical%20Trials%20Group
|
The AIDS Clinical Trials Group network (ACTG) is one of the largest HIV clinical trials organizations in the world, playing a major role in setting standards of care for HIV infection and opportunistic diseases related to HIV and AIDS in the United States and the developing world. The ACTG is composed of, and directed by, leading clinical scientists in HIV/AIDS therapeutic research. The ACTG is funded by the Department of Health and Human Services, National Institutes of Health through the National Institute of Allergy and Infectious Diseases.
Mission
Through innovative studies of the treatment of HIV-1 infection and its complications, ACTG research focuses on:
New therapies based on knowledge of the cellular events and reactions in the development of disease (pathogenesis)
Treatment strategies to limit replication of HIV-1 and improve disease-free survival among infected individuals
Rapid development of agents (drugs or treatment strategies) that prevent or delay the complications of HIV-related disorders
HIV-1 pathogenesis through advanced laboratory investigation
Recruitment and retention of clinical trial participants who reflect the changing demographics of the AIDS epidemic
Therapeutic approaches that improve quality of life for persons with HIV-1 infection
History
The ACTG has been pivotal in providing the data necessary for the approval of therapeutic agents, as well as treatment and prevention strategies, for many opportunistic infections and malignancies.
In 1986, the original AIDS Treatment and Evaluation Units were established by the National Institutes of Health.
In 1987, the AIDS Clinical Trials Group (ACTG) was established by the National Institute of Allergy and Infectious Diseases.
In 1991, the ACTG divided its focus into two groups and created the Adult ACTG (AACTG) and the Pediatric ACTG (PACTG).
In 1995 the AACTG restructured and created a true self-governing structure, with self-evaluation of sites, priority setting of scientific research, discretionary spending. The PACTG became its own group and an AIDS Malignancy Consortium was established under the National Cancer Institute.
In 1999 the AACTG applied for continued funding as an investigator led and run group
In 2000, the AACTG began the planning and development of international research initiatives in the developing world.
In 2005, the ACTG opened its first multinational AIDS clinical trial in 16 sites around the globe “A Phase IV, Prospective, Randomized, Open-Label Evaluation of the Efficacy of Once-Daily PI & Once-Daily Non-Nucleoside Reverse Transcriptase Inhibitor - Containing Therapy Combinations for Initial Treatment of HIV-1 Infected individuals from Resource - Limited Settings (PEARLS) Trial”, the results of which suggested men and women respond to antiretroviral drugs differently.
In 2006, the network was funded as one of the six NIAID-funded HIV/AIDS Clinical Trials Networks.
Scientific accomplishments
Integral involvement in new antiretroviral drug
|
https://en.wikipedia.org/wiki/Information%20%28disambiguation%29
|
Information or info is the resolution of uncertainty, or a collection of related data or knowledge about a topic.
Information may also refer to:
Information sign, a board or placard giving local information, or pointer to a tourist information source
Information technology, the means of processing, storage, or transmission of data
Information theory, the mathematical theory of information and communication
Information (formal criminal charge), a formal criminal charge made by a prosecutor without a grand-jury indictment
Books
Information: The New Language of Science, a 2003 book by Hans Christian von Baeyer
The Information (novel), by Martin Amis (1995)
The Information: A History, a Theory, a Flood, a 2011 book by James Gleick
Companies
Dagbladet Information, a Danish newspaper
The Information (website), a subscription-based digital media company
Music
Albums
Information (Berlin album), 1980
Information (Dave Edmunds album), 1983
The Information (Beck album), 2006
Information, a 1997 album by Classified
Information, a 1995 album by Toenut
Information, an EP by Eliot Sumner
Songs
"Information" (Dredg song), 2009
"Information", by Gwen Stefani, an unreleased song
"Information", by Spirit, from the album The Adventures of Kaptain Kopter & Commander Cassidy in Potato Land
Related disambiguation articles
Info (disambiguation)
Inform (disambiguation)
Information source (disambiguation)
See also
Data, or data used in computing
Directory assistance, a phone service used to find out a specific telephone number and/or address of a residence, business, or government entity
Fisher information, in statistics
Help desk, an information service point
Information wants to be free, an expression that means either that all people should be able to access information freely, or that information (formulated as an actor) naturally strives to become as freely available among people as possible
Point of information (competitive debate)
Philosophy of information
|
https://en.wikipedia.org/wiki/That%27ll%20Teach%20%27Em
|
That'll Teach 'Em is a British historical reality documentary series produced by Twenty Twenty Television for the Channel 4 network in the United Kingdom.
Concept
Each series follows around 30 teenage students who have recently completed their GCSEs as they are taken back to a 1950s/1960s style British boarding school. The show sets out to analyse whether the standards that were integral to the school life of the time could help to produce better exam results, when compared to the current GCSE results and to compare certain contemporary educational methods with modern ones (e.g. vocational vs. academic focus for the less "gifted").
As part of the experience, the participants are expected to board at a traditional school house, abiding by strict discipline, adopting to 1950s/1960s diet and following a strict uniform dress code, the only difference being the absence of corporal punishment as it was made illegal in all state schools in Britain in 1986, and in all private schools in England and Wales in 1998. Because of that, other strict punishments, most notably writing lines and essays and holding up heavy items for a certain amount of time were used instead. Throughout the series, a number of students have either been expelled for misconduct, or have chosen to leave the school voluntarily.
After four weeks, the students then take their final exams, produced to the same standard as contemporary GCE O Levels and CSEs.
There were three series of the show, the first airing in August 2003 (recreating a 1950s grammar school and featuring academically high-achieving pupils), the second in August 2004 (a 1960s secondary modern and the academically average or poor) and the third and final series in April 2006 (a 1950s grammar school with high-achieving pupils again, this time focusing on practical sciences and with single-sex classes).
Series overview
Series 1 (2003)
The first series of the show was filmed over 4 weeks in July and August 2003, at the Royal Grammar School, High Wycombe. It featured 15 boys and 15 girls who had just sat their GCSEs and mostly did well, though some failed. The school was branded as 'King's School'.
Joe McCready was expelled during the series for persistent bad behaviour and disrespect. In episode 3, Nadia Freeman chose to leave the school voluntarily due to the food. In the fourth episode, Mr. Perry served as acting headmaster due to Mr. MacTavish being unwell at the time.
Series 2 (2004)
The second series of the show, called "That'll Teach ‘Em Too", was also filmed at the Royal Grammar School, High Wycombe in August 2004 and was known as 'Hope Green Secondary Modern'
Sophia chose to leave the school voluntarily due to her poor behaviour. Though it was never shown, Aliss Hadley, Lewis Davis and Holly left as well for undisclosed reasons. This was the only season in which no students were expelled. Most students only passed 1 CSE. Like Series 1, 15 boys and 15 girls entered the school at the start, and 26 finished
|
https://en.wikipedia.org/wiki/Inferential%20programming
|
In most computer programming, a programmer keeps a program's intended results in mind and painstakingly constructs a program to achieve those results. Inferential programming refers to (still mostly hypothetical) techniques and technologies enabling the inverse. This would allow describing an intended result to a computer, using a metaphor such as a fitness function, a test specification, or a logical specification, and then the computer, on its own, would construct a program needed to meet the supplied criteria.
During the 1980s, approaches to achieve inferential programming mostly involved techniques for logical inference. Today the term is sometimes used in connection with evolutionary computation techniques that enable a computer to evolve a solution in response to a problem posed as a fitness or reward function.
In July 2022, GitHub Copilot was released, which is an example of inferential programming.
Closely related concepts and technologies
Logic programming
Prolog
Constraint programming
Artificial intelligence
Genetic programming
Machine learning
Artificial life
Evolution
Metaprogramming
See also
Automated reasoning
Compiler theory
Unit testing
References
External links
First steps towards inferential programming
Programming paradigms
|
https://en.wikipedia.org/wiki/List%20of%20Prisoner%20characters%20%E2%80%93%20prison%20staff
|
This is a list of characters in the Australian television series Prisoner, that includes the "prison staff", the series was produced by (the) Reg Grundy Organisation and ran on Network Ten from 1979 until 1986 and was known internationally as Prisoner: Cell Block H in the United States and Britain, and Caged Women in Canada
Listed in order of appearance:
Characters
Erica Davidson (née Marne) (Patsy King – episodes 1–360), the prison's governor. Davidson was a former barrister (her father and brother were both judges) with political connections and notable events during her Governorship were the arrival of her niece on drug charges, her doomed romance with corrupt businessman Andrew Reynolds, and her kidnap at the request of inmate Andrea Hennessey. A few months after her resignation she returned - working for the department itself - and was highly instrumental in investigating and eventually stopping the first cold regime of temporary governor, Joan Ferguson. In episode 491, we hear Erica has resigned from the department to pursue a career in Canberra.
Vera Bennett - "Vinegar Tits" (Fiona Spence - episodes 1–224), First seen chasing after Sally Lee down the corridor with Meg Jackson. The acid-tongued senior prison officer aged and embittered beyond her years by caring for her demanding invalid mother. She believed that Erica's and Meg's progressive methods were wrong, and that the prisoners needed discipline and authority. Her stern attitude earned her the nickname "Vinegar Tits". Despite their differences, Vera counted Meg as perhaps her only friend. Although she was rude and harsh, she was not cold like her successor Joan Ferguson. She left after a failed romance with officer Terry Harrison to become Governor of Barnhurst prison, and she was referred to in later years - it is clear that she made an excellent job as Governor of Barnhurst, as she still holds this position in the final year of the series. (She is mentioned after The Fire and Riot at Barnhurst, which marks the end of an era; Bea Smith's death)
Meg Jackson (née Coppin, Morris) (Elspeth Ballantyne - episodes 1–692), born as Margaret Coppin, is one of the prison's senior officers. Born in a prison herself, Jackson was often sympathetic to inmate needs, hoping to rehabilitate the prisoners, though she was no pushover. Despite their vast differences in prison ideology, she and Vera Bennett were friends. The departures of inmates Bea Smith in September 1983 and Lizzie Birdsworth in February 1984 left Meg as the show's only remaining original cast member. Meg continued until the end of the series, making her the only original character to last the entire run. Meg had a heated rivalry with cold guard Joan "The Freak" Ferguson, which stemmed from Meg's stint in Wentworth as a prisoner: Meg's brief stint inside for contempt of court had confirmed her suspicions about The Freak's coldness. Meg had many failed romances. Meg was also friendly with fellow guards Colleen Powell, Joyce Bar
|
https://en.wikipedia.org/wiki/WOA
|
WOA may refer to:
Computing
Web-oriented architecture, a computer systems architectural style
Windows on ARM (disambiguation), a series of operating systems for ARM architecture computers
WebObjects application, the file system suffix of an application written using the WebObjects framework from NeXT, later Apple
Wars
War of Attrition, a conflict between Israel and Egypt
War of aggression
Music
Wacken Open Air, the largest exclusively metal music festival in the world
War of Ages, metalcore band from Pennsylvania
W.O.A Records of India and Dubai
Sports
World Olympians Association
Welsh Orienteering Association
Other uses
World Ocean Atlas
World of Art, a series of books on art
the ICAO airline designator for World Airways
|
https://en.wikipedia.org/wiki/List%20of%20computer%20systems%20from%20Yugoslavia
|
This is a list of computer systems that were significantly or completely designed in the former Yugoslavia before the breakup of the country in 1990s. This list does not include imported foreign computers. Some of these were assembled as per original manufacturer's license. See history of computer hardware in Yugoslavia for more information.
See also
History of computer hardware in Yugoslavia
References
Computer systems
Computing-related lists
Socialist Federal Republic of Yugoslavia
Yugoslavia-related lists
Science and technology in Yugoslavia
History of computing
|
https://en.wikipedia.org/wiki/One%20Mindanao
|
One Mindanao (also known as GMA Regional TV One Mindanao; formerly known as Testigo, 24 Oras Southern Mindanao and 24 Oras Davao) is the regional newscast of GMA Network's Mindanao stations in Davao, Cagayan de Oro, General Santos and Zamboanga. Originally anchored by Tek Ocampo, it premiered on October 4, 1999. Sarah Hilomen-Velasco from GMA Davao and Cyril Chaves from GMA Cagayan de Oro currently serve as anchors together with Efren Mamac from GMA Zamboanga and Jestoni Jumamil from GMA General Santos.
Overview
The newscast covers the most significant news and features in six regions in Mindanao; Davao Region, Northern Mindanao, Caraga, Soccsksargen, Bangsamoro Autonomous Region in Muslim Mindanao and Zamboanga Peninsula (including Zamboanga City, where interviewees speak Chavacano, a Spanish-based creole language), through the network's news teams from Southern Mindanao and news stringers across the island group.
The newscast airs from Monday to Friday from 5:10 PM to 5:40 PM on GMA Davao (Channel 5), GMA Cagayan De Oro (Channel 35), GMA General Santos (Channel 8) and GMA Zamboanga (Channel 9) with a simulcast over TV-4 Dipolog, TV-3 Pagadian, TV-11 Iligan, TV-12 Bukidnon, TV-5 Ozamiz, TV-26 Butuan, TV-10 Surigao, TV-2 Tandag, TV-12 Kidapawan, TV-12 Cotabato and TV-12 Jolo. Also Replay On DXGM-AM 1125 kHz Super Radyo Davao 6:00pm.
One Mindanao is also re-aired for national viewers under GTV’s late-night block "Regional TV Strip" on a weekly basis. It airs every Thursday at 11:50 PM from May 21, 2020, to July 22, 2021.
The program also airs worldwide on GMA News TV.
History
As Testigo (1999–2014)
Its main newscaster is Tek Ocampo, he started with Testigo (first named as Testigo: GMA Super Balita) on October 4, 1999 and made a name as a national reporter for GMA News when he left the show in 2002. After his stint with GMA Manila, he came back to Davao to anchor the program once more.
To strengthen the regional network's commitment of bringing the latest, most credible and most comprehensive news from the region, in February 2013, the newscast started its international broadcast on GMA News TV International alongside other regional newscasts Balitang Amianan (now One North Central Luzon) and Balitang Bisdak.
Testigo ended its 15-year run on November 7, 2014.
As 24 Oras Southern Mindanao (2014–2016)
On November 10, 2014, the newscast adopts the branding of its now-main newscast 24 Oras as 24 Oras Southern Mindanao, following their change of graphics and theme music of the network's flagship newscast of the same name.
Since February 1, 2016, this program is the only GMA regional newscast to use the 24 Oras branding after two of its other regional newscasts reverted branding to its original names, Balitang Amianan (since 2008) and Balitang Bisdak (since 1999).
As 24 Oras Davao (2016–2017)
On October 3, 2016, 24 Oras Southern Mindanao changed once again its branding simply as 24 Oras Davao. The rebranding coincided to the 17th anniversar
|
https://en.wikipedia.org/wiki/ZoomInfo
|
ZoomInfo Technologies Inc. is a software and data company which provides data for companies and business individuals.
Their main product is a commercial search-engine, specialized in contact and business information. From the internet and other sources, the company collects contact and other information about individuals, companies and other business entities, such as departments. They maintain profiles for the subjects and make these available to their clients, as a service and for a fee.
History
In 2007, DiscoverOrg was founded by Henry Schuck and Kirk Brown. In February 2019, it acquired its competitor, Zoom Information, Inc. and rebranded as ZoomInfo. DiscoverOrg's CEO Henry Schuck, CFO Cameron Hyzer, and Chief Revenue Officer Chris Hays kept their roles. Zoom Information was established in 2000 as Eliyon Technologies by founders Yonatan Stern and Michel Decary, and in August 2017 was acquired by Great Hill Partners, a private equity firm, for $240 million.
In June 4, 2020, ZoomInfo became a publicly traded company on the Nasdaq Global Select Market under the ticker symbol “ZI.”
Acquisitions
In 2017, as DiscoverOrg, the company acquired RainKing and in 2018, NeverBounce and Datanyze. In 2019, ZoomInfo acquired Komiko and in 2020, Clickagy and EverString Technology. In 2021, ZoomInfo acquired Insent, Chorus.ai, and RingLead.
References
External links
O'Brien, Kelly J. (August 17, 2017). How ZoomInfo's CEO sold three companies for $431M over 24 years. Boston Business Journal.
Software companies established in 2007
Internet properties established in 2007
Companies based in Vancouver, Washington
Domain-specific search engines
Software companies of the United States
Software companies of Israel
Companies listed on the Nasdaq
2017 mergers and acquisitions
2019 mergers and acquisitions
2020 initial public offerings
Startup databases
American companies established in 2007
|
https://en.wikipedia.org/wiki/First%20York
|
First York operates local bus services, with a network centring around the cathedral city of York, North Yorkshire, England. It is a subsidiary of FirstGroup, which operates bus, rail and tram services across the United Kingdom and Ireland.
History
In 1932, the York–West Yorkshire Joint Committee was formed, as part of a joint venture between the West Yorkshire Road Car Company and City of York Council. Following the deregulation of bus services and introduction of the Transport Act 1985, such joint ventures were prohibited, with West Yorkshire Road Car taking full ownership.
In 1987, West Yorkshire Road Car Company was sold in a management buyout to the AJS Group, owned by former East Yorkshire Motor Services managing director, Alan Stephenson. Operations in York were subsequently rebranded as York City & District.
In 1990, the York-based operations of AJS Group were sold to Yorkshire Rider. Four years later, Rider York was included in the sale of Yorkshire Rider to Badgerline.
In 1995, First Group was formed, following the merger of Badgerline and GRT Group. In 1998, Rider York was rebranded as First York. In the same year, First Group took ownership of Glenn Coaches, followed by York Pullman two years later.
In 2001, in advance of the launch of the York Metro bus network in September 2001, First York began a major fleet refreshment programme, taking delivery of a new low-floor fleet of 98 buses, including 12 double deckers, 53 single-deckers and 33 midibuses, replacing a majority of the company's pre-existing bus fleet.
In February 2007, the company introduced an hourly express service between York and Leeds Bradford Airport, branded York Aircoach. Initially operating with Volvo B10M coaches, the service was later revised to use single-deck buses and rebranded York Airlink. The service was withdrawn in April 2009.
In July 2008, a fleet of 17 Volvo B7RLE/Wright Eclipse Urban single-deck vehicles were delivered for the park and ride network, with 25 articulated Mercedes-Benz Citaro arriving the following year. The delivery saw the replacement of Volvo B7L/Wright Eclipse Metro and articulated Volvo B7LA/Wright Eclipse Fusion single-deck vehicles formerly allocated to the network, which were introduced at the turn of the decade.
In April 2009, the company launched a half-hourly express service, which ran between York and Leeds via Tadcaster and Seacroft – competing with Transdev Yorkshire Coastliner. The trial was unsuccessful and the service was subsequently withdrawn in August 2010.
In June 2014, the park and ride site at Askham Bar was expanded and relocated to a new 1,100-space site – as part of a £22 million project. In the same month, a new site was opened at Poppleton Bar, with services operated by a fleet of fully-electric Optare Versa.
In August 2015, First York commenced operation of a contract to provide services on behalf of the University of York. The high-frequency services (66 & 67) are operated by a fleet of Volvo B9TL/W
|
https://en.wikipedia.org/wiki/Apostolic-Prophetic%20Movement
|
The Apostolic-Prophetic movement (AP movement) is a US-based Christian movement founded in the early 2000s. It is a network of non-denominational alliances of independent churches and ministries.
Overview
The AP movement is rooted in the Charismatic movement, and is active in the Charismatic, Pentecostal, Third-Wave and Prophetic groups. The movement believes in restoring elements of what it calls the five-fold ministry, based on Ephesians 4:11-13. Apostles, prophets, evangelists, pastors, and teachers are considered legitimate offices of the church and are seen as prayer warriors, responsible for ushering in the return of Jesus and the Kingdom of God through prayer. According to one source, the coalition is active across the US and about 40 other countries, and includes several hundred members, international training centers, and communication networks.
Beliefs and creeds
The movement has grown out of the Christian Charismatic movement and emphasizes the concept of the Holy Spirit. It is wide and varied, although many churches follow the Apostles' Creed, Nicene Creed, and Athanasian Creed. Some individual churches only hold to the Nicene Creed and have parted with what they call "historical Christianity".
The movement emphasizes the importance of Christians going into spiritual warfare at three levels, described as the ground level, person-to-person actions such as praying for each other's personal needs, the occult level, dealing with "demonic forces" released through occult activities, and the strategic or cosmic level, which involves "bind[ing] and bring[ing] down spiritual principalities and powers that rule over governments." The strategic level makes use of "spiritual mapping" to engage in spiritual warfare against "territorial spirits".
Purpose
The stated purpose of the AP movement is to restore the ministries of prophets and apostles to the church. They believe the restoration of the five ministry offices will fulfill the purpose for which they were given: the equipping and perfecting of the saints in Christ's image and ministry. Prophets and apostles are believed to be preparing church members for the day of the manifestation of the Kingdom of God and to give testimony to every nation.
The movement is not an organization and does not have formal membership.
History
Around the time of the Second Great Awakening, leaders like Joseph Smith introduced the concept of the restoration of living prophets and apostles to guide religious movements in the US. The Church of Jesus Christ of Latter-day Saints in particular grew substantially over the next century, and its members recognized many prophets and apostles over that time. Much later, the modern movement quickly spread among evangelicals through the use of early mass-marketing techniques by megachurches and religious corporations. Early 20th-century movement leaders were Paul Cain and Bill Hamon. Hamon introduced the idea of a coming prophetic movement and was instrumental in est
|
https://en.wikipedia.org/wiki/Porting%20Authorisation%20Code
|
Porting Authorization Code (PAC) is a unique identifier (normally 9 characters long and in the format "ABC123456") used by some mobile network operators to facilitate mobile number portability (MNP). This allows users to retain their mobile telephone number when switching operators.
United Kingdom
Telecommunications service is regulated in the UK by Ofcom. On 25 July 2003, Ofcom introduced the General Conditions of Entitlement which apply to all communications networks and service providers in the UK. Several amendments to this original document have been issued since this time.
Condition 18 requires all providers to provide number portability but only to subscribers of publicly available telephone services who request it. Number portability must be provided as soon as practicable and on reasonable terms to subscribers, and bilateral porting arrangements between providers must accord with agreed processes.
The current service provider must give the customer a Porting Authorisation Code (PAC), or a reason why it cannot be issued, within two working hours of their request (if for fewer than 26 numbers) or ten working days (for 26+ numbers)
A PAC is valid for a period of 30 calendar days from the day of issue, and the customer's request must be submitted to their new service provider within that time.
A number can then be transferred between 1 and 32 calendar days from the date the PAC is issued.
Some mobile phone companies can charge a fee to move the customer's number. This is usually no more than £25. The provider must issue a PAC within two hours of the port-out request, if such request was made over the phone for fewer than 25 numbers on a single account. Customer debt is not a valid reason for a service provider to refuse issuing of a PAC. Service providers may not treat PAC requests as requests to terminate service. Pay-as-you-go customers will lose any unused credit when switching service providers.
Since 1 July 2019, customers can request a PAC by text message, rather than having to call their existing network.
India
In India, the code is known as a 'Unique Porting Code (UPC)'. The rules for number portability are prescribed by the Telecom Regulatory Authority of India.
You are allowed to move to another mobile service provider only after 90 days of the date of activation of your mobile connection or from the date of last porting of your mobile number, whichever is applicable.
You are allowed to change mobile service provider across the country.
If you are a pre-paid subscriber, note that the balance amount of talk time, if any, at the time of porting will lapse.
If you are a post-paid subscriber, ensure that you have paid all the dues as per your last bill. (You will also have to sign an undertaking on the porting form.)
See also
Local number portability
Migration Authorisation Code
References
Mobile technology
Mobile telecommunications standards
Unique identifiers
|
https://en.wikipedia.org/wiki/Sockets%20Direct%20Protocol
|
The Sockets Direct Protocol (SDP) is a transport-agnostic protocol to support stream sockets over remote direct memory access (RDMA) network fabrics. SDP was originally defined by the Software Working Group (SWG) of the InfiniBand Trade Association. Originally designed for InfiniBand (IB), SDP is currently maintained by the OpenFabrics Alliance.
Protocol
SDP defines a standard wire protocol over an RDMA fabric to support stream sockets (SOCK_STREAM). SDP uses various RDMA network features for high-performance zero-copy data transfers. SDP is a pure wire-protocol level specification and does not go into any socket API or implementation specifics.
The purpose of the Sockets Direct Protocol is to provide an RDMA-accelerated alternative to the TCP protocol on IP. The goal is to do this in a manner which is transparent to the application.
Solaris 10 and Solaris 11 Express include support for SDP. Several other Unix operating system variants plan to include support for Sockets Direct Protocol. Windows offers a subsystem called Winsock Direct, which could be used to support SDP.
SDP support was introduced to the JDK 7 release of the Java Platform, Standard Edition (July 2011) for applications deployed in on Solaris and Linux operating systems (OFED 1.4.2 and 1.5). Oracle Database 11g supports connection over SDP.
Sockets Direct Protocol only deals with stream sockets, and if installed in a system, bypasses the OS resident TCP stack for stream connections between any endpoints on the RDMA fabric. All other socket types (such as datagram, raw, packet, etc.) are supported by the Linux IP stack and operate over standard IP interfaces (i.e., IPoIB on InfiniBand fabrics). The IP stack has no dependency on the SDP stack; however, the SDP stack depends on IP drivers for local IP assignments and for IP address resolution for endpoint identifications.
SDP is used by the Australian telecommunications company Telstra on their 3G platform Next G to deliver streaming mobile TV.
This protocol has been deprecated or not maintained by OFED in the latest releases, hence look for alternatives. The probable suggestions will be RSocket, Winsock, etc.
References
Network protocols
|
https://en.wikipedia.org/wiki/Hiding
|
Hiding is obscuring something from view or rendering it inconspicuous. It may refer to:
Hiding (programming), of inherited methods in object-oriented computer programming
Hiding (TV series), a 2015 Australian television series
Christoffer Hiding (born 1985), a Swedish singer
Information hiding, in computer science, the hiding of design decisions in a computer program
See also
Hiding in Plain Sight (disambiguation)
Hiding Place (disambiguation)
Hide (disambiguation)
Hide and Seek (disambiguation)
pt:Esconderijo
zh:棄保潛逃
|
https://en.wikipedia.org/wiki/XML-binary%20Optimized%20Packaging
|
XML-binary Optimized Packaging (XOP) is a mechanism defined for the serialization of XML Information Sets (infosets) that contain binary data, as well as deserialization back into the XML Information Set.
Benefits
XOP allows the binary data part of an XML Infoset to be serialized without going through the XML serializer. The XML serialization of an XML Infoset is text based, so any binary data will need to be encoded using base64. Using XOP avoids this by extracting the binary data out of the XML Infoset so that the XML Infoset does not contain binary data and the binary data can be serialized differently.
Therefore, XOP can reduce the size of the serialization (since base64 encoding has approximately a 33% size overhead) and (depending on how it is implemented) might allow processing efficiencies. This size increase results in extra resources needed to transmit or store the data.
Costs
XOP introduces another level of processing. Therefore, it introduces extra complexity and processing overheads.
The representation of the XOP packages introduces some overhead. These are negligible when the binary data is large, but could be significant if the binary data is small.
Operation
XOP operates on a single XML Infoset.
The binary parts of the original XML infoset are extracted out, leaving an "XOP Infoset" (which is essentially the original XML Infoset with the binary parts replaced by external references). The references in the XOP Infoset are represented using the "xop:Include" element. The XOP Infoset plus the extracted content can be serialized into a representation called the "XOP Package". The XOP Package can be sent or stored.
To reconstitute the XML Infoset, the XOP Package is deserialized into the XOP Infoset plus the extracted content, and then the extracted content is put back into the XML Infoset.
XOP Packages
XOP can be used with a number of different packaging mechanisms. A packaging mechanism defines how the XOP Infoset and the binary chunks are represented.
The XOP specification defines how MIME can be used as a packaging mechanism. When used with MIME, the XOP Infoset is represented as XML in the root MIME part, and the binary chunks are represented in the other MIME parts. Those other MIME parts can be serialized as binary data, avoiding the need to base64 encode them if they were left inside the XML Infoset.
XOP does not mandate the use of the MIME packaging mechanism, so other packaging mechanisms could be used.
Usage in SOAP Web services
The MIME packaging mechanism is the most widely used, since XOP is usually used to represent SOAP messages with MTOM.
For example:
See also
MTOM (Message Transmission Optimization Mechanism)
References
XML-Binary Optimized Packaging (article from Dr Dobbs)
External links
W3C's XML-binary Optimized Packaging W3C Recommendation
XML-based standards
|
https://en.wikipedia.org/wiki/Sonic%20Arts%20Network
|
Sonic Arts Network was a UK-based organisation, established in 1979, that aimed to enable both audiences and practitioners to engage with the art of sound through a programme of festivals, events, commissions and education projects. Its honorary patron was Karlheinz Stockhausen. At time of founding in 1979 it was known as the Electroacoustic Music Association of Great Britain (EMAS), changing its name to Sonic Arts Network in 1989.
On 1 October 2008 the Sonic Arts Network merged with the Society for the Promotion of New Music, the British Music Information Centre (BMIC) and the Contemporary Music Network to create a new organisation to promote contemporary Music in the UK called Sound and Music.
Sonic Arts Network's activities separated into three main areas:
Activities – Events, regular festivals such as Cut and Splice and Expo, tours and commissions.
Education – national education project Sonic Postcards, artist workshops and talks.
Network – Sonic Arts Network was a membership organisation that acted as a hub of information, opportunities and publications for the UK sonic arts scene.
Activities
Every year, Sonic Arts Network produced a number of nationwide commissions and projects in partnership with funding agencies, sponsors, broadcasters and venues. The aim of these activities was to bring some of the best new and existing work by sound artists from around the world to the UK. Sonic Arts Network's main activities included: Cut and Splice, Expo festival, Beach Singularity and Vacant Space.
Cut and Splice
Cut and Splice is a festival of experimental electronic music that brings together international artists to premiere new work or recreate seminal historical pieces. First held in 2003, it is presented in association with BBC Radio 3 and continued under the Sound And Music name after Sonic Arts Network had been merged into the latter organisation.
The event has previously featured Bernard Parmegiani, François Bayle, Yasunao Tone and Ars Electronica Prize-winner Eliane Radigue. Some of the artists featured in Cut and Splice Acousmonium 2006 at the ICA included Russell Haswell, John Wall, Hecker, Michel Chion, Christian Zanési, Philip Jeck, Carl Michael von Hausswolff, Zbigniew Karkowski and Hans-Joachim Roedelius.
Expo Festival
Beginning in 1997 as a conference and renamed in 2004, Expo festival was Sonic Arts Network's annual festival representing the experimental music and sound art scene in the UK, held in a different UK location each year. Free and open to the public, the event mobilised a national network of artists and engaged with communities from all backgrounds – placing sonic art and the people who make it, in direct contact with the public.
Expo 2006 explored the inner, outer and public spaces of Manchester. The festival included sound installations at the Cornerhouse by Berlin-based sound art collective Staalplaat Soundsystem who presented The Ultrasound of Therapy; Bob Levene's newly commissioned work The Space Between –
|
https://en.wikipedia.org/wiki/Memoware
|
Memoware is a term originally coined in 1996 for data formatted for the Memopad application that was shipped with the original U.S. Robotics Pilot (now Palm) Personal Digital Assistant. The MemoWare website was started shortly afterward by Craig Froehle as a central repository for memoware, and now hosts thousands of documents (in various formats) for Palm OS devices and other handhelds.
History
The idea and the name came out of discussions on a Pilot-related email list (managed by Tracy R. Reed) in August and September 1996. The term was probably coined by Bill Raynor in an email of 30 Aug 1996, wherein he said: "I've made up a number of tables of statistical distributions ... for my own use. Is this a category that the list would like to see circulated? (call it memoware?)". He emailed this list on 7 September in an email with the subject line: Pilot: Memoware - statistical tables".
On 12 September Jeffrey Macko wrote, on the subject of maintaining grocery lists on the Pilot: "I'm half tempted to start a pilot site for small useful databases." and Craig Froehle replied "I think that if everybody mailed you their lists of useful stuff, and you put them on a web page for us to copy-n-paste into the Pilot desktop PIM, that'd be real handy."
The following day, a list-member called QuZaX reported that he was working on early content, including weights and measures, the Periodic table, and other elements. On 14 September QuZax reminded the list that the data tables would not be a program. "They will just be in memoformat. I just used tabs to make them easy to read and so they would line up nicely."
On the following Tuesday (17 September), Froehle announced that he had posted some memos on his website on a server at the University of Cincinnati. He wrote: "Due to overwhelming demand (approx. 15 requests an hour all yesterday and today, so far), I've put up these memos on my website. If you've no access to the WWW or for some other reason, just can't figure out how to get this text onto your PC, email me direct and I'll mail them to you. If you want me to, I can put up your useful Memowarez(tm) if you email them to me. Maybe this can start to be a big repository of pre-formatted Pilot data..."
Many list-members created Memoware over the next days and months, notably Mark Carden (periodic table of elements, international data), Jon Flemming (US Presidents), John Komdat (US States), Bill Raynor (statistical tables, Quake video game cheats), Bradley Batt (sports results), and others.
Craig's "memoware" database grew rapidly, as he predicted, moving to the domain www.memoware.com in July 1997 and reaching 300 documents a few months later. He then continued adding documents and e-books, mostly donated by users, in various new mobile formats developed for Palm OS and other handhelds, including Doc and TomeRaider. By late 2001, MemoWare was serving over half a million individual users and nearly a million documents per month. In December, 2
|
https://en.wikipedia.org/wiki/List%20of%20Deutsche%20Bahn%20station%20codes
|
Deutsche Bahn and its predecessors Deutsche Bundesbahn, Deutsche Reichsbahn and Deutsche Reichsbahn-Gesellschaft use a system of letters to denote a station on their network. The station code used today is colloquially called the DS 100 code, named after the original papers of the Deutsche Bundesbahn laying out the system, the DS 100, Abkürzungen der Betriebsstellen; nowadays called Richtlinie (Ril) 100, Abkürzungen für Örtlichkeiten. Every code specifies abbreviation, name and type of the station.
Description of the code
The code is set up as follows:
X YYYY Z
where X denotes the Bundesbahndirektion (BD) in West Germany or Reichsbahndirektion (Rbd) in East Germany and prior to 1949, and YYYY is the code of the station itself, which can be up to four letters. Together with the Direktionen letter (X or Z) the first letter is also the country code for foreign destinations (see below). Although some of the Direktionen have been merged into others, changed, or otherwise remodeled, their old codes remained in place. For example, most of the Northern areas of Germany still have the BD code A for Altona (now a part of Hamburg), even though the BD Altona has long been out of existence.
Further information can be added by an extra letter Z after the station identifier, for example HB is the code for Bremen Hauptbahnhof, (BD Hanover (H), station code B) whilst HB X is the code for the Bremen maintenance works, which are considered a subdivision of Bremen Hauptbahnhof and hence do not have their own code.
Special codes are also used to identify border points, special tariff points for ships et cetera.
Listing of BD/Rbd codes
Letters C, G, I, J, O, P, Q, V and Y are assigned for facilities of DB Energie (e.g. filling stations) and DB Netz (e.g. changes of VzG lines) or other foreign locations for planning purposes.
Country codes (X)
These codes were assigned to international destinations west of Germany, but are used for eastern European destinations too.
Country codes (Z)
These codes were assigned for international destinations east of Germany.
Listing of station types
List of station codes
Please refer Deutsche Bahn AG: Übersicht der Betriebsstellen und deren Abkürzungen aus der Richtlinie 100 (PDF, 769 KB, status: August 2015)
See also
Railway divisions in Germany
Railway station types in Germany
External links
List of Deutsche Bahn station codes (additionally with historical stations) on Bahnstatistik.de
References
Deutsche Bahn
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.